WorldWideScience

Sample records for contraband detection system

  1. Contraband detection

    International Nuclear Information System (INIS)

    Gozzani, T.

    1995-01-01

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container

  2. Contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Gozzani, T. [Science Applications International Corporation, Santa Clara (United States)

    1995-07-15

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container.

  3. Contraband detection with fast neutrons

    Energy Technology Data Exchange (ETDEWEB)

    Buffler, Andy E-mail: abuffler@science.uct.ac.za

    2004-11-01

    Recent terror events and the increase in the trade of illicit drugs have fuelled the exploration of the use of fast neutrons as probes for the detection of hidden contraband, especially explosives, in packages ranging in size from small mail items to cargo containers. The various approaches using fast neutrons for contraband detection, presently under development, are reviewed. The role that a neutron system might play in the non-intrusive interrogation of airline luggage is discussed.

  4. Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems

    International Nuclear Information System (INIS)

    Gilliam, David M.

    2011-01-01

    Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many other applications of pass-fail testing, in addition to testing of contraband detection systems.

  5. A new proof-of-principle contraband detection system

    International Nuclear Information System (INIS)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.

    1995-12-01

    An accelerator-based technique is being developed to detect contraband materials in large containers. The source, which uses a low-energy proton beam to generate high-energy gamma rays, uses the gamma resonance absorption technique to detect nitrogen-14 and chlorine-35 in containers. Both these materials are commonly found in contraband drugs as well as in explosives. Through the use of segmented BGO detectors to detect the resonant gamma rays a quantity as low as ∼ 1 kg can be located with a considerable degree of confidence. Several stations at a port of entry can be operated with one accelerator, as described

  6. Contraband detection technological complex with ion linac

    International Nuclear Information System (INIS)

    Gavrish, Yu.N.; Svistunov, Yu.A.; Sidorov, A.V.

    2004-01-01

    The contraband detection technological complex (CDTC) to detect explosives, fission materials, and vegetable drugs is proposed. Our approach employs the pulsed neutron source. The CDTC employs the rf linac to provide a beam of deuterons of 1 or 3.5 MeV, which impinge upon a target giving birth pulsed neutron flow. Explosives are identified by the matrix detection system with gamma registration under interaction of neutron on N, O, C nuclei. Experimental verification of main principles of matrix detection system is presented

  7. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    International Nuclear Information System (INIS)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations

  8. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    Energy Technology Data Exchange (ETDEWEB)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations.

  9. Far-infrared contraband-detection-system development for personnel-search applications

    International Nuclear Information System (INIS)

    Schellenbaum, R.L.

    1982-09-01

    Experiments have been conducted toward the development of an active near-millimeter-wave, far infrared, personnel search system for the detection of contraband. These experiments employed a microwave hybrid tee interferometer/radiometer scanning system and quasi-optical techniques at 3.3-mm wavelength to illuminate and detect the reflection from target objects against a human body background. Clothing and other common concealing materials are transport at this wavelength. Retroreflector arrays, in conjunction with a Gunn diode radiation source, were investigated to provide all-angle illumination and detection of specular reflections from unaligned and irregular-shaped objects. Results indicate that, under highly controlled search conditions, metal objects greater than or equal to 25 cm 2 can be detected in an enclosure lined with retroreflectors. Further development is required to produce a practical personnel search system. The investigation and feasibility of alternate far infrared search techniques are presented. 23 figures, 2 tables

  10. A contraband detection system proof-of-principle device using electrostatic acceleration

    International Nuclear Information System (INIS)

    Sredniawski, Joseph J.; Debiak, T.W.; Kamykowski, E.; Rathke, J.; Milton, B.; Rogers, J.; Schmor, P.; Stanford, G.; Brando, J.

    1996-01-01

    A new Contraband Detection System (CDS) Proof-of- Principle (POP) device is nearing completion at Northrop Grumman's Advanced Technology and Development Center. We employ gamma resonance absorption (GRA) to detect nitrogen or chlorine in explosives and certain forms of illegal drugs. Using tomography, 3-D images of the total density and selected element density are generated. These characteristics together may be utilized with considerable confidence in determining if contraband is present in baggage or cargo. The CDS employs a high current (10 mA) DC electrostatic accelerator that provides a beam of protons at either 1.75 or 1.89 MeV. These high energy particles impinge upon a target coated with 13 C or 34 S. The resultant resonant gamma rays are preferentially absorbed in either 14 N or 35 Cl. Because of the penetrating power of the gamma rays, this approach can be utilized for inspection of fully loaded aircraft containers such as the LD3. Our current program calls for testing of the POP CDS by late 1996. This paper presents the overall design and characteristics of the CDS POP. (author)

  11. Contraband Detection with Nuclear Resonance Fluorescence: Feasibility and Impact

    International Nuclear Information System (INIS)

    Pruet, J; Lange, D

    2007-01-01

    In this report they show that cargo interrogation systems developed to thwart trafficking of illicit nuclear materials could also be powerful tools in the larger fight against contraband smuggling. In particular, in addition to detecting special nuclear materials, cargo scanning systems that exploit nuclear resonance fluorescence to detect specific isotopes can be used to help find: chemical weapons; some drugs as well as some chemicals regulated under the controlled substances act; precious metals; materials regulated under export control laws; and commonly trafficked fluorocarbons

  12. System to detect contraband in cargo containers using fast and slow neutron irradiation and collimated gamma detectors

    International Nuclear Information System (INIS)

    Smith, R.C.; Hurwitz, M.J.; Tran, K.C.

    1995-01-01

    We have produced a product design concept for an automatic, shipping-container inspection system to be used for detection of contraband, including illicit drugs, and for trade regulation enforcement via shipping manifest confirmation. Using nondestructive nuclear techniques the system can see deeply into the cargo and generate a 3-D spatial image of an entire container's contents automatically and in real time. A pulsed, sealed-tube, neutron generator is employed. The approach divides a container into numerous, small, volume elements that are individually interrogated using concurrent fast and slow neutron activation and gamma detection by collimated scintillators. We have designed, built, and operated a laboratory apparatus which has demonstrated the attractiveness of this approach. Experimental data were found to agree with design expectations derived from computer modeling. By combining selected element signatures and phenomenological measures, together with discrimination algorithms, we have demonstrated that a full-scale inspection system would need from less than 5 min to 30 min (depending on cargo type) to process an 8 ftx8 ftx40 ft container in order to detect hidden contraband. (orig.)

  13. Bayesian Processing for the Detection of Radioactive Contraband from Uncertain Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Sale, K; Guidry, B; Breitfeller, E; Manatt, D; Chambers, D

    2007-06-26

    With the increase in terrorist activities throughout the world, the need to develop techniques capable of detecting radioactive contraband in a timely manner is a critical requirement. The development of Bayesian processors for the detection of contraband stems from the fact that the posterior distribution is clearly multimodal eliminating the usual Gaussian-based processors. The development of a sequential bootstrap processor for this problem is discussed and shown how it is capable of providing an enhanced signal for eventual detection.

  14. Techniques for detecting explosives and contraband

    International Nuclear Information System (INIS)

    Vourvopoulos, G.

    1994-01-01

    Because terrorism continues to be a societal threat, scientists are still searching for ways to identify concealed weapons that can be used in terrorist attacks. Explosives are singled out for particular attention because they can easily be shaped to look innocuous, and are still hard to detect. At present, there are three methods under development for the detection of explosives: X-ray imaging, vapour detection and nuclear techniques, and this article will concentrate on the latter. Since there is no single technology that can address all the questions concerning the detection of explosives and other illicit contraband, the philosophy that emerges is that of an integral system combining methodologies. Such a system could contain a nuclear technology device, a vapour detector, and an X-ray imaging device, all backed by an intelligence gathering system. In this paper methods are suggested for identifying explosives which may be used in terrorist attacks and for detecting concealed drugs. Techniques discussed are X-ray imaging, combining high and low energy x-ray machines, vapour detection using a ''sniffer'' to collect vapour samples then analysing the vapour by gas chromatography, chemiluminescence and mass spectroscopy and nuclear techniques. Nuclear techniques, such as neutron activation analysis, are discussed in detail but it is stressed that they need to be carried out at speed to eliminate disruption and delay at airports etc. (UK)

  15. Apparatus and method for detecting contraband using fast neutron activation

    International Nuclear Information System (INIS)

    Gozani, T.; Sawa, Z.P.; Shea, P.M.

    1992-01-01

    This patent describes a method of detecting contraband within an object under investigation. It comprises: generating a beam of case neutrons; irradiating the object with the beam of fast neutrons, the fast neutrons interacting with atomic nuclei of the elements contained within the object to produce a gamma-ray spectrum having spectral lines characteristic of the elements contained within the object; measuring the spectral lines of the gamma-ray spectrum using a multiplicity of gamma-ray detectors judiciously positioned around the object; detecting the number of neutrons that pass through the object without interacting substantially with atomic nuclei within the object; determining the spatial and density distributions of the atomic nuclei of the elements contained within the object from the measured gamma-ray spectrum obtained from the multiplicity of gamma-ray detectors and the number of neutrons that pass through the object; comparing the measured spatial and density distributions of the atomic nuclei of the elements within the object with known spatial and density distributions of atomic nuclei for elements characteristic of contraband; and determining that contraband is present within the object when the comparison indicates a substantial match

  16. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  17. Physics-based, Bayesian sequential detection method and system for radioactive contraband

    Science.gov (United States)

    Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

    2014-03-18

    A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

  18. Summary tables of six commercially available entry control and contraband detection technologies

    International Nuclear Information System (INIS)

    Hunter, John Anthony

    2005-01-01

    Existing contraband detection and entry control devices such as metal detectors, X-ray machines, and radiation monitors were investigated for their capability to operate in an automated environment. In addition, a limited number of new devices for detection of explosives, chemicals, and biological agents were investigated for their feasibility for inclusion in future physical security systems. The tables in this document resulted from this investigation, which was part of a conceptual design upgrade for the United States Mints. This summary of commercially available technologies was written to provide a reference for physical security upgrades at other sites

  19. Contraband detection using high-energy gamma rays from 16O*

    International Nuclear Information System (INIS)

    Micklich, B.J.; Fink, C.L.; Sagalovsky, L.; Smith, D.L.

    1996-01-01

    High-energy monoenergetic gamma rays (6.13 and 7.12 MeV) from the decay of excited states of the 16 O* nucleus are highly penetrating and thus offer potential for non-intrusive inspection of loaded containers for narcotics, explosives, and other contraband items. These excited states can be produced by irradiation of water with 14-MeV neutrons from a DT neutron generator or through the 19 F(p,α) 16 O* reaction. Resonances in 19 F(p,α) 16 O* at proton energies between 340 keV and 2 MeV allow use of a low-energy accelerator to provide a compact, portable gamma source of reasonable intensity. The present work provides estimates of gamma source parameters and suggests how various types of contraband could be detected. Gamma rays can be used to perform transmission or emission radiography of containers or other objects. Through the use of (γ, n) and (γ, fission) reactions, this technique is also capable of detecting special nuclear materials such as deuterium, lithium, beryllium, uranium, and plutonium. Analytic and Monte Carlo techniques are used to model empty and loaded container inspection for accelerator-produced gamma, radioisotope, and x-ray sources

  20. The nuclear materials contraband

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.

    1996-01-01

    Several seizures of nuclear materials carried by contraband have been achieved. Some countries or criminal organizations could manufacture atomic bombs and use them. This alarming situation is described into details. Only 40% of drugs are seized by the American police and probably less in western Europe. The nuclear materials market is smaller than the drugs'one but the customs has also less experience to intercept the uranium dispatch for instance more especially as the peddlers are well organized. A severe control of the international transports would certainly allow to seize a large part of nuclear contraband materials but some dangerous isotopes as uranium 235 or plutonium 239 are little radioactive and which prevents their detection by the Geiger-Mueller counters. In France, some regulations allow to control the materials used to manufacture the nuclear weapons, and diminish thus the risk of a nuclear materials contraband. (O.L.). 4 refs., 2 figs

  1. 78 FR 76860 - Contraband Screening for Criminal Justice Applications

    Science.gov (United States)

    2013-12-19

    ... for the detection of contraband. Screening technology is widely used by criminal justice practitioners...: 1. Model Number and Name of the screening system/device. 2. Technology used by the system/device for... container or bag), Plastic, Wood, Ceramic, Powder (in a small packet), and/or Paper (e.g., folded currency...

  2. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-08-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  3. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-01-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  4. Accelerator based techniques for contraband detection

    Science.gov (United States)

    Vourvopoulos, George

    1994-05-01

    It has been shown that narcotics, explosives, and other contraband materials, contain various chemical elements such as H, C, N, O, P, S, and Cl in quantities and ratios that differentiate them from each other and from other innocuous substances. Neutrons and γ-rays have the ability to penetrate through various materials at large depths. They are thus able, in a non-intrusive way, to interrogate volumes ranging from suitcases to Sea-Land containers, and have the ability to image the object with an appreciable degree of reliability. Neutron induced reactions such as (n, γ), (n, n') (n, p) or proton induced γ-resonance absorption are some of the reactions currently investigated for the identification of the chemical elements mentioned above. Various DC and pulsed techniques are discussed and their advantages, characteristics, and current progress are shown. Areas where use of these methods is currently under evaluation are detection of hidden explosives, illicit drug interdiction, chemical war agents identification, nuclear waste assay, nuclear weapons destruction and others.

  5. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    International Nuclear Information System (INIS)

    YangDai, Tianyi; Zhang, Li

    2016-01-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  6. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    Energy Technology Data Exchange (ETDEWEB)

    YangDai, Tianyi [Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Zhang, Li, E-mail: zhangli@nuctech.com [Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China)

    2016-02-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  7. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    Science.gov (United States)

    YangDai, Tianyi; Zhang, Li

    2016-02-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  8. Gamma-resonance Contraband Detection using a high current tandem accelerator

    International Nuclear Information System (INIS)

    Milton, B. F.; Beis, J.; Dale, D.; Rogers, J.; Ruegg, R.; Debiak, T.; Kamykowski, E.; Melnychuk, S.; Rathke, J.; Sredniawski, J.

    1999-01-01

    TRIUMF and Northrop Grumman have developed a new system for the detection of concealed explosives and drugs. This Contraband Detection System (CDS) is based on the resonant absorption by 14 N of gammas produced using 13 C(p,γ) 14 N. The chosen reaction uses protons at 1.75 MeV and the gammas have an energy of 9.17 MeV. By measuring both the resonant and the non-resonant absorption using detectors with good spatial resolution, and applying standard tomographic techniques, we are able to produce 3D images of both the nitrogen partial density and the total density. The images together may be utilized with considerable confidence to determine if small amounts of nitrogen based explosives, heroin or cocaine are present in the interrogated containers. Practical Gamma Resonant Absorption (GRA) scanning requires an intense source of protons. However this proton source must also be very stable, have low energy spread, and have good spatial definition. These demands suggested a tandem as the accelerator of choice. We have therefore constructed a 2 MeV H - tandem optimized for high current (10 mA) operation, while minimizing the overall size of the accelerator. This has required several special innovations which will be presented in the paper. We will also present initial commissioning results

  9. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force

    Energy Technology Data Exchange (ETDEWEB)

    Hannum, David W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.; Shannon, Gary W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.

    2006-04-01

    This report describes the collaboration between the South Texas Specialized Crimes and Narcotics Task Force (STSCNTF) and Sandia National Laboratories (SNL) in a field test that provided prototype hand-held trace detection technology for use in counter-drug operations. The National Institute of Justice (NIJ)/National Law Enforcement and Corrections Technology Center (NLECTC)/Border Research and Technology Center (BRTC) was contacted by STSCNTF for assistance in obtaining cutting-edge technology. The BRTC created a pilot project for Sandia National Laboratories (SNL) and the STSCNTF for the use of SNL’s Hound, a hand-held sample collection and preconcentration system that, when combined with a commercial chemical detector, can be used for the trace detection of illicit drugs and explosives. The STSCNTF operates in an area of high narcotics trafficking where methods of concealment make the detection of narcotics challenging. Sandia National Laboratories’ (SNL) Contraband Detection Department personnel provided the Hound system hardware and operational training. The Hound system combines the GE VaporTracer2, a hand-held commercial chemical detector, with an SNL-developed sample collection and preconcentration system. The South Texas Task force reported a variety of successes, including identification of a major shipment of methamphetamines, the discovery of hidden compartments in vehicles that contained illegal drugs and currency used in drug deals, and the identification of a suspect in a nightclub shooting. The main advantage of the hand-held trace detection unit is its ability to quickly identify the type of chemical (drugs or explosives) without a long lag time for laboratory analysis, which is the most common analysis method for current law enforcement procedures.

  10. Associated-particle sealed-tube neutron probe: Detection of explosives, contraband, and nuclear materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.

    1996-01-01

    Continued research and development of the APSTNG shows the potential for practical field use of this technology for detection of explosives, contraband, and nuclear materials. The APSTNG (associated-particle sealed-tube generator) inspects the item to be examined using penetrating 14-MeV neutrons generated by the deuterium-tritium reaction inside a compact accelerator tube. An alpha detector built into the sealed tube detects the alpha-particle associated with each neutron emitted in a cone encompassing the volume to be inspected. Penetrating high-energy gamma-rays from the resulting neutron reactions identify specific nuclides inside the volume. Flight-times determined from the detection times of gamma-rays and alpha-particles separate the prompt and delayed gamma-ray spectra and allow a coarse 3-D image to be obtained of nuclides identified in the prompt spectrum. The generator and detectors can be on the same side of the inspected object, on opposite sides, or with intermediate orientations. Thus, spaces behind walls and other confined regions can be inspected. Signals from container walls can be discriminated against using the flight-time technique. No collimators or shielding are required, the neutron generator is relatively small, and commercial-grade electronics are employed. The use of 14-MeV neutrons yields a much higher cross-section for detecting nitrogen than that for systems based on thermal-neutron reactions alone, and the broad range of elements with significant 14-MeV neutron cross-sections extends explosives detection to other elements including low-nitrogen compounds, and allows detection of many other substances. Proof-of-concept experiments have been successfully performed for conventional explosives, chemical warfare agents, cocaine, and fissionable materials

  11. Vapor detection of trafficking of contraband money: A discussion of technical feasibility

    Energy Technology Data Exchange (ETDEWEB)

    Dietz, R.N.

    1996-02-01

    For every two pounds of cocaine smuggled into the US, drug traffikers are being forced to clandestinely ship three pounds of money back out for subsequent laundering. Based on tracer technology developed for validation of long-range atmospheric transport models and other commercial applications, it is shown that US currency can be tagged with a minute amount (about 1 ppm by weight of a bill) of perfluorocharbon tracer (PFT) material that is sufficient to last for about 30 years and yet provide a vapor emission rate suitable for detectability of modest caches of contraband money in vehicles at border crossings, on aircraft at international terminals, and in buildings. The cost of tagging is less than $5 per million bills; the taggant quantity should have no impact on the feel of a bill. The low emission rate would not allow detectability of usual amounts of money in typical scenarios, providing an essential degree of privacy, but extraordinary amounts would be detectable using specialized instrumentation and know-how not easily attainable but commercially in production; an example of sub-part-per-quadrillion detection of a proposed PFT taggant is demonstrated using a prototype commercial unit. An outline of a research and demonstration program to achieve this capability and details of the proposed tagging and detection procedures already indicate that the concept is technically feasible.

  12. Use of Ground Penetrating Radar for Locating Contraband Aboard Ocean Going Vessels: Feasibility Study

    National Research Council Canada - National Science Library

    Llopis, Jose

    2001-01-01

    Ground Penetrating Radar (GPR) surveys were conducted over various stockpiled materials at the Alabama state Docks located in Mobile, AL, to determine whether GPR is a viable method for rapidly detecting contraband materials...

  13. Basic concepts underlying fast-neutron-based contraband interrogation technology

    International Nuclear Information System (INIS)

    Fink, C.L.; Guenther, P.T.; Smith, D.L.

    1992-01-01

    All accelerator-based fast-neutron contraband interrogation systems have many closely interrelated subsystems, whose performance parameters will be critically interdependent. For optimal overall performance, a systems analysis design approach is required. This paper provides a general overview of the interrelationships and the tradeoffs to be considered for optimization of nonaccelerator subsystems

  14. Factors associated with different cigarette access behaviours among underage smoking youth who usually smoke contraband (native) cigarettes.

    Science.gov (United States)

    Leatherdale, Scott T; Ahmed, Rashid; Vu, Mary

    2011-01-01

    Given that little is known about how youth access contraband cigarettes, the current study seeks to examine factors associated with how underage smoking youth report usually accessing contraband cigarettes. This study used nationally representative data collected from 41,886 students (grades 9 to 12) as part of the 2006-07 Canadian Youth Smoking Survey (YSS). Using data from current smokers who report that their usual brand of cigarettes is contraband, three logistic regression models were used to examine factors associated with buying cigarettes from a store, getting cigarettes from a family member, or getting cigarettes from friends or strangers. In 2006, 7.9% (n = 1 3,300) of Canadian youth who were current smokers reported that their usual brand of cigarettes was contraband. Among these youth, the majority reported that they usually get their cigarettes from a friend or stranger (54.8%), whereas 26.4% report usually getting them from a family member and 18.8% usually buying their own from a store. Boys were more likely to buy contraband cigarettes from a store, whereas youth with a parent who smokes contraband cigarettes were substantially more likely to get contraband cigarettes from a family member and youth with friends who smoke contraband cigarettes were substantially more likely to get contraband cigarettes from a friend or stranger. Ongoing surveillance of contraband cigarette use among youth and how youth access contraband cigarettes is required for guiding future tobacco control policy and programming activities.

  15. Contraband, free ports, and British merchants in the Caribbean world, 1739-1772

    Directory of Open Access Journals (Sweden)

    Nadine Hunt

    2013-04-01

    Full Text Available This article examines the evolution of contraband to legitimate trade in the eighteenth century Caribbean world during the War of Jenkins’ Ear and Seven Years’ War. It focuses on the informal networks of the British South Sea Company and the trade of informal actors. The article explores how British legislators shifted Jamaican and Dominican colonial economies away from contraband trade by opening free ports in 1766. The British Parliament passed the Free Port Act of Jamaica and Dominica following Danish and Dutch colonial efforts to crack down on contraband trade in the Caribbean world. This transition from contraband to legitimate trade enabled British merchants to engage in free trade by importing and exporting an assortment of commodities and enslaved people to and from Jamaica to other colonies in the Caribbean world.

  16. Design and Construction of a First Prototype Muon Tomography System with GEM Detectors for the Detection of Nuclear Contraband

    CERN Document Server

    AUTHOR|(CDS)2074269; Grasso, L; Locke, J B; Quintero, A; Mitra, D

    2009-01-01

    Current radiation portal monitors at sea ports and international borders that employ standard radiation detection techniques are not very sensitive to nuclear contraband that is well shielded to absorb emanating radiation. Muon Tomography (MT) based on the measurement of multiple scattering of atmospheric cosmic ray muons traversing cargo or vehicles that contain high-Z material is a promising passive interrogation technique for solving this problem. We report on the design and construction of compact Micro-Pattern Gas Detectors for a small prototype MT station. This station will employ 10 tracking stations based on 30cm x 30cm low-mass triple-GEM detectors with 2D readout. Due to the excellent spatial resolution of GEMs it is sufficient to use a gap of only a few cm between tracking stations. Together with the compact size of the GEM detectors this allows the GEM MT station to be an order of magnitude more compact than MT stations using traditional drift tubes. We present details of the production and assemb...

  17. Managed access technology to combat contraband cell phones in prison: Findings from a process evaluation.

    Science.gov (United States)

    Grommon, Eric

    2018-02-01

    Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Fast neutron radiography scanner for the detection of contraband in air cargo containers

    International Nuclear Information System (INIS)

    Eberhardt, J.E.; Rainey, S.; Stevens, R.J.; Sowerby, B.D.; Tickner, J.R.

    2005-01-01

    There is a growing need to rapidly scan bulk air cargo for contraband such as illicit drugs and explosives. The Commonwealth Science and Industrial Research Organisation (CSIRO) have been working with Australian Customs Service to develop a scanner capable of directly scanning airfreight containers in 1-2 minutes without unpacking. The scanner combines fast neutron and gamma-ray radiography to provide high-resolution images that include information on material composition. A full-scale prototype scanner has been successfully tested in the laboratory and a commercial-scale scanner is due to be installed at Brisbane airport in 2005

  19. Fast neutron radiography scanner for the detection of contraband in air cargo containers

    Energy Technology Data Exchange (ETDEWEB)

    Eberhardt, J.E. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Rainey, S. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Stevens, R.J. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Sowerby, B.D. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia)]. E-mail: brian.sowerby@csiro.au; Tickner, J.R. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia)

    2005-08-01

    There is a growing need to rapidly scan bulk air cargo for contraband such as illicit drugs and explosives. The Commonwealth Science and Industrial Research Organisation (CSIRO) have been working with Australian Customs Service to develop a scanner capable of directly scanning airfreight containers in 1-2 minutes without unpacking. The scanner combines fast neutron and gamma-ray radiography to provide high-resolution images that include information on material composition. A full-scale prototype scanner has been successfully tested in the laboratory and a commercial-scale scanner is due to be installed at Brisbane airport in 2005.

  20. Determination of contraband using fast neutron resonance technique

    Energy Technology Data Exchange (ETDEWEB)

    Bae, J.; Whang, J. [Kyunghee Univ., Dept. of Nuclear Engineering, Yongin-shi, Kyongki-do (Korea, Republic of)

    2004-07-01

    'Full-text:' Resonance technique with monoenergetic fast neutron beam is able to map features in bulk samples in a way that is sensitive to their elemental composition. It has a number of potential applications, for example, in mining and in the detection of contraband materials such as illicit drugs and explosives. By moving around the neutron detector experiences neutrons in the form of narrow line beam with different energies as the angle to the neutron source changes. Projection data was obtained using the Monte Carlo code MCNP4C. Therefore the fast neutrons scattered from an unknown object are used to determine the elemental content of the object and hence lead to its identification. Scattered features simulated for various test materials are analyzed using the HEPRO program system (PTB, Braunschweig) to determine the atom weight fractions for H. C. N, O and other elements in the materials. Atom weight fractions determined from scattering features are insensitive to neutron interactions in interfering materials surrounding the object. The simulations demonstrate that the fast neutron resonance technique (FNRT) provides reliable elemental characterization of bulk materials and has the necessary sensitivity to distinguish between drugs, explosives and other materials. (author)

  1. Determination of contraband using fast neutron resonance technique

    International Nuclear Information System (INIS)

    Bae, J.; Whang, J.

    2004-01-01

    'Full-text:' Resonance technique with monoenergetic fast neutron beam is able to map features in bulk samples in a way that is sensitive to their elemental composition. It has a number of potential applications, for example, in mining and in the detection of contraband materials such as illicit drugs and explosives. By moving around the neutron detector experiences neutrons in the form of narrow line beam with different energies as the angle to the neutron source changes. Projection data was obtained using the Monte Carlo code MCNP4C. Therefore the fast neutrons scattered from an unknown object are used to determine the elemental content of the object and hence lead to its identification. Scattered features simulated for various test materials are analyzed using the HEPRO program system (PTB, Braunschweig) to determine the atom weight fractions for H. C. N, O and other elements in the materials. Atom weight fractions determined from scattering features are insensitive to neutron interactions in interfering materials surrounding the object. The simulations demonstrate that the fast neutron resonance technique (FNRT) provides reliable elemental characterization of bulk materials and has the necessary sensitivity to distinguish between drugs, explosives and other materials. (author)

  2. 28 CFR 553.13 - Procedures for handling contraband.

    Science.gov (United States)

    2010-07-01

    ... purchase, or as a gift) without staff authorization may be considered nuisance contraband for which a claim of ownership is ordinarily not accepted. (iii) If the inmate establishes ownership, but the item is... evidence of ownership of the listed items. A claim of ownership may not be accepted for an item made from...

  3. A new proof-of-principle contraband detection system

    Energy Technology Data Exchange (ETDEWEB)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.; Rathke, J. [Northrop Grumman Corp., Bethpage, NY (United States). Advanced Technology and Development Center; Schmor, P.; Altman, A.; Rogers, J.; Boyd, J. [British Columbia Univ., Vancouver, BC (Canada). TRIUMF Facility; Brondo, J. [Scientific Innovations, Inc., East Hampton, NY (United States)

    1995-12-01

    A new concept for a CDS has been developed under a Phase I ARPA funded program; it uses gamma resonance absorption (GRA) to detect certain illegal drugs that may be transported in man-portable containers. A high detection probability for heroin and cocaine is possible with a device that is also searching for explosives. Elemental detection of both N and Cl is utilized, and with tomography, a 3D density image of the elements is generated. Total density image is also developed. These two together may be used with considerable confidence in determining if heroin or cocaine is present in the interrogated containers in a small quantity (1 kg). The CDS employs a high current ({ge}10 mA) DC accelerator that produces a beam of 1.75 or 1.89 MeV protons. These protons impact a target with coatings of {sup 13}C and {sup 34}S. Depending on the coating, the resultant resonant gamma rays are preferentially absorbed in either {sup 14}N or {sup 35}Cl. The resonant gammas come off the target in a conical fan at 80.7{degree} for N and 82{degree} for Cl; a common array of segmented BGO detectors is used over an arc of 53{degree} to provide input to an imaging subsystem. The tomography makes use of rotation and vertical translation of a baggage carousel holding typically 18 average sized bags for batch processing of the contents. The single proton accelerator and target can supply multiple detection stations with the appropriate gammas, a feature that may lead to very high throughput potential approaching 2000 bags/hr. Each detection station can operate somewhat independently from the others. This paper presents the overall requirements, design, operating principles, and characteristics of the CDS proof-of-principle device developed in the Phase I program.

  4. Complicity in contraband: British American Tobacco and cigarette smuggling in Asia.

    Science.gov (United States)

    Collin, J; Legresley, E; MacKenzie, R; Lawrence, S; Lee, K

    2004-12-01

    To examine the complicity of British American Tobacco (BAT) in cigarette smuggling in Asia, and to assess the centrality of illicit trade to regional corporate strategy. Analysis of previously confidential documents from BAT's Guildford depository. An iterative strategy combined searches based on geography, organisational structure, and key personnel, while corporate euphemisms for contraband were identified by triangulation. BAT documents demonstrate the strategic importance of smuggling across global, regional, national, and local levels. Particularly important in Asia, contraband enabled access to closed markets, created pressure for market opening, and was highly profitable. Documents demonstrate BAT's detailed oversight of illicit trade, seeking to reconcile the conflicting demands of control and deniability. BAT documents demonstrate that smuggling has been driven by corporate objectives, indicate national measures by which the problem can be addressed, and highlight the importance of a coordinated global response via WHO's Framework Convention on Tobacco Control.

  5. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  6. Laboratory evaluation of two x-ray baggage inspection systems

    International Nuclear Information System (INIS)

    Schellenbaum, R.L.

    1979-06-01

    The AS and E Micro-Dose X-ray Baggage Inspection System was designed for high-volume, detailed examination of packages at ultralow x-ray exposure levels. This system is used in airline terminals for the detection of weapons, bombs, and other contraband. It is also employed by security personnel in other facilities to search packages for contraband carried in and out of secured areas. The Micro-Dose system has a unique design concept which includes an Automatic Threat Alert System (ATA) and a zoom display presentation feature

  7. Atrial fibrillation in a healthy adolescent after heavy smoking of contraband cigarettes.

    Science.gov (United States)

    Ozyilmaz, Isa; Ozyilmaz, Sinem; Tosun, Oyku; Tola, Hasan Tahsin; Saygi, Murat; Ergul, Yakup

    2015-08-01

    The use of contraband cigarettes is a serious public health problem. We present a case of atrial fibrillation in a healthy adolescent suspected to be caused by smoking contraband cigarettes. A 15-year-old man was admitted to our emergency department experiencing syncope and palpitations. He was a cigarette smoker, but he had never smoked any illicit tobacco products before. He had finished a pack of counterfeit cigarettes (20 pieces) in 1.5 h. His electrocardiogram showed atrial fibrillation with a rapid ventricular response and irregular RR intervals. The patient had no history of alcohol use, surgery, palpitations, hypertension, chronic bronchitis, or any infectious diseases. His atrial fibrillation was converted to a normal sinus rhythm after the cardioversion treatment. Our patient was discharged from the pediatric cardiology service and advised to quit smoking cigarettes, strictly warning against illicit tobacco products. In conclusion, intensive smoking of counterfeit cigarettes may lead to occurrences of atrial fibrillation.

  8. Automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs

  9. An automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized

  10. Maritime security report. April 1997 [Maritime smuggling of drugs and contraband goods through Haiti adversely impacting legitimate commerce and development; Partnering : a key to growing challenges confronting maritime security

    Science.gov (United States)

    1997-04-01

    Haiti is a significant transshipment conduit for South American cocaine destined for the United States. This smuggling is facilitated by Haitis system of seaports which remain largely unmonitored. Smuggling and trafficking contraband merchandise aver...

  11. NELIS-an illicit drug detection system

    International Nuclear Information System (INIS)

    Dokhale, P.A.; Csikai, J.; Womble, P.C.; Vourvopoulos, G.

    2001-01-01

    NELIS (Neutron Elemental Inspection System) is currently being developed to inspect pallets laden with various commodities for contraband (drugs, etc.). NELIS analyzes the characteristic gamma rays from the elements in drugs such as C, O, H, Cl, N, etc. that are produced by nuclear reactions from fast and thermal neutrons (Pulsed Fast/Thermal Neutron Analysis). Hidden drugs are identified through the measurement of the elemental content of the object, and the comparison of expected and measured elemental ratios. NELIS can be coupled with conventional X-ray imaging system to optimize the inspection capabilities at ports of entry

  12. Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo

    Science.gov (United States)

    Slaughter, Dennis R [Oakland, CA; Pohl, Bertram A [Berkeley, CA; Dougan, Arden D [San Ramon, CA; Bernstein, Adam [Palo Alto, CA; Prussin, Stanley G [Kensington, CA; Norman, Eric B [Oakland, CA

    2008-04-15

    A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

  13. Using natural beta emission for detecting concealed tobacco in parcels

    International Nuclear Information System (INIS)

    Myers, Jeremy; Hussein, Esam M.A.

    2007-01-01

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40 K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials

  14. Using natural beta emission for detecting concealed tobacco in parcels

    Energy Technology Data Exchange (ETDEWEB)

    Myers, Jeremy [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada); Hussein, Esam M.A. [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada)], E-mail: hussein@unb.ca

    2007-10-15

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in {sup 40}K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.

  15. Integrated Performance Testing Workshop, Modules 6 - 11

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice; Torres, Teresa M.

    2012-10-01

    These modules cover performance testing of: Interior Detection Systems; Access Controls; Exterior Detection Systems; Video Assessment Systems; SNM / Contraband Detection Systems; Access Delay Elements

  16. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    Science.gov (United States)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.

