WorldWideScience

Sample records for contraband detection system

  1. Contraband detection

    International Nuclear Information System (INIS)

    Gozzani, T.

    1995-01-01

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container

  2. Contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Gozzani, T. [Science Applications International Corporation, Santa Clara (United States)

    1995-07-15

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container.

  3. Contraband detection with fast neutrons

    Energy Technology Data Exchange (ETDEWEB)

    Buffler, Andy E-mail: abuffler@science.uct.ac.za

    2004-11-01

    Recent terror events and the increase in the trade of illicit drugs have fuelled the exploration of the use of fast neutrons as probes for the detection of hidden contraband, especially explosives, in packages ranging in size from small mail items to cargo containers. The various approaches using fast neutrons for contraband detection, presently under development, are reviewed. The role that a neutron system might play in the non-intrusive interrogation of airline luggage is discussed.

  4. A new proof-of-principle contraband detection system

    International Nuclear Information System (INIS)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.

    1995-12-01

    An accelerator-based technique is being developed to detect contraband materials in large containers. The source, which uses a low-energy proton beam to generate high-energy gamma rays, uses the gamma resonance absorption technique to detect nitrogen-14 and chlorine-35 in containers. Both these materials are commonly found in contraband drugs as well as in explosives. Through the use of segmented BGO detectors to detect the resonant gamma rays a quantity as low as ∼ 1 kg can be located with a considerable degree of confidence. Several stations at a port of entry can be operated with one accelerator, as described

  5. Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems

    International Nuclear Information System (INIS)

    Gilliam, David M.

    2011-01-01

    Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many other applications of pass-fail testing, in addition to testing of contraband detection systems.

  6. A new proof-of-principle contraband detection system

    Energy Technology Data Exchange (ETDEWEB)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.; Rathke, J. [Northrop Grumman Corp., Bethpage, NY (United States). Advanced Technology and Development Center; Schmor, P.; Altman, A.; Rogers, J.; Boyd, J. [British Columbia Univ., Vancouver, BC (Canada). TRIUMF Facility; Brondo, J. [Scientific Innovations, Inc., East Hampton, NY (United States)

    1995-12-01

    A new concept for a CDS has been developed under a Phase I ARPA funded program; it uses gamma resonance absorption (GRA) to detect certain illegal drugs that may be transported in man-portable containers. A high detection probability for heroin and cocaine is possible with a device that is also searching for explosives. Elemental detection of both N and Cl is utilized, and with tomography, a 3D density image of the elements is generated. Total density image is also developed. These two together may be used with considerable confidence in determining if heroin or cocaine is present in the interrogated containers in a small quantity (1 kg). The CDS employs a high current ({ge}10 mA) DC accelerator that produces a beam of 1.75 or 1.89 MeV protons. These protons impact a target with coatings of {sup 13}C and {sup 34}S. Depending on the coating, the resultant resonant gamma rays are preferentially absorbed in either {sup 14}N or {sup 35}Cl. The resonant gammas come off the target in a conical fan at 80.7{degree} for N and 82{degree} for Cl; a common array of segmented BGO detectors is used over an arc of 53{degree} to provide input to an imaging subsystem. The tomography makes use of rotation and vertical translation of a baggage carousel holding typically 18 average sized bags for batch processing of the contents. The single proton accelerator and target can supply multiple detection stations with the appropriate gammas, a feature that may lead to very high throughput potential approaching 2000 bags/hr. Each detection station can operate somewhat independently from the others. This paper presents the overall requirements, design, operating principles, and characteristics of the CDS proof-of-principle device developed in the Phase I program.

  7. Far-infrared contraband-detection-system development for personnel-search applications

    International Nuclear Information System (INIS)

    Schellenbaum, R.L.

    1982-09-01

    Experiments have been conducted toward the development of an active near-millimeter-wave, far infrared, personnel search system for the detection of contraband. These experiments employed a microwave hybrid tee interferometer/radiometer scanning system and quasi-optical techniques at 3.3-mm wavelength to illuminate and detect the reflection from target objects against a human body background. Clothing and other common concealing materials are transport at this wavelength. Retroreflector arrays, in conjunction with a Gunn diode radiation source, were investigated to provide all-angle illumination and detection of specular reflections from unaligned and irregular-shaped objects. Results indicate that, under highly controlled search conditions, metal objects greater than or equal to 25 cm 2 can be detected in an enclosure lined with retroreflectors. Further development is required to produce a practical personnel search system. The investigation and feasibility of alternate far infrared search techniques are presented. 23 figures, 2 tables

  8. A contraband detection system proof-of-principle device using electrostatic acceleration

    International Nuclear Information System (INIS)

    Sredniawski, Joseph J.; Debiak, T.W.; Kamykowski, E.; Rathke, J.; Milton, B.; Rogers, J.; Schmor, P.; Stanford, G.; Brando, J.

    1996-01-01

    A new Contraband Detection System (CDS) Proof-of- Principle (POP) device is nearing completion at Northrop Grumman's Advanced Technology and Development Center. We employ gamma resonance absorption (GRA) to detect nitrogen or chlorine in explosives and certain forms of illegal drugs. Using tomography, 3-D images of the total density and selected element density are generated. These characteristics together may be utilized with considerable confidence in determining if contraband is present in baggage or cargo. The CDS employs a high current (10 mA) DC electrostatic accelerator that provides a beam of protons at either 1.75 or 1.89 MeV. These high energy particles impinge upon a target coated with 13 C or 34 S. The resultant resonant gamma rays are preferentially absorbed in either 14 N or 35 Cl. Because of the penetrating power of the gamma rays, this approach can be utilized for inspection of fully loaded aircraft containers such as the LD3. Our current program calls for testing of the POP CDS by late 1996. This paper presents the overall design and characteristics of the CDS POP. (author)

  9. Physics-based, Bayesian sequential detection method and system for radioactive contraband

    Science.gov (United States)

    Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

    2014-03-18

    A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

  10. Contraband detection technological complex with ion linac

    International Nuclear Information System (INIS)

    Gavrish, Yu.N.; Svistunov, Yu.A.; Sidorov, A.V.

    2004-01-01

    The contraband detection technological complex (CDTC) to detect explosives, fission materials, and vegetable drugs is proposed. Our approach employs the pulsed neutron source. The CDTC employs the rf linac to provide a beam of deuterons of 1 or 3.5 MeV, which impinge upon a target giving birth pulsed neutron flow. Explosives are identified by the matrix detection system with gamma registration under interaction of neutron on N, O, C nuclei. Experimental verification of main principles of matrix detection system is presented

  11. System to detect contraband in cargo containers using fast and slow neutron irradiation and collimated gamma detectors

    International Nuclear Information System (INIS)

    Smith, R.C.; Hurwitz, M.J.; Tran, K.C.

    1995-01-01

    We have produced a product design concept for an automatic, shipping-container inspection system to be used for detection of contraband, including illicit drugs, and for trade regulation enforcement via shipping manifest confirmation. Using nondestructive nuclear techniques the system can see deeply into the cargo and generate a 3-D spatial image of an entire container's contents automatically and in real time. A pulsed, sealed-tube, neutron generator is employed. The approach divides a container into numerous, small, volume elements that are individually interrogated using concurrent fast and slow neutron activation and gamma detection by collimated scintillators. We have designed, built, and operated a laboratory apparatus which has demonstrated the attractiveness of this approach. Experimental data were found to agree with design expectations derived from computer modeling. By combining selected element signatures and phenomenological measures, together with discrimination algorithms, we have demonstrated that a full-scale inspection system would need from less than 5 min to 30 min (depending on cargo type) to process an 8 ftx8 ftx40 ft container in order to detect hidden contraband. (orig.)

  12. Techniques for detecting explosives and contraband

    International Nuclear Information System (INIS)

    Vourvopoulos, G.

    1994-01-01

    Because terrorism continues to be a societal threat, scientists are still searching for ways to identify concealed weapons that can be used in terrorist attacks. Explosives are singled out for particular attention because they can easily be shaped to look innocuous, and are still hard to detect. At present, there are three methods under development for the detection of explosives: X-ray imaging, vapour detection and nuclear techniques, and this article will concentrate on the latter. Since there is no single technology that can address all the questions concerning the detection of explosives and other illicit contraband, the philosophy that emerges is that of an integral system combining methodologies. Such a system could contain a nuclear technology device, a vapour detector, and an X-ray imaging device, all backed by an intelligence gathering system. In this paper methods are suggested for identifying explosives which may be used in terrorist attacks and for detecting concealed drugs. Techniques discussed are X-ray imaging, combining high and low energy x-ray machines, vapour detection using a ''sniffer'' to collect vapour samples then analysing the vapour by gas chromatography, chemiluminescence and mass spectroscopy and nuclear techniques. Nuclear techniques, such as neutron activation analysis, are discussed in detail but it is stressed that they need to be carried out at speed to eliminate disruption and delay at airports etc. (UK)

  13. Contraband Detection with Nuclear Resonance Fluorescence: Feasibility and Impact

    International Nuclear Information System (INIS)

    Pruet, J; Lange, D

    2007-01-01

    In this report they show that cargo interrogation systems developed to thwart trafficking of illicit nuclear materials could also be powerful tools in the larger fight against contraband smuggling. In particular, in addition to detecting special nuclear materials, cargo scanning systems that exploit nuclear resonance fluorescence to detect specific isotopes can be used to help find: chemical weapons; some drugs as well as some chemicals regulated under the controlled substances act; precious metals; materials regulated under export control laws; and commonly trafficked fluorocarbons

  14. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  15. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    Energy Technology Data Exchange (ETDEWEB)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations.

  16. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    International Nuclear Information System (INIS)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations

  17. Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo

    Science.gov (United States)

    Slaughter, Dennis R [Oakland, CA; Pohl, Bertram A [Berkeley, CA; Dougan, Arden D [San Ramon, CA; Bernstein, Adam [Palo Alto, CA; Prussin, Stanley G [Kensington, CA; Norman, Eric B [Oakland, CA

    2008-04-15

    A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

  18. Accelerator based techniques for contraband detection

    Science.gov (United States)

    Vourvopoulos, George

    1994-05-01

    It has been shown that narcotics, explosives, and other contraband materials, contain various chemical elements such as H, C, N, O, P, S, and Cl in quantities and ratios that differentiate them from each other and from other innocuous substances. Neutrons and γ-rays have the ability to penetrate through various materials at large depths. They are thus able, in a non-intrusive way, to interrogate volumes ranging from suitcases to Sea-Land containers, and have the ability to image the object with an appreciable degree of reliability. Neutron induced reactions such as (n, γ), (n, n') (n, p) or proton induced γ-resonance absorption are some of the reactions currently investigated for the identification of the chemical elements mentioned above. Various DC and pulsed techniques are discussed and their advantages, characteristics, and current progress are shown. Areas where use of these methods is currently under evaluation are detection of hidden explosives, illicit drug interdiction, chemical war agents identification, nuclear waste assay, nuclear weapons destruction and others.

  19. Design and Construction of a First Prototype Muon Tomography System with GEM Detectors for the Detection of Nuclear Contraband

    CERN Document Server

    AUTHOR|(CDS)2074269; Grasso, L; Locke, J B; Quintero, A; Mitra, D

    2009-01-01

    Current radiation portal monitors at sea ports and international borders that employ standard radiation detection techniques are not very sensitive to nuclear contraband that is well shielded to absorb emanating radiation. Muon Tomography (MT) based on the measurement of multiple scattering of atmospheric cosmic ray muons traversing cargo or vehicles that contain high-Z material is a promising passive interrogation technique for solving this problem. We report on the design and construction of compact Micro-Pattern Gas Detectors for a small prototype MT station. This station will employ 10 tracking stations based on 30cm x 30cm low-mass triple-GEM detectors with 2D readout. Due to the excellent spatial resolution of GEMs it is sufficient to use a gap of only a few cm between tracking stations. Together with the compact size of the GEM detectors this allows the GEM MT station to be an order of magnitude more compact than MT stations using traditional drift tubes. We present details of the production and assemb...

  20. Apparatus and method for detecting contraband using fast neutron activation

    International Nuclear Information System (INIS)

    Gozani, T.; Sawa, Z.P.; Shea, P.M.

    1992-01-01

    This patent describes a method of detecting contraband within an object under investigation. It comprises: generating a beam of case neutrons; irradiating the object with the beam of fast neutrons, the fast neutrons interacting with atomic nuclei of the elements contained within the object to produce a gamma-ray spectrum having spectral lines characteristic of the elements contained within the object; measuring the spectral lines of the gamma-ray spectrum using a multiplicity of gamma-ray detectors judiciously positioned around the object; detecting the number of neutrons that pass through the object without interacting substantially with atomic nuclei within the object; determining the spatial and density distributions of the atomic nuclei of the elements contained within the object from the measured gamma-ray spectrum obtained from the multiplicity of gamma-ray detectors and the number of neutrons that pass through the object; comparing the measured spatial and density distributions of the atomic nuclei of the elements within the object with known spatial and density distributions of atomic nuclei for elements characteristic of contraband; and determining that contraband is present within the object when the comparison indicates a substantial match

  1. Liquid-Xe detector for contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Vartsky, D., E-mail: david.vartsky@weizmann.ac.il [Weizmann Institute of Science, Rehovot 76100 (Israel); Israelashvili, I. [Weizmann Institute of Science, Rehovot 76100 (Israel); Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Cortesi, M. [National Superconducting Cyclotron Laboratory, East Lansing 48823, MI (United States); Arazi, L.; Coimbra, A.E.; Moleri, L.; Erdal, E.; Bar, D.; Rappaport, M.; Shchemelinin, S. [Weizmann Institute of Science, Rehovot 76100 (Israel); Caspi, E.N. [Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Aviv, O. [Soreq NRC, Yavne 81800 (Israel); Breskin, A. [Weizmann Institute of Science, Rehovot 76100 (Israel)

    2016-07-11

    We describe progress made with a liquid-Xe (LXe) detector coupled to a gaseous photomultiplier (GPM), for combined imaging and spectroscopy of fast neutrons and gamma-rays in the MeV range. The purpose of this detector is to enable the detection of hidden explosives and fissile materials in cargo and containers. The expected position resolution is about 2 m and 3.5 mm for fast neutrons and gamma-rays, respectively. Experimental results obtained using an {sup 241}Am source yielded energy and time resolutions of 11% and 1.2 ns RMS, respectively. Initial results obtained with the position-sensitive GPM are presented.

  2. Bayesian Processing for the Detection of Radioactive Contraband from Uncertain Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Sale, K; Guidry, B; Breitfeller, E; Manatt, D; Chambers, D

    2007-06-26

    With the increase in terrorist activities throughout the world, the need to develop techniques capable of detecting radioactive contraband in a timely manner is a critical requirement. The development of Bayesian processors for the detection of contraband stems from the fact that the posterior distribution is clearly multimodal eliminating the usual Gaussian-based processors. The development of a sequential bootstrap processor for this problem is discussed and shown how it is capable of providing an enhanced signal for eventual detection.

  3. Summary tables of six commercially available entry control and contraband detection technologies

    International Nuclear Information System (INIS)

    Hunter, John Anthony

    2005-01-01

    Existing contraband detection and entry control devices such as metal detectors, X-ray machines, and radiation monitors were investigated for their capability to operate in an automated environment. In addition, a limited number of new devices for detection of explosives, chemicals, and biological agents were investigated for their feasibility for inclusion in future physical security systems. The tables in this document resulted from this investigation, which was part of a conceptual design upgrade for the United States Mints. This summary of commercially available technologies was written to provide a reference for physical security upgrades at other sites

  4. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  5. Gamma-resonance Contraband Detection using a high current tandem accelerator

    International Nuclear Information System (INIS)

    Milton, B. F.; Beis, J.; Dale, D.; Rogers, J.; Ruegg, R.; Debiak, T.; Kamykowski, E.; Melnychuk, S.; Rathke, J.; Sredniawski, J.

    1999-01-01

    TRIUMF and Northrop Grumman have developed a new system for the detection of concealed explosives and drugs. This Contraband Detection System (CDS) is based on the resonant absorption by 14 N of gammas produced using 13 C(p,γ) 14 N. The chosen reaction uses protons at 1.75 MeV and the gammas have an energy of 9.17 MeV. By measuring both the resonant and the non-resonant absorption using detectors with good spatial resolution, and applying standard tomographic techniques, we are able to produce 3D images of both the nitrogen partial density and the total density. The images together may be utilized with considerable confidence to determine if small amounts of nitrogen based explosives, heroin or cocaine are present in the interrogated containers. Practical Gamma Resonant Absorption (GRA) scanning requires an intense source of protons. However this proton source must also be very stable, have low energy spread, and have good spatial definition. These demands suggested a tandem as the accelerator of choice. We have therefore constructed a 2 MeV H - tandem optimized for high current (10 mA) operation, while minimizing the overall size of the accelerator. This has required several special innovations which will be presented in the paper. We will also present initial commissioning results

  6. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force

    Energy Technology Data Exchange (ETDEWEB)

    Hannum, David W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.; Shannon, Gary W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.

    2006-04-01

    This report describes the collaboration between the South Texas Specialized Crimes and Narcotics Task Force (STSCNTF) and Sandia National Laboratories (SNL) in a field test that provided prototype hand-held trace detection technology for use in counter-drug operations. The National Institute of Justice (NIJ)/National Law Enforcement and Corrections Technology Center (NLECTC)/Border Research and Technology Center (BRTC) was contacted by STSCNTF for assistance in obtaining cutting-edge technology. The BRTC created a pilot project for Sandia National Laboratories (SNL) and the STSCNTF for the use of SNL’s Hound, a hand-held sample collection and preconcentration system that, when combined with a commercial chemical detector, can be used for the trace detection of illicit drugs and explosives. The STSCNTF operates in an area of high narcotics trafficking where methods of concealment make the detection of narcotics challenging. Sandia National Laboratories’ (SNL) Contraband Detection Department personnel provided the Hound system hardware and operational training. The Hound system combines the GE VaporTracer2, a hand-held commercial chemical detector, with an SNL-developed sample collection and preconcentration system. The South Texas Task force reported a variety of successes, including identification of a major shipment of methamphetamines, the discovery of hidden compartments in vehicles that contained illegal drugs and currency used in drug deals, and the identification of a suspect in a nightclub shooting. The main advantage of the hand-held trace detection unit is its ability to quickly identify the type of chemical (drugs or explosives) without a long lag time for laboratory analysis, which is the most common analysis method for current law enforcement procedures.

  7. Associated-particle sealed-tube neutron probe: Detection of explosives, contraband, and nuclear materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.

    1996-01-01

    Continued research and development of the APSTNG shows the potential for practical field use of this technology for detection of explosives, contraband, and nuclear materials. The APSTNG (associated-particle sealed-tube generator) inspects the item to be examined using penetrating 14-MeV neutrons generated by the deuterium-tritium reaction inside a compact accelerator tube. An alpha detector built into the sealed tube detects the alpha-particle associated with each neutron emitted in a cone encompassing the volume to be inspected. Penetrating high-energy gamma-rays from the resulting neutron reactions identify specific nuclides inside the volume. Flight-times determined from the detection times of gamma-rays and alpha-particles separate the prompt and delayed gamma-ray spectra and allow a coarse 3-D image to be obtained of nuclides identified in the prompt spectrum. The generator and detectors can be on the same side of the inspected object, on opposite sides, or with intermediate orientations. Thus, spaces behind walls and other confined regions can be inspected. Signals from container walls can be discriminated against using the flight-time technique. No collimators or shielding are required, the neutron generator is relatively small, and commercial-grade electronics are employed. The use of 14-MeV neutrons yields a much higher cross-section for detecting nitrogen than that for systems based on thermal-neutron reactions alone, and the broad range of elements with significant 14-MeV neutron cross-sections extends explosives detection to other elements including low-nitrogen compounds, and allows detection of many other substances. Proof-of-concept experiments have been successfully performed for conventional explosives, chemical warfare agents, cocaine, and fissionable materials

  8. Contraband detection using high-energy gamma rays from 16O*

    International Nuclear Information System (INIS)

    Micklich, B.J.; Fink, C.L.; Sagalovsky, L.; Smith, D.L.

    1996-01-01

    High-energy monoenergetic gamma rays (6.13 and 7.12 MeV) from the decay of excited states of the 16 O* nucleus are highly penetrating and thus offer potential for non-intrusive inspection of loaded containers for narcotics, explosives, and other contraband items. These excited states can be produced by irradiation of water with 14-MeV neutrons from a DT neutron generator or through the 19 F(p,α) 16 O* reaction. Resonances in 19 F(p,α) 16 O* at proton energies between 340 keV and 2 MeV allow use of a low-energy accelerator to provide a compact, portable gamma source of reasonable intensity. The present work provides estimates of gamma source parameters and suggests how various types of contraband could be detected. Gamma rays can be used to perform transmission or emission radiography of containers or other objects. Through the use of (γ, n) and (γ, fission) reactions, this technique is also capable of detecting special nuclear materials such as deuterium, lithium, beryllium, uranium, and plutonium. Analytic and Monte Carlo techniques are used to model empty and loaded container inspection for accelerator-produced gamma, radioisotope, and x-ray sources

  9. The nuclear materials contraband

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.

    1996-01-01

    Several seizures of nuclear materials carried by contraband have been achieved. Some countries or criminal organizations could manufacture atomic bombs and use them. This alarming situation is described into details. Only 40% of drugs are seized by the American police and probably less in western Europe. The nuclear materials market is smaller than the drugs'one but the customs has also less experience to intercept the uranium dispatch for instance more especially as the peddlers are well organized. A severe control of the international transports would certainly allow to seize a large part of nuclear contraband materials but some dangerous isotopes as uranium 235 or plutonium 239 are little radioactive and which prevents their detection by the Geiger-Mueller counters. In France, some regulations allow to control the materials used to manufacture the nuclear weapons, and diminish thus the risk of a nuclear materials contraband. (O.L.). 4 refs., 2 figs

  10. Vapor detection of trafficking of contraband money: A discussion of technical feasibility

    Energy Technology Data Exchange (ETDEWEB)

    Dietz, R.N.

    1996-02-01

    For every two pounds of cocaine smuggled into the US, drug traffikers are being forced to clandestinely ship three pounds of money back out for subsequent laundering. Based on tracer technology developed for validation of long-range atmospheric transport models and other commercial applications, it is shown that US currency can be tagged with a minute amount (about 1 ppm by weight of a bill) of perfluorocharbon tracer (PFT) material that is sufficient to last for about 30 years and yet provide a vapor emission rate suitable for detectability of modest caches of contraband money in vehicles at border crossings, on aircraft at international terminals, and in buildings. The cost of tagging is less than $5 per million bills; the taggant quantity should have no impact on the feel of a bill. The low emission rate would not allow detectability of usual amounts of money in typical scenarios, providing an essential degree of privacy, but extraordinary amounts would be detectable using specialized instrumentation and know-how not easily attainable but commercially in production; an example of sub-part-per-quadrillion detection of a proposed PFT taggant is demonstrated using a prototype commercial unit. An outline of a research and demonstration program to achieve this capability and details of the proposed tagging and detection procedures already indicate that the concept is technically feasible.

  11. 78 FR 76860 - Contraband Screening for Criminal Justice Applications

    Science.gov (United States)

    2013-12-19

    ... for the detection of contraband. Screening technology is widely used by criminal justice practitioners...: 1. Model Number and Name of the screening system/device. 2. Technology used by the system/device for... container or bag), Plastic, Wood, Ceramic, Powder (in a small packet), and/or Paper (e.g., folded currency...

  12. Fast neutron radiography scanner for the detection of contraband in air cargo containers

    International Nuclear Information System (INIS)

    Eberhardt, J.E.; Rainey, S.; Stevens, R.J.; Sowerby, B.D.; Tickner, J.R.

    2005-01-01

    There is a growing need to rapidly scan bulk air cargo for contraband such as illicit drugs and explosives. The Commonwealth Science and Industrial Research Organisation (CSIRO) have been working with Australian Customs Service to develop a scanner capable of directly scanning airfreight containers in 1-2 minutes without unpacking. The scanner combines fast neutron and gamma-ray radiography to provide high-resolution images that include information on material composition. A full-scale prototype scanner has been successfully tested in the laboratory and a commercial-scale scanner is due to be installed at Brisbane airport in 2005

  13. Fast neutron radiography scanner for the detection of contraband in air cargo containers

    Energy Technology Data Exchange (ETDEWEB)

    Eberhardt, J.E. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Rainey, S. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Stevens, R.J. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia); Sowerby, B.D. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia)]. E-mail: brian.sowerby@csiro.au; Tickner, J.R. [CSIRO Minerals, Private Mail Bag 5, Menai, NSW 2234 (Australia)

    2005-08-01

    There is a growing need to rapidly scan bulk air cargo for contraband such as illicit drugs and explosives. The Commonwealth Science and Industrial Research Organisation (CSIRO) have been working with Australian Customs Service to develop a scanner capable of directly scanning airfreight containers in 1-2 minutes without unpacking. The scanner combines fast neutron and gamma-ray radiography to provide high-resolution images that include information on material composition. A full-scale prototype scanner has been successfully tested in the laboratory and a commercial-scale scanner is due to be installed at Brisbane airport in 2005.

  14. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    International Nuclear Information System (INIS)

    YangDai, Tianyi; Zhang, Li

    2016-01-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  15. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    Energy Technology Data Exchange (ETDEWEB)

    YangDai, Tianyi [Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China); Zhang, Li, E-mail: zhangli@nuctech.com [Department of Engineering Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory of Particle & Radiation Imaging (Tsinghua University), Ministry of Education (China)

    2016-02-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  16. Liquid contrabands classification based on energy dispersive X-ray diffraction and hybrid discriminant analysis

    Science.gov (United States)

    YangDai, Tianyi; Zhang, Li

    2016-02-01

    Energy dispersive X-ray diffraction (EDXRD) combined with hybrid discriminant analysis (HDA) has been utilized for classifying the liquid materials for the first time. The XRD spectra of 37 kinds of liquid contrabands and daily supplies were obtained using an EDXRD test bed facility. The unique spectra of different samples reveal XRD's capability to distinguish liquid contrabands from daily supplies. In order to create a system to detect liquid contrabands, the diffraction spectra were subjected to HDA which is the combination of principal components analysis (PCA) and linear discriminant analysis (LDA). Experiments based on the leave-one-out method demonstrate that HDA is a practical method with higher classification accuracy and lower noise sensitivity than the other methods in this application. The study shows the great capability and potential of the combination of XRD and HDA for liquid contrabands classification.

  17. Nuclear resonance absorption (NRA): method and application to detection of contraband in a baggage, cargo and vehicles

    International Nuclear Information System (INIS)

    Goldenberg, M.B.; Vartsky, D.; Engler, G.

    1996-01-01

    Nuclear Resonance Absorption (NRA) has played a prominent role in nuclear spectroscopy for almost 5 decades, but found only few and marginal applications outside the laboratory before 1985. In that year the situation changed markedly when scientists from this laboratory proposed to the Federal Aviation Administration (FAA) in the U.S. to study its suitability for detecting explosives in passenger baggage via nitrogen-specific radiographic imaging (explosives, as a category, have inordinately high nitrogen densities). Following a basic feasibility study and the first laboratory demonstration of explosives detection in 1989, this project has attained the stage of a pre-industrial prototype that exhibited excellent performance characteristics in a 1993 blind test conducted by the FAA. In terms of NRA operational system concept, data taking methodology, development of dedicated detectors and image analysis algorithms, the Soreq group has made a major, if not exclusive, contribution over the years. (authors)

  18. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-08-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  19. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-01-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  20. Medical applications of in vivo neutron inelastic scattering and neutron activation analysis: Technical similarities to detection of explosives and contraband

    International Nuclear Information System (INIS)

    Kehayias, J.J.

    2001-01-01

    Nutritional status of patients can be evaluated by monitoring changes in elemental body composition. Fast neutron activation (for N and P) and neutron inelastic scattering (for C and O) are used in vivo to assess elements characteristic of specific body compartments. There are similarities between the body composition techniques and the detection of hidden explosives and narcotics. All samples have to be examined in depth and the ratio of elements provides a 'signature' of the chemical of interest. The N/H and C/O ratios measure protein and fat content in the body. Similarly, a high C/O ratio is characteristic of narcotics and a low C/O together with a strong presence of N is a signature of some explosives. The available time for medical applications is about 20 min - compared to a few seconds for the detection of explosives - but the permitted radiation exposure is limited. In vivo neutron analysis is used to measure H, O, C, N, P, Na, Cl, and Ca for the study of the mechanisms of lean tissue depletion with aging and wasting diseases, and to investigate methods of preserving function and quality of life in the elderly

  1. Basic concepts underlying fast-neutron-based contraband interrogation technology

    International Nuclear Information System (INIS)

    Fink, C.L.; Guenther, P.T.; Smith, D.L.

    1992-01-01

    All accelerator-based fast-neutron contraband interrogation systems have many closely interrelated subsystems, whose performance parameters will be critically interdependent. For optimal overall performance, a systems analysis design approach is required. This paper provides a general overview of the interrelationships and the tradeoffs to be considered for optimization of nonaccelerator subsystems

  2. Use of Ground Penetrating Radar for Locating Contraband Aboard Ocean Going Vessels: Feasibility Study

    National Research Council Canada - National Science Library

    Llopis, Jose

    2001-01-01

    Ground Penetrating Radar (GPR) surveys were conducted over various stockpiled materials at the Alabama state Docks located in Mobile, AL, to determine whether GPR is a viable method for rapidly detecting contraband materials...

