WorldWideScience

Sample records for flame-out detection system

  1. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  3. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  4. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  5. Immunity Based Worm Detection System

    Institute of Scientific and Technical Information of China (English)

    HONG Zheng; WU Li-fa; WANG Yuan-yuan

    2007-01-01

    Current worm detection methods are unable to detect multi-vector polymorphic worms effectively.Based on negative selection mechanism of the immune system,a local network worm detection system that detects worms was proposed.Normal network service requests were represented by self-strings,and the detection system used self-strings to monitor the network for anomaly.According to the properties of worm propagation,a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection.Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms.

  6. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  7. Remote Voice Detection System

    Science.gov (United States)

    2007-06-25

    back to the laser Doppler vibrometer and the digital camera, respectively. Mechanical beam steering mirror modules, such as galvanometer steering...mirror module 43 in accordance with this invention. An appropriate galvanometer -based tracker system has been used for tracking eye motion during laser

  8. Risk Analysis of Flare Flame-out Condition in a Gas Process Facility Analyse des risques des conditions d’extinction de torche au sein d’une installation de traitement de gaz

    Directory of Open Access Journals (Sweden)

    Zadakbar O.

    2011-02-01

    Full Text Available Flaring is a common method of disposal of flammable waste gases in the downstream industries. Flare flame out (flame lift-off or blow-outs often occurs causing toxic vapors to discharge. The toxic gases released may have hazardous effects on the surrounding environment. To study the effect of inhalation exposure of these toxic gases on human health, the four steps of the EPA (Environmental Protection Agency framework with the field data to quantify the cancer and non-cancer health risks are integrated in this paper. As a part of exposure assessment, gas dispersion modeling using AERMOD and UDM-PHAST is applied in two different conditions of normal flaring and flare flame out during a particular climate condition in Khangiran region. Recommendations to avoid flare flame out conditions are also presented here. Le torchage est un procédé courant d’élimination des gaz résiduaires inflammables dans les industries de traitement. L’extinction de la torche (par décollage ou soufflage de flamme provoque souvent une émission de vapeurs toxiques. Ces gaz toxiques libérés peuvent présenter des effets dangereux sur le milieu environnant. Pour étudier l’effet d’une exposition par inhalation de ces gaz toxiques sur la santé, cet article croise les quatre étapes de la démarche de l’EPA (Environmental Protection Agency, Agence de protection de l’environnement avec les données d’exploitation afin de quantifier le risque sanitaire cancérologique et non cancérologique. Dans le cadre de l’estimation d’exposition, une modélisation de dispersion des gaz utilisant AERMOD et UDM-PHAST est évaluée dans deux configurations différentes de torchage normal et d’extinction de torche à l’occasion de conditions climatiques particulières dans la région du Khangiran. L’article propose également des recommandations destinées à éviter les conditions d’une extinction de flamme de torche.

  9. Centrifugal unbalance detection system

    Science.gov (United States)

    Cordaro, Joseph V.; Reeves, George; Mets, Michael

    2002-01-01

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  10. Fault Detection for Nonlinear Systems

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, H.H.

    1998-01-01

    The paper describes a general method for designing fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of methods based...

  11. APDS: Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

    2002-02-14

    An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

  12. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  13. Intrusion Detection System: Security Monitoring System

    Directory of Open Access Journals (Sweden)

    ShabnamNoorani,

    2015-10-01

    Full Text Available An intrusion detection system (IDS is an ad hoc security solution to protect flawed computer systems. It works like a burglar alarm that goes off if someone tampers with or manages to get past other security mechanisms such as authentication mechanisms and firewalls. An Intrusion Detection System (IDS is a device or a software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station.Intrusion Detection System (IDS has been used as a vital instrument in defending the network from this malicious or abnormal activity..In this paper we are comparing host based and network based IDS and various types of attacks possible on IDS.

  14. Mine Safety Detection System (MSDS)

    Science.gov (United States)

    2012-09-01

    BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS Acronym Term ALMDS Airborne Laser -Mine Detection System AMCM Airborne Mine Countermeasure AoA...Streak Tube Imaging Laser ULCC Ultra Large Crude Carrier USN United States Navy UWIED Under Water Improvised Explosive Devices VLCC Very Large Crude...active sonar, passive sonar, infra-red (IR) thermal imaging, LIDAR (Light Detection and Ranging), and the use of marine mammals ( dolphins and porpoises

  15. Intelligent System for Worm Detection

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2009-01-01

    Full Text Available Worms are on the top of malware threats attacking computer system although of the evolution of worms detectiontechniques. Early detection of unknown worms is still a problem. This paper produce a method for detecting unknown wormsbased on local victim information. The proposed system uses Artificial Neural Network (ANN for classifying worm/ nonwormtraffic and predicting the percentage of infection in the infected network. This prediction can be used to support decisionmaking process for network administrator to respond quickly to worm propagation in an accurate procedure.

  16. Quickest detection in coupled systems

    CERN Document Server

    Hadjiliadis, Olympia; Poor, H Vincent

    2009-01-01

    This work considers the problem of quickest detection of signals in a coupled system of N sensors, which receive continuous sequential observations from the environment. It is assumed that the signals, which are modeled a general Ito processes, are coupled across sensors, but that their onset times may differ from sensor to sensor. The objective is the optimal detection of the first time at which any sensor in the system receives a signal. The problem is formulated as a stochastic optimization problem in which an extended average Kullback- Leibler divergence criterion is used as a measure of detection delay, with a constraint on the mean time between false alarms. The case in which the sensors employ cumulative sum (CUSUM) strategies is considered, and it is proved that the minimum of N CUSUMs is asymptotically optimal as the mean time between false alarms increases without bound.

  17. System for detecting microbial contamination

    NARCIS (Netherlands)

    Gerritse, J.; Groenestijn, J.W.; Zegers, N.D.

    2009-01-01

    The present invention relates to a system for detecting microbial contamination of a liquid specimen comprising a device for concentrating micro-organisms from a liquid specimen, having (i) a hypobaric chamber, (ii) a filter housing comprising a liquid-permeable bed of an adsorbent material and adap

  18. Portable Microleak-Detection System

    Science.gov (United States)

    Rivers, H. Kevin; Sikora, Joseph G.; Sankaran, Sankara N.

    2007-01-01

    The figure schematically depicts a portable microleak-detection system that has been built especially for use in testing hydrogen tanks made of polymer-matrix composite materials. (As used here, microleak signifies a leak that is too small to be detectable by the simple soap-bubble technique.) The system can also be used to test for microleaks in tanks that are made of other materials and that contain gases other than hydrogen. Results of calibration tests have shown that measurement errors are less than 10 percent for leak rates ranging from 0.3 to 200 cm3/min. Like some other microleak-detection systems, this system includes a vacuum pump and associated plumbing for sampling the leaking gas, and a mass spectrometer for analyzing the molecular constituents of the gas. The system includes a flexible vacuum chamber that can be attached to the outer surface of a tank or other object of interest that is to be tested for leakage (hereafter denoted, simply, the test object). The gas used in a test can be the gas or vapor (e.g., hydrogen in the original application) to be contained by the test object. Alternatively, following common practice in leak testing, helium can be used as a test gas. In either case, the mass spectrometer can be used to verify that the gas measured by the system is the test gas rather than a different gas and, hence, that the leak is indeed from the test object.

  19. Semi autonomous mine detection system

    Energy Technology Data Exchange (ETDEWEB)

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  20. Semi autonomous mine detection system

    Science.gov (United States)

    Few, Doug; Versteeg, Roelof; Herman, Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude - from an autonomous robotic perspective - the rapid development and deployment of fieldable systems.

  1. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  2. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  3. Gastric Cancer Regional Detection System.

    Science.gov (United States)

    Ural, Berkan; Hardalaç, Fırat; Serhatlioğlu, Selami; İlhan, Mustafa Necmi

    2016-01-01

    In this study, a novel system was created to localize cancerous regions for stomach images which were taken with computed tomography(CT). The aim was to determine the coordinates of cancerous regions which spread in the stomach area in the color space with using this system. Also, to limit these areas with a high accuracy ratio and to feedback to the user of this system were the other objectives. This integration was performed with using energy mapping, analysis methods and multiple image processing methods and the system which was consisted from these advanced algorithms was appeared. For this work, in the range of 25-40 years and when gender discrimination was insignificant, 30 volunteer patients were chosen. During the formation of the system, to exalt the accuracy to the maximum level, 2 main stages were followed up. First, in the system, advanced image processing methods were processed between each other and obtained data were studied. Second, in the system, FFT and Log transformations were used respectively for the first two cases, then these transformations were used together for the third case. For totally three cases, energy distribution and DC energy intensity analysis were done and the performance of this system was investigated. Finally, with using the system's unique algorithms, a non-invasive method was achieved to detect the gastric cancer and when FFT and Log transformation were used together, the maximum success rate was obtained and this rate was calculated as 83,3119 %.

  4. The Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  5. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  6. Nucleic acid detection system and method for detecting influenza

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  7. Capillary Electrophoresis - Optical Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sepaniak, M. J.

    2001-08-06

    Molecular recognition systems are developed via molecular modeling and synthesis to enhance separation performance in capillary electrophoresis and optical detection methods for capillary electrophoresis. The underpinning theme of our work is the rational design and development of molecular recognition systems in chemical separations and analysis. There have been, however, some subtle and exciting shifts in our research paradigm during this period. Specifically, we have moved from mostly separations research to a good balance between separations and spectroscopic detection for separations. This shift is based on our perception that the pressing research challenges and needs in capillary electrophoresis and electrokinetic chromatography relate to the persistent detection and flow rate reproducibility limitations of these techniques (see page 1 of the accompanying Renewal Application for further discussion). In most of our work molecular recognition reagents are employed to provide selectivity and enhance performance. Also, an emerging trend is the use of these reagents with specially-prepared nano-scale materials. Although not part of our DOE BES-supported work, the modeling and synthesis of new receptors has indirectly supported the development of novel microcantilevers-based MEMS for the sensing of vapor and liquid phase analytes. This fortuitous overlap is briefly covered in this report. Several of the more significant publications that have resulted from our work are appended. To facilitate brevity we refer to these publications liberally in this progress report. Reference is also made to very recent work in the Background and Preliminary Studies Section of the Renewal Application.

  8. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  9. Explosives detection system and method

    Science.gov (United States)

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  10. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  11. Distributed Impact Detection System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  12. Detection of Abrupt Changes in Dynamic Systems,

    Science.gov (United States)

    1984-01-01

    the detection of abrupt chnages in dynamic systems. These efforts have been motivated by a wide variety of applications includinq the detection of...34Failure Detection in Dynimic Systems," AGARD Lecture Series No. 109 on Fault Tolerance Design and Redundancy Management Technqiues, Athens, Rome, and

  13. Intelligent Detection System framework using Mobile agents

    CERN Document Server

    Jaisankar, N; Swamy, K Durai

    2010-01-01

    An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very challenging task since its aim is to detect unknown attacks without any priori knowledge about specific intrusions. This technology is still at its early stage. The objective of this paper is that the system can detect anomalous user activity. Existing research in this area focuses either on user activity or on program operation but not on both simultaneously. In this paper, an attempt to look at both concurrently is presented. Based on an intrusion detection framework [1], a novel user anomaly detection system has been implemented and conducted several intrusion detection experiments in a simulated environment by analy...