  17. Liquid-Xe detector for contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Vartsky, D., E-mail: david.vartsky@weizmann.ac.il [Weizmann Institute of Science, Rehovot 76100 (Israel); Israelashvili, I. [Weizmann Institute of Science, Rehovot 76100 (Israel); Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Cortesi, M. [National Superconducting Cyclotron Laboratory, East Lansing 48823, MI (United States); Arazi, L.; Coimbra, A.E.; Moleri, L.; Erdal, E.; Bar, D.; Rappaport, M.; Shchemelinin, S. [Weizmann Institute of Science, Rehovot 76100 (Israel); Caspi, E.N. [Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Aviv, O. [Soreq NRC, Yavne 81800 (Israel); Breskin, A. [Weizmann Institute of Science, Rehovot 76100 (Israel)

    2016-07-11

    We describe progress made with a liquid-Xe (LXe) detector coupled to a gaseous photomultiplier (GPM), for combined imaging and spectroscopy of fast neutrons and gamma-rays in the MeV range. The purpose of this detector is to enable the detection of hidden explosives and fissile materials in cargo and containers. The expected position resolution is about 2 m and 3.5 mm for fast neutrons and gamma-rays, respectively. Experimental results obtained using an {sup 241}Am source yielded energy and time resolutions of 11% and 1.2 ns RMS, respectively. Initial results obtained with the position-sensitive GPM are presented.

  18. Technologies for detection of nuclear materials

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1996-01-01

    Detection of smuggled nuclear materials at transit points requires monitoring unknown samples in large closed packages. This review contends that high-confidence nuclear-material detection requires induced fission as the primary mechanism, with passive radiation screening in a complementary role. With the right equipment, even small quantities of nuclear materials are detectable with a high probability at transit points. The equipment could also be linked synergistically with detectors of other contrabond. For screening postal mail and packages, passive monitors are probably more cost-effective. When a suspicious item is detected, a single active probe could then be used. Until active systems become mass produced, this two-stage screening/interrogation role for active/passive equipment is more economic for cargo at border crossings. For widespread monitoring of nuclear smuggling, it will probably be necessary to develop a system for simultaneously detecting most categories of contraband, including explosives and illicit drugs. With control of nuclear materials at known storage sites being the first line of defense, detection capabilities at international borders could establish a viable second line of defense against smuggling

  19. Lessons Learned In Developing The VACIS Products

    International Nuclear Information System (INIS)

    Orphan, Victor J.

    2011-01-01

    SAIC's development of VACIS provides useful 'lessons learned' in bridging the gap from an idea to a security or contraband detection product. From a gamma densitometer idea for solving a specific Customs Service (CS) requirement (detection of drugs in near-empty tanker trucks) in mid-1990's, SAIC developed a broad line of vehicle and cargo inspections systems (over 500 systems deployed to date) based on a gamma-ray radiographic imaging technique. This paper analyzes the reasons for the successful development of VACIS and attempts to identify ''lessons learned'' useful for future security and contraband detection product developments.

  20. Sequential Detection of Fission Processes for Harbor Defense

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Walston, S E; Chambers, D H

    2015-02-12

    With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their γ-ray emissions has been attacked vigorously with some interesting and feasible results; however, the fission process of SNM has not received as much attention due to its inherent complexity and required predictive nature. In this paper, on-line, sequential Bayesian detection and estimation (parameter) techniques to rapidly and reliably detect unknown fissioning sources with high statistical confidence are developed.

  1. Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908

    OpenAIRE

    Alma N. Bamero

    2006-01-01

    This research entitled “Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908” presents a discussion of the opium trade in Asia, the commercial networks it created, the political ties it strengthened, and the social relations itfostered. It also aims to reconstruct an aspect of Philippine social history in the nineteenth century through the use of archival materials that bear witness to the distribution and exploit...

  2. Radiation Detection and Dual-Energy X-Ray Imaging for Port Security

    Energy Technology Data Exchange (ETDEWEB)

    Pashby, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Glenn, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Divin, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Martz, H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-08-09

    Millions of cargo containers are transported across the United States border annually and are inspected for illicit radioactive material and contraband using a combination of passive radiation portal monitors (RPM) and high energy X-ray non-intrusive inspection (NII) systems. As detection performance is expected to vary with the material composition of cargo, characterizing the types of material present in cargo is important to national security. This work analyzes the passive radiation and dual energy radiography signatures from on RPM and two NII system, respectively. First, the cargos were analyzed to determine their ability to attenuate emissions from an embedded radioactive source. Secondly, dual-energy X-ray discrimination was used to determine the material composition and density of the cargos.

  3. Detection of explosives by neutron scattering

    International Nuclear Information System (INIS)

    Brooks, F.D.; Buffler, A.; Allie, M.S.; Nchodu, M.R.; Bharuth-Ram, K.

    1998-01-01

    For non-intrusive detection of hidden explosives or other contraband such as narcotics a fast neutron scattering analysis (FNSA) technique is proposed. An experimental arrangement uses a collimated, pulsed beam of neutrons directed at the sample. Scattered neutrons are detected by liquid scintillation counters at different scattering angles. A scattering signature is derived from two-parameter data, counts vs pulse height and time-of-flight measured for each element (H, C, N or O) at each of two scattering angles and two neutron energies. The elemental signatures are very distinctive and constitute a good response matrix for unfolding elemental components from the scattering signatures measured for different compounds

  4. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  5. Measurements and standards for bulk-explosives detection

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, Larry, E-mail: larry.hudson@nist.gov [National Institute of Standards and Technology, 100 Bureau Drive, Stop 8460, Gaithersburg, MD 20899 (United States); Bateman, Fred; Bergstrom, Paul; Cerra, Frank; Glover, Jack; Minniti, Ronaldo; Seltzer, Stephen; Tosh, Ronald [National Institute of Standards and Technology, 100 Bureau Drive, Stop 8460, Gaithersburg, MD 20899 (United States)

    2012-07-15

    Recent years have seen a dramatic expansion in the application of radiation and isotopes to security screening. This has been driven primarily by increased incidents involving improvised explosive devices as well as their ease of assembly and leveraged disruption of transportation and commerce. With global expenditures for security-screening systems in the hundreds of billions of dollars, there is a pressing need to develop, apply, and harmonize standards for x-ray and gamma-ray screening systems used to detect explosives and other contraband. The National Institute of Standards and Technology has been facilitating the development of standard measurement tools that can be used to gauge the technical performance (imaging quality) and radiation safety of systems used to screen luggage, persons, vehicles, cargo, and left-behind objects. After a review of this new suite of national standard test methods, test objects, and radiation-measurement protocols, we highlight some of the technical trends that are enhancing the revision of baseline standards. Finally we advocate a more intentional use of technical-performance standards by security stakeholders and outline the advantages this would accrue. - Highlights: Black-Right-Pointing-Pointer This work responds to the need for standards for x-ray screening systems used to detect explosives. Black-Right-Pointing-Pointer Described are new measurement tools to gage the performance and radiation safety of such systems. Black-Right-Pointing-Pointer A more intentional use of technical-performance standards by security stakeholders is argued.

  6. Measurements and standards for bulk-explosives detection

    International Nuclear Information System (INIS)

    Hudson, Larry; Bateman, Fred; Bergstrom, Paul; Cerra, Frank; Glover, Jack; Minniti, Ronaldo; Seltzer, Stephen; Tosh, Ronald

    2012-01-01

    Recent years have seen a dramatic expansion in the application of radiation and isotopes to security screening. This has been driven primarily by increased incidents involving improvised explosive devices as well as their ease of assembly and leveraged disruption of transportation and commerce. With global expenditures for security-screening systems in the hundreds of billions of dollars, there is a pressing need to develop, apply, and harmonize standards for x-ray and gamma-ray screening systems used to detect explosives and other contraband. The National Institute of Standards and Technology has been facilitating the development of standard measurement tools that can be used to gauge the technical performance (imaging quality) and radiation safety of systems used to screen luggage, persons, vehicles, cargo, and left-behind objects. After a review of this new suite of national standard test methods, test objects, and radiation-measurement protocols, we highlight some of the technical trends that are enhancing the revision of baseline standards. Finally we advocate a more intentional use of technical-performance standards by security stakeholders and outline the advantages this would accrue. - Highlights: ► This work responds to the need for standards for x-ray screening systems used to detect explosives. ► Described are new measurement tools to gage the performance and radiation safety of such systems. ► A more intentional use of technical-performance standards by security stakeholders is argued.

  7. APSTNG: Neutron interrogation for detection of nuclear and CW weapons, explosives, and drugs

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.; De Volpi, A.; Peters, C.W.

    1992-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed- portal requirements for nondestructive verification of sealed munitions and detection of contraband explosives and drugs. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron inelastic scattering and fission reactions identify nuclides associated with all major chemicals in chemical warfare agents, explosives, and drugs, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from determined from detection times of the gamma-rays and alpha-particles yield a separate tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system; a collimator is not required since scattered neutrons are removed by ''electronic collimation'' (detected neutrons not having the proper flight time to be uncollided are discarded). The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs

  8. APSTNG: Neutron interrogation for detection of explosives and drugs and nuclear and CW materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Peters, C.W.

    1993-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutron generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators

  9. Nuclear resonance absorption (NRA): method and application to detection of contraband in a baggage, cargo and vehicles

    International Nuclear Information System (INIS)

    Goldenberg, M.B.; Vartsky, D.; Engler, G.

    1996-01-01

    Nuclear Resonance Absorption (NRA) has played a prominent role in nuclear spectroscopy for almost 5 decades, but found only few and marginal applications outside the laboratory before 1985. In that year the situation changed markedly when scientists from this laboratory proposed to the Federal Aviation Administration (FAA) in the U.S. to study its suitability for detecting explosives in passenger baggage via nitrogen-specific radiographic imaging (explosives, as a category, have inordinately high nitrogen densities). Following a basic feasibility study and the first laboratory demonstration of explosives detection in 1989, this project has attained the stage of a pre-industrial prototype that exhibited excellent performance characteristics in a 1993 blind test conducted by the FAA. In terms of NRA operational system concept, data taking methodology, development of dedicated detectors and image analysis algorithms, the Soreq group has made a major, if not exclusive, contribution over the years. (authors)

  10. Realistic modeling of radiation transmission inspection systems

    International Nuclear Information System (INIS)

    Sale, K.E.

    1993-01-01

    We have applied Monte Carlo particle transport methods to assess a proposed neutron transmission inspection system for checked luggage. The geometry of the system and the time, energy and angle dependence of the source have been modeled in detail. A pulsed deuteron beam incident on a thick Be target generates a neutron pulse with a very broad energy spectrum which is detected after passage through the luggage item by a plastic scintillator detector operating in current mode (as opposed to pulse counting mode). The neutron transmission as a function of time information is used to infer the densities of hydrogen, carbon, oxygen and nitrogen in the volume sampled. The measured elemental densities can be compared to signatures for explosives or other contraband. By using such computational modeling it is possible to optimize many aspects of the design of an inspection system without costly and time consuming prototyping experiments or to determine that a proposed scheme will not work. The methods applied here can be used to evaluate neutron or photon schemes based on transmission, scattering or reaction techniques

  11. New nuclear scanning and surveillance systems for global security and safeguards

    International Nuclear Information System (INIS)

    Kemeny, L. G.

    2003-01-01

    This paper discusses new innovative techniques for both cargo and personnel scanning and plant and infrastructure surveillance and protection. It contains Intellectual Property and some of the systems described are covered by Patents. For example, a typical container inspection system is based on Pulsed Fast Neutron Analysis operating on the following principles: 1. An accelerator produced pulses of fast neutrons, which interact with the elemental composition of the cargo under inspection. In a manner similar to radar scanning the timing and positioning of the pulsed neutrons indicates where the interactions occurs. These interactions initiate the emission of gamma radiation which characterises the elemental composition and which is collected by sensor arrays. 2. The gamma ray signals are analysed in a high speed processor which identifies the presence and location of the chemical element combinations in all types of contraband. These may be drugs, explosives or nuclear material. 3. High resolution images display the location and shape of all contraband in the cargo under inspection. An x-ray like image of the cargo can also be provided. Because the scanning system software already contains standard gamma ray material signatures, the need for time consuming and unreliable manual interpretation of complicated images obtained in x-ray scanning systems is completely eliminated

  12. 3D X-Ray Luggage-Screening System

    Science.gov (United States)

    Fernandez, Kenneth

    2006-01-01

    A three-dimensional (3D) x-ray luggage- screening system has been proposed to reduce the fatigue experienced by human inspectors and increase their ability to detect weapons and other contraband. The system and variants thereof could supplant thousands of xray scanners now in use at hundreds of airports in the United States and other countries. The device would be applicable to any security checkpoint application where current two-dimensional scanners are in use. A conventional x-ray luggage scanner generates a single two-dimensional (2D) image that conveys no depth information. Therefore, a human inspector must scrutinize the image in an effort to understand ambiguous-appearing objects as they pass by at high speed on a conveyor belt. Such a high level of concentration can induce fatigue, causing the inspector to reduce concentration and vigilance. In addition, because of the lack of depth information, contraband objects could be made more difficult to detect by positioning them near other objects so as to create x-ray images that confuse inspectors. The proposed system would make it unnecessary for a human inspector to interpret 2D images, which show objects at different depths as superimposed. Instead, the system would take advantage of the natural human ability to infer 3D information from stereographic or stereoscopic images. The inspector would be able to perceive two objects at different depths, in a more nearly natural manner, as distinct 3D objects lying at different depths. Hence, the inspector could recognize objects with greater accuracy and less effort. The major components of the proposed system would be similar to those of x-ray luggage scanners now in use. As in a conventional x-ray scanner, there would be an x-ray source. Unlike in a conventional scanner, there would be two x-ray image sensors, denoted the left and right sensors, located at positions along the conveyor that are upstream and downstream, respectively (see figure). X-ray illumination

  13. Ion Mobility Spectrometer / Mass Spectrometer (IMS-MS)

    Energy Technology Data Exchange (ETDEWEB)

    Hunka, Deborah E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Austin, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2005-10-01

    The use of Ion Mobility Spectrometry (IMS)in the Detection of Contraband Sandia researchers use ion mobility spectrometers for trace chemical detection and analysis in a variety of projects and applications. Products developed in recent years based on IMS-technology include explosives detection personnel portals, the Material Area Access (MAA) checkpoint of the future, an explosives detection vehicle portal, hand-held detection systems such as the Hound and Hound II (all 6400), micro-IMS sensors (1700), ordnance detection (2500), and Fourier Transform IMS technology (8700). The emphasis to date has been on explosives detection, but the detection of chemical agents has also been pursued (8100 and 6400).

  14. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  15. Autonomy and manual operation in a small robotic system for under-vehicle inspections at security checkpoints

    Science.gov (United States)

    Smuda, William; Muench, Paul L.; Gerhart, Grant R.; Moore, Kevin L.

    2002-07-01

    Unmanned ground vehicle (UGV) technology can be used in a number of ways to assist in counter-terrorism activities. In addition to the conventional uses of tele-operated robots for unexploded ordinance handling and disposal, water cannons and other crowd control devices, robots can also be employed for a host of terrorism deterrence and detection applications. In previous research USU developed a completely autonomous prototype robot for performing under- vehicle inspections in parking areas (ODIS). Testing of this prototype and discussions with the user community indicated that neither the technology nor the users are ready for complete autonomy. In this paper we present a robotic system based on ODIS that balances the users' desire/need for tele- operation with a limited level of autonomy that enhances the performance of the robot. The system can be used by both civilian law enforcement and military police to replace the traditional mirror on a stick system of looking under cars for bombs and contraband.

  16. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  17. A Muon Tomography Station with GEM Detectors for Nuclear Threat Detection

    Science.gov (United States)

    Staib, Michael; Gnanvo, Kondo; Grasso, Leonard; Hohlmann, Marcus; Locke, Judson; Costa, Filippo; Martoiu, Sorin; Muller, Hans

    2011-10-01

    Muon tomography for homeland security aims at detecting well-shielded nuclear contraband in cargo and imaging it in 3D. The technique exploits multiple scattering of atmospheric cosmic ray muons, which is stronger in dense, high-Z nuclear materials, e.g. enriched uranium, than in low-Z and medium-Z shielding materials. We have constructed and operated a compact Muon Tomography Station (MTS) that tracks muons with six to ten 30 cm x 30 cm Triple Gas Electron Multiplier (GEM) detectors placed on the sides of a 27-liter cubic imaging volume. The 2D strip readouts of the GEMs achieve a spatial resolution of ˜130 μm in both dimensions and the station is operated at a muon trigger rate of ˜20 Hz. The 1,536 strips per GEM detector are read out with the first medium-size implementation of the Scalable Readout System (SRS) developed specifically for Micro-Pattern Gas Detectors by the RD51 collaboration at CERN. We discuss the performance of this MTS prototype and present experimental results on tomographic imaging of high-Z objects with and without shielding.

  18. A Bayesian sequential processor approach to spectroscopic portal system decisions

    Energy Technology Data Exchange (ETDEWEB)

    Sale, K; Candy, J; Breitfeller, E; Guidry, B; Manatt, D; Gosnell, T; Chambers, D

    2007-07-31

    The development of faster more reliable techniques to detect radioactive contraband in a portal type scenario is an extremely important problem especially in this era of constant terrorist threats. Towards this goal the development of a model-based, Bayesian sequential data processor for the detection problem is discussed. In the sequential processor each datum (detector energy deposit and pulse arrival time) is used to update the posterior probability distribution over the space of model parameters. The nature of the sequential processor approach is that a detection is produced as soon as it is statistically justified by the data rather than waiting for a fixed counting interval before any analysis is performed. In this paper the Bayesian model-based approach, physics and signal processing models and decision functions are discussed along with the first results of our research.

  19. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  20. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  1. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  2. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  3. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  4. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  5. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  6. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  7. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  8. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  9. EVALUATING THE SENSITIVITY OF RADIONUCLIDE DETECTORS FOR CONDUCTING A MARITIME ON-BOARD SEARCH USING MONTE CARLO SIMULATION IMPLEMENTED IN AVERT(regsign)

    International Nuclear Information System (INIS)

    Harris, S.; Dave Dunn, D.

    2009-01-01

    The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation implemented in AVERT(reg s ign). AVERT(reg s ign), short for the Automated Vulnerability Evaluation for Risk of Terrorism, is personal computer based vulnerability assessment software developed by the ARES Corporation. The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation. The detectors, a RadPack and also a Personal Radiation Detector (PRD), were chosen from the class of Human Portable Radiation Detection Systems (HPRDS). Human Portable Radiation Detection Systems (HPRDS) serve multiple purposes. In the maritime environment, there is a need to detect, localize, characterize, and identify radiological/nuclear (RN) material or weapons. The RadPack is a commercially available broad-area search device used for gamma and also for neutron detection. The PRD is chiefly used as a personal radiation protection device. It is also used to detect contraband radionuclides and to localize radionuclide sources. Neither device has the capacity to characterize or identify radionuclides. The principal aim of this study was to investigate the sensitivity of both the RadPack and the PRD while being used under controlled conditions in a simulated maritime environment for detecting hidden RN contraband. The detection distance varies by the source strength and the shielding present. The characterization parameters of the source are not indicated in this report so the results summarized are relative. The Monte Carlo simulation results indicate the probability of detection of the RN source at certain distances from the detector which is a function of transverse speed and instrument sensitivity for the specified RN source

  10. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  11. Technologies for security, military police and professional policing organizations, the Department of Energy perspective

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    There are many technologies emerging from this decade that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: (1) scannerless laser radar; (2) next generation security systems; (3) response force video information helmet system; (4) access delay technologies; (5) rapidly deployable intrusion detection systems; and (6) cost risk benefit analysis

  12. Chemical Detection Based on Adsorption-Induced and Photo-Induced Stresses in MEMS Devices

    Energy Technology Data Exchange (ETDEWEB)

    Datskos, P.G.

    1999-04-05

    Recently there has been an increasing demand to perform real-time in-situ chemical detection of hazardous materials, contraband chemicals, and explosive chemicals. Currently, real-time chemical detection requires rather large analytical instrumentation that are expensive and complicated to use. The advent of inexpensive mass produced MEMS (micro-electromechanical systems) devices opened-up new possibilities for chemical detection. For example, microcantilevers were found to respond to chemical stimuli by undergoing changes in their bending and resonance frequency even when a small number of molecules adsorb on their surface. In our present studies, we extended this concept by studying changes in both the adsorption-induced stress and photo-induced stress as target chemicals adsorb on the surface of microcantilevers. For example, microcantilevers that have adsorbed molecules will undergo photo-induced bending that depends on the number of absorbed molecules on the surface. However, microcantilevers that have undergone photo-induced bending will adsorb molecules on their surfaces in a distinctly different way. Depending on the photon wavelength and microcantilever material, the microcantilever can be made to bend by expanding or contracting the irradiated surface. This is important in cases where the photo-induced stresses can be used to counter any adsorption-induced stresses and increase the dynamic range. Coating the surface of the microstructure with a different material can provide chemical specificity for the target chemicals. However, by selecting appropriate photon wavelengths we can change the chemical selectivity due to the introduction of new surface states in the MEMS device. We will present and discuss our results on the use of adsorption-induced and photo-induced bending of microcantilevers for chemical detection.

  13. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  14. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  15. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  16. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  17. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  18. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  19. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  20. Director of Innovation. Volume 3, November 2009

    Science.gov (United States)

    2009-11-01

    evaluated at Crimson Vi- per 2009 included the Portable Acoustic Contraband Detector (PACD) and the Fluxgate Magnetometer , two projects from SPAWAR...concealed within the containers. The Fluxgate Magnetometer is a hockey puck-sized sensor head that can detect vehicles and weapons by measuring

  1. 29 CFR 1910.164 - Fire detection systems.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... detection systems. (a) Scope and application. This section applies to all automatic fire detection systems... detection systems and components to normal operating condition as promptly as possible after each test or...

  2. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  3. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  4. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  5. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  6. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  7. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  8. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  9. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  10. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  11. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  12. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  13. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  14. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  15. Detection of H5N1 high-pathogenicity avian influenza virus in meat and tracheal samples from experimentally infected chickens.

    Science.gov (United States)

    Das, Amaresh; Spackman, Erica; Thomas, Colleen; Swayne, David E; Suarez, David L

    2008-03-01

    The Asian H5N1 highly pathogenic avian influenza (HPAI) virus causes a systemic disease with high mortality of poultry and is potentially zoonotic. In both chickens and ducks, the virus has been demonstrated to replicate in both cardiac and skeletal muscle cells. Experimentally, H5N1 HPAI virus has been transmitted to chickens through the consumption of raw infected meat. In this study, we investigated virus replication in cardiac and skeletal muscle and in the trachea of chickens after experimental intranasal inoculation with the H5N1 HPAI virus. The virus was detected in tissues by real-time reverse transcription-polymerase chain reaction (RRT-PCR) and virus isolation, and in the trachea by RRT-PCR and a commercial avian influenza (AI) viral antigen detection test. A modified RNA extraction protocol was developed for rapid detection of the virus in tissues by RRT-PCR. The H5N1 HPAI virus was sporadically detected in meat and the tracheas of infected birds without any clinical sign of disease as early as 6 hr postinfection (PI), and was detected in all samples tested at 24 hr PI and later. No differences in sensitivity were seen between virus isolation and RRT-PCR in meat samples. The AI viral antigen detection test on tracheal swabs was a useful method for identifying infected chickens when they were sick or dead, but was less sensitive in detecting infected birds when they were preclinical. This study provides data indicating that preslaughter tracheal swab testing can identify birds infected with HPAI among the daily mortality and prevent infected flocks from being sent to processing plants. In addition, the modified RNA extraction and RRT-PCR test on meat samples provide a rapid and sensitive method of identifying HPAI virus in illegal contraband or domestic meat samples.

  16. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  17. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  18. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  19. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  20. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  1. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  2. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  3. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  4. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  5. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  6. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    Science.gov (United States)

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  7. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  8. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  9. Road Anomalies Detection System Evaluation.

    Science.gov (United States)

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  10. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  11. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  12. Mercury and Lead Levels in Common Soaps from Local Markets in Mashhad, Iran

    Directory of Open Access Journals (Sweden)

    Anahita Alizadeh

    2017-06-01

    Full Text Available Background: The potential toxicity of human exposure was investigated to heavy metals from diverse sources but few or none was on Iranian soaps. Hence, we aimed to determine the presence of lead and mercury in selected soaps commonly used in Mashhad, northeastern Iran. Methods: Different common brands of cosmetic, hygiene and contraband soaps were purchased from retail market of Mashhad in 2016. Levels of these metals were determined using atomic absorption spectroscopy technique. Results: All samples had the mercury and lead levels but did not exceed the maximum acceptable level (1 µg/g for mercury and 20 µg/g for lead recommended by FDA. The mean levels of mercury were 0.02, 0.08 and 0.23 µg/g, respectively in cosmetic, hygiene and contraband soaps. These levels for lead were 0.10, 0.19 and 0.13 µg/g. The highest mercury and lead levels were detected in Halazoon contraband and P hygiene brands, respectively. Conclusion: The content of mercury and lead in common soaps is currently not a concern in this city. However, as human body may be exposed to several toxic metals from different care products simultaneously, cumulative toxic effects of these metals must be considered important.

  13. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  14. A universal DNA-based protein detection system.

    Science.gov (United States)

    Tran, Thua N N; Cui, Jinhui; Hartman, Mark R; Peng, Songming; Funabashi, Hisakage; Duan, Faping; Yang, Dayong; March, John C; Lis, John T; Cui, Haixin; Luo, Dan

    2013-09-25

    Protein immune detection requires secondary antibodies which must be carefully selected in order to avoid interspecies cross-reactivity, and is therefore restricted by the limited availability of primary/secondary antibody pairs. Here we present a versatile DNA-based protein detection system using a universal adapter to interface between IgG antibodies and DNA-modified reporter molecules. As a demonstration of this capability, we successfully used DNA nano-barcodes, quantum dots, and horseradish peroxidase enzyme to detect multiple proteins using our DNA-based labeling system. Our system not only eliminates secondary antibodies but also serves as a novel method platform for protein detection with modularity, high capacity, and multiplexed capability.

  15. The quench detection system of Wendelstein 7-X

    International Nuclear Information System (INIS)

    Birus, Dietrich; Schneider, Matthias; Rummel, Thomas; Fricke, Marko

    2011-01-01

    The Quench Detection System of Wendelstein W7-X has been developed, pretested and manufactured during the last four years. This safety subsystem of the superconducting magnet power supply will guarantee the safe operating of the whole magnet system. The main targets of the Quench Detection System are the complete data acquisition of all the voltages along the superconducting components, i.e. non planar and planar coils, and bus bars, the evaluation of this data and the control of the magnet system safety discharges. The Quench Detection System is generating control commands for the magnet power supply control system and the electrical status of the superconducting components of W7-X. The Quench Detection System consists of nearly 580 Quench Detection Units (QDU) located in 10 QD-subsystems, 8 racks in each, one host system and two special interfaces for evaluation of the quench control commands and the failure signals. The operating software suite of the QD System allows the configuration, the operation and the maintenance of the whole system.

  16. Industrial applications of neutron physics methods

    International Nuclear Information System (INIS)

    Gozani, T.

    1994-01-01

    Three areas where nuclear based techniques have significant are briefly described. These are: Nuclear material control and non-proliferation, on-line elemental analysis of coal and minerals, and non- detection of explosives and other contraband. The nuclear physics and the role of reactor physics methods are highlighted. (author). 5 refs., 10 figs., 5 tabs

  17. 46 CFR 154.1350 - Flammable gas detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a fixed flammable gas detection system that has sampling points in: (1) Each cargo pump room; (2) Each cargo...

  18. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  19. Fully automatic AI-based leak detection system

    Energy Technology Data Exchange (ETDEWEB)

    Tylman, Wojciech; Kolczynski, Jakub [Dept. of Microelectronics and Computer Science, Technical University of Lodz in Poland, ul. Wolczanska 221/223, Lodz (Poland); Anders, George J. [Kinectrics Inc., 800 Kipling Ave., Toronto, Ontario M8Z 6C4 (Canada)

    2010-09-15

    This paper presents a fully automatic system intended to detect leaks of dielectric fluid in underground high-pressure, fluid-filled (HPFF) cables. The system combines a number of artificial intelligence (AI) and data processing techniques to achieve high detection capabilities for various rates of leaks, including leaks as small as 15 l per hour. The system achieves this level of precision mainly thanks to a novel auto-tuning procedure, enabling learning of the Bayesian network - the decision-making component of the system - using simulated leaks of various rates. Significant new developments extending the capabilities of the original leak detection system described in and form the basis of this paper. Tests conducted on the real-life HPFF cable system in New York City are also discussed. (author)

  20. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  1. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  2. Development of the environmental neutron detection system

    International Nuclear Information System (INIS)

    Kume, Kyo

    2002-03-01

    Environmental neutron detection system was proposed and developed. The main goal of this system was set to detect fast and thermal neutrons with the identical detectors setup without degraders. This system consists of a 10 B doped liquid scintillator for n detection and CsI scintillators for simultaneous γ emission from 10 B doped in the liquid scintillator after the n capture reaction. The first setup was optimized for the thermal n detection, while the second setup was for the fast n detection. It was shown that the thermal n flux was obtained in the first setup by using the method of the γ coincidence method with the help of the Monte Carlo calculation. The second setup was designed to improve the detection efficiency for the fast n, and was shown qualitatively that both the pulse shape discrimination and the coincidence methods are efficient. There will be more improvements, particularly for the quantitative discussion. (author)

  3. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  4. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  5. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  6. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  7. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  8. 14 MeV fast neutron activation analysis in the year 2000

    International Nuclear Information System (INIS)

    James, W.D.

    2000-01-01

    In recent years there is a decided upswing in interest in the application of fast neutron activation analysis methodologies to certain problems, i.e., detection of contraband substances, use of steady-state and pulsing instruments of body compositions etc. The value of a method which can characterize major and minor elements in large samples is again recognized. (author)

  9. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  10. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  11. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  12. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  13. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a... space. (b) The fire detection system must be designed to minimize false alarms. ...

  14. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  15. Detection device for off-gas system accidents

    International Nuclear Information System (INIS)

    Kubota, Ryuji; Tsuruoka, Ryozo; Yamanari, Shozo.

    1984-01-01

    Purpose: To rapidly isolate the off-gas system by detecting the off-gas system failure accident in a short time. Constitution: Radiation monitors are disposed to ducts connecting an exhaust gas area and an air conditioning system as a portion of a turbine building. The ducts are disposed independently such that they ventilate only the atmosphere in the exhaust gas area and do not mix the atmosphere in the turbine building. Since radioactivity issued upon off-gas accidents to the exhaust gas area is sucked to the duct, it can be detected by radiation detection monitors in a short time after the accident. Further, since the operator judges it as the off-gas system accident, the off-gas system can be isolated in a short time after the accident. (Moriyama, K.)

  16. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  17. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  18. 46 CFR 28.830 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection system. 28.830 Section 28.830 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.830 Fire detection system. (a) Each accommodation space...

  19. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  20. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  1. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  2. 46 CFR 28.325 - Fire detection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection systems. 28.325 Section 28.325 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING... Operate With More Than 16 Individuals on Board § 28.325 Fire detection systems. (a) Each accommodation...

  3. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  4. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  5. Remote Voice Detection System

    National Research Council Canada - National Science Library

    Blackmon, Fletcher A

    2007-01-01

    A device and system to remotely detect vocalizations of speech. The skin located on the throat region of a speaking person or a reflective layer on the skin on the throat region vibrates in response to vocalizations of speech by the person...

  6. Design of detection module for smart ligthting system

    OpenAIRE

    Matveev, I. G.; Goponenko, A. S.

    2015-01-01

    The paper considers a smart lighting system based on Beaglebone microcomputer. The analysis of existing motion and presence sensors was carried out and then used as a basis for design of a detection system. The detection system and the corresponding connection solution for a smart lighting system were developed. Using the designed smart lighting system, experimental studies were carried out.

  7. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes; Harrou, Fouzi; Sun, Ying; Kara, Kamel; Chouder, Aissa; Silvestre, Santiago

    2017-01-01

    and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model

  8. 49 CFR 1544.213 - Use of explosives detection systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a... explosives detection system approved by TSA to screen checked baggage on international flights. (b) Signs and...

  9. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  10. System tuning and measurement error detection testing

    International Nuclear Information System (INIS)

    Krejci, Petr; Machek, Jindrich

    2008-09-01

    The project includes the use of the PEANO (Process Evaluation and Analysis by Neural Operators) system to verify the monitoring of the status of dependent measurements with a view to early measurement fault detection and estimation of selected signal levels. At the present stage, the system's capabilities of detecting measurement errors was assessed and the quality of the estimates was evaluated for various system configurations and the formation of empiric models, and rules were sought for system training at chosen process data recording parameters and operating modes. The aim was to find a suitable system configuration and to document the quality of the tuned system on artificial failures

  11. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  12. Device for detecting failure of reactor system

    International Nuclear Information System (INIS)

    Miyazawa, Tatsuo.

    1979-01-01

    Purpose: To make it possible to rapidly detect any failure in a reactor system prior to the leakage of coolants. Constitution: The dose of beta line is computed from the difference between the power of a detector for reacting with both beta and gamma lines and a detector for reacting only with gamma line to detect the failure of a reactor system, thereby to raise the detection speed and improve the detection accuracy. More specifically, a radiation detector A detects gamma and beta lines by means of piezoelectric elements. A radiation detector B caused the opening of the detector A to be covered with a metal, and detects only gamma line. The detected values of detectors A and B are amplified by an amplifier and applied to a rate meter and a counter, the values being converted into DC and introduced into a comparison circuit, where the outputs of the rate meter are compared with each other. When the difference is more than the predetermined range, it is supplied as output to an alarm circuit where an alarm signal is produced. (Nakamura, S.)

  13. Integrating physically based simulators with Event Detection Systems: Multi-site detection approach.

    Science.gov (United States)

    Housh, Mashor; Ohar, Ziv

    2017-03-01

    The Fault Detection (FD) Problem in control theory concerns of monitoring a system to identify when a fault has occurred. Two approaches can be distinguished for the FD: Signal processing based FD and Model-based FD. The former concerns of developing algorithms to directly infer faults from sensors' readings, while the latter uses a simulation model of the real-system to analyze the discrepancy between sensors' readings and expected values from the simulation model. Most contamination Event Detection Systems (EDSs) for water distribution systems have followed the signal processing based FD, which relies on analyzing the signals from monitoring stations independently of each other, rather than evaluating all stations simultaneously within an integrated network. In this study, we show that a model-based EDS which utilizes a physically based water quality and hydraulics simulation models, can outperform the signal processing based EDS. We also show that the model-based EDS can facilitate the development of a Multi-Site EDS (MSEDS), which analyzes the data from all the monitoring stations simultaneously within an integrated network. The advantage of the joint analysis in the MSEDS is expressed by increased detection accuracy (higher true positive alarms and fewer false alarms) and shorter detection time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  15. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  16. Magnetic and/or electric label assisted detection system and method

    NARCIS (Netherlands)

    2008-01-01

    A detection system is described for detecting analytes in a fluid sample. The detection system comprises a transporting means for transporting magnetic and/or elec. labels after interaction between the sample fluid and the reagents towards a detection receptacle. The detection receptacle is

  17. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  18. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  19. Multisignal detecting system of pile integrity testing

    Science.gov (United States)

    Liu, Zuting; Luo, Ying; Yu, Shihai

    2002-05-01

    The low strain reflection wave method plays a principal rule in the integrating detection of base piles. However, there are some deficiencies with this method. For example, there is a blind area of detection on top of the tested pile; it is difficult to recognize the defects at deep-seated parts of the pile; there is still the planar of 3D domino effect, etc. It is very difficult to solve these problems only with the single-transducer pile integrity testing system. A new multi-signal piles integrity testing system is proposed in this paper, which is able to impulse and collect signals on multiple points on top of the pile. By using the multiple superposition data processing method, the detecting system can effectively restrain the interference and elevate the precision and SNR of pile integrity testing. The system can also be applied to the evaluation of engineering structure health.