  3. Determination of contraband using fast neutron resonance technique

    Energy Technology Data Exchange (ETDEWEB)

    Bae, J.; Whang, J. [Kyunghee Univ., Dept. of Nuclear Engineering, Yongin-shi, Kyongki-do (Korea, Republic of)

    2004-07-01

    'Full-text:' Resonance technique with monoenergetic fast neutron beam is able to map features in bulk samples in a way that is sensitive to their elemental composition. It has a number of potential applications, for example, in mining and in the detection of contraband materials such as illicit drugs and explosives. By moving around the neutron detector experiences neutrons in the form of narrow line beam with different energies as the angle to the neutron source changes. Projection data was obtained using the Monte Carlo code MCNP4C. Therefore the fast neutrons scattered from an unknown object are used to determine the elemental content of the object and hence lead to its identification. Scattered features simulated for various test materials are analyzed using the HEPRO program system (PTB, Braunschweig) to determine the atom weight fractions for H. C. N, O and other elements in the materials. Atom weight fractions determined from scattering features are insensitive to neutron interactions in interfering materials surrounding the object. The simulations demonstrate that the fast neutron resonance technique (FNRT) provides reliable elemental characterization of bulk materials and has the necessary sensitivity to distinguish between drugs, explosives and other materials. (author)

  4. Determination of contraband using fast neutron resonance technique

    International Nuclear Information System (INIS)

    Bae, J.; Whang, J.

    2004-01-01

    'Full-text:' Resonance technique with monoenergetic fast neutron beam is able to map features in bulk samples in a way that is sensitive to their elemental composition. It has a number of potential applications, for example, in mining and in the detection of contraband materials such as illicit drugs and explosives. By moving around the neutron detector experiences neutrons in the form of narrow line beam with different energies as the angle to the neutron source changes. Projection data was obtained using the Monte Carlo code MCNP4C. Therefore the fast neutrons scattered from an unknown object are used to determine the elemental content of the object and hence lead to its identification. Scattered features simulated for various test materials are analyzed using the HEPRO program system (PTB, Braunschweig) to determine the atom weight fractions for H. C. N, O and other elements in the materials. Atom weight fractions determined from scattering features are insensitive to neutron interactions in interfering materials surrounding the object. The simulations demonstrate that the fast neutron resonance technique (FNRT) provides reliable elemental characterization of bulk materials and has the necessary sensitivity to distinguish between drugs, explosives and other materials. (author)

  5. Managed access technology to combat contraband cell phones in prison: Findings from a process evaluation.

    Science.gov (United States)

    Grommon, Eric

    2018-02-01

    Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Imaging of high-Z material for nuclear contraband detection with a minimal prototype of a muon tomography station based on GEM detectors

    Energy Technology Data Exchange (ETDEWEB)

    Gnanvo, Kondo, E-mail: kgnanvo@fit.edu [Department of Physics and Space Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States); Grasso, Leonard V.; Hohlmann, Marcus; Locke, Judson B.; Quintero, Amilkar [Department of Physics and Space Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States); Mitra, Debasis [Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL 32901 (United States)

    2011-10-01

    Muon Tomography based on the measurement of multiple scattering of atmospheric cosmic ray muons in matter is a promising technique for detecting heavily shielded high-Z radioactive materials (U, Pu) in cargo or vehicles. The technique uses the deflection of cosmic ray muons in matter to perform tomographic imaging of high-Z material inside a probed volume. A Muon Tomography Station (MTS) requires position-sensitive detectors with high spatial resolution for optimal tracking of incoming and outgoing cosmic ray muons. Micro Pattern Gaseous Detector (MPGD) technologies such as Gas Electron Multiplier (GEM) detectors are excellent candidates for this application. We have built and operated a minimal MTS prototype based on 30 cmx30 cm GEM detectors for probing targets with various Z values inside the MTS volume. We report the first successful detection and imaging of medium-Z and high-Z targets of small volumes ({approx}0.03 L) using GEM-based Muon Tomography.

  7. Imaging of high-Z material for nuclear contraband detection with a minimal prototype of a muon tomography station based on GEM detectors

    International Nuclear Information System (INIS)

    Gnanvo, Kondo; Grasso, Leonard V.; Hohlmann, Marcus; Locke, Judson B.; Quintero, Amilkar; Mitra, Debasis

    2011-01-01

    Muon Tomography based on the measurement of multiple scattering of atmospheric cosmic ray muons in matter is a promising technique for detecting heavily shielded high-Z radioactive materials (U, Pu) in cargo or vehicles. The technique uses the deflection of cosmic ray muons in matter to perform tomographic imaging of high-Z material inside a probed volume. A Muon Tomography Station (MTS) requires position-sensitive detectors with high spatial resolution for optimal tracking of incoming and outgoing cosmic ray muons. Micro Pattern Gaseous Detector (MPGD) technologies such as Gas Electron Multiplier (GEM) detectors are excellent candidates for this application. We have built and operated a minimal MTS prototype based on 30 cmx30 cm GEM detectors for probing targets with various Z values inside the MTS volume. We report the first successful detection and imaging of medium-Z and high-Z targets of small volumes (∼0.03 L) using GEM-based Muon Tomography.

  8. Maritime security report. April 1997 [Maritime smuggling of drugs and contraband goods through Haiti adversely impacting legitimate commerce and development; Partnering : a key to growing challenges confronting maritime security

    Science.gov (United States)

    1997-04-01

    Haiti is a significant transshipment conduit for South American cocaine destined for the United States. This smuggling is facilitated by Haitis system of seaports which remain largely unmonitored. Smuggling and trafficking contraband merchandise aver...

  9. Automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs

  10. Laboratory evaluation of two x-ray baggage inspection systems

    International Nuclear Information System (INIS)

    Schellenbaum, R.L.

    1979-06-01

    The AS and E Micro-Dose X-ray Baggage Inspection System was designed for high-volume, detailed examination of packages at ultralow x-ray exposure levels. This system is used in airline terminals for the detection of weapons, bombs, and other contraband. It is also employed by security personnel in other facilities to search packages for contraband carried in and out of secured areas. The Micro-Dose system has a unique design concept which includes an Automatic Threat Alert System (ATA) and a zoom display presentation feature

  11. An automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized

  12. 28 CFR 553.13 - Procedures for handling contraband.

    Science.gov (United States)

    2010-07-01

    ... purchase, or as a gift) without staff authorization may be considered nuisance contraband for which a claim of ownership is ordinarily not accepted. (iii) If the inmate establishes ownership, but the item is... evidence of ownership of the listed items. A claim of ownership may not be accepted for an item made from...

  13. NELIS-an illicit drug detection system

    International Nuclear Information System (INIS)

    Dokhale, P.A.; Csikai, J.; Womble, P.C.; Vourvopoulos, G.

    2001-01-01

    NELIS (Neutron Elemental Inspection System) is currently being developed to inspect pallets laden with various commodities for contraband (drugs, etc.). NELIS analyzes the characteristic gamma rays from the elements in drugs such as C, O, H, Cl, N, etc. that are produced by nuclear reactions from fast and thermal neutrons (Pulsed Fast/Thermal Neutron Analysis). Hidden drugs are identified through the measurement of the elemental content of the object, and the comparison of expected and measured elemental ratios. NELIS can be coupled with conventional X-ray imaging system to optimize the inspection capabilities at ports of entry

  14. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  15. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  16. Factors associated with different cigarette access behaviours among underage smoking youth who usually smoke contraband (native) cigarettes.

    Science.gov (United States)

    Leatherdale, Scott T; Ahmed, Rashid; Vu, Mary

    2011-01-01

    Given that little is known about how youth access contraband cigarettes, the current study seeks to examine factors associated with how underage smoking youth report usually accessing contraband cigarettes. This study used nationally representative data collected from 41,886 students (grades 9 to 12) as part of the 2006-07 Canadian Youth Smoking Survey (YSS). Using data from current smokers who report that their usual brand of cigarettes is contraband, three logistic regression models were used to examine factors associated with buying cigarettes from a store, getting cigarettes from a family member, or getting cigarettes from friends or strangers. In 2006, 7.9% (n = 1 3,300) of Canadian youth who were current smokers reported that their usual brand of cigarettes was contraband. Among these youth, the majority reported that they usually get their cigarettes from a friend or stranger (54.8%), whereas 26.4% report usually getting them from a family member and 18.8% usually buying their own from a store. Boys were more likely to buy contraband cigarettes from a store, whereas youth with a parent who smokes contraband cigarettes were substantially more likely to get contraband cigarettes from a family member and youth with friends who smoke contraband cigarettes were substantially more likely to get contraband cigarettes from a friend or stranger. Ongoing surveillance of contraband cigarette use among youth and how youth access contraband cigarettes is required for guiding future tobacco control policy and programming activities.

  17. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  18. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  19. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  20. Contraband, free ports, and British merchants in the Caribbean world, 1739-1772

    Directory of Open Access Journals (Sweden)

    Nadine Hunt

    2013-04-01

    Full Text Available This article examines the evolution of contraband to legitimate trade in the eighteenth century Caribbean world during the War of Jenkins’ Ear and Seven Years’ War. It focuses on the informal networks of the British South Sea Company and the trade of informal actors. The article explores how British legislators shifted Jamaican and Dominican colonial economies away from contraband trade by opening free ports in 1766. The British Parliament passed the Free Port Act of Jamaica and Dominica following Danish and Dutch colonial efforts to crack down on contraband trade in the Caribbean world. This transition from contraband to legitimate trade enabled British merchants to engage in free trade by importing and exporting an assortment of commodities and enslaved people to and from Jamaica to other colonies in the Caribbean world.

  1. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  2. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  3. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  4. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  5. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  6. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  7. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  8. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  9. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  10. Remote Voice Detection System

    National Research Council Canada - National Science Library

    Blackmon, Fletcher A

    2007-01-01

    A device and system to remotely detect vocalizations of speech. The skin located on the throat region of a speaking person or a reflective layer on the skin on the throat region vibrates in response to vocalizations of speech by the person...

  11. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  12. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  13. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  14. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  15. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  16. Arc fault detection system

    Science.gov (United States)

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  17. Counterbalanced radiation detection system

    International Nuclear Information System (INIS)

    Platz, W.

    1987-01-01

    A counterbalanced radiation detection system is described comprising: (a) a stand; (b) a first radiation detector; (c) a first radiation detector arm means for tiltably connecting the first radiation detector with the stand; (d) a second radiation detector; (e) a second radiation detector arm means for tiltably connecting the second radiation detector with the stand, whereby the tilting angles of the radiation detector arm means define a distance between the radiation detectors; and (f) a torque transforming means connected between the first and second radiation detector arm means for transforming the torque created by one of the radiation detectors in a sense opposed to the torque created by the other radiation detector

  18. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  19. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  20. Using natural beta emission for detecting concealed tobacco in parcels

    International Nuclear Information System (INIS)

    Myers, Jeremy; Hussein, Esam M.A.

    2007-01-01

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40 K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials

  1. Using natural beta emission for detecting concealed tobacco in parcels

    Energy Technology Data Exchange (ETDEWEB)

    Myers, Jeremy [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada); Hussein, Esam M.A. [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada)], E-mail: hussein@unb.ca

    2007-10-15

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in {sup 40}K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.

  2. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  3. Complicity in contraband: British American Tobacco and cigarette smuggling in Asia.

    Science.gov (United States)

    Collin, J; Legresley, E; MacKenzie, R; Lawrence, S; Lee, K

    2004-12-01

    To examine the complicity of British American Tobacco (BAT) in cigarette smuggling in Asia, and to assess the centrality of illicit trade to regional corporate strategy. Analysis of previously confidential documents from BAT's Guildford depository. An iterative strategy combined searches based on geography, organisational structure, and key personnel, while corporate euphemisms for contraband were identified by triangulation. BAT documents demonstrate the strategic importance of smuggling across global, regional, national, and local levels. Particularly important in Asia, contraband enabled access to closed markets, created pressure for market opening, and was highly profitable. Documents demonstrate BAT's detailed oversight of illicit trade, seeking to reconcile the conflicting demands of control and deniability. BAT documents demonstrate that smuggling has been driven by corporate objectives, indicate national measures by which the problem can be addressed, and highlight the importance of a coordinated global response via WHO's Framework Convention on Tobacco Control.

  4. Atrial fibrillation in a healthy adolescent after heavy smoking of contraband cigarettes.

    Science.gov (United States)

    Ozyilmaz, Isa; Ozyilmaz, Sinem; Tosun, Oyku; Tola, Hasan Tahsin; Saygi, Murat; Ergul, Yakup

    2015-08-01

    The use of contraband cigarettes is a serious public health problem. We present a case of atrial fibrillation in a healthy adolescent suspected to be caused by smoking contraband cigarettes. A 15-year-old man was admitted to our emergency department experiencing syncope and palpitations. He was a cigarette smoker, but he had never smoked any illicit tobacco products before. He had finished a pack of counterfeit cigarettes (20 pieces) in 1.5 h. His electrocardiogram showed atrial fibrillation with a rapid ventricular response and irregular RR intervals. The patient had no history of alcohol use, surgery, palpitations, hypertension, chronic bronchitis, or any infectious diseases. His atrial fibrillation was converted to a normal sinus rhythm after the cardioversion treatment. Our patient was discharged from the pediatric cardiology service and advised to quit smoking cigarettes, strictly warning against illicit tobacco products. In conclusion, intensive smoking of counterfeit cigarettes may lead to occurrences of atrial fibrillation.

  5. Antigen detection systems

    Science.gov (United States)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  6. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  7. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  8. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  9. Radiation detecting system

    International Nuclear Information System (INIS)

    1975-01-01

    In spectrophotometry systems, a usual arrangement for modulating the radiation is a rotating disc having one or more sectors removed. A beam of radiation may be blocked by the disc except when a cut-away sector is in the path of the beam. With a double-beam system, a cut-away sector of 180 0 may be used so that when the first path is blocked, the second is allowed through, and vice versa. One or both sides of the disc may be formed as mirrors to facilitate beam switching and to allow use of more than two beams for background compensation purposes or for analysis of more than one substance within a sample. (G.T.H.)

  10. Radiation detection system

    Science.gov (United States)

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  11. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  12. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  13. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  14. Using ionising radiation against terrorism and contrabandism - dosimetric problems

    International Nuclear Information System (INIS)

    Ankerhold, U.; Hupe, O.; Buchholz, G.

    2006-01-01

    As will be explained in more detail in a talk at this conference, the personnel X-ray scanners can be divided into two groups, one using the transmitted X rays for image creation, the other one using the Compton back scatters X-rays. In the case of a backscatter scanner, a narrow, pencil -like X-ray beam is produced by a rotating chopper-wheel. The person/object is scanned in a raster scan pattern. The backscattered X-rays of all points are measured and recorded. The transmission X-ray scanner can use both fan-like and pencil like X-ray beams. The transmission detectors are installed behind the object and detect the absorption of the scanned person. Due to the very low dose values of the X-ray scanner systems in combination with a high dose rate in the direct beam for a short irradiation time, special dosemeters have to be used. In the literature and in manufacturers' specifications, the dose values given for some systems are in the range from 0.05 μSv to 5 μSv per scan with a typical irradiation time of a few milliseconds. Due to this pulse-like character of the radiation fields, the dose rate is several sieverts per hour. For the measurements of the investigated scanner, dosemeters were therefore needed having the capability to measure low doses at high dose rates and to measure in pulsed radiation fields. For the optimization of the measurements, the use of measuring devices with a direct indication is necessary. Ionisation chambers are the most suitable measuring instruments to fulfill these requirements. The difficulty for the measurements with an ionisation chamber is that the leakage charge integrated over time can reach values at the level of the expected radiation-produced charge. Additionally unpredictable variations of the leakage charge can be in the same order of magnitude as the expected signal. This challenge led to the development of a special electronics which allow the execution of time-resolved measurements. With this time resolution, it is

  15. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  16. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  17. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  18. Road Anomalies Detection System Evaluation.

    Science.gov (United States)

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  19. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  20. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  1. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  2. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  3. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  4. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  5. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  6. Nuclear detection systems in traffic

    International Nuclear Information System (INIS)

    Farkas, T.; Pernicka, L.; Svec, A.

    2005-01-01

    Illicit trafficking in nuclear materials (nuclear criminality) has become a problem, due to the circulation of a high number of radioactive sources caused by the changes of the organisational infrastructures to supervise these material within the successor states of the former Soviet Union. Aim of this paper is to point out the technical requirements and the practicability of an useful monitoring system at preselected traffic check points (railway and highway border crossings, industrial sites entry gates, international airports). The ITRAP lab test was designed to work as strict benchmark to qualify border monitoring systems 67 with very low false alarm rates, in addition the minimum sensitivity to give an alarm has been defined for fix-installed systems, pocket type and hand held instruments. For the neutron tests a special prepared Californium source ( 252 Cf) was used to simulate the weapons plutonium. The source is shielded against gamma radiation, use a moderator and provides the required neutron rate of 20000 n/s at 2 rn distance. To test the false alarm rate (rate of false positive ) the same test facility , under the same background conditions, was used but without a radioactive test source. The ITRAP lab tests for the fix-installed systems started at May 1998 and first results were given in September 1998. Only 2 of 14 fix-installed monitoring systems could fulfil the minimum requirement for neutron detection. 7 of 14 fix-installed monitoring systems (50%) passed the ITRAP lab test. The analytical method developed and used for certification of installed radiation monitors in the Slovak Institute of Metrology consists in measurement of radiation activity of selected radionuclide in defined conditions. (authors)

  7. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  8. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  9. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  10. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  11. Integrated Performance Testing Workshop, Modules 6 - 11

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice; Torres, Teresa M.

    2012-10-01

    These modules cover performance testing of: Interior Detection Systems; Access Controls; Exterior Detection Systems; Video Assessment Systems; SNM / Contraband Detection Systems; Access Delay Elements

  12. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  13. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  14. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  15. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  16. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  17. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  18. US Army Nuclear Burst Detection System (NBDS)

    International Nuclear Information System (INIS)

    Glaser, R.F.

    1980-07-01

    The Nuclear Burst Detection System (NBDS) was developed to meet the Army requirements of an unattended, automatic nuclear burst reporting system. It provides pertinent data for battlefield commanders on a timely basis with high reliability

  19. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  20. Development of the environmental neutron detection system

    International Nuclear Information System (INIS)

    Kume, Kyo

    2002-03-01

    Environmental neutron detection system was proposed and developed. The main goal of this system was set to detect fast and thermal neutrons with the identical detectors setup without degraders. This system consists of a 10 B doped liquid scintillator for n detection and CsI scintillators for simultaneous γ emission from 10 B doped in the liquid scintillator after the n capture reaction. The first setup was optimized for the thermal n detection, while the second setup was for the fast n detection. It was shown that the thermal n flux was obtained in the first setup by using the method of the γ coincidence method with the help of the Monte Carlo calculation. The second setup was designed to improve the detection efficiency for the fast n, and was shown qualitatively that both the pulse shape discrimination and the coincidence methods are efficient. There will be more improvements, particularly for the quantitative discussion. (author)

  1. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  2. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  3. System tuning and measurement error detection testing

    International Nuclear Information System (INIS)

    Krejci, Petr; Machek, Jindrich

    2008-09-01

    The project includes the use of the PEANO (Process Evaluation and Analysis by Neural Operators) system to verify the monitoring of the status of dependent measurements with a view to early measurement fault detection and estimation of selected signal levels. At the present stage, the system's capabilities of detecting measurement errors was assessed and the quality of the estimates was evaluated for various system configurations and the formation of empiric models, and rules were sought for system training at chosen process data recording parameters and operating modes. The aim was to find a suitable system configuration and to document the quality of the tuned system on artificial failures

  4. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    people try to reveal sensitive information of Internet users, also called as phishing. Phishing detection has received great attention but there has...node. Figure 3 describes the result of modified nodes from the original RDR rule tree. Red- coloured ‘X’ sign represents the stopping rule, and the...green- coloured boxes describe the refined rule. However, when human knowledge is applied to those incorrectly classified data, not all of the

  5. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  6. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  7. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes; Harrou, Fouzi; Sun, Ying; Kara, Kamel; Chouder, Aissa; Silvestre, Santiago

    2017-01-01

    and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model

  8. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  9. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  10. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  11. Caltrans fog detection and warning system.

    Science.gov (United States)

    2009-01-01

    The California Department of Transportation (Caltrans) has implemented a fog detection and warning system on Highway 99 near Fresno. The entire central valley region is susceptible to Tule fog, which can reduce visibility tremendously, sometimes to n...

  12. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando; Laleg-Kirati, Taous-Meriem

    2012-01-01

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological

  13. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  14. Doubler system quench detection threshold

    International Nuclear Information System (INIS)

    Kuepke, K.; Kuchnir, M.; Martin, P.

    1983-01-01

    The experimental study leading to the determination of the sensitivity needed for protecting the Fermilab Doubler from damage during quenches is presented. The quench voltage thresholds involved were obtained from measurements made on Doubler cable of resistance x temperature and voltage x time during quenches under several currents and from data collected during operation of the Doubler Quench Protection System as implemented in the B-12 string of 20 magnets. At 4kA, a quench voltage threshold in excess of 5.OV will limit the peak Doubler cable temperature to 452K for quenches originating in the magnet coils whereas a threshold of 0.5V is required for quenches originating outside of coils

  15. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  16. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  17. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  18. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  19. A new digital correlation flaw detection system

    International Nuclear Information System (INIS)

    Lee, B.B.; Furgason, E.S.

    1981-01-01

    A new portable digital random signal flaw detection system is described which uses a digital delay line to replace the acoustic delay line of the original random signal system. Using this new system, a comparison was made between the two types of transmit signals which have been used in previous systems--m-sequences and random signals. This comparison has not been possible with these previous correlation flaw detection systems. Results indicated that for high-speed short code operation, the m-sequences produced slightly lower range sidelobes than typical samples of a clipped random signal. For normal long code operation, results indicated that system performance is essentially equivalent in resolution and signal-to-noise ratio using either m-sequences or clipped and sampled random signals. Further results also showed that for normal long code operation, the system produces outputs equivalent in resolution to pulse-echo systems, but with the added benefit of signal-to-noise ratio enhancement

  20. Technologies for detection of nuclear materials

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1996-01-01

    Detection of smuggled nuclear materials at transit points requires monitoring unknown samples in large closed packages. This review contends that high-confidence nuclear-material detection requires induced fission as the primary mechanism, with passive radiation screening in a complementary role. With the right equipment, even small quantities of nuclear materials are detectable with a high probability at transit points. The equipment could also be linked synergistically with detectors of other contrabond. For screening postal mail and packages, passive monitors are probably more cost-effective. When a suspicious item is detected, a single active probe could then be used. Until active systems become mass produced, this two-stage screening/interrogation role for active/passive equipment is more economic for cargo at border crossings. For widespread monitoring of nuclear smuggling, it will probably be necessary to develop a system for simultaneously detecting most categories of contraband, including explosives and illicit drugs. With control of nuclear materials at known storage sites being the first line of defense, detection capabilities at international borders could establish a viable second line of defense against smuggling

  1. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  2. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  3. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  4. Multisignal detecting system of pile integrity testing

    Science.gov (United States)

    Liu, Zuting; Luo, Ying; Yu, Shihai

    2002-05-01

    The low strain reflection wave method plays a principal rule in the integrating detection of base piles. However, there are some deficiencies with this method. For example, there is a blind area of detection on top of the tested pile; it is difficult to recognize the defects at deep-seated parts of the pile; there is still the planar of 3D domino effect, etc. It is very difficult to solve these problems only with the single-transducer pile integrity testing system. A new multi-signal piles integrity testing system is proposed in this paper, which is able to impulse and collect signals on multiple points on top of the pile. By using the multiple superposition data processing method, the detecting system can effectively restrain the interference and elevate the precision and SNR of pile integrity testing. The system can also be applied to the evaluation of engineering structure health.

  5. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  6. Obstacle detection system for underground mining vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, P.; Polotski, V.; Piotte, M.; Melamed, F. [Ecole Polytechnique de Montreal, Montreal, PQ (Canada)

    1998-01-01

    A device for detecting obstacles by autonomous vehicles navigating in mine drifts is described. The device is based upon structured lighting and the extraction of relevant features from images of obstacles. The system uses image profile changes, ground and wall irregularities, disturbances of the vehicle`s trajectory, and impaired visibility to detect obstacles, rather than explicit three-dimensional scene reconstruction. 7 refs., 5 figs.

  7. Device for detecting failure of reactor system

    International Nuclear Information System (INIS)

    Miyazawa, Tatsuo.

    1979-01-01

    Purpose: To make it possible to rapidly detect any failure in a reactor system prior to the leakage of coolants. Constitution: The dose of beta line is computed from the difference between the power of a detector for reacting with both beta and gamma lines and a detector for reacting only with gamma line to detect the failure of a reactor system, thereby to raise the detection speed and improve the detection accuracy. More specifically, a radiation detector A detects gamma and beta lines by means of piezoelectric elements. A radiation detector B caused the opening of the detector A to be covered with a metal, and detects only gamma line. The detected values of detectors A and B are amplified by an amplifier and applied to a rate meter and a counter, the values being converted into DC and introduced into a comparison circuit, where the outputs of the rate meter are compared with each other. When the difference is more than the predetermined range, it is supplied as output to an alarm circuit where an alarm signal is produced. (Nakamura, S.)

  8. Edge detection techniques for iris recognition system

    International Nuclear Information System (INIS)

    Tania, U T; Motakabber, S M A; Ibrahimy, M I

    2013-01-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate

  9. Maximum Temperature Detection System for Integrated Circuits

    Science.gov (United States)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  10. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  11. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a coaxial direct-detection LIDAR system for measuring velocity, temperature and/or particulate density. The system comprises a laser source for emitting a laser light beam having a lasing center frequency along an emission path. The system further comprises an optical....... Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  12. Methods and systems for detection of radionuclides

    Science.gov (United States)

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  13. Radiation Detection and Dual-Energy X-Ray Imaging for Port Security

    Energy Technology Data Exchange (ETDEWEB)

    Pashby, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Glenn, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Divin, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Martz, H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-08-09

    Millions of cargo containers are transported across the United States border annually and are inspected for illicit radioactive material and contraband using a combination of passive radiation portal monitors (RPM) and high energy X-ray non-intrusive inspection (NII) systems. As detection performance is expected to vary with the material composition of cargo, characterizing the types of material present in cargo is important to national security. This work analyzes the passive radiation and dual energy radiography signatures from on RPM and two NII system, respectively. First, the cargos were analyzed to determine their ability to attenuate emissions from an embedded radioactive source. Secondly, dual-energy X-ray discrimination was used to determine the material composition and density of the cargos.

  14. Digital detection systems for projection radiography

    International Nuclear Information System (INIS)

    Schulz, R.F.

    2001-01-01

    This article gives a survey of digital X-ray detection systems for projection radiography. The different principles are compared and some general characteristics are derived. The basic conversion mechanisms in the absorption layers are described. The basic principles of solid state X-ray detectors and their general characteristics are elucidated as well as some similarities with detectors for computed tomography. Some important application and system aspects are considered. An outlook on further possible developments in this field is given. (orig.) [de

  15. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  16. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  17. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  18. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  19. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  20. Chemical detection, identification, and analysis system

    International Nuclear Information System (INIS)

    Morel, R.S.; Gonzales, D.; Mniszewski, S.

    1990-01-01

    The chemical detection, identification, and analysis system (CDIAS) has three major goals. The first is to display safety information regarding chemical environment before personnel entry. The second is to archive personnel exposure to the environment. Third, the system assists users in identifying the stage of a chemical process in progress and suggests safety precautions associated with that process. In addition to these major goals, the system must be sufficiently compact to provide transportability, and it must be extremely simple to use in order to keep user interaction at a minimum. The system created to meet these goals includes several pieces of hardware and the integration of four software packages. The hardware consists of a low-oxygen, carbon monoxide, explosives, and hydrogen sulfide detector; an ion mobility spectrometer for airborne vapor detection; and a COMPAQ 386/20 portable computer. The software modules are a graphics kernel, an expert system shell, a data-base management system, and an interface management system. A supervisory module developed using the interface management system coordinates the interaction of the other software components. The system determines the safety of the environment using conventional data acquisition and analysis techniques. The low-oxygen, carbon monoxide, hydrogen sulfide, explosives, and vapor detectors are monitored for hazardous levels, and warnings are issued accordingly

  1. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  2. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  3. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  4. Evaluation of pipeline leak detection systems

    International Nuclear Information System (INIS)

    Glauz, W.D.; Flora, J.D.; Hennon, G.J.