  14. Classification and Importance of Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Rajasekaran K

    2012-08-01

    Full Text Available An intrusion detection system (IDS is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Due to a growing number of intrusion events and also because the Internet and local networks have become so ubiquitous, organizations are increasingly implementing various systems that monitor IT security breaches. This includes an overview of the classification of intrusion detection systems and introduces the reader to some fundamental concepts of IDS methodology: audit trail analysis and on-the-fly processing as well as anomaly detection and signature detection approaches. This research paper discusses the primary intrusion detection techniques and the classification of intrusion Detection system.

  15. Research of Vision Detection System on PCB

    Institute of Scientific and Technical Information of China (English)

    CHENG Songlin; ZHOU Zude; HU Wenjuan

    2006-01-01

    Machine vision is applied in defect detection system on PCB. The whole system structure and the principle of vision detection are introduced, while the detection method including image processing, detection and recognition algorithms are detailed. The simulation results demonstrate that through this method, four types of defects including short circuit, open circuit, protuberance and concavity on PCB circuit can be effectively inspected, located and recognized.

  16. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  17. Gravitational Waves III: Detecting Systems

    OpenAIRE

    Cattani, M.

    2010-01-01

    In a recent paper we have deduced the basic equations that predict the emission of gravitational waves (GW) according to the Einstein gravitation theory. In a subsequent paper these equations have been used to calculate the luminosities and the amplitudes of the waves generated by binary stars, pulsations of neutron stars, wobbling of deformed neutron stars, oscillating quadrupoles, rotating bars and collapsing and bouncing cores of supernovas. We show here how the GW could be detected in our...

  18. Intrusion Detection Approach Using Connectionist Expert System

    Institute of Scientific and Technical Information of China (English)

    MA Rui; LIU Yu-shu; DU Yan-hui

    2005-01-01

    In order to improve the detection efficiency of rule-based expert systems, an intrusion detection approach using connectionist expert system is proposed. The approach converts the AND/OR nodes into the corresponding neurons, adopts the three-layered feed forward network with full interconnection between layers,translates the feature values into the continuous values belong to the interval [0, 1 ], shows the confidence degree about intrusion detection rules using the weight values of the neural networks and makes uncertain inference with sigmoid function. Compared with the rule-based expert system, the neural network expert system improves the inference efficiency.

  19. Development of the environmental neutron detection system

    CERN Document Server

    Kume, K

    2002-01-01

    Environmental neutron detection system was proposed and developed. The main goal of this system was set to detect fast and thermal neutrons with the identical detectors setup without degraders. This system consists of a sup 1 sup 0 B doped liquid scintillator for n detection and CsI scintillators for simultaneous gamma emission from sup 1 sup 0 B doped in the liquid scintillator after the n capture reaction. The first setup was optimized for the thermal n detection, while the second setup was for the fast n detection. It was shown that the thermal n flux was obtained in the first setup by using the method of the gamma coincidence method with the help of the Monte Carlo calculation. The second setup was designed to improve the detection efficiency for the fast n, and was shown qualitatively that both the pulse shape discrimination and the coincidence methods are efficient. There will be more improvements, particularly for the quantitative discussion.

  20. Deep Water Munitions Detection System

    Science.gov (United States)

    2010-03-01

    signal to noise ratios which are shown in Figure 5. The signal to noise was calculated using an algorithm that is part of the Oasis montaj software...using an algorithm that is part of the Oasis montaj software suite. The signal strength of an anomaly is calculated as the sum of the squares of...Process Software extension for Geosoft Oasis Montaj , version 6.4, May 28, 2007 8. DeProspo,D. and R. DiMarco, “Automatic Detection and

  1. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  2. Design of Secure Distributed Intrusion Detection Systems

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Intrusion Detection System (IDS) have received a great deal of attention because of their excellent ability of preventing network incidents. Recently, many efficient approaches have been proposed to improve detection ability of IDS. While the self-protection ability of IDS is relatively worse and easy to be exploited by attackers, this paper gives a scheme of Securely Distributed Intrusion Detection System (SDIDS). This system adopts special measurements to enforce the security of IDS components. A new secure mechanism combining role-based access control and attribute certificate is used to resist attack to communication.

  3. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  4. Research of Telescope Space Particle Detection System

    Institute of Scientific and Technical Information of China (English)

    CHENG; Yu-min; LAN; Xiao-fei

    2015-01-01

    To meet the needs of space environment detection of high-energy particles,we developed a prototype of space electron-proton flux detector,used in measurements of electronics and proton flux inside and outside the spacecraft.This detection system has the following advantages:

  5. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  6. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  7. NQR Stimulation Technique for Explosives Detection System

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    A method of customization stimulation signal based on direct digital frequency synthesis (DDS) for Nuclear Quadrapole Resonance Explosives Detection System is presented. DDS has many advantages, such as high frequency resolution, high convert speed,

  8. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  9. Heartbeat detection system using piezoelectric transducer

    Science.gov (United States)

    Hamonangan, Yosua; Purnamaningsih, Wigajatri

    2017-02-01

    This paper presents a simple piezoelectric based heartbeat detection system. The signal produced by the piezoelectric will undergo signal conditioning and then converted into digital data by Arduino Nano. Using serial communication, the data will be sent to a computer for display and further analysis. The detection of heartbeat is carried out on three locations; wrist, chest, and diaphragm. From the measurement results, it is shown that the system work best when the piezoelectric is placed on wrist.

  10. New Detection System for Heavy Element Research

    CERN Document Server

    Tsyganov, Y S; Voinov, A A; Shumeyko, M V

    2015-01-01

    New detection system design for heavy element research with 48Ca projectile has been reported. This system is based on application of 32 position sensitive strip PIPS detector and low pressure pentane filled TOF detector application in 48Ca induced nuclear reactions. To suppress beam associated background products new version of real time method of active correlations has been applied. Examples of applications in 249Bk+48Ca and 243Am+48Ca reactions are presented. The system development to operate together with the digital ORNL detection system to provide a quick search for recoil to alpha correlation chains has been discussed too.

  11. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  12. Cluster based Intrusion Detection System for Manets

    Directory of Open Access Journals (Sweden)

    Nisha Dang

    2012-07-01

    Full Text Available Manets are the ad hoc networks that are build on demand or instantly when some mobile nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. Therefore there is no defined topology for Manets. They communicate in dynamic topology which continuously changes as nodes are not stable. Due to this lack of infrastructure and distributed nature they are more vulnerable for attacks and provide a good scope to malicious users to become part of the network. To prevent the security of mobile ad hoc networks many security measures are designed such as encryption algorithms, firewalls etc. But still there is some scope of malicious actions. So, Intrusion detection systems are proposed to detect any intruder in the network and its malicious activities. Cluster based intrusion detection system is also designed to restrict the intruders activities in clusters of mobile nodes. In clusters each node run some intrusion detection code to detect local as well as global intrusion. In this paper we have taken insight of intrusion detection systems and different attacks on Manet security. Then we proposed how overhead involved in cluster based intrusion detection system can be reduced.

  13. A system for distributed intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  14. Force protection demining system (FPDS) detection subsystem

    Science.gov (United States)

    Zachery, Karen N.; Schultz, Gregory M.; Collins, Leslie M.

    2005-06-01

    This study describes the U.S. Army Force Protection Demining System (FPDS); a remotely-operated, multisensor platform developed for reliable detection and neutralization of both anti-tank and anti-personnel landmines. The ongoing development of the prototype multisensor detection subsystem is presented, which integrates an advanced electromagnetic pulsed-induction array and ground penetrating synthetic aperture radar array on a single standoff platform. The FPDS detection subsystem is mounted on a robotic rubber-tracked vehicle and incorporates an accurate and precise navigation/positioning module making it well suited for operation in varied and irregular terrains. Detection sensors are optimally configured to minimize interference without loss in sensitivity or performance. Mine lane test data acquired from the prototype sensors are processed to extract signal- and image-based features for automatic target recognition. Preliminary results using optimal feature and classifier selection indicate the potential of the system to achieve high probabilities of detection while minimizing false alarms. The FPDS detection software system also exploits modern multi-sensor data fusion algorithms to provide real-time detection and discrimination information to the user.

  15. Expert System Detects Power-Distribution Faults

    Science.gov (United States)

    Walters, Jerry L.; Quinn, Todd M.

    1994-01-01

    Autonomous Power Expert (APEX) computer program is prototype expert-system program detecting faults in electrical-power-distribution system. Assists human operators in diagnosing faults and deciding what adjustments or repairs needed for immediate recovery from faults or for maintenance to correct initially nonthreatening conditions that could develop into faults. Written in Lisp.

  16. Bolidozor - Distributed radio meteor detection system

    CERN Document Server

    Kakona, Jakub; Kakona, Martin

    2016-01-01

    Most of the meteor radioastronomical radars are backscatter radars which cover only a small area of the atmosphere. Therefore a daytime meteor flux models are based on sparse data collected by only a few radar systems. To solve this issue, a radar system with a wide coverage is required. We present a new approach of open-source multi-static radio meteor detection system which could be distributed over a large area. This feature allows us to detect meteor events taking place over a larger area as well and gather more uniform data about meteor flux and possibly about meteor trajectories.

  17. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  18. A cable detection lidar system for helicopters

    Science.gov (United States)

    Grossmann, Benoist; Capbern, Alain; Defour, Martin; Fertala, Remi

    1992-01-01

    Helicopters in low-level flight are endangered by power lines or telephone wires, especially when flying at night and under poor visibility conditions. In order to prevent 'wire strike', Thomson has developed a lidar system consisting of a pulsed diode laser emitting in the near infrared region (lambda = 0.9 microns). The HOWARD (Helicopter Obstacle Warning and Detection) System utilizes a high repetition rate diode laser (PRE = 20 KHz) along with counter-rotating prisms for laser beam deflection with a total field of view of 30 degrees. This system was successfully field tested in 1991. HOWARD can detect one inch wires at ranges up to 200 meters. We are presently in the process of developing a flyable compact lidar system capable of detection ranges in the order of 400 meters.

  19. Intrusion Detection System Using Advanced Honeypots

    CERN Document Server

    Singh, Ram Kumar

    2009-01-01

    The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. In addition to maintaining low latency for the client, filtering unauthorized accesses has become one of the major concerns of a server maintainer. This implementation of an Intrusion Detection System distinguishes between the traffic coming from clients and the traffic originated from the attackers, in an attempt to simultaneously mitigate the problems of both latency and security. We then present the results of a series of stress and scalability tests, and suggest a number of potential uses for such a system. As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Using honeypots provides effective solution to increase the security.