  20. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  1. 46 CFR 161.002-15 - Sample extraction smoke detection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Sample extraction smoke detection systems. 161.002-15..., CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL ELECTRICAL EQUIPMENT Fire-Protective Systems § 161.002-15 Sample extraction smoke detection systems. The smoke detecting system must consist of a means for...

  2. Farmers' preferences for automatic lameness-detection systems in dairy cattle.

    Science.gov (United States)

    Van De Gucht, T; Saeys, W; Van Nuffel, A; Pluym, L; Piccart, K; Lauwers, L; Vangeyte, J; Van Weyenberg, S

    2017-07-01

    As lameness is a major health problem in dairy herds, a lot of attention goes to the development of automated lameness-detection systems. Few systems have made it to the market, as most are currently still in development. To get these systems ready for practice, developers need to define which system characteristics are important for the farmers as end users. In this study, farmers' preferences for the different characteristics of proposed lameness-detection systems were investigated. In addition, the influence of sociodemographic and farm characteristics on farmers' preferences was assessed. The third aim was to find out if preferences change after the farmer receives extra information on lameness and its consequences. Therefore, a discrete choice experiment was designed with 3 alternative lameness-detection systems: a system attached to the cow, a walkover system, and a camera system. Each system was defined by 4 characteristics: the percentage missed lame cows, the percentage false alarms, the system cost, and the ability to indicate which leg is lame. The choice experiment was embedded in an online survey. After answering general questions and choosing their preferred option in 4 choice sets, extra information on lameness was provided. Consecutively, farmers were shown a second block of 4 choice sets. Results from 135 responses showed that farmers' preferences were influenced by the 4 system characteristics. The importance a farmer attaches to lameness, the interval between calving and first insemination, and the presence of an estrus-detection system contributed significantly to the value a farmer attaches to lameness-detection systems. Farmers who already use an estrus detection system were more willing to use automatic detection systems instead of visual lameness detection. Similarly, farmers who achieve shorter intervals between calving and first insemination and farmers who find lameness highly important had a higher tendency to choose for automatic

  3. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  4. System and Method for Multi-Wavelength Optical Signal Detection

    Science.gov (United States)

    McGlone, Thomas D. (Inventor)

    2017-01-01

    The system and method for multi-wavelength optical signal detection enables the detection of optical signal levels significantly below those processed at the discrete circuit level by the use of mixed-signal processing methods implemented with integrated circuit technologies. The present invention is configured to detect and process small signals, which enables the reduction of the optical power required to stimulate detection networks, and lowers the required laser power to make specific measurements. The present invention provides an adaptation of active pixel networks combined with mixed-signal processing methods to provide an integer representation of the received signal as an output. The present invention also provides multi-wavelength laser detection circuits for use in various systems, such as a differential absorption light detection and ranging system.

  5. Distributed Fault Detection for a Class of Nonlinear Stochastic Systems

    Directory of Open Access Journals (Sweden)

    Bingyong Yan

    2014-01-01

    Full Text Available A novel distributed fault detection strategy for a class of nonlinear stochastic systems is presented. Different from the existing design procedures for fault detection, a novel fault detection observer, which consists of a nonlinear fault detection filter and a consensus filter, is proposed to detect the nonlinear stochastic systems faults. Firstly, the outputs of the nonlinear stochastic systems act as inputs of a consensus filter. Secondly, a nonlinear fault detection filter is constructed to provide estimation of unmeasurable system states and residual signals using outputs of the consensus filter. Stability analysis of the consensus filter is rigorously investigated. Meanwhile, the design procedures of the nonlinear fault detection filter are given in terms of linear matrix inequalities (LMIs. Taking the influence of the system stochastic noises into consideration, an outstanding feature of the proposed scheme is that false alarms can be reduced dramatically. Finally, simulation results are provided to show the feasibility and effectiveness of the proposed fault detection approach.

  6. Evaluation of pipeline leak detection systems

    International Nuclear Information System (INIS)

    Glauz, W.D.; Flora, J.D.; Hennon, G.J.

    1993-01-01

    Leaking underground storage tank system presents an environmental concern and a potential health hazard. It is well known that leaks in the piping associated with these systems account for a sizeable fraction of the leaks. EPA has established performance standards for pipeline leak detection systems, and published a document presenting test protocols for evaluating these systems against the standards. This paper discusses a number of facets and important features of evaluating such systems, and presents results from tests of several systems. The importance of temperature differences between the ground and the product in the line is shown both in theory and with test data. The impact of the amount of soil moisture present is addressed, along with the effect of frozen soil. These features are addressed both for line tightness test systems, which must detect leaks of 0.10 gal/h (0.38 L/h) at 150% of normal line pressure, or 0.20 gal/h (0.76 L/h) at normal line pressure, and for automatic line leak detectors that must detect leaks of 3 gal/h (11 L/h) at 10 psi (69 kPa) within an hour of the occurrence of the leak. This paper also addresses some statistical aspects of the evaluation of these systems. Reasons for keeping the evaluation process ''blind'' to the evaluated company are given, along with methods for assuring that the tests are blind. Most importantly, a test procedure is presented for evaluating systems that report a flow rate (not just a pass/fail decision) that is much more efficient than the procedure presented in the EPA protocol, and is just as stringent

  7. Event-Triggered Fault Detection of Nonlinear Networked Systems.

    Science.gov (United States)

    Li, Hongyi; Chen, Ziran; Wu, Ligang; Lam, Hak-Keung; Du, Haiping

    2017-04-01

    This paper investigates the problem of fault detection for nonlinear discrete-time networked systems under an event-triggered scheme. A polynomial fuzzy fault detection filter is designed to generate a residual signal and detect faults in the system. A novel polynomial event-triggered scheme is proposed to determine the transmission of the signal. A fault detection filter is designed to guarantee that the residual system is asymptotically stable and satisfies the desired performance. Polynomial approximated membership functions obtained by Taylor series are employed for filtering analysis. Furthermore, sufficient conditions are represented in terms of sum of squares (SOSs) and can be solved by SOS tools in MATLAB environment. A numerical example is provided to demonstrate the effectiveness of the proposed results.

  8. 46 CFR 38.15-10 - Leak detection systems-T/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Leak detection systems-T/ALL. 38.15-10 Section 38.15-10... Requirements § 38.15-10 Leak detection systems—T/ALL. (a) A detection system shall be permanently installed to... exempt from the requirements of this paragraph. (b) The indicating instruments for the detection system...

  9. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  10. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  11. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  12. 46 CFR 108.407 - Detectors for electric fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Detectors for electric fire detection system. 108.407... DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.407 Detectors for electric fire detection system. (a) Each detector in an electric fire detection system must be located where— (1) No...

  13. A cyber-physical system for senior collapse detection

    Science.gov (United States)

    Grewe, Lynne; Magaña-Zook, Steven

    2014-06-01

    Senior Collapse Detection (SCD) is a system that uses cyber-physical techniques to create a "smart home" system to predict and detect the falling of senior/geriatric participants in home environments. This software application addresses the needs of millions of senior citizens who live at home by themselves and can find themselves in situations where they have fallen and need assistance. We discuss how SCD uses imagery, depth and audio to fuse and interact in a system that does not require the senior to wear any devices allowing them to be more autonomous. The Microsoft Kinect Sensor is used to collect imagery, depth and audio. We will begin by discussing the physical attributes of the "collapse detection problem". Next, we will discuss the task of feature extraction resulting in skeleton and joint tracking. Improvements in error detection of joint tracking will be highlighted. Next, we discuss the main module of "fall detection" using our mid-level skeleton features. Attributes including acceleration, position and room environment factor into the SCD fall detection decision. Finally, how a detected fall and the resultant emergency response are handled will be presented. Results in a home environment will be given.

  14. Automated system for crack detection using infrared thermograph

    International Nuclear Information System (INIS)

    Starman, Stanislav

    2009-01-01

    The objective of this study was the development of the automated system for crack detection on square steel bars used in the automotive industry for axle and shaft construction. The automated system for thermographic crack detection uses brief pulsed eddy currents to heat steel components under inspection. Cracks, if present, will disturb the current flow and so generate changes in the temperature profile in the crack area. These changes of temperature are visualized using an infrared camera. The image acquired by the infrared camera is evaluated through an image processing system. The advantages afforded by the system are its inspection time, its excellent flaw detection sensitivity and its ability to detect hidden, subsurface cracks. The automated system consists of four IR cameras (each side of steel bar is evaluated at a time), coil, high frequency generator and control place with computers. The system is a part of the inspection line where the subsurface and surface cracks are searched. If the crack is present, the cracked place is automatically marked. The components without cracks are then deposited apart from defective blocks. The system is fully automated and its ability is to evaluate four meter blocks within 20 seconds. This is the real reason for using this system in real industrial applications. (author)

  15. A New Protection System for Islanding Detection in LV Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anna Rita Di Fazio

    2015-04-01

    Full Text Available The growth of penetration of Distributed Generators (DGs is increasing the risk of unwanted islanded operation in Low Voltage (LV distribution systems. In this scenario, the existing anti-islanding protection systems, installed at the DG premises and based on classical voltage and frequency relays, are no longer effective, especially in the cases of islands characterized by a close match between generation and load. In this paper, a new protection system for islanding detection in LV distribution systems is proposed. The classical voltage and frequency relays in the DG interface protections are enriched with an innovative Smart Islanding Detector, which adopts a new passive islanding detection method. The aim is to keep the advantages of the classical relays while overcoming the problem of their limited sensitivity in detecting balanced islands. In the paper, to define the requirements of the anti-islanding protection system, the events causing the islanded operation of the LV distribution systems are firstly identified and classified. Then, referring to proposed protection system, its architecture and operation are described and, eventually, its performance is analyzed and validated by experimental laboratory tests, carried out with a hardware-in-the-loop technique.

  16. Automatic Emboli Detection System for the Artificial Heart

    Science.gov (United States)

    Steifer, T.; Lewandowski, M.; Karwat, P.; Gawlikowski, M.

    In spite of the progress in material engineering and ventricular assist devices construction, thromboembolism remains the most crucial problem in mechanical heart supporting systems. Therefore, the ability to monitor the patient's blood for clot formation should be considered an important factor in development of heart supporting systems. The well-known methods for automatic embolus detection are based on the monitoring of the ultrasound Doppler signal. A working system utilizing ultrasound Doppler is being developed for the purpose of flow estimation and emboli detection in the clinical artificial heart ReligaHeart EXT. Thesystem will be based on the existing dual channel multi-gate Doppler device with RF digital processing. A specially developed clamp-on cannula probe, equipped with 2 - 4 MHz piezoceramic transducers, enables easy system setup. We present the issuesrelated to the development of automatic emboli detection via Doppler measurements. We consider several algorithms for the flow estimation and emboli detection. We discuss their efficiency and confront them with the requirements of our experimental setup. Theoretical considerations are then met with preliminary experimental findings from a) flow studies with blood mimicking fluid and b) in-vitro flow studies with animal blood. Finally, we discuss some more methodological issues - we consider several possible approaches to the problem of verification of the accuracy of the detection system.

  17. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  18. Development of Contaminant Detection System using HTS SQUIDs

    International Nuclear Information System (INIS)

    Ohtani, T.; Tanaka, S.; Narita, Y.; Ariyoshi, S.; Suzuki, S.

    2015-01-01

    In terms of food safety, mixture of contaminants in food is a serious problem for not only consumers but also manufacturers. In general, the target size of the metallic contaminant to be removed is 0.5 mm. However, it is a difficult task for manufacturers to achieve this target, because of lower system sensitivity. Therefore, we developed a food contaminant detection system based on high-Tc RF superconducting quantum interference devices (SQUIDs), which are highly sensitive magnetic sensors. This study aims to improve the signal to noise ratio (SNR) of the system and detect a 0.5 mm diameter steel ball. Using a real time digital signal processing technique along with analog band-pass filters, we improved the SNR of the system. Owing to the improved SNR, a steel ball with a diameter as small as 0.3 mm, with stand-off distance of 117 mm was successfully detected. These results suggest that the proposed system is a promising candidate for the detection of metallic contaminants in food products

  19. Underwater electric field detection system based on weakly electric fish

    Science.gov (United States)

    Xue, Wei; Wang, Tianyu; Wang, Qi

    2018-04-01

    Weakly electric fish sense their surroundings in complete darkness by their active electric field detection system. However, due to the insufficient detection capacity of the electric field, the detection distance is not enough, and the detection accuracy is not high. In this paper, a method of underwater detection based on rotating current field theory is proposed to improve the performance of underwater electric field detection system. First of all, we built underwater detection system based on the theory of the spin current field mathematical model with the help of the results of previous researchers. Then we completed the principle prototype and finished the metal objects in the water environment detection experiments, laid the foundation for the further experiments.

  20. Development of Abnormality Detection System for Bathers using Ultrasonic Sensors

    Science.gov (United States)

    Ohnishi, Yosuke; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko; Ogoshi, Yasuhiro

    This paper proposes an abnormality detection system for bather sitting in bathtub. Increasing number of in-bathtub drowning accidents in Japan draws attention. Behind this large number of bathing accidents, Japan's unique social and cultural background come surface. For majority of people in Japan, bathing serves purpose in deep warming up of body, relax and enjoyable time. Therefore it is the custom for the Japanese to soak in bathtub. However overexposure to hot water may cause dizziness or fainting, which is possible to cause in-bathtub drowning. For drowning prevention, the system detects bather's abnormal state using an ultrasonic sensor array. The array, which has many ultrasonic sensors, is installed on the ceiling of bathroom above bathtub. The abnormality detection system uses the following two methods: posture detection and behavior detection. The function of posture detection is to estimate the risk of drowning by monitoring bather's posture. Meanwhile, the function of behavior detection is to estimate the risk of drowning by monitoring bather's behavior. By using these methods, the system detects bathers' different state from normal. As a result of experiment with a subject in the bathtub, the system was possible to detect abnormal state using subject's posture and behavior. Therefore the system is useful for monitoring bather to prevent drowning in bathtub.

  1. Image combination enhancement method for X-ray compton back-scattering security inspection body scanner

    International Nuclear Information System (INIS)

    Wang Huaiying; Zhang Yujin; Yang Lirui; Li Dong

    2011-01-01

    As for X-ray Compton Back-Scattering (CBS) body scanner, image clearness is very important for the performance of detecting the contraband hidden on the body. A new image combination enhancement method is provided based on characteristics of CBS body images and points of human vision. After processed by this method, the CBS image will be obviously improved with clear levels, distinct outline and uniform background. (authors)

  2. 46 CFR 161.002-10 - Automatic fire detecting system control unit.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Automatic fire detecting system control unit. 161.002-10...-10 Automatic fire detecting system control unit. (a) General. The fire detecting system control unit... and the battery to be charged. (h) Automatic fire detecting system, battery charging and control—(1...

  3. Development of a HIV-1 Virus Detection System Based on Nanotechnology

    Directory of Open Access Journals (Sweden)

    Jin-Ho Lee

    2015-04-01

    Full Text Available Development of a sensitive and selective detection system for pathogenic viral agents is essential for medical healthcare from diagnostics to therapeutics. However, conventional detection systems are time consuming, resource-intensive and tedious to perform. Hence, the demand for sensitive and selective detection system for virus are highly increasing. To attain this aim, different aspects and techniques have been applied to develop virus sensor with improved sensitivity and selectivity. Here, among those aspects and techniques, this article reviews HIV virus particle detection systems incorporated with nanotechnology to enhance the sensitivity. This review mainly focused on four different detection system including vertically configured electrical detection based on scanning tunneling microscopy (STM, electrochemical detection based on direct electron transfer in virus, optical detection system based on localized surface plasmon resonance (LSPR and surface enhanced Raman spectroscopy (SERS using plasmonic nanoparticle.

  4. Development of a HIV-1 Virus Detection System Based on Nanotechnology.

    Science.gov (United States)

    Lee, Jin-Ho; Oh, Byung-Keun; Choi, Jeong-Woo

    2015-04-27

    Development of a sensitive and selective detection system for pathogenic viral agents is essential for medical healthcare from diagnostics to therapeutics. However, conventional detection systems are time consuming, resource-intensive and tedious to perform. Hence, the demand for sensitive and selective detection system for virus are highly increasing. To attain this aim, different aspects and techniques have been applied to develop virus sensor with improved sensitivity and selectivity. Here, among those aspects and techniques, this article reviews HIV virus particle detection systems incorporated with nanotechnology to enhance the sensitivity. This review mainly focused on four different detection system including vertically configured electrical detection based on scanning tunneling microscopy (STM), electrochemical detection based on direct electron transfer in virus, optical detection system based on localized surface plasmon resonance (LSPR) and surface enhanced Raman spectroscopy (SERS) using plasmonic nanoparticle.

  5. Volume 7, No. 2 ISSN-2077-3420 December 2015 Cross-Border ...

    African Journals Online (AJOL)

    Maru Shete

    2015-12-02

    Dec 2, 2015 ... contraband trade across the main route from Moyale (border town .... revenue and customs sector, and planned to increase the share of tax ... and social causes of cross border contraband trade have been ... youths are turning towards CBCT as a means of sedentary life and ..... However, this vicious circle.

  6. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  7. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  8. Configuration of electro-optic fire source detection system

    Science.gov (United States)

    Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir

    2007-04-01

    The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.

  9. Medical applications of in vivo neutron inelastic scattering and neutron activation analysis: Technical similarities to detection of explosives and contraband

    International Nuclear Information System (INIS)

    Kehayias, J.J.

    2001-01-01

    Nutritional status of patients can be evaluated by monitoring changes in elemental body composition. Fast neutron activation (for N and P) and neutron inelastic scattering (for C and O) are used in vivo to assess elements characteristic of specific body compartments. There are similarities between the body composition techniques and the detection of hidden explosives and narcotics. All samples have to be examined in depth and the ratio of elements provides a 'signature' of the chemical of interest. The N/H and C/O ratios measure protein and fat content in the body. Similarly, a high C/O ratio is characteristic of narcotics and a low C/O together with a strong presence of N is a signature of some explosives. The available time for medical applications is about 20 min - compared to a few seconds for the detection of explosives - but the permitted radiation exposure is limited. In vivo neutron analysis is used to measure H, O, C, N, P, Na, Cl, and Ca for the study of the mechanisms of lean tissue depletion with aging and wasting diseases, and to investigate methods of preserving function and quality of life in the elderly

  10. Image-Based Pothole Detection System for ITS Service and Road Management System

    Directory of Open Access Journals (Sweden)

    Seung-Ki Ryu

    2015-01-01

    Full Text Available Potholes can generate damage such as flat tire and wheel damage, impact and damage of lower vehicle, vehicle collision, and major accidents. Thus, accurately and quickly detecting potholes is one of the important tasks for determining proper strategies in ITS (Intelligent Transportation System service and road management system. Several efforts have been made for developing a technology which can automatically detect and recognize potholes. In this study, a pothole detection method based on two-dimensional (2D images is proposed for improving the existing method and designing a pothole detection system to be applied to ITS service and road management system. For experiments, 2D road images that were collected by a survey vehicle in Korea were used and the performance of the proposed method was compared with that of the existing method for several conditions such as road, recording, and brightness. The results are promising, and the information extracted using the proposed method can be used, not only in determining the preliminary maintenance for a road management system and in taking immediate action for their repair and maintenance, but also in providing alert information of potholes to drivers as one of ITS services.

  11. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  12. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a coaxial direct-detection LIDAR system for measuring velocity, temperature and/or particulate density. The system comprises a laser source for emitting a laser light beam having a lasing center frequency along an emission path. The system further comprises an optical....... Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  13. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  14. An automated computer misuse detection system for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  15. Chemical detection, identification, and analysis system

    International Nuclear Information System (INIS)

    Morel, R.S.; Gonzales, D.; Mniszewski, S.

    1990-01-01

    The chemical detection, identification, and analysis system (CDIAS) has three major goals. The first is to display safety information regarding chemical environment before personnel entry. The second is to archive personnel exposure to the environment. Third, the system assists users in identifying the stage of a chemical process in progress and suggests safety precautions associated with that process. In addition to these major goals, the system must be sufficiently compact to provide transportability, and it must be extremely simple to use in order to keep user interaction at a minimum. The system created to meet these goals includes several pieces of hardware and the integration of four software packages. The hardware consists of a low-oxygen, carbon monoxide, explosives, and hydrogen sulfide detector; an ion mobility spectrometer for airborne vapor detection; and a COMPAQ 386/20 portable computer. The software modules are a graphics kernel, an expert system shell, a data-base management system, and an interface management system. A supervisory module developed using the interface management system coordinates the interaction of the other software components. The system determines the safety of the environment using conventional data acquisition and analysis techniques. The low-oxygen, carbon monoxide, hydrogen sulfide, explosives, and vapor detectors are monitored for hazardous levels, and warnings are issued accordingly

  16. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  17. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  18. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  19. Video-based real-time on-street parking occupancy detection system

    Science.gov (United States)

    Bulan, Orhan; Loce, Robert P.; Wu, Wencheng; Wang, YaoRong; Bernal, Edgar A.; Fan, Zhigang

    2013-10-01

    Urban parking management is receiving significant attention due to its potential to reduce traffic congestion, fuel consumption, and emissions. Real-time parking occupancy detection is a critical component of on-street parking management systems, where occupancy information is relayed to drivers via smart phone apps, radio, Internet, on-road signs, or global positioning system auxiliary signals. Video-based parking occupancy detection systems can provide a cost-effective solution to the sensing task while providing additional functionality for traffic law enforcement and surveillance. We present a video-based on-street parking occupancy detection system that can operate in real time. Our system accounts for the inherent challenges that exist in on-street parking settings, including illumination changes, rain, shadows, occlusions, and camera motion. Our method utilizes several components from video processing and computer vision for motion detection, background subtraction, and vehicle detection. We also present three traffic law enforcement applications: parking angle violation detection, parking boundary violation detection, and exclusion zone violation detection, which can be integrated into the parking occupancy cameras as a value-added option. Our experimental results show that the proposed parking occupancy detection method performs in real-time at 5 frames/s and achieves better than 90% detection accuracy across several days of videos captured in a busy street block under various weather conditions such as sunny, cloudy, and rainy, among others.

  20. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  1. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  2. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  3. Design of a decentralized detection of interacting LTI systems

    Directory of Open Access Journals (Sweden)

    Shankar Shamanth

    2002-01-01

    Full Text Available In this paper, the problem of designing a decentralized detection filter for a large homogeneous collection of LTI systems is considered. The collection of systems considered here draws inspiration from platoons of vehicles, and the considered interactions amongst systems in the collection are banded and lower triangular, mimicking the typical “look-ahead” nature of interactions in a platoon of vehicles. A fault in a system propagates to other systems in the collection via such interactions. The decentralized detection filter for the collection is composed of interacting detection filters, one for each system. The feasibility of communicating the state estimates to other systems in the collection is assumed here. An important concern is the propagation of state estimation errors. In order that the state estimation errors not amplify as they propagate, a ℋ ∞ constraint on the state estimation error propagation dynamics is imposed. A sufficient condition for constructing a decentralized detection filter for the collection is presented. An example is provided to illustrate the design procedure.

  4. A new digital correlation flaw detection system

    International Nuclear Information System (INIS)

    Lee, B.B.; Furgason, E.S.

    1981-01-01

    A new portable digital random signal flaw detection system is described which uses a digital delay line to replace the acoustic delay line of the original random signal system. Using this new system, a comparison was made between the two types of transmit signals which have been used in previous systems--m-sequences and random signals. This comparison has not been possible with these previous correlation flaw detection systems. Results indicated that for high-speed short code operation, the m-sequences produced slightly lower range sidelobes than typical samples of a clipped random signal. For normal long code operation, results indicated that system performance is essentially equivalent in resolution and signal-to-noise ratio using either m-sequences or clipped and sampled random signals. Further results also showed that for normal long code operation, the system produces outputs equivalent in resolution to pulse-echo systems, but with the added benefit of signal-to-noise ratio enhancement

  5. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    Science.gov (United States)

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  6. Arc fault detection system

    Science.gov (United States)

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  7. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  8. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  9. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso; Alshareef, Husam N.

    2015-01-01

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  10. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  11. Optimization of a quench detection system for superconducting magnets

    International Nuclear Information System (INIS)

    Borlein, M.

    2004-12-01

    Subject of this report is the detection of a quench in a superconducting magnet. For the safe operation of superconducting magnets one of the most important issues is the quench detection system which controls the superconducting state of the magnet and triggers a safety discharge if necessary. If it comes to a breakdown of the superconductivity (quench), the magnet has to be discharged very quickly to avoid any damage or danger for the magnet or its environment. First an introducing overview is given. Next different methods of quench detection will be presented, partially on the basis of existing quench detection systems and the applicability of these methods in different states of the magnet operation will be shown. The different quench detection methods are compared and evaluated partially by using test experiments described in the appendix. As an application example this report contains a proposal for the quench detection system for the Wendelstein 7-X facility, actually built by the Institute for Plasma Physics, Garching [de

  12. Potential detection systems for monitoring UF6 releases

    International Nuclear Information System (INIS)

    Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

    1994-09-01

    In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF 6 ) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC's position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF 6 release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring)

  13. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi; Sun, Ying; Saidi, Ahmed

    2018-01-01

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a

  14. Novel applications of fast neutron interrogation methods

    International Nuclear Information System (INIS)

    Gozani, Tsahi

    1994-01-01

    The development of non-intrusive inspection methods for contraband consisting primarily of carbon, nitrogen, oxygen, and hydrogen requires the use of fast neutrons. While most elements can be sufficiently well detected by the thermal neutron capture process, some important ones, e.g., carbon and in particular oxygen, cannot be detected by this process. Fortunately, fast neutrons, with energies above the threshold for inelastic scattering, stimulate relatively strong and specific gamma ray lines from these elements. The main lines are: 6.13 for O, 4.43 for C, and 5.11, 2.31 and 1.64 MeV for N. Accelerator-generated neutrons in the energy range of 7 to 15 MeV are being considered as interrogating radiations in a variety of non-intrusive inspection systems for contraband, from explosives to drugs and from coal to smuggled, dutiable goods. In some applications, mostly for inspection of small items such as luggage, the decision process involves a rudimentary imaging, akin to emission tomography, to obtain the localized concentration of various elements. This technique is called FNA - Fast Neutron Analysis. While this approach offers improvements over the TNA (Thermal Neutron Analysis), it is not applicable to large objects such as shipping containers and trucks. For these challenging applications, a collimated beam of neutrons is rastered along the height of the moving object. In addition, the neutrons are generated in very narrow nanosecond pulses. The point of their interaction inside the object is determined by the time of flight (TOF) method, that is measuring the time elapsed from the neutron generation to the time of detection of the stimulated gamma rays. This technique, called PFNA (Pulsed Fast Neutron Analysis), thus directly provides the elemental, and by inference, the chemical composition of the material at every volume element (voxel) of the object. The various neutron-based techniques are briefly described below. ((orig.))

  15. Damage Detection and Verification System (DDVS) for In-Situ Health Monitoring

    Science.gov (United States)

    Williams, Martha K.; Lewis, Mark; Szafran, J.; Shelton, C.; Ludwig, L.; Gibson, T.; Lane, J.; Trautwein, T.

    2015-01-01

    Project presentation for Game Changing Program Smart Book Release. Detection and Verification System (DDVS) expands the Flat Surface Damage Detection System (FSDDS) sensory panels damage detection capabilities and includes an autonomous inspection capability utilizing cameras and dynamic computer vision algorithms to verify system health. Objectives of this formulation task are to establish the concept of operations, formulate the system requirements for a potential ISS flight experiment, and develop a preliminary design of an autonomous inspection capability system that will be demonstrated as a proof-of-concept ground based damage detection and inspection system.

  16. Detection system of capillary array electrophoresis microchip based on optical fiber

    Science.gov (United States)

    Yang, Xiaobo; Bai, Haiming; Yan, Weiping

    2009-11-01

    To meet the demands of the post-genomic era study and the large parallel detections of epidemic diseases and drug screening, the high throughput micro-fluidic detection system is needed urgently. A scanning laser induced fluorescence detection system based on optical fiber has been established by using a green laser diode double-pumped solid-state laser as excitation source. It includes laser induced fluorescence detection subsystem, capillary array electrophoresis micro-chip, channel identification unit and fluorescent signal processing subsystem. V-shaped detecting probe composed with two optical fibers for transmitting the excitation light and detecting induced fluorescence were constructed. Parallel four-channel signal analysis of capillary electrophoresis was performed on this system by using Rhodamine B as the sample. The distinction of different samples and separation of samples were achieved with the constructed detection system. The lowest detected concentration is 1×10-5 mol/L for Rhodamine B. The results show that the detection system possesses some advantages, such as compact structure, better stability and higher sensitivity, which are beneficial to the development of microminiaturization and integration of capillary array electrophoresis chip.

  17. Scanning of Cargo Containers by Gamma-Ray and Fast Neutron Radiography

    International Nuclear Information System (INIS)

    Yousri, A.M.; Bashter, I.I.; Megahid, M.R.; Osman, A.M.; Kansouh, W.A.; Reda, A.M.

    2011-01-01

    This paper describes the combined systems which were installed and tested to detect contraband smuggled in cargo containers. These combined systems are based on radiographers work by gamma-rays emitted from point source 60 Co with 0.5 Ci activity and neutrons emitted from point isotopic sources of Pu-α-Be as well as 14 MeV neutrons emitted from sealed tube neutron generator. The transmitted gamma ray through the inspected object was measured by gamma detection system with NaI(Tl) detector while the transmitted fast neutron beam was measured by a neutron gamma detection system with stilbene organic scintillator. The later possess the capability of discrimination between between gamma and neutron pulses using a discrimination system based on pulse shape discrimination method. The measured intensities of primary incident and transmitted beams of gamma-rays and fast neutrons were used to construct 2D cross-sectional images of the inspected objects hidden directly within benign materials of the container and for object screened by high dense material to stop object detection by gamma or X-rays. The constructed images for the inspected objects show the good capability and effectiveness of the installed gamma and neutron radiographers to detect illicit materials hidden in air cargo containers and sea containers of med size. They have also indicated that the developed scanning systems possess the ease of mobility and low cost of scanning

  18. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  19. A bubble detection system for propellant filling pipeline

    Energy Technology Data Exchange (ETDEWEB)

    Wen, Wen; Zong, Guanghua; Bi, Shusheng [Robotics Institute, Beihang University, 100191 Beijing (China)

    2014-06-15

    This paper proposes a bubble detection system based on the ultrasound transmission method, mainly for probing high-speed bubbles in the satellite propellant filling pipeline. First, three common ultrasonic detection methods are compared and the ultrasound transmission method is used in this paper. Then, the ultrasound beam in a vertical pipe is investigated, suggesting that the width of the beam used for detection is usually smaller than the internal diameter of the pipe, which means that when bubbles move close to the pipe wall, they may escape from being detected. A special device is designed to solve this problem. It can generate the spiral flow to force all the bubbles to ascend along the central line of the pipe. In the end, experiments are implemented to evaluate the performance of this system. Bubbles of five different sizes are generated and detected. Experiment results show that the sizes and quantity of bubbles can be estimated by this system. Also, the bubbles of different radii can be distinguished from each other. The numerical relationship between the ultrasound attenuation and the bubble radius is acquired and it can be utilized for estimating the unknown bubble size and measuring the total bubble volume.

  20. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  1. Event storm detection and identification in communication systems

    International Nuclear Information System (INIS)

    Albaghdadi, Mouayad; Briley, Bruce; Evens, Martha

    2006-01-01

    Event storms are the manifestation of an important class of abnormal behaviors in communication systems. They occur when a large number of nodes throughout the system generate a set of events within a small period of time. It is essential for network management systems to detect every event storm and identify its cause, in order to prevent and repair potential system faults. This paper presents a set of techniques for the effective detection and identification of event storms in communication systems. First, we introduce a new algorithm to synchronize events to a single node in the system. Second, the system's event log is modeled as a normally distributed random process. This is achieved by using data analysis techniques to explore and then model the statistical behavior of the event log. Third, event storm detection is proposed using a simple test statistic combined with an exponential smoothing technique to overcome the non-stationary behavior of event logs. Fourth, the system is divided into non-overlapping regions to locate the main contributing regions of a storm. We show that this technique provides us with a method for event storm identification. Finally, experimental results from a commercially deployed multimedia communication system that uses these techniques demonstrate their effectiveness

  2. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  3. Methods and systems for detection of radionuclides

    Science.gov (United States)

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  4. Evaluation of the AN/GSS-20 motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the AN/GSS-20 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to environmental factors was also examined

  5. Challenges, issues and trends in fall detection systems

    Science.gov (United States)

    2013-01-01

    Since falls are a major public health problem among older people, the number of systems aimed at detecting them has increased dramatically over recent years. This work presents an extensive literature review of fall detection systems, including comparisons among various kinds of studies. It aims to serve as a reference for both clinicians and biomedical engineers planning or conducting field investigations. Challenges, issues and trends in fall detection have been identified after the reviewing work. The number of studies using context-aware techniques is still increasing but there is a new trend towards the integration of fall detection into smartphones as well as the use of machine learning methods in the detection algorithm. We have also identified challenges regarding performance under real-life conditions, usability, and user acceptance as well as issues related to power consumption, real-time operations, sensing limitations, privacy and record of real-life falls. PMID:23829390

  6. US Army Nuclear Burst Detection System (NBDS)

    International Nuclear Information System (INIS)

    Glaser, R.F.

    1980-07-01

    The Nuclear Burst Detection System (NBDS) was developed to meet the Army requirements of an unattended, automatic nuclear burst reporting system. It provides pertinent data for battlefield commanders on a timely basis with high reliability

  7. Energy calibration for LaBr3(Ce) scintillator detector in the region of 1-10 MeV

    International Nuclear Information System (INIS)

    Zhang Jianhua; Zhu Chengsheng; Zeng Jun; Ding Ge; Xiang Qingpei; Liu Zhao; Yang Chaowen

    2013-01-01

    Background: LaBr 3 (Ce) detector has played an important role in detecting explosive, contraband and landmine because of its high y detection efficiency and good energy resolution etc. Purpose: To calibrate detector in wide energy region. Methods: The gamma spectra of NH 4 Cl and C 3 H 6 N 6 induced by 252 Cf neutron source were measured. Results: Comparing their gamma spectra, characteristic gamma lines can be located and the energy calibration curve was obtained. Conclusions: Radio nuclides can be identified by the calibration curve fitted with quadratic or cubic polynomial. (authors)

  8. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi

    2018-02-12

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a statistical approach. Specifically, a simulation model that mimics the theoretical performances of the inspected PV system is designed. Residuals, which are the difference between the measured and estimated output data, are used as a fault indicator. Indeed, residuals are used as the input for the Multivariate CUmulative SUM (MCUSUM) algorithm to detect potential faults. We evaluated the proposed method by using data from an actual 20 MWp grid-connected PV system located in the province of Adrar, Algeria.