    1993-01-01

    Leaking underground storage tank system presents an environmental concern and a potential health hazard. It is well known that leaks in the piping associated with these systems account for a sizeable fraction of the leaks. EPA has established performance standards for pipeline leak detection systems, and published a document presenting test protocols for evaluating these systems against the standards. This paper discusses a number of facets and important features of evaluating such systems, and presents results from tests of several systems. The importance of temperature differences between the ground and the product in the line is shown both in theory and with test data. The impact of the amount of soil moisture present is addressed, along with the effect of frozen soil. These features are addressed both for line tightness test systems, which must detect leaks of 0.10 gal/h (0.38 L/h) at 150% of normal line pressure, or 0.20 gal/h (0.76 L/h) at normal line pressure, and for automatic line leak detectors that must detect leaks of 3 gal/h (11 L/h) at 10 psi (69 kPa) within an hour of the occurrence of the leak. This paper also addresses some statistical aspects of the evaluation of these systems. Reasons for keeping the evaluation process ''blind'' to the evaluated company are given, along with methods for assuring that the tests are blind. Most importantly, a test procedure is presented for evaluating systems that report a flow rate (not just a pass/fail decision) that is much more efficient than the procedure presented in the EPA protocol, and is just as stringent

  5. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1983-10-01

    A research program is under way to evaluate and develop improve leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  6. Subsea leak detection systems - recommended practice

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Kristin Nergaard

    2010-07-01

    It is known in the industry that occasional leakages occur in subsea production systems. In spite of efforts to apply subsea leak detectors, the experience is that most leakages are either detected by ROV during routine inspections or interventions or as oil slicks on the surface . Operators and authority awareness towards the environmental impact of oil and gas production is increasing. The regulatory bodies in Norway, EU and USA specify requirements for detection of acute pollution. This paper presents the development of a Recommended Practice (RP) sponsored by OLF (The Norwegian Oil Industry Association). The JIP includes several major oil and gas operators. The objective of the RP is to serve as a technical and practical reference in the field of subsea leak detection. (Author)

  7. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  8. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  9. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  10. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  11. Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908

    OpenAIRE

    Alma N. Bamero

    2006-01-01

    This research entitled “Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908” presents a discussion of the opium trade in Asia, the commercial networks it created, the political ties it strengthened, and the social relations itfostered. It also aims to reconstruct an aspect of Philippine social history in the nineteenth century through the use of archival materials that bear witness to the distribution and exploit...

  12. 29 CFR 1910.164 - Fire detection systems.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... detection systems. (a) Scope and application. This section applies to all automatic fire detection systems... detection systems and components to normal operating condition as promptly as possible after each test or...

  13. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  14. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  15. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  16. The remote atmospheric and ionospheric detection system

    International Nuclear Information System (INIS)

    McCoy, R.P.; Wolfram, K.D.; Meier, R.R.

    1986-01-01

    The Remote Atmospheric and Ionospheric Detection System (RAIDS) experiment, to fly on a TIROS spacecraft in the late 1980's, consists of a comprehensive set of one limb imaging and seven limb scanning optical sensors. These eight instruments span the spectral range from the extreme ultraviolet to the near infrared, allowing simultaneous observations of the neutral and ion composition on the day and night side as well as in the auroral region. The primary objective of RAIDS is to demonstrate a system for remote sensing of the ionosphere to produce global maps of the electron density, peak altitude and critical frequency

  17. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  18. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  19. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  20. High sensitivity neutron bursts detecting system

    International Nuclear Information System (INIS)

    Shyam, A.; Kaushik, T.C.; Srinivasan, M.; Kulkarni, L.V.

    1993-01-01

    Technique and instrumentation to detect multiplicity of fast neutrons, emitted in sharp bursts, has been developed. A bank of 16 BF 3 detectors, in an appropriate thermalising assembly, efficiency ∼ 16%, is used to detect neutron bursts. The output from this setup, through appropriate electronics, is divided into two paths. The first is directly connected to a computer controlled scalar. The second is connected to another similar scalar through a delay time unit (DTU). The DTU design is such that once it is triggered by a count pulse than it does not allow any counts to be recorded for a fixed dead time set at ∼ 100 μs. The difference in counts recorded directly and through DTU gives the total number of neutrons produced in bursts. This setup is being used to study lattice cracking, anomalous effects in solid deuterium systems and various reactor physics experiments. (author). 3 refs., 1 fig

  1. System and method for anomaly detection

    Science.gov (United States)

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  2. Collision Detection for Underwater ROV Manipulator Systems

    Directory of Open Access Journals (Sweden)

    Satja Sivčev

    2018-04-01

    Full Text Available Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  3. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  4. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  5. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  6. Radon detection system, design, test and performance

    International Nuclear Information System (INIS)

    Balcazar, M.; Chavez, A.; Pina-Villalpando, G.; Navarrete, M.

    1999-01-01

    A portable radon detection system (α-Inin) has been designed and constructed for using it in adverse environmental conditions where humidity, temperature and chemical vaporous are present. The minimum integration time is in periods of 15 min during 41 days. A 12 V battery and a photovoltaic module allow the α-Inin autonomy in field measurements. Data is collected by means of a laptop computer where data processing and α-Inin programming are carried out. α-Inin performance was simultaneously tested in a controlled radon chamber, together with a commercial α-Meter

  7. Autonomous system for pathogen detection and identification

    International Nuclear Information System (INIS)

    Belgrader, P.; Benett, W.; Langlois, R.; Long, G.; Mariella, R.; Milanovich, F.; Miles, R.; Nelson, W.; Venkateswaran, K.

    1998-01-01

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify stimulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air

  8. A polarization system for persistent chemical detection

    Science.gov (United States)

    Craven-Jones, Julia; Appelhans, Leah; Couphos, Eric; Embree, Todd; Finnegan, Patrick; Goldstein, Dennis; Karelitz, David; LaCasse, Charles; Luk, Ting S.; Mahamat, Adoum; Massey, Lee; Tanbakuchi, Anthony; Washburn, Cody; Vigil, Steven

    2015-09-01

    We report on the development of a prototype polarization tag based system for detecting chemical vapors. The system primarily consists of two components, a chemically sensitive tag that experiences a change in its optical polarization properties when exposed to a specific chemical of interest, and an optical imaging polarimeter that is used to measure the polarization properties of the tags. Although the system concept could be extended to other chemicals, for the initial system prototype presented here the tags were developed to be sensitive to hydrogen fluoride (HF) vapors. HF is used in many industrial processes but is highly toxic and thus monitoring for its presence and concentration is often of interest for personnel and environmental safety. The tags are periodic multilayer structures that are produced using standard photolithographic processes. The polarimetric imager has been designed to measure the degree of linear polarization reflected from the tags in the short wave infrared. By monitoring the change in the reflected polarization signature from the tags, the polarimeter can be used to determine if the tag was exposed to HF gas. In this paper, a review of the system development effort and preliminary test results are presented and discussed, as well as our plan for future work.

  9. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  10. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the 13 N content in the containment atmosphere. 13 N is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/ 13 N+ 4 He. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium 13 N concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  11. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/Nl3+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  12. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1979-08-01

    The present paper deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process H1+016 → N13+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m -3 and 7 kBq m -3 for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge (Li) flow detector assembly operated at elevated pressure. (Auth.)

  13. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  14. Simulation Model of Mobile Detection Systems

    International Nuclear Information System (INIS)

    Edmunds, T.; Faissol, D.; Yao, Y.

    2009-01-01

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  15. Simulation Model of Mobile Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Edmunds, T; Faissol, D; Yao, Y

    2009-01-27

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  16. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a... space. (b) The fire detection system must be designed to minimize false alarms. ...

  17. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  18. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  19. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  20. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi; Sun, Ying; Saidi, Ahmed

    2018-01-01

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a

  1. Wireless Falling Detection System Based on Community.

    Science.gov (United States)

    Xia, Yun; Wu, Yanqi; Zhang, Bobo; Li, Zhiyang; He, Nongyue; Li, Song

    2015-06-01

    The elderly are more likely to suffer the aches or pains from the accidental falls, and both the physiology and psychology of patients would subject to a long-term disturbance, especially when the emergency treatment was not given timely and properly. Although many methods and devices have been developed creatively and shown their efficiency in experiments, few of them are suitable for commercial applications routinely. Here, we design a wearable falling detector as a mobile terminal, and utilize the wireless technology to transfer and monitor the activity data of the host in a relatively small community. With the help of the accelerometer sensor and the Google Mapping service, information of the location and the activity data will be send to the remote server for the downstream processing. The experimental result has shown that SA (Sum-vector of all axes) value of 2.5 g is the threshold value to distinguish the falling from other activities. A three-stage detection algorithm was adopted to increase the accuracy of the real alarm, and the accuracy rate of our system was more than 95%. With the further improvement, the falling detecting device which is low-cost, accurate and user-friendly would become more and more common in everyday life.

  2. Optical fiber-applied radiation detection system

    International Nuclear Information System (INIS)

    Nishiura, Ryuichi; Uranaka, Yasuo; Izumi, Nobuyuki

    2001-01-01

    A technique to measure radiation by using plastic scintillation fibers doped radiation fluorescent (scintillator) to plastic optical fiber for a radiation sensor, was developed. The technique contains some superiority such as high flexibility due to using fibers, relatively easy large area due to detecting portion of whole of fibers, and no electromagnetic noise effect due to optical radiation detection and signal transmission. Measurable to wide range of and continuous radiation distribution along optical fiber cable at a testing portion using scintillation fiber and flight time method, the optical fiber-applied radiation sensing system can effectively monitor space radiation dose or apparatus operation condition monitoring. And, a portable type scintillation optical fiber body surface pollution monitor can measure pollution concentration of radioactive materials attached onto body surface by arranging scintillation fiber processed to a plate with small size and flexibility around a man to be tested. Here were described on outline and fundamental properties of various application products using these plastic scintillation fiber. (G.K.)

  3. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  4. Decision algorithms in fire detection systems

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2011-01-01

    Full Text Available Analogue (and addressable fire detection systems enables a new quality in improving sensitivity to real fires and reducing susceptibility to nuisance alarm sources. Different decision algorithms types were developed with intention to improve sensitivity and reduce false alarm occurrence. At the beginning, it was free alarm level adjustment based on preset level. Majority of multi-criteria decision work was based on multi-sensor (multi-signature decision algorithms - using different type of sensors on the same location or, rather, using different aspects (level and rise of one sensor measured value. Our idea is to improve sensitivity and reduce false alarm occurrence by forming groups of sensors that work in similar conditions (same world side in the building, same or similar technology or working time. Original multi-criteria decision algorithms based on level, rise and difference of level and rise from group average are discussed in this paper.

  5. Distributed gas detection system and method

    Science.gov (United States)

    Challener, William Albert; Palit, Sabarni; Karp, Jason Harris; Kasten, Ansas Matthias; Choudhury, Niloy

    2017-11-21

    A distributed gas detection system includes one or more hollow core fibers disposed in different locations, one or more solid core fibers optically coupled with the one or more hollow core fibers and configured to receive light of one or more wavelengths from a light source, and an interrogator device configured to receive at least some of the light propagating through the one or more solid core fibers and the one or more hollow core fibers. The interrogator device is configured to identify a location of a presence of a gas-of-interest by examining absorption of at least one of the wavelengths of the light at least one of the hollow core fibers.

  6. Detection system of sodium oxide vapors

    International Nuclear Information System (INIS)

    Hundal, Rolv.

    1976-01-01

    The description is given of a sodium oxide vapor detection system which comprises a containment, a light source located to send a light beam into and through this containment and a photodetector located to intercept the light from the source after it has covered a given path through the containment. In response to the intensity of the incident light, the photodetector produces an output signal representative of it. The feature of this device is a first polarizer located near the light source, along the path of the light coming from it and designed to polarize the light projected through the containment in a given plane, and a second polarizer located near the photodetector, along the path of the polarized light and designed virtually to prevent all the light rays whose orientation differs from the given polarization plane from reaching the photodetector [fr

  7. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  8. 49 CFR 1544.213 - Use of explosives detection systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a... explosives detection system approved by TSA to screen checked baggage on international flights. (b) Signs and...

  9. 46 CFR 154.1350 - Flammable gas detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a fixed flammable gas detection system that has sampling points in: (1) Each cargo pump room; (2) Each cargo...

  10. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  11. Design of detection module for smart ligthting system

    OpenAIRE

    Matveev, I. G.; Goponenko, A. S.

    2015-01-01

    The paper considers a smart lighting system based on Beaglebone microcomputer. The analysis of existing motion and presence sensors was carried out and then used as a basis for design of a detection system. The detection system and the corresponding connection solution for a smart lighting system were developed. Using the designed smart lighting system, experimental studies were carried out.

  12. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  13. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  14. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  15. Planet Detectability in the Alpha Centauri System

    Science.gov (United States)

    Zhao, Lily; Fischer, Debra A.; Brewer, John; Giguere, Matt; Rojas-Ayala, Bárbara

    2018-01-01

    We use more than a decade of radial-velocity measurements for α {Cen} A, B, and Proxima Centauri from the High Accuracy Radial Velocity Planet Searcher, CTIO High Resolution Spectrograph, and the Ultraviolet and Visual Echelle Spectrograph to identify the M\\sin i and orbital periods of planets that could have been detected if they existed. At each point in a mass–period grid, we sample a simulated, Keplerian signal with the precision and cadence of existing data and assess the probability that the signal could have been produced by noise alone. Existing data places detection thresholds in the classically defined habitable zones at about M\\sin i of 53 {M}\\oplus for α {Cen} A, 8.4 {M}\\oplus for α {Cen} B, and 0.47 {M}\\oplus for Proxima Centauri. Additionally, we examine the impact of systematic errors, or “red noise” in the data. A comparison of white- and red-noise simulations highlights quasi-periodic variability in the radial velocities that may be caused by systematic errors, photospheric velocity signals, or planetary signals. For example, the red-noise simulations show a peak above white-noise simulations at the period of Proxima Centauri b. We also carry out a spectroscopic analysis of the chemical composition of the α {Centauri} stars. The stars have super-solar metallicity with ratios of C/O and Mg/Si that are similar to the Sun, suggesting that any small planets in the α {Cen} system may be compositionally similar to our terrestrial planets. Although the small projected separation of α {Cen} A and B currently hampers extreme-precision radial-velocity measurements, the angular separation is now increasing. By 2019, α {Cen} A and B will be ideal targets for renewed Doppler planet surveys.

  16. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  17. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  18. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  19. Measurements and standards for bulk-explosives detection

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, Larry, E-mail: larry.hudson@nist.gov [National Institute of Standards and Technology, 100 Bureau Drive, Stop 8460, Gaithersburg, MD 20899 (United States); Bateman, Fred; Bergstrom, Paul; Cerra, Frank; Glover, Jack; Minniti, Ronaldo; Seltzer, Stephen; Tosh, Ronald [National Institute of Standards and Technology, 100 Bureau Drive, Stop 8460, Gaithersburg, MD 20899 (United States)

    2012-07-15

    Recent years have seen a dramatic expansion in the application of radiation and isotopes to security screening. This has been driven primarily by increased incidents involving improvised explosive devices as well as their ease of assembly and leveraged disruption of transportation and commerce. With global expenditures for security-screening systems in the hundreds of billions of dollars, there is a pressing need to develop, apply, and harmonize standards for x-ray and gamma-ray screening systems used to detect explosives and other contraband. The National Institute of Standards and Technology has been facilitating the development of standard measurement tools that can be used to gauge the technical performance (imaging quality) and radiation safety of systems used to screen luggage, persons, vehicles, cargo, and left-behind objects. After a review of this new suite of national standard test methods, test objects, and radiation-measurement protocols, we highlight some of the technical trends that are enhancing the revision of baseline standards. Finally we advocate a more intentional use of technical-performance standards by security stakeholders and outline the advantages this would accrue. - Highlights: Black-Right-Pointing-Pointer This work responds to the need for standards for x-ray screening systems used to detect explosives. Black-Right-Pointing-Pointer Described are new measurement tools to gage the performance and radiation safety of such systems. Black-Right-Pointing-Pointer A more intentional use of technical-performance standards by security stakeholders is argued.

  20. Measurements and standards for bulk-explosives detection

    International Nuclear Information System (INIS)

    Hudson, Larry; Bateman, Fred; Bergstrom, Paul; Cerra, Frank; Glover, Jack; Minniti, Ronaldo; Seltzer, Stephen; Tosh, Ronald

    2012-01-01

    Recent years have seen a dramatic expansion in the application of radiation and isotopes to security screening. This has been driven primarily by increased incidents involving improvised explosive devices as well as their ease of assembly and leveraged disruption of transportation and commerce. With global expenditures for security-screening systems in the hundreds of billions of dollars, there is a pressing need to develop, apply, and harmonize standards for x-ray and gamma-ray screening systems used to detect explosives and other contraband. The National Institute of Standards and Technology has been facilitating the development of standard measurement tools that can be used to gauge the technical performance (imaging quality) and radiation safety of systems used to screen luggage, persons, vehicles, cargo, and left-behind objects. After a review of this new suite of national standard test methods, test objects, and radiation-measurement protocols, we highlight some of the technical trends that are enhancing the revision of baseline standards. Finally we advocate a more intentional use of technical-performance standards by security stakeholders and outline the advantages this would accrue. - Highlights: ► This work responds to the need for standards for x-ray screening systems used to detect explosives. ► Described are new measurement tools to gage the performance and radiation safety of such systems. ► A more intentional use of technical-performance standards by security stakeholders is argued.

  1. Distributed Fault Detection for a Class of Nonlinear Stochastic Systems

    Directory of Open Access Journals (Sweden)

    Bingyong Yan

    2014-01-01

    Full Text Available A novel distributed fault detection strategy for a class of nonlinear stochastic systems is presented. Different from the existing design procedures for fault detection, a novel fault detection observer, which consists of a nonlinear fault detection filter and a consensus filter, is proposed to detect the nonlinear stochastic systems faults. Firstly, the outputs of the nonlinear stochastic systems act as inputs of a consensus filter. Secondly, a nonlinear fault detection filter is constructed to provide estimation of unmeasurable system states and residual signals using outputs of the consensus filter. Stability analysis of the consensus filter is rigorously investigated. Meanwhile, the design procedures of the nonlinear fault detection filter are given in terms of linear matrix inequalities (LMIs. Taking the influence of the system stochastic noises into consideration, an outstanding feature of the proposed scheme is that false alarms can be reduced dramatically. Finally, simulation results are provided to show the feasibility and effectiveness of the proposed fault detection approach.

  2. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso; Alshareef, Husam N.

    2015-01-01

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  3. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  4. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  5. ACPR upgrade fuel motion detection system

    International Nuclear Information System (INIS)

    Kelly, J.G.; Stalker, K.T.

    1976-01-01

    Coded aperture imaging techniques are being applied to the problem of fuel motion detection in core disruptive safety experiments in the LMFBR. The upgraded Sandia Annular Core Pulse Reactor will be used for fuel motion studies, and a system is now being developed to image fuel motion through a slot in the core in l- and 7-pin experiments. The γ-rays emitted by the fuel will be modulated by a coded aperture and will form a pseudohologram on a scintillator. This shadowgram will be lens coupled first to an optical image intensifier, and then to a rotating prism framing camera. The goal is to obtain quality images of fuel with approximately 1 mm spatial resolution at about 10 4 frames/sec. Some of the feasibility milestones which have been reached thus far are the following: (1) A fuel pin shaped 252 Cf fission gamma ray source has been imaged through 1.27 cm of steel (simulating reactor containment). (2) A 252 Cf source has been imaged through 1.27 cm of steel with x-ray image intensifier amplification. (3) Collimation and shielding tests indicate that at ACPR it should be possible to obtain adequate signal to noise at the detector when the fuel is observed through a slot in the core

  6. Detection systems for radioactive ion beams

    International Nuclear Information System (INIS)

    Savajols, H.

    2002-01-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  7. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  8. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  9. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  10. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-01-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched

  11. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  12. Laser Obstacle Detection System Flight Testing

    National Research Council Canada - National Science Library

    Davis, Timothy

    2003-01-01

    ...). The Aviation Applied Technology Directorate (AATD) was contracted to mount the HELLAS sensor on the nose of a UH-60L Blackhawk helicopter and to conduct flight tests to evaluate the HELLAS obstacle detection sensor...

  13. Optimizing Systems of Threshold Detection Sensors

    National Research Council Canada - National Science Library

    Banschbach, David C

    2008-01-01

    .... Below the threshold all signals are ignored. We develop a mathematical model for setting individual sensor thresholds to obtain optimal probability of detecting a significant event, given a limit on the total number of false positives allowed...

  14. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan; Gooneratne, Chinthaka Pasan; Kosel, Jü rgen

    2012-01-01

    magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer

  15. Underwater electric field detection system based on weakly electric fish

    Science.gov (United States)

    Xue, Wei; Wang, Tianyu; Wang, Qi

    2018-04-01

    Weakly electric fish sense their surroundings in complete darkness by their active electric field detection system. However, due to the insufficient detection capacity of the electric field, the detection distance is not enough, and the detection accuracy is not high. In this paper, a method of underwater detection based on rotating current field theory is proposed to improve the performance of underwater electric field detection system. First of all, we built underwater detection system based on the theory of the spin current field mathematical model with the help of the results of previous researchers. Then we completed the principle prototype and finished the metal objects in the water environment detection experiments, laid the foundation for the further experiments.

  16. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  17. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  18. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  19. Final evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Carlson, R.; Brewer, W.; Lanham, R.

    1989-01-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed

  20. Fuel rod failure detection method and system

    International Nuclear Information System (INIS)

    Assmann, H.; Janson, W.; Stehle, H.; Wahode, P.

    1975-01-01

    The inventor claims a method for the detection of a defective fuel rod cladding tube or of inleaked water in the cladding tube of a fuel rod in the fuel assembly of a pressurized-water reactor. The fuel assembly is not disassembled but examined as a whole. In the examination, the cladding tube is heated near one of its two end plugs, e.g. with an attached high-frequency inductor. The water contained in the cladding tube evaporates, and steam bubbles or a condensate are detected by the ultrasonic impulse-echo method. It is also possible to measure the delay of the temperature rise at the end plug or to determine the cooling energy required to keep the end plug temperature stable and thus to detect water ingression. (DG/AK) [de

  1. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...... of different tampering events. In order to assess the developed methods we have collected a large data set, which contains sequences from different active cameras at different scenarios. We evaluate our sys- tem on these data and the results are encouraging with a very high detecting rate and relatively few...

  2. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  3. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  4. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  5. Nuclear fission as a tool to contrast the contraband of special ...

    Indian Academy of Sciences (India)

    tem for Non-Destructive Analysis and Radiometric Measurements) has been developed. The aim of ... Thus the SMANDRA system is a second line active inspection tool. The ..... This evidence will guide us to design a new version ... The demonstration was directed to the National Firefighter Corp and was structured in.

  6. APSTNG: Neutron interrogation for detection of nuclear and CW weapons, explosives, and drugs

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.; De Volpi, A.; Peters, C.W.

    1992-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed- portal requirements for nondestructive verification of sealed munitions and detection of contraband explosives and drugs. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutrons generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron inelastic scattering and fission reactions identify nuclides associated with all major chemicals in chemical warfare agents, explosives, and drugs, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from determined from detection times of the gamma-rays and alpha-particles yield a separate tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system; a collimator is not required since scattered neutrons are removed by ''electronic collimation'' (detected neutrons not having the proper flight time to be uncollided are discarded). The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs

  7. Advanced Ground Systems Maintenance Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The Inductive Monitoring System (IMS) software utilizes techniques from the fields of model-based reasoning, machine learning, and data mining to build system...

  8. Phase and amplitude detection system for the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Schwarz, H.D.

    1983-01-01

    A computer controlled phase and amplitude detection system to measure and stabilize the rf power sources in the Stanford Linear Accelerator is described. This system measures the instantaneous phase and amplitude of a 1 microsecond 2856 MHz rf pulse and will be used for phase feedback control and for amplitude and phase jitter detection. This paper discusses the measurement system performance requirements for the operation of the Stanford Linear Collider, and the design and implementation of the phase and amplitude detection system. The fundamental software algorithms used in the measurement are described, as is the performance of the prototype phase and amplitude detector system

  9. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Science.gov (United States)

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun

    2017-10-03

    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  10. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  11. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  12. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  13. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  14. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  15. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  16. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  17. Evaluation of the AN/GSS-20 motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the AN/GSS-20 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to environmental factors was also examined

  18. 46 CFR 28.830 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection system. 28.830 Section 28.830 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.830 Fire detection system. (a) Each accommodation space...

  19. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  20. 46 CFR 28.325 - Fire detection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection systems. 28.325 Section 28.325 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING... Operate With More Than 16 Individuals on Board § 28.325 Fire detection systems. (a) Each accommodation...

  1. Automatic patient respiration failure detection system with wireless transmission

    Science.gov (United States)

    Dimeff, J.; Pope, J. M.

    1968-01-01

    Automatic respiration failure detection system detects respiration failure in patients with a surgically implanted tracheostomy tube, and actuates an audible and/or visual alarm. The system incorporates a miniature radio transmitter so that the patient is unencumbered by wires yet can be monitored from a remote location.

  2. Best Practices for Fuel System Contamination Detection and Remediation

    Science.gov (United States)

    2016-01-15

    The University of Dayton Research Institute Best Practices for Fuel System Contamination Detection and Remediation Final Report Marlin D... Remediation Executive Summary: Fuel contamination is a broad term commonly applied to anything that causes a fuel test to fail quality assurance...Statement A: Approved for public release: distribution unlimited. 1 Best Practices for Fuel System Contamination Detection and Remediation Contents

  3. Wireless tamper detection sensor and sensing system

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2011-01-01

    A wireless tamper detection sensor is defined by a perforated electrical conductor. The conductor is shaped to form a geometric pattern between first and second ends thereof such that the conductor defines an open-circuit that can store and transfer electrical and magnetic energy. The conductor resonates in the presence of a time-varying magnetic field to generate a harmonic response. The harmonic response changes when the conductor experiences a change in its geometric pattern due to severing of the conductor along at least a portion of the perforations. A magnetic field response recorder is used to wirelessly transmit the time-varying magnetic field and wirelessly detecting the conductor's harmonic response.

  4. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  5. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  6. Explosive simulants for testing explosive detection systems

    Science.gov (United States)

    Kury, John W.; Anderson, Brian L.

    1999-09-28

    Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

  7. Detection of explosives by neutron scattering

    International Nuclear Information System (INIS)

    Brooks, F.D.; Buffler, A.; Allie, M.S.; Nchodu, M.R.; Bharuth-Ram, K.

    1998-01-01

    For non-intrusive detection of hidden explosives or other contraband such as narcotics a fast neutron scattering analysis (FNSA) technique is proposed. An experimental arrangement uses a collimated, pulsed beam of neutrons directed at the sample. Scattered neutrons are detected by liquid scintillation counters at different scattering angles. A scattering signature is derived from two-parameter data, counts vs pulse height and time-of-flight measured for each element (H, C, N or O) at each of two scattering angles and two neutron energies. The elemental signatures are very distinctive and constitute a good response matrix for unfolding elemental components from the scattering signatures measured for different compounds

  8. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  9. Development of Abnormality Detection System for Bathers using Ultrasonic Sensors

    Science.gov (United States)

    Ohnishi, Yosuke; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko; Ogoshi, Yasuhiro

    This paper proposes an abnormality detection system for bather sitting in bathtub. Increasing number of in-bathtub drowning accidents in Japan draws attention. Behind this large number of bathing accidents, Japan's unique social and cultural background come surface. For majority of people in Japan, bathing serves purpose in deep warming up of body, relax and enjoyable time. Therefore it is the custom for the Japanese to soak in bathtub. However overexposure to hot water may cause dizziness or fainting, which is possible to cause in-bathtub drowning. For drowning prevention, the system detects bather's abnormal state using an ultrasonic sensor array. The array, which has many ultrasonic sensors, is installed on the ceiling of bathroom above bathtub. The abnormality detection system uses the following two methods: posture detection and behavior detection. The function of posture detection is to estimate the risk of drowning by monitoring bather's posture. Meanwhile, the function of behavior detection is to estimate the risk of drowning by monitoring bather's behavior. By using these methods, the system detects bathers' different state from normal. As a result of experiment with a subject in the bathtub, the system was possible to detect abnormal state using subject's posture and behavior. Therefore the system is useful for monitoring bather to prevent drowning in bathtub.

  10. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  11. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  12. Attentional System for Face Detection and Tracking

    Directory of Open Access Journals (Sweden)

    Leonardo Pinto da Silva Panta Leão

    2011-04-01

    Full Text Available The human visual system quickly performs complex decisions due, in part, to attentional system, which positions the most relevant targets in the center of the visual field, region with greatest concentration of photoreceptor cells. The attentional system involves sensory, cognitive and also mechanical elements, because the eye and head muscles must be activated to produce movement. In this paper we present the proposal of a face detector system that, as well as the biological system, produces a coordinated movement with the purpose of positioning the target image in the center of camera's visual field. The developed system has distinct parts, one responsible for video pattern recognition and other for controlling the mechanical part, implemented as processes that communicate with each other by sockets.

  13. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  14. APSTNG: Neutron interrogation for detection of explosives and drugs and nuclear and CW materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Peters, C.W.