  20. Fault detection and isolation for complex system

    Science.gov (United States)

    Jing, Chan Shi; Bayuaji, Luhur; Samad, R.; Mustafa, M.; Abdullah, N. R. H.; Zain, Z. M.; Pebrianti, Dwi

    2017-07-01

    Fault Detection and Isolation (FDI) is a method to monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. A two wheel robot is used as a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. The proposed method for the fault identification is using hybrid technique that combines Kalman filter and Artificial Neural Network (ANN). The Kalman filter is able to recognize the data from the sensors of the system and indicate the fault of the system in the sensor reading. Error prediction is based on the fault magnitude and the time occurrence of fault. Additionally, Artificial Neural Network (ANN) is another algorithm used to determine the type of fault and isolate the fault in the system.

  1. Signature Based Intrusion Detection System Using SNORT

    Directory of Open Access Journals (Sweden)

    Vinod Kumar

    2012-11-01

    Full Text Available Now a day’s Intrusion Detection systems plays very important role in Network security. As the use of internet is growing rapidly the possibility of attack is also increasing in that ratio. People are using signature based IDS’s. Snort is mostly used signature based IDS because of it is open source software. World widely it is used in intrusion detection and prevention domain. Basic analysis and security engine (BASE is also used to see the alerts generated by Snort. In the paper we have implementation the signature based intrusion detection using Snort. Our work will help to novel user to understand the concept of Snort based IDS.

  2. Maximum Temperature Detection System for Integrated Circuits

    Science.gov (United States)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  3. Damage detection in initially nonlinear systems

    Energy Technology Data Exchange (ETDEWEB)

    Bornn, Luke [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory

    2009-01-01

    The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

  4. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...

  5. System for particle concentration and detection

    Science.gov (United States)

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  6. Materiel requirements for airborne minefield detection system

    Science.gov (United States)

    Bertsche, Karl A.; Huegle, Helmut

    1997-07-01

    Within the concept study, Material Requirements for an airborne minefield detection systems (AMiDS) the following topics were investigated: (i) concept concerning airborne minefield detection technique sand equipment, (ii) verification analysis of the AMiDS requirements using simulation models and (iii) application concept of AMiDS with regard o tactics and military operations. In a first approach the problems concerning unmanned airborne minefield detection techniques within a well-defined area were considered. The complexity of unmanned airborne minefield detection is a result of the following parameters: mine types, mine deployment methods, tactical requirements, topography, weather conditions, and the size of the area to be searched. In order to perform the analysis, a simulation model was developed to analyze the usability of the proposed remote controlled air carriers. The basic flight patterns for the proposed air carriers, as well as the preparation efforts of military operations and benefits of such a system during combat support missions were investigated. The results of the conceptual study showed that a proposed remote controlled helicopter drone could meet the stated German MOD scanning requirements of mine barriers. Fixed wing air carriers were at a definite disadvantage because of their inherently large turning loops. By implementing a mine detection system like AMiDS minefields can be reconnoitered before an attack. It is therefore possible either to plan, how the minefields can be circumvented or where precisely breaching lanes through the mine barriers are to be cleared for the advancing force.

  7. Bioinspired Sensory Systems for Shear Flow Detection

    Science.gov (United States)

    Colvert, Brendan; Chen, Kevin K.; Kanso, Eva

    2017-03-01

    Aquatic organisms such as copepods exhibit remarkable responses to changes in ambient flows, especially shear gradients, when foraging, mating and escaping. To accomplish these tasks, the sensory system of the organism must decode the local sensory measurements to detect the flow properties. Evidence suggests that organisms sense differences in the hydrodynamic signal rather than absolute values of the ambient flow. In this paper, we develop a mathematical framework for shear flow detection using a bioinspired sensory system that measures only differences in velocity. We show that the sensory system is capable of reconstructing the properties of the ambient shear flow under certain conditions on the flow sensors. We discuss these conditions and provide explicit expressions for processing the sensory measurements and extracting the flow properties. These findings suggest that by combining suitable velocity sensors and physics-based methods for decoding sensory measurements, we obtain a powerful approach for understanding and developing underwater sensory systems.

  8. DCE Bio Detection System Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Lind, Michael A.; Batishko, Charles R.; Morgen, Gerald P.; Owsley, Stanley L.; Dunham, Glen C.; Warner, Marvin G.; Willett, Jesse A.

    2007-12-01

    The DCE (DNA Capture Element) Bio-Detection System (Biohound) was conceived, designed, built and tested by PNNL under a MIPR for the US Air Force under the technical direction of Dr. Johnathan Kiel and his team at Brooks City Base in San Antonio Texas. The project was directed toward building a measurement device to take advantage of a unique aptamer based assay developed by the Air Force for detecting biological agents. The assay uses narrow band quantum dots fluorophores, high efficiency fluorescence quenchers, magnetic micro-beads beads and selected aptamers to perform high specificity, high sensitivity detection of targeted biological materials in minutes. This final report summarizes and documents the final configuration of the system delivered to the Air Force in December 2008

  9. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a coaxial direct-detection LIDAR system for measuring velocity, temperature and/or particulate density. The system comprises a laser source for emitting a laser light beam having a lasing center frequency along an emission path. The system further comprises an optical...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....... delivery system arranged in the emission path of the laser source, the optical delivery system being arranged for delivering the laser light beam in a measuring direction, the optical delivery system further being configured for collecting a return signal backscattered along the measuring direction...

  10. Landmine detection by 3D GPR system

    Science.gov (United States)

    Sato, Motoyuki; Yokota, Yuya; Takahashi, Kazunori; Grasmueck, Mark

    2012-06-01

    In order to demonstrate the possibility of Ground Penetrating Radar (GPR) for detection of small buried objects such as landmine and UXO, conducted demonstration tests by using the 3DGPR system, which is a GPR system combined with high accuracy positing system using a commercial laser positioning system (iGPS). iGPS can provide absolute and better than centimetre precise x,y,z coordinates to multiple mine sensors at the same time. The developed " 3DGPR" system is efficient and capable of high-resolution 3D shallow subsurface scanning of larger areas (25 m2 to thousands of square meters) with irregular topography . Field test by using a 500MHz GPR system equipped with 3DGPR system was conducted. PMN-2 and Type-72 mine models have been buried at the depth of 5-20cm in sand. We could demonstrate that the 3DGPR can visualize each of these buried land mines very clearly.

  11. Intrusion Detection System Visualization of Network Alerts

    Science.gov (United States)

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  12. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  13. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  14. Fault Detection and Control of Process Systems

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2007-01-01

    Full Text Available This paper develops a stochastic hybrid model-based control system that can determine online the optimal control actions, detect faults quickly in the control process, and reconfigure the controller accordingly using interacting multiple-model (IMM estimator and generalized predictive control (GPC algorithm. A fault detection and control system consists of two main parts: the first is the fault detector and the second is the controller reconfiguration. This work deals with three main challenging issues: design of fault model set, estimation of stochastic hybrid multiple models, and stochastic model predictive control of hybrid multiple models. For the first issue, we propose a simple scheme for designing faults for discrete and continuous random variables. For the second issue, we consider and select a fast and reliable fault detection system applied to the stochastic hybrid system. Finally, we develop a stochastic GPC algorithm for hybrid multiple-models controller reconfiguration with soft switching signals based on weighted probabilities. Simulations for the proposed system are illustrated and analyzed.

  15. A FRAMEWORK FOR AUTOMATED CHANGE DETECTION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    To enhance the ability of remote sensing system to provide accurate,timely,and c omplete geo_spatial information at regional or global scale,an automated change detection system has been and will continue to be one of the important and chall enging problems in remote sensing.In this paper,the authors propose a framework for auto mated change detection system at landscape level using various geo_spatial data sources including multi_sensor remotely sensed imagery and ancillary data layers .In this framework,database is the central part and some associated techniques a re discussed.These techniques includes five subsystems:automated feature_based i mage registration,automated change finding,automated change feature extraction a nd identification,intelligent change recognition,change accuracy assessment and database updating and visualization.

  16. Chemical detection system and related methods

    Energy Technology Data Exchange (ETDEWEB)

    Caffrey, Augustine J.; Chichester, David L.; Egger, Ann E.; Krebs, Kenneth M.; Seabury, Edward H.; Van Siclen, Clinton D.; Wharton, C. Jayson; Zabriskie, John M.

    2017-06-27

    A chemical detection system includes a frame, an emitter coupled to the frame, and a detector coupled to the frame proximate the emitter. The system also includes a shielding system coupled to the frame and positioned at least partially between the emitter and the detector, wherein the frame positions a sensing surface of the detector in a direction substantially parallel to a plane extending along a front portion of the frame. A method of analyzing composition of a suspect object includes directing neutrons at the object, detecting gamma rays emitted from the object, and communicating spectrometer information regarding the gamma rays. The method also includes presenting a GUI to a user with a dynamic status of an ongoing neutron spectroscopy process. The dynamic status includes a present confidence for a plurality of compounds being present in the suspect object responsive to changes in the spectrometer information during the ongoing process.

  17. APDS: The Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Hindson, B; Makarewicz, A; Setlur, U; Henderer, B; McBride, M; Dzenitis, J

    2004-10-04

    We have developed and tested a fully autonomous pathogen detection system (APDS) capable of continuously monitoring the environment for airborne biological threat agents. The system was developed to provide early warning to civilians in the event of a bioterrorism incident and can be used at high profile events for short-term, intensive monitoring or in major public buildings or transportation nodes for long-term monitoring. The APDS is completely automated, offering continuous aerosol sampling, in-line sample preparation fluidics, multiplexed detection and identification immunoassays, and nucleic-acid based polymerase chain reaction (PCR) amplification and detection. Highly multiplexed antibody-based and duplex nucleic acid-based assays are combined to reduce false positives to a very low level, lower reagent costs, and significantly expand the detection capabilities of this biosensor. This article provides an overview of the current design and operation of the APDS. Certain sub-components of the ADPS are described in detail, including the aerosol collector, the automated sample preparation module that performs multiplexed immunoassays with confirmatory PCR, and the data monitoring and communications system. Data obtained from an APDS that operated continuously for seven days in a major U.S. transportation hub is reported.

  18. The Mount Rainier Lahar Detection System

    Science.gov (United States)

    Lockhart, A. B.; Murray, T. L.