  9. Detection of pulmonary nodules. Improvement by new screen-film systems?

    International Nuclear Information System (INIS)

    Lehmann, K.J.; Himmighoefer, U.

    1994-01-01

    In addition to digital radiography and AMBER, the development of asymmetric screen-film systems is another attempt to optimize chest radiography. Due to reduced contrast in the parenchyma, the former asymmetric screen-film systems did not show sufficient image quality. Three new asymmetric systems with completely different composition are available now. In-Sight VHC (Kodak), High Light GUV (3M) and Opthos D (Agfa) were compared to standard chest films using densitometric curves, a chest phantom for high and low contrast detectability, a nodule detection phantom and patient studies. The sensitivity of nodule detection in the mediastinum has been 41-48% for L-films and 58-65% for the asymmetric screen-film systems. No differences could be demonstrated for nodule detection in the lung field. Contrast in the parenchyma is equivalent to L-films. There is no loss of diagnostic information in the lung field. Differences between the asymmetric systems concern speed, dynamic range and granularity. If AMBER and digital radiography are not available, new asymmetric screen-film systems can improve nodule detection without further investment costs. (orig.) [de

  10. Prevoting Cancellation-Based Detection for Underdetermined MIMO Systems

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2010-01-01

    Full Text Available Various detection methods including the maximum likelihood (ML detection have been studied for multiple-input multiple-output (MIMO systems. While it is usually assumed that the number of independent data symbols, , to be transmitted by multiple antennas simultaneously is smaller than or equal to that of the receive antennas, , in most cases, there could be cases where , which results in underdetermined MIMO systems. In this paper, we employ the prevoting cancellation based detection for underdetermined MIMO systems and show that the proposed detectors can exploit a full receive diversity. Furthermore, the prevoting vector selection criteria for the proposed detectors are taken into account to improve performance further. We also show that our proposed scheme has a lower computational complexity compared to existing approaches, in particular when slow fading MIMO channels are considered.

  11. Stability of detecting system using NaI(Tl)

    International Nuclear Information System (INIS)

    Zhuo Yunshang; Lei Zhangyun; Zen Yu; Gong Hua

    1996-01-01

    A detecting system using NaI(Tl) is widely used in research and industry of nuclear science and other fields. For providing the high accuracy and working well under inclement environment, the stability of detecting system using NaI(Tl) is very important. The variation of environment temperature, the change of counting rate and long time continuous working of detector will cause un-negligible effect on the measurement. Three approaches were used. They are: 1) temperature control (It makes the effect of the variation of environment temperature on the measurement negligible.); 2) spectrum stabilizing (It adjust the peak position of the spectrum when the counting rate changes.); and 3) auto-checking and adjusting (It adjusts the drift of the NaI(Tl) detecting system when it works continuously)

  12. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  13. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    Science.gov (United States)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  14. 21 CFR 864.7280 - Factor V Leiden DNA mutation detection systems.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Factor V Leiden DNA mutation detection systems....7280 Factor V Leiden DNA mutation detection systems. (a) Identification. Factor V Leiden deoxyribonucleic acid (DNA) mutation detection systems are devices that consist of different reagents and...

  15. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  16. Automatic patient respiration failure detection system with wireless transmission

    Science.gov (United States)

    Dimeff, J.; Pope, J. M.

    1968-01-01

    Automatic respiration failure detection system detects respiration failure in patients with a surgically implanted tracheostomy tube, and actuates an audible and/or visual alarm. The system incorporates a miniature radio transmitter so that the patient is unencumbered by wires yet can be monitored from a remote location.

  17. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  18. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  19. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  20. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...

  1. Optical detection system for MEMS-type pressure sensor

    International Nuclear Information System (INIS)

    Sareło, K; Górecka-Drzazga, A; Dziuban, J A

    2015-01-01

    In this paper a special optical detection system designed for a MEMS-type (micro-electro-mechanical system) silicon pressure sensor is presented. The main part of the optical system—a detection unit with a perforated membrane—is bonded to the silicon sensor, and placed in a measuring system. An external light source illuminates the membrane of the pressure sensor. Owing to the light reflected from the deflected membrane sensor, the optical pattern consisting of light points is visible, and pressure can be estimated. The optical detection unit (20   ×   20   ×   20.4 mm 3 ) is fabricated using microengineering techniques. Its dimensions are adjusted to the dimensions of the pressure sensor (5   ×   5 mm 2 silicon membrane). Preliminary tests of the optical detection unit integrated with the silicon pressure sensor are carried out. For the membrane sensor from 15 to 60 µm thick, a repeatable detection of the differential pressure in the range of 0 to 280 kPa is achieved. The presented optical microsystem is especially suitable for the pressure measurements in a high radiation environment. (paper)

  2. Evaluation of computer-aided detection and diagnosis systems.

    Science.gov (United States)

    Petrick, Nicholas; Sahiner, Berkman; Armato, Samuel G; Bert, Alberto; Correale, Loredana; Delsanto, Silvia; Freedman, Matthew T; Fryd, David; Gur, David; Hadjiiski, Lubomir; Huo, Zhimin; Jiang, Yulei; Morra, Lia; Paquerault, Sophie; Raykar, Vikas; Samuelson, Frank; Summers, Ronald M; Tourassi, Georgia; Yoshida, Hiroyuki; Zheng, Bin; Zhou, Chuan; Chan, Heang-Ping

    2013-08-01

    Computer-aided detection and diagnosis (CAD) systems are increasingly being used as an aid by clinicians for detection and interpretation of diseases. Computer-aided detection systems mark regions of an image that may reveal specific abnormalities and are used to alert clinicians to these regions during image interpretation. Computer-aided diagnosis systems provide an assessment of a disease using image-based information alone or in combination with other relevant diagnostic data and are used by clinicians as a decision support in developing their diagnoses. While CAD systems are commercially available, standardized approaches for evaluating and reporting their performance have not yet been fully formalized in the literature or in a standardization effort. This deficiency has led to difficulty in the comparison of CAD devices and in understanding how the reported performance might translate into clinical practice. To address these important issues, the American Association of Physicists in Medicine (AAPM) formed the Computer Aided Detection in Diagnostic Imaging Subcommittee (CADSC), in part, to develop recommendations on approaches for assessing CAD system performance. The purpose of this paper is to convey the opinions of the AAPM CADSC members and to stimulate the development of consensus approaches and "best practices" for evaluating CAD systems. Both the assessment of a standalone CAD system and the evaluation of the impact of CAD on end-users are discussed. It is hoped that awareness of these important evaluation elements and the CADSC recommendations will lead to further development of structured guidelines for CAD performance assessment. Proper assessment of CAD system performance is expected to increase the understanding of a CAD system's effectiveness and limitations, which is expected to stimulate further research and development efforts on CAD technologies, reduce problems due to improper use, and eventually improve the utility and efficacy of CAD in

  3. The parameterization of microchannel-plate-based detection systems

    Science.gov (United States)

    Gershman, Daniel J.; Gliese, Ulrik; Dorelli, John C.; Avanov, Levon A.; Barrie, Alexander C.; Chornay, Dennis J.; MacDonald, Elizabeth A.; Holland, Matthew P.; Giles, Barbara L.; Pollock, Craig J.

    2016-10-01

    The most common instrument for low-energy plasmas consists of a top-hat electrostatic analyzer (ESA) geometry coupled with a microchannel-plate-based (MCP-based) detection system. While the electrostatic optics for such sensors are readily simulated and parameterized during the laboratory calibration process, the detection system is often less well characterized. Here we develop a comprehensive mathematical description of particle detection systems. As a function of instrument azimuthal angle, we parameterize (1) particle scattering within the ESA and at the surface of the MCP, (2) the probability distribution of MCP gain for an incident particle, (3) electron charge cloud spreading between the MCP and anode board, and (4) capacitive coupling between adjacent discrete anodes. Using the Dual Electron Spectrometers on the Fast Plasma Investigation on NASA's Magnetospheric Multiscale mission as an example, we demonstrate a method for extracting these fundamental detection system parameters from laboratory calibration. We further show that parameters that will evolve in flight, namely, MCP gain, can be determined through application of this model to specifically tailored in-flight calibration activities. This methodology provides a robust characterization of sensor suite performance throughout mission lifetime. The model developed in this work is not only applicable to existing sensors but also can be used as an analytical design tool for future particle instrumentation.

  4. A Novel Technique to Detect Code for SAC-OCDMA System

    Science.gov (United States)

    Bharti, Manisha; Kumar, Manoj; Sharma, Ajay K.

    2018-04-01

    The main task of optical code division multiple access (OCDMA) system is the detection of code used by a user in presence of multiple access interference (MAI). In this paper, new method of detection known as XOR subtraction detection for spectral amplitude coding OCDMA (SAC-OCDMA) based on double weight codes has been proposed and presented. As MAI is the main source of performance deterioration in OCDMA system, therefore, SAC technique is used in this paper to eliminate the effect of MAI up to a large extent. A comparative analysis is then made between the proposed scheme and other conventional detection schemes used like complimentary subtraction detection, AND subtraction detection and NAND subtraction detection. The system performance is characterized by Q-factor, BER and received optical power (ROP) with respect to input laser power and fiber length. The theoretical and simulation investigations reveal that the proposed detection technique provides better quality factor, security and received power in comparison to other conventional techniques. The wide opening of eye in case of proposed technique also proves its robustness.

  5. Sensor Failure Detection of FASSIP System using Principal Component Analysis

    Science.gov (United States)

    Sudarno; Juarsa, Mulya; Santosa, Kussigit; Deswandri; Sunaryo, Geni Rina

    2018-02-01

    In the nuclear reactor accident of Fukushima Daiichi in Japan, the damages of core and pressure vessel were caused by the failure of its active cooling system (diesel generator was inundated by tsunami). Thus researches on passive cooling system for Nuclear Power Plant are performed to improve the safety aspects of nuclear reactors. The FASSIP system (Passive System Simulation Facility) is an installation used to study the characteristics of passive cooling systems at nuclear power plants. The accuracy of sensor measurement of FASSIP system is essential, because as the basis for determining the characteristics of a passive cooling system. In this research, a sensor failure detection method for FASSIP system is developed, so the indication of sensor failures can be detected early. The method used is Principal Component Analysis (PCA) to reduce the dimension of the sensor, with the Squarred Prediction Error (SPE) and statistic Hotteling criteria for detecting sensor failure indication. The results shows that PCA method is capable to detect the occurrence of a failure at any sensor.

  6. Taxation, smuggling and demand for cigarettes in Canada: evidence from time-series data.

    Science.gov (United States)

    Galbraith, J W; Kaiserman, M

    1997-06-01

    This study analyzes Canadian cigarette consumption and taxation between 1980 and 1994, a period in which there have been large price rises and declines, and a dramatic increase in the consumption of contraband tobacco products. We examine elasticities of legal cigarette sales and total sales (including contraband) with respect to the price of legal cigarettes and various other factors. The growth of the contraband market since 1987 appears to have created two classes of cigarette--taxed and untaxed--with responses to changes in the legal price that are respectively higher, and lower, than was previously the case. The sensitivity of total cigarette sales to the taxation instrument is much lower than it would appear from sales of taxed cigarettes alone.

  7. Comportamiento al margen de la ley: contrabando y sociedad en Buenos Aires en el siglo XVII *

    Directory of Open Access Journals (Sweden)

    Macarena Perusset Veras

    2007-06-01

    Full Text Available Illicit Behavior: Smuggling and Society in Seventeenth-Century Buenos Aires ABSTRACTIn this work we look into the origins of illegal commerce to analyze how contraband was conducted in the port of Buenos Aires in the early seventeenth-century. To do this, we will analyze the political and economic context in which contraband arose and gained importance in order to reflect whether this economic practice -conducted by government officials, vecinos (official residents and settlers of the port of Buenos Aires- can be considered corrupt in the context of the period studied. We will situate the behavior of these social actors within an intertwined complex of political beliefs and ideologies, and conjunctures, to explain how a practice like colonial-era contraband has multiple, tightly related causes.

  8. [Detection of CRSPR-Cas system in Streptococcus thermophiles].

    Science.gov (United States)

    Li, Wan; Liang, Hongzhang; Zhang, Danqing; Wang, Nana; Tang, Yaru; Li, Bailiang; Huo, Guicheng

    2016-04-14

    We aimed to detect the CRSPR-Cas system of six Streptococcus thermophilus. Bioinformatics method was used to predict CRSPR-Cas system of nine S. thermophilus that published in National Center for Biotechnology Information. Four primers were designed according to the flanking sequences of standard strains and the CRISPR-Cas system of six S. thermophilus have been detected by PCR method. S. thermophilus S4 had a Cas9 gene, others all had Cas9 gene, Cas10 gene and Cas9* gene. In addition, 79 and KLDS3.0207 still had Cas3 gene. Signature genes amplification of CRSPR-Cas system could predict the type of CRSPR-Cas system in unsequenced strains, these findings will help establish the foundation for the study of CRSPR-Cas system in lactic acid bacteria.

  9. Phase and amplitude detection system for the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Schwarz, H.D.

    1983-01-01

    A computer controlled phase and amplitude detection system to measure and stabilize the rf power sources in the Stanford Linear Accelerator is described. This system measures the instantaneous phase and amplitude of a 1 microsecond 2856 MHz rf pulse and will be used for phase feedback control and for amplitude and phase jitter detection. This paper discusses the measurement system performance requirements for the operation of the Stanford Linear Collider, and the design and implementation of the phase and amplitude detection system. The fundamental software algorithms used in the measurement are described, as is the performance of the prototype phase and amplitude detector system

  10. Fault detection for piecewise affine systems with application to ship propulsion systems.

    Science.gov (United States)

    Yang, Ying; Linlin, Li; Ding, Steven X; Qiu, Jianbin; Peng, Kaixiang

    2017-09-09

    In this paper, the design approach of non-synchronized diagnostic observer-based fault detection (FD) systems is investigated for piecewise affine processes via continuous piecewise Lyapunov functions. Considering that the dynamics of piecewise affine systems in different regions can be considerably different, the weighting matrices are used to weight the residual of each region, so as to optimize the fault detectability. A numerical example and a case study on a ship propulsion system are presented in the end to demonstrate the effectiveness of the proposed results. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  11. The Hydrogen Detection Technique for SG Protection System

    International Nuclear Information System (INIS)

    Lv Mingyu; Pei Zhiyong; Yu Huajin

    2015-01-01

    SG that is pressure boundary between secondary loop and triple loop is the key equipment of fast reactor, in which heat in secondary loop is transferred to water or steam in triple loop. According to data from IAEA, SG is the highest failure rate equipment in fast reactor, especially because of failure of heat transfer tube. In order to monitor failure of heat transfer tube, Fast Reactor Engineering Department develops diffusion type hydrogen detection system, which is used to detect sodium-water reaction in time. This paper firstly introduces experimental research scheme and results of this hydrogen detection technique; Subsequently, it is described that how this technique can be engineering realized in CEFR; Moreover, through developing a series of calibration tests and hydrogen injection tests, it is obtained that sensitivity, response time and calibration curse for hydrogen detection system of CEFR. (author)

  12. Support system and method for detecting neurodegenerative disorder

    DEFF Research Database (Denmark)

    2013-01-01

    The present invention relates to a system and a method for detection of abnormal motor activity during REM sleep, and further to systems and method for assisting in detecting neurodegenerative disorders such as Parkinson's. One embodiment relates to a method for detection of abnormal motor activity...... during REM sleep comprising the steps of: performing polysomnographic recordings of a sleeping subject, thereby obtaining one or more electromyography (EMG) derivations, preferably surface EMG recordings, and one or more EEG derivations, and/or one or more electrooculargraphy (EOG) derivations, detecting...... one or more REM sleep stages, preferably based on the one or more EEG and/or EOG derivations, determining the level of muscle activity during the one or more REM sleep stages based on the one or more EMG derivations, wherein a subject having an increased level of muscle activity during REM sleep...

  13. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  14. Motion detection system with GPU acceleration for stereotactic radiosurgery

    International Nuclear Information System (INIS)

    Yamakawa, Takuya; Ogawa, Koichi; Iyatomi, Hitoshi; Usui, Keisuke; Kunieda, Etsuo; Shigematsu, Naoyuki

    2012-01-01

    Stereotactic radiosurgery is a non-invasive method for the treatment of tumors that employs a narrow, high-energy X-ray beam. In this form of therapy, the target region is intensively irradiated with the narrow beam, and any unexpected patient motion may therefore lead to undesirable irradiation of neighboring normal tissues and organs. To overcome this problem, we propose a contactless motion detection system with three USB cameras for use in stereotactic radiosurgery of the head and neck. In our system, the three cameras monitor images of the patient's nose and ears, and patient motion is detected using a template-matching method. If patient motion is detected, the system alerts the radiologist to turn off the beam. We reduced the effects of variations in the lighting in the irradiation room by employing USB cameras sensitive to infrared light. To detect movement in the acquired images, we use a template-matching method that is realized with general-purpose computing-on-graphics processing units. In this paper, we present an outline of our proposed motion detection system based on monitoring of images of the patient acquired with infrared USB cameras and a template-matching method. The performance of the system was evaluated under the same conditions as those used in actual radiation therapy of the head and neck. (author)

  15. Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system

    International Nuclear Information System (INIS)

    Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

    1993-03-01

    The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data

  16. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Science.gov (United States)

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun

    2017-10-03

    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  17. Utilization of an Airborne Plant Chlorophyll Imaging System for Detection of Septic System Malfunction

    Science.gov (United States)

    Spiering, Bruce A.; Carter, Gregory A.

    2001-01-01

    Malfunctioning, or leaking, sewer systems increase the supply of water and nutrients to surface vegetation. Excess nutrients and harmful bacteria in the effluent pollute ground water and local water bodies and are dangerous to humans and the aquatic ecosystems. An airborne multispectral plant chlorophyll imaging system (PCIS) was used to identify growth patterns in the vegetation covering onsite and public sewer systems. The objective was to evaluate overall performance of the PCIS as well as to determine the best operational configuration for this application. The imaging system was flown in a light aircraft over selected locations Mobile County, Alabama. Calibration panels were used to help characterize instrument performance. Results demonstrated that the PCIS performed well and was capable of detecting septic leakage patterns from altitudes as high as 915 m. From 915 m, 6 of 18 sites were suspected to have sewage leakage. Subsequent ground inspections confirmed leakage on 3 of the 6 sites. From 610 m, 3 of 8 known leakage sites were detected. Tree cover and shadows near residential structures prevented detection of several known malfunctioning systems. Also some leakages known to occur in clear areas were not detected. False detections occurred in areas characterized by surface water drainage problems or recent excavation.

  18. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  19. Prototype explosives detection system based on nuclear resonance absorption in nitrogen

    International Nuclear Information System (INIS)

    Morgado, R.E.; Arnone, G.J.; Cappiello, C.C.

    1996-01-01

    A laboratory prototype system has been developed for the experimental evaluation of an explosives detection technique based on nuclear resonance absorption of gamma rays in nitrogen. Major subsystems include a radiofrequency quadrupole proton accelerator and associated beam transport system, a high-power gamma-ray production target, an airline-luggage tomographic inspection system, and an image- processing/detection-alarm subsystem. The detection system performance, based on a limited experimental test, is reported

  20. Start up of the whole body detection system

    International Nuclear Information System (INIS)

    Cortes P, A.; Angeles C, A.; Cuapio O, A.; Tejera R, A.

    1991-12-01

    The management of Radiological Safety of the Nuclear Center of Mexico has a whole body detection system Trade mark Canberra, manufactured by Bio-nuclear Measurements Inc. Ipswich Massachusetts. These systems are used to detect contamination of I-131 in thyroid and other nuclides (Cs-137, Cs-134, Co-60, etc.) in thorax. In this work the procedure that was continued for the setting in march of the thyroid detector is presented. A description of this system and an analysis of the uncertainties involved in the measures of activity of I-131 in thyroid of people occupationally exposed is made. (Author)

  1. Subgenomic reporter RNA system for detection of alphavirus infection in mosquitoes.

    Directory of Open Access Journals (Sweden)

    J Jordan Steel

    Full Text Available Current methods for detecting real-time alphavirus (Family Togaviridae infection in mosquitoes require the use of recombinant viruses engineered to express a visibly detectable reporter protein. These altered viruses expressing fluorescent proteins, usually from a duplicated viral subgenomic reporter, are effective at marking infection but tend to be attenuated due to the modification of the genome. Additionally, field strains of viruses cannot be visualized using this approach unless infectious clones can be developed to insert a reporter protein. To circumvent these issues, we have developed an insect cell-based system for detecting wild-type sindbis virus infection that uses a virus inducible promoter to express a fluorescent reporter gene only upon active virus infection. We have developed an insect expression system that produces sindbis virus minigenomes containing a subgenomic promoter sequence, which produces a translatable RNA species only when infectious virus is present and providing viral replication proteins. This subgenomic reporter RNA system is able to detect wild-type Sindbis infection in cultured mosquito cells. The detection system is relatively species specific and only detects closely related viruses, but can detect low levels of alphavirus specific replication early during infection. A chikungunya virus detection system was also developed that specifically detects chikungunya virus infection. Transgenic Aedes aegypti mosquito families were established that constitutively express the sindbis virus reporter RNA and were found to only express fluorescent proteins during virus infection. This virus inducible reporter system demonstrates a novel approach for detecting non-recombinant virus infection in mosquito cell culture and in live transgenic mosquitoes.

  2. Edge detection techniques for iris recognition system

    International Nuclear Information System (INIS)

    Tania, U T; Motakabber, S M A; Ibrahimy, M I

    2013-01-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate

  3. A Multiple-Channel Sub-Band Transient Detection System

    Energy Technology Data Exchange (ETDEWEB)

    David A. Smith

    1998-11-01

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of

  4. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  5. Chemical Detection Architecture for a Subway System [video

    OpenAIRE

    Ignacio, Joselito; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    This proposed system process aims to improve subway safety through better enabling the rapid detection and response to a chemical release in a subway system. The process is designed to be location-independent and generalized to most subway systems despite each system's unique characteristics.

  6. Overview of motion and presence detection systems used in smart lighting systems

    OpenAIRE

    Goponenko, A. S.; Matveev, I. G.

    2015-01-01

    The article describes stages of design of smart lighting systems. Advantages and disadvantages of detectors used in smart lighting systems are stressed with the purpose of further development of these systems. Ambient factors, which affect the detection system, were analyzed and consequent conservation measures were proposed.

  7. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  8. Subsea leak detection systems - recommended practice

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Kristin Nergaard

    2010-07-01

    It is known in the industry that occasional leakages occur in subsea production systems. In spite of efforts to apply subsea leak detectors, the experience is that most leakages are either detected by ROV during routine inspections or interventions or as oil slicks on the surface . Operators and authority awareness towards the environmental impact of oil and gas production is increasing. The regulatory bodies in Norway, EU and USA specify requirements for detection of acute pollution. This paper presents the development of a Recommended Practice (RP) sponsored by OLF (The Norwegian Oil Industry Association). The JIP includes several major oil and gas operators. The objective of the RP is to serve as a technical and practical reference in the field of subsea leak detection. (Author)

  9. Caltrans fog detection and warning system.

    Science.gov (United States)

    2009-01-01

    The California Department of Transportation (Caltrans) has implemented a fog detection and warning system on Highway 99 near Fresno. The entire central valley region is susceptible to Tule fog, which can reduce visibility tremendously, sometimes to n...

  10. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  11. Arc detection for the ICRF system on ITER

    Science.gov (United States)

    D'Inca, R.

    2011-12-01

    The ICRF system for ITER is designed to respect the high voltage breakdown limits. However arcs can still statistically happen and must be quickly detected and suppressed by shutting the RF power down. For the conception of a reliable and efficient detector, the analysis of the mechanism of arcs is necessary to find their unique signature. Numerous systems have been conceived to address the issues of arc detection. VSWR-based detectors, RF noise detectors, sound detectors, optical detectors, S-matrix based detectors. Until now, none of them has succeeded in demonstrating the fulfillment of all requirements and the studies for ITER now follow three directions: improvement of the existing concepts to fix their flaws, development of new theoretically fully compliant detectors (like the GUIDAR) and combination of several detectors to benefit from the advantages of each of them. Together with the physical and engineering challenges, the development of an arc detection system for ITER raises methodological concerns to extrapolate the results from basic experiments and present machines to the ITER scale ICRF system and to conduct a relevant risk analysis.

  12. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  13. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  14. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  15. Advances in developing rapid, reliable and portable detection systems for alcohol.

    Science.gov (United States)

    Thungon, Phurpa Dema; Kakoti, Ankana; Ngashangva, Lightson; Goswami, Pranab

    2017-11-15

    Development of portable, reliable, sensitive, simple, and inexpensive detection system for alcohol has been an instinctive demand not only in traditional brewing, pharmaceutical, food and clinical industries but also in rapidly growing alcohol based fuel industries. Highly sensitive, selective, and reliable alcohol detections are currently amenable typically through the sophisticated instrument based analyses confined mostly to the state-of-art analytical laboratory facilities. With the growing demand of rapid and reliable alcohol detection systems, an all-round attempt has been made over the past decade encompassing various disciplines from basic and engineering sciences. Of late, the research for developing small-scale portable alcohol detection system has been accelerated with the advent of emerging miniaturization techniques, advanced materials and sensing platforms such as lab-on-chip, lab-on-CD, lab-on-paper etc. With these new inter-disciplinary approaches along with the support from the parallel knowledge growth on rapid detection systems being pursued for various targets, the progress on translating the proof-of-concepts to commercially viable and environment friendly portable alcohol detection systems is gaining pace. Here, we summarize the progress made over the years on the alcohol detection systems, with a focus on recent advancement towards developing portable, simple and efficient alcohol sensors. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  17. A Multimodal Emotion Detection System during Human-Robot Interaction

    Science.gov (United States)

    Alonso-Martín, Fernando; Malfaz, María; Sequeira, João; Gorostiza, Javier F.; Salichs, Miguel A.

    2013-01-01

    In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human–robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS). Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA), which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA), has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE) and Computer Expression Recognition Toolbox (CERT). Once these new components (GEVA and GEFA) give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human–robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System). Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual) separately. PMID:24240598

  18. Development and Experimental Investigations of Motion Detection Module for Smart Lighting System

    OpenAIRE

    Matveev, I.; Siemens, E.; Yurchenko, Aleksey Vasilievich; Kuznetsov, D.

    2016-01-01

    This work considers motion sensors as parts of the smart lighting system on basis of Beaglebone microcomputer. Detection system is designed for the smart lighting system. Experimental investigations of the detection system were made with different motion sensors. Based on the results comparative analysis was performed and optimal conditions for the detection system operation were found.

  19. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  20. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  1. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  2. The Development of Power Detection System Using One-Chip Microcontroller

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Sa Hyun; Choi, Nkak II; Lee, Sung Kil; Lim, Yang Su; Cho Geum Bae; Baek, Hyung Lae [Chosun University, Kwangju(Korea)

    2002-04-01

    This paper describes on the development of power detection system with one-chop microcontroller. The designed system is composed of power detection circuits and analyzing software. The system detects 3-phases voltage, 3-phases current, external temperature, leakage current and stores in flash memory AT89C52 was used as CPU and AM29F040 was used as memory to store the data. The analysis software was developed to detect the cause of the electrical fire incidents. With a data-compression technology, the data can be stored for the 43.5 days in a normal state, four hours and fifteen minutes in emergency state. (author). 7 refs., 22 figs., 2 tabs.

  3. A prototype detection system for atmospheric monitoring of xenon radioisotopes

    Science.gov (United States)

    Czyz, Steven A.; Farsoni, Abi T.; Ranjbar, Lily

    2018-03-01

    The design of a radioxenon detection system utilizing a CdZeTe crystal and a plastic scintillator coupled to an array of SiPMs to conduct beta-gamma coincidence detection for atmospheric radioxenon monitoring, as well as the measurement of 135Xe and 133/133mXe, have been detailed previously. This paper presents recent measurements of 133/133mXe and 131mXe and the observation of conversion electrons in their coincidence spectra, as well as a 48-hour background measurement to calculate the Minimum Detectable Concentration (MDC) of radioxenon isotopes in the system. The identification of Regions of Interest (ROIs) in the coincidence spectra yielded from the radioxenon measurements, and the subsequent calculation of the MDCs of the system for 135Xe, 133/133mXe, and 131mXe, are also discussed. Calculated MDCs show that the detection system preforms respectably when compared to other state of the art radioxenon detection systems and achieved an MDC of less than 1 mBq/m3 for 131mXe, 133Xe, and 133mXe, in accordance with limits set by the Comprehensive Nuclear-Test-Ban Treaty (CTBTO). The system also provides the advantage of room temperature operation, compactness, low noise operation and having simple readout electronics.

  4. Real-time thermal neutron radiographic detection systems

    International Nuclear Information System (INIS)

    Berger, H.; Bracher, D.A.

    1976-01-01

    Systems for real-time detection of thermal neutron images are reviewed. Characteristics of one system are presented; the data include contrast, resolution and speed of response over the thermal neutron intensity range 2.5 10 3 n/cm 2 -sec to 10 7 n/cm 2 -sec

  5. Near-Optimal Detection in MIMO Systems using Gibbs Sampling

    DEFF Research Database (Denmark)

    Hansen, Morten; Hassibi, Babak; Dimakis, Georgios Alexandros

    2009-01-01

    In this paper we study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to preforming Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods...... sampler provides a computationally efficient way of achieving approximative ML detection in MIMO systems having a huge number of transmit and receive dimensions. In fact, they further suggest that the Markov chain is rapidly mixing. Thus, it has been observed that even in cases were ML detection using, e...

  6. FPGA-Based Real-Time Motion Detection for Automated Video Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2016-03-01

    Full Text Available Design of automated video surveillance systems is one of the exigent missions in computer vision community because of their ability to automatically select frames of interest in incoming video streams based on motion detection. This research paper focuses on the real-time hardware implementation of a motion detection algorithm for such vision based automated surveillance systems. A dedicated VLSI architecture has been proposed and designed for clustering-based motion detection scheme. The working prototype of a complete standalone automated video surveillance system, including input camera interface, designed motion detection VLSI architecture, and output display interface, with real-time relevant motion detection capabilities, has been implemented on Xilinx ML510 (Virtex-5 FX130T FPGA platform. The prototyped system robustly detects the relevant motion in real-time in live PAL (720 × 576 resolution video streams directly coming from the camera.

  7. Traffic Congestion Detection System through Connected Vehicles and Big Data

    Directory of Open Access Journals (Sweden)

    Néstor Cárdenas-Benítez

    2016-04-01

    Full Text Available This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  8. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  9. "They're doing people a service"-qualitative study of smoking, smuggling, and social deprivation.

    Science.gov (United States)

    Wiltshire, S; Bancroft, A; Amos, A; Parry, O

    2001-07-28

    To examine the behaviour and attitudes related to smoking and contraband tobacco products among smokers in two socially deprived areas. Cross sectional study with qualitative semistructured interviews, augmented by smokers' day grid. Two areas of socioeconomic deprivation in Edinburgh. 50 male and 50 female smokers aged 25-40 years randomly selected from general practitioners' lists from two health centres, each located in an area of deprivation. Most smokers wanted to quit but felt unable to because of the importance of smoking in their daily routine and their addiction to nicotine. Strategies for maintaining consumption levels in the face of increasing cigarette prices and low income included purchasing contraband cigarettes and tobacco. Vendors were contacted through social networks, family, and friends as well as common knowledge of people and places, particularly pubs where contraband was available. Most users of contraband considered that smugglers were providing a valuable service. Purchasing contraband tobacco was viewed as rational in the face of material hardship. Many smokers criticised the government for its high tobacco taxation and the lack of local services to help them to stop smoking. Smokers in deprived areas perceive a lack of support to help them to stop smoking. Cigarette and tobacco smuggling is therefore viewed positively by low income smokers as a way of dealing with the increasing cost of cigarettes. Smokers in areas of deprivation may thus show little support for tackling smuggling until more action is taken to deal with the material and personal factors that make it difficult for them to quit.

  10. Electromagnetic Signal Feedback Control for Proximity Detection Systems

    Science.gov (United States)

    Smith, Adam K.

    Coal is the most abundant fossil fuel in the United States and remains an essential source of energy. While more than half of coal production comes from surface mining, nearly twice as many workers are employed by underground operations. One of the key pieces of equipment used in underground coal mining is the continuous mining machine. These large and powerful machines are operated in confined spaces by remote control. Since 1984, 40 mine workers in the U. S. have been killed when struck or pinned by a continuous mining machine. It is estimated that a majority of these accidents could have been prevented with the application of proximity detection systems. While proximity detection systems can significantly increase safety around a continuous mining machine, there are some system limitations. Commercially available proximity warning systems for continuous mining machines use magnetic field generators to detect workers and establish safe work areas around the machines. Several environmental factors, however, can influence and distort the magnetic fields. To minimize these effects, a control system has been developed using electromagnetic field strength and generator current to stabilize and control field drift induced by internal and external environmental factors. A laboratory test set-up was built using a ferrite-core magnetic field generator to produce a stable magnetic field. Previous work based on a field-invariant magnetic flux density model, which generically describes the electromagnetic field, is expanded upon. The analytically established transferable shell-based flux density distribution model is used to experimentally validate the control system. By controlling the current input to the ferrite-core generator, a more reliable and consistent magnetic field is produced. Implementation of this technology will improve accuracy and performance of existing commercial proximity detection systems. These research results will help reduce the risk of traumatic

  11. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  12. Imaging of high-Z material for nuclear contraband detection with a minimal prototype of a muon tomography station based on GEM detectors

    Energy Technology Data Exchange (ETDEWEB)

    Gnanvo, Kondo, E-mail: kgnanvo@fit.edu [Department of Physics and Space Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States); Grasso, Leonard V.; Hohlmann, Marcus; Locke, Judson B.; Quintero, Amilkar [Department of Physics and Space Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States); Mitra, Debasis [Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States)

    2011-10-01

    Muon Tomography based on the measurement of multiple scattering of atmospheric cosmic ray muons in matter is a promising technique for detecting heavily shielded high-Z radioactive materials (U, Pu) in cargo or vehicles. The technique uses the deflection of cosmic ray muons in matter to perform tomographic imaging of high-Z material inside a probed volume. A Muon Tomography Station (MTS) requires position-sensitive detectors with high spatial resolution for optimal tracking of incoming and outgoing cosmic ray muons. Micro Pattern Gaseous Detector (MPGD) technologies such as Gas Electron Multiplier (GEM) detectors are excellent candidates for this application. We have built and operated a minimal MTS prototype based on 30 cmx30 cm GEM detectors for probing targets with various Z values inside the MTS volume. We report the first successful detection and imaging of medium-Z and high-Z targets of small volumes ({approx}0.03 L) using GEM-based Muon Tomography.