    1993-01-01

    A recently developed neutron diagnostic probe system has the potential to satisfy a significant number of van-mobile and fixed-portal requirements for nondestructive detection, including monitoring of contraband explosives, drugs, and weapon materials, and treaty verification of sealed munitions. The probe is based on a unique associated-particle sealed-tube neutron generator (APSTNG) that interrogates the object of interest with a low-intensity beam of 14-MeV neutron generated from the deuterium-tritium reaction and that detects the alpha-particle associated with each neutron. Gamma-ray spectra of resulting neutron reactions identify nuclides associated with all major chemicals in explosives, drugs, and chemical warfare agents, as well as many pollutants and fissile and fertile special nuclear material. Flight times determined from detection times of the gamma rays and alpha-particles yield a separate coarse tomographic image of each identified nuclide. The APSTNG also forms the basis for a compact fast-neutron transmission imaging system that can be used along with or instead of the emission imaging system. Proof-of-concept experiments have been performed under laboratory conditions for simulated nuclear and chemical warfare munitions and for explosives and drugs. The small and relatively inexpensive APSTNG exhibits high reliability and can be quickly replaced. Surveillance systems based on APSTNG technology can avoid the large physical size, high capital and operating expenses, and reliability problems associated with complex accelerators

  15. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    Science.gov (United States)

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  16. System and Method for Multi-Wavelength Optical Signal Detection

    Science.gov (United States)

    McGlone, Thomas D. (Inventor)

    2017-01-01

    The system and method for multi-wavelength optical signal detection enables the detection of optical signal levels significantly below those processed at the discrete circuit level by the use of mixed-signal processing methods implemented with integrated circuit technologies. The present invention is configured to detect and process small signals, which enables the reduction of the optical power required to stimulate detection networks, and lowers the required laser power to make specific measurements. The present invention provides an adaptation of active pixel networks combined with mixed-signal processing methods to provide an integer representation of the received signal as an output. The present invention also provides multi-wavelength laser detection circuits for use in various systems, such as a differential absorption light detection and ranging system.

  17. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  18. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...

  19. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  20. Entanglement detection in hybrid optomechanical systems

    International Nuclear Information System (INIS)

    De Chiara, Gabriele; Paternostro, Mauro; Palma, G. Massimo

    2011-01-01

    We study a device formed by a Bose-Einstein condensate (BEC) coupled to the field of a cavity with a moving end mirror and find a working point such that the mirror-light entanglement is reproduced by the BEC-light quantum correlations. This provides an experimentally viable tool for inferring mirror-light entanglement with only a limited set of assumptions. We prove the existence of tripartite entanglement in the hybrid device, persisting up to temperatures of a few milli-Kelvin, and discuss a scheme to detect it.

  1. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  2. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  3. Chemical Detection Architecture for a Subway System [video

    OpenAIRE

    Ignacio, Joselito; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    This proposed system process aims to improve subway safety through better enabling the rapid detection and response to a chemical release in a subway system. The process is designed to be location-independent and generalized to most subway systems despite each system's unique characteristics.

  4. Optimal Robust Fault Detection for Linear Discrete Time Systems

    Directory of Open Access Journals (Sweden)

    Nike Liu

    2008-01-01

    Full Text Available This paper considers robust fault-detection problems for linear discrete time systems. It is shown that the optimal robust detection filters for several well-recognized robust fault-detection problems, such as ℋ−/ℋ∞, ℋ2/ℋ∞, and ℋ∞/ℋ∞ problems, are the same and can be obtained by solving a standard algebraic Riccati equation. Optimal filters are also derived for many other optimization criteria and it is shown that some well-studied and seeming-sensible optimization criteria for fault-detection filter design could lead to (optimal but useless fault-detection filters.

  5. Design of Moisture Content Detection System

    Science.gov (United States)

    Wang, W. C.; Wang, L.

    In this paper, a method for measuring the moisture content of grain was presented based on single chip microcomputer and capacitive sensor. The working principle of measuring moisture content is introduced and a concentric cylinder type of capacitive sensor is designed, the signal processing circuits of system are described in details. System is tested in practice and discussions are made on the various factors affecting the capacitive measuring of grain moisture based on the practical experiments, experiment results showed that the system has high measuring accuracy and good controlling capacity.

  6. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  7. How to detect trap cluster systems?

    International Nuclear Information System (INIS)

    Mandowski, Arkadiusz

    2008-01-01

    Spatially correlated traps and recombination centres (trap-recombination centre pairs and larger clusters) are responsible for many anomalous phenomena that are difficult to explain in the framework of both classical models, i.e. model of localized transitions (LT) and the simple trap model (STM), even with a number of discrete energy levels. However, these 'anomalous' effects may provide a good platform for identifying trap cluster systems. This paper considers selected cluster-type effects, mainly relating to an anomalous dependence of TL on absorbed dose in the system of isolated clusters (ICs). Some consequences for interacting cluster (IAC) systems, involving both localized and delocalized transitions occurring simultaneously, are also discussed

  8. Leak detection system for RBMK coolant circuit

    Energy Technology Data Exchange (ETDEWEB)

    Cherkashov, Ju M; Strelkov, B P; Korolev, Yu V; Eperin, A P; Kozlov, E P; Belyanin, L A; Vanukov, V N [Leningrad Nuclear Power Plant, Leningrad (Russian Federation). Research and Development Inst. of Power Engineering

    1997-12-31

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab.

  9. Road icing forecasting and detecting system

    Science.gov (United States)

    Xu, Hongke; Zheng, Jinnan; Li, Peiqi; Wang, Qiucai

    2017-05-01

    Regard for the facts that the low accuracy and low real-time of the artificial observation to determine the road icing condition, and it is difficult to forecast icing situation, according to the main factors influencing the road-icing, and the electrical characteristics reflected by the pavement ice layer, this paper presents an innovative system, that is, ice-forecasting of the highway's dangerous section. The system bases on road surface water salinity measurements and pavement temperature measurement to calculate the freezing point of water and temperature change trend, and then predicts the occurrence time of road icing; using capacitance measurements to verdict the road surface is frozen or not; This paper expounds the method of using single chip microcomputer as the core of the control system and described the business process of the system.

  10. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  11. Sequential Detection of Fission Processes for Harbor Defense

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Walston, S E; Chambers, D H

    2015-02-12

    With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their γ-ray emissions has been attacked vigorously with some interesting and feasible results; however, the fission process of SNM has not received as much attention due to its inherent complexity and required predictive nature. In this paper, on-line, sequential Bayesian detection and estimation (parameter) techniques to rapidly and reliably detect unknown fissioning sources with high statistical confidence are developed.

  12. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  13. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  14. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  15. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  16. Development of radiation detection and measurement systems

    International Nuclear Information System (INIS)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated

  17. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  18. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  19. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  20. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  1. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    National Research Council Canada - National Science Library

    2001-01-01

    .... and Canadian military personnel. In light of these concerns both defense departments have increased efforts to develop and field biological agent detection systems to help protect their military forces and fixed assets...

  2. Suboptimal processor for anomaly detection for system surveillance and diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Ciftcioglu, Oe.; Hoogenboom, J.E.; Dam, H. van

    1989-06-01

    Anomaly detection for nuclear reactor surveillance and diagnosis is described. The residual noise obtained as a result of autoregressive (AR) modelling is essential to obtain high sensitivity for anomaly detection. By means of the method of hypothesis testing a suboptimal anomaly detection processor is devised for system surveillance and diagnosis. Experiments are carried out to investigate the performance of the processor, which is in particular of interest for on-line and real-time applications.

  3. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  4. Beat frequency ultrasonic microsphere contrast agent detection system

    Science.gov (United States)

    Pretlow, III, Robert A. (Inventor); Yost, William T. (Inventor); Cantrell, Jr., John H. (Inventor)

    1997-01-01

    A system for and method of detecting and measuring concentrations of an ultrasonically-reflective microsphere contrast agent involving detecting non-linear sum and difference beat frequencies produced by the microspheres when two impinging signals with non-identical frequencies are combined by mixing. These beat frequencies can be used for a variety of applications such as detecting the presence of and measuring the flow rates of biological fluids and industrial liquids, including determining the concentration level of microspheres in the myocardium.

  5. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  6. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  7. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.

  8. Leakage detection system in nuclear reactor container

    International Nuclear Information System (INIS)

    Kurosawa, Masahiko.

    1993-01-01

    The present invention comprises an injection means for adding radioactive materials to coolants in a container cooler, a gamma ray amplitude analyzer connected to coolant pipelines and a means for recording/transferring the data of the result of the measurement, a gamma ray amplitude analyzer connected to a drain water sump and a means for recording/transferring the data of the result of the measurement, a gamma ray amplitude analyzer connected to various kinds of pipelines and a means for recording/transferring the data of the result of the measurement, and a data processing means for comparing and analyzing the measured data of each of the gamma ray amplitude analyzers inputted from each of date recording/transferring means. The gamma ray amplitude analysis for each of the pipelines and drain water sump are conducted at an appropriate frequency, and the measured data are compared and analyzed, to improve the detection accuracy for a trace amount of leakage from each of the pressure pipelines and the container cooler coolant pipelines, thereby enabling to specify the pipeline having leakage. Maintenance efficiency is improved, and severe rupture accident in each of pressure pipelines is prevented previously. (N.H.)

  9. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  10. The quench detection system of Wendelstein 7-X

    International Nuclear Information System (INIS)

    Birus, Dietrich; Schneider, Matthias; Rummel, Thomas; Fricke, Marko

    2011-01-01

    The Quench Detection System of Wendelstein W7-X has been developed, pretested and manufactured during the last four years. This safety subsystem of the superconducting magnet power supply will guarantee the safe operating of the whole magnet system. The main targets of the Quench Detection System are the complete data acquisition of all the voltages along the superconducting components, i.e. non planar and planar coils, and bus bars, the evaluation of this data and the control of the magnet system safety discharges. The Quench Detection System is generating control commands for the magnet power supply control system and the electrical status of the superconducting components of W7-X. The Quench Detection System consists of nearly 580 Quench Detection Units (QDU) located in 10 QD-subsystems, 8 racks in each, one host system and two special interfaces for evaluation of the quench control commands and the failure signals. The operating software suite of the QD System allows the configuration, the operation and the maintenance of the whole system.

  11. Failure detection system risk reduction assessment

    Science.gov (United States)

    Aguilar, Robert B. (Inventor); Huang, Zhaofeng (Inventor)

    2012-01-01

    A process includes determining a probability of a failure mode of a system being analyzed reaching a failure limit as a function of time to failure limit, determining a probability of a mitigation of the failure mode as a function of a time to failure limit, and quantifying a risk reduction based on the probability of the failure mode reaching the failure limit and the probability of the mitigation.

  12. A System View on Iterative MIMO Detection: Dynamic Sphere Detection versus Fixed Effort List Detection

    Directory of Open Access Journals (Sweden)

    Christina Gimmler-Dumont

    2012-01-01

    reliability information is fed back from the channel decoder to the MIMO detector. In this paper, we derive a basic framework to compare different soft-input soft-output MIMO detectors in open- and closed-loop systems. Within this framework, we analyze a depth-first sphere detector and a breadth-first fixed effort detector for different application scenarios and their effects on area and energy efficiency on the whole system. We present all system components under open- and closed-loop system aspects and determine the overall implementation cost for changing an open-loop system in a closed-loop system.

  13. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  14. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  15. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  16. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  17. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  18. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  19. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  20. Contraband of Falcons

    Directory of Open Access Journals (Sweden)

    Elvira G. Nikolenko

    2016-02-01

    Full Text Available According to the criminal proceeding in smuggling of falcons, former employees of the Line Internal Affairs Department in MIA transport, working in Domodedovo airport, were sentenced to large fines  - A. Kurokhtin, D. Gorodenko and A. Kustov, as was reported in Rossiyskaya Gazeta on 19.06.2013. Inspectors of the State Committee for the wild life protection together with employees of the MIA of Khakassia on 15.09.2013 detained two individuals engaged in illegal catching of falcons. On 04.11.2013 in Buryatia perpetrator, which transported 16 falcons, was arrested. On the road Khabarovsk-Chita in the vicinity of the village Nikolayevka in Jewish Autonomous Region (Russia police seized 21 Gyrfalcons (Falco rusticolus, which on 26.11.2013 was reported in STRBC “Dalnevostochnaya”. In the village Lesnoi of Yelizovo district in the Kamchatka Region on 29.11.2013, police arrested two men and seized eight Gyrfalcons (Falco rusticolus. One Saker Falcon (Falco cherrug seized on 12.12.2013 in the village Staroaleyskoe of Tretyakovo district of the Altai Kray (Russia. On 24.12.2013 in Petropavlovsk-Kamchatsky (Russia the police, together with colleagues from the regional FSSD seized 13 Gyrfalcons (Falco rusticolus from two residents of the Krasnoyarsk Territory. On 15.01.2014 in Kamchatka, the 51-year-old resident of the village of Nagorny in Yelizovski District, which kept 8 Gyrfalcons (Falco rusticolus in the garage at his house land plot, was arrested. Prosecution office of Tarbagatay district of East Kazakhstan region (Kazakhstan together with the police and the authorities for the wild life protection found 7 Saker Falcons (Falco cherrug on 06.08.2014. At security control point “Ak-tilek - roadway" (Kazakhstan on 29.08.2014 border guards together with employees of the State Customs Service apprehended a citizen of Kazakhstan, who tried to take from Kyrgyzstan to Kazakhstan 3 young Saker Falcons (Falco cherrug. Supervisors of safety department in Khakassky Reserve prevented the catching of Saker Falcons on the territory of SPNR in Ust-Abakan District on 30.08.2015. In forest-line near Chernogorsk, Republic of Khakassia (Russia employees of the State Committee for wildlife and environment protection found 9 Saker Falcons caught by poachers on 09.09.2014. On 18.09.2014 as a result of operational search activities, employees of Altai Customs and Border Service of FSS of RF in Altai Kray prevented an attempt of illegal export of 18 falcons from Russia via the Republic of Kazakhstan. On 26.09.2014 at “Vnukovo” airport employees of the FCS of Russia prevented smuggling of 4 Gyrfalcons (Falco rusticolus, but also identified two customs officials who assisted smugglers and moved alive goods without customs control. On October 23, 2014 in the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Kray, Russia 10 falcons were released. On 27.10.2014 employees of Domodedovo Customs terminated an attempt of illegal export of 5 falcons from Russia to Armenia. On 10.30.2014 in Kamchatka officers of the Criminal Investigation Office of Milkovsky Department seized two Gyrfalcons (Falco rusticolus from poachers. On 02.11.2014 border guards of Kamchatka detained intercoastal ship, where was found hold to transport falcons. On 07.11.2014 batch of 6 falcons was detained by STSI inspectors in Slavgorod in the Altai Kray (Russia at Kazakhstan customs and gave a carrier to border guards. On 05.12.2014 in Chelyabinsk Airport a group of people trying to smuggle 3 Saker Falcons (Falco cherrug from Russia to Armenia, was detained. On 11.12.2014 in Tashkent (Uzbekistan 28 Saker Falcons (Falco cherrug were released, they were seized from poachers. On 12.16.2014 in Petropavlovsk-Kamchatsky (Russia 47-year-old citizen was seized two Gyrfalcons (Falco rusticolus. On 12.27.2014 in Moscow suburbs (Russia, a female Gyrfalcon (Falco rusticolus was found. In January 2015 two suitcases were found in the toilet in Moscow Sheremetyevo airport, where were 8 Gyrfalcons (Falco rusticolus. On 02.04.2015 the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Territory, Russia released 14 falcons (7 Saker Falcons Falco cherrug and 7 Peregrine Falcons F. peregrinus, confiscated in autumn 2014. On July 8, 2015 at the “Domodedovo” airport a Bulgarian citizen, who found 25 eggs of the Peregrine Falcon (Falco peregrinus, was detained. On 08.09.2015 on the territory of the cluster in Khakassky State Nature Reserve “Kamyzyakskaya steppe with lake Ulug Kohl” (Khakassia, two citizens of Syria and one native of Azerbaijan were take while attempting to catch falcons. On 11.09.2015 at Domodedovo airport staff of Rosselkhoznadzor suspended clearance of 8 Gyrfalcons (Falco rusticolus, which was brought to Moscow from the United Arab Emirates. On 18.09.2015 as a result of joint operational-search activities, officers of Altai Customs and Border Service of Russian FSS prevented an attempt of illegal export of 14 falcons from Russia to Kazakhstan. On 14.09.2015 24 Falcons were found during the check of flight № FDV-738 “Shymkent – Dubai” (Karavan.kz. Four members of the organized criminal group, involved in smuggling of Gyrfalcons (Falco rusticolus, were detained at a Moscow airport “Sheremetyevo” on 17.10.2015. Belgorod custom officers were not allowed to take 8 Saker Falcons (Falco cherrug out of Russia  on 20.10.2015. On 10.11.2015 Gosohotsluzhba of The Zabaikalsky Kray (Russia in cooperation with the police in Chernyshevsky District of the Zabaikalsky Kray detained a group of six foreigners (Syrians, Kurds, Azerbaijanian for illegal catching of falcons. On 20.11.2015 in Kamchatka officers of the Criminal Investigation of Kamchatka Police together with colleagues from the FSS regional department detained a resident of Apuka village of Olyutorsky district, which was seized nine Gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On 03.12.2015 in Kamchatka transport police prevented the export of 3 Gyrfalcons (Falco rusticolus by flight to Khabarovsk. On 21.12.2015 in Kamchatka a Gyrfalcon (Falco rusticolus was withdrawn from a resident of Oktybrski village of Ust-Bolsheretsky district.

  1. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension...

  2. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  3. A TNA explosives-detection system in airline baggage

    Energy Technology Data Exchange (ETDEWEB)

    Shea, P.; Gozani, T. (Science Applications International Corp., Santa Clara, CA (USA)); Bozorgmanesh, H. (Science Applications International Corp., San Diego, CA (USA))

    1990-12-20

    Existing technologies that are applied to explosives-detection in passenger baggage are briefly discussed. A system based on thermal-neutron analysis (TNA) is described. The actual performance of the system in the field on passenger bags is given. The application of the TNA in an integrated airport security system is discussed in view of the intense public debate on this issue. (orig.).

  4. Design of a decentralized detection of interacting LTI systems

    Directory of Open Access Journals (Sweden)

    Shamanth Shankar

    2002-01-01

    Full Text Available In this paper, the problem of designing a decentralized detection filter for a large homogeneous collection of LTI systems is considered. The collection of systems considered here draws inspiration from platoons of vehicles, and the considered interactions amongst systems in the collection are banded and lower triangular, mimicking the typical “look-ahead” nature of interactions in a platoon of vehicles. A fault in a system propagates to other systems in the collection via such interactions.

  5. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  6. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  7. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  8. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  9. Alternative vehicle detection technologies for traffic signal systems : technical report.

    Science.gov (United States)

    2009-02-01

    Due to the well-documented problems associated with inductive loops, most jurisdictions have : replaced many intersection loops with video image vehicle detection systems (VIVDS). While VIVDS : have overcome some of the problems with loops such as tr...

  10. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  11. Fully automatic AI-based leak detection system

    Energy Technology Data Exchange (ETDEWEB)

    Tylman, Wojciech; Kolczynski, Jakub [Dept. of Microelectronics and Computer Science, Technical University of Lodz in Poland, ul. Wolczanska 221/223, Lodz (Poland); Anders, George J. [Kinectrics Inc., 800 Kipling Ave., Toronto, Ontario M8Z 6C4 (Canada)

    2010-09-15

    This paper presents a fully automatic system intended to detect leaks of dielectric fluid in underground high-pressure, fluid-filled (HPFF) cables. The system combines a number of artificial intelligence (AI) and data processing techniques to achieve high detection capabilities for various rates of leaks, including leaks as small as 15 l per hour. The system achieves this level of precision mainly thanks to a novel auto-tuning procedure, enabling learning of the Bayesian network - the decision-making component of the system - using simulated leaks of various rates. Significant new developments extending the capabilities of the original leak detection system described in and form the basis of this paper. Tests conducted on the real-life HPFF cable system in New York City are also discussed. (author)

  12. An automated computer misuse detection system for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  13. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  14. Design and implementation of network attack analysis and detect system

    International Nuclear Information System (INIS)

    Lu Zhigang; Wu Huan; Liu Baoxu

    2007-01-01

    This paper first analyzes the present research state of IDS (intrusion detection system), classifies and compares existing methods. According to the problems existing in IDS, such as false-positives, false-negatives and low information visualization, this paper suggests a system named NAADS which supports multi data sources. Through a series of methods such as clustering analysis, association analysis and visualization, rate of detection and usability of NAADS are increased. (authors)

  15. Detection systems for radioactive ion beams; Systeme de detection en ions radioactifs

    Energy Technology Data Exchange (ETDEWEB)

    Savajols, H

    2002-07-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  16. A System for Detecting Miscues in Dyslexic Read Speech

    DEFF Research Database (Denmark)

    Rasmussen, Morten Højfeldt; Tan, Zheng-Hua; Lindberg, Børge

    2009-01-01

    While miscue detection in general is a well explored research field little attention has so far been paid to miscue detection in dyslexic read speech. This domain differs substantially from the domains that are commonly researched, as for example dyslexic read speech includes frequent regressions...... that the system detects miscues at a false alarm rate of 5.3% and a miscue detection rate of 40.1%. These results are worse than current state of the art reading tutors perhaps indicating that dyslexic read speech is a challenge to handle....

  17. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  18. EXAFS of dilute systems: fluorescence detection

    International Nuclear Information System (INIS)

    Hastings, J.B.

    1979-01-01

    Since the first observations of the variation of the absorption coefficient for x-rays above the energy thresholds in the thirties until the early seventies, measurements and analysis of these variations were merely intended for the understanding of the underlying physics. Recently, with the understanding of the information available about the local atomic structure in the neighborhood of the absorbing species and the availability of high intensity synchrotron radiation sources, EXAFS has become a powerful structural tool. In these discussions, the details of the measurements for very dilute species are presented. It is shown that for the more dilute systems the measurement of the emission rather than the direct absorption is a more favorable technique

  19. Challenges, issues and trends in fall detection systems

    Science.gov (United States)

    2013-01-01

    Since falls are a major public health problem among older people, the number of systems aimed at detecting them has increased dramatically over recent years. This work presents an extensive literature review of fall detection systems, including comparisons among various kinds of studies. It aims to serve as a reference for both clinicians and biomedical engineers planning or conducting field investigations. Challenges, issues and trends in fall detection have been identified after the reviewing work. The number of studies using context-aware techniques is still increasing but there is a new trend towards the integration of fall detection into smartphones as well as the use of machine learning methods in the detection algorithm. We have also identified challenges regarding performance under real-life conditions, usability, and user acceptance as well as issues related to power consumption, real-time operations, sensing limitations, privacy and record of real-life falls. PMID:23829390

  20. Near-Optimal Detection in MIMO Systems using Gibbs Sampling

    DEFF Research Database (Denmark)

    Hansen, Morten; Hassibi, Babak; Dimakis, Georgios Alexandros

    2009-01-01

    In this paper we study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to preforming Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods...... sampler provides a computationally efficient way of achieving approximative ML detection in MIMO systems having a huge number of transmit and receive dimensions. In fact, they further suggest that the Markov chain is rapidly mixing. Thus, it has been observed that even in cases were ML detection using, e...

  1. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  2. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  3. Auditory alert systems with enhanced detectability

    Science.gov (United States)

    Begault, Durand R. (Inventor)

    2008-01-01

    Methods and systems for distinguishing an auditory alert signal from a background of one or more non-alert signals. In a first embodiment, a prefix signal, associated with an existing alert signal, is provided that has a signal component in each of three or more selected frequency ranges, with each signal component in each of three or more selected level at least 3-10 dB above an estimated background (non-alert) level in that frequency range. The alert signal may be chirped within one or more frequency bands. In another embodiment, an alert signal moves, continuously or discontinuously, from one location to another over a short time interval, introducing a perceived spatial modulation or jitter. In another embodiment, a weighted sum of background signals adjacent to each ear is formed, and the weighted sum is delivered to each ear as a uniform background; a distinguishable alert signal is presented on top of this weighted sum signal at one ear, or distinguishable first and second alert signals are presented at two ears of a subject.

  4. System and Method for Outlier Detection via Estimating Clusters

    Science.gov (United States)

    Iverson, David J. (Inventor)

    2016-01-01

    An efficient method and system for real-time or offline analysis of multivariate sensor data for use in anomaly detection, fault detection, and system health monitoring is provided. Models automatically derived from training data, typically nominal system data acquired from sensors in normally operating conditions or from detailed simulations, are used to identify unusual, out of family data samples (outliers) that indicate possible system failure or degradation. Outliers are determined through analyzing a degree of deviation of current system behavior from the models formed from the nominal system data. The deviation of current system behavior is presented as an easy to interpret numerical score along with a measure of the relative contribution of each system parameter to any off-nominal deviation. The techniques described herein may also be used to "clean" the training data.

  5. Evaluation of video detection systems, volume 1 : effects of configuration changes in the performance of video detection systems.

    Science.gov (United States)

    2009-10-01

    The effects of modifying the configuration of three video detection (VD) systems (Iteris, Autoscope, and Peek) : are evaluated in daytime and nighttime conditions. Four types of errors were used: false, missed, stuck-on, and : dropped calls. The thre...

  6. Detection device for off-gas system accidents

    International Nuclear Information System (INIS)

    Kubota, Ryuji; Tsuruoka, Ryozo; Yamanari, Shozo.

    1984-01-01

    Purpose: To rapidly isolate the off-gas system by detecting the off-gas system failure accident in a short time. Constitution: Radiation monitors are disposed to ducts connecting an exhaust gas area and an air conditioning system as a portion of a turbine building. The ducts are disposed independently such that they ventilate only the atmosphere in the exhaust gas area and do not mix the atmosphere in the turbine building. Since radioactivity issued upon off-gas accidents to the exhaust gas area is sucked to the duct, it can be detected by radiation detection monitors in a short time after the accident. Further, since the operator judges it as the off-gas system accident, the off-gas system can be isolated in a short time after the accident. (Moriyama, K.)

  7. A universal DNA-based protein detection system.

    Science.gov (United States)

    Tran, Thua N N; Cui, Jinhui; Hartman, Mark R; Peng, Songming; Funabashi, Hisakage; Duan, Faping; Yang, Dayong; March, John C; Lis, John T; Cui, Haixin; Luo, Dan

    2013-09-25

    Protein immune detection requires secondary antibodies which must be carefully selected in order to avoid interspecies cross-reactivity, and is therefore restricted by the limited availability of primary/secondary antibody pairs. Here we present a versatile DNA-based protein detection system using a universal adapter to interface between IgG antibodies and DNA-modified reporter molecules. As a demonstration of this capability, we successfully used DNA nano-barcodes, quantum dots, and horseradish peroxidase enzyme to detect multiple proteins using our DNA-based labeling system. Our system not only eliminates secondary antibodies but also serves as a novel method platform for protein detection with modularity, high capacity, and multiplexed capability.

  8. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  9. Detection of forced oscillations in power systems with multichannel methods

    Energy Technology Data Exchange (ETDEWEB)

    Follum, James D. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2015-09-30

    The increasing availability of high fidelity, geographically dispersed measurements in power systems improves the ability of researchers and engineers to study dynamic behaviors in the grid. One such behavior that is garnering increased attention is the presence of forced oscillations. Power system engineers are interested in forced oscillations because they are often symptomatic of the malfunction or misoperation of equipment. Though the resulting oscillation is not always large in amplitude, the root cause may be serious. In this report, multi-channel forced oscillation detection methods are developed. These methods leverage previously developed detection approaches based on the periodogram and spectral-coherence. Making use of geographically distributed channels of data is shown to improved detection performance and shorten the delay before an oscillation can be detected in the online environment. Results from simulated and measured power system data are presented.

  10. Event-Triggered Fault Detection of Nonlinear Networked Systems.

    Science.gov (United States)

    Li, Hongyi; Chen, Ziran; Wu, Ligang; Lam, Hak-Keung; Du, Haiping

    2017-04-01

    This paper investigates the problem of fault detection for nonlinear discrete-time networked systems under an event-triggered scheme. A polynomial fuzzy fault detection filter is designed to generate a residual signal and detect faults in the system. A novel polynomial event-triggered scheme is proposed to determine the transmission of the signal. A fault detection filter is designed to guarantee that the residual system is asymptotically stable and satisfies the desired performance. Polynomial approximated membership functions obtained by Taylor series are employed for filtering analysis. Furthermore, sufficient conditions are represented in terms of sum of squares (SOSs) and can be solved by SOS tools in MATLAB environment. A numerical example is provided to demonstrate the effectiveness of the proposed results.

  11. Detection and Location of Structural Degradation in Mechanical Systems

    International Nuclear Information System (INIS)

    Blakeman, E.D.; Damiano, B.; Phillips, L.D.

    1999-01-01

    The investigation of a diagnostic method for detecting and locating the source of structural degradation in a mechanical system is described in this paper. The diagnostic method uses a mathematical model of the mechanical system to determine relationships between system parameters and measurable spectral features. These relationships are incorporated into a neural network, which associates measured spectral features with system parameters. Condition diagnosis is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system

  12. An update on TED gunshot detection system development status

    Science.gov (United States)

    Tidhar, Gil A.; Aphek, Ori; Gurovich, Martin

    2009-05-01

    In recent years the TED system has been under development, starting from new SWIR sensor technology, optics and real-time sensor technologies and following with complete system architecture as a soldier mounted optical gun shot detection system with high precision and imaging means. For the first time, the modules and the concept of operation of the system will be explained, with emphasis on new sensor-to-shooter capabilities. Actual field trial results will be shown.