    2003-12-01

    To mitigate the risk of unheralded lahars from Mount Rainier, the U.S. Geological Survey, in cooperation with Pierce County, Washington, installed a lahar-detection system on the Puyallup and Carbon rivers that originate on Mount Rainier's western slopes. The system, installed in 1998, is designed to automatically detect the passage of lahars large enough to potentially affect populated areas downstream (approximate volume threshold 40 million cubic meters), while ignoring small lahars, earthquakes, extreme weather and floods. Along each river valley upstream, arrays of independent lahar-monitoring stations equipped with geophones and short tripwires telemeter data to a pair of redundant computer base stations located in and near Tacoma at existing public safety facilities that are staffed around the clock. Monitored data consist of ground-vibration levels, tripwire status, and transmissions at regular intervals. The base stations automatically evaluate these data to determine if a dangerous lahar is passing through the station array. The detection algorithm requires significant ground vibration to occur at those stations in the array that are above the anticipated level of inundation, while lower level `deadman' stations, inundated by the flow, experience tripwire breakage or are destroyed. Once a base station detects a lahar, it alerts staff who execute a call-down of public-safety officials and schools, initiating evacuation of areas potentially at risk. Because the system's risk-mitigation task imposes high standards of reliability on all components, it has been under test for several years. To date, the system has operated reliably and without false alarms, including during the nearby M6.8 Nisqually Earthquake on February 28, 2001. The system is being turned over to Pierce County, and activated as part of their lahar warning system.

  19. The synchronous active neutron detection assay system

    Energy Technology Data Exchange (ETDEWEB)

    Pickrell, M.M.; Kendall, P.K.

    1994-08-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ``lock-in`` amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design.

  20. Detecting Triple Systems with Gravitational Wave Observations

    Science.gov (United States)

    Meiron, Yohai; Kocsis, Bence; Loeb, Abraham

    2017-01-01

    The Laser Interferometer Gravitational Wave Observatory (LIGO) has recently discovered gravitational waves (GWs) emitted by merging black hole binaries. We examine whether future GW detections may identify triple companions of merging binaries. Such a triple companion causes variations in the GW signal due to: (1) the varying path length along the line of sight during the orbit around the center of mass; (2) relativistic beaming, Doppler, and gravitational redshift; (3) the variation of the “light”-travel time in the gravitational field of the triple companion; and (4) secular variations of the orbital elements. We find that the prospects for detecting a triple companion are the highest for low-mass compact object binaries which spend the longest time in the LIGO frequency band. In particular, for merging neutron star binaries, LIGO may detect a white dwarf or M-dwarf perturber at a signal-to-noise ratio of 8, if it is within 0.4 {R}ȯ distance from the binary and the system is within a distance of 100 Mpc. Stellar mass (supermassive) black hole perturbers may be detected at a factor 5 × (103×) larger separations. Such pertubers in orbit around a merging binary emit GWs at frequencies above 1 mHz detectable by the Laser Interferometer Space Antenna in coincidence.

  1. Fabrication of Microfluidic Fiber Chip Detection System

    Institute of Scientific and Technical Information of China (English)

    Bo Su; Da-fu Cui; Chang-chun Liu; Xing Chen

    2006-01-01

    The diameter of the excitation beam was decreased greatly by integrating the fiber on the microfluidic chip as light propagation medium. The coupling efficiency of the fiber was improved with optical fiber collimation device coupling beam.The chip was placed in the darkroom to avoid the interference of the external light. The cost of the instrument was decreased with a high brightness blue LED as excitation source; the performance of the system was valuated by the determination of FITC fluorescein with a minimum detectable concentration of 2.2×10-8 mol/L, the Signal-to-Noise Ratio (SNR) S/N=5. The correlation coefficient of the detection system within the range of 1.8 × 10-7 mol/L~ 4 × 10-5mol/L was 0.9972.

  2. Data Mining and Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Zibusiso Dewa

    2016-01-01

    Full Text Available The rapid evolution of technology and the increased connectivity among its components, imposes new cyber-security challenges. To tackle this growing trend in computer attacks and respond threats, industry professionals and academics are joining forces in order to build Intrusion Detection Systems (IDS that combine high accuracy with low complexity and time efficiency. The present article gives an overview of existing Intrusion Detection Systems (IDS along with their main principles. Also this article argues whether data mining and its core feature which is knowledge discovery can help in creating Data mining based IDSs that can achieve higher accuracy to novel types of intrusion and demonstrate more robust behaviour compared to traditional IDSs.

  3. A System for Traffic Violation Detection

    Directory of Open Access Journals (Sweden)

    Nourdine Aliane

    2014-11-01

    Full Text Available This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations.

  4. A System for Traffic Violation Detection

    Science.gov (United States)

    Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio

    2014-01-01

    This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations. PMID:25421737

  5. A Bayesian Networks in Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    M. Mehdi

    2007-01-01

    Full Text Available Intrusion detection systems (IDSs have been widely used to overcome security threats in computer networks. Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms caused by incorrect classification of events in current systems. We propose a new approach of an anomaly Intrusion detection system (IDS. It consists of building a reference behaviour model and the use of a Bayesian classification procedure associated to unsupervised learning algorithm to evaluate the deviation between current and reference behaviour. Continuous re-estimation of model parameters allows for real time operation. The use of recursive Log-likelihood and entropy estimation as a measure for monitoring model degradation related with behavior changes and the associated model update show that the accuracy of the event classification process is significantly improved using our proposed approach for reducing the missing-alarm.

  6. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  7. The ITER Radial Neutron Camera Detection System

    Science.gov (United States)

    Marocco, D.; Belli, F.; Bonheure, G.; Esposito, B.; Kaschuck, Y.; Petrizzi, L.; Riva, M.

    2008-03-01

    A multichannel neutron detection system (Radial Neutron Camera, RNC) will be installed on the ITER equatorial port plug 1 for total neutron source strength, neutron emissivity/ion temperature profiles and nt/nd ratio measurements [1]. The system is composed by two fan shaped collimating structures: an ex-vessel structure, looking at the plasma core, containing tree sets of 12 collimators (each set lying on a different toroidal plane), and an in-vessel structure, containing 9 collimators, for plasma edge coverage. The RNC detecting system will work in a harsh environment (neutron fiux up to 108-109 n/cm2 s, magnetic field >0.5 T or in-vessel detectors), should provide both counting and spectrometric information and should be flexible enough to cover the high neutron flux dynamic range expected during the different ITER operation phases. ENEA has been involved in several activities related to RNC design and optimization [2,3]. In the present paper the up-to-date design and the neutron emissivity reconstruction capabilities of the RNC will be described. Different options for detectors suitable for spectrometry and counting (e.g. scintillators and diamonds) focusing on the implications in terms of overall RNC performance will be discussed. The increase of the RNC capabilities offered by the use of new digital data acquisition systems will be also addressed.

  8. Intrusion Detection Systems Based On Packet Sniffing

    Directory of Open Access Journals (Sweden)

    Ushus Maria Joseph

    2013-01-01

    Full Text Available In the present era of networks, security of network systems is becoming increasingly important, as more and more sensitive information is being stored and manipulated online. The paper entitled ’Packet Sniffing’ is a IDS where it monitors packets on the network wire and attempts to the discovery of hacker/cracker who is attempting to break into system. Packet Sniffing also finds the contents and tracks the data packet in the network system. This sniffing is being performed by comparing the captured packet with the intruder details stored in the database .If the packet is found to be an intruder it is then forwarded to the firewall with the respective message for blocking. The Emotional Ants module contains the sender and receiver .The sender will inform all the other Ants running in other machines about the detection of intruder through his pheromone (Messages. The receiver in Ants will listen for the messages from other Ants

  9. Arc burst pattern analysis fault detection system

    Science.gov (United States)

    Russell, B. Don (Inventor); Aucoin, B. Michael (Inventor); Benner, Carl L. (Inventor)

    1997-01-01

    A method and apparatus are provided for detecting an arcing fault on a power line carrying a load current. Parameters indicative of power flow and possible fault events on the line, such as voltage and load current, are monitored and analyzed for an arc burst pattern exhibited by arcing faults in a power system. These arcing faults are detected by identifying bursts of each half-cycle of the fundamental current. Bursts occurring at or near a voltage peak indicate arcing on that phase. Once a faulted phase line is identified, a comparison of the current and voltage reveals whether the fault is located in a downstream direction of power flow toward customers, or upstream toward a generation station. If the fault is located downstream, the line is de-energized, and if located upstream, the line may remain energized to prevent unnecessary power outages.

  10. A Survey on VANET Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2013-04-01

    Full Text Available In recent years, the security issues on Vehicular ad hoc networks (VANETs have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated equipment such as firewalls and authentication servers. Attackcountermeasures such as digital signature and encryption, can be used as the first line of defense for reducing the possibilities of attacks. However, these techniques have limited prevention in general, and they are designed for a set of known attacks. They are unlikely to avoid most recent attacks that are designed to circumvent existing security measures. For this reason, there is a need of second technique to “detect and notify” these newer attacks, i.e. “intrusion detection”. This article aims to present and classifycurrent techniques of Intrusion Detection System (IDS aware VANETs.

  11. Intelligent Flamefinder Detection and Alert System (IFDAS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  12. Development of the environmental neutron detection system

    CERN Document Server

    Kume, K

    2003-01-01

    Environmental neutron detection system is proposed. The main goal of this system was set to detect fast and thermal neutrons with the identical detector setup without degraders. A detector setup for the system with a sup 1 sup 0 B doped liquid scintillator, which had been optimized for thermal neutron counting in last year, was developed first. For optimization of for fast neutron counting, density of sup 1 sup 0 B and the size of the detector were fixed by measurement of fast neutrons, with help of the Monte Carlo calculation. In the meantime, possibility of the use of inorganic scintillators in neutron counting were verified, to solve the problem occurring at the long term use of the organic liquid scintillators. The detectors checked were LSO, BaF sub 2 , BGO and GSO. LSO and BaF sub 2 have much more difficulties in neutron counting such as background counting rates and BGO has some unclear signals at neutron measurements. GSO was shown to be the most probable candidate among them at the measurement of neu...

  13. Method and system for detecting explosives

    Science.gov (United States)

    Reber, Edward L [Idaho Falls, ID; Jewell, James K [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID; Seabury, Edward H [Idaho Falls, ID; Blackwood, Larry G [Idaho Falls, ID; Edwards, Andrew J [Idaho Falls, ID; Derr, Kurt W [Idaho Falls, ID

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  14. A complete low cost radon detection system.

    Science.gov (United States)

    Bayrak, A; Barlas, E; Emirhan, E; Kutlu, Ç; Ozben, C S

    2013-08-01

    Monitoring the (222)Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center.

  15. System for Anomaly and Failure Detection (SAFD) system development

    Science.gov (United States)

    Oreilly, D.

    1992-07-01

    This task specified developing the hardware and software necessary to implement the System for Anomaly and Failure Detection (SAFD) algorithm, developed under Technology Test Bed (TTB) Task 21, on the TTB engine stand. This effort involved building two units; one unit to be installed in the Block II Space Shuttle Main Engine (SSME) Hardware Simulation Lab (HSL) at Marshall Space Flight Center (MSFC), and one unit to be installed at the TTB engine stand. Rocketdyne personnel from the HSL performed the task. The SAFD algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failure as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient condition.

  16. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system...