  13. Imaging of high-Z material for nuclear contraband detection with a minimal prototype of a muon tomography station based on GEM detectors

    International Nuclear Information System (INIS)

    Gnanvo, Kondo; Grasso, Leonard V.; Hohlmann, Marcus; Locke, Judson B.; Quintero, Amilkar; Mitra, Debasis

    2011-01-01

    Muon Tomography based on the measurement of multiple scattering of atmospheric cosmic ray muons in matter is a promising technique for detecting heavily shielded high-Z radioactive materials (U, Pu) in cargo or vehicles. The technique uses the deflection of cosmic ray muons in matter to perform tomographic imaging of high-Z material inside a probed volume. A Muon Tomography Station (MTS) requires position-sensitive detectors with high spatial resolution for optimal tracking of incoming and outgoing cosmic ray muons. Micro Pattern Gaseous Detector (MPGD) technologies such as Gas Electron Multiplier (GEM) detectors are excellent candidates for this application. We have built and operated a minimal MTS prototype based on 30 cmx30 cm GEM detectors for probing targets with various Z values inside the MTS volume. We report the first successful detection and imaging of medium-Z and high-Z targets of small volumes (∼0.03 L) using GEM-based Muon Tomography.

  14. Obstacle detection system for underground mining vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, P.; Polotski, V.; Piotte, M.; Melamed, F. [Ecole Polytechnique de Montreal, Montreal, PQ (Canada)

    1998-01-01

    A device for detecting obstacles by autonomous vehicles navigating in mine drifts is described. The device is based upon structured lighting and the extraction of relevant features from images of obstacles. The system uses image profile changes, ground and wall irregularities, disturbances of the vehicle`s trajectory, and impaired visibility to detect obstacles, rather than explicit three-dimensional scene reconstruction. 7 refs., 5 figs.

  15. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1983-10-01

    A research program is under way to evaluate and develop improve leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  16. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  17. Ground loops detection system in the RFX machine

    International Nuclear Information System (INIS)

    Bellina, F.; Pomaro, N.; Trevisan, F.

    1996-01-01

    RFX is a toroidal machine for the fusion research based on the RFP configuration. During the pulse, in any conductive loop close to the machine very strong currents can be induced, which may damage the diagnostics and the other instrumentation. To avoid loops, the earthing system of the machine is tree-shaped. However, an accidental contact between metallic earthed masses of the machine may give rise to an unwanted loop as well. An automatic system for the detection of ground loops in the earthing system has therefore been developed, which works continuously during shutdown intervals and between pulses. In the paper the design of the detection system is presented, together with the experimental results on prototypes. 4 refs., 3 figs., 1 tab

  18. ANOLE Portable Radiation Detection System Field Test and Evaluation Campaign

    International Nuclear Information System (INIS)

    Hodge, Chris A.

    2007-01-01

    Handheld, backpack, and mobile sensors are elements of the Global Nuclear Detection System for the interdiction and control of illicit radiological and nuclear materials. They are used by the U.S. Department of Homeland Security (DHS) and other government agencies and organizations in various roles for border protection, law enforcement, and nonproliferation monitoring. In order to systematically document the operational performance of the common commercial off-the-shelf portable radiation detection systems, the DHS Domestic Nuclear Detection Office conducted a test and evaluation campaign conducted at the Nevada Test Site from January 18 to February 27, 2006. Named 'Anole', it was the first test of its kind in terms of technical design and test complexities. The Anole test results offer users information for selecting appropriate mission-specific portable radiation detection systems. The campaign also offered manufacturers the opportunity to submit their equipment for independent operationally relevant testing to subsequently improve their detector performance. This paper will present the design, execution, and methodologies of the DHS Anole portable radiation detection system test campaign

  19. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  20. Development of mobile radiation detection system against nuclear terrorism in Korea

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Chang, Sung-Soon; Yoo, Ho-Sik

    2011-01-01

    A fixed radiation portal monitors (RPM) deployed at border, seaport, airport or key traffic checkpoints has played an important role in preventing the illicit trafficking and transport of nuclear and radioactive materials. However, the RPM usually is large and heavy and can't easily be moved to a different location. An intelligent terrorist may also circumvent the fixed RPM to avoid being detected. These reasons motivate us to develop a mobile radiation detection system. The objective of this paper is to report our experience on developing the mobile radiation detection system for the search and detection of nuclear and radioactive materials during road transport. Measurements were performed at various speeds and distances between the radioactive isotope (RI) transporting car and the measurement car. Results of our measurements and the detection limits of the system is described in this paper. The mobile radiation detection system developed should contribute to defending public's health and safety and the environment against nuclear and radiological terrorism by detecting nuclear or radioactive material hidden illegally in a vehicle. (author)

  1. Best Practices for Fuel System Contamination Detection and Remediation

    Science.gov (United States)

    2016-01-15

    The University of Dayton Research Institute Best Practices for Fuel System Contamination Detection and Remediation Final Report Marlin D... Remediation Executive Summary: Fuel contamination is a broad term commonly applied to anything that causes a fuel test to fail quality assurance...Statement A: Approved for public release: distribution unlimited. 1 Best Practices for Fuel System Contamination Detection and Remediation Contents

  2. “They're doing people a service”—qualitative study of smoking, smuggling, and social deprivation

    Science.gov (United States)

    Wiltshire, Susan; Bancroft, Angus; Amos, Amanda; Parry, Odette

    2001-01-01

    Objectives To examine the behaviour and attitudes related to smoking and contraband tobacco products among smokers in two socially deprived areas. Design Cross sectional study with qualitative semistructured interviews, augmented by smokers' day grid. Setting Two areas of socioeconomic deprivation in Edinburgh. Participants 50 male and 50 female smokers aged 25-40 years randomly selected from general practitioners' lists from two health centres, each located in an area of deprivation. Results Most smokers wanted to quit but felt unable to because of the importance of smoking in their daily routine and their addiction to nicotine. Strategies for maintaining consumption levels in the face of increasing cigarette prices and low income included purchasing contraband cigarettes and tobacco. Vendors were contacted through social networks, family, and friends as well as common knowledge of people and places, particularly pubs where contraband was available. Most users of contraband considered that smugglers were providing a valuable service. Purchasing contraband tobacco was viewed as rational in the face of material hardship. Many smokers criticised the government for its high tobacco taxation and the lack of local services to help them to stop smoking. Conclusions Smokers in deprived areas perceive a lack of support to help them to stop smoking. Cigarette and tobacco smuggling is therefore viewed positively by low income smokers as a way of dealing with the increasing cost of cigarettes. Smokers in areas of deprivation may thus show little support for tackling smuggling until more action is taken to deal with the material and personal factors that make it difficult for them to quit. What is already known on this topicAreas of deprivation have the highest rates of smoking and lowest levels of cessationAround 25-30% of cigarettes consumed in the United Kingdom are contrabandWe know little about the attitudes of smokers in these areas to smuggled cigarettes or whether and

  3. Evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1988-01-01

    U.S. Nuclear Regulatory Commission Guide 1.45 recommends the use of at least three different detection methods in reactors to detect leakage. Monitoring of both sump-flow and airborne particulate radioactivity is mandatory. A third method can involve either monitoring of condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity. Although the methods currently used for leak detection reflect the state of the art, other techniques may be developed and used. Since the recommendations of Regulatory Guide 1.45 are not mandatory, Licensee Event Report Compilations have been reviewed to help establish actual capabilities for leak detection. The review of event reports, which had previously covered the period of June 1985 to August 1986 has been extended, and now covers events to June 1987. The total number of significant events is now 83. These reports have provided documented, sometimes detailed, summaries of reactor leaks. They have helped establish the capabilities of existing systems to detect and locate leaks. Differences between PWRs and BWRs with regard to leak detection have now been analyzed. With regard to detection methods, the greatest differences between reactor types are as follows: (a) The sump pump is reported as the detection method more frequently in BWRs than in PWRs (64% vs. 35%). (b) The radiation monitor is reported as the detection method (excluding false alarms) more frequently in PWRs. Current efforts at Argonne National Laboratory (ANL) to evaluate advanced acoustic leak detection methods are directed toward the generation and analysis of acoustic data from large (0.5 to 10 gal/min) leaks and modification of the software of the GARD/ANL advanced acoustic leak detection system. In order to reach the goal of 10 gal/min leaks, the Steam Generator Test Facility at ANL has been modified to carry out the leak testing. Tests were carried out with water at 525 deg. F and 1100 psi leaking through a fatigue crack in a 4-in

  4. Error detection and prevention in Embedded Systems Software

    DEFF Research Database (Denmark)

    Kamel, Hani Fouad

    1996-01-01

    Despite many efforts to structure the development and design processes of embedded systems, errors are discovered at the final stages of production and sometimes after the delivery of the products. The cost of such errors can be prohibitive.Different design techniques to detect such errors...... systems, a formal model for such systems is introduced. The main characteristics of embedded systems design and the interaction of these properties are described. A taxonomy for the structure of the software developed for such systems based on the amount of processes and processors involved is presented.......The second part includes methods and techniques to detect software design errors.The third part deals with error prevention. It starts with a presentation of different models of the development processes used in industry and taught at universities. This leads us to deduce the major causes of errors...

  5. Luciferase-Zinc-Finger System for the Rapid Detection of Pathogenic Bacteria.

    Science.gov (United States)

    Shi, Chu; Xu, Qing; Ge, Yue; Jiang, Ling; Huang, He

    2017-08-09

    Rapid and reliable detection of pathogenic bacteria is crucial for food safety control. Here, we present a novel luciferase-zinc finger system for the detection of pathogens that offers rapid and specific profiling. The system, which uses a zinc-finger protein domain to probe zinc finger recognition sites, was designed to bind the amplified conserved regions of 16S rDNA, and the obtained products were detected using a modified luciferase. The luciferase-zinc finger system not only maintained luciferase activity but also allowed the specific detection of different bacterial species, with a sensitivity as low as 10 copies and a linear range from 10 to 10 4 copies per microliter of the specific PCR product. Moreover, the system is robust and rapid, enabling the simultaneous detection of 6 species of bacteria in artificially contaminated samples with excellent accuracy. Thus, we envision that our luciferase-zinc finger system will have far-reaching applications.

  6. Change-Point Detection Method for Clinical Decision Support System Rule Monitoring.

    Science.gov (United States)

    Liu, Siqi; Wright, Adam; Hauskrecht, Milos

    2017-06-01

    A clinical decision support system (CDSS) and its components can malfunction due to various reasons. Monitoring the system and detecting its malfunctions can help one to avoid any potential mistakes and associated costs. In this paper, we investigate the problem of detecting changes in the CDSS operation, in particular its monitoring and alerting subsystem, by monitoring its rule firing counts. The detection should be performed online, that is whenever a new datum arrives, we want to have a score indicating how likely there is a change in the system. We develop a new method based on Seasonal-Trend decomposition and likelihood ratio statistics to detect the changes. Experiments on real and simulated data show that our method has a lower delay in detection compared with existing change-point detection methods.

  7. A new detection system for extremely small vertically mounted cantilevers

    International Nuclear Information System (INIS)

    Antognozzi, M; Ulcinas, A; Picco, L; Simpson, S H; Miles, M J; Heard, P J; Szczelkun, M D; Brenner, B

    2008-01-01

    Detection techniques currently used in scanning force microscopy impose limitations on the geometrical dimensions of the probes and, as a consequence, on their force sensitivity and temporal response. A new technique, based on scattered evanescent electromagnetic waves (SEW), is presented here that can detect the displacement of the extreme end of a vertically mounted cantilever. The resolution of this method is tested using different cantilever sizes and a theoretical model is developed to maximize the detection sensitivity. The applications presented here clearly show that the SEW detection system enables the use of force sensors with sub-micron size, opening new possibilities in the investigation of biomolecular systems and high speed imaging. Two types of cantilevers were successfully tested: a high force sensitivity lever with a spring constant of 0.17 pN nm -1 and a resonant frequency of 32 kHz; and a high speed lever with a spring constant of 50 pN nm -1 and a resonant frequency of 1.8 MHz. Both these force sensors were fabricated by modifying commercial microcantilevers in a focused ion beam system. It is important to emphasize that these modified cantilevers could not be detected by the conventional optical detection system used in commercial atomic force microscopes

  8. Networked gamma radiation detection system for tactical deployment

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  9. Final evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Carlson, R.; Brewer, W.; Lanham, R.

    1989-01-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed

  10. System and Method for Outlier Detection via Estimating Clusters

    Science.gov (United States)

    Iverson, David J. (Inventor)

    2016-01-01

    An efficient method and system for real-time or offline analysis of multivariate sensor data for use in anomaly detection, fault detection, and system health monitoring is provided. Models automatically derived from training data, typically nominal system data acquired from sensors in normally operating conditions or from detailed simulations, are used to identify unusual, out of family data samples (outliers) that indicate possible system failure or degradation. Outliers are determined through analyzing a degree of deviation of current system behavior from the models formed from the nominal system data. The deviation of current system behavior is presented as an easy to interpret numerical score along with a measure of the relative contribution of each system parameter to any off-nominal deviation. The techniques described herein may also be used to "clean" the training data.

  11. The Prototype of Real-time Object Detection System Based on SMS

    Directory of Open Access Journals (Sweden)

    M. Hana Mirza

    2010-08-01

    Full Text Available The powerful algorithm to detect object movement in development of room monitoring system is very urgent. The commond algorithm needs complex computation. In this research, the prototype of real-time object detection system using simple algorithm is developed, i.e. using the determination of the max noise/pixel value and the tolerance threshold of image accurately, and then the system automatically send a SMS (short message services to user when the object movement is detected. The developed prototype used a Logitech QuickCam webcam, a Siemens C45 mobile phone and a data cable, and the Borland Delphi 7 with additional components and Serial PortNG Tvideo as system software. The application also includes a database to store the captured images whenever object movement is detected. The test results by varying conditions of light intensities using a 5-watt light bulb, fluorescent lamp 20 and 40 watts indicate that the application is able to automatically detect the presence of moving objects with 100% success rate. The success rate is strongly influenced by the determination of the max noise/pixel value and the tolerance threshold during system configuration. This application is also capable of sending SMS automatically when the system detects a moving object with an average time of 8.35 seconds.

  12. The All Terrain Bio nano Gear for Space Radiation Detection System

    International Nuclear Information System (INIS)

    Ummat, Ajay; Mavroidis, Constantinos

    2007-01-01

    This paper discusses about the relevance of detecting space radiations which are very harmful and pose numerous health issues for astronauts. There are many ways to detect radiations, but we present a non-invasive way of detecting them in real-time while an astronaut is in the mission. All Terrain Bio-nano (ATB) gear system is one such concept where we propose to detect various levels of space radiations depending on their intensity and warn the astronaut of probable biological damage. A basic framework for radiation detection system which utilizes bio-nano machines is discussed. This radiation detection system is termed as 'radiation-responsive molecular assembly' (RMA) for the detection of space radiations. Our objective is to create a device which could detect space radiations by creating an environment equivalent to human cells within its structure and bio-chemically sensing the effects induced therein. For creating such an environment and further bio-chemically sensing space radiations bio-nano systems could be potentially used. These bio-nano systems could interact with radiations and signal based on the intensity of the radiations their relative biological effectiveness. Based on the energy and kind of radiation encountered, a matrix of signals has to be created which corresponds to a particular biological effect. The key advantage of such a design is its ability to interact with the radiation at e molecular scale; characterize its intensity based on energy deposition and relate it to the relative biological effectiveness based on the correspondence established through molecular structures and bond strengths of the bio-nano system

  13. Using Physical Models for Anomaly Detection in Control Systems

    Science.gov (United States)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  14. ALGORITHMS FOR OPTIMIZATION OF SYSYTEM PERFORMANCE IN LAYERED DETECTION SYSTEMS UNDER DETECTOR COORELATION

    International Nuclear Information System (INIS)

    Wood, Thomas W.; Heasler, Patrick G.; Daly, Don S.

    2010-01-01

    Almost all of the 'architectures' for radiation detection systems in Department of Energy (DOE) and other USG programs rely on some version of layered detector deployment. Efficacy analyses of layered (or more generally extended) detection systems in many contexts often assume statistical independence among detection events and thus predict monotonically increasing system performance with the addition of detection layers. We show this to be a false conclusion for the ROC curves typical of most current technology gamma detectors, and more generally show that statistical independence is often an unwarranted assumption for systems in which there is ambiguity about the objects to be detected. In such systems, a model of correlation among detection events allows optimization of system algorithms for interpretation of detector signals. These algorithms are framed as optimal discriminant functions in joint signal space, and may be applied to gross counting or spectroscopic detector systems. We have shown how system algorithms derived from this model dramatically improve detection probabilities compared to the standard serial detection operating paradigm for these systems. These results would not surprise anyone who has confronted the problem of correlated errors (or failure rates) in the analogous contexts, but is seems to be largely underappreciated among those analyzing the radiation detection problem - independence is widely assumed and experimental studies typical fail to measure correlation. This situation, if not rectified, will lead to several unfortunate results. Including overconfidence in system efficacy, overinvestment in layers of similar technology, and underinvestment in diversity among detection assets.

  15. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  16. Neutron-based techniques for detection of explosives and drugs

    International Nuclear Information System (INIS)

    Kiraly, B.; Olah, L.; Csikai, G.J.

    2000-01-01

    Neutron reflection, scattering and transmission methods combined with the detection of characteristic gamma rays have an increasing role in the identification of hidden explosives, illicit drugs and other contraband materials. There are about 100 million land mines buried in some 70 countries. Among the abandoned anti-personnel land mines (APL) certain types have low mass (about 100 g) and contain little or no metal. Therefore, these plastic APL cannot be detected by the usual metal detectors. The IAEA Physics Section has organized a CRP in 1999 for the development of novel methods in order to speed up the removing process of APL. The transportation of illicit drugs has shown an increasing trend during the last decade. Developments of fast, non-destructive interrogation methods are required for the inspection of cargo containers, trucks and airline baggage. The major constituents of plastic APL and drugs are H, C, N and O which can be identified by the different neutron interactions. The atom fractions of these elements, in particular the C/O, C/N and C/H ratios, are quite different for drugs and explosives as compared to other materials used to hide them. Recently, we have carried out systematic measurements and calculations on the neutron fields from the 9 Be(d,n), 2 H(d,n), 252 Cf and Pu-Be sources passing through different bulky samples, on the possible use of elastically backscattered Pu-Be neutrons in elemental analysis and on the advantages and limitations of the thermal neutron reflection method in the identification of land mines and illicit drugs. The measured spectral shapes of neutrons were compared with the calculated results using the MCNP-4A and MCNP-4B codes. (author)

  17. An Android malware detection system based on machine learning

    Science.gov (United States)

    Wen, Long; Yu, Haiyang

    2017-08-01

    The Android smartphone, with its open source character and excellent performance, has attracted many users. However, the convenience of the Android platform also has motivated the development of malware. The traditional method which detects the malware based on the signature is unable to detect unknown applications. The article proposes a machine learning-based lightweight system that is capable of identifying malware on Android devices. In this system we extract features based on the static analysis and the dynamitic analysis, then a new feature selection approach based on principle component analysis (PCA) and relief are presented in the article to decrease the dimensions of the features. After that, a model will be constructed with support vector machine (SVM) for classification. Experimental results show that our system provides an effective method in Android malware detection.

  18. Radiation Detection System for Prevention of Radiological and Nuclear Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Yoo, Ho-Sik; Jang, Sung-Sun; Kim, Jae-Kwang; Kim, Jung-Soo

    2007-01-01

    After the September 11 terrorist attack, the threat of a potential for a radiological or nuclear terrorist attack became more apparent. The threats relating to radiological or nuclear materials include a Radiological Dispersion Device (RDD), an Improved Nuclear Device (IND) or a State Nuclear Device (such as a Soviet manufactured suitcase nuclear weapon). For more effective countermeasures against the disaster, multilayer protection concept - prevention of smuggling of radioactive or nuclear material into our country through seaports or airports, detection and prevention of the threat materials in transit on a road, and prevention of their entry into a target building - is recommended. Due to different surrounding circumstances of where detection system is deployed, different types of radiation detection systems are required. There have been no studies on characteristics of detection equipment required under Korean specific conditions. This paper provides information on technical requirements of radiation detection system to achieve multi-layer countermeasures for the purpose of protecting the public and environment against radiological and nuclear terrorism

  19. System and method for detecting a faulty object in a system

    Science.gov (United States)

    Gunnels, John A.; Gustavson, Fred Gehrung; Engle, Robert Daniel

    2010-12-14

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  20. Accelerator requirements for fast-neutron interrogation of luggage and cargo

    International Nuclear Information System (INIS)

    Micklich, B.J.; Fink, C.L.; Yule, T.J.

    1995-01-01

    Several different fast-neutron based techniques are being studied for the detection of contraband substances in luggage and cargo containers. The present work discusses the accelerator requirements for fast-neutron transmission spectroscopy (FNTS), pulsed fast-neutron analysis (PFNA), and 14-MeV neutron interrogation. These requirements are based on the results of Monte-Carlo simulations of neutron or gamma detection rates. Accelerator requirements are driven by count-rate considerations, spatial resolution and acceptable uncertainties in elemental compositions. The authors have limited their analyses to luggage inspection with FNTS and to cargo inspection with PFNA or 14-MeV neutron interrogation

  1. Quench detection system of the EURATOM coil for the Large Coil Task

    International Nuclear Information System (INIS)

    Noether, G.; Gauss, S.; Maurer, W.; Siewerdt, L.; Ulbricht, A.; Wuechner, F.

    1989-01-01

    A special quench detection system has been developed for the EURATOM Large Coil Task (LCT) coil. The system is based on a bridge circuit which uses a special 'two in hand' winding technique for the pancakes of the EURATOM LCT coil. The electronic circuit was designed in a fail safe way to prevent failure of the quench detector due to failure of one of its components. A method for quick balancing of the quench detection system in a large toroidal magnet system was applied. The quench detection system worked very reliably during the experimental phase of the LCT and was within the quench detection level setting of 50 mV, i.e. the system was not sensitive to poloidal field transients at or below this level. Non-electrical methods for quench detection were also investigated. (author)

  2. Leak detection systems for uranium mill tailings impoundments with synthetic liners

    International Nuclear Information System (INIS)

    Myers, D.A.; Tyler, S.W.; Gutknecht, P.J.; Mitchell, D.H.

    1983-09-01

    This study evaluated the performance of existing and alternative leak detection systems for lined uranium mill tailings ponds. Existing systems for detecting leaks at uranium mill tailings ponds investigated in this study included groundwater monitoring wells, subliner drains, and lysimeters. Three alternative systems which demonstrated the ability to locate leaks in bench-scale tests included moisture blocks, soil moisture probes, and a soil resistivity system. Several other systems in a developmental stage are described. For proper performance of leak detection systems (other than groundwater wells and lysimeters), a subgrade is required which assures lateral dispersion of a leak. Methods to enhance dispersion are discussed. Cost estimates were prepared for groundwater monitoring wells, subliner drain systems, and the three experimental systems. Based on the results of this report, it is suggested that groundwater monitoring systems be used as the primary means of leak detection. However, if a more responsive system is required due to site characteristics and groundwater quality criteria, subliner drains are applicable for ponds with uncovered liners. Leak-locating systems for ponds with covered liners require further development. Other recommendations are discussed in the report

  3. Near-infrared laser, time domain, breast tumour detection system

    International Nuclear Information System (INIS)

    Joblin, A.J.

    1996-01-01

    Full text: The use of near-infrared laser, time domain techniques have been proposed for some time now as an alternative to X-ray mammography, as a means of mass screening for breast disease. The great driving force behind this research has been that near-infrared photons are a non-ionising radiation, which affords a greater degree of patient safety than when using X-rays. This would mean that women at risk of breast disease could be screened with a near-infrared laser imaging system, much more regularly than with an X-ray mammography system, which should allow for the earlier detection and treatment of breast disease. This paper presents a theoretical investigation of the performance of a near-infrared, time domain breast imaging system. The performance of the imaging system is characterised by the resolution and contrast parameters, which were studied using a numerical finite difference calculation method. The finite difference method is used to solve the diffusion equation for the photon transport through the inhomogeneous breast tissue medium. Optimal performance was found to be obtained with short photon times of flight. However the signal to noise ratio decreases rapidly as the photon time of flight is decreased. The system performance will therefore be limited by the noise equivalent power of the time resolved detection system, which is the signal incident on the time resolved detection system which gives a signal to noise ratio of 1:1. Photon times of flight shorter than 500 ps are not practical with current technology, which places limits on the resolution and contrast. The photon signal throughput can be increased by increasing the size of the laser beam width, by increasing the size of the aperture stop of the detector, by increasing the laser pulse duration or decreasing the detector time resolution. Best system performance is found by optimising these parameters for a given time gating and detector system characteristic (NEP). It was found that the

  4. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  5. Design of Weft Detection System in The Stenter Machine

    Science.gov (United States)

    Gu, Minming; Xu, Xianju; Dai, Wenzhan

    2017-12-01

    In order to build an effective automatic weft-straightening system, it is important for the sensing device to detect most the possible fabric styles, designs, colours and structures, an optical sensing system that detects the angular orientation of weft threads in a moving web of a textile has been built. It contains an adjustable light source, two lens systems and photodiode sensor array. The sensor array includes 13 radial pattern of photosensitive areas that each generate an electrical signal proportional to the total intensity of the light incident on the area. The moving shadow of a weft thread passing over the area will modulate the output signal. A signal processed circuit was built to do the I/V conversion, amplifying, hardware filtering. An embed micro control system then deals with the information of these signals, calculates the angle of the weft drew. Finally, the experiments were done, the results showed that the weft detection system can deal with the fabric weft skew up to 30° and has achieved good results in the application.

  6. System to detect nuclear materials by active neutron method

    International Nuclear Information System (INIS)

    Koroev, M.; Korolev, Yu.; Lopatin, Yu.; Filonov, V.

    1999-01-01

    The report presents the results of the development of the system to detect nuclear materials by active neutron method measuring delayed neutrons. As the neutron source the neutron generator was used. The neutron generator was controlled by the system. The detectors were developed on the base of the helium-3 counters. Each detector consist of 6 counters. Using a number of such detectors it is possible to verify materials stored in different geometry. There is an spectrometric scintillator detector in the system which gives an additional functional ability to the system. The system could be used to estimate the nuclear materials in waste, to detect the unauthorized transfer of the nuclear materials, to estimate the material in tubes [ru

  7. Structural material anomaly detection system using water chemistry data

    International Nuclear Information System (INIS)

    Asakura, Yamato; Nagase, Makoto; Uchida, Shunsuke; Ohsumi, Katsumi.

    1992-01-01

    The concept of an advanced water chemistry diagnosis system for detection of anomalies and preventive maintenance of system components is proposed and put into a concrete form. Using the analogy to a medical inspection system, analyses of water chemistry change will make it possible to detect symptoms of anomalies in system components. Then, correlations between water chemistry change and anomaly occurrence in the components of the BWR primary cooling system are analyzed theoretically. These fragmentary correlations are organized and reduced to an algorithm for the on-line diagnosis system using on-line monitoring data, pH and conductivity. By using actual plant data, the on-line diagnosis model system is verified to be applicable for early and automatic finding of the anomaly cause and for timely supply of much diagnostic information to plant operators. (author)

  8. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  9. Ultra-Low Power Sensor System for Disaster Event Detection in Metro Tunnel Systems

    Directory of Open Access Journals (Sweden)

    Jonah VINCKE

    2017-05-01

    Full Text Available In this extended paper, the concept for an ultra-low power wireless sensor network (WSN for underground tunnel systems is presented highlighting the chosen sensors. Its objectives are the detection of emergency events either from natural disasters, such as flooding or fire, or from terrorist attacks using explosives. Earlier works have demonstrated that the power consumption for the communication can be reduced such that the data acquisition (i.e. sensor sub-system becomes the most significant energy consumer. By using ultra-low power components for the smoke detector, a hydrostatic pressure sensor for water ingress detection and a passive acoustic emission sensor for explosion detection, all considered threats are covered while the energy consumption can be kept very low in relation to the data acquisition. In addition to 1 the sensor system is integrated into a sensor board. The total average power consumption for operating the sensor sub-system is measured to be 35.9 µW for lower and 7.8 µW for upper nodes.

  10. A Design of Portable Pesticide Residue Detection System Based on the Enzyme Electrode

    Directory of Open Access Journals (Sweden)

    Xia SUN

    2013-03-01

    Full Text Available In this paper, a portable detection system was designed based on amperometric acetylcholinesterase biosensor for rapidly detecting pesticide residues in fruits and vegetables. There were potentiostat, three electrode system, differential amplification circuit and double integral analog to digital (A/D circuit modules in this system. The measurement principle of this system was depended on the weak current from enzyme catalyzing substrate in acetylcholinesterase biosensor for detecting pesticide residues. The weak current generated by the enzyme biosensor was changed into 0-5 V standard voltage signal by this system as an output signal. The proposed system was investigated with eight kinds of standard pesticide of different concentrations, the results showed that the detection limits were all lower than 10 ng/kg. Thus, a new effective home-made system of detecting pesticide residues with portable, easy-to-use, fast response was developed. The pesticide residues rapid detection system can collect the weak current signal generated by electrochemical reaction and on-site detect the concentration of pesticide residues in real fruits and vegetables samples.

  11. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  12. Beat frequency ultrasonic microsphere contrast agent detection system

    Science.gov (United States)

    Pretlow, III, Robert A. (Inventor); Yost, William T. (Inventor); Cantrell, Jr., John H. (Inventor)

    1997-01-01

    A system for and method of detecting and measuring concentrations of an ultrasonically-reflective microsphere contrast agent involving detecting non-linear sum and difference beat frequencies produced by the microspheres when two impinging signals with non-identical frequencies are combined by mixing. These beat frequencies can be used for a variety of applications such as detecting the presence of and measuring the flow rates of biological fluids and industrial liquids, including determining the concentration level of microspheres in the myocardium.

  13. Consideration on developing of leaked inflammable gas detection system for HTGR hydrogen production system

    International Nuclear Information System (INIS)

    Nishihara, Tetsuo; Nakamura, Masashi

    1999-09-01

    One of most important safety design issues for High Temperature Gas-cooled Reactor (HTGR) - Hydrogen Production System (HTGR-HPS) is to ensure reactor safety against fire and explosion at the hydrogen production plant. The inflammable gas mixture in the HTGR-HPS does not use oxygen in any condition and are kept in high pressure in the normal operation. The piping system and/or heat transfer tubes which have the potential possibility of combustible materials ingress into the Reactor Building (R/B) due to the failure are designed to prevent the failure against any events. Then, it is not necessary to consider their self-combustion in vessels nor leakage in the R/B. The only one case which we must consider is the ex-building fire or explosion caused by their leakage from piping or vessel. And it is important to mitigate their effects by means of early detection of gas leakage. We investigated our domestic standards on gas detection, applications of gas detectors, their detection principles, performance, sensitivity, reliability, their technical trends, and so on. We proposed three gas detection systems which may be applied in HTGR-HPS. The first one is the universal solid sensor system; it may be applied when there is no necessity to request their safety credits. The second is the combination of the improved solid sensor system and enhanced beam detector system; it may be applied when it is necessary to request their safety credit. And the third is the combination of the universal solid sensor system and the existing beam detector system; it may be applied when the plant owner request higher detector sensitivity than usual, from the view point of public acceptance, though there is not necessity to request their safety credits. To reduce the plant cost by refusing of safety credits to the gas leakage detection system, we proposed that the equipment required to isolate from others should be installed in the inertrized compartments. (author)

  14. Multiple-Parameter, Low-False-Alarm Fire-Detection Systems

    Science.gov (United States)

    Hunter, Gary W.; Greensburg, Paul; McKnight, Robert; Xu, Jennifer C.; Liu, C. C.; Dutta, Prabir; Makel, Darby; Blake, D.; Sue-Antillio, Jill

    2007-01-01

    Fire-detection systems incorporating multiple sensors that measure multiple parameters are being developed for use in storage depots, cargo bays of ships and aircraft, and other locations not amenable to frequent, direct visual inspection. These systems are intended to improve upon conventional smoke detectors, now used in such locations, that reliably detect fires but also frequently generate false alarms: for example, conventional smoke detectors based on the blockage of light by smoke particles are also affected by dust particles and water droplets and, thus, are often susceptible to false alarms. In contrast, by utilizing multiple parameters associated with fires, i.e. not only obscuration by smoke particles but also concentrations of multiple chemical species that are commonly generated in combustion, false alarms can be significantly decreased while still detecting fires as reliably as older smoke-detector systems do. The present development includes fabrication of sensors that have, variously, micrometer- or nanometer-sized features so that such multiple sensors can be integrated into arrays that have sizes, weights, and power demands smaller than those of older macroscopic sensors. The sensors include resistors, electrochemical cells, and Schottky diodes that exhibit different sensitivities to the various airborne chemicals of interest. In a system of this type, the sensor readings are digitized and processed by advanced signal-processing hardware and software to extract such chemical indications of fires as abnormally high concentrations of CO and CO2, possibly in combination with H2 and/or hydrocarbons. The system also includes a microelectromechanical systems (MEMS)-based particle detector and classifier device to increase the reliability of measurements of chemical species and particulates. In parallel research, software for modeling the evolution of a fire within an aircraft cargo bay has been developed. The model implemented in the software can

  15. Object detection system based on multimodel saliency maps

    Science.gov (United States)

    Guo, Ya'nan; Luo, Chongfan; Ma, Yide

    2017-03-01

    Detection of visually salient image regions is extensively applied in computer vision and computer graphics, such as object detection, adaptive compression, and object recognition, but any single model always has its limitations to various images, so in our work, we establish a method based on multimodel saliency maps to detect the object, which intelligently absorbs the merits of various individual saliency detection models to achieve promising results. The method can be roughly divided into three steps: in the first step, we propose a decision-making system to evaluate saliency maps obtained by seven competitive methods and merely select the three most valuable saliency maps; in the second step, we introduce heterogeneous PCNN algorithm to obtain three prime foregrounds; and then a self-designed nonlinear fusion method is proposed to merge these saliency maps; at last, the adaptive improved and simplified PCNN model is used to detect the object. Our proposed method can constitute an object detection system for different occasions, which requires no training, is simple, and highly efficient. The proposed saliency fusion technique shows better performance over a broad range of images and enriches the applicability range by fusing different individual saliency models, this proposed system is worthy enough to be called a strong model. Moreover, the proposed adaptive improved SPCNN model is stemmed from the Eckhorn's neuron model, which is skilled in image segmentation because of its biological background, and in which all the parameters are adaptive to image information. We extensively appraise our algorithm on classical salient object detection database, and the experimental results demonstrate that the aggregation of saliency maps outperforms the best saliency model in all cases, yielding highest precision of 89.90%, better recall rates of 98.20%, greatest F-measure of 91.20%, and lowest mean absolute error value of 0.057, the value of proposed saliency evaluation

  16. Using ionising radiation against terrorism and contrabandism - dosimetric problems

    International Nuclear Information System (INIS)

    Ankerhold, U.; Hupe, O.; Buchholz, G.