  13. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  14. A cyber-physical system for senior collapse detection

    Science.gov (United States)

    Grewe, Lynne; Magaña-Zook, Steven

    2014-06-01

    Senior Collapse Detection (SCD) is a system that uses cyber-physical techniques to create a "smart home" system to predict and detect the falling of senior/geriatric participants in home environments. This software application addresses the needs of millions of senior citizens who live at home by themselves and can find themselves in situations where they have fallen and need assistance. We discuss how SCD uses imagery, depth and audio to fuse and interact in a system that does not require the senior to wear any devices allowing them to be more autonomous. The Microsoft Kinect Sensor is used to collect imagery, depth and audio. We will begin by discussing the physical attributes of the "collapse detection problem". Next, we will discuss the task of feature extraction resulting in skeleton and joint tracking. Improvements in error detection of joint tracking will be highlighted. Next, we discuss the main module of "fall detection" using our mid-level skeleton features. Attributes including acceleration, position and room environment factor into the SCD fall detection decision. Finally, how a detected fall and the resultant emergency response are handled will be presented. Results in a home environment will be given.

  15. A prototype detection system for atmospheric monitoring of xenon radioisotopes

    Science.gov (United States)

    Czyz, Steven A.; Farsoni, Abi T.; Ranjbar, Lily

    2018-03-01

    The design of a radioxenon detection system utilizing a CdZeTe crystal and a plastic scintillator coupled to an array of SiPMs to conduct beta-gamma coincidence detection for atmospheric radioxenon monitoring, as well as the measurement of 135Xe and 133/133mXe, have been detailed previously. This paper presents recent measurements of 133/133mXe and 131mXe and the observation of conversion electrons in their coincidence spectra, as well as a 48-hour background measurement to calculate the Minimum Detectable Concentration (MDC) of radioxenon isotopes in the system. The identification of Regions of Interest (ROIs) in the coincidence spectra yielded from the radioxenon measurements, and the subsequent calculation of the MDCs of the system for 135Xe, 133/133mXe, and 131mXe, are also discussed. Calculated MDCs show that the detection system preforms respectably when compared to other state of the art radioxenon detection systems and achieved an MDC of less than 1 mBq/m3 for 131mXe, 133Xe, and 133mXe, in accordance with limits set by the Comprehensive Nuclear-Test-Ban Treaty (CTBTO). The system also provides the advantage of room temperature operation, compactness, low noise operation and having simple readout electronics.

  16. Structural material anomaly detection system using water chemistry data

    International Nuclear Information System (INIS)

    Asakura, Yamato; Nagase, Makoto; Uchida, Shunsuke; Ohsumi, Katsumi.

    1992-01-01

    The concept of an advanced water chemistry diagnosis system for detection of anomalies and preventive maintenance of system components is proposed and put into a concrete form. Using the analogy to a medical inspection system, analyses of water chemistry change will make it possible to detect symptoms of anomalies in system components. Then, correlations between water chemistry change and anomaly occurrence in the components of the BWR primary cooling system are analyzed theoretically. These fragmentary correlations are organized and reduced to an algorithm for the on-line diagnosis system using on-line monitoring data, pH and conductivity. By using actual plant data, the on-line diagnosis model system is verified to be applicable for early and automatic finding of the anomaly cause and for timely supply of much diagnostic information to plant operators. (author)

  17. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  18. A new detection system for extremely small vertically mounted cantilevers

    International Nuclear Information System (INIS)

    Antognozzi, M; Ulcinas, A; Picco, L; Simpson, S H; Miles, M J; Heard, P J; Szczelkun, M D; Brenner, B

    2008-01-01

    Detection techniques currently used in scanning force microscopy impose limitations on the geometrical dimensions of the probes and, as a consequence, on their force sensitivity and temporal response. A new technique, based on scattered evanescent electromagnetic waves (SEW), is presented here that can detect the displacement of the extreme end of a vertically mounted cantilever. The resolution of this method is tested using different cantilever sizes and a theoretical model is developed to maximize the detection sensitivity. The applications presented here clearly show that the SEW detection system enables the use of force sensors with sub-micron size, opening new possibilities in the investigation of biomolecular systems and high speed imaging. Two types of cantilevers were successfully tested: a high force sensitivity lever with a spring constant of 0.17 pN nm -1 and a resonant frequency of 32 kHz; and a high speed lever with a spring constant of 50 pN nm -1 and a resonant frequency of 1.8 MHz. Both these force sensors were fabricated by modifying commercial microcantilevers in a focused ion beam system. It is important to emphasize that these modified cantilevers could not be detected by the conventional optical detection system used in commercial atomic force microscopes

  19. Blind spot detection & passive lane change assist systems

    NARCIS (Netherlands)

    Surovtcev, I.

    2015-01-01

    The project goal was design and implementation of proof-of-concept for two systems that aim to tackle the blind spot problem of for the commercial vehicles: Blind Spot Detection and Passive Lane Change Assist functions. The system implementation was done using Rapid Control Prototype (RCP) hardware.

  20. Monitoring water supply systems for anomaly detection and response

    NARCIS (Netherlands)

    Bakker, M.; Lapikas, T.; Tangena, B.H.; Vreeburg, J.H.G.

    2012-01-01

    Water supply systems are vulnerable to damage caused by unintended or intended human actions, or due to aging of the system. In order to minimize the damages and the inconvenience for the customers, a software tool was developed to detect anomalies at an early stage, and to support the responsible

  1. Real-time thermal neutron radiographic detection systems

    International Nuclear Information System (INIS)

    Berger, H.; Bracher, D.A.

    1976-01-01

    Systems for real-time detection of thermal neutron images are reviewed. Characteristics of one system are presented; the data include contrast, resolution and speed of response over the thermal neutron intensity range 2.5 10 3 n/cm 2 -sec to 10 7 n/cm 2 -sec

  2. Configuration of electro-optic fire source detection system

    Science.gov (United States)

    Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir

    2007-04-01

    The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.

  3. Automated system for crack detection using infrared thermograph

    International Nuclear Information System (INIS)

    Starman, Stanislav

    2009-01-01

    The objective of this study was the development of the automated system for crack detection on square steel bars used in the automotive industry for axle and shaft construction. The automated system for thermographic crack detection uses brief pulsed eddy currents to heat steel components under inspection. Cracks, if present, will disturb the current flow and so generate changes in the temperature profile in the crack area. These changes of temperature are visualized using an infrared camera. The image acquired by the infrared camera is evaluated through an image processing system. The advantages afforded by the system are its inspection time, its excellent flaw detection sensitivity and its ability to detect hidden, subsurface cracks. The automated system consists of four IR cameras (each side of steel bar is evaluated at a time), coil, high frequency generator and control place with computers. The system is a part of the inspection line where the subsurface and surface cracks are searched. If the crack is present, the cracked place is automatically marked. The components without cracks are then deposited apart from defective blocks. The system is fully automated and its ability is to evaluate four meter blocks within 20 seconds. This is the real reason for using this system in real industrial applications. (author)

  4. Sensor Failure Detection of FASSIP System using Principal Component Analysis

    Science.gov (United States)

    Sudarno; Juarsa, Mulya; Santosa, Kussigit; Deswandri; Sunaryo, Geni Rina

    2018-02-01

    In the nuclear reactor accident of Fukushima Daiichi in Japan, the damages of core and pressure vessel were caused by the failure of its active cooling system (diesel generator was inundated by tsunami). Thus researches on passive cooling system for Nuclear Power Plant are performed to improve the safety aspects of nuclear reactors. The FASSIP system (Passive System Simulation Facility) is an installation used to study the characteristics of passive cooling systems at nuclear power plants. The accuracy of sensor measurement of FASSIP system is essential, because as the basis for determining the characteristics of a passive cooling system. In this research, a sensor failure detection method for FASSIP system is developed, so the indication of sensor failures can be detected early. The method used is Principal Component Analysis (PCA) to reduce the dimension of the sensor, with the Squarred Prediction Error (SPE) and statistic Hotteling criteria for detecting sensor failure indication. The results shows that PCA method is capable to detect the occurrence of a failure at any sensor.

  5. Comparison of Intelligent Systems in Detecting a Child's Mathematical Gift

    Science.gov (United States)

    Pavlekovic, Margita; Zekic-Susac, Marijana; Djurdjevic, Ivana

    2009-01-01

    This paper compares the efficiency of two intelligent methods: expert systems and neural networks, in detecting children's mathematical gift at the fourth grade of elementary school. The input space for the expert system and the neural network model consisted of 60 variables describing five basic components of a child's mathematical gift…

  6. Study of the casting speedy radiation-detection system

    International Nuclear Information System (INIS)

    Tan Xiaochun; Huang Junqing; Shi Xianbei; Zhao Gang; Wang Liping

    2001-01-01

    The paper introduces the design of the launching speedy radiation-detection system. It consists of launcher, semiconductor detector, microprocessor and communicator. It can give the intensity, position, time of radiation. The paper discusses the function, composition, principle, speciality and technical problem of this system

  7. Start up of the whole body detection system

    International Nuclear Information System (INIS)

    Cortes P, A.; Angeles C, A.; Cuapio O, A.; Tejera R, A.

    1991-12-01

    The management of Radiological Safety of the Nuclear Center of Mexico has a whole body detection system Trade mark Canberra, manufactured by Bio-nuclear Measurements Inc. Ipswich Massachusetts. These systems are used to detect contamination of I-131 in thyroid and other nuclides (Cs-137, Cs-134, Co-60, etc.) in thorax. In this work the procedure that was continued for the setting in march of the thyroid detector is presented. A description of this system and an analysis of the uncertainties involved in the measures of activity of I-131 in thyroid of people occupationally exposed is made. (Author)

  8. Using Physical Models for Anomaly Detection in Control Systems

    Science.gov (United States)

    Svendsen, Nils; Wolthusen, Stephen

    Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA environments that make subversion detection impractical; and by sensor noise and feedback characteristics that degrade conventional anomaly detection systems. Moreover, potential attack mechanisms are ill-defined and may include both physical and logical aspects.

  9. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  10. A survey on automated wheeze detection systems for asthmatic patients

    Directory of Open Access Journals (Sweden)

    Syamimi Mardiah Shaharum

    2012-11-01

    Full Text Available The purpose of this paper is to present an evidence of automated wheeze detection system by a survey that can be very beneficial for asthmatic patients. Generally, for detecting asthma in a patient, stethoscope is used for ascertaining wheezes present. This causes a major problem nowadays because a number of patients tend to delay the interpretation time, which can lead to misinterpretations and in some worst cases to death. Therefore, the development of automated system would ease the burden of medical personnel. A further discussion on automated wheezes detection system will be presented later in the paper. As for the methodology, a systematic search of articles published as early as 1985 to 2012 was conducted. Important details including the hardware used, placement of hardware, and signal processing methods have been presented clearly thus hope to help and encourage future researchers to develop commercial system that will improve the diagnosing and monitoring of asthmatic patients.

  11. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi

    2018-02-12

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a statistical approach. Specifically, a simulation model that mimics the theoretical performances of the inspected PV system is designed. Residuals, which are the difference between the measured and estimated output data, are used as a fault indicator. Indeed, residuals are used as the input for the Multivariate CUmulative SUM (MCUSUM) algorithm to detect potential faults. We evaluated the proposed method by using data from an actual 20 MWp grid-connected PV system located in the province of Adrar, Algeria.

  12. Data analysis of inertial sensor for train positioning detection system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seong Jin; Park, Sung Soo; Lee, Jae Ho; Kang, Dong Hoon [Korea Railroad Research Institute, Uiwang (Korea, Republic of)

    2015-02-15

    Train positioning detection information is fundamental for high-speed railroad inspection, making it possible to simultaneously determine the status and evaluate the integrity of railroad equipment. This paper presents the results of measurements and an analysis of an inertial measurement unit (IMU) used as a positioning detection sensors. Acceleration and angular rate measurements from the IMU were analyzed in the amplitude and frequency domains, with a discussion on vibration and train motions. Using these results and GPS information, the positioning detection of a Korean tilting train express was performed from Naju station to Illo station on the Honam-line. The results of a synchronized analysis of sensor measurements and train motion can help in the design of a train location detection system and improve the positioning detection performance.

  13. The Hydrogen Detection Technique for SG Protection System

    International Nuclear Information System (INIS)

    Lv Mingyu; Pei Zhiyong; Yu Huajin

    2015-01-01

    SG that is pressure boundary between secondary loop and triple loop is the key equipment of fast reactor, in which heat in secondary loop is transferred to water or steam in triple loop. According to data from IAEA, SG is the highest failure rate equipment in fast reactor, especially because of failure of heat transfer tube. In order to monitor failure of heat transfer tube, Fast Reactor Engineering Department develops diffusion type hydrogen detection system, which is used to detect sodium-water reaction in time. This paper firstly introduces experimental research scheme and results of this hydrogen detection technique; Subsequently, it is described that how this technique can be engineering realized in CEFR; Moreover, through developing a series of calibration tests and hydrogen injection tests, it is obtained that sensitivity, response time and calibration curse for hydrogen detection system of CEFR. (author)

  14. Support system and method for detecting neurodegenerative disorder

    DEFF Research Database (Denmark)

    2013-01-01

    The present invention relates to a system and a method for detection of abnormal motor activity during REM sleep, and further to systems and method for assisting in detecting neurodegenerative disorders such as Parkinson's. One embodiment relates to a method for detection of abnormal motor activity...... during REM sleep comprising the steps of: performing polysomnographic recordings of a sleeping subject, thereby obtaining one or more electromyography (EMG) derivations, preferably surface EMG recordings, and one or more EEG derivations, and/or one or more electrooculargraphy (EOG) derivations, detecting...... one or more REM sleep stages, preferably based on the one or more EEG and/or EOG derivations, determining the level of muscle activity during the one or more REM sleep stages based on the one or more EMG derivations, wherein a subject having an increased level of muscle activity during REM sleep...

  15. Potential detection systems for monitoring UF6 releases

    International Nuclear Information System (INIS)

    Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

    1994-09-01

    In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF 6 ) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC's position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF 6 release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring)

  16. Motion detection system with GPU acceleration for stereotactic radiosurgery

    International Nuclear Information System (INIS)

    Yamakawa, Takuya; Ogawa, Koichi; Iyatomi, Hitoshi; Usui, Keisuke; Kunieda, Etsuo; Shigematsu, Naoyuki

    2012-01-01

    Stereotactic radiosurgery is a non-invasive method for the treatment of tumors that employs a narrow, high-energy X-ray beam. In this form of therapy, the target region is intensively irradiated with the narrow beam, and any unexpected patient motion may therefore lead to undesirable irradiation of neighboring normal tissues and organs. To overcome this problem, we propose a contactless motion detection system with three USB cameras for use in stereotactic radiosurgery of the head and neck. In our system, the three cameras monitor images of the patient's nose and ears, and patient motion is detected using a template-matching method. If patient motion is detected, the system alerts the radiologist to turn off the beam. We reduced the effects of variations in the lighting in the irradiation room by employing USB cameras sensitive to infrared light. To detect movement in the acquired images, we use a template-matching method that is realized with general-purpose computing-on-graphics processing units. In this paper, we present an outline of our proposed motion detection system based on monitoring of images of the patient acquired with infrared USB cameras and a template-matching method. The performance of the system was evaluated under the same conditions as those used in actual radiation therapy of the head and neck. (author)

  17. Automatic Emboli Detection System for the Artificial Heart

    Science.gov (United States)

    Steifer, T.; Lewandowski, M.; Karwat, P.; Gawlikowski, M.

    In spite of the progress in material engineering and ventricular assist devices construction, thromboembolism remains the most crucial problem in mechanical heart supporting systems. Therefore, the ability to monitor the patient's blood for clot formation should be considered an important factor in development of heart supporting systems. The well-known methods for automatic embolus detection are based on the monitoring of the ultrasound Doppler signal. A working system utilizing ultrasound Doppler is being developed for the purpose of flow estimation and emboli detection in the clinical artificial heart ReligaHeart EXT. Thesystem will be based on the existing dual channel multi-gate Doppler device with RF digital processing. A specially developed clamp-on cannula probe, equipped with 2 - 4 MHz piezoceramic transducers, enables easy system setup. We present the issuesrelated to the development of automatic emboli detection via Doppler measurements. We consider several algorithms for the flow estimation and emboli detection. We discuss their efficiency and confront them with the requirements of our experimental setup. Theoretical considerations are then met with preliminary experimental findings from a) flow studies with blood mimicking fluid and b) in-vitro flow studies with animal blood. Finally, we discuss some more methodological issues - we consider several possible approaches to the problem of verification of the accuracy of the detection system.

  18. Design of a decentralized detection of interacting LTI systems

    Directory of Open Access Journals (Sweden)

    Shankar Shamanth

    2002-01-01

    Full Text Available In this paper, the problem of designing a decentralized detection filter for a large homogeneous collection of LTI systems is considered. The collection of systems considered here draws inspiration from platoons of vehicles, and the considered interactions amongst systems in the collection are banded and lower triangular, mimicking the typical “look-ahead” nature of interactions in a platoon of vehicles. A fault in a system propagates to other systems in the collection via such interactions. The decentralized detection filter for the collection is composed of interacting detection filters, one for each system. The feasibility of communicating the state estimates to other systems in the collection is assumed here. An important concern is the propagation of state estimation errors. In order that the state estimation errors not amplify as they propagate, a ℋ ∞ constraint on the state estimation error propagation dynamics is imposed. A sufficient condition for constructing a decentralized detection filter for the collection is presented. An example is provided to illustrate the design procedure.

  19. Observer-based Fault Detection and Isolation for Nonlinear Systems

    DEFF Research Database (Denmark)

    Lootsma, T.F.

    With the rise in automation the increase in fault detectionand isolation & reconfiguration is inevitable. Interest in fault detection and isolation (FDI) for nonlinear systems has grown significantly in recent years. The design of FDI is motivated by the need for knowledge about occurring faults...... in fault-tolerant control systems (FTC systems). The idea of FTC systems is to detect, isolate, and handle faults in such a way that the systems can still perform in a required manner. One prefers reduced performance after occurrence of a fault to the shut down of (sub-) systems. Hence, the idea of fault......-output decoupling is described. It is a new idea based on the solution of the input-output decoupling problem. The idea is to include FDI considerations already during the control design....

  20. [Detection of CRSPR-Cas system in Streptococcus thermophiles].

    Science.gov (United States)

    Li, Wan; Liang, Hongzhang; Zhang, Danqing; Wang, Nana; Tang, Yaru; Li, Bailiang; Huo, Guicheng

    2016-04-14

    We aimed to detect the CRSPR-Cas system of six Streptococcus thermophilus. Bioinformatics method was used to predict CRSPR-Cas system of nine S. thermophilus that published in National Center for Biotechnology Information. Four primers were designed according to the flanking sequences of standard strains and the CRISPR-Cas system of six S. thermophilus have been detected by PCR method. S. thermophilus S4 had a Cas9 gene, others all had Cas9 gene, Cas10 gene and Cas9* gene. In addition, 79 and KLDS3.0207 still had Cas3 gene. Signature genes amplification of CRSPR-Cas system could predict the type of CRSPR-Cas system in unsequenced strains, these findings will help establish the foundation for the study of CRSPR-Cas system in lactic acid bacteria.

  1. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Dhanalakshmi Krishnan Sadhasivan

    2017-01-01

    Full Text Available Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.

  2. Integrated polymer waveguides for absorbance detection in chemical analysis systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; El-Ali, Jamil; Wolff, Anders

    2003-01-01

    A chemical analysis system for absorbance detection with integrated polymer waveguides is reported for the first time. The fabrication procedure relies on structuring of a single layer of the photoresist SU-8, so both the microfluidic channel network and the optical components, which include planar....... The emphasis of this paper is on the signal-to-noise ratio of the detection and its relation to the sensitivity. Two absorbance cells with an optical path length of 100 μm and 1000 μm were characterized and compared in terms of sensitivity, limit of detection and effective path length for measurements...

  3. Inequalities detecting quantum entanglement for 2 x d systems

    International Nuclear Information System (INIS)

    Zhao Mingjing; Wang Zhixi; Ma Teng; Fei Shaoming

    2011-01-01

    We present a set of inequalities for detecting quantum entanglement of 2 x d quantum states. For 2 x 2 and 2 x 3 systems, the inequalities give rise to sufficient and necessary separability conditions for both pure and mixed states. For the case of d>3, these inequalities are necessary conditions for separability, which detect all entangled states that are not positive under partial transposition and even some entangled states with positive partial transposition. These inequalities are given by mean values of local observables and present an experimental way of detecting the quantum entanglement of 2 x d quantum states and even multiqubit pure states.

  4. On the lower of limit detection of radiometric systems

    International Nuclear Information System (INIS)

    Kamburov, H.; Boneva, S.

    1983-01-01

    The existing definitions of the quantity Asub(min), the lower detection limit, introduced as a characteristic of the sensitivity of radiometric systems are reviewed. A convenient way is found for comparing the different definitions by showing that each definition is connected with a specific value of the probability a of Type I error. The detection limits are calculated for a normal and Poisson distributions of the measured quantities. A criterion is proposed for the applicability of the normal distiribution to the problem of determining the lower detection limit

  5. Evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1988-01-01

    U.S. Nuclear Regulatory Commission Guide 1.45 recommends the use of at least three different detection methods in reactors to detect leakage. Monitoring of both sump-flow and airborne particulate radioactivity is mandatory. A third method can involve either monitoring of condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity. Although the methods currently used for leak detection reflect the state of the art, other techniques may be developed and used. Since the recommendations of Regulatory Guide 1.45 are not mandatory, Licensee Event Report Compilations have been reviewed to help establish actual capabilities for leak detection. The review of event reports, which had previously covered the period of June 1985 to August 1986 has been extended, and now covers events to June 1987. The total number of significant events is now 83. These reports have provided documented, sometimes detailed, summaries of reactor leaks. They have helped establish the capabilities of existing systems to detect and locate leaks. Differences between PWRs and BWRs with regard to leak detection have now been analyzed. With regard to detection methods, the greatest differences between reactor types are as follows: (a) The sump pump is reported as the detection method more frequently in BWRs than in PWRs (64% vs. 35%). (b) The radiation monitor is reported as the detection method (excluding false alarms) more frequently in PWRs. Current efforts at Argonne National Laboratory (ANL) to evaluate advanced acoustic leak detection methods are directed toward the generation and analysis of acoustic data from large (0.5 to 10 gal/min) leaks and modification of the software of the GARD/ANL advanced acoustic leak detection system. In order to reach the goal of 10 gal/min leaks, the Steam Generator Test Facility at ANL has been modified to carry out the leak testing. Tests were carried out with water at 525 deg. F and 1100 psi leaking through a fatigue crack in a 4-in

  6. Traffic Congestion Detection System through Connected Vehicles and Big Data

    OpenAIRE

    Néstor Cárdenas-Benítez; Raúl Aquino-Santos; Pedro Magaña-Espinoza; José Aguilar-Velazco; Arthur Edwards-Block; Aldo Medina Cass

    2016-01-01

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which ...

  7. EBR-II water-to-sodium leak detection system

    International Nuclear Information System (INIS)

    Wrightson, M.M.; McKinley, K.; Ruther, W.E.; Holmes, J.T.

    1976-01-01

    The water-to-sodium leak detection system installed at EBR-II in April, 1975, is described in detail. Topics covered include operational characteristics, maintenance problems, alarm functions, background hydrogen level data, and future plans for refinements to the system. Particular emphasis is given to the failures of eight of the ten leak detectors due to sodium-to-vacuum leakage, and the program anticipated for complete recovery of the system

  8. Telescope sipping the optimum fuel leak detection system

    International Nuclear Information System (INIS)

    Deleryd, R.

    1998-01-01

    The TELESCOPE Sipping technology is an evolutionary development from previous ABB fuel leak systems used in LWR reactors. The system utilizes the existing dynamics that cause numerous fission products to leak from a failed fuel rod when the fuel assembly is raised from a reactor core during core fuel alterations. The system can also be used by repair work in pool side inspection in order to detect leaking rods or to verify reconstituted assemblies as non leakers. (author)

  9. Development of automatic flaw detection systems for magnetic particle examination

    International Nuclear Information System (INIS)

    Shirai, T.; Kimura, J.; Amako, T.

    1988-01-01

    Utilizing a video camera and an image processor, development was carried out on automatic flaw detection and discrimination techniques for the purpose of achieving automated magnetic particle examination. Following this, fluorescent wet magnetic particle examination systems for blade roots and rotor grooves of turbine rotors and the non-fluorescent dry magnetic particle examination system for butt welds, were developed. This paper describes these automatic magnetic particle examination (MT) systems and the functional test results

  10. Optimization of a quench detection system for superconducting magnets

    International Nuclear Information System (INIS)

    Borlein, M.

    2004-12-01

    Subject of this report is the detection of a quench in a superconducting magnet. For the safe operation of superconducting magnets one of the most important issues is the quench detection system which controls the superconducting state of the magnet and triggers a safety discharge if necessary. If it comes to a breakdown of the superconductivity (quench), the magnet has to be discharged very quickly to avoid any damage or danger for the magnet or its environment. First an introducing overview is given. Next different methods of quench detection will be presented, partially on the basis of existing quench detection systems and the applicability of these methods in different states of the magnet operation will be shown. The different quench detection methods are compared and evaluated partially by using test experiments described in the appendix. As an application example this report contains a proposal for the quench detection system for the Wendelstein 7-X facility, actually built by the Institute for Plasma Physics, Garching [de

  11. Event storm detection and identification in communication systems

    International Nuclear Information System (INIS)

    Albaghdadi, Mouayad; Briley, Bruce; Evens, Martha

    2006-01-01

    Event storms are the manifestation of an important class of abnormal behaviors in communication systems. They occur when a large number of nodes throughout the system generate a set of events within a small period of time. It is essential for network management systems to detect every event storm and identify its cause, in order to prevent and repair potential system faults. This paper presents a set of techniques for the effective detection and identification of event storms in communication systems. First, we introduce a new algorithm to synchronize events to a single node in the system. Second, the system's event log is modeled as a normally distributed random process. This is achieved by using data analysis techniques to explore and then model the statistical behavior of the event log. Third, event storm detection is proposed using a simple test statistic combined with an exponential smoothing technique to overcome the non-stationary behavior of event logs. Fourth, the system is divided into non-overlapping regions to locate the main contributing regions of a storm. We show that this technique provides us with a method for event storm identification. Finally, experimental results from a commercially deployed multimedia communication system that uses these techniques demonstrate their effectiveness

  12. An Android malware detection system based on machine learning

    Science.gov (United States)

    Wen, Long; Yu, Haiyang

    2017-08-01

    The Android smartphone, with its open source character and excellent performance, has attracted many users. However, the convenience of the Android platform also has motivated the development of malware. The traditional method which detects the malware based on the signature is unable to detect unknown applications. The article proposes a machine learning-based lightweight system that is capable of identifying malware on Android devices. In this system we extract features based on the static analysis and the dynamitic analysis, then a new feature selection approach based on principle component analysis (PCA) and relief are presented in the article to decrease the dimensions of the features. After that, a model will be constructed with support vector machine (SVM) for classification. Experimental results show that our system provides an effective method in Android malware detection.

  13. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  14. Prevoting Cancellation-Based Detection for Underdetermined MIMO Systems

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2010-01-01

    Full Text Available Various detection methods including the maximum likelihood (ML detection have been studied for multiple-input multiple-output (MIMO systems. While it is usually assumed that the number of independent data symbols, , to be transmitted by multiple antennas simultaneously is smaller than or equal to that of the receive antennas, , in most cases, there could be cases where , which results in underdetermined MIMO systems. In this paper, we employ the prevoting cancellation based detection for underdetermined MIMO systems and show that the proposed detectors can exploit a full receive diversity. Furthermore, the prevoting vector selection criteria for the proposed detectors are taken into account to improve performance further. We also show that our proposed scheme has a lower computational complexity compared to existing approaches, in particular when slow fading MIMO channels are considered.

  15. Stability of detecting system using NaI(Tl)

    International Nuclear Information System (INIS)

    Zhuo Yunshang; Lei Zhangyun; Zen Yu; Gong Hua

    1996-01-01

    A detecting system using NaI(Tl) is widely used in research and industry of nuclear science and other fields. For providing the high accuracy and working well under inclement environment, the stability of detecting system using NaI(Tl) is very important. The variation of environment temperature, the change of counting rate and long time continuous working of detector will cause un-negligible effect on the measurement. Three approaches were used. They are: 1) temperature control (It makes the effect of the variation of environment temperature on the measurement negligible.); 2) spectrum stabilizing (It adjust the peak position of the spectrum when the counting rate changes.); and 3) auto-checking and adjusting (It adjusts the drift of the NaI(Tl) detecting system when it works continuously)

  16. ANOLE Portable Radiation Detection System Field Test and Evaluation Campaign

    International Nuclear Information System (INIS)

    Hodge, Chris A.