  17. Characterizing and Improving Distributed Intrusion Detection Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  18. An overview to Software Architecture in Intrusion Detection System

    CERN Document Server

    Bahrami, Mehdi

    2012-01-01

    Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software based network intrusion detection systems have difficulty in handling high speed links. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor acts as a customized load balancing splitter that cooperates with a set of modified content-based network intrusion detection sensors in processing network traffic.

  19. Detective quantum efficiency of the LODOX system

    Science.gov (United States)

    de Villiers, Mattieu; de Jager, Gerhard

    2003-06-01

    The Detective Quantum Efficiency (DQE) of a digital x-ray imaging system describes how much of the signal to noise ratio of the incident radiation is sustained in the resultant digital image. This measure of dose efficiency is suitable for the comparison of detectors produced by different manufacturers. The International Electrotechnical Commission (IEC) stipulates standard methods and conditions for the measurement of the DQE for single exposure imaging systems such as flat panel detectors. This paper shows how the calculation is adapted for DQE measurements of scanning systems. In this paper it is described how to measure the presampled Modulation Transfer Function (MTF) using an edge test method and how to extract the horizontal and vertical components of the Noise Power Spectrum (NPS) in a way that is insensitive to structured noise patterns often found in scanned images. The calculation of the total number of incident photons from the radiation dose measurement is explained and results are provided for the Lodox low dose full body digital x-ray scanning system which is developed in South Africa.

  20. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  1. Autonomous system for pathogen detection and identification

    Energy Technology Data Exchange (ETDEWEB)

    Belgrader, P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Benett, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Bergman, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Langlois, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mariella, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Milanovich, F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Miles, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Venkateswaran, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Long, G. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Nelson, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    1998-09-24

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world' s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify simulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air.

  2. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  3. Liquid chromatography detection unit, system, and method

    Energy Technology Data Exchange (ETDEWEB)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  4. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  5. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  6. Presence detection under optimum fusion in an ultrasonic sensor system.

    Science.gov (United States)

    Srinivasan, Sriram; Pandharipande, Ashish

    2012-04-01

    Reliable presence detection is a requirement in energy-efficient occupancy-adaptive indoor lighting systems. A system of multiple ultrasonic sensors is considered for presence detection, and the performance gain from optimum fusion is studied. Two cases are considered wherein an individual sensor determines presence based on (i) local detection by processing echoes at its receiver, and (ii) the optimum Chair-Varshney fusion rule using multiple sensor detection results. The performance gains of using optimum fusion over local detection are characterized under different sensor system configurations and it is shown that improved detection sensitivity is obtained over a larger detection coverage region.

  7. 46 CFR 76.05-1 - Fire detecting systems.

    Science.gov (United States)

    2010-10-01

    ... fitted with an automatic sprinkling system, except in relatively incombustible spaces. 2 Sprinkler heads... 46 Shipping 3 2010-10-01 2010-10-01 false Fire detecting systems. 76.05-1 Section 76.05-1 Shipping... Fire Detecting and Extinguishing Equipment, Where Required § 76.05-1 Fire detecting systems....

  8. Evaluation of 3M Molecular Detection System and ANSR Pathogen Detection System for rapid detection of Salmonella from egg products.

    Science.gov (United States)

    Hu, L; Ma, L M; Zheng, S; He, X; Wang, H; Brown, E W; Hammack, T S; Zhang, G

    2017-05-01

    Isothermal amplification assay is a novel simple detection technology that amplifies DNA with high speed, efficiency, and specificity under isothermal conditions. The objective of this study was to evaluate the effectiveness of the 3M Molecular Detection System (MDS) and ANSR Pathogen Detection System (PDS) for the detection of Salmonella in egg products as compared to the Food and Drug Administration's Bacteriological Analytical Manual (BAM) culture method and a modified culture method (3M MDS and ANSR PDS preferred method). Two Salmonella ser. Enteritidis (18579, PT4; CDC_2010K_1441, PT8), one Salmonella ser. Heidelberg (607310-1), and one Salmonella ser. Typhimurium (0723) isolates were used in this study. Seven wet egg products and 13 dry egg products were inoculated with these strains individually at 1 to 5 CFU/25 g. One set of test portions was prepared following FDA BAM procedures [with lactose broth (LB) as pre-enrichment broth]. Another set of test portions was prepared using buffered peptone water (BPW) as pre-enrichment broth, as instructed by the 2 detection systems. Results from 3M MDS and ANSR PDS were 100% in agreement with their BPW-based culture method results. When LB was used as pre-enrichment broth, the number of Salmonella positive test portions (80 tested), identified with the BAM, 3M MDS, and ANSR PDS, were 63, 61, and 60, respectively. In conclusion, both 3M MDS and ANSR PDS Salmonella assays were as effective as their BPW based culture methods and were equivalent to the BAM culture method for the detection of Salmonella in egg products. These sensitive isothermal assays can be used as rapid detection tools for Salmonella in egg products provided that BPW is used as pre-enrichment broth. Published by Oxford University Press on behalf of Poultry Science Association 2016. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  9. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  10. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F.

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  11. Salivary biomarkers for detection of systemic diseases.

    Directory of Open Access Journals (Sweden)

    Nilminie Rathnayake

    Full Text Available BACKGROUND AND OBJECTIVE: Analysis of inflammatory biomarkers in saliva could offer an attractive opportunity for the diagnosis of different systemic conditions specifically in epidemiological surveys. The aim of this study was to investigate if certain salivary biomarkers could be used for detection of common systemic diseases. MATERIALS AND METHODS: A randomly selected sample of 1000 adults living in Skåne, a county in the southern part of Sweden, was invited to participate in a clinical study of oral health. 451 individuals were enrolled in this investigation, 51% women. All participants were asked to fill out a questionnaire, history was taken, a clinical examination was made and stimulated saliva samples were collected. Salivary concentrations of IL-1β, -6, -8, TNF-α, lysozyme, MMP-8 and TIMP-1 were determined using ELISA, IFMA or Luminex assays. RESULTS: Salivary IL-8 concentration was found to be twice as high in subjects who had experience of tumour diseases. In addition, IL-8 levels were also elevated in patients with bowel disease. MMP-8 levels were elevated in saliva from patients after cardiac surgery or suffering from diabetes, and muscle and joint diseases. The levels of IL-1β, IL-8 and MMP-8, as well as the MMP-8/TIMP-1 ratio were higher in subjects with muscle and joint diseases. CONCLUSION: Biomarkers in saliva have the potential to be used for screening purposes in epidemiological studies. The relatively unspecific inflammatory markers used in this study can not be used for diagnosis of specific diseases but can be seen as markers for increased systemic inflammation.

  12. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  13. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  14. Analyzing and Detecting Problems in Systems of Systems

    Science.gov (United States)

    Lindvall, Mikael; Ackermann, Christopher; Stratton, William C.; Sibol, Deane E.; Godfrey, Sally

    2008-01-01

    Many software systems are evolving complex system of systems (SoS) for which inter-system communication is mission-critical. Evidence indicates that transmission failures and performance issues are not uncommon occurrences. In a NASA-supported Software Assurance Research Program (SARP) project, we are researching a new approach addressing such problems. In this paper, we are presenting an approach for analyzing inter-system communications with the goal to uncover both transmission errors and performance problems. Our approach consists of a visualization and an evaluation component. While the visualization of the observed communication aims to facilitate understanding, the evaluation component automatically checks the conformance of an observed communication (actual) to a desired one (planned). The actual and the planned are represented as sequence diagrams. The evaluation algorithm checks the conformance of the actual to the planned diagram. We have applied our approach to the communication of aerospace systems and were successful in detecting and resolving even subtle and long existing transmission problems.

  15. The Autonomous Pathogen Detection System (APDS)

    Energy Technology Data Exchange (ETDEWEB)

    Morris, J; Dzenitis, J

    2004-09-22

    Shaped like a mailbox on wheels, it's been called a bioterrorism ''smoke detector.'' It can be found in transportation hubs such as airports and subways, and it may be coming to a location near you. Formally known as the Autonomous Pathogen Detection System, or APDS, this latest tool in the war on bioterrorism was developed at Lawrence Livermore National Laboratory to continuously sniff the air for airborne pathogens and toxins such as anthrax or plague. The APDS is the modern day equivalent of the canaries miners took underground with them to test for deadly carbon dioxide gas. But this canary can test for numerous bacteria, viruses, and toxins simultaneously, report results every hour, and confirm positive samples and guard against false positive results by using two different tests. The fully automated system collects and prepares air samples around the clock, does the analysis, and interprets the results. It requires no servicing or human intervention for an entire week. Unlike its feathered counterpart, when an APDS unit encounters something deadly in the air, that's when it begins singing, quietly. The APDS unit transmits a silent alert and sends detailed data to public health authorities, who can order evacuation and begin treatment of anyone exposed to toxic or biological agents. It is the latest in a series of biodefense detectors developed at DOE/NNSA national laboratories. The manual predecessor to APDS, called BASIS (for Biological Aerosol Sentry and Information System), was developed jointly by Los Alamos and Lawrence Livermore national laboratories. That system was modified to become BioWatch, the Department of Homeland Security's biological urban monitoring program. A related laboratory instrument, the Handheld Advanced Nucleic Acid Analyzer (HANAA), was first tested successfully at LLNL in September 1997. Successful partnering with private industry has been a key factor in the rapid advancement and deployment of

  16. 49 CFR 1544.213 - Use of explosives detection systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a) Use of explosive detection equipment. If TSA so requires by an amendment to an aircraft operator's...

  17. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  18. A Subset Feature Elimination Mechanism for Intrusion Detection System

    OpenAIRE

    Herve Nkiama; Syed Zainudeen Mohd Said; Muhammad Saidu

    2016-01-01

    several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features con...

  19. System and method for detecting cells or components thereof

    Energy Technology Data Exchange (ETDEWEB)

    Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  20. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  1. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108.404 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If...

  2. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Yuichi Satsumi

    2008-11-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  3. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  4. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Hajime Aoyama

    2007-06-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  5. Advanced Ground Systems Maintenance Anomaly Detection Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This project will develop the capability to identify anomalous conditions (indications to potential impending system failure) in ground system operations before such...

  6. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  7. Model Based Aircraft Upset Detection and Recovery System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes a system for detecting upset conditions and providing the corresponding control recovery actions to maintain flight integrity for general...

  8. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  9. Intelligent Signal Processing for Detection System Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Fu, C Y; Petrich, L I; Daley, P F; Burnham, A K

    2004-12-05

    A wavelet-neural network signal processing method has demonstrated approximately tenfold improvement over traditional signal-processing methods for the detection limit of various nitrogen and phosphorus compounds from the output of a thermionic detector attached to a gas chromatograph. A blind test was conducted to validate the lower detection limit. All fourteen of the compound spikes were detected when above the estimated threshold, including all three within a factor of two above the threshold. In addition, two of six spikes were detected at levels of 1/2 the concentration of the nominal threshold. Another two of the six would have been detected correctly if we had allowed human intervention to examine the processed data. One apparent false positive in five nulls was traced to a solvent impurity, whose presence was subsequently identified by analyzing a solvent aliquot evaporated to 1% residual volume, while the other four nulls were properly classified. We view this signal processing method as broadly applicable in analytical chemistry, and we advocate that advanced signal processing methods should be applied as directly as possible to the raw detector output so that less discriminating preprocessing and post-processing does not throw away valuable signal.