    2006-01-01

    As will be explained in more detail in a talk at this conference, the personnel X-ray scanners can be divided into two groups, one using the transmitted X rays for image creation, the other one using the Compton back scatters X-rays. In the case of a backscatter scanner, a narrow, pencil -like X-ray beam is produced by a rotating chopper-wheel. The person/object is scanned in a raster scan pattern. The backscattered X-rays of all points are measured and recorded. The transmission X-ray scanner can use both fan-like and pencil like X-ray beams. The transmission detectors are installed behind the object and detect the absorption of the scanned person. Due to the very low dose values of the X-ray scanner systems in combination with a high dose rate in the direct beam for a short irradiation time, special dosemeters have to be used. In the literature and in manufacturers' specifications, the dose values given for some systems are in the range from 0.05 μSv to 5 μSv per scan with a typical irradiation time of a few milliseconds. Due to this pulse-like character of the radiation fields, the dose rate is several sieverts per hour. For the measurements of the investigated scanner, dosemeters were therefore needed having the capability to measure low doses at high dose rates and to measure in pulsed radiation fields. For the optimization of the measurements, the use of measuring devices with a direct indication is necessary. Ionisation chambers are the most suitable measuring instruments to fulfill these requirements. The difficulty for the measurements with an ionisation chamber is that the leakage charge integrated over time can reach values at the level of the expected radiation-produced charge. Additionally unpredictable variations of the leakage charge can be in the same order of magnitude as the expected signal. This challenge led to the development of a special electronics which allow the execution of time-resolved measurements. With this time resolution, it is

  17. Detection of forced oscillations in power systems with multichannel methods

    Energy Technology Data Exchange (ETDEWEB)

    Follum, James D. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2015-09-30

    The increasing availability of high fidelity, geographically dispersed measurements in power systems improves the ability of researchers and engineers to study dynamic behaviors in the grid. One such behavior that is garnering increased attention is the presence of forced oscillations. Power system engineers are interested in forced oscillations because they are often symptomatic of the malfunction or misoperation of equipment. Though the resulting oscillation is not always large in amplitude, the root cause may be serious. In this report, multi-channel forced oscillation detection methods are developed. These methods leverage previously developed detection approaches based on the periodogram and spectral-coherence. Making use of geographically distributed channels of data is shown to improved detection performance and shorten the delay before an oscillation can be detected in the online environment. Results from simulated and measured power system data are presented.

  18. Digital tripwire: a small automated human detection system

    Science.gov (United States)

    Fischer, Amber D.; Redd, Emmett; Younger, A. Steven

    2009-05-01

    A low cost, lightweight, easily deployable imaging sensor that can dependably discriminate threats from other activities within its field of view and, only then, alert the distant duty officer by transmitting a visual confirmation of the threat would provide a valuable asset to modern defense. At present, current solutions suffer from a multitude of deficiencies - size, cost, power endurance, but most notably, an inability to assess an image and conclude that it contains a threat. The human attention span cannot maintain critical surveillance over banks of displays constantly conveying such images from the field. DigitalTripwire is a small, self-contained, automated human-detection system capable of running for 1-5 days on two AA batteries. To achieve such long endurance, the DigitalTripwire system utilizes an FPGA designed with sleep functionality. The system uses robust vision algorithms, such as a partially unsupervised innovative backgroundmodeling algorithm, which employ several data reduction strategies to operate in real-time, and achieve high detection rates. When it detects human activity, either mounted or dismounted, it sends an alert including images to notify the command center. In this paper, we describe the hardware and software design of the DigitalTripwire system. In addition, we provide detection and false alarm rates across several challenging data sets demonstrating the performance of the vision algorithms in autonomously analyzing the video stream and classifying moving objects into four primary categories - dismounted human, vehicle, non-human, or unknown. Performance results across several challenging data sets are provided.

  19. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  20. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  1. Observer-based Fault Detection and Isolation for Nonlinear Systems

    DEFF Research Database (Denmark)

    Lootsma, T.F.

    With the rise in automation the increase in fault detectionand isolation & reconfiguration is inevitable. Interest in fault detection and isolation (FDI) for nonlinear systems has grown significantly in recent years. The design of FDI is motivated by the need for knowledge about occurring faults...... in fault-tolerant control systems (FTC systems). The idea of FTC systems is to detect, isolate, and handle faults in such a way that the systems can still perform in a required manner. One prefers reduced performance after occurrence of a fault to the shut down of (sub-) systems. Hence, the idea of fault......-output decoupling is described. It is a new idea based on the solution of the input-output decoupling problem. The idea is to include FDI considerations already during the control design....

  2. Evaluation of video detection systems, volume 1 : effects of configuration changes in the performance of video detection systems.

    Science.gov (United States)

    2009-10-01

    The effects of modifying the configuration of three video detection (VD) systems (Iteris, Autoscope, and Peek) : are evaluated in daytime and nighttime conditions. Four types of errors were used: false, missed, stuck-on, and : dropped calls. The thre...

  3. Digital detection systems for projection radiography

    International Nuclear Information System (INIS)

    Schulz, R.F.

    2001-01-01

    This article gives a survey of digital X-ray detection systems for projection radiography. The different principles are compared and some general characteristics are derived. The basic conversion mechanisms in the absorption layers are described. The basic principles of solid state X-ray detectors and their general characteristics are elucidated as well as some similarities with detectors for computed tomography. Some important application and system aspects are considered. An outlook on further possible developments in this field is given. (orig.) [de

  4. Mental Fatigue Monitoring Using a Wearable Transparent Eye Detection System

    Directory of Open Access Journals (Sweden)

    Kota Sampei

    2016-01-01

    Full Text Available We propose mental fatigue measurement using a wearable eye detection system. The system is capable of acquiring movement of the pupil and blinking from the light reflected from the eye. The reflection is detected by dye-sensitized photovoltaic cells. Since these cells are patterned onto the eyeglass and do not require external input power, the system is notable for its lightweight and low power consumption and can be combined with other wearable devices, such as a head mounted display. We performed experiments to correlate information obtained by the eye detection system with the mental fatigue of the user. Since it is quite difficult to evaluate mental fatigue objectively and quantitatively, we assumed that the National Aeronautics and Space Administration Task Load Index (NASA-TLX had a strong correlation with te mental fatigue. While a subject was requested to conduct calculation tasks, the eye detection system collected his/her information that included position, velocity and total movement of the eye, and amount and frequency of blinking. Multiple regression analyses revealed the correlation between NASA-TLX and the information obtained for 3 out of 5 subjects.

  5. Evaluation of bistable systems versus matched filters in detecting bipolar pulse signals

    OpenAIRE

    Duan, Fabing; Abbott, Derek; Gao, Qisheng

    2004-01-01

    This paper presents a thorough evaluation of a bistable system versus a matched filter in detecting bipolar pulse signals. The detectability of the bistable system can be optimized by adding noise, i.e. the stochastic resonance (SR) phenomenon. This SR effect is also demonstrated by approximate statistical detection theory of the bistable system and corresponding numerical simulations. Furthermore, the performance comparison results between the bistable system and the matched filter show that...

  6. 75 FR 61770 - Notice of Availability of the Final Programmatic Environmental Assessment and Finding of No...

    Science.gov (United States)

    2010-10-06

    ... inspection technology that is used to scan high-density cargo containers for contraband such as illicit drugs... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Notice of Availability of the... Operation of High Energy X-Ray Inspection Systems at Sea and Land Ports of Entry AGENCY: U.S. Customs and...

  7. Faults detection approach using PCA and SOM algorithm in PMSG-WT system

    Directory of Open Access Journals (Sweden)

    Mohamed Lamine FADDA

    2016-07-01

    Full Text Available In this paper, a new approach for faults detection in observable data system wind turbine - permanent magnet synchronous generator (WT-PMSG, the studying objective, illustrate the combination (SOM-PCA to build Multi-local-PCA models faults detection in system (WT-PMSG, the performance of the method suggested to faults detection in system data, finding good results in simulation experiment.

  8. Modified Single Photo-diode (MSPD) Detection Technique for SAC-OCDMA System

    Science.gov (United States)

    Abdulqader, Sarah G.; Fadhil, Hilal A.; Aljunid, S. A.

    2015-03-01

    In this paper, a new detection technique called modified single photo-diode (MSPD) detection for SAC-OCDMA system is proposed. The proposed system based on the single photo-diode (SPD) detection technique. The new detection technique is proposed to overcome the limitation of phase-induced intensity noise (PIIN) in SPD detection technique. However, the proposed detection is based on an optical hard limiter (OHL) followed by a SPD and a low-pass filter (LPF) in order to suppress the phase intensity noise (PIIN) at the receiver side. The results show that the MSPD detection based on OHL has a good performance even when the transmission distance is long, which is different from the case of SPD detection technique. Therefore, the MSPD detection technique is shown to be effective to improve the bit error rate (BER<10-9) and to suppress the noise in the practical optical fiber network.

  9. Contraband of Falcons

    Directory of Open Access Journals (Sweden)

    Elvira G. Nikolenko

    2016-02-01

    Full Text Available According to the criminal proceeding in smuggling of falcons, former employees of the Line Internal Affairs Department in MIA transport, working in Domodedovo airport, were sentenced to large fines  - A. Kurokhtin, D. Gorodenko and A. Kustov, as was reported in Rossiyskaya Gazeta on 19.06.2013. Inspectors of the State Committee for the wild life protection together with employees of the MIA of Khakassia on 15.09.2013 detained two individuals engaged in illegal catching of falcons. On 04.11.2013 in Buryatia perpetrator, which transported 16 falcons, was arrested. On the road Khabarovsk-Chita in the vicinity of the village Nikolayevka in Jewish Autonomous Region (Russia police seized 21 Gyrfalcons (Falco rusticolus, which on 26.11.2013 was reported in STRBC “Dalnevostochnaya”. In the village Lesnoi of Yelizovo district in the Kamchatka Region on 29.11.2013, police arrested two men and seized eight Gyrfalcons (Falco rusticolus. One Saker Falcon (Falco cherrug seized on 12.12.2013 in the village Staroaleyskoe of Tretyakovo district of the Altai Kray (Russia. On 24.12.2013 in Petropavlovsk-Kamchatsky (Russia the police, together with colleagues from the regional FSSD seized 13 Gyrfalcons (Falco rusticolus from two residents of the Krasnoyarsk Territory. On 15.01.2014 in Kamchatka, the 51-year-old resident of the village of Nagorny in Yelizovski District, which kept 8 Gyrfalcons (Falco rusticolus in the garage at his house land plot, was arrested. Prosecution office of Tarbagatay district of East Kazakhstan region (Kazakhstan together with the police and the authorities for the wild life protection found 7 Saker Falcons (Falco cherrug on 06.08.2014. At security control point “Ak-tilek - roadway" (Kazakhstan on 29.08.2014 border guards together with employees of the State Customs Service apprehended a citizen of Kazakhstan, who tried to take from Kyrgyzstan to Kazakhstan 3 young Saker Falcons (Falco cherrug. Supervisors of safety department in Khakassky Reserve prevented the catching of Saker Falcons on the territory of SPNR in Ust-Abakan District on 30.08.2015. In forest-line near Chernogorsk, Republic of Khakassia (Russia employees of the State Committee for wildlife and environment protection found 9 Saker Falcons caught by poachers on 09.09.2014. On 18.09.2014 as a result of operational search activities, employees of Altai Customs and Border Service of FSS of RF in Altai Kray prevented an attempt of illegal export of 18 falcons from Russia via the Republic of Kazakhstan. On 26.09.2014 at “Vnukovo” airport employees of the FCS of Russia prevented smuggling of 4 Gyrfalcons (Falco rusticolus, but also identified two customs officials who assisted smugglers and moved alive goods without customs control. On October 23, 2014 in the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Kray, Russia 10 falcons were released. On 27.10.2014 employees of Domodedovo Customs terminated an attempt of illegal export of 5 falcons from Russia to Armenia. On 10.30.2014 in Kamchatka officers of the Criminal Investigation Office of Milkovsky Department seized two Gyrfalcons (Falco rusticolus from poachers. On 02.11.2014 border guards of Kamchatka detained intercoastal ship, where was found hold to transport falcons. On 07.11.2014 batch of 6 falcons was detained by STSI inspectors in Slavgorod in the Altai Kray (Russia at Kazakhstan customs and gave a carrier to border guards. On 05.12.2014 in Chelyabinsk Airport a group of people trying to smuggle 3 Saker Falcons (Falco cherrug from Russia to Armenia, was detained. On 11.12.2014 in Tashkent (Uzbekistan 28 Saker Falcons (Falco cherrug were released, they were seized from poachers. On 12.16.2014 in Petropavlovsk-Kamchatsky (Russia 47-year-old citizen was seized two Gyrfalcons (Falco rusticolus. On 12.27.2014 in Moscow suburbs (Russia, a female Gyrfalcon (Falco rusticolus was found. In January 2015 two suitcases were found in the toilet in Moscow Sheremetyevo airport, where were 8 Gyrfalcons (Falco rusticolus. On 02.04.2015 the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Territory, Russia released 14 falcons (7 Saker Falcons Falco cherrug and 7 Peregrine Falcons F. peregrinus, confiscated in autumn 2014. On July 8, 2015 at the “Domodedovo” airport a Bulgarian citizen, who found 25 eggs of the Peregrine Falcon (Falco peregrinus, was detained. On 08.09.2015 on the territory of the cluster in Khakassky State Nature Reserve “Kamyzyakskaya steppe with lake Ulug Kohl” (Khakassia, two citizens of Syria and one native of Azerbaijan were take while attempting to catch falcons. On 11.09.2015 at Domodedovo airport staff of Rosselkhoznadzor suspended clearance of 8 Gyrfalcons (Falco rusticolus, which was brought to Moscow from the United Arab Emirates. On 18.09.2015 as a result of joint operational-search activities, officers of Altai Customs and Border Service of Russian FSS prevented an attempt of illegal export of 14 falcons from Russia to Kazakhstan. On 14.09.2015 24 Falcons were found during the check of flight № FDV-738 “Shymkent – Dubai” (Karavan.kz. Four members of the organized criminal group, involved in smuggling of Gyrfalcons (Falco rusticolus, were detained at a Moscow airport “Sheremetyevo” on 17.10.2015. Belgorod custom officers were not allowed to take 8 Saker Falcons (Falco cherrug out of Russia  on 20.10.2015. On 10.11.2015 Gosohotsluzhba of The Zabaikalsky Kray (Russia in cooperation with the police in Chernyshevsky District of the Zabaikalsky Kray detained a group of six foreigners (Syrians, Kurds, Azerbaijanian for illegal catching of falcons. On 20.11.2015 in Kamchatka officers of the Criminal Investigation of Kamchatka Police together with colleagues from the FSS regional department detained a resident of Apuka village of Olyutorsky district, which was seized nine Gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On 03.12.2015 in Kamchatka transport police prevented the export of 3 Gyrfalcons (Falco rusticolus by flight to Khabarovsk. On 21.12.2015 in Kamchatka a Gyrfalcon (Falco rusticolus was withdrawn from a resident of Oktybrski village of Ust-Bolsheretsky district.

  10. Maximum Temperature Detection System for Integrated Circuits

    Science.gov (United States)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  11. Optimal Robust Fault Detection for Linear Discrete Time Systems

    Directory of Open Access Journals (Sweden)

    Nike Liu

    2008-01-01

    Full Text Available This paper considers robust fault-detection problems for linear discrete time systems. It is shown that the optimal robust detection filters for several well-recognized robust fault-detection problems, such as ℋ−/ℋ∞, ℋ2/ℋ∞, and ℋ∞/ℋ∞ problems, are the same and can be obtained by solving a standard algebraic Riccati equation. Optimal filters are also derived for many other optimization criteria and it is shown that some well-studied and seeming-sensible optimization criteria for fault-detection filter design could lead to (optimal but useless fault-detection filters.

  12. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  13. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Science.gov (United States)

    2010-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device... Guidance Document: CFTR Gene Mutation Detection System.” See § 866.1(e) for the availability of this...

  14. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  15. Design study and comparative evaluation of JSFR failed fuel detection system

    Energy Technology Data Exchange (ETDEWEB)

    Aizawa, K.; Chikazawa, Y.; Ishikawa, N. [Japan Atomic Energy Agency JAEA, 4002 Narita, Oarai, Higashi-ibaraki-gun, Ibaraki 311-1393 (Japan); Kubo, S. [Japan Atomic Power Company JAPC (Japan); Okazaki, H.; Mito, M. [Mitsubishi FBR Systems, Inc. MFBR (Japan); Tozawa, K. [Fuji Electric Co., Ltd. (Japan); Hayashi, M. [MitsubishiElectric Corporation (Japan)

    2012-07-01

    A conceptual design study of an advanced sodium-cooled fast reactor JSFR has progressed in the 'Fast Reactor Cycle Technology Development (FaCT) 'project in Japan. JSFR has two failed fuel detection systems in the core. One is a failed fuel detection (FFD) system which continuously monitors a fission product from failed fuel subassembly. The other is a failed fuel detection and location (FFDL) system which locates when it receives signals from FFD. The FFD system consists of a FFD-DN which detects delayed neutron (DN) in sodium and a FFD-CG which detects fission products in the cover gas of the reactor vessel. In this study, requirements to the FFD-DN and the FFD-DN design to meet the requirements were investigated for the commercial and demonstration JSFR. In the commercial JSFR, a sampling type FFD which collects sodium from the reactor vessel by sampling lines for DN detectors was adopted. The performances have been investigated and confirmed by a fluid analysis in the reactor upper plenum. In the demonstration JSFR, the performance of DN detectors installed on the primary cold-leg piping has been confirmed. For the FFDL systems, experiences in the previous fast reactors and the R and D of FFDL system for JSFR were investigated. This study focuses on the Selector-Valve and the Tagging-Gas FFDL systems. Operation experiences of the Selector-valve FFDL system were accumulated in PFR and Phenix. Tagging-gas system experiences were accumulated in EBR-II and FFTF. The feasibility of both FFDL systems for JSFR was evaluated. (authors)

  16. Goaf water detection using the grounded electrical source airborne transient electromagnetic system

    Science.gov (United States)

    Li, D.; Ji, Y.; Guan, S.; Wu, Y.; Wang, A.

    2017-12-01

    To detect the geoelectric characteristic of goaf water, the grounded electrical source airborne transient electromagnetic (GREATEM) system (developed by Jilin University, China) is applied to the goaf water detection since its advantages of considerable prospecting depth, lateral resolution and detection efficiency. For the test of GREATEM system in goaf water detection, an experimental survey was conducted at Qinshui coal mine (Shanxi province, China). After data acquisition, noise reduction and inversion, the resistivity profiles of survey area is presented. The results highly agree the investigation information provided by Shanxi Coal Geology Geophysical Surveying Exploration Institute (China), conforming that the GREATEM system is an effective technique for resistivity detection of goaf water.

  17. Development of yarn breakage detection software system based on machine vision

    Science.gov (United States)

    Wang, Wenyuan; Zhou, Ping; Lin, Xiangyu

    2017-10-01

    For questions spinning mills and yarn breakage cannot be detected in a timely manner, and save the cost of textile enterprises. This paper presents a software system based on computer vision for real-time detection of yarn breakage. The system and Windows8.1 system Tablet PC, cloud server to complete the yarn breakage detection and management. Running on the Tablet PC software system is designed to collect yarn and location information for analysis and processing. And will be processed after the information through the Wi-Fi and http protocol sent to the cloud server to store in the Microsoft SQL2008 database. In order to follow up on the yarn break information query and management. Finally sent to the local display on time display, and remind the operator to deal with broken yarn. The experimental results show that the system of missed test rate not more than 5%o, and no error detection.

  18. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  19. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  20. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  1. Low power multi-camera system and algorithms for automated threat detection

    Science.gov (United States)

    Huber, David J.; Khosla, Deepak; Chen, Yang; Van Buer, Darrel J.; Martin, Kevin

    2013-05-01

    A key to any robust automated surveillance system is continuous, wide field-of-view sensor coverage and high accuracy target detection algorithms. Newer systems typically employ an array of multiple fixed cameras that provide individual data streams, each of which is managed by its own processor. This array can continuously capture the entire field of view, but collecting all the data and back-end detection algorithm consumes additional power and increases the size, weight, and power (SWaP) of the package. This is often unacceptable, as many potential surveillance applications have strict system SWaP requirements. This paper describes a wide field-of-view video system that employs multiple fixed cameras and exhibits low SWaP without compromising the target detection rate. We cycle through the sensors, fetch a fixed number of frames, and process them through a modified target detection algorithm. During this time, the other sensors remain powered-down, which reduces the required hardware and power consumption of the system. We show that the resulting gaps in coverage and irregular frame rate do not affect the detection accuracy of the underlying algorithms. This reduces the power of an N-camera system by up to approximately N-fold compared to the baseline normal operation. This work was applied to Phase 2 of DARPA Cognitive Technology Threat Warning System (CT2WS) program and used during field testing.

  2. Effectiveness of fire-detection systems in light-water-reactor facilities

    International Nuclear Information System (INIS)

    DiNenno, P.J.; Dungan, K.W.

    1981-08-01

    This report presents a critical review of methods for evaluating fire detection system capabilities. These capabilities must include some measurement of success. The problem of evaluating the effectiveness in terms of probability of success or certainty of success of fire detection systems must be answered either to enable the correct selection of system when a need is identified, or to assess the acceptability of an existing system in meeting an identified need. These methods are complementary to a hazards analysis, which identifies the need, but can be quite independent in their development and use

  3. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  4. Study of the casting speedy radiation-detection system

    International Nuclear Information System (INIS)

    Tan Xiaochun; Huang Junqing; Shi Xianbei; Zhao Gang; Wang Liping

    2001-01-01

    The paper introduces the design of the launching speedy radiation-detection system. It consists of launcher, semiconductor detector, microprocessor and communicator. It can give the intensity, position, time of radiation. The paper discusses the function, composition, principle, speciality and technical problem of this system

  5. Studies on modeling to failed fuel detection system response in LMFBR

    International Nuclear Information System (INIS)

    Miyazawa, T.; Saji, G.; Mitsuzuku, N.; Hikichi, T.; Odo, T.; Rindo, H.

    1981-05-01

    Failed Fuel Detection (FFD) system with Fission Products (FP) detection is considered to be the most promissing method, since FP provides direct information against fuel element failure. For designing FFD system and for evaluating FFD signals, some adequate FFD signal response to fuel failure have been required. But few models are available in nowadays. Thus Power Reactor and Nuclear Fuel Development Corporation (PNC) had developed FFD response model with computer codes, based on several fundamental investigations on FP release and FP behavior, and referred to foreign country experiences on fuel failure. In developing the model, noble gas and halogen FP release and behavior were considered, since FFD system would be composed of both cover gas monitoring and delayed neutron monitoring. The developed model can provide typical fuel failure response and detection limit which depends on various background signals at cover gas monitoring and delayed neutron monitoring. According to the FFD response model, we tried to assume fuel failure response and detection limit at Japan experimental fast reactor ''JOYO''. The detection limit of JOYO FFD system was estimated by measuring the background signals. Followed on the studies, a complete computer code has been now made with some improvement. On the paper, the details of the model, out line of developed computer code, status of JOYO FFD system, and trial assumption of JOYO FFD response and detection limit. (author)

  6. A Real-time License Plate Detection System for Parking Access

    Directory of Open Access Journals (Sweden)

    Roenadi Koesdijarto

    2010-08-01

    Full Text Available The automatic and real-time license plate detection system can be used as an access control entry of vehicles into the parking area. The problem is how to recognize the vehicles that will go into the parking lot and how to recognize various types of license plates in various light conditions quickly and accurately. In this research, the prototype was developed with a detection system to recognize the vehicles that will enter the parking area, and a license plate recognition system. In the license plate recognition system, the Fourier transform and Hidden Markov model method have proposed to detect location of license plate and as characters segmentation to recognize Indonesia license plates. The research results have shown that the developed prototype system has successfully recognized all Indonesia license plates in several of light condition and camera position. The percentage of plate recognition in the real-time experiment is 84.38%, and the average execution time for all recognition process is 5.834 second.

  7. Radiation Detection System for Prevention of Illicit Trafficking of Nuclear and Radioactive Materials

    International Nuclear Information System (INIS)

    Kwak, Sung Woo; Chang, Sung Soon; Yoo, Ho Sik

    2010-01-01

    Fixed radiation portal monitors (RPMs) deployed at border, seaport, airport and key traffic checkpoints have played an important role in preventing the illicit trafficking and transport of nuclear and radioactive materials. However, the RPM is usually large and heavy and can't easily be moved to different locations. These reasons motivate us to develop a mobile radiation detection system. The objective of this paper is to report our experience on developing the mobile radiation detection system for search and detection of nuclear and radioactive materials during road transport. Field tests to characterize the developed detection system were performed at various speeds and distances between the radioactive isotope (RI) transporting car and the measurement car. Results of measurements and detection limits of our system are described in this paper. The mobile radiation detection system developed should contribute to defending public's health and safety and the environment against nuclear and radiological terrorism by detecting nuclear or radioactive material hidden illegally in a vehicle

  8. A Novel Abandoned Object Detection System Based on Three-Dimensional Image Information

    Directory of Open Access Journals (Sweden)

    Yiliang Zeng

    2015-03-01

    Full Text Available A new idea of an abandoned object detection system for road traffic surveillance systems based on three-dimensional image information is proposed in this paper to prevent traffic accidents. A novel Binocular Information Reconstruction and Recognition (BIRR algorithm is presented to implement the new idea. As initial detection, suspected abandoned objects are detected by the proposed static foreground region segmentation algorithm based on surveillance video from a monocular camera. After detection of suspected abandoned objects, three-dimensional (3D information of the suspected abandoned object is reconstructed by the proposed theory about 3D object information reconstruction with images from a binocular camera. To determine whether the detected object is hazardous to normal road traffic, road plane equation and height of suspected-abandoned object are calculated based on the three-dimensional information. Experimental results show that this system implements fast detection of abandoned objects and this abandoned object system can be used for road traffic monitoring and public area surveillance.

  9. Calibration of the Failed-Fuel-Element Detection Systems in the Aagesta Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Strindehag, O

    1966-06-15

    Results from a calibration of the systems for detection of fuel element ruptures in the Aagesta reactor are presented. The calibration was carried out by means of foils of zirconium-uranium alloy which were placed in a special fuel assembly. The release of fission products from these foils is due mainly to recoil and can be accurately calculated. Before the foils were used in the reactor their corrosion behaviour in high temperature water was investigated. The results obtained with the precipitator systems for bulk detection and localization are in good agreement with the expected performance. The sensitivity of these systems was found to be high enough for detection and localization of small defects of pin-hole type ({nu} = 10{sup -8}/s ). The general performance of the systems was satisfactory during the calibration tests, although a few adjustments are desirable. A bulk detecting system for monitoring of activities in the moderator, in which the {gamma}-radiation from coolant samples is measured directly after an ion exchanger, showed lower sensitivity than expected from calculations. It seems that the sensitivity of the latter system has to be improved to admit the detection of small defects. In the ion exchanger system, and to some extent in the precipitator systems, the background from A{sup 41} in the coolant limits the sensitivity. The calibration technique utilized seems to be of great advantage when investigating the performance of failed-fuel-element detection systems.

  10. Optimal Background Attenuation for Fielded Spectroscopic Detection Systems

    International Nuclear Information System (INIS)

    Robinson, Sean M.; Ashbaker, Eric D.; Schweppe, John E.; Siciliano, Edward R.

    2007-01-01

    Radiation detectors are often placed in positions difficult to shield from the effects of terrestrial background gamma radiation. This is particularly true in the case of Radiation Portal Monitor (RPM) systems, as their wide viewing angle and outdoor installations make them susceptible to radiation from the surrounding area. Reducing this source of background can improve gross-count detection capabilities in the current generation of non-spectroscopic RPM's as well as source identification capabilities in the next generation of spectroscopic RPM's. To provide guidance for designing such systems, the problem of shielding a general spectroscopic-capable RPM system from terrestrial gamma radiation is considered. This analysis is carried out by template matching algorithms, to determine and isolate a set of non-threat isotopes typically present in the commerce stream. Various model detector and shielding scenarios are calculated using the Monte-Carlo N Particle (MCNP) computer code. Amounts of nominal-density shielding needed to increase the probability of detection for an ensemble of illicit sources are given. Common shielding solutions such as steel plating are evaluated based on the probability of detection for 3 particular illicit sources of interest, and the benefits are weighed against the incremental cost of shielding. Previous work has provided optimal shielding scenarios for RPMs based on gross-counting measurements, and those same solutions (shielding the internal detector cavity, direct shielding of the ground between the detectors, and the addition of collimators) are examined with respect to their utility to improving spectroscopic detection

  11. Soft-Fault Detection Technologies Developed for Electrical Power Systems

    Science.gov (United States)

    Button, Robert M.

    2004-01-01

    The NASA Glenn Research Center, partner universities, and defense contractors are working to develop intelligent power management and distribution (PMAD) technologies for future spacecraft and launch vehicles. The goals are to provide higher performance (efficiency, transient response, and stability), higher fault tolerance, and higher reliability through the application of digital control and communication technologies. It is also expected that these technologies will eventually reduce the design, development, manufacturing, and integration costs for large, electrical power systems for space vehicles. The main focus of this research has been to incorporate digital control, communications, and intelligent algorithms into power electronic devices such as direct-current to direct-current (dc-dc) converters and protective switchgear. These technologies, in turn, will enable revolutionary changes in the way electrical power systems are designed, developed, configured, and integrated in aerospace vehicles and satellites. Initial successes in integrating modern, digital controllers have proven that transient response performance can be improved using advanced nonlinear control algorithms. One technology being developed includes the detection of "soft faults," those not typically covered by current systems in use today. Soft faults include arcing faults, corona discharge faults, and undetected leakage currents. Using digital control and advanced signal analysis algorithms, we have shown that it is possible to reliably detect arcing faults in high-voltage dc power distribution systems (see the preceding photograph). Another research effort has shown that low-level leakage faults and cable degradation can be detected by analyzing power system parameters over time. This additional fault detection capability will result in higher reliability for long-lived power systems such as reusable launch vehicles and space exploration missions.

  12. 33 CFR 149.125 - What are the requirements for the malfunction detection system?

    Science.gov (United States)

    2010-07-01

    ... malfunction detection system? 149.125 Section 149.125 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... Pollution Prevention Equipment § 149.125 What are the requirements for the malfunction detection system? (a... Commandant (CG-5) will evaluate proposed leak-detection systems for natural gas on an individual basis. ...

  13. 14 CFR 25.858 - Cargo or baggage compartment smoke or fire detection systems.

    Science.gov (United States)

    2010-01-01

    ... detection systems. 25.858 Section 25.858 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... Construction Fire Protection § 25.858 Cargo or baggage compartment smoke or fire detection systems. If... must be met for each cargo or baggage compartment with those provisions: (a) The detection system must...

  14. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  15. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  16. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  17. Blind spot detection & passive lane change assist systems

    NARCIS (Netherlands)

    Surovtcev, I.

    2015-01-01

    The project goal was design and implementation of proof-of-concept for two systems that aim to tackle the blind spot problem of for the commercial vehicles: Blind Spot Detection and Passive Lane Change Assist functions. The system implementation was done using Rapid Control Prototype (RCP) hardware.

  18. A feasibility study of stateful automaton packet inspection for streaming application detection systems

    Science.gov (United States)

    Tseng, Kuo-Kun; Lo, Jiao; Liu, Yiming; Chang, Shih-Hao; Merabti, Madjid; Ng, Felix, C. K.; Wu, C. H.

    2017-10-01

    The rapid development of the internet has brought huge benefits and social impacts; however, internet security has also become a great problem for users, since traditional approaches to packet classification cannot achieve satisfactory detection performance due to their low accuracy and efficiency. In this paper, a new stateful packet inspection method is introduced, which can be embedded in the network gateway and used by a streaming application detection system. This new detection method leverages the inexact automaton approach, using part of the header field and part of the application layer data of a packet. Based on this approach, an advanced detection system is proposed for streaming applications. The workflow of the system involves two stages: the training stage and the detection stage. In the training stage, the system initially captures characteristic patterns from a set of application packet flows. After this training is completed, the detection stage allows the user to detect the target application by capturing new application flows. This new detection approach is also evaluated using experimental analysis; the results of this analysis show that this new approach not only simplifies the management of the state detection system, but also improves the accuracy of data flow detection, making it feasible for real-world network applications.

  19. Sensitivity Verification of PWR Monitoring System Using Neuro-Expert For LOCA Detection

    International Nuclear Information System (INIS)

    Muhammad Subekti

    2009-01-01

    Sensitivity Verification of PWR Monitoring System Using Neuro-Expert For LOCA Detection. The present research was done for verification of previous developed method on Loss of Coolant Accident (LOCA) detection and perform simulations for knowing the sensitivity of the PWR monitoring system that applied neuro-expert method. The previous research continuing on present research, has developed and has tested the neuro-expert method for several anomaly detections in Nuclear Power Plant (NPP) typed Pressurized Water Reactor (PWR). Neuro-expert can detect the LOCA anomaly with sensitivity of primary coolant leakage of 7 gallon/min and the conventional method could not detect the primary coolant leakage of 30 gallon/min. Neuro expert method detects significantly LOCA anomaly faster than conventional system in Surry-1 NPP as well so that the impact risk is reducible. (author)

  20. JPRS Report: Environmental Issues

    Science.gov (United States)

    1993-05-28

    Enhanced Safety come in contact with its discharges. Lung diseases, 93WN0407A St. Petersburg CHAS PIK in Russian diseases of the larynx and asthma are...The contraband goods produced in the Far East consist of system of payments for pollution and the use of natural pelts and other parts of bears, tigers

  1. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  2. A System for Detecting Miscues in Dyslexic Read Speech

    DEFF Research Database (Denmark)

    Rasmussen, Morten Højfeldt; Tan, Zheng-Hua; Lindberg, Børge

    2009-01-01

    While miscue detection in general is a well explored research field little attention has so far been paid to miscue detection in dyslexic read speech. This domain differs substantially from the domains that are commonly researched, as for example dyslexic read speech includes frequent regressions...... that the system detects miscues at a false alarm rate of 5.3% and a miscue detection rate of 40.1%. These results are worse than current state of the art reading tutors perhaps indicating that dyslexic read speech is a challenge to handle....

  3. A TNA explosives-detection system in airline baggage

    Energy Technology Data Exchange (ETDEWEB)

    Shea, P.; Gozani, T. (Science Applications International Corp., Santa Clara, CA (USA)); Bozorgmanesh, H. (Science Applications International Corp., San Diego, CA (USA))

    1990-12-20

    Existing technologies that are applied to explosives-detection in passenger baggage are briefly discussed. A system based on thermal-neutron analysis (TNA) is described. The actual performance of the system in the field on passenger bags is given. The application of the TNA in an integrated airport security system is discussed in view of the intense public debate on this issue. (orig.).