    2007-01-01

    Handheld, backpack, and mobile sensors are elements of the Global Nuclear Detection System for the interdiction and control of illicit radiological and nuclear materials. They are used by the U.S. Department of Homeland Security (DHS) and other government agencies and organizations in various roles for border protection, law enforcement, and nonproliferation monitoring. In order to systematically document the operational performance of the common commercial off-the-shelf portable radiation detection systems, the DHS Domestic Nuclear Detection Office conducted a test and evaluation campaign conducted at the Nevada Test Site from January 18 to February 27, 2006. Named 'Anole', it was the first test of its kind in terms of technical design and test complexities. The Anole test results offer users information for selecting appropriate mission-specific portable radiation detection systems. The campaign also offered manufacturers the opportunity to submit their equipment for independent operationally relevant testing to subsequently improve their detector performance. This paper will present the design, execution, and methodologies of the DHS Anole portable radiation detection system test campaign

  17. Energy detection UWB system based on pulse width modulation

    Directory of Open Access Journals (Sweden)

    Song Cui

    2014-05-01

    Full Text Available A new energy detection ultra-wideband system based on pulse width modulation is proposed. The bit error rate (BER performance of this new system is slightly worst than that of a pulse position modulation (PPM system in additive white Gaussian noise channels. In multipath channels, this system does not suffer from cross-modulation interference as PPM, so it can achieve better BER performance than PPM when cross-modulation interference occurs. In addition, when synchronisation errors occur, this system is more robust than PPM.

  18. A Multimodal Emotion Detection System during Human-Robot Interaction

    Science.gov (United States)

    Alonso-Martín, Fernando; Malfaz, María; Sequeira, João; Gorostiza, Javier F.; Salichs, Miguel A.

    2013-01-01

    In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human–robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS). Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA), which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA), has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE) and Computer Expression Recognition Toolbox (CERT). Once these new components (GEVA and GEFA) give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human–robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System). Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual) separately. PMID:24240598

  19. Error detection and prevention in Embedded Systems Software

    DEFF Research Database (Denmark)

    Kamel, Hani Fouad

    1996-01-01

    Despite many efforts to structure the development and design processes of embedded systems, errors are discovered at the final stages of production and sometimes after the delivery of the products. The cost of such errors can be prohibitive.Different design techniques to detect such errors...... systems, a formal model for such systems is introduced. The main characteristics of embedded systems design and the interaction of these properties are described. A taxonomy for the structure of the software developed for such systems based on the amount of processes and processors involved is presented.......The second part includes methods and techniques to detect software design errors.The third part deals with error prevention. It starts with a presentation of different models of the development processes used in industry and taught at universities. This leads us to deduce the major causes of errors...

  20. System to detect nuclear materials by active neutron method

    International Nuclear Information System (INIS)

    Koroev, M.; Korolev, Yu.; Lopatin, Yu.; Filonov, V.

    1999-01-01

    The report presents the results of the development of the system to detect nuclear materials by active neutron method measuring delayed neutrons. As the neutron source the neutron generator was used. The neutron generator was controlled by the system. The detectors were developed on the base of the helium-3 counters. Each detector consist of 6 counters. Using a number of such detectors it is possible to verify materials stored in different geometry. There is an spectrometric scintillator detector in the system which gives an additional functional ability to the system. The system could be used to estimate the nuclear materials in waste, to detect the unauthorized transfer of the nuclear materials, to estimate the material in tubes [ru

  1. Integrating physically based simulators with Event Detection Systems: Multi-site detection approach.

    Science.gov (United States)

    Housh, Mashor; Ohar, Ziv

    2017-03-01

    The Fault Detection (FD) Problem in control theory concerns of monitoring a system to identify when a fault has occurred. Two approaches can be distinguished for the FD: Signal processing based FD and Model-based FD. The former concerns of developing algorithms to directly infer faults from sensors' readings, while the latter uses a simulation model of the real-system to analyze the discrepancy between sensors' readings and expected values from the simulation model. Most contamination Event Detection Systems (EDSs) for water distribution systems have followed the signal processing based FD, which relies on analyzing the signals from monitoring stations independently of each other, rather than evaluating all stations simultaneously within an integrated network. In this study, we show that a model-based EDS which utilizes a physically based water quality and hydraulics simulation models, can outperform the signal processing based EDS. We also show that the model-based EDS can facilitate the development of a Multi-Site EDS (MSEDS), which analyzes the data from all the monitoring stations simultaneously within an integrated network. The advantage of the joint analysis in the MSEDS is expressed by increased detection accuracy (higher true positive alarms and fewer false alarms) and shorter detection time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Development of Contaminant Detection System using HTS SQUIDs

    International Nuclear Information System (INIS)

    Ohtani, T.; Tanaka, S.; Narita, Y.; Ariyoshi, S.; Suzuki, S.

    2015-01-01

    In terms of food safety, mixture of contaminants in food is a serious problem for not only consumers but also manufacturers. In general, the target size of the metallic contaminant to be removed is 0.5 mm. However, it is a difficult task for manufacturers to achieve this target, because of lower system sensitivity. Therefore, we developed a food contaminant detection system based on high-Tc RF superconducting quantum interference devices (SQUIDs), which are highly sensitive magnetic sensors. This study aims to improve the signal to noise ratio (SNR) of the system and detect a 0.5 mm diameter steel ball. Using a real time digital signal processing technique along with analog band-pass filters, we improved the SNR of the system. Owing to the improved SNR, a steel ball with a diameter as small as 0.3 mm, with stand-off distance of 117 mm was successfully detected. These results suggest that the proposed system is a promising candidate for the detection of metallic contaminants in food products

  3. Mental Fatigue Monitoring Using a Wearable Transparent Eye Detection System

    Directory of Open Access Journals (Sweden)

    Kota Sampei

    2016-01-01

    Full Text Available We propose mental fatigue measurement using a wearable eye detection system. The system is capable of acquiring movement of the pupil and blinking from the light reflected from the eye. The reflection is detected by dye-sensitized photovoltaic cells. Since these cells are patterned onto the eyeglass and do not require external input power, the system is notable for its lightweight and low power consumption and can be combined with other wearable devices, such as a head mounted display. We performed experiments to correlate information obtained by the eye detection system with the mental fatigue of the user. Since it is quite difficult to evaluate mental fatigue objectively and quantitatively, we assumed that the National Aeronautics and Space Administration Task Load Index (NASA-TLX had a strong correlation with te mental fatigue. While a subject was requested to conduct calculation tasks, the eye detection system collected his/her information that included position, velocity and total movement of the eye, and amount and frequency of blinking. Multiple regression analyses revealed the correlation between NASA-TLX and the information obtained for 3 out of 5 subjects.

  4. Traffic Congestion Detection System through Connected Vehicles and Big Data

    Directory of Open Access Journals (Sweden)

    Néstor Cárdenas-Benítez

    2016-04-01

    Full Text Available This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  5. Near-infrared laser, time domain, breast tumour detection system

    International Nuclear Information System (INIS)

    Joblin, A.J.

    1996-01-01

    Full text: The use of near-infrared laser, time domain techniques have been proposed for some time now as an alternative to X-ray mammography, as a means of mass screening for breast disease. The great driving force behind this research has been that near-infrared photons are a non-ionising radiation, which affords a greater degree of patient safety than when using X-rays. This would mean that women at risk of breast disease could be screened with a near-infrared laser imaging system, much more regularly than with an X-ray mammography system, which should allow for the earlier detection and treatment of breast disease. This paper presents a theoretical investigation of the performance of a near-infrared, time domain breast imaging system. The performance of the imaging system is characterised by the resolution and contrast parameters, which were studied using a numerical finite difference calculation method. The finite difference method is used to solve the diffusion equation for the photon transport through the inhomogeneous breast tissue medium. Optimal performance was found to be obtained with short photon times of flight. However the signal to noise ratio decreases rapidly as the photon time of flight is decreased. The system performance will therefore be limited by the noise equivalent power of the time resolved detection system, which is the signal incident on the time resolved detection system which gives a signal to noise ratio of 1:1. Photon times of flight shorter than 500 ps are not practical with current technology, which places limits on the resolution and contrast. The photon signal throughput can be increased by increasing the size of the laser beam width, by increasing the size of the aperture stop of the detector, by increasing the laser pulse duration or decreasing the detector time resolution. Best system performance is found by optimising these parameters for a given time gating and detector system characteristic (NEP). It was found that the

  6. Optimization of PET system design for lesion detection

    International Nuclear Information System (INIS)

    Qi, Jinyi

    2000-01-01

    Traditionally, the figures of merit used in designing a PET scanner are spatial resolution, noise equivalent count rate, noise equivalent sensitivity, etc. These measures, however, do not directly reflect the lesion detectability using the PET scanner. Here we propose to optimize PET scanner design directly for lesion detection. The signal-to-noise ratio (SNR) of lesion detection can be easily computed using the theoretical expressions that we have previously derived. Because no time consuming Monte Carlo simulation is needed, the theoretical expressions allow evaluation of a large range of parameters. The PET system parameters can then be chosen to achieve the maximum SNR for lesion detection. The simulation study shown in this paper was focused a single ring PET scanner without depth of interaction measurement. Randoms and scatters were also ignored

  7. Statistical Outlier Detection for Jury Based Grading Systems

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Clemmensen, Line Katrine Harder; Rosas, Harvey

    2013-01-01

    This paper presents an algorithm that was developed to identify statistical outliers from the scores of grading jury members in a large project-based first year design course. The background and requirements for the outlier detection system are presented. The outlier detection algorithm...... and the follow-up procedures for score validation and appeals are described in detail. Finally, the impact of various elements of the outlier detection algorithm, their interactions, and the sensitivity of their numerical values are investigated. It is shown that the difference in the mean score produced...... by a grading jury before and after a suspected outlier is removed from the mean is the single most effective criterion for identifying potential outliers but that all of the criteria included in the algorithm have an effect on the outlier detection process....

  8. Optical detection system for MEMS-type pressure sensor

    International Nuclear Information System (INIS)

    Sareło, K; Górecka-Drzazga, A; Dziuban, J A

    2015-01-01

    In this paper a special optical detection system designed for a MEMS-type (micro-electro-mechanical system) silicon pressure sensor is presented. The main part of the optical system—a detection unit with a perforated membrane—is bonded to the silicon sensor, and placed in a measuring system. An external light source illuminates the membrane of the pressure sensor. Owing to the light reflected from the deflected membrane sensor, the optical pattern consisting of light points is visible, and pressure can be estimated. The optical detection unit (20   ×   20   ×   20.4 mm 3 ) is fabricated using microengineering techniques. Its dimensions are adjusted to the dimensions of the pressure sensor (5   ×   5 mm 2 silicon membrane). Preliminary tests of the optical detection unit integrated with the silicon pressure sensor are carried out. For the membrane sensor from 15 to 60 µm thick, a repeatable detection of the differential pressure in the range of 0 to 280 kPa is achieved. The presented optical microsystem is especially suitable for the pressure measurements in a high radiation environment. (paper)

  9. Determining the lower limit of detection for personnel dosimetry systems

    International Nuclear Information System (INIS)

    Roberson, P.L.; Carlson, R.D.

    1992-01-01

    A simple method for determining the lower limit of detection (LLD) for personnel dosimetry systems is described. The method relies on the definition of a critical level and a detection level. The critical level is the signal level above which a result has a small probability of being due to a fluctuation of the background. All results below the critical level should not be reported as an indication of a positive result. The detection level is the net signal level (i.e., dose received) above which there is a high confidence that a true reading will be detected and reported as a qualitatively positive result. The detection level may be identified as the LLD. A simple formula is derived to allow the calculation of the LLD under various conditions. This type of formula is being used by the Department of Energy Laboratory Accreditation Program (DOELAP) for personnel dosimetry. Participants in either the National Voluntary Laboratory Accreditation Program (NVLAP) for personnel dosimetry or DOELAP can use performance test results along with a measurement of background levels to estimate the LLDs for their dosimetry system. As long as they maintain their dosimetry system such that the LLDs are less than half the lower limit of the NVLAP or DOELAP test exposure ranges, dosimetry laboratories can avoid testing failures due to poor performance at very low exposures

  10. Radiation Detection System for Prevention of Radiological and Nuclear Terrorism

    International Nuclear Information System (INIS)

    Kwak, Sung-Woo; Yoo, Ho-Sik; Jang, Sung-Sun; Kim, Jae-Kwang; Kim, Jung-Soo

    2007-01-01

    After the September 11 terrorist attack, the threat of a potential for a radiological or nuclear terrorist attack became more apparent. The threats relating to radiological or nuclear materials include a Radiological Dispersion Device (RDD), an Improved Nuclear Device (IND) or a State Nuclear Device (such as a Soviet manufactured suitcase nuclear weapon). For more effective countermeasures against the disaster, multilayer protection concept - prevention of smuggling of radioactive or nuclear material into our country through seaports or airports, detection and prevention of the threat materials in transit on a road, and prevention of their entry into a target building - is recommended. Due to different surrounding circumstances of where detection system is deployed, different types of radiation detection systems are required. There have been no studies on characteristics of detection equipment required under Korean specific conditions. This paper provides information on technical requirements of radiation detection system to achieve multi-layer countermeasures for the purpose of protecting the public and environment against radiological and nuclear terrorism

  11. The synchronous active neutron detection system for spent fuel assay

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    The authors have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit the unique operating features of a 14-MeV neutron generator developed by Schlumberger. This generator and a novel detection system will be applied to the direct measurement of the fissile material content in spent fuel in place of the indirect measures used at present. The technique they are investigating is termed synchronous active neutron detection (SAND). It closely follows a method that has been used routinely in other branches of physics to detect very small signals in the presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed open-quotes lock-inclose quotes amplifiers. The authors have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. This approach is possible because the Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. The results to date are preliminary but quite promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly. It also appears to be quite resilient to background neutron interference. The interrogating neutrons appear to be nonthermal and penetrating. Although a significant amount of work remains to fully explore the relevant physics and optimize the instrument design, the underlying concept appears sound

  12. A bubble detection system for propellant filling pipeline

    Energy Technology Data Exchange (ETDEWEB)

    Wen, Wen; Zong, Guanghua; Bi, Shusheng [Robotics Institute, Beihang University, 100191 Beijing (China)

    2014-06-15

    This paper proposes a bubble detection system based on the ultrasound transmission method, mainly for probing high-speed bubbles in the satellite propellant filling pipeline. First, three common ultrasonic detection methods are compared and the ultrasound transmission method is used in this paper. Then, the ultrasound beam in a vertical pipe is investigated, suggesting that the width of the beam used for detection is usually smaller than the internal diameter of the pipe, which means that when bubbles move close to the pipe wall, they may escape from being detected. A special device is designed to solve this problem. It can generate the spiral flow to force all the bubbles to ascend along the central line of the pipe. In the end, experiments are implemented to evaluate the performance of this system. Bubbles of five different sizes are generated and detected. Experiment results show that the sizes and quantity of bubbles can be estimated by this system. Also, the bubbles of different radii can be distinguished from each other. The numerical relationship between the ultrasound attenuation and the bubble radius is acquired and it can be utilized for estimating the unknown bubble size and measuring the total bubble volume.

  13. Development of a Calibration Strip for Immunochromatographic Assay Detection Systems.

    Science.gov (United States)

    Gao, Yue-Ming; Wei, Jian-Chong; Mak, Peng-Un; Vai, Mang-I; Du, Min; Pun, Sio-Hang

    2016-06-29

    With many benefits and applications, immunochromatographic (ICG) assay detection systems have been reported on a great deal. However, the existing research mainly focuses on increasing the dynamic detection range or application fields. Calibration of the detection system, which has a great influence on the detection accuracy, has not been addressed properly. In this context, this work develops a calibration strip for ICG assay photoelectric detection systems. An image of the test strip is captured by an image acquisition device, followed by performing a fuzzy c-means (FCM) clustering algorithm and maximin-distance algorithm for image segmentation. Additionally, experiments are conducted to find the best characteristic quantity. By analyzing the linear coefficient, an average value of hue (H) at 14 min is chosen as the characteristic quantity and the empirical formula between H and optical density (OD) value is established. Therefore, H, saturation (S), and value (V) are calculated by a number of selected OD values. Then, H, S, and V values are transferred to the RGB color space and a high-resolution printer is used to print the strip images on cellulose nitrate membranes. Finally, verification of the printed calibration strips is conducted by analyzing the linear correlation between OD and the spectral reflectance, which shows a good linear correlation (R² = 98.78%).

  14. Comparison and Characterization of Android-Based Fall Detection Systems

    Directory of Open Access Journals (Sweden)

    Rafael Luque

    2014-10-01

    Full Text Available Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones’ potential (and in particular, the Android Operating System can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed and false positives (conventional movements that are erroneously classified as falls. In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  15. Comparison and characterization of Android-based fall detection systems.

    Science.gov (United States)

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  16. Comparison and Characterization of Android-Based Fall Detection Systems

    Science.gov (United States)

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  17. Evaluation of computer-aided detection and diagnosis systems.

    Science.gov (United States)

    Petrick, Nicholas; Sahiner, Berkman; Armato, Samuel G; Bert, Alberto; Correale, Loredana; Delsanto, Silvia; Freedman, Matthew T; Fryd, David; Gur, David; Hadjiiski, Lubomir; Huo, Zhimin; Jiang, Yulei; Morra, Lia; Paquerault, Sophie; Raykar, Vikas; Samuelson, Frank; Summers, Ronald M; Tourassi, Georgia; Yoshida, Hiroyuki; Zheng, Bin; Zhou, Chuan; Chan, Heang-Ping

    2013-08-01

    Computer-aided detection and diagnosis (CAD) systems are increasingly being used as an aid by clinicians for detection and interpretation of diseases. Computer-aided detection systems mark regions of an image that may reveal specific abnormalities and are used to alert clinicians to these regions during image interpretation. Computer-aided diagnosis systems provide an assessment of a disease using image-based information alone or in combination with other relevant diagnostic data and are used by clinicians as a decision support in developing their diagnoses. While CAD systems are commercially available, standardized approaches for evaluating and reporting their performance have not yet been fully formalized in the literature or in a standardization effort. This deficiency has led to difficulty in the comparison of CAD devices and in understanding how the reported performance might translate into clinical practice. To address these important issues, the American Association of Physicists in Medicine (AAPM) formed the Computer Aided Detection in Diagnostic Imaging Subcommittee (CADSC), in part, to develop recommendations on approaches for assessing CAD system performance. The purpose of this paper is to convey the opinions of the AAPM CADSC members and to stimulate the development of consensus approaches and "best practices" for evaluating CAD systems. Both the assessment of a standalone CAD system and the evaluation of the impact of CAD on end-users are discussed. It is hoped that awareness of these important evaluation elements and the CADSC recommendations will lead to further development of structured guidelines for CAD performance assessment. Proper assessment of CAD system performance is expected to increase the understanding of a CAD system's effectiveness and limitations, which is expected to stimulate further research and development efforts on CAD technologies, reduce problems due to improper use, and eventually improve the utility and efficacy of CAD in

  18. Towards Improved Airborne Fire Detection Systems Using Beetle Inspired Infrared Detection and Fire Searching Strategies

    Directory of Open Access Journals (Sweden)

    Herbert Bousack

    2015-06-01

    Full Text Available Every year forest fires cause severe financial losses in many countries of the world. Additionally, lives of humans as well as of countless animals are often lost. Due to global warming, the problem of wildfires is getting out of control; hence, the burning of thousands of hectares is obviously increasing. Most important, therefore, is the early detection of an emerging fire before its intensity becomes too high. More than ever, a need for early warning systems capable of detecting small fires from distances as large as possible exists. A look to nature shows that pyrophilous “fire beetles” of the genus Melanophila can be regarded as natural airborne fire detection systems because their larvae can only develop in the wood of fire-killed trees. There is evidence that Melanophila beetles can detect large fires from distances of more than 100 km by visual and infrared cues. In a biomimetic approach, a concept has been developed to use the surveying strategy of the “fire beetles” for the reliable detection of a smoke plume of a fire from large distances by means of a basal infrared emission zone. Future infrared sensors necessary for this ability are also inspired by the natural infrared receptors of Melanophila beetles.

  19. Review of current neutron detection systems for emergency response

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul; Kruschwitz, Craig

    2014-09-01

    Neutron detectors are used in a myriad of applications—from safeguarding special nuclear materials (SNM) to determining lattice spacing in soft materials. The transformational changes taking place in neutron detection and imaging techniques in the last few years are largely being driven by the global shortage of helium-3 (3He). This article reviews the status of neutron sensors used specifically for SNM detection in radiological emergency response. These neutron detectors must be highly efficient, be rugged, have fast electronics to measure neutron multiplicity, and be capable of measuring direction of the neutron sources and possibly image them with high spatial resolution. Neutron detection is an indirect physical process: neutrons react with nuclei in materials to initiate the release of one or more charged particles that produce electric signals that can be processed by the detection system. Therefore, neutron detection requires conversion materials as active elements of the detection system; these materials may include boron-10 (10B), lithium-6 (6Li), and gadollinium-157 (157Gd), to name a few, but the number of materials available for neutron detection is limited. However, in recent years, pulse-shape-discriminating plastic scintillators, scintillators made of helium-4 (4He) under high pressure, pillar and trench semiconductor diodes, and exotic semiconductor neutron detectors made from uranium oxide and other materials have widely expanded the parameter space in neutron detection methodology. In this article we will pay special attention to semiconductor-based neutron sensors. Modern microfabricated nanotubes covered inside with neutron converter materials and with very high aspect ratios for better charge transport will be discussed.

  20. Object detection system based on multimodel saliency maps

    Science.gov (United States)

    Guo, Ya'nan; Luo, Chongfan; Ma, Yide

    2017-03-01

    Detection of visually salient image regions is extensively applied in computer vision and computer graphics, such as object detection, adaptive compression, and object recognition, but any single model always has its limitations to various images, so in our work, we establish a method based on multimodel saliency maps to detect the object, which intelligently absorbs the merits of various individual saliency detection models to achieve promising results. The method can be roughly divided into three steps: in the first step, we propose a decision-making system to evaluate saliency maps obtained by seven competitive methods and merely select the three most valuable saliency maps; in the second step, we introduce heterogeneous PCNN algorithm to obtain three prime foregrounds; and then a self-designed nonlinear fusion method is proposed to merge these saliency maps; at last, the adaptive improved and simplified PCNN model is used to detect the object. Our proposed method can constitute an object detection system for different occasions, which requires no training, is simple, and highly efficient. The proposed saliency fusion technique shows better performance over a broad range of images and enriches the applicability range by fusing different individual saliency models, this proposed system is worthy enough to be called a strong model. Moreover, the proposed adaptive improved SPCNN model is stemmed from the Eckhorn's neuron model, which is skilled in image segmentation because of its biological background, and in which all the parameters are adaptive to image information. We extensively appraise our algorithm on classical salient object detection database, and the experimental results demonstrate that the aggregation of saliency maps outperforms the best saliency model in all cases, yielding highest precision of 89.90%, better recall rates of 98.20%, greatest F-measure of 91.20%, and lowest mean absolute error value of 0.057, the value of proposed saliency evaluation

  1. Sensitivity and Dynamic Range Considerations for Homodyne Detection Systems

    DEFF Research Database (Denmark)

    Jaggard, Dwight L.; King, Ray J

    1973-01-01

    The effects of modulation frequency, RF reference power, and external bias upon the sensitivity and dynamic range of microwave homodyne detection systems was measured for point contact diodes and low l/f noise Schottky and backward diodes. The measurements were made at 4.89 GHz using a signal...... to noise ratio of 3 dB and a detection system bandwidth of 10 Hz. Maximum sensitivities of -135, -150, and -145 dBm, and dynamic ranges of 92, 110, and 124 dB were measured for the point contact, Schottky, and backward diodes at modulation frequencies of 30, 30, and 3 kHz, respectively. It was found...... that the level of RF reference signal needed to obtain the maximum sensitivity was equal to or somewhat above the point where the diode changes from square law to linear detection. The results are significant in that previously reported homodyne sensitivities (not necessarily maximum) were on the order of -90...

  2. Assessment of Radiation Background Variation for Moving Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Laboratory; Rennie, John Alan [Los Alamos National Laboratory; Toevs, James Waldo [Los Alamos National Laboratory; Wallace, Darrin J. [Los Alamos National Laboratory; Abhold, Mark Edward [Los Alamos National Laboratory

    2015-07-13

    The introduction points out that radiation backgrounds fluctuate across very short distances: factors include geology, soil composition, altitude, building structures, topography, and other manmade structures; and asphalt and concrete can vary significantly over short distances. Brief descriptions are given of the detection system, experimental setup, and background variation measurements. It is concluded that positive and negative gradients can greatly reduce the detection sensitivity of an MDS: negative gradients create opportunities for false negatives (nondetection), and positive gradients create a potentially unacceptable FAR (above 1%); the location of use for mobile detection is important to understand; spectroscopic systems provide more information for screening out false alarms and may be preferred for mobile use; and mobile monitor testing at LANL accounts for expected variations in the background.

  3. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  4. Sensor failure detection in dynamical systems by Kalman filtering methodology

    International Nuclear Information System (INIS)

    Ciftcioglu, O.

    1991-03-01

    Design of a sensor failure detection system by Kalman filtering methodology is described. The method models the process systems in state-space form, the information on each state being provided by relevant sensors present in the process system. Since the measured states are usually subject to noise, the estimation of the states optimally is an essential requirement. To this end the detection system comprises Kalman estimation filters, the number of which is equal to the number of states concerned. The estimated state of a particular signal in each filter is compared with the corresponding measured signal and difference beyond a predetermined bound is identified as failure, the sensor being identified/isolated as faulty. (author). 19 refs.; 8 figs.; 1 tab

  5. Ground loops detection system in the RFX machine

    International Nuclear Information System (INIS)

    Bellina, F.; Pomaro, N.; Trevisan, F.

    1996-01-01

    RFX is a toroidal machine for the fusion research based on the RFP configuration. During the pulse, in any conductive loop close to the machine very strong currents can be induced, which may damage the diagnostics and the other instrumentation. To avoid loops, the earthing system of the machine is tree-shaped. However, an accidental contact between metallic earthed masses of the machine may give rise to an unwanted loop as well. An automatic system for the detection of ground loops in the earthing system has therefore been developed, which works continuously during shutdown intervals and between pulses. In the paper the design of the detection system is presented, together with the experimental results on prototypes. 4 refs., 3 figs., 1 tab

  6. Planetary Systems Detection, Formation and Habitability of Extrasolar Planets

    CERN Document Server

    Ollivier, Marc; Casoli, Fabienne; Encrenaz, Thérèse; Selsis, Franck

    2009-01-01

    Over the past ten years, the discovery of extrasolar planets has opened a new field of astronomy, and this area of research is rapidly growing, from both the observational and theoretical point of view. The presence of many giant exoplanets in the close vicinity of their star shows that these newly discovered planetary systems are very different from the solar system. New theoretical models are being developed in order to understand their formation scenarios, and new observational methods are being implemented to increase the sensitivity of exoplanet detections. In the present book, the authors address the question of planetary systems from all aspects. Starting from the facts (the detection of more than 300 extraterrestrial planets), they first describe the various methods used for these discoveries and propose a synthetic analysis of their global properties. They then consider the observations of young stars and circumstellar disks and address the case of the solar system as a specific example, different fr...

  7. AUTOMATIC ROAD GAP DETECTION USING FUZZY INFERENCE SYSTEM

    Directory of Open Access Journals (Sweden)

    S. Hashemi

    2012-09-01

    Full Text Available Automatic feature extraction from aerial and satellite images is a high-level data processing which is still one of the most important research topics of the field. In this area, most of the researches are focused on the early step of road detection, where road tracking methods, morphological analysis, dynamic programming and snakes, multi-scale and multi-resolution methods, stereoscopic and multi-temporal analysis, hyper spectral experiments, are some of the mature methods in this field. Although most researches are focused on detection algorithms, none of them can extract road network perfectly. On the other hand, post processing algorithms accentuated on the refining of road detection results, are not developed as well. In this article, the main is to design an intelligent method to detect and compensate road gaps remained on the early result of road detection algorithms. The proposed algorithm consists of five main steps as follow: 1 Short gap coverage: In this step, a multi-scale morphological is designed that covers short gaps in a hierarchical scheme. 2 Long gap detection: In this step, the long gaps, could not be covered in the previous stage, are detected using a fuzzy inference system. for this reason, a knowledge base consisting of some expert rules are designed which are fired on some gap candidates of the road detection results. 3 Long gap coverage: In this stage, detected long gaps are compensated by two strategies of linear and polynomials for this reason, shorter gaps are filled by line fitting while longer ones are compensated by polynomials.4 Accuracy assessment: In order to evaluate the obtained results, some accuracy assessment criteria are proposed. These criteria are obtained by comparing the obtained results with truly compensated ones produced by a human expert. The complete evaluation of the obtained results whit their technical discussions are the materials of the full paper.

  8. Automatic Road Gap Detection Using Fuzzy Inference System

    Science.gov (United States)

    Hashemi, S.; Valadan Zoej, M. J.; Mokhtarzadeh, M.