  10. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  11. Towards aerial natural gas leak detection system based on TDLAS

    Science.gov (United States)

    Liu, Shuyang; Zhou, Tao; Jia, Xiaodong

    2014-11-01

    Pipeline leakage is a complex scenario for sensing system due to the traditional high cost, low efficient and labor intensive detection scheme. TDLAS has been widely accepted as industrial trace gas detection method and, thanks to its high accuracy and reasonable size, it has the potential to meet pipeline gas leakage detection requirements if it combines with the aerial platform. Based on literature study, this paper discussed the possibility of applying aerial TDLAS principle in pipeline gas leak detection and the key technical foundation of implementing it. Such system is able to result in a high efficiency and accuracy measurement which will provide sufficient data in time for the pipeline leakage detection.

  12. PERIODIC SIGNAL DETECTION WITH USING DUFFING SYSTEM POINCARE MAP ANALYSIS

    Directory of Open Access Journals (Sweden)

    Valeriy Martynyuk

    2014-06-01

    Full Text Available In this article the periodic signal detection method on the base of Duffing system chaotic oscillations analysis is presented. This work is a development of the chaos-based signal detection technique. Generally, chaos-based signal detection is the detection of chaotic-to-periodic state transition under input periodic component influence. If the input periodic component reaches certain threshold value, the system transforms from chaotic state to periodic state. The Duffing-type chaotic systems are often used for such a signal detection purpose because of their ability to work in chaotic state for a long time and relatively simple realization. The main advantage of chaos-based signal detection methods is the utilization of chaotic system sensitivity to weak signals. But such methods are not used in practice because of the chaotic system state control problems. The method presented does not require an exact system state control. The Duffing system works continuously in chaotic state and the periodic signal detection process is based on the analysis of Duffing system Poincare map fractal structure. This structure does not depend on noise, and therefore the minimum input signal-to-noise ratio required for periodic signal detection is not limited by chaotic system state control tolerance.

  13. Effective analysis of cloud based intrusion detection system

    Directory of Open Access Journals (Sweden)

    Sanjay Ram

    2012-08-01

    Full Text Available The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS. People are paid more attention on intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, detecting all kinds of intrusions effectively requires a global view of the monitored network, Here, discuss about new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional intrusion detection, and proved to be great scalable.

  14. Online Real-Time Tribology Failure Detection System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Under NASA Phase I funding, we have developed a system for the ball bearing fault detection and identification. Our system can effectively identify multiple fault...

  15. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  16. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben;

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...

  17. Environmentally Adaptive UXO Detection and Classification Systems

    Science.gov (United States)

    2016-04-01

    Statistical Signal Processing, Vol. II: Detection Theory. Prentice Hall , 1998. [12] M. A. Carreira-Perpinan, Continous Latent Variable Models for...16] R. Butler, Saddlepoint Approximations with Applications. Cambridge University Press, New York, 2007. [17] M. G. Kendall and A. Stuart , The

  18. Intelligent Signal Processing for Detection System Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Fu, C Y; Petrich, L I; Daley, P F; Burnham, A K

    2004-06-18

    A wavelet-neural network signal processing method has demonstrated approximately tenfold improvement in the detection limit of various nitrogen and phosphorus compounds over traditional signal-processing methods in analyzing the output of a thermionic detector attached to the output of a gas chromatograph. A blind test was conducted to validate the lower detection limit. All fourteen of the compound spikes were detected when above the estimated threshold, including all three within a factor of two above. In addition, two of six were detected at levels 1/2 the concentration of the nominal threshold. We would have had another two correct hits if we had allowed human intervention to examine the processed data. One apparent false positive in five nulls was traced to a solvent impurity, whose presence was identified by running a solvent aliquot evaporated to 1% residual volume, while the other four nulls were properly classified. We view this signal processing method as broadly applicable in analytical chemistry, and we advocate that advanced signal processing methods be applied as directly as possible to the raw detector output so that less discriminating preprocessing and post-processing does not throw away valuable signal.

  19. Damage Detection Sensor System for Aerospace and Multiple Applications

    Science.gov (United States)

    Williams, M.; Lewis, M.; Gibson, T.; Medelius, P.; Lane, J.

    2017-01-01

    The damage detection sensory system is an intelligent damage detection ‘skin’ that can be embedded into rigid or flexible structures, providing a lightweight capability for in-situ health monitoring for applications such as spacecraft, expandable or inflatable structures, extravehicular activities (EVA) suits, smart wearables, and other applications where diagnostic impact damage monitoring might be critical. The sensor systems can be customized for detecting location, damage size, and depth, with velocity options and can be designed for particular environments for monitoring of impact or physical damage to a structure. The operation of the sensor detection system is currently based on the use of parallel conductive traces placed on a firm or flexible surface. Several detection layers can be implemented, where alternate layers are arranged in orthogonal direction with respect to the adjacent layers allowing for location and depth calculations. Increased flexibility of the damage detection sensor system designs will also be introduced.

  20. Development of an assisting detection system for early infarct diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Sim, K. S.; Nia, M. E.; Ee, C. S. [Faculty of Engineering and Technology, Multimedia University, Melaka (Malaysia)

    2015-04-24

    In this paper, a detection assisting system for early infarct detection is developed. This new developed method is used to assist the medical practitioners to diagnose infarct from computed tomography images of brain. Using this assisting system, the infarct could be diagnosed at earlier stages. The non-contrast computed tomography (NCCT) brain images are the data set used for this system. Detection module extracts the pixel data from NCCT brain images, and produces the colourized version of images. The proposed method showed great potential in detecting infarct, and helps medical practitioners to make earlier and better diagnoses.

  1. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  2. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  3. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  4. Poseidon: a 2-tier anomaly-based intrusion detection system

    NARCIS (Netherlands)

    Bolzoni, Damiano; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection r

  5. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection will be p...

  6. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section 108.413 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection...

  7. Automatic hearing loss detection system based on auditory brainstem response

    Energy Technology Data Exchange (ETDEWEB)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R [Laboratorio de Ingenieria en Rehabilitacion e Investigaciones Neuromusculares y Sensoriales (Argentina); Facultad de Ingenieria, Universidad Nacional de Entre Rios, Ruta 11 - Km 10, Oro Verde, Entre Rios (Argentina)

    2007-11-15

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  8. Localized surface plasmon resonance mercury detection system and methods

    Energy Technology Data Exchange (ETDEWEB)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  9. Automatic hearing loss detection system based on auditory brainstem response

    Science.gov (United States)

    Aldonate, J.; Mercuri, C.; Reta, J.; Biurrun, J.; Bonell, C.; Gentiletti, G.; Escobar, S.; Acevedo, R.

    2007-11-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory.

  10. Efficiency of Svm and Pca to Enhance Intrusion Detection System

    OpenAIRE

    Soukaena Hassan Hashem

    2013-01-01

    Intrusion detection system (IDS) is a system that gathers and analyzes information from various areas within a computer or a network to identify attacks made against these components. This research proposed an Intrusion Detection Model (IDM) for detection intrusion attempts, the proposal is a hybrid IDM because it considers both features of network packets and host features that are sensitive to most intrusions. The dataset used to build the hybrid IDM is the proposed HybD (Hybrid Dataset) da...

  11. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  12. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  13. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  14. Development of Abnormality Detection System for Bathers using Ultrasonic Sensors

    Science.gov (United States)

    Ohnishi, Yosuke; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko; Ogoshi, Yasuhiro

    This paper proposes an abnormality detection system for bather sitting in bathtub. Increasing number of in-bathtub drowning accidents in Japan draws attention. Behind this large number of bathing accidents, Japan's unique social and cultural background come surface. For majority of people in Japan, bathing serves purpose in deep warming up of body, relax and enjoyable time. Therefore it is the custom for the Japanese to soak in bathtub. However overexposure to hot water may cause dizziness or fainting, which is possible to cause in-bathtub drowning. For drowning prevention, the system detects bather's abnormal state using an ultrasonic sensor array. The array, which has many ultrasonic sensors, is installed on the ceiling of bathroom above bathtub. The abnormality detection system uses the following two methods: posture detection and behavior detection. The function of posture detection is to estimate the risk of drowning by monitoring bather's posture. Meanwhile, the function of behavior detection is to estimate the risk of drowning by monitoring bather's behavior. By using these methods, the system detects bathers' different state from normal. As a result of experiment with a subject in the bathtub, the system was possible to detect abnormal state using subject's posture and behavior. Therefore the system is useful for monitoring bather to prevent drowning in bathtub.

  15. Detecting triple systems with gravitational wave observations

    CERN Document Server

    Meiron, Yohai; Loeb, Abraham

    2016-01-01

    The Laser Interferometer Gravitational Wave Observatory (LIGO) has recently discovered gravitational waves (GWs) emitted by merging black hole binaries. We examine whether future GW detections may identify triple companions of merging binaries. Such a triple companion causes variations in the GW signal due to (1) the varying path length along the line of sight during the orbit around the center of mass, (2) relativistic beaming, Doppler, and gravitational redshift, and (3) the variation of the "light"-travel time in the gravitational field of the triple companion, known respectively as Roemer-, Einstein-, and Shapiro-delays in pulsar binaries. We find that the prospects for detecting the triple companion are the highest for low-mass compact object binaries which spend the longest time in the LIGO frequency band with circular orbits. In particular, for merging neutron star binaries, LIGO may detect a white dwarf or M-dwarf perturber at signal to noise ratio of 8, if it is within 0.4 solar radius distance from ...

  16. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  17. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  18. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  19. A Sensor System for Detection of Hull Surface Defects

    Directory of Open Access Journals (Sweden)

    Juan Suardíaz

    2010-07-01

    Full Text Available This paper presents a sensor system for detecting defects in ship hull surfaces. The sensor was developed to enable a robotic system to perform grit blasting operations on ship hulls. To achieve this, the proposed sensor system captures images with the help of a camera and processes them in real time using a new defect detection method based on thresholding techniques. What makes this method different is its efficiency in the automatic detection of defects from images recorded in variable lighting conditions. The sensor system was tested under real conditions at a Spanish shipyard, with excellent results.