  4. Assessment of Radiation Background Variation for Moving Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Laboratory; Rennie, John Alan [Los Alamos National Laboratory; Toevs, James Waldo [Los Alamos National Laboratory; Wallace, Darrin J. [Los Alamos National Laboratory; Abhold, Mark Edward [Los Alamos National Laboratory

    2015-07-13

    The introduction points out that radiation backgrounds fluctuate across very short distances: factors include geology, soil composition, altitude, building structures, topography, and other manmade structures; and asphalt and concrete can vary significantly over short distances. Brief descriptions are given of the detection system, experimental setup, and background variation measurements. It is concluded that positive and negative gradients can greatly reduce the detection sensitivity of an MDS: negative gradients create opportunities for false negatives (nondetection), and positive gradients create a potentially unacceptable FAR (above 1%); the location of use for mobile detection is important to understand; spectroscopic systems provide more information for screening out false alarms and may be preferred for mobile use; and mobile monitor testing at LANL accounts for expected variations in the background.

  5. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension...

  6. Determination of hydrogen peroxide in water by chemiluminescence detection, (1). Flow injection type hydrogen peroxide detection system

    International Nuclear Information System (INIS)

    Yamashiro, Naoya; Uchida, Shunsuke; Satoh, Yoshiyuki; Morishima, Yusuke; Yokoyama, Hiroaki; Satoh, Tomonori; Sugama, Junichi; Yamada, Rie

    2004-01-01

    A flow injection type hydrogen peroxide detection system with a sub-ppb detection limit has been developed to determine hydrogen peroxide concentration in water sampled from a high temperature, high pressure hydrogen peroxide water loop. The hydrogen peroxide detector is based on luminol chemiluminescence spectroscopy. A small amount of sample water (20 μl) is mixed with a reagent mixture, an aqueous solution of luminol and Co 2+ catalyst, in a mixing cell which is installed just upstream from the detection cell. The optimum values for pH and the concentrations of luminol and Co 2+ ion have been determined to ensure a lower detectable limit and a higher reproducibility. The photocurrent detected by the detection system is expressed by a linear function of the hydrogen peroxide concentration in the region of lower concentration ([H 2 O 2 ] 2 O 2 ] in the region of higher concentration ([H 2 O 2 ] > 10 ppb). The luminous intensity of luminol chemiluminescence is the highest when pH of the reagent mixture is 11.0. Optimization of the major parameters gives the lowest detectable limit of 0.3 ppb. (author)

  7. Adaptive Road Crack Detection System by Pavement Classification

    Directory of Open Access Journals (Sweden)

    Alejandro Amírola

    2011-10-01

    Full Text Available This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement.

  8. Lateral position detection and control for friction stir systems

    Science.gov (United States)

    Fleming, Paul; Lammlein, David; Cook, George E.; Wilkes, Don Mitchell; Strauss, Alvin M.; Delapp, David; Hartman, Daniel A.

    2010-12-14

    A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

  9. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  10. Open-Phase Condition Detecting System for Transformers in Nuclear Power Plant

    International Nuclear Information System (INIS)

    Ha, Che-Wung; Lee, Do-Hwan

    2015-01-01

    Recently, several events involving the loss of one of the three phases of the offsite power circuit occurred in the US nuclear power plants (NPPs).. In some cases, the open-phase condition existed undetected for an extended period and in other case, was not properly responded to. Accordingly, the Nuclear Regulatory Commission (NRC) requested all license holders to take corrective actions to address the open-phase condition. It was also requested that all holders or applicant for a standard design certification (DC) include a description of a protection system to detect and separate the open circuit into design control document (DCD). Currently, NPPs including Duke Energy, Exelon, and institutes including Electric Power Research Institute (EPRI) are working together to resolve issues associated with detecting an open-phase condition. This paper, using Electromagnetic Transients Program (EMTP), presents a system to detect and address the loss of one of three phases of the offsite power circuit connected to main, auxiliary and standby transformers, which is hard to be detected in the current protection system. This paper, using EMTP, presents a system to detect and address the loss of one of three phases of the offsite power circuit running to MT, UAT or SAT which is hard to be detected in the current protection system. The system presented in this paper will be useful not only for the KHNP to meet the NRC requirement, but also for nuclear power plants at home and abroad to take corrective actions to provide protection from a single phase open circuit condition for offsite power sources

  11. Open-Phase Condition Detecting System for Transformers in Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Ha, Che-Wung; Lee, Do-Hwan [KHNP Central Research Institute, Daejeon (Korea, Republic of)

    2015-05-15

    Recently, several events involving the loss of one of the three phases of the offsite power circuit occurred in the US nuclear power plants (NPPs).. In some cases, the open-phase condition existed undetected for an extended period and in other case, was not properly responded to. Accordingly, the Nuclear Regulatory Commission (NRC) requested all license holders to take corrective actions to address the open-phase condition. It was also requested that all holders or applicant for a standard design certification (DC) include a description of a protection system to detect and separate the open circuit into design control document (DCD). Currently, NPPs including Duke Energy, Exelon, and institutes including Electric Power Research Institute (EPRI) are working together to resolve issues associated with detecting an open-phase condition. This paper, using Electromagnetic Transients Program (EMTP), presents a system to detect and address the loss of one of three phases of the offsite power circuit connected to main, auxiliary and standby transformers, which is hard to be detected in the current protection system. This paper, using EMTP, presents a system to detect and address the loss of one of three phases of the offsite power circuit running to MT, UAT or SAT which is hard to be detected in the current protection system. The system presented in this paper will be useful not only for the KHNP to meet the NRC requirement, but also for nuclear power plants at home and abroad to take corrective actions to provide protection from a single phase open circuit condition for offsite power sources.

  12. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    International Nuclear Information System (INIS)

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals

  13. Towards Improved Airborne Fire Detection Systems Using Beetle Inspired Infrared Detection and Fire Searching Strategies

    Directory of Open Access Journals (Sweden)

    Herbert Bousack

    2015-06-01

    Full Text Available Every year forest fires cause severe financial losses in many countries of the world. Additionally, lives of humans as well as of countless animals are often lost. Due to global warming, the problem of wildfires is getting out of control; hence, the burning of thousands of hectares is obviously increasing. Most important, therefore, is the early detection of an emerging fire before its intensity becomes too high. More than ever, a need for early warning systems capable of detecting small fires from distances as large as possible exists. A look to nature shows that pyrophilous “fire beetles” of the genus Melanophila can be regarded as natural airborne fire detection systems because their larvae can only develop in the wood of fire-killed trees. There is evidence that Melanophila beetles can detect large fires from distances of more than 100 km by visual and infrared cues. In a biomimetic approach, a concept has been developed to use the surveying strategy of the “fire beetles” for the reliable detection of a smoke plume of a fire from large distances by means of a basal infrared emission zone. Future infrared sensors necessary for this ability are also inspired by the natural infrared receptors of Melanophila beetles.

  14. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando; Laleg-Kirati, Taous-Meriem

    2012-01-01

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological

  15. The Reliability and Effectiveness of a Radar-Based Animal Detection System

    Science.gov (United States)

    2017-09-22

    This document contains data on the reliability and effectiveness of an animal detection system along U.S. Hwy 95 near Bonners Ferry, Idaho. The system uses a Doppler radar to detect large mammals (e.g., deer and elk) when they approach the highway. T...

  16. The Reliability and Effectiveness of a Radar-Based Animal Detection System

    Science.gov (United States)

    2017-09-01

    This document contains data on the reliability and effectiveness of an animal detection system along U.S. Hwy 95 near Bonners Ferry, Idaho. The system uses a Doppler radar to detect large mammals (e.g., deer and elk) when they approach the highway. T...

  17. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  18. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Science.gov (United States)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  19. Improvement of the Raman detection system for pesticide residues on/in fruits and vegetables

    Science.gov (United States)

    Li, Yan; Peng, Yankun; Zhai, Chen; Chao, Kuanglin; Qin, Jianwei

    2017-05-01

    Pesticide residue is one of the major challenges to fruits safety, while the traditional detection methods of pesticide residue on fruits and vegetables can't afford the demand of rapid detection in actual production because of timeconsuming. Thus rapid identification and detection methods for pesticide residue are urgently needed at present. While most Raman detection systems in the market are spot detection systems, which limits the range of application. In the study, our lab develops a Raman detection system to achieve area-scan thorough the self-developed spot detection Raman system with a control software and two devices. In the system, the scanning area is composed of many scanning spots, which means every spot needs to be detected and more time will be taken than area-scan Raman system. But lower detection limit will be achieved in this method. And some detection device is needed towards fruits and vegetables in different shape. Two detection devices are developed to detect spherical fruits and leaf vegetables. During the detection, the device will make spherical fruit rotate along its axis of symmetry, and leaf vegetables will be pressed in the test surface smoothly. The detection probe will be set to keep a proper distance to the surface of fruits and vegetables. It should make sure the laser shins on the surface of spherical fruit vertically. And two software are used to detect spherical fruits and leaf vegetables will be integrated to one, which make the operator easier to switch. Accordingly two detection devices for spherical fruits and leaf vegetables will also be portable devices to make it easier to change. In the study, a new way is developed to achieve area-scan result by spot-scan Raman detection system.

  20. Real-Time Model-Based Leak-Through Detection within Cryogenic Flow Systems

    Science.gov (United States)

    Walker, M.; Figueroa, F.

    2015-01-01

    The timely detection of leaks within cryogenic fuel replenishment systems is of significant importance to operators on account of the safety and economic impacts associated with material loss and operational inefficiencies. Associated loss in control of pressure also effects the stability and ability to control the phase of cryogenic fluids during replenishment operations. Current research dedicated to providing Prognostics and Health Management (PHM) coverage of such cryogenic replenishment systems has focused on the detection of leaks to atmosphere involving relatively simple model-based diagnostic approaches that, while effective, are unable to isolate the fault to specific piping system components. The authors have extended this research to focus on the detection of leaks through closed valves that are intended to isolate sections of the piping system from the flow and pressurization of cryogenic fluids. The described approach employs model-based detection of leak-through conditions based on correlations of pressure changes across isolation valves and attempts to isolate the faults to specific valves. Implementation of this capability is enabled by knowledge and information embedded in the domain model of the system. The approach has been used effectively to detect such leak-through faults during cryogenic operational testing at the Cryogenic Testbed at NASA's Kennedy Space Center.

  1. Video copy protection and detection framework (VPD) for e-learning systems

    Science.gov (United States)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  2. System for automatic detection of lung nodules exhibiting growth

    Science.gov (United States)

    Novak, Carol L.; Shen, Hong; Odry, Benjamin L.; Ko, Jane P.; Naidich, David P.

    2004-05-01

    Lung nodules that exhibit growth over time are considered highly suspicious for malignancy. We present a completely automated system for detection of growing lung nodules, using initial and follow-up multi-slice CT studies. The system begins with automatic detection of lung nodules in the later CT study, generating a preliminary list of candidate nodules. Next an automatic system for registering locations in two studies matches each candidate in the later study to its corresponding position in the earlier study. Then a method for automatic segmentation of lung nodules is applied to each candidate and its matching location, and the computed volumes are compared. The output of the system is a list of nodule candidates that are new or have exhibited volumetric growth since the previous scan. In a preliminary test of 10 patients examined by two radiologists, the automatic system identified 18 candidates as growing nodules. 7 (39%) of these corresponded to validated nodules or other focal abnormalities that exhibited growth. 4 of the 7 true detections had not been identified by either of the radiologists during their initial examinations of the studies. This technique represents a powerful method of surveillance that may reduce the probability of missing subtle or early malignant disease.

  3. Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

    1993-03-01

    The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data.

  4. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  5. Comparison and Characterization of Android-Based Fall Detection Systems

    Directory of Open Access Journals (Sweden)

    Rafael Luque

    2014-10-01

    Full Text Available Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones’ potential (and in particular, the Android Operating System can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed and false positives (conventional movements that are erroneously classified as falls. In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  6. Comparison and characterization of Android-based fall detection systems.

    Science.gov (United States)

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  7. Comparison and Characterization of Android-Based Fall Detection Systems

    Science.gov (United States)

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  8. 46 CFR 108.409 - Location and spacing of tubing in pneumatic fire detection system.

    Science.gov (United States)

    2010-10-01

    ... detection system. 108.409 Section 108.409 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED... and spacing of tubing in pneumatic fire detection system. (a) All tubing in a pneumatic fire detection... exposed in the space. (c) A pneumatic fire detection system must be set to activate after approximately a...

  9. Study of gamma detection capabilities of the REWARD mobile spectroscopic system

    Science.gov (United States)

    Balbuena, J. P.; Baptista, M.; Barros, S.; Dambacher, M.; Disch, C.; Fiederle, M.; Kuehn, S.; Parzefall, U.

    2017-07-01

    REWARD is a novel mobile spectroscopic radiation detector system for Homeland Security applications. The system integrates gamma and neutron detection equipped with wireless communication. A comprehensive simulation study on its gamma detection capabilities in different radioactive scenarios is presented in this work. The gamma detection unit consists of a precise energy resolution system based on two stacked (Cd,Zn)Te sensors working in coincidence sum mode. The volume of each of these CZT sensors is 1 cm3. The investigated energy windows used to determine the detection capabilities of the detector correspond to the gamma emissions from 137Cs and 60Co radioactive sources (662 keV and 1173/1333 keV respectively). Monte Carlo and Technology Computer-Aided Design (TCAD) simulations are combined to determine its sensing capabilities for different radiation sources and estimate the limits of detection of the sensing unit as a function of source activity for several shielding materials.

  10. Setting up a mobile Lidar (DIAL) system for detecting chemical warfare agents

    International Nuclear Information System (INIS)

    Tehrani, M Kavosh; Jaafari, E; Mobashery, A; Mohammad, M Malek

    2015-01-01

    The mobile light detection and ranging DIAL system of Malek Ashtar University of Technology has been developed for the detection of chemical warfare agents whose absorption wavelengths are in the range of 9.2–10.8 μm tunable CO 2 lasers of the system. In this paper, this system is first described and then ammonia detection is analyzed experimentally. Also, experimental results of detecting a sarin agent simulant, dimethyl–methyl phosphonate (DMMP), are presented. The power levels received from different ranges to detect specific concentrations of NH 3 and DMMP have been measured and debated. The primary test results with a 150 ns clipped pulse width by passive pinhole plasma shutter indicate that the system is capable of monitoring several species of pollutants in the range of about 1 km, with a 20 m spatial and 2 min temporal resolution. (paper)

  11. Fault diagnosis and refrigerant leak detection in vapour compression refrigeration systems

    Energy Technology Data Exchange (ETDEWEB)

    Tassou, S.A.; Grace, I.N. [Brunel University, Uxbridge (United Kingdom). Department of Mechanical Engineering

    2005-08-01

    The environmental impact of refrigeration systems can be reduced by operation at higher efficiency and reduction of refrigerant leakage. Refrigerant loss contributes both directly and indirectly to global warming through inefficient system operation, increased power consumption and greenhouse gas emissions and higher maintenance costs. Existing sensor-based leak detection methods are limited by the inability to detect gradual leakage and the need for careful sensor location. There is a requirement for a real-time performance monitoring approach to leak detection and fault diagnosis which overcomes these disadvantages. This paper reports on the development of a fault diagnosis and refrigerant leak detection system based on artificial intelligence and real-time performance monitoring. The system has been used successfully to distinguish between faulty and fault free operation, steady-state and transient operation, leakage and over charge conditions. Work currently underway is aimed at testing additional fault conditions and establishing further rules to distinguish between these patterns. (author)

  12. Review of current neutron detection systems for emergency response

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul; Kruschwitz, Craig

    2014-09-01

    Neutron detectors are used in a myriad of applications—from safeguarding special nuclear materials (SNM) to determining lattice spacing in soft materials. The transformational changes taking place in neutron detection and imaging techniques in the last few years are largely being driven by the global shortage of helium-3 (3He). This article reviews the status of neutron sensors used specifically for SNM detection in radiological emergency response. These neutron detectors must be highly efficient, be rugged, have fast electronics to measure neutron multiplicity, and be capable of measuring direction of the neutron sources and possibly image them with high spatial resolution. Neutron detection is an indirect physical process: neutrons react with nuclei in materials to initiate the release of one or more charged particles that produce electric signals that can be processed by the detection system. Therefore, neutron detection requires conversion materials as active elements of the detection system; these materials may include boron-10 (10B), lithium-6 (6Li), and gadollinium-157 (157Gd), to name a few, but the number of materials available for neutron detection is limited. However, in recent years, pulse-shape-discriminating plastic scintillators, scintillators made of helium-4 (4He) under high pressure, pillar and trench semiconductor diodes, and exotic semiconductor neutron detectors made from uranium oxide and other materials have widely expanded the parameter space in neutron detection methodology. In this article we will pay special attention to semiconductor-based neutron sensors. Modern microfabricated nanotubes covered inside with neutron converter materials and with very high aspect ratios for better charge transport will be discussed.

  13. Usefulness of the CAD System for Detecting Pulmonary Nodule in Real Clinical Practice

    International Nuclear Information System (INIS)

    Song, Kyoung Doo; Chung, Myung Jin; Kim, Hee Cheol; Lee, Kyung Soo; Jeong, Sun Young

    2011-01-01

    We wanted to evaluate the usefulness of the computer-aided detection (CAD) system for detecting pulmonary nodules in real clinical practice by using the CT images. Our Institutional Review Board approved our retrospective study with a waiver of informed consent. This study included 166 CT examinations that were performed for the evaluation of pulmonary metastasis in 166 patients with colorectal cancer. All the CT examinations were interpreted by radiologists and they were also evaluated by the CAD system. All the nodules detected by the CAD system were evaluated with regard to whether or not they were true nodules, and they were classified into micro nodules (MN, diameter < 4 mm) and significant nodules (SN, 4 ≤ diameter ≤ 10 mm). The radiologic reports and CAD results were compared. The CAD system helped detect 426 nodules: 115 (27%) of the 426 nodules were classified as true nodules and 35 (30%) of the 115 nodules were SNs, and 83 (72%) of the 115 were not mentioned in the radiologists' reports and three (4%) of the 83 nodules were non-calcified SNs. One of three non-calcified SNs was confirmed as a metastatic nodule. According to the radiologists' reports, 60 true nodules were detected, and 28 of the 60 were not detected by the CAD system. Although the CAD system missed many SNs that are detected by radiologists, it helps detect additional nodules that are missed by the radiologists in real clinical practice. Therefore, the CAD system can be useful to support a radiologist's detection performance

  14. Comparison of Near-Infrared Imaging Camera Systems for Intracranial Tumor Detection.

    Science.gov (United States)

    Cho, Steve S; Zeh, Ryan; Pierce, John T; Salinas, Ryan; Singhal, Sunil; Lee, John Y K

    2018-04-01

    Distinguishing neoplasm from normal brain parenchyma intraoperatively is critical for the neurosurgeon. 5-Aminolevulinic acid (5-ALA) has been shown to improve gross total resection and progression-free survival but has limited availability in the USA. Near-infrared (NIR) fluorescence has advantages over visible light fluorescence with greater tissue penetration and reduced background fluorescence. In order to prepare for the increasing number of NIR fluorophores that may be used in molecular imaging trials, we chose to compare a state-of-the-art, neurosurgical microscope (System 1) to one of the commercially available NIR visualization platforms (System 2). Serial dilutions of indocyanine green (ICG) were imaged with both systems in the same environment. Each system's sensitivity and dynamic range for NIR fluorescence were documented and analyzed. In addition, brain tumors from six patients were imaged with both systems and analyzed. In vitro, System 2 demonstrated greater ICG sensitivity and detection range (System 1 1.5-251 μg/l versus System 2 0.99-503 μg/l). Similarly, in vivo, System 2 demonstrated signal-to-background ratio (SBR) of 2.6 ± 0.63 before dura opening, 5.0 ± 1.7 after dura opening, and 6.1 ± 1.9 after tumor exposure. In contrast, System 1 could not easily detect ICG fluorescence prior to dura opening with SBR of 1.2 ± 0.15. After the dura was reflected, SBR increased to 1.4 ± 0.19 and upon exposure of the tumor SBR increased to 1.8 ± 0.26. Dedicated NIR imaging platforms can outperform conventional microscopes in intraoperative NIR detection. Future microscopes with improved NIR detection capabilities could enhance the use of NIR fluorescence to detect neoplasm and improve patient outcome.

  15. System and method for anomaly detection

    Science.gov (United States)

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  16. Evaluation of the peak MA-6600L microwave motion detection system

    International Nuclear Information System (INIS)

    1979-02-01

    A series of tests was performed on the Peak MA-6600L motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  17. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  18. A survey on automated wheeze detection systems for asthmatic patients

    Directory of Open Access Journals (Sweden)

    Syamimi Mardiah Shaharum

    2012-11-01

    Full Text Available The purpose of this paper is to present an evidence of automated wheeze detection system by a survey that can be very beneficial for asthmatic patients. Generally, for detecting asthma in a patient, stethoscope is used for ascertaining wheezes present. This causes a major problem nowadays because a number of patients tend to delay the interpretation time, which can lead to misinterpretations and in some worst cases to death. Therefore, the development of automated system would ease the burden of medical personnel. A further discussion on automated wheezes detection system will be presented later in the paper. As for the methodology, a systematic search of articles published as early as 1985 to 2012 was conducted. Important details including the hardware used, placement of hardware, and signal processing methods have been presented clearly thus hope to help and encourage future researchers to develop commercial system that will improve the diagnosing and monitoring of asthmatic patients.

  19. Towards an Automated Acoustic Detection System for Free Ranging Elephants.

    Science.gov (United States)

    Zeppelzauer, Matthias; Hensman, Sean; Stoeger, Angela S

    The human-elephant conflict is one of the most serious conservation problems in Asia and Africa today. The involuntary confrontation of humans and elephants claims the lives of many animals and humans every year. A promising approach to alleviate this conflict is the development of an acoustic early warning system. Such a system requires the robust automated detection of elephant vocalizations under unconstrained field conditions. Today, no system exists that fulfills these requirements. In this paper, we present a method for the automated detection of elephant vocalizations that is robust to the diverse noise sources present in the field. We evaluate the method on a dataset recorded under natural field conditions to simulate a real-world scenario. The proposed method outperformed existing approaches and robustly and accurately detected elephants. It thus can form the basis for a future automated early warning system for elephants. Furthermore, the method may be a useful tool for scientists in bioacoustics for the study of wildlife recordings.

  20. Comparative analysis of the vapor headspace of military-grade TNT versus NESTT TNT under dynamic and static conditions

    Science.gov (United States)

    Edge, Cindy C.; Gibb, Julie; Wasserzug, Louis S.

    1998-09-01

    The Institute for Biological Detection Systems (IBDS) has developed a quantitative vapor delivery system that can aid in characterizing dog's sensitivity and ability to recognize odor signatures for explosives and contraband substances. Determining of the dog's odor signature for detection of explosives is important because it may aid in eliminating the risk of handling explosives and reducing cross-contamination. Progress is being made in the development of training aids that represent the headspace of the explosives. NESTTTM TNT materials have been proposed as an approach to developing training aid simulates. In order for such aids to be effective they must mimic the headspace of the target material. This study evaluates the NESTTTM TNT product with regard to this criterion. NESTTTM TNT vapor was generated by the IBDS vapor delivery system, which incorporates a vapor generation cell that enables the user to control the conditions under which a substance is tested. The NESTTTM TNT vapor was compared to the headspace of military-grade TNT. The findings identify and quantify major vapor constituents of military-grade TNT and NESTTTM TNT. A comparative analysis evaluated the degree to which the NESTTTM TNT mimics the headspace of an actual TNT sample.

  1. Shielding system for the detection of radioisotopes gamma-rays emitters

    International Nuclear Information System (INIS)

    Nascimento Filho, V.F. do

    1983-01-01

    A shielding system for detection of radioisotopes gamma-rays emitters in samples of big volumes (plants, animals, soils) is presented. The detection between the beaker Marinelli and the glass tube (inside of the scintillator crystal well) is compared. The beaker Marinelli method allows a drastic reduction in the time detection of the sample. (M.A.C.) [pt

  2. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  3. Radiation exposure and privacy concerns surrounding full-body scanners in airports

    Directory of Open Access Journals (Sweden)

    Julie Accardo

    2014-04-01

    Full Text Available Millions of people filter through airport security check points in the United States every year. These security checks, in response to the post 9/11 and 2009 “Underwear Bomber” terrorist threats, have become increasingly burdensome to the general public due to the wide spread deployment of “enhanced screening systems.” The enhanced screening systems that have generated the most controversy are the passenger “full-body scanners.” These systems enable airport security personnel to effectively detect contraband (often concealed under clothing without the physical contact necessitated by a strip search. The two types of full-body scanners (also known as Advanced Imaging Technology systems, used in airports in the United States and around the world are referred to as backscatter technology units and millimeter-wave technology units. Although their respective radiation emissions vary, both scanners serve the same purpose; that is, the detection of concealed metallic and non-metallic threats in the form of liquids, gels, plastics, etc. Although enhanced screening systems were deployed to further public safety efforts, they have also generated wide spread public concern. Specifically, these concerns address the potential of adverse health and privacy issues that may result from continued public exposure to full-body scanner systems.

  4. An integrated logit model for contamination event detection in water distribution systems.

    Science.gov (United States)

    Housh, Mashor; Ostfeld, Avi

    2015-05-15

    The problem of contamination event detection in water distribution systems has become one of the most challenging research topics in water distribution systems analysis. Current attempts for event detection utilize a variety of approaches including statistical, heuristics, machine learning, and optimization methods. Several existing event detection systems share a common feature in which alarms are obtained separately for each of the water quality indicators. Unifying those single alarms from different indicators is usually performed by means of simple heuristics. A salient feature of the current developed approach is using a statistically oriented model for discrete choice prediction which is estimated using the maximum likelihood method for integrating the single alarms. The discrete choice model is jointly calibrated with other components of the event detection system framework in a training data set using genetic algorithms. The fusing process of each indicator probabilities, which is left out of focus in many existing event detection system models, is confirmed to be a crucial part of the system which could be modelled by exploiting a discrete choice model for improving its performance. The developed methodology is tested on real water quality data, showing improved performances in decreasing the number of false positive alarms and in its ability to detect events with higher probabilities, compared to previous studies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. A dedicated on-line detecting system for auto air dryers

    Science.gov (United States)

    Shi, Chao-yu; Luo, Zai

    2013-10-01

    According to the correlative automobile industry standard and the requirements of manufacturer, this dedicated on-line detecting system is designed against the shortage of low degree automatic efficiency and detection precision of auto air dryer in the domestic. Fast automatic detection is achieved by combining the technology of computer control, mechatronics and pneumatics. This system can detect the speciality performance of pressure regulating valve and sealability of auto air dryer, in which online analytical processing of test data is available, at the same time, saving and inquiring data is achieved. Through some experimental analysis, it is indicated that efficient and accurate detection of the performance of auto air dryer is realized, and the test errors are less than 3%. Moreover, we carry out the type A evaluation of uncertainty in test data based on Bayesian theory, and the results show that the test uncertainties of all performance parameters are less than 0.5kPa, which can meet the requirements of operating industrial site absolutely.

  6. Design and implementation of network attack analysis and detect system

    International Nuclear Information System (INIS)

    Lu Zhigang; Wu Huan; Liu Baoxu

    2007-01-01

    This paper first analyzes the present research state of IDS (intrusion detection system), classifies and compares existing methods. According to the problems existing in IDS, such as false-positives, false-negatives and low information visualization, this paper suggests a system named NAADS which supports multi data sources. Through a series of methods such as clustering analysis, association analysis and visualization, rate of detection and usability of NAADS are increased. (authors)

  7. A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wenchao Li

    2014-01-01

    abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV. Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

  8. Improvement of emotional healthcare system with stress detection from ECG signal.

    Science.gov (United States)

    Tivatansakul, S; Ohkura, M

    2015-01-01

    Our emotional healthcare system is designed to cope with users' negative emotions in daily life. To make the system more intelligent, we integrated emotion recognition by facial expression to provide appropriate services based on user's current emotional state. Our emotion recognition by facial expression has confusion issue to recognize some positive, neutral and negative emotions that make the emotional healthcare system provide a relaxation service even though users don't have negative emotions. Therefore, to increase the effectiveness of the system to provide the relaxation service, we integrate stress detection from ECG signal. The stress detection might be able to address the confusion issue of emotion recognition by facial expression to provide the service. Indeed, our results show that integration of stress detection increases the effectiveness and efficiency of the emotional healthcare system to provide services.

  9. Optimization of PET system design for lesion detection

    International Nuclear Information System (INIS)

    Qi, Jinyi

    2000-01-01

    Traditionally, the figures of merit used in designing a PET scanner are spatial resolution, noise equivalent count rate, noise equivalent sensitivity, etc. These measures, however, do not directly reflect the lesion detectability using the PET scanner. Here we propose to optimize PET scanner design directly for lesion detection. The signal-to-noise ratio (SNR) of lesion detection can be easily computed using the theoretical expressions that we have previously derived. Because no time consuming Monte Carlo simulation is needed, the theoretical expressions allow evaluation of a large range of parameters. The PET system parameters can then be chosen to achieve the maximum SNR for lesion detection. The simulation study shown in this paper was focused a single ring PET scanner without depth of interaction measurement. Randoms and scatters were also ignored

  10. Statistical Outlier Detection for Jury Based Grading Systems

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Clemmensen, Line Katrine Harder; Rosas, Harvey

    2013-01-01

    This paper presents an algorithm that was developed to identify statistical outliers from the scores of grading jury members in a large project-based first year design course. The background and requirements for the outlier detection system are presented. The outlier detection algorithm...... and the follow-up procedures for score validation and appeals are described in detail. Finally, the impact of various elements of the outlier detection algorithm, their interactions, and the sensitivity of their numerical values are investigated. It is shown that the difference in the mean score produced...... by a grading jury before and after a suspected outlier is removed from the mean is the single most effective criterion for identifying potential outliers but that all of the criteria included in the algorithm have an effect on the outlier detection process....

  11. Catalog of physical protection equipment. Book 1: Volume I. Barriers and structural components

    International Nuclear Information System (INIS)

    Haberman, W.

    1977-06-01

    A catalog of commercially available physical protection equipment has been prepared for use by the U.S. Nuclear Regulatory Commission (NRC). Included is information on barrier structures and equipment, interior and exterior intrusion detection sensors, entry (access) control devices, surveillance and alarm assessment equipment, contraband detection sensors, automated response equipment, general purpose displays and general purpose communications, with one volume devoted to each of these eight areas. For each item of equipment the information included consists of performance, physical, cost and supply/logistics data. The entire catalog is contained in three notebooks for ease in its use by licensing and inspection staff at NRC

  12. Catalog of physical protection equipment. Book 3: Volume VII. General purpose display components

    International Nuclear Information System (INIS)

    1977-06-01

    A catalog of commercially available physical protection equipment has been prepared under MITRE contract AT(49-24)-0376 for use by the U. S. Nuclear Regulatory Commission (NRC). Included is information on barrier structures and equipment, interior and exterior intrusion detection sensors, entry (access) control devices, surveillance and alarm assessment equipment, contraband detection sensors, automated response equipment, general purpose displays and general purpose communications, with one volume devoted to each of these eight areas. For each item of equipment the information included consists of performance, physical, cost and supply/logistics data. The entire catalog is contained in three notebooks for ease in its use by licensing and inspection staff at NRC

  13. EBR-II water-to-sodium leak detection system

    International Nuclear Information System (INIS)

    Wrightson, M.M.; McKinley, K.; Ruther, W.E.; Holmes, J.T.

    1976-01-01

    The water-to-sodium leak detection system installed at EBR-II in April, 1975, is described in detail. Topics covered include operational characteristics, maintenance problems, alarm functions, background hydrogen level data, and future plans for refinements to the system. Particular emphasis is given to the failures of eight of the ten leak detectors due to sodium-to-vacuum leakage, and the program anticipated for complete recovery of the system

  14. Stochastic change detection in uncertain nonlinear systems using reduced-order models: classification

    International Nuclear Information System (INIS)

    Yun, Hae-Bum; Masri, Sami F

    2009-01-01

    A reliable structural health monitoring methodology (SHM) is proposed to detect relatively small changes in uncertain nonlinear systems. A total of 4000 physical tests were performed using a complex nonlinear magneto-rheological (MR) damper. With the effective (or 'genuine') changes and uncertainties in the system characteristics of the semi-active MR damper, which were precisely controlled with known means and standard deviation of the input current, the tested MR damper was identified with the restoring force method (RFM), a non-parametric system identification method involving two-dimensional orthogonal polynomials. Using the identified RFM coefficients, both supervised and unsupervised pattern recognition techniques (including support vector classification and k-means clustering) were employed to detect system changes in the MR damper. The classification results showed that the identified coefficients with orthogonal basis function can be used as reliable indicators for detecting (small) changes, interpreting the physical meaning of the detected changes without a priori knowledge of the monitored system and quantifying the uncertainty bounds of the detected changes. The classification errors were analyzed using the standard detection theory to evaluate the performance of the developed SHM methodology. An optimal classifier design procedure was also proposed and evaluated to minimize type II (or 'missed') errors

  15. Development of a Calibration Strip for Immunochromatographic Assay Detection Systems.

    Science.gov (United States)

    Gao, Yue-Ming; Wei, Jian-Chong; Mak, Peng-Un; Vai, Mang-I; Du, Min; Pun, Sio-Hang

    2016-06-29

    With many benefits and applications, immunochromatographic (ICG) assay detection systems have been reported on a great deal. However, the existing research mainly focuses on increasing the dynamic detection range or application fields. Calibration of the detection system, which has a great influence on the detection accuracy, has not been addressed properly. In this context, this work develops a calibration strip for ICG assay photoelectric detection systems. An image of the test strip is captured by an image acquisition device, followed by performing a fuzzy c-means (FCM) clustering algorithm and maximin-distance algorithm for image segmentation. Additionally, experiments are conducted to find the best characteristic quantity. By analyzing the linear coefficient, an average value of hue (H) at 14 min is chosen as the characteristic quantity and the empirical formula between H and optical density (OD) value is established. Therefore, H, saturation (S), and value (V) are calculated by a number of selected OD values. Then, H, S, and V values are transferred to the RGB color space and a high-resolution printer is used to print the strip images on cellulose nitrate membranes. Finally, verification of the printed calibration strips is conducted by analyzing the linear correlation between OD and the spectral reflectance, which shows a good linear correlation (R² = 98.78%).