    2011-09-01

    Automatic feature extraction from aerial and satellite images is a high-level data processing which is still one of the most important research topics of the field. In this area, most of the researches are focused on the early step of road detection, where road tracking methods, morphological analysis, dynamic programming and snakes, multi-scale and multi-resolution methods, stereoscopic and multi-temporal analysis, hyper spectral experiments, are some of the mature methods in this field. Although most researches are focused on detection algorithms, none of them can extract road network perfectly. On the other hand, post processing algorithms accentuated on the refining of road detection results, are not developed as well. In this article, the main is to design an intelligent method to detect and compensate road gaps remained on the early result of road detection algorithms. The proposed algorithm consists of five main steps as follow: 1) Short gap coverage: In this step, a multi-scale morphological is designed that covers short gaps in a hierarchical scheme. 2) Long gap detection: In this step, the long gaps, could not be covered in the previous stage, are detected using a fuzzy inference system. for this reason, a knowledge base consisting of some expert rules are designed which are fired on some gap candidates of the road detection results. 3) Long gap coverage: In this stage, detected long gaps are compensated by two strategies of linear and polynomials for this reason, shorter gaps are filled by line fitting while longer ones are compensated by polynomials.4) Accuracy assessment: In order to evaluate the obtained results, some accuracy assessment criteria are proposed. These criteria are obtained by comparing the obtained results with truly compensated ones produced by a human expert. The complete evaluation of the obtained results whit their technical discussions are the materials of the full paper.

  9. Network Intrusion Forensic Analysis Using Intrusion Detection System

    OpenAIRE

    Manish Kumar; Dr. M. Hanumanthappa; Dr. T.V. Suresh Kumar

    2011-01-01

    The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investi...

  10. Microculture system for detection of Newcastle disease virus antibodies.

    Science.gov (United States)

    Wooley, R E; Brown, J; Gratzek, J B; Kleven, S H; Scott, T A

    1974-05-01

    A microculture system utilizing cytopathic effect (CPE) and hemadsorption (HAd) end points was effective in determining the level of Newcastle disease virus (NDV) antibodies. The microculture system was of comparable sensitivity to the plaque reduction test for the detection of NDV antibodies. The standards by which the CPE and HAd microculture tests would be considered reproducible were defined. The results indicate that the CPE and HAd microculture tests are reproducible within one twofold dilution.

  11. Extracted-beam-detection system around synchrotron saturne

    International Nuclear Information System (INIS)

    Anne, Remy; Milleret, Gerard; Giuliani, Arlette; Lefol, Andre; Perret, Robert; Poupard, Joseph; Trogno, Andre; Van den Bossche, Maurice; N'Guyen Sieu Viet.

    1977-07-01

    The extracted-beam-detection system working around the synchrotron Saturne is presented. The whole system is composed of about forty multiwire chambers used for beam tuning and providing beams profiles. Optic beam parameters such as position, divergence, dimension, emittance can be easily measured, or calculated with a program running on a computer. They are working in large range intensity beams (10 2 to 5.10 11 p/cm 2 /s of protons, alpha particles, deutons, pions, tritons and electrons [fr

  12. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Nabeela Ashraf

    2018-01-01

    Full Text Available Due to the fast growth and tradition of the internet over the last decades, the network security problems are increasing vigorously. Humans can not handle the speed of processes and the huge amount of data required to handle network anomalies. Therefore, it needs substantial automation in both speed and accuracy. Intrusion Detection System is one of the approaches to recognize illegal access and rare attacks to secure networks. In this proposed paper, Naive Bayes, J48 and Random Forest classifiers are compared to compute the detection rate and accuracy of IDS. For experiments, the KDD_NSL dataset is used.

  13. Leak detection system for a high temperature fluid pipe

    International Nuclear Information System (INIS)

    Puyal, C.; Meuwisse, C.

    1989-01-01

    The leak detection system is made by a cable with at least two isolated electrical conductors, close to the wall of the pipe. The material of the cable is chosen so as to change its electrical characteristics if a leak causes heating of the cable. A detector at one end of the cable can measure the modifications of the electrical characteristics [fr

  14. Advanced loose parts detection system for nuclear power plants

    International Nuclear Information System (INIS)

    Por, G.; Szappanos, G.

    2000-01-01

    The importance of loose part detection is discussed. The consequences of a relatively big (7.7 kg) loose part found in a WWER-440 NPP are discussed. A portable loose part monitoring system is presented, which is based on sequential probability ratio test. (author)

  15. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  16. Digital tripwire: a small automated human detection system

    Science.gov (United States)

    Fischer, Amber D.; Redd, Emmett; Younger, A. Steven

    2009-05-01

    A low cost, lightweight, easily deployable imaging sensor that can dependably discriminate threats from other activities within its field of view and, only then, alert the distant duty officer by transmitting a visual confirmation of the threat would provide a valuable asset to modern defense. At present, current solutions suffer from a multitude of deficiencies - size, cost, power endurance, but most notably, an inability to assess an image and conclude that it contains a threat. The human attention span cannot maintain critical surveillance over banks of displays constantly conveying such images from the field. DigitalTripwire is a small, self-contained, automated human-detection system capable of running for 1-5 days on two AA batteries. To achieve such long endurance, the DigitalTripwire system utilizes an FPGA designed with sleep functionality. The system uses robust vision algorithms, such as a partially unsupervised innovative backgroundmodeling algorithm, which employ several data reduction strategies to operate in real-time, and achieve high detection rates. When it detects human activity, either mounted or dismounted, it sends an alert including images to notify the command center. In this paper, we describe the hardware and software design of the DigitalTripwire system. In addition, we provide detection and false alarm rates across several challenging data sets demonstrating the performance of the vision algorithms in autonomously analyzing the video stream and classifying moving objects into four primary categories - dismounted human, vehicle, non-human, or unknown. Performance results across several challenging data sets are provided.

  17. The parameterization of microchannel-plate-based detection systems

    Science.gov (United States)

    Gershman, Daniel J.; Gliese, Ulrik; Dorelli, John C.; Avanov, Levon A.; Barrie, Alexander C.; Chornay, Dennis J.; MacDonald, Elizabeth A.; Holland, Matthew P.; Giles, Barbara L.; Pollock, Craig J.

    2016-10-01

    The most common instrument for low-energy plasmas consists of a top-hat electrostatic analyzer (ESA) geometry coupled with a microchannel-plate-based (MCP-based) detection system. While the electrostatic optics for such sensors are readily simulated and parameterized during the laboratory calibration process, the detection system is often less well characterized. Here we develop a comprehensive mathematical description of particle detection systems. As a function of instrument azimuthal angle, we parameterize (1) particle scattering within the ESA and at the surface of the MCP, (2) the probability distribution of MCP gain for an incident particle, (3) electron charge cloud spreading between the MCP and anode board, and (4) capacitive coupling between adjacent discrete anodes. Using the Dual Electron Spectrometers on the Fast Plasma Investigation on NASA's Magnetospheric Multiscale mission as an example, we demonstrate a method for extracting these fundamental detection system parameters from laboratory calibration. We further show that parameters that will evolve in flight, namely, MCP gain, can be determined through application of this model to specifically tailored in-flight calibration activities. This methodology provides a robust characterization of sensor suite performance throughout mission lifetime. The model developed in this work is not only applicable to existing sensors but also can be used as an analytical design tool for future particle instrumentation.

  18. System for detecting and processing abnormality in electromagnetic shielding

    International Nuclear Information System (INIS)

    Takahashi, T.; Nakamura, M.; Yabana, Y.; Ishikawa, T.; Nagata, K.

    1991-01-01

    The present invention relates to a system for detecting and processing an abnormality in electromagnetic shielding of an intelligent building which is constructed using an electromagnetic shielding material for the skeleton and openings such as windows and doorways so that the whole of the building is formed into an electromagnetic shielding structure. (author). 4 figs

  19. Lysozyme-responsive polymer systems for detection of infection

    NARCIS (Netherlands)

    Schiffer, Doris; Verient, Vanessa; Luschnig, Daniel; Blokhuis-Arkes, Miriam H.E.; van der Palen, Job J.A.M.; Gamerith, Clemens; Burnet, Michael; Sigl, Eva; Heinzle, Andrea; Guebitz, Georg M.

    2015-01-01

    There is a strong need for new point-of-care systems for the detection of wound infection. Overseen infections in chronic wounds induce severe complications, such as delayed healing and high risks for the patients, while time-consuming common gold and silver standard methods for infection assessment

  20. Detection system for the identification of heavy ions

    International Nuclear Information System (INIS)

    Abriola, Daniel H.; Arazi, Andres; Achterberg, Erhard; Capurro, Oscar A.; Fernandez Niello, Jorge O.; Ferrero, Armando M. J.; Liberman, Rosa G.; Marti, Guillermo V.; Pacheco, Alberto J.; Ramirez, Marcelo C.; Testoni, Jorge E.

    1999-01-01

    The TANDAR laboratory has a magnetic spectrometer as one of its detection facilities. This device allows the separation of incident particles according to the relation between their lineal momentum and their charge state. To complete this identification there are two alternatives: 1) A system of three detectors consisting of a multiwire detector, an ionization chamber and scintillators; 2) A segmented anode ionization chamber. (author)

  1. A vision based row detection system for sugar beet

    NARCIS (Netherlands)

    Bakker, T.; Wouters, H.; Asselt, van C.J.; Bontsema, J.; Tang, L.; Müller, J.; Straten, van G.

    2008-01-01

    One way of guiding autonomous vehicles through the field is using a vision based row detection system. A new approach for row recognition is presented which is based on grey-scale Hough transform on intelligently merged images resulting in a considerable improvement of the speed of image processing.

  2. Reliability evaluation of the Savannah River reactor leak detection system

    International Nuclear Information System (INIS)

    Daugherty, W.L.; Sindelar, R.L.; Wallace, I.T.

    1991-01-01

    The Savannah River Reactors have been in operation since the mid-1950's. The primary degradation mode for the primary coolant loop piping is intergranular stress corrosion cracking. The leak-before-break (LBB) capability of the primary system piping has been demonstrated as part of an overall structural integrity evaluation. One element of the LBB analyses is a reliability evaluation of the leak detection system. The most sensitive element of the leak detection system is the airborne tritium monitors. The presence of small amounts of tritium in the heavy water coolant provide the basis for a very sensitive system of leak detection. The reliability of the tritium monitors to properly identify a crack leaking at a rate of either 50 or 300 lb/day (0.004 or 0.023 gpm, respectively) has been characterized. These leak rates correspond to action points for which specific operator actions are required. High reliability has been demonstrated using standard fault tree techniques. The probability of not detecting a leak within an assumed mission time of 24 hours is estimated to be approximately 5 x 10 -5 per demand. This result is obtained for both leak rates considered. The methodology and assumptions used to obtain this result are described in this paper. 3 refs., 1 fig., 1 tab

  3. All-to-all sequenced fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D.; Smith, Brian Edward

    2010-11-02

    An apparatus, program product and method enable nodal fault detection by sequencing communications between all system nodes. A master node may coordinate communications between two slave nodes before sequencing to and initiating communications between a new pair of slave nodes. The communications may be analyzed to determine the nodal fault.

  4. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    Energy Technology Data Exchange (ETDEWEB)

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  5. A Multiple-Channel Sub-Band Transient Detection System

    Energy Technology Data Exchange (ETDEWEB)

    David A. Smith

    1998-11-01

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of

  6. Electromagnetic Signal Feedback Control for Proximity Detection Systems

    Science.gov (United States)

    Smith, Adam K.

    Coal is the most abundant fossil fuel in the United States and remains an essential source of energy. While more than half of coal production comes from surface mining, nearly twice as many workers are employed by underground operations. One of the key pieces of equipment used in underground coal mining is the continuous mining machine. These large and powerful machines are operated in confined spaces by remote control. Since 1984, 40 mine workers in the U. S. have been killed when struck or pinned by a continuous mining machine. It is estimated that a majority of these accidents could have been prevented with the application of proximity detection systems. While proximity detection systems can significantly increase safety around a continuous mining machine, there are some system limitations. Commercially available proximity warning systems for continuous mining machines use magnetic field generators to detect workers and establish safe work areas around the machines. Several environmental factors, however, can influence and distort the magnetic fields. To minimize these effects, a control system has been developed using electromagnetic field strength and generator current to stabilize and control field drift induced by internal and external environmental factors. A laboratory test set-up was built using a ferrite-core magnetic field generator to produce a stable magnetic field. Previous work based on a field-invariant magnetic flux density model, which generically describes the electromagnetic field, is expanded upon. The analytically established transferable shell-based flux density distribution model is used to experimentally validate the control system. By controlling the current input to the ferrite-core generator, a more reliable and consistent magnetic field is produced. Implementation of this technology will improve accuracy and performance of existing commercial proximity detection systems. These research results will help reduce the risk of traumatic

  7. New Monitoring System to Detect a Radioactive Material in Motion

    International Nuclear Information System (INIS)

    Boudergui, Karim; Kondrasovs, Vladimir; Coulon, Romain; Corre, Gwenole; Normand, Stephane

    2013-06-01

    Illegal radioactive material transportation detection, by terrorist for example, is problematic in urban public transportation. Academics and industrials systems include Radiation Portal Monitor (RPM) to detect radioactive matters transported in vehicles or carried by pedestrians. However, today's RPMs are not able to efficiently detect a radioactive material in movement. Due to count statistic and gamma background, false alarms may be triggered or at the contrary a radioactive material not detected. The statistical false alarm rate has to be as low as possible in order to limit useless intervention especially in urban mass transportation. The real-time approach depicted in this paper consists in using a time correlated detection technique in association with a sensor network. It is based on several low-cost and large area plastic scintillators and a digital signal processing designed for signal reconstruction from the sensor network. The number of sensors used in the network can be adapted to fit with applications requirements or cost. The reconstructed signal is improved by comparing other approaches. This allows us to increase the device speed that has to be scanned while decreasing the risk of false alarm. In the framework of a project called SECUR-ED Secured Urban Transportation - European Demonstration, this prototype system will be used during an experiment in the Milan urban mass transportation. (authors)

  8. Ionizing radiation detection meter systems usability evaluation. Technical memorandum

    International Nuclear Information System (INIS)

    Severs, Y.; Hughes, R.; Tack, D.; Bossi, L.L.M.

    2002-12-01

    In support of the Canadian Forces Nuclear Detection, Identification and Dosimetry project a usability trial of three Ionizing Radiation Detection Meter Systems (IRDMS) was conducted 18-22 June 2001 at Connaught Ranges. The systems evaluated: System 1: ANPDR 77 Operational System with PDR 77 Alpha/Beta probes and GPS (Global Positioning System) Training System; System 2: ADM 300C Operational System with ABP 100 Alpha/Beta probes and GPS Training System, and System 3: RAM R200 Operational System with PA 100M and RG12 Alpha/Beta probes and GPS Training System. Twelve military personnel (Private to Captain) determined compliance with the bid evaluation criteria. The counter-balanced study, based on a Latin square design, was divided into two assessment phases, an operational phase and a training system phase, which rotated three groups (of four participants each) concurrently through each IRDMS. Groups were trained in set-up, maintenance and operation of each bid IRDMS prior to evaluation. The operational evaluation consisted of a test/maintenance stand, an indoor/outdoor operational stand, and an indoor,/outdoor training system stand. Participants rated the utility and usability of each system, by measuring case of use/maintenance under a range of relevant operational and clothing conditions, compatibility with soldier tasks, compatibility with clothing, compatibility with equipment and operational environments, and case of learning (including an assessment of initial and refresher training implications). A 7-point Likert-like acceptability rating scale, which covered a range from completely unacceptable (1) to completely acceptable (7), was used to evaluate the measures. The combined weighted mean scores were 584.3 for System 1 (70 o /b), 682.0 for System 2 (81 %) and 756.9 for System 3 (90%) out of a total possible score of 840. Participants reported mean scores for System 1 between barely unacceptable and borderline for both indoor and outdoor operations. System 2

  9. Development of fast wireless detection system for fixed offshore platform

    Science.gov (United States)

    Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping

    2011-04-01

    Offshore platforms' security is concerned since in 1950s and 1960s, and in the early 1980s some important specifications and standards are built, and all these provide technical basis of fixed platform design, construction, installation and evaluation. With the condition that more and more platforms are in serving over age, the research about the evaluation and detection technology of offshore platform has been a hotspot, especially underwater detection, and assessment method based on the finite element calculation. For fixed platform structure detection, conventional NDT methods, such as eddy current, magnetic powder, permeate, X-ray and ultrasonic, etc, are generally used. These techniques are more mature, intuitive, but underwater detection needs underwater robot, the necessary supporting tools of auxiliary equipment, and trained professional team, thus resources and cost used are considerable, installation time of test equipment is long. This project presents a new kind of fast wireless detection and damage diagnosis system for fixed offshore platform using wireless sensor networks, that is, wireless sensor nodes can be put quickly on the offshore platform, detect offshore platform structure global status by wireless communication, and then make diagnosis. This system is operated simply, suitable for offshore platform integrity states rapid assessment. The designed system consists in intelligence acquisition equipment and 8 wireless collection nodes, the whole system has 64 collection channels, namely every wireless collection node has eight 16-bit accuracy of A/D channels. Wireless collection node, integrated with vibration sensing unit, embedded low-power micro-processing unit, wireless transceiver unit, large-capacity power unit, and GPS time synchronization unit, can finish the functions such as vibration data collection, initial analysis, data storage, data wireless transmission. Intelligence acquisition equipment, integrated with high

  10. Networked gamma radiation detection system for tactical deployment

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  11. From Pacemaker to Wearable: Techniques for ECG Detection Systems.

    Science.gov (United States)

    Kumar, Ashish; Komaragiri, Rama; Kumar, Manjeet

    2018-01-11

    With the alarming rise in the deaths due to cardiovascular diseases (CVD), present medical research scenario places notable importance on techniques and methods to detect CVDs. As adduced by world health organization, technological proceeds in the field of cardiac function assessment have become the nucleus and heart of all leading research studies in CVDs in which electrocardiogram (ECG) analysis is the most functional and convenient tool used to test the range of heart-related irregularities. Most of the approaches present in the literature of ECG signal analysis consider noise removal, rhythm-based analysis, and heartbeat detection to improve the performance of a cardiac pacemaker. Advancements achieved in the field of ECG segments detection and beat classification have a limited evaluation and still require clinical approvals. In this paper, approaches on techniques to implement on-chip ECG detector for a cardiac pacemaker system are discussed. Moreover, different challenges regarding the ECG signal morphology analysis deriving from medical literature is extensively reviewed. It is found that robustness to noise, wavelet parameter choice, numerical efficiency, and detection performance are essential performance indicators required by a state-of-the-art ECG detector. Furthermore, many algorithms described in the existing literature are not verified using ECG data from the standard databases. Some ECG detection algorithms show very high detection performance with the total number of detected QRS complexes. However, the high detection performance of the algorithm is verified using only a few datasets. Finally, gaps in current advancements and testing are identified, and the primary challenge remains to be implementing bullseye test for morphology analysis evaluation.

  12. Design of Weft Detection System in The Stenter Machine

    Science.gov (United States)

    Gu, Minming; Xu, Xianju; Dai, Wenzhan

    2017-12-01

    In order to build an effective automatic weft-straightening system, it is important for the sensing device to detect most the possible fabric styles, designs, colours and structures, an optical sensing system that detects the angular orientation of weft threads in a moving web of a textile has been built. It contains an adjustable light source, two lens systems and photodiode sensor array. The sensor array includes 13 radial pattern of photosensitive areas that each generate an electrical signal proportional to the total intensity of the light incident on the area. The moving shadow of a weft thread passing over the area will modulate the output signal. A signal processed circuit was built to do the I/V conversion, amplifying, hardware filtering. An embed micro control system then deals with the information of these signals, calculates the angle of the weft drew. Finally, the experiments were done, the results showed that the weft detection system can deal with the fabric weft skew up to 30° and has achieved good results in the application.

  13. System for automatic detection of lung nodules exhibiting growth

    Science.gov (United States)

    Novak, Carol L.; Shen, Hong; Odry, Benjamin L.; Ko, Jane P.; Naidich, David P.

    2004-05-01

    Lung nodules that exhibit growth over time are considered highly suspicious for malignancy. We present a completely automated system for detection of growing lung nodules, using initial and follow-up multi-slice CT studies. The system begins with automatic detection of lung nodules in the later CT study, generating a preliminary list of candidate nodules. Next an automatic system for registering locations in two studies matches each candidate in the later study to its corresponding position in the earlier study. Then a method for automatic segmentation of lung nodules is applied to each candidate and its matching location, and the computed volumes are compared. The output of the system is a list of nodule candidates that are new or have exhibited volumetric growth since the previous scan. In a preliminary test of 10 patients examined by two radiologists, the automatic system identified 18 candidates as growing nodules. 7 (39%) of these corresponded to validated nodules or other focal abnormalities that exhibited growth. 4 of the 7 true detections had not been identified by either of the radiologists during their initial examinations of the studies. This technique represents a powerful method of surveillance that may reduce the probability of missing subtle or early malignant disease.

  14. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.

    1991-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  15. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.; Aggarwal, S.

    1992-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes, and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  16. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳俊; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting human faces in color images. The algorithm consists of three image processing steps. The first step is human skin color statistics. Then it separates skin regions from non-skin regions. After that, it locates the frontal human face(s) within the skin regions. In the first step, 250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors. This chroma chart is used to generate, from the original color image, a gray scale image whose gray value at a pixel shows its likelihood of representing the skin. The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into separate skin regions from non skin regions. Finally, multiple face templates matching is used to determine if a given skin region represents a frontal human face or not. Test of the system with more than 400 color images showed that the resulting detection rate was 83%, which is better than most color-based face detection systems. The average speed for face detection is 0.8 second/image (400×300 pixels) on a Pentium 3 (800MHz) PC.

  17. Moving Object Detection in Heterogeneous Conditions in Embedded Systems.

    Science.gov (United States)

    Garbo, Alessandro; Quer, Stefano

    2017-07-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  18. Optimal Background Attenuation for Fielded Spectroscopic Detection Systems

    International Nuclear Information System (INIS)

    Robinson, Sean M.; Ashbaker, Eric D.; Schweppe, John E.; Siciliano, Edward R.

    2007-01-01

    Radiation detectors are often placed in positions difficult to shield from the effects of terrestrial background gamma radiation. This is particularly true in the case of Radiation Portal Monitor (RPM) systems, as their wide viewing angle and outdoor installations make them susceptible to radiation from the surrounding area. Reducing this source of background can improve gross-count detection capabilities in the current generation of non-spectroscopic RPM's as well as source identification capabilities in the next generation of spectroscopic RPM's. To provide guidance for designing such systems, the problem of shielding a general spectroscopic-capable RPM system from terrestrial gamma radiation is considered. This analysis is carried out by template matching algorithms, to determine and isolate a set of non-threat isotopes typically present in the commerce stream. Various model detector and shielding scenarios are calculated using the Monte-Carlo N Particle (MCNP) computer code. Amounts of nominal-density shielding needed to increase the probability of detection for an ensemble of illicit sources are given. Common shielding solutions such as steel plating are evaluated based on the probability of detection for 3 particular illicit sources of interest, and the benefits are weighed against the incremental cost of shielding. Previous work has provided optimal shielding scenarios for RPMs based on gross-counting measurements, and those same solutions (shielding the internal detector cavity, direct shielding of the ground between the detectors, and the addition of collimators) are examined with respect to their utility to improving spectroscopic detection

  19. Study on high power ultraviolet laser oil detection system

    Science.gov (United States)

    Jin, Qi; Cui, Zihao; Bi, Zongjie; Zhang, Yanchao; Tian, Zhaoshuo; Fu, Shiyou

    2018-03-01

    Laser Induce Fluorescence (LIF) is a widely used new telemetry technology. It obtains information about oil spill and oil film thickness by analyzing the characteristics of stimulated fluorescence and has an important application in the field of rapid analysis of water composition. A set of LIF detection system for marine oil pollution is designed in this paper, which uses 355nm high-energy pulsed laser as the excitation light source. A high-sensitivity image intensifier is used in the detector. The upper machine sends a digital signal through a serial port to achieve nanoseconds range-gated width control for image intensifier. The target fluorescence spectrum image is displayed on the image intensifier by adjusting the delay time and the width of the pulse signal. The spectral image is coupled to CCD by lens imaging to achieve spectral display and data analysis function by computer. The system is used to detect the surface of the floating oil film in the distance of 25m to obtain the fluorescence spectra of different oil products respectively. The fluorescence spectra of oil products are obvious. The experimental results show that the system can realize high-precision long-range fluorescence detection and reflect the fluorescence characteristics of the target accurately, with broad application prospects in marine oil pollution identification and oil film thickness detection.

  20. Pumping and leak detection system of the HL-2A

    International Nuclear Information System (INIS)

    Cao Zeng; Xu Yunxian; Fu Weidong

    2001-01-01

    The pumping system is a combination of 8 turbomolecular pumps with three stages pumping for HL-2A vacuum vessel, a total effective pumping speed at the vessel of 12 m 3 ·s -1 for nitrogen. The leak detection of element and vessel is performed with inspiration, case of leak detection and two mass spectrometry. The total leak rate of vessel is bellow 1 x 10 -5 Pa ·m 3 ·s -1 . The base pressure is 1 x 10 -5 Pa

  1. Detection of fractional solitons in quantum spin Hall systems

    Science.gov (United States)

    Fleckenstein, C.; Traverso Ziani, N.; Trauzettel, B.

    2018-03-01

    We propose two experimental setups that allow for the implementation and the detection of fractional solitons of the Goldstone-Wilczek type. The first setup is based on two magnetic barriers at the edge of a quantum spin Hall system for generating the fractional soliton. If then a quantum point contact is created with the other edge, the linear conductance shows evidence of the fractional soliton. The second setup consists of a single magnetic barrier covering both edges and implementing a long quantum point contact. In this case, the fractional soliton can unambiguously be detected as a dip in the conductance without the need to control the magnetization of the barrier.

  2. Nondestructive detection system of faults in fuses using radioisotope

    International Nuclear Information System (INIS)

    Goncalves, D.

    1973-01-01

    A system is developed to show the viability of non-destructive detection of the faults of explosive safety fuses which are manufactured by Fabrica da Estrela do Ministerio do Exercito. The faults are detected by an ion-chamber based on the variation of the intensity of the beta particles that penetrate the fuse which passes through a collimator. The beta particles are emitted by Strontium-90 + Yttrium-90 encapsulated in either stainless steel or aluminum. The concept of 'bucking Voltage' is applied to differentiate electronically the signal generated by the ion-chamber. (author)

  3. Radioimmunoassay test system for detection of anti-insulin antibodies

    International Nuclear Information System (INIS)

    Dudko, N.V.; Piven', N.V.; Ibragimova, G.V.; Kasatkin, Yu.N.

    1995-01-01

    A radiodiagnostic test system has been developed and commercial kit for radioimmunoassay of anti-insulin antibodies in human blood serum created. Clinical trials of the kit in patients (150 diabetics with types 1 and 2 condition) and normal subjects (n=100) demonstrated the possibility of using this kit for the detection of preclinical forms of diabetes and for distinguishing groups at risk of diabetes among children and adults, for the detection of insulin resistance, for the differential diagnosis of diabetes, and for monitoring the efficacy of insulin therapy. 9 refs.; 1 tab

  4. Soft-Fault Detection Technologies Developed for Electrical Power Systems

    Science.gov (United States)

    Button, Robert M.

    2004-01-01

    The NASA Glenn Research Center, partner universities, and defense contractors are working to develop intelligent power management and distribution (PMAD) technologies for future spacecraft and launch vehicles. The goals are to provide higher performance (efficiency, transient response, and stability), higher fault tolerance, and higher reliability through the application of digital control and communication technologies. It is also expected that these technologies will eventually reduce the design, development, manufacturing, and integration costs for large, electrical power systems for space vehicles. The main focus of this research has been to incorporate digital control, communications, and intelligent algorithms into power electronic devices such as direct-current to direct-current (dc-dc) converters and protective switchgear. These technologies, in turn, will enable revolutionary changes in the way electrical power systems are designed, developed, configured, and integrated in aerospace vehicles and satellites. Initial successes in integrating modern, digital controllers have proven that transient response performance can be improved using advanced nonlinear control algorithms. One technology being developed includes the detection of "soft faults," those not typically covered by current systems in use today. Soft faults include arcing faults, corona discharge faults, and undetected leakage currents. Using digital control and advanced signal analysis algorithms, we have shown that it is possible to reliably detect arcing faults in high-voltage dc power distribution systems (see the preceding photograph). Another research effort has shown that low-level leakage faults and cable degradation can be detected by analyzing power system parameters over time. This additional fault detection capability will result in higher reliability for long-lived power systems such as reusable launch vehicles and space exploration missions.

  5. System for the detection of chromosomal rearrangements using Sordaria macrospora

    Energy Technology Data Exchange (ETDEWEB)

    Arnaise, S.; Leblon, G.; Lares, L. (Paris-11 Univ., 91 - Orsay (France). Lab. de Biologie Cellulaire et Genetique)

    1984-01-01

    A system is described for the detection and diagnosis of induced chromosomal rearrangement using Sordaria macrospora. The system uses the property of the rearrangement to produce defective white ascospores as meiotic progeny from heterozygous crosses. Two reconstruction experiments have shown that this system is able to give reliable quantitative measures of rearrangement frequencies. Evidence for a photoreactivation process was obtained, suggesting that pyrimidine dimers may well be an important lesion in UV-induced chromosomal rearrangement. No evidence of induction of chromosomal rearrangement was obtained in experiments with the powerful chemical mutagen N-methyl-N'-nitro-N-nitrosoguanidine.