  20. THE PARALLEL CONFOCAL DETECTING SYSTEM USING OPTICAL FIBER PLATE

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Objective Focusing on the problem such as slow scanning speed, complex system design and low light efficiency, a new parallel confocal 3D profile detecting method based on optical fiber technology, which realizes whole-field confocal detecting, is proposed. Methods The optical fiber plate generates an 2D point light source array, which splits one light beam into N2 subbeams and act the role of pinholes as point source and point detecting to filter the stray light and reflect light. By introducing the construction and working principle of the multi-beam 3D detecting system, the feasibility is investigated. Results Experiment result indicates that the optical fiber technology is applicable in rotation. The measuring parameters that influence the detecting can easily be adapted to satisfy different requirments of measurement. Compared with the conventional confocal method, the parallel confocal detecting system using optical fiber plate is simple in the mechanism, the measuring field is larger and the speed is faster.

  1. System and Method for Multi-Wavelength Optical Signal Detection

    Science.gov (United States)

    McGlone, Thomas D. (Inventor)

    2017-01-01

    The system and method for multi-wavelength optical signal detection enables the detection of optical signal levels significantly below those processed at the discrete circuit level by the use of mixed-signal processing methods implemented with integrated circuit technologies. The present invention is configured to detect and process small signals, which enables the reduction of the optical power required to stimulate detection networks, and lowers the required laser power to make specific measurements. The present invention provides an adaptation of active pixel networks combined with mixed-signal processing methods to provide an integer representation of the received signal as an output. The present invention also provides multi-wavelength laser detection circuits for use in various systems, such as a differential absorption light detection and ranging system.

  2. Chaotic oscillator detection system about weak signals in spot welding

    Institute of Scientific and Technical Information of China (English)

    Kai-lei SONG; Zhen LUO; Feng YE; Xin-xin TANG; Shu-xian YUAN

    2009-01-01

    Spot welding is an efficient and shortcut processing method used in plate, and its quality detection is very important. However, there are many factors affecting the spot welding quality. Because of the low precision of traditional detection methods, spot welding has seldom been used in the aerospace industry which requires high welding quality. In this article, we give a new weak signal detection model based on chaotic oscillators. Using Melnikov methods and Lyapunov exponent, we can determine the critical values when the system enters in and out of chaos. Through lots of numerical simulations, it can be found that the lowest value of the weak sinusoidal signal the system can detect reach 10-11, and its signal-to-noise ratio (SNR) is = 126 dB. Compared with other detection methods, chaos oscillator detection system not only has a lower threshold value, but also is easy to implement in practice. This model thus has good application prospects.

  3. Detection and Protection Against Intrusions on Smart Grid Systems

    Directory of Open Access Journals (Sweden)

    Ata Arvani

    2015-05-01

    Full Text Available The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs are used for the collection of data in real time for the smart grid energy systems. Intrusion detection and cyber security of network are important requirements for maintaining the integrity of wide area monitoring systems. The intrusion detection methods analyze the measurement data to detect any possible cyber attacks on the operation of smart grid systems. In this paper, the model-based and signal-based intrusion detection methods are investigated to detect the presence of malicious data. The chi-square test and discrete wavelet transform (DWT have been used for anomaly-based detection. The false data injection attack (FDIA can be detected using measurement residual. If the measurement residual is larger than expected detection threshold, then an alarm is triggered and bad data can be identified. Avoiding such alarms in the residual test is referred to as stealth attack. There are two protection strategies for stealth attack: (1 Select a subset of meters to be protected from the attacker (2 Place secure phasor measurement units in the power grid. An IEEE 14-bus system is simulated using real time digital simulator (RTDS hardware platform for implementing attack and detection schemes.

  4. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  5. An FPGA-based rapid wheezing detection system.

    Science.gov (United States)

    Lin, Bor-Shing; Yen, Tian-Shiue

    2014-01-29

    Wheezing is often treated as a crucial indicator in the diagnosis of obstructive pulmonary diseases. A rapid wheezing detection system may help physicians to monitor patients over the long-term. In this study, a portable wheezing detection system based on a field-programmable gate array (FPGA) is proposed. This system accelerates wheezing detection, and can be used as either a single-process system, or as an integrated part of another biomedical signal detection system. The system segments sound signals into 2-second units. A short-time Fourier transform was used to determine the relationship between the time and frequency components of wheezing sound data. A spectrogram was processed using 2D bilateral filtering, edge detection, multithreshold image segmentation, morphological image processing, and image labeling, to extract wheezing features according to computerized respiratory sound analysis (CORSA) standards. These features were then used to train the support vector machine (SVM) and build the classification models. The trained model was used to analyze sound data to detect wheezing. The system runs on a Xilinx Virtex-6 FPGA ML605 platform. The experimental results revealed that the system offered excellent wheezing recognition performance (0.912). The detection process can be used with a clock frequency of 51.97 MHz, and is able to perform rapid wheezing classification.

  6. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  7. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  8. Detection and Prognostics on Low Dimensional Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper describes the application of known and novel prognostic algorithms on systems that can be described by low dimensional, potentially nonlinear dynamics....

  9. Road icing forecasting and detecting system

    Science.gov (United States)

    Xu, Hongke; Zheng, Jinnan; Li, Peiqi; Wang, Qiucai

    2017-05-01

    Regard for the facts that the low accuracy and low real-time of the artificial observation to determine the road icing condition, and it is difficult to forecast icing situation, according to the main factors influencing the road-icing, and the electrical characteristics reflected by the pavement ice layer, this paper presents an innovative system, that is, ice-forecasting of the highway's dangerous section. The system bases on road surface water salinity measurements and pavement temperature measurement to calculate the freezing point of water and temperature change trend, and then predicts the occurrence time of road icing; using capacitance measurements to verdict the road surface is frozen or not; This paper expounds the method of using single chip microcomputer as the core of the control system and described the business process of the system.

  10. A Novel Vision Sensing System for Tomato Quality Detection

    Directory of Open Access Journals (Sweden)

    Satyam Srivastava

    2014-01-01

    Full Text Available Producing tomato is a daunting task as the crop of tomato is exposed to attacks from various microorganisms. The symptoms of the attacks are usually changed in color, bacterial spots, special kind of specks, and sunken areas with concentric rings having different colors on the tomato outer surface. This paper addresses a vision sensing based system for tomato quality inspection. A novel approach has been developed for tomato fruit detection and disease detection. Developed system consists of USB based camera module having 12.0 megapixel interfaced with ARM-9 processor. Zigbee module has been interfaced with developed system for wireless transmission from host system to PC based server for further processing. Algorithm development consists of three major steps, preprocessing steps like noise rejection, segmentation and scaling, classification and recognition, and automatic disease detection and classification. Tomato samples have been collected from local market and data acquisition has been performed for data base preparation and various processing steps. Developed system can detect as well as classify the various diseases in tomato samples. Various pattern recognition and soft computing techniques have been implemented for data analysis as well as different parameters prediction like shelf life of the tomato, quality index based on disease detection and classification, freshness detection, maturity index detection, and different suggestions for detected diseases. Results are validated with aroma sensing technique using commercial Alpha Mos 3000 system. Accuracy has been calculated from extracted results, which is around 92%.

  11. A Novel Vision Sensing System for Tomato Quality Detection.

    Science.gov (United States)

    Srivastava, Satyam; Boyat, Sachin; Sadistap, Shashikant

    2014-01-01

    Producing tomato is a daunting task as the crop of tomato is exposed to attacks from various microorganisms. The symptoms of the attacks are usually changed in color, bacterial spots, special kind of specks, and sunken areas with concentric rings having different colors on the tomato outer surface. This paper addresses a vision sensing based system for tomato quality inspection. A novel approach has been developed for tomato fruit detection and disease detection. Developed system consists of USB based camera module having 12.0 megapixel interfaced with ARM-9 processor. Zigbee module has been interfaced with developed system for wireless transmission from host system to PC based server for further processing. Algorithm development consists of three major steps, preprocessing steps like noise rejection, segmentation and scaling, classification and recognition, and automatic disease detection and classification. Tomato samples have been collected from local market and data acquisition has been performed for data base preparation and various processing steps. Developed system can detect as well as classify the various diseases in tomato samples. Various pattern recognition and soft computing techniques have been implemented for data analysis as well as different parameters prediction like shelf life of the tomato, quality index based on disease detection and classification, freshness detection, maturity index detection, and different suggestions for detected diseases. Results are validated with aroma sensing technique using commercial Alpha Mos 3000 system. Accuracy has been calculated from extracted results, which is around 92%.

  12. Performance Analysis of Distributed Neyman-Pearson Detection Systems

    Institute of Scientific and Technical Information of China (English)

    ZHAO Juan; TAO Ran; WANG Yue; ZHOU Si-yong

    2007-01-01

    The performance of a distributed Neyman-Pearson detection system is considered with the decision rules of the sensors given and the decisions from different sensors being mutually independent conditioned on both hypothese. To achieve the better performance at the fusion center for a general detection system of n>3 sensor configuration, the necessary and sufficient conditions are derived by comparing the probability of detection at the fusion center with that of each of the sensors, with the constraint that the probability of false alarm at the fusion center is equal to that of the sensor. The conditions are related with the performances of the sensors and using the results we can predict the performance at the fusion center of a distributed detection system and can choose appropriate sensors to construct efficient distributed detection systems.

  13. An expert system application for network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  14. An Immunology-inspired Fault Detection and Identification System

    Directory of Open Access Journals (Sweden)

    Liguo Weng

    2012-09-01

    Full Text Available This paper presents a fault detection and identification (FDI approach inspired by the immune system. The salient features of the immune system, such as adaptability, robustness, flexibility, archival memory and distributed cognition abilities, have been the valuable source of inspiration for fundamentally new methods for fault detection and identification. This research makes use of immunological concepts to develop a robust fault detection and identification mechanism, capable of detecting and classifying diverse system faults dynamically. Such an FDI mechanism also has the ability to learn and classify overlapping faults using distributed sensing. Moreover, its detection accuracy can be continuously improved during system operation. As tested by numerical simulations in which faults are represented by overlapping banana functions, the proposed algorithms are adaptive to new types of faults and overlapping faults.

  15. Robust Fault Detection and Isolation for Stochastic Systems

    Science.gov (United States)

    George, Jemin; Gregory, Irene M.

    2010-01-01

    This paper outlines the formulation of a robust fault detection and isolation scheme that can precisely detect and isolate simultaneous actuator and sensor faults for uncertain linear stochastic systems. The given robust fault detection scheme based on the discontinuous robust observer approach would be able to distinguish between model uncertainties and actuator failures and therefore eliminate the problem of false alarms. Since the proposed approach involves precise reconstruction of sensor faults, it can also be used for sensor fault identification and the reconstruction of true outputs from faulty sensor outputs. Simulation results presented here validate the effectiveness of the robust fault detection and isolation system.

  16. Optimal Robust Fault Detection for Linear Discrete Time Systems

    Directory of Open Access Journals (Sweden)

    Nike Liu

    2008-01-01

    Full Text Available This paper considers robust fault-detection problems for linear discrete time systems. It is shown that the optimal robust detection filters for several well-recognized robust fault-detection problems, such as ℋ−/ℋ∞, ℋ2/ℋ∞, and ℋ∞/ℋ∞ problems, are the same and can be obtained by solving a standard algebraic Riccati equation. Optimal filters are also derived for many other optimization criteria and it is shown that some well-studied and seeming-sensible optimization criteria for fault-detection filter design could lead to (optimal but useless fault-detection filters.