  16. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    Science.gov (United States)

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  17. Embedded and real-time vehicle detection system for challenging on-road scenes

    Science.gov (United States)

    Gu, Qin; Yang, Jianyu; Kong, Lingjiang; Yan, Wei Qi; Klette, Reinhard

    2017-06-01

    Vehicle detection is an important topic for advanced driver-assistance systems. This paper proposes an adaptive approach for an embedded system by focusing on monocular vehicle detection in real time, also aiming at being accurate under challenging conditions. Scene classification is accomplished by using a simplified convolution neural network with hypothesis generation by SoftMax regression. The output is consequently taken into account to optimize detection parameters for hypothesis generation and testing. Thus, we offer a sample-reorganization mechanism to improve the performance of vehicle hypothesis verification. A hypothesis leap mechanism is in use to improve the operating efficiency of the on-board system. A practical on-road test is employed to verify vehicle detection (i.e., accuracy) and also the performance of the designed on-board system regarding speed.

  18. Counterbalanced radiation detection system

    International Nuclear Information System (INIS)

    Platz, W.

    1987-01-01

    A counterbalanced radiation detection system is described comprising: (a) a stand; (b) a first radiation detector; (c) a first radiation detector arm means for tiltably connecting the first radiation detector with the stand; (d) a second radiation detector; (e) a second radiation detector arm means for tiltably connecting the second radiation detector with the stand, whereby the tilting angles of the radiation detector arm means define a distance between the radiation detectors; and (f) a torque transforming means connected between the first and second radiation detector arm means for transforming the torque created by one of the radiation detectors in a sense opposed to the torque created by the other radiation detector

  19. Reliability evaluation of the Savannah River reactor leak detection system

    International Nuclear Information System (INIS)

    Daugherty, W.L.; Sindelar, R.L.; Wallace, I.T.

    1991-01-01

    The Savannah River Reactors have been in operation since the mid-1950's. The primary degradation mode for the primary coolant loop piping is intergranular stress corrosion cracking. The leak-before-break (LBB) capability of the primary system piping has been demonstrated as part of an overall structural integrity evaluation. One element of the LBB analyses is a reliability evaluation of the leak detection system. The most sensitive element of the leak detection system is the airborne tritium monitors. The presence of small amounts of tritium in the heavy water coolant provide the basis for a very sensitive system of leak detection. The reliability of the tritium monitors to properly identify a crack leaking at a rate of either 50 or 300 lb/day (0.004 or 0.023 gpm, respectively) has been characterized. These leak rates correspond to action points for which specific operator actions are required. High reliability has been demonstrated using standard fault tree techniques. The probability of not detecting a leak within an assumed mission time of 24 hours is estimated to be approximately 5 x 10 -5 per demand. This result is obtained for both leak rates considered. The methodology and assumptions used to obtain this result are described in this paper. 3 refs., 1 fig., 1 tab

  20. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  1. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  2. Improvements in detection system for pulse radiolysis facility

    CERN Document Server

    Rao, V N; Manimaran, P; Mishra, R K; Mohan, H; Mukherjee, T; Nadkarni, S A; Sapre, A V; Shinde, S J; Toley, M

    2002-01-01

    This report describes the improvements made in the detection system of the pulse radiolysis facility based on a 7 MeV Linear Electron Accelerator (LINAC) located in the Radiation Chemistry and Chemical Dynamics Division of Bhabha Atomic Research Centre. The facility was created in 1986 for kinetic studies of transient species whose absorption lies between 200 and 700 nm. The newly developed detection circuits consist of a silicon (Si) photodiode (PD) detector for the wavelength range 450-1100 nm and a germanium (Ge) photodiode detector for the wavelength range 900-1600 nm. With these photodiode-based detection set-up, kinetic experiments are now routinely carried out in the wavelength range 450-1600 nm. The performance of these circuits has been tested using standard chemical systems. The rise time has been found to be 150 ns. The photo-multiplier tube (PMT) bleeder circuit has been modified. A new DC back-off circuit has been built and installed in order to avoid droop at longer time scales. A steady baselin...

  3. 76 FR 63238 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Science.gov (United States)

    2011-10-12

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... Agency's proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in... proposed rule for Proximity Detection Systems on Continuous Mining Machines in Underground Coal Mines. Due...

  4. 76 FR 54163 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Science.gov (United States)

    2011-08-31

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... (except full-face continuous mining machines) with proximity detection systems. Miners working near..., each underground coal mine operator would be required to install proximity detection systems on...

  5. 76 FR 70075 - Proximity Detection Systems for Continuous Mining Machines in Underground Coal Mines

    Science.gov (United States)

    2011-11-10

    ... Detection Systems for Continuous Mining Machines in Underground Coal Mines AGENCY: Mine Safety and Health... proposed rule addressing Proximity Detection Systems for Continuous Mining Machines in Underground Coal... Detection Systems for Continuous Mining Machines in Underground Coal Mines. MSHA conducted hearings on...

  6. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  7. Leak detection systems for VVER units based on leak before break concept. PowerPoint presentation

    International Nuclear Information System (INIS)

    Matal, Oldrich

    2010-01-01

    To comply with international standards, independent leak monitoring systems should be installed based on the monitoring of different physical parameters capable of detecting any small leak within one hour from the start of the leak. Such leak detection systems are based mainly on acoustic emission monitoring, humidity monitoring and/or radiation monitoring. Advanced systems integrate the monitoring of different physical parameters into one integrated leak detection system. The Integrated Leak Detection System (ILDS) for NPP Metsamor is described. This system consists of three independent leak detection subsystems, viz. LEMOP (LEak MOnitoring of Pipelines) based on acoustic emission monitoring, HUMOS (HUmidity MOnitoring System) based on humidity monitoring, and RAMOS (RAdiation MOnitoring System) based on radiation monitoring). The Integrated Leak Detection System (ILDS) collects data from the three systems, performs data evaluation, data storage, generates alarms and provides a user interface for the whole system including all subsystems. An example of DiagAssist user interface in the ILDS system in the pictorial form. (P.A.)

  8. Research on capability of detecting ballistic missile by near space infrared system

    Science.gov (United States)

    Lu, Li; Sheng, Wen; Jiang, Wei; Jiang, Feng

    2018-01-01

    The infrared detection technology of ballistic missile based on near space platform can effectively make up the shortcomings of high-cost of traditional early warning satellites and the limited earth curvature of ground-based early warning radar. In terms of target detection capability, aiming at the problem that the formula of the action distance based on contrast performance ignores the background emissivity in the calculation process and the formula is only valid for the monochromatic light, an improved formula of the detecting range based on contrast performance is proposed. The near space infrared imaging system parameters are introduced, the expression of the contrastive action distance formula based on the target detection of the near space platform is deduced. The detection range of the near space infrared system for the booster stage ballistic missile skin, the tail nozzle and the tail flame is calculated. The simulation results show that the near-space infrared system has the best effect on the detection of tail-flame radiation.

  9. Improved detection of Mycobacterium avium complex with the Bactec radiometric system

    International Nuclear Information System (INIS)

    Hoffner, S.E.

    1988-01-01

    A reconsideration of the laboratory methods used for primary isolation of mycobacteria other than Mycobacterium tuberculosis is needed due to the increasingly recognized importance of such mycobacterial infections in immunocompromised patients. One example of this is the severe opportunistic infections caused by Mycobacterium avium complex among AIDS patients. In this study, the Bactec radiometric system was compared to conventional culture on solid medium for the detection of M. avium complex in 3,612 selected clinical specimens, mainly of extrapulmonary origin. Of a total number of 63 M. avium complex isolates, the Bactec system detected 58 (92%), compared to 37 (59%) for conventional culture. A much more rapid detection was attained with radiometric technique than with conventional culture. The mean detection time for the cultures positive with both methods was 7.1 and 28.3 days, respectively. The Bactec radiometric system achieves a rapid and significantly more sensitive detection and seems to be an excellent complement to conventional culture in the laboratory diagnosis of infections with the M. avium complex

  10. Transient pattern analysis for fault detection and diagnosis of HVAC systems

    International Nuclear Information System (INIS)

    Cho, Sung-Hwan; Yang, Hoon-Cheol; Zaheer-uddin, M.; Ahn, Byung-Cheon

    2005-01-01

    Modern building HVAC systems are complex and consist of a large number of interconnected sub-systems and components. In the event of a fault, it becomes very difficult for the operator to locate and isolate the faulty component in such large systems using conventional fault detection methods. In this study, transient pattern analysis is explored as a tool for fault detection and diagnosis of an HVAC system. Several tests involving different fault replications were conducted in an environmental chamber test facility. The results show that the evolution of fault residuals forms clear and distinct patterns that can be used to isolate faults. It was found that the time needed to reach steady state for a typical building HVAC system is at least 50-60 min. This means incorrect diagnosis of faults can happen during online monitoring if the transient pattern responses are not considered in the fault detection and diagnosis analysis

  11. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.

    1991-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  12. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.; Aggarwal, S.

    1992-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes, and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  13. A quench detection/logging system for the SSCL Magnet Test Laboratory

    International Nuclear Information System (INIS)

    Kim, K.; Coles, M.; Dryer, J.; Lambert, D.

    1994-01-01

    The quench in a magnet describes a process which occurs while the superconductivity state goes to the normal resistive state. The consequence of a quench is the conversion of the stored electromagnetic energy into heat. During this process the initiating point will reach a high temperature, which will char the insulation or melt the conductor and thereby destroy the magnet. To prevent the magnet from being lost, it is standard practice to observe several resistance and/or inductance voltages across the magnet as quench signatures - Detection. When a quench symptom is detected, protection operations are initiated: proper shutdown of the magnet excitation systems and treatment to dilute the heat energy at a spot - Protection. The temperature rise is diluted by firing heaters along the length of the magnet to ensure that the dissipated energy is spread. It is interesting that there is not a significant amount of published research on detection. To afford a more reliable quench detection system, two distinct approaches have been tried in the past: (i) Understanding of the Noise Mechanism and Sub-system Optimization, and (ii) Escaping from the Known Electromagnetic Noises by Observing Optical Waves or Acoustic Waves. The MTL of SSCL confronts a mass-measurement of about 10,000 production magnets. To meet the testing schedule, the false quench detection rate needs to be further optimized while the true quench detection rate remains secure for the magnet measurement safety. To meet these requirements, the authors followed an iterative top-down approach. First they defend the signal and noise characteristics of the quench phenomena by using existing software tools to build a rapid prototype system incorporating all proven functionality of the existing system. Then they further optimize the system through iterative upgrading based on their signal and noise character findings

  14. Development of fast wireless detection system for fixed offshore platform

    Science.gov (United States)

    Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping

    2011-04-01

    Offshore platforms' security is concerned since in 1950s and 1960s, and in the early 1980s some important specifications and standards are built, and all these provide technical basis of fixed platform design, construction, installation and evaluation. With the condition that more and more platforms are in serving over age, the research about the evaluation and detection technology of offshore platform has been a hotspot, especially underwater detection, and assessment method based on the finite element calculation. For fixed platform structure detection, conventional NDT methods, such as eddy current, magnetic powder, permeate, X-ray and ultrasonic, etc, are generally used. These techniques are more mature, intuitive, but underwater detection needs underwater robot, the necessary supporting tools of auxiliary equipment, and trained professional team, thus resources and cost used are considerable, installation time of test equipment is long. This project presents a new kind of fast wireless detection and damage diagnosis system for fixed offshore platform using wireless sensor networks, that is, wireless sensor nodes can be put quickly on the offshore platform, detect offshore platform structure global status by wireless communication, and then make diagnosis. This system is operated simply, suitable for offshore platform integrity states rapid assessment. The designed system consists in intelligence acquisition equipment and 8 wireless collection nodes, the whole system has 64 collection channels, namely every wireless collection node has eight 16-bit accuracy of A/D channels. Wireless collection node, integrated with vibration sensing unit, embedded low-power micro-processing unit, wireless transceiver unit, large-capacity power unit, and GPS time synchronization unit, can finish the functions such as vibration data collection, initial analysis, data storage, data wireless transmission. Intelligence acquisition equipment, integrated with high

  15. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Dhanalakshmi Krishnan Sadhasivan

    2017-01-01

    Full Text Available Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.

  16. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳俊; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting human faces in color images. The algorithm consists of three image processing steps. The first step is human skin color statistics. Then it separates skin regions from non-skin regions. After that, it locates the frontal human face(s) within the skin regions. In the first step, 250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors. This chroma chart is used to generate, from the original color image, a gray scale image whose gray value at a pixel shows its likelihood of representing the skin. The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into separate skin regions from non skin regions. Finally, multiple face templates matching is used to determine if a given skin region represents a frontal human face or not. Test of the system with more than 400 color images showed that the resulting detection rate was 83%, which is better than most color-based face detection systems. The average speed for face detection is 0.8 second/image (400×300 pixels) on a Pentium 3 (800MHz) PC.

  17. Study on high power ultraviolet laser oil detection system

    Science.gov (United States)

    Jin, Qi; Cui, Zihao; Bi, Zongjie; Zhang, Yanchao; Tian, Zhaoshuo; Fu, Shiyou

    2018-03-01

    Laser Induce Fluorescence (LIF) is a widely used new telemetry technology. It obtains information about oil spill and oil film thickness by analyzing the characteristics of stimulated fluorescence and has an important application in the field of rapid analysis of water composition. A set of LIF detection system for marine oil pollution is designed in this paper, which uses 355nm high-energy pulsed laser as the excitation light source. A high-sensitivity image intensifier is used in the detector. The upper machine sends a digital signal through a serial port to achieve nanoseconds range-gated width control for image intensifier. The target fluorescence spectrum image is displayed on the image intensifier by adjusting the delay time and the width of the pulse signal. The spectral image is coupled to CCD by lens imaging to achieve spectral display and data analysis function by computer. The system is used to detect the surface of the floating oil film in the distance of 25m to obtain the fluorescence spectra of different oil products respectively. The fluorescence spectra of oil products are obvious. The experimental results show that the system can realize high-precision long-range fluorescence detection and reflect the fluorescence characteristics of the target accurately, with broad application prospects in marine oil pollution identification and oil film thickness detection.

  18. Real-Time EEG-Based Happiness Detection System

    Directory of Open Access Journals (Sweden)

    Noppadon Jatupaiboon

    2013-01-01

    Full Text Available We propose to use real-time EEG signal to classify happy and unhappy emotions elicited by pictures and classical music. We use PSD as a feature and SVM as a classifier. The average accuracies of subject-dependent model and subject-independent model are approximately 75.62% and 65.12%, respectively. Considering each pair of channels, temporal pair of channels (T7 and T8 gives a better result than the other area. Considering different frequency bands, high-frequency bands (Beta and Gamma give a better result than low-frequency bands. Considering different time durations for emotion elicitation, that result from 30 seconds does not have significant difference compared with the result from 60 seconds. From all of these results, we implement real-time EEG-based happiness detection system using only one pair of channels. Furthermore, we develop games based on the happiness detection system to help user recognize and control the happiness.

  19. Multiview face detection based on position estimation over multicamera surveillance system

    Science.gov (United States)

    Huang, Ching-chun; Chou, Jay; Shiu, Jia-Hou; Wang, Sheng-Jyh

    2012-02-01

    In this paper, we propose a multi-view face detection system that locates head positions and indicates the direction of each face in 3-D space over a multi-camera surveillance system. To locate 3-D head positions, conventional methods relied on face detection in 2-D images and projected the face regions back to 3-D space for correspondence. However, the inevitable false face detection and rejection usually degrades the system performance. Instead, our system searches for the heads and face directions over the 3-D space using a sliding cube. Each searched 3-D cube is projected onto the 2-D camera views to determine the existence and direction of human faces. Moreover, a pre-process to estimate the locations of candidate targets is illustrated to speed-up the searching process over the 3-D space. In summary, our proposed method can efficiently fuse multi-camera information and suppress the ambiguity caused by detection errors. Our evaluation shows that the proposed approach can efficiently indicate the head position and face direction on real video sequences even under serious occlusion.

  20. Current practice and developmental efforts for leak detection in US reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1985-07-01

    Current leak detection practices in 74 operating nuclear reactors have been reviewed. Existing leak detection systems are adequate to ensure a leak-before-break scenario in most situations, but no currently available, single method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Simply tightening current leakage limits may produce an unacceptably large number of unnecessary shutdowns. The use of commercially available acoustic monitoring systems or moisture-sensitive tape may improve leak detection capability at specific sites. However, neither of these methods currently provides source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) or leak-rate information (a small leak may saturate the system). A field-implementable acoustic leak detection system is being developed to address these limitations. 5 refs., 3 figs

  1. A Context-Aware EEG Headset System for Early Detection of Driver Drowsiness

    Directory of Open Access Journals (Sweden)

    Gang Li

    2015-08-01

    Full Text Available Driver drowsiness is a major cause of mortality in traffic accidents worldwide. Electroencephalographic (EEG signal, which reflects the brain activities, is more directly related to drowsiness. Thus, many Brain-Machine-Interface (BMI systems have been proposed to detect driver drowsiness. However, detecting driver drowsiness at its early stage poses a major practical hurdle when using existing BMI systems. This study proposes a context-aware BMI system aimed to detect driver drowsiness at its early stage by enriching the EEG data with the intensity of head-movements. The proposed system is carefully designed for low-power consumption with on-chip feature extraction and low energy Bluetooth connection. Also, the proposed system is implemented using JAVA programming language as a mobile application for on-line analysis. In total, 266 datasets obtained from six subjects who participated in a one-hour monotonous driving simulation experiment were used to evaluate this system. According to a video-based reference, the proposed system obtained an overall detection accuracy of 82.71% for classifying alert and slightly drowsy events by using EEG data alone and 96.24% by using the hybrid data of head-movement and EEG. These results indicate that the combination of EEG data and head-movement contextual information constitutes a robust solution for the early detection of driver drowsiness.

  2. Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908

    Directory of Open Access Journals (Sweden)

    Alma N. Bamero

    2006-12-01

    Full Text Available This research entitled “Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908” presents a discussion of the opium trade in Asia, the commercial networks it created, the political ties it strengthened, and the social relations itfostered. It also aims to reconstruct an aspect of Philippine social history in the nineteenth century through the use of archival materials that bear witness to the distribution and exploitation of a substance which some people stillclassify as taboo. The poppy was not endemic to the Philippines but opium, its derivative substance, was known to numb pain and could induce a “natural high” that left one with feelings of ease and contentment. A more complete introduction to the drug necessitates a discussion of the way it was extractedand processed. It is a cash crop that does not require complex devices and is, therefore, within the reach of farmers and common folk. From the eighteenth to the nineteenth centuries opium became very popular among the Chinese who discovered that their markets were being flooded with it by the British sothat the latter could pay for the tea that they craved.The Spanish Bourbons, in an effort to boost Philippine economy, allowed the trading of this substance. Initially this was supervised by the officials of the Alcaiceria de San Fernando but in 1843 the meticulous examination of the country’s finances merited the creation of an opium revenuefarm through municipal franchising. Opium could only be used by the Chinese who were migrating in big groups. This paper presents the details of the monopoly contract, identifies some of the wealthier contratistas of the period, and discusses the consequences of such a commercial venture. Smuggling orcontraband trade proliferated and by way of illustration the events namely, the Scandal of 1843 and the Gunga Incident, have been narrated. The creation of an over

  3. Planning an Automatic Fire Detection, Alarm, and Extinguishing System for Research Laboratories

    Directory of Open Access Journals (Sweden)

    Rostam Golmohamadi

    2014-04-01

    Full Text Available Background & Objectives: Educational and research laboratories in universities have a high risk of fire, because they have a variety of materials and equipment. The aim of this study was to provide a technical plan for safety improvement in educational and research laboratories of a university based on the design of automatic detection, alarm, and extinguishing systems . Methods : In this study, fire risk assessment was performed based on the standard of Military Risk Assessment method (MIL-STD-882. For all laboratories, detection and fire alarm systems and optimal fixed fire extinguishing systems were designed. Results : Maximum and minimum risks of fire were in chemical water and wastewater (81.2% and physical agents (62.5% laboratories, respectively. For studied laboratories, we designed fire detection systems based on heat and smoke detectors. Also in these places, fire-extinguishing systems based on CO2 were designed . Conclusion : Due to high risk of fire in studied laboratories, the best control method for fire prevention and protection based on special features of these laboratories is using automatic detection, warning and fire extinguishing systems using CO2 .

  4. Efficient optimal joint channel estimation and data detection for massive MIMO systems

    KAUST Repository

    Alshamary, Haider Ali Jasim

    2016-08-15

    In this paper, we propose an efficient optimal joint channel estimation and data detection algorithm for massive MIMO wireless systems. Our algorithm is optimal in terms of the generalized likelihood ratio test (GLRT). For massive MIMO systems, we show that the expected complexity of our algorithm grows polynomially in the channel coherence time. Simulation results demonstrate significant performance gains of our algorithm compared with suboptimal non-coherent detection algorithms. To the best of our knowledge, this is the first algorithm which efficiently achieves GLRT-optimal non-coherent detections for massive MIMO systems with general constellations.

  5. Screening mammography-detected cancers: the sensitivity of the computer-aided detection system as applied to full-field digital mammography

    International Nuclear Information System (INIS)

    Yang, Sang Kyu; Cho, Nariya; Ko, Eun Sook; Kim, Do Yeon; Moon, Woo Kyung

    2006-01-01

    We wanted to evaluate the sensitivity of the computer-aided detection (CAD) system for performing full-field digital mammography (FFDM) on the breast cancers that were originally detected by screening mammography. The CAD system (Image Checker v3.1, R2 Technology, Los Altos, Calif.) together with a full-field digital mammography system (Senographe 2000D, GE Medical Systems, Buc, France) was prospectively applied to the mammograms of 70 mammographically detected breast cancer patients (age range, 37-69; median age, 51 years) who had negative findings on their clinical examinations. The sensitivity of the CAD system, according to histopathologic findings and radiologic primary features (i.e, mass, microcalcifications or mass with microcalcifications) and also the false-positive marking rate were then determined. The CAD system correctly depicted 67 of 70 breast cancer lesions (97.5%). The CAD system marked 29 of 30 breast cancers that presented with microcalcifications only (sensitivity 96.7%) and all 18 breast cancers the presented with mass together with microcalcifications (sensitivity 100%). Twenty of the 22 lesions that appeared as a mass only were marked correctly by the CAD system (sensitivity 90.9%). The CAD system correctly depicted all 22 lesions of ductal carcinoma in situ (sensitivity: 100%), all 13 lesions of invasive ductal carcinoma with ductal carcinoma in situ (sensitivity: 100%) and the 1 lesion of invasive lobular carcinoma (sensitivity: 100%). Thirty one of the 34 lesions of invasive ductal carcinoma were marked correctly by the CAD system (sensitivity: 91.8%). The rate of false-positive marks was 0.21 mass marks per image and 0.16 microcalcification marks per image. The overall rate of false-positive marks was 0.37 per image. The CAD system using FFDM is useful for the detection of asymptomatic breast cancers, and it has a high overall tumor detection rate. The false negative cases were found in relatively small invasive ductal carcinoma

  6. Screening mammography-detected cancers: the sensitivity of the computer-aided detection system as applied to full-field digital mammography

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Sang Kyu; Cho, Nariya; Ko, Eun Sook; Kim, Do Yeon; Moon, Woo Kyung [College of Medicine Seoul National University and The Insititute of Radiation Medicine, Seoul National University Research Center, Seoul (Korea, Republic of)

    2006-04-15

    We wanted to evaluate the sensitivity of the computer-aided detection (CAD) system for performing full-field digital mammography (FFDM) on the breast cancers that were originally detected by screening mammography. The CAD system (Image Checker v3.1, R2 Technology, Los Altos, Calif.) together with a full-field digital mammography system (Senographe 2000D, GE Medical Systems, Buc, France) was prospectively applied to the mammograms of 70 mammographically detected breast cancer patients (age range, 37-69; median age, 51 years) who had negative findings on their clinical examinations. The sensitivity of the CAD system, according to histopathologic findings and radiologic primary features (i.e, mass, microcalcifications or mass with microcalcifications) and also the false-positive marking rate were then determined. The CAD system correctly depicted 67 of 70 breast cancer lesions (97.5%). The CAD system marked 29 of 30 breast cancers that presented with microcalcifications only (sensitivity 96.7%) and all 18 breast cancers the presented with mass together with microcalcifications (sensitivity 100%). Twenty of the 22 lesions that appeared as a mass only were marked correctly by the CAD system (sensitivity 90.9%). The CAD system correctly depicted all 22 lesions of ductal carcinoma in situ (sensitivity: 100%), all 13 lesions of invasive ductal carcinoma with ductal carcinoma in situ (sensitivity: 100%) and the 1 lesion of invasive lobular carcinoma (sensitivity: 100%). Thirty one of the 34 lesions of invasive ductal carcinoma were marked correctly by the CAD system (sensitivity: 91.8%). The rate of false-positive marks was 0.21 mass marks per image and 0.16 microcalcification marks per image. The overall rate of false-positive marks was 0.37 per image. The CAD system using FFDM is useful for the detection of asymptomatic breast cancers, and it has a high overall tumor detection rate. The false negative cases were found in relatively small invasive ductal carcinoma.

  7. Highly-sensitive and large-dynamic diffuse optical tomography system for breast tumor detection

    Science.gov (United States)

    Du, Wenwen; Zhang, Limin; Yin, Guoyan; Zhang, Yanqi; Zhao, Huijuan; Gao, Feng

    2018-02-01

    Diffuse optical tomography (DOT) as a new functional imaging has important clinical applications in many aspects such as benign and malignant breast tumor detection, tumor staging and so on. For quantitative detection of breast tumor, a three-wavelength continuous-wave DOT prototype system combined the ultra-high sensitivity of the photon-counting detection and the measurement parallelism of the lock-in technique was developed to provide high temporal resolution, high sensitivity, large dynamic detection range and signal-to-noise ratio. Additionally, a CT-analogous scanning mode was proposed to cost-effectively increase the detection data. To evaluate the feasibility of the system, a series of assessments were conducted. The results demonstrate that the system can obtain high linearity, stability and negligible inter-wavelength crosstalk. The preliminary phantom experiments show the absorption coefficient is able to be successfully reconstructed, indicating that the system is one of the ideal platforms for optical breast tumor detection.

  8. Digital detection system of surface defects for large aperture optical elements

    International Nuclear Information System (INIS)

    Fan Yong; Chen Niannian; Gao Lingling; Jia Yuan; Wang Junbo; Cheng Xiaofeng

    2009-01-01

    Based on the light defect images against the dark background in a scattering imaging system, a digital detection system of surface defects for large aperture optical elements has been presented. In the system, the image is segmented by a multi-area self-adaptive threshold segmentation method, then a pixel labeling method based on replacing arrays is adopted to extract defect features quickly, and at last the defects are classified through back-propagation neural networks. Experiment results show that the system can achieve real-time detection and classification. (authors)

  9. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  10. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  11. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungwon Lee

    2009-05-01

    Full Text Available TheIP-based Ubiquitous Sensor Network (IP-USN is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System called RIDES (Robust Intrusion DEtection System for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  12. Development of the Raman lidar system for remote hydrogen gas detection

    Energy Technology Data Exchange (ETDEWEB)

    Choi, In Young; Baik, Sung Hoon; Park, Seung Kyu; Park, Nak Gyu; Choi, Young Soo [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Detection of hydrogen (H{sub 2}) gas leakage is very important for safety of the nuclear power plant because H{sub 2} gas is very flammable and explosive. H{sub 2} gas is generated by oxidizing the nuclear fuel cladding during the critical accident and generated H{sub 2} gas leads to serious secondary damages in the containment building of nuclear power plant. Thus, various H{sub 2} gas detection techniques are used in the nuclear power plant such as catalytic combustion sensors, semiconducting oxide sensors, thermal conductivity sensors and electrochemical sensor. A Raman lidar (Light Detection And Ranging) system for remote detection of the H{sub 2} gas can cover the area in the containment building of a nuclear power plant. H{sub 2} gas has a very strong Raman Effect, and H{sub 2} Raman cells have been widely used for laser wavelength conversion. In this study, Raman lidar system was developed for H{sub 2} gas detection used in the containment building of nuclear power plant. In this study, remote hydrogen gas detection devices and measuring algorithm are developed by using the Raman lidar method. Through the experiment, we proved that our developed Raman lidar system was possible to measure the N{sub 2} and H{sub 2} gas scattering signal remotely.

  13. Extracted-beam-detection system around synchrotron saturne

    International Nuclear Information System (INIS)

    Anne, Remy; Milleret, Gerard; Giuliani, Arlette; Lefol, Andre; Perret, Robert; Poupard, Joseph; Trogno, Andre; Van den Bossche, Maurice; N'Guyen Sieu Viet.

    1977-07-01

    The extracted-beam-detection system working around the synchrotron Saturne is presented. The whole system is composed of about forty multiwire chambers used for beam tuning and providing beams profiles. Optic beam parameters such as position, divergence, dimension, emittance can be easily measured, or calculated with a program running on a computer. They are working in large range intensity beams (10 2 to 5.10 11 p/cm 2 /s of protons, alpha particles, deutons, pions, tritons and electrons [fr

  14. Determining the lower limit of detection for personnel dosimetry systems

    International Nuclear Information System (INIS)

    Roberson, P.L.; Carlson, R.D.

    1992-01-01

    A simple method for determining the lower limit of detection (LLD) for personnel dosimetry systems is described. The method relies on the definition of a critical level and a detection level. The critical level is the signal level above which a result has a small probability of being due to a fluctuation of the background. All results below the critical level should not be reported as an indication of a positive result. The detection level is the net signal level (i.e., dose received) above which there is a high confidence that a true reading will be detected and reported as a qualitatively positive result. The detection level may be identified as the LLD. A simple formula is derived to allow the calculation of the LLD under various conditions. This type of formula is being used by the Department of Energy Laboratory Accreditation Program (DOELAP) for personnel dosimetry. Participants in either the National Voluntary Laboratory Accreditation Program (NVLAP) for personnel dosimetry or DOELAP can use performance test results along with a measurement of background levels to estimate the LLDs for their dosimetry system. As long as they maintain their dosimetry system such that the LLDs are less than half the lower limit of the NVLAP or DOELAP test exposure ranges, dosimetry laboratories can avoid testing failures due to poor performance at very low exposures

  15. Minimum Detectable Activity for Tomographic Gamma Scanning System

    Energy Technology Data Exchange (ETDEWEB)

    Venkataraman, Ram [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Smith, Susan [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Kirkpatrick, J. M. [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Croft, Stephen [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    For any radiation measurement system, it is useful to explore and establish the detection limits and a minimum detectable activity (MDA) for the radionuclides of interest, even if the system is to be used at far higher values. The MDA serves as an important figure of merit, and often a system is optimized and configured so that it can meet the MDA requirements of a measurement campaign. The non-destructive assay (NDA) systems based on gamma ray analysis are no exception and well established conventions, such the Currie method, exist for estimating the detection limits and the MDA. However, the Tomographic Gamma Scanning (TGS) technique poses some challenges for the estimation of detection limits and MDAs. The TGS combines high resolution gamma ray spectrometry (HRGS) with low spatial resolution image reconstruction techniques. In non-imaging gamma ray based NDA techniques measured counts in a full energy peak can be used to estimate the activity of a radionuclide, independently of other counting trials. However, in the case of the TGS each “view” is a full spectral grab (each a counting trial), and each scan consists of 150 spectral grabs in the transmission and emission scans per vertical layer of the item. The set of views in a complete scan are then used to solve for the radionuclide activities on a voxel by voxel basis, over 16 layers of a 10x10 voxel grid. Thus, the raw count data are not independent trials any more, but rather constitute input to a matrix solution for the emission image values at the various locations inside the item volume used in the reconstruction. So, the validity of the methods used to estimate MDA for an imaging technique such as TGS warrant a close scrutiny, because the pair-counting concept of Currie is not directly applicable. One can also raise questions as to whether the TGS, along with other image reconstruction techniques which heavily intertwine data, is a suitable method if one expects to measure samples whose activities

  16. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  17. Memory Efficient VLSI Implementation of Real-Time Motion Detection System Using FPGA Platform

    Directory of Open Access Journals (Sweden)

    Sanjay Singh

    2017-06-01

    Full Text Available Motion detection is the heart of a potentially complex automated video surveillance system, intended to be used as a standalone system. Therefore, in addition to being accurate and robust, a successful motion detection technique must also be economical in the use of computational resources on selected FPGA development platform. This is because many other complex algorithms of an automated video surveillance system also run on the same platform. Keeping this key requirement as main focus, a memory efficient VLSI architecture for real-time motion detection and its implementation on FPGA platform is presented in this paper. This is accomplished by proposing a new memory efficient motion detection scheme and designing its VLSI architecture. The complete real-time motion detection system using the proposed memory efficient architecture along with proper input/output interfaces is implemented on Xilinx ML510 (Virtex-5 FX130T FPGA development platform and is capable of operating at 154.55 MHz clock frequency. Memory requirement of the proposed architecture is reduced by 41% compared to the standard clustering based motion detection architecture. The new memory efficient system robustly and automatically detects motion in real-world scenarios (both for the static backgrounds and the pseudo-stationary backgrounds in real-time for standard PAL (720 × 576 size color video.

  18. Telescope sipping the optimum fuel leak detection system

    International Nuclear Information System (INIS)

    Deleryd, R.

    1998-01-01

    The TELESCOPE Sipping technology is an evolutionary development from previous ABB fuel leak systems used in LWR reactors. The system utilizes the existing dynamics that cause numerous fission products to leak from a failed fuel rod when the fuel assembly is raised from a reactor core during core fuel alterations. The system can also be used by repair work in pool side inspection in order to detect leaking rods or to verify reconstituted assemblies as non leakers. (author)

  19. On the lower of limit detection of radiometric systems

    International Nuclear Information System (INIS)

    Kamburov, H.; Boneva, S.

    1983-01-01

    The existing definitions of the quantity Asub(min), the lower detection limit, introduced as a characteristic of the sensitivity of radiometric systems are reviewed. A convenient way is found for comparing the different definitions by showing that each definition is connected with a specific value of the probability a of Type I error. The detection limits are calculated for a normal and Poisson distributions of the measured quantities. A criterion is proposed for the applicability of the normal distiribution to the problem of determining the lower detection limit

  20. Seizure detection, seizure prediction, and closed-loop warning systems in epilepsy.

    Science.gov (United States)

    Ramgopal, Sriram; Thome-Souza, Sigride; Jackson, Michele; Kadish, Navah Ester; Sánchez Fernández, Iván; Klehm, Jacquelyn; Bosl, William; Reinsberger, Claus; Schachter, Steven; Loddenkemper, Tobias

    2014-08-01

    Nearly one-third of patients with epilepsy continue to have seizures despite optimal medication management. Systems employed to detect seizures may have the potential to improve outcomes in these patients by allowing more tailored therapies and might, additionally, have a role in accident and SUDEP prevention. Automated seizure detection and prediction require algorithms which employ feature computation and subsequent classification. Over the last few decades, methods have been developed to detect seizures utilizing scalp and intracranial EEG, electrocardiography, accelerometry and motion sensors, electrodermal activity, and audio/video captures. To date, it is unclear which combination of detection technologies yields the best results, and approaches may ultimately need to be individualized. This review presents an overview of seizure detection and related prediction methods and discusses their potential uses in closed-loop warning systems in epilepsy. Copyright © 2014. Published by Elsevier Inc.