  6. System for tissue characterization using synchronous detection of diffuse reflectance

    International Nuclear Information System (INIS)

    Morales Lopez, Orestes M.; Stolik Isakina, Suren; La Rosa Vazquez, Jose Manuel de; Valor Reed, Alma

    2016-01-01

    The development of a system for the characterization of tissues optical properties in-vivo by synchronous detection of diffuse reflectance is presented. The system comprises an exploring probe with a linear spatial arrangement of optical fibers coupled to six lasers of 650 nm wavelength and a photodiode. The system also includes a preamplifier circuit for the photodiode, a driver for the amplitude modulation of the light signal of the lasers with optical power monitoring, a digital phase splitter for reference signal generation, an amplifying circuit with digitally switch able gain, a double phase demodulation circuit, an Arduino, and a control interface developed in LabVIEW. (Author)

  7. Detection of criticality accidents. The Intertechnique EDAC II system

    International Nuclear Information System (INIS)

    Prigent, R.

    1991-01-01

    The chief aim of the new generation of EDAC II criticality accidents detection system is to reduce the risks associated to the handling of fissile material by providing a swift and safe warning of the development of any criticality accident. To this function already devolving on the EDAC system of the previous generation, the EDAC II adds the possibility of storing in memory the characteristics of the accident, providing a daily follow-up of the striking events in the system through the print-out of a log book and providing assistance to the operators during the periodical tests. (Author)

  8. E-commerce Review System to Detect False Reviews.

    Science.gov (United States)

    Kolhar, Manjur

    2017-08-15

    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we proposed an e-commerce review system framework developed using the cumulative sum method to detect and remove malicious review ratings.

  9. Noninvasive biological sensor system for detection of drunk driving.

    Science.gov (United States)

    Murata, Kohji; Fujita, Etsunori; Kojima, Shigeyuki; Maeda, Shinitirou; Ogura, Yumi; Kamei, Tsutomu; Tsuji, Toshio; Kaneko, Shigehiko; Yoshizumi, Masao; Suzuki, Nobutaka

    2011-01-01

    Systems capable of monitoring the biological condition of a driver and issuing warnings during instances of drowsiness have recently been studied. Moreover, many researchers have reported that biological signals, such as brain waves, pulsation waves, and heart rate, are different between people who have and have not consumed alcohol. Currently, we are developing a noninvasive system to detect individuals driving under the influence of alcohol by measuring biological signals. We used the frequency time series analysis to attempt to distinguish between normal and intoxicated states of a person as the basis of the sensing system.

  10. Power system distributed oscilation detection based on Synchrophasor data

    Science.gov (United States)

    Ning, Jiawei

    Along with increasing demand for electricity, integration of renewable energy and deregulation of power market, power industry is facing unprecedented challenges nowadays. Within the last couple of decades, several serious blackouts have been taking place in United States. As an effective approach to prevent that, power system small signal stability monitoring has been drawing more interests and attentions from researchers. With wide-spread implementation of Synchrophasors around the world in the last decade, power systems real-time online monitoring becomes much more feasible. Comparing with planning study analysis, real-time online monitoring would benefit control room operators immediately and directly. Among all online monitoring methods, Oscillation Modal Analysis (OMA), a modal identification method based on routine measurement data where the input is unmeasured ambient excitation, is a great tool to evaluate and monitor power system small signal stability. Indeed, high sampling Synchrophasor data around power system is fitted perfectly as inputs to OMA. Existing methods in OMA for power systems are all based on centralized algorithms applying at control centers only; however, with rapid growing number of online Synchrophasors the computation burden at control centers is and will be continually exponentially expanded. The increasing computation time at control center compromises the real-time feature of online monitoring. The communication efforts between substation and control center will also be out of reach. Meanwhile, it is difficult or even impossible for centralized algorithms to detect some poorly damped local modes. In order to avert previous shortcomings of centralized OMA methods and embrace the new changes in the power systems, two new distributed oscillation detection methods with two new decentralized structures are presented in this dissertation. Since the new schemes brought substations into the big oscillation detection picture, the proposed

  11. A novel mobile system for radiation detection and monitoring

    Science.gov (United States)

    Biafore, Mauro

    2014-05-01

    A novel mobile system for real time, wide area radiation surveillance has been developed within the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). The REWARD sensing units are small, mobile portable units with low energy consumption, which consist of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit is integrated by a wireless communication interface to send the data remotely to a monitoring base station as well as a GPS system to calculate the position of the tag. The system also incorporates middleware and high-level software to provide web-service interfaces for the exchange of information. A central monitoring and decision support system has been designed to process the data from the sensing units and to compare them with historical record in order to generate an alarm when an abnormal situation is detected. A security framework ensures protection against unauthorized access to the network and data, ensuring the privacy of the communications and contributing to the overall robustness and reliability of the REWARD system. The REWARD system has been designed for many different scenarios such as nuclear terrorism threats, lost radioactive sources, radioactive contamination or nuclear accidents. It can be deployed in emergency units and in general in any type of mobile or static equipment, but also inside public/private buildings or infrastructures. The complete system is scalable in terms of complexity and cost and offers very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system allows for a realistic introduction to the market. Authorities may start with a basic, low cost system and increase the complexity based on their

  12. Lateral position detection and control for friction stir systems

    Science.gov (United States)

    Fleming, Paul; Lammlein, David; Cook, George E.; Wilkes, Don Mitchell; Strauss, Alvin M.; Delapp, David; Hartman, Daniel A.

    2010-12-14

    A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

  13. Overview of motion and presence detection systems used in smart lighting systems

    OpenAIRE

    Goponenko, A. S.; Matveev, I. G.

    2015-01-01

    The article describes stages of design of smart lighting systems. Advantages and disadvantages of detectors used in smart lighting systems are stressed with the purpose of further development of these systems. Ambient factors, which affect the detection system, were analyzed and consequent conservation measures were proposed.

  14. Tomato seeds maturity detection system based on chlorophyll fluorescence

    Science.gov (United States)

    Li, Cuiling; Wang, Xiu; Meng, Zhijun

    2016-10-01

    Chlorophyll fluorescence intensity can be used as seed maturity and quality evaluation indicator. Chlorophyll fluorescence intensity of seed coats is tested to judge the level of chlorophyll content in seeds, and further to judge the maturity and quality of seeds. This research developed a detection system of tomato seeds maturity based on chlorophyll fluorescence spectrum technology, the system included an excitation light source unit, a fluorescent signal acquisition unit and a data processing unit. The excitation light source unit consisted of two high power LEDs, two radiators and two constant current power supplies, and it was designed to excite chlorophyll fluorescence of tomato seeds. The fluorescent signal acquisition unit was made up of a fluorescence spectrometer, an optical fiber, an optical fiber scaffolds and a narrowband filter. The data processing unit mainly included a computer. Tomato fruits of green ripe stage, discoloration stage, firm ripe stage and full ripe stage were harvested, and their seeds were collected directly. In this research, the developed tomato seeds maturity testing system was used to collect fluorescence spectrums of tomato seeds of different maturities. Principal component analysis (PCA) method was utilized to reduce the dimension of spectral data and extract principal components, and PCA was combined with linear discriminant analysis (LDA) to establish discriminant model of tomato seeds maturity, the discriminant accuracy was greater than 90%. Research results show that using chlorophyll fluorescence spectrum technology is feasible for seeds maturity detection, and the developed tomato seeds maturity testing system has high detection accuracy.

  15. Towards an Automated Acoustic Detection System for Free Ranging Elephants.

    Science.gov (United States)

    Zeppelzauer, Matthias; Hensman, Sean; Stoeger, Angela S

    The human-elephant conflict is one of the most serious conservation problems in Asia and Africa today. The involuntary confrontation of humans and elephants claims the lives of many animals and humans every year. A promising approach to alleviate this conflict is the development of an acoustic early warning system. Such a system requires the robust automated detection of elephant vocalizations under unconstrained field conditions. Today, no system exists that fulfills these requirements. In this paper, we present a method for the automated detection of elephant vocalizations that is robust to the diverse noise sources present in the field. We evaluate the method on a dataset recorded under natural field conditions to simulate a real-world scenario. The proposed method outperformed existing approaches and robustly and accurately detected elephants. It thus can form the basis for a future automated early warning system for elephants. Furthermore, the method may be a useful tool for scientists in bioacoustics for the study of wildlife recordings.

  16. Arc detection for the ICRF system on ITER

    Science.gov (United States)

    D'Inca, R.

    2011-12-01

    The ICRF system for ITER is designed to respect the high voltage breakdown limits. However arcs can still statistically happen and must be quickly detected and suppressed by shutting the RF power down. For the conception of a reliable and efficient detector, the analysis of the mechanism of arcs is necessary to find their unique signature. Numerous systems have been conceived to address the issues of arc detection. VSWR-based detectors, RF noise detectors, sound detectors, optical detectors, S-matrix based detectors. Until now, none of them has succeeded in demonstrating the fulfillment of all requirements and the studies for ITER now follow three directions: improvement of the existing concepts to fix their flaws, development of new theoretically fully compliant detectors (like the GUIDAR) and combination of several detectors to benefit from the advantages of each of them. Together with the physical and engineering challenges, the development of an arc detection system for ITER raises methodological concerns to extrapolate the results from basic experiments and present machines to the ITER scale ICRF system and to conduct a relevant risk analysis.

  17. Adaptive Road Crack Detection System by Pavement Classification

    Directory of Open Access Journals (Sweden)

    Alejandro Amírola

    2011-10-01

    Full Text Available This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement.

  18. An integrated leak detection system for the ALMR steam generator

    International Nuclear Information System (INIS)

    Dayal, Y.; Gaubatz, D.C.; Wong, K.K.; Greene, D.A.

    1995-01-01

    The steam generator (SG) of the Advanced Liquid Metal Reactor (ALMR) system serves as a heat exchanger between the shell side secondary loop hot liquid sodium and the tube side water/steam mixture. A leak in the tube will result in the injection of the higher pressure water/steam into the sodium and cause an exothermic sodium-water reaction. An initial small leak (less than 1 gm/sec) can escalate into an intermediate size leak in a relatively short time by self enlargement of the original flaw and by initiating leaks in neighboring tubes. If not stopped, complete rupture of one or more tubes can cause injection rates of thousands of gm/sec and result in the over pressurization of the secondary loop rupture disk and dumping of the sodium to relieve pressure. The down time associated with severe sodium-water reaction damage has great adverse economic consequence. An integrated leak detection system (ILDS) has been developed which utilizes both chemical and acoustic sensors for improved leak detection. The system provides SG leak status to the reactor operator and is reliable enough to trigger automatic control action to protect the SG. The ILDS chemical subsystem uses conventional in-sodium and cover gas hydrogen detectors and incorporates knowledge based effects due to process parameters for improved reliability. The ILDS acoustic subsystem uses an array of acoustic sensors and incorporates acoustic beamforming technology for highly reliable and accurate leak identification and location. The new ILDS combines the small leak detection capability of the chemical system with the reliability and rapid detection/location capability of the acoustic system to provide a significantly improved level of protection for the SG over a wide range of operation conditions. (author)

  19. DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    FRANCISCA NONYELUM OGWUELEKA

    2011-06-01

    Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.

  20. Sunglass detection method for automation of video surveillance system

    Science.gov (United States)

    Sikandar, Tasriva; Samsudin, Wan Nur Azhani W.; Hawari Ghazali, Kamarul; Mohd, Izzeldin I.; Fazle Rabbi, Mohammad

    2018-04-01

    Wearing sunglass to hide face from surveillance camera is a common activity in criminal incidences. Therefore, sunglass detection from surveillance video has become a demanding issue in automation of security systems. In this paper we propose an image processing method to detect sunglass from surveillance images. Specifically, a unique feature using facial height and width has been employed to identify the covered region of the face. The presence of covered area by sunglass is evaluated using facial height-width ratio. Threshold value of covered area percentage is used to classify the glass wearing face. Two different types of glasses have been considered i.e. eye glass and sunglass. The results of this study demonstrate that the proposed method is able to detect sunglasses in two different illumination conditions such as, room illumination as well as in the presence of sunlight. In addition, due to the multi-level checking in facial region, this method has 100% accuracy of detecting sunglass. However, in an exceptional case where fabric surrounding the face has similar color as skin, the correct detection rate was found 93.33% for eye glass.

  1. Dynamic analysis methods for detecting anomalies in asynchronously interacting systems

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Akshat; Solis, John Hector; Matschke, Benjamin

    2014-01-01

    Detecting modifications to digital system designs, whether malicious or benign, is problematic due to the complexity of the systems being analyzed. Moreover, static analysis techniques and tools can only be used during the initial design and implementation phases to verify safety and liveness properties. It is computationally intractable to guarantee that any previously verified properties still hold after a system, or even a single component, has been produced by a third-party manufacturer. In this paper we explore new approaches for creating a robust system design by investigating highly-structured computational models that simplify verification and analysis. Our approach avoids the need to fully reconstruct the implemented system by incorporating a small verification component that dynamically detects for deviations from the design specification at run-time. The first approach encodes information extracted from the original system design algebraically into a verification component. During run-time this component randomly queries the implementation for trace information and verifies that no design-level properties have been violated. If any deviation is detected then a pre-specified fail-safe or notification behavior is triggered. Our second approach utilizes a partitioning methodology to view liveness and safety properties as a distributed decision task and the implementation as a proposed protocol that solves this task. Thus the problem of verifying safety and liveness properties is translated to that of verifying that the implementation solves the associated decision task. We develop upon results from distributed systems and algebraic topology to construct a learning mechanism for verifying safety and liveness properties from samples of run-time executions.

  2. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳酸; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting hu-man faces in color images.The algorithm comsists of three image processing steps.The first step is human skin color statistics.Then it separates skin regions from non-skin regions.After that,it locates the frontal human face(s) within the skin regions.In the first step,250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors.This chroma chart is used to generate,from the original color image,a gray scale image whose gray value at a pixel shows its likelihood of representing the shin,The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into sep-arate skin regions from non skin regions.Finally,multiple face templates matching is used to determine if a given skin region represents a frontal human face or not.Test of the system with more than 400 color images showed that the resulting detection rate was 83%,which is better than most colou-based face detection sys-tems.The average speed for face detection is 0.8 second/image(400×300pixels) on a Pentium 3(800MHz) PC.

  3. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  4. Triplexer Monitor Design for Failure Detection in FTTH System

    Science.gov (United States)

    Fu, Minglei; Le, Zichun; Hu, Jinhua; Fei, Xia

    2012-09-01

    Triplexer was one of the key components in FTTH systems, which employed an analog overlay channel for video broadcasting in addition to bidirectional digital transmission. To enhance the survivability of triplexer as well as the robustness of FTTH system, a multi-ports device named triplexer monitor was designed and realized, by which failures at triplexer ports can be detected and localized. Triplexer monitor was composed of integrated circuits and its four input ports were connected with the beam splitter whose power division ratio was 95∶5. By means of detecting the sampled optical signal from the beam splitters, triplexer monitor tracked the status of the four ports in triplexer (e.g. 1310 nm, 1490 nm, 1550 nm and com ports). In this paper, the operation scenario of the triplexer monitor with external optical devices was addressed. And the integrated circuit structure of the triplexer monitor was also given. Furthermore, a failure localization algorithm was proposed, which based on the state transition diagram. In order to measure the failure detection and localization time under the circumstance of different failed ports, an experimental test-bed was built. Experiment results showed that the detection time for the failure at 1310 nm port by the triplexer monitor was less than 8.20 ms. For the failure at 1490 nm or 1550 nm port it was less than 8.20 ms and for the failure at com port it was less than 7.20 ms.

  5. GOTRES: an expert system for fault detection and analysis

    International Nuclear Information System (INIS)

    Chung, D.T.; Modarres, M.

    1989-01-01

    This paper describes a deep-knowledge expert system shell for diagnosing faults in process operations. The expert program shell is called GOTRES (GOal TRee Expert System) and uses a goal tree-success tree deep-knowledge structure to model its knowledge-base. To demonstrate GOTRES, we have built an on-line fault diagnosis expert system for an experimental nuclear reactor facility using this shell. The expert system is capable of diagnosing fault conditions using system goal tree as well as utilizing accumulated operating knowledge to predict plant causal and temporal behaviours. The GOTRES shell has also been used for root-cause detection and analysis in a nuclear plant. (author)

  6. [Wavelength Selection in Hemolytic Evaluation Systems with Spectrophotometry Detection].

    Science.gov (United States)

    Zhang, Hong; Su, Baochang; Ye, Xunda; Luo, Man

    2016-04-01

    Spectrophotometry is a simple hemolytic evaluation method commonly used in new drugs,biomedical materials and blood products.It is for the quantitative analysis of the characteristic absorption peaks of hemoglobin.Therefore,it is essential to select the correct detection wavelength when the evaluation system has influences on the conformation of hemoglobin.Based on the study of changes in the characteristic peaks over time of the hemolysis supernatant in four systems,namely,cell culture medium,phosphate buffered saline(PBS),physiological saline and banked blood preservation solution,using continuous wavelength scanning,the selections of detection wavelength were proposed as follows.In the cell culture medium system,the wavelength of 415 nm should be selected within 4h;,near 408 nm should be selected within 4~72h.In PBS system,within 4h,541 nm,577nm or 415 nm should be selected;4~72h,541 nm,577nm or near 406 nm should be selected.In physiological saline system,within 4h,414 nm should be selected;4~72h,near 405 nm should be selected;within 12 h,541nm or 577 nm could also be selected.In banked blood preservation solution system,within 72 h,415nm,540 nm or 576 nm should be selected.

  7. Integrated Micro-Optical Fluorescence Detection System for Microfluidic Electrochromatography

    International Nuclear Information System (INIS)

    ALLERMAN, ANDREW A.; ARNOLD, DON W.; ASBILL, RANDOLPH E.; BAILEY, CHRISTOPHER G.; CARTER, TONY RAY; KEMME, SHANALYN A.; MATZKE, CAROLYN M.; SAMORA, SALLY; SWEATT, WILLIAM C.; WARREN, MIAL E.; WENDT, JOEL R.

    1999-01-01

    The authors describe the design and microfabrication of an extremely compact optical system as a key element in an integrated capillary-channel electrochromatograph with laser induced fluorescence detection. The optical design uses substrate-mode propagation within the fused silica substrate. The optical system includes a vertical cavity surface-emitting laser (VCSEL) array, two high performance microlenses and a commercial photodetector. The microlenses are multilevel diffractive optics patterned by electron beam lithography and etched by reactive ion etching in fused silica. Two generations of optical subsystems are described. The first generation design is integrated directly onto the capillary channel-containing substrate with a 6 mm separation between the VCSEL and photodetector. The second generation design separates the optical system onto its own module and the source to detector length is further compressed to 3.5 mm. The systems are designed for indirect fluorescence detection using infrared dyes. The first generation design has been tested with a 750 nm VCSEL exciting a 10(sup -4) M solution of CY-7 dye. The observed signal-to-noise ratio of better than 100:1 demonstrates that the background signal from scattered pump light is low despite the compact size of the optical system and meets the system sensitivity requirements

  8. MicroSensors Systems: detection of a dismounted threat

    Science.gov (United States)

    Davis, Bill; Berglund, Victor; Falkofske, Dwight; Krantz, Brian

    2005-05-01

    The Micro Sensor System (MSS) is a layered sensor network with the goal of detecting dismounted threats approaching high value assets. A low power unattended ground sensor network is dependant on a network protocol for efficiency in order to minimize data transmissions after network establishment. The reduction of network 'chattiness' is a primary driver for minimizing power consumption and is a factor in establishing a low probability of detection and interception. The MSS has developed a unique protocol to meet these challenges. Unattended ground sensor systems are most likely dependant on batteries for power which due to size determines the ability of the sensor to be concealed after placement. To minimize power requirements, overcome size limitations, and maintain a low system cost the MSS utilizes advanced manufacturing processes know as Fluidic Self-Assembly and Chip Scale Packaging. The type of sensing element and the ability to sense various phenomenologies (particularly magnetic) at ranges greater than a few meters limits the effectiveness of a system. The MicroSensor System will overcome these limitations by deploying large numbers of low cost sensors, which is made possible by the advanced manufacturing process used in production of the sensors. The MSS program will provide unprecedented levels of real-time battlefield information which greatly enhances combat situational awareness when integrated with the existing Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) infrastructure. This system will provide an important boost to realizing the information dominant, network-centric objective of Joint Vision 2020.

  9. Multisensor system for toxic gases detection generated on indoor environments

    Science.gov (United States)

    Durán, C. M.; Monsalve, P. A. G.; Mosquera, C. J.

    2016-11-01

    This work describes a wireless multisensory system for different toxic gases detection generated on indoor environments (i.e., Underground coal mines, etc.). The artificial multisensory system proposed in this study was developed through a set of six chemical gas sensors (MQ) of low cost with overlapping sensitivities to detect hazardous gases in the air. A statistical parameter was implemented to the data set and two pattern recognition methods such as Principal Component Analysis (PCA) and Discriminant Function Analysis (DFA) were used for feature selection. The toxic gases categories were classified with a Probabilistic Neural Network (PNN) in order to validate the results previously obtained. The tests were carried out to verify feasibility of the application through a wireless communication model which allowed to monitor and store the information of the sensor signals for the appropriate analysis. The success rate in the measures discrimination was 100%, using an artificial neural network where leave-one-out was used as cross validation method.

  10. Development of failure detection system for gas-cooled reactor

    International Nuclear Information System (INIS)

    Feirreira, M.P.

    1990-01-01

    This work presents several kinds of Failure Detection Systems for Fuel Elements, stressing their functional principles and major applications. A comparative study indicates that the method of electrostatic precipitation of the fission gases Kr and Xe is the most efficient for fuel failure detection in gas-cooled reactors. A detailed study of the physical phenomena involved in electrostatic precipitation led to the derivation of an equation for the measured counting rate. The emission of fission products from the fuel and the ion recombination inside the chamber are evaluated. A computer program, developed to simulate the complete operation of the system, relates the counting rate to the concentration of Kr and Xe isotopes. The project of a mock-up is then presented. Finally, the program calculations are compared to experimental data, available from the literature, yielding a close agreement. (author)

  11. 46 CFR 161.002-10 - Automatic fire detecting system control unit.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Automatic fire detecting system control unit. 161.002-10...-10 Automatic fire detecting system control unit. (a) General. The fire detecting system control unit... and the battery to be charged. (h) Automatic fire detecting system, battery charging and control—(1...

  12. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Science.gov (United States)

    2010-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG...) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a device... Guidance Document: CFTR Gene Mutation Detection System.” See § 866.1(e) for the availability of this...

  13. Complexity of deciding detectability in discrete event systems

    Czech Academy of Sciences Publication Activity Database

    Masopust, Tomáš

    2018-01-01

    Roč. 93, July (2018), s. 257-261 ISSN 0005-1098 Institutional support: RVO:67985840 Keywords : discrete event systems * finite automata * detectability Subject RIV: BA - General Mathematics OBOR OECD: Computer science s, information science , bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 5.451, year: 2016 https://www. science direct.com/ science /article/pii/S0005109818301730

  14. Complexity of deciding detectability in discrete event systems

    Czech Academy of Sciences Publication Activity Database

    Masopust, Tomáš

    2018-01-01

    Roč. 93, July (2018), s. 257-261 ISSN 0005-1098 Institutional support: RVO:67985840 Keywords : discrete event systems * finite automata * detectability Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 5.451, year: 2016 https://www.sciencedirect.com/science/article/pii/S0005109818301730

  15. Anomaly detection in an automated safeguards system using neural networks

    International Nuclear Information System (INIS)

    Whiteson, R.; Howell, J.A.

    1992-01-01

    An automated safeguards system must be able to detect an anomalous event, identify the nature of the event, and recommend a corrective action. Neural networks represent a new way of thinking about basic computational mechanisms for intelligent information processing. In this paper, we discuss the issues involved in applying a neural network model to the first step of this process: anomaly detection in materials accounting systems. We extend our previous model to a 3-tank problem and compare different neural network architectures and algorithms. We evaluate the computational difficulties in training neural networks and explore how certain design principles affect the problems. The issues involved in building a neural network architecture include how the information flows, how the network is trained, how the neurons in a network are connected, how the neurons process information, and how the connections between neurons are modified. Our approach is based on the demonstrated ability of neural networks to model complex, nonlinear, real-time processes. By modeling the normal behavior of the processes, we can predict how a system should be behaving and, therefore, detect when an abnormality occurs

  16. New radionuclide specific laboratory detection system for metallurgical industry

    International Nuclear Information System (INIS)

    Burianova, L.; Solc, J.; Dryak, P.; Moser, H.; Branger, T.; Garcia-Torano, E.; Peyres, V.; Capogni, M.; Luca, A.; Vodenik, B.; Oliveira, C.; Portugal, L.; Tzika, F.; Lutter, G.; Szucs, L.; Dziel, T.; Burda, O.; Dirk, A.; Martinkovic, J.; Sliskonen, T.; Mattila, A.

    2014-01-01

    One of the main outputs of the European Metrology Research Programme (EMRP) project 'Ionising radiation metrology for the metallurgical industry' (MetroMetal) was the recommendation on a novel spectrometric detection system optimized for the measurement of radioactivity in metallurgical samples. The recommended system, prototypes of which were constructed at two project partner's laboratories, was characterized by using Monte Carlo (MC) simulations. Six different MC codes were used to model the system and a range of cylindrical samples of cast steel, slag and fume dust. The samples' shape, density, and elemental composition were the same as the ones of the calibration standards developed within the project to provide traceability to end-users. The MC models were used to calculate full-energy peak and total detection efficiencies as well as true coincidence summing correction (TCSC) factors for selected radionuclides of interest in the metallurgical industry: 60 Co, 137 Cs, 192 Ir, 214 Bi, 214 Pb, and 208 Tl. The MC codes were compared to each other on the basis of the calculated detection efficiencies and TCSC factors. In addition, a 'Procedural guide for calculation of TCSC factors for samples in metallurgical industry' was developed for end-users. The TCSC factors reached in certain cases up to 32% showing that the summing effects are of high importance in the close measurement geometries met in routine analysis of metallurgical samples. (authors)

  17. Power System Transient Diagnostics Based on Novel Traveling Wave Detection

    Science.gov (United States)

    Hamidi, Reza Jalilzadeh

    Modern electrical power systems demand novel diagnostic approaches to enhancing the system resiliency by improving the state-of-the-art algorithms. The proliferation of high-voltage optical transducers and high time-resolution measurements provide opportunities to develop novel diagnostic methods of very fast transients in power systems. At the same time, emerging complex configuration, such as multi-terminal hybrid transmission systems, limits the applications of the traditional diagnostic methods, especially in fault location and health monitoring. The impedance-based fault-location methods are inefficient for cross-bounded cables, which are widely used for connection of offshore wind farms to the main grid. Thus, this dissertation first presents a novel traveling wave-based fault-location method for hybrid multi-terminal transmission systems. The proposed method utilizes time-synchronized high-sampling voltage measurements. The traveling wave arrival times (ATs) are detected by observation of the squares of wavelet transformation coefficients. Using the ATs, an over-determined set of linear equations are developed for noise reduction, and consequently, the faulty segment is determined based on the characteristics of the provided equation set. Then, the fault location is estimated. The accuracy and capabilities of the proposed fault location method are evaluated and also compared to the existing traveling-wave-based method for a wide range of fault parameters. In order to improve power systems stability, auto-reclosing (AR), single-phase auto-reclosing (SPAR), and adaptive single-phase auto-reclosing (ASPAR) methods have been developed with the final objectives of distinguishing between the transient and permanent faults to clear the transient faults without de-energization of the solid phases. However, the features of the electrical arcs (transient faults) are severely influenced by a number of random parameters, including the convection of the air and plasma

  18. Face detection for interactive tabletop viewscreen system using olfactory display

    Science.gov (United States)

    Sakamoto, Kunio; Kanazawa, Fumihiro

    2009-10-01

    An olfactory display is a device that delivers smells to the nose. It provides us with special effects, for example to emit smell as if you were there or to give a trigger for reminding us of memories. The authors have developed a tabletop display system connected with the olfactory display. For delivering a flavor to user's nose, the system needs to recognition and measure positions of user's face and nose. In this paper, the authors describe an olfactory display which enables to detect the nose position for an effective delivery.

  19. Detection of the secondary star in three AM Her systems

    International Nuclear Information System (INIS)

    Mukai, K.; Charles, P.A.

    1986-01-01

    This paper reports low-resolution spectrophotometry in the region 6000-9500 A, of three AM Her-type systems, with the Isaac Newton Telescope, and UKIRT photometry of two of them. PG1550+191 (MR Ser) was found to be in a low state; the others, CW1103+254 (ST LMi) and E2003+225(QQ Vul), were not. In all three cases spectral features characteristic of late-M stars were detected. We also report on the infrared photometry of two of the systems, enabling us to refine the distance estimates. (author)

  20. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    OpenAIRE

    Hongliang Liang; Yilun Xie; Yan Song

    2016-01-01

    iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of...