  17. Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hichem Sedjelmaci

    2011-08-01

    Full Text Available Wireless sensor network (WSN is regularly deployed in unattended and hostile environments. The WSN isvulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the mostefficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low falsealarm.

  18. Research on Portable Fatigue Signal Detection System

    Directory of Open Access Journals (Sweden)

    Bowen Li

    2013-07-01

    Full Text Available According to the characteristics of human pulse wave signals, the acquisition system acquisition system with excellent performance is designed, 16 bit MCU MSP430 with ultralow power is used to record, process and transmit the collected pulse wave signals. In order to make the hardware part satisfy acquisition requirements of pulse wave, the paper focuses on discussing composition, operating principle, analysis method and performance parameter of analog circuit. The software part makes use of the design tools of Matlab graphical user interface (GUI for designing pulse wave signal measurement system. The trial on intelligent fatigue test signal adopts relatively unique methods no matter in hardware circuit design or software algorithm process, which provides important and meaningful reference for objective and quantitative research on fatigue signal.

  19. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  20. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems

    CERN Document Server

    Greensmith, Julie; Twycross, Jamie

    2010-01-01

    In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, anti-virus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological parad...

  1. Fast full resolution saliency detection based on incoherent imaging system

    Science.gov (United States)

    Lin, Guang; Zhao, Jufeng; Feng, Huajun; Xu, Zhihai; Li, Qi; Chen, Yueting

    2016-08-01

    Image saliency detection is widely applied in many tasks in the field of the computer vision. In this paper, we combine the saliency detection with the Fourier optics to achieve acceleration of saliency detection algorithm. An actual optical saliency detection system is constructed within the framework of incoherent imaging system. Additionally, the application of our system to implement the bottom-up rapid pre-saliency process of primate visual saliency is discussed with dual-resolution camera. A set of experiments over our system are conducted and discussed. We also demonstrate the comparisons between our method and pure computer methods. The results show our system can produce full resolution saliency maps faster and more effective.

  2. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  3. Intrusion Detection System with Hierarchical Different Parallel Classification

    Directory of Open Access Journals (Sweden)

    Behrouz Safaiezadeh

    2015-12-01

    Full Text Available Todays, lives integrated to networks and internet. The needed information is transmitted through networks. So, someone may attempt to abuse the information and attack and make changes by weakness of networks. Intrusion Detection System is a system capable to detect some attacks. The system detects attacks through classifier construction and considering IP in network. The recent researches showed that a fundamental classification cannot be effective lonely and due to its errors, but mixing some classifications provide better efficiency. So, the current study attempt to design three classes of support vector machine, the neural network of multilayer perceptron and parallel fuzzy system in which there are trained dataset and capability to detect two classes. Finally, decisions made by an intermediate network due to type of attack. In the present research, suggested system tested through dataset of KDD99 and results indicated appropriate efficiency 99.71% in average.

  4. Design of vehicle overload detection system based on geophone

    Science.gov (United States)

    Hu, Siquan; Kong, Min; She, Chundong

    2017-08-01

    A vehicle overload detection system is proposed based on geophone. Under normal circumstances, when overloaded vehicles and ordinary vehicles pass through the road, the amplitude of the ground vibration will be different, and the geophone sensor can detect tiny vibrations of the ground. The system includes information acquisition module, signal conditioning module and wireless transmission module. The collected vibration data is transmitted through the wireless transmission module to the background, and the SVM algorithm is used to classify the information and determine whether the vehicle is overloaded. Experiments show that the system can detect overload accurately.

  5. [Tunable diode laser absorption spectroscopy system for trace ethylene detection].

    Science.gov (United States)

    Pan, Wei-Dong; Zhang, Jia-Wei; Dai, Jing-Min; Song, Kai

    2012-10-01

    Tunable diode laser absorption spectroscopy (TDLAS) was characterized by ultra-narrow line width laser and wavelength modulation, which makes it possible to scan a single absorption line. TDLAS has an advantage in trace gas analysis for its high resolution, high sensitivity and quick response. The 1 626.8 nm absorption line of ethylene was selected for detecting by analyzing its absorption line characteristic. The TDLAS system was developed with a white type multi-pass cell, combined with wavelength modulation and harmonic detection. Ethylene concentration ranges from 20 to 1 200 ppmv were tested using this system. The estimated detection limit of the system is 10 ppmv.

  6. DETECT: Towards a system for detecting social polarization trends and estimating associated chances of violence

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Karampelas, Panagiotis; Qureshi, Pir Abdul Rasool;

    2011-01-01

    The paper proposes a novel system that can be used to detect social polarization and estimate the chances of violent radicalization associated with it. The paper indicates the required processes for such a system and analyzes how existing technologies can be integrated into the proposed system to...

  7. DETECT: Towards a system for detecting social polarization trends and estimating associated chances of violence

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Karampelas, Panagiotis; Qureshi, Pir Abdul Rasool

    2011-01-01

    The paper proposes a novel system that can be used to detect social polarization and estimate the chances of violent radicalization associated with it. The paper indicates the required processes for such a system and analyzes how existing technologies can be integrated into the proposed system...

  8. Evidence-based detection of pulmonary arterial hypertension in systemic sclerosis: the DETECT study

    NARCIS (Netherlands)

    Coghlan, J.G.; Denton, C.P.; Grunig, E.; Bonderman, D.; Distler, O.; Khanna, D.; Muller-Ladner, U.; Pope, J.E.; Vonk, M.C.; Doelberg, M.; Chadha-Boreham, H.; Heinzl, H.; Rosenberg, D.M.; McLaughlin, V.V.; Seibold, J.R.

    2014-01-01

    OBJECTIVE: Earlier detection of pulmonary arterial hypertension (PAH), a leading cause of death in systemic sclerosis (SSc), facilitates earlier treatment. The objective of this study was to develop the first evidence-based detection algorithm for PAH in SSc. METHODS: In this cross-sectional, intern

  9. Evidence-based detection of pulmonary arterial hypertension in systemic sclerosis: the DETECT study

    NARCIS (Netherlands)

    Coghlan, J.G.; Denton, C.P.; Grunig, E.; Bonderman, D.; Distler, O.; Khanna, D.; Muller-Ladner, U.; Pope, J.E.; Vonk, M.C.; Doelberg, M.; Chadha-Boreham, H.; Heinzl, H.; Rosenberg, D.M.; McLaughlin, V.V.; Seibold, J.R.

    2014-01-01

    OBJECTIVE: Earlier detection of pulmonary arterial hypertension (PAH), a leading cause of death in systemic sclerosis (SSc), facilitates earlier treatment. The objective of this study was to develop the first evidence-based detection algorithm for PAH in SSc. METHODS: In this cross-sectional,

  10. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  11. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  12. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  13. Modular Detection System for Special Nuclear Material (MODES_SNM)

    Science.gov (United States)

    Christodoulou, Georgios

    2014-02-01

    The MODES_SNM project, funded by the European Community within the scope of the FP7 security theme, explores new techniques for the design and demonstration of novel technologies for the detection of dangerous radioactive materials. Noble gas pressurized detectors are developed and optimized to build a human portable modular detector system to detect and identify illicit SNM. Since masked or shielded SNM is hard to detect, the MODES_SNM detector system will be sensitive to both fast and thermal neutrons and to photons emitted by the SNM. Thus, the project aims to increase the detection sensitivity of shielded SNM, to reduce the false alarm rate and to provide a mobile system to be used by both experts and non-experts in the field of radiation detection. The project now enters into its final phase towards the construction and characterization of a working prototype to be tested under laboratory conditions and in a real world environment.

  14. A Scalable Intrusion Detection System for IPv6

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; LI Zhanchun

    2006-01-01

    The next generation protocol IPv6 brings the new challenges to the information security. This paper presents the design and implementation of a network-based intrusion detection system that support both IPv6 protocol and IPv4 protocol. This system's architecture is focused on performance, simplicity, and scalability. There are four primary subsystems that make it up: the packet capture, the packet decoder, the detection engine, and the logging and alerting subsystem. This paper further describes a new approach to packet capture whose goal is to improve the performance of the capture process at high speeds. The evaluation shows that the system has a good performance to detect IPv6 attacks and IPv4 attacks, and achieves 61% correct detection rate with 20% false detection rate at the speed of 100 Mb·s-1.

  15. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  16. Occupancy change detection system and method

    Science.gov (United States)

    Bruemmer, David J [Idaho Falls, ID; Few, Douglas A [Idaho Falls, ID

    2009-09-01

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

  17. Low Power Detection Architecture for MIMO Systems

    Directory of Open Access Journals (Sweden)

    Shirly Edward.A

    2013-06-01

    Full Text Available This paper presents an architecture for K-best List Sphere Decoder (LSD algorithm for Multiple Input Multiple Output (MIMO Systems using Xilinx System Generator. We made use of an efficient bit-serial architecture, Distributed Arithmetic(DA to reduce the computational complexity involved in the algorithm. The real-valued expanded channel matrix and received vectors are analyzed, designed and implemented using Xilinx Spartan-6 FPGA running at 100MHz. We compare the resource utilization of the conventional implementation of the algorithm with the proposed architecture for different number of layers. The conversion of multipliers into shift and adder units leads to area optimization and reduced power consumption. The total estimated power for our design is found to be 187mW.

  18. Special nuclear material detection studies with the SMANDRA mobile system

    OpenAIRE

    Cester, D.; Nebbia, G.; Stevanato, L.; G. Viesti; Neri, F; Petrucci, S; S. Selmi; Tintori, C.; PEERANI, P; Tomanin, Alice

    2012-01-01

    The detection of special nuclear material has been studied with the SMANDRA mobile inspection system used both as a high sensitivity passive neutron/gamma spectroscopic tool and as an active inspection device using tagged neutrons. The detection of plutonium samples is possible with passive interrogation, the passive detection of uranium being much more difficult because of the low neutron yield and of the easiness of shielding the gamma rays. However, we show that active interrogation with t...

  19. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.

  20. Systems biology of cancer biomarker detection.

    Science.gov (United States)

    Mitra, Sanga; Das, Smarajit; Chakrabarti, Jayprokas

    2013-01-01

    Cancer systems-biology is an ever-growing area of research due to explosion of data; how to mine these data and extract useful information is the problem. To have an insight on carcinogenesis one need to systematically mine several resources, such as databases, microarray and next-generation sequences. This review encompasses management and analysis of cancer data, databases construction and data deposition, whole transcriptome and genome comparison, analysing results from high throughput experiments to uncover cellular pathways and molecular interactions, and the design of effective algorithms to identify potential biomarkers. Recent technical advances such as ChIP-on-chip, ChIP-seq and RNA-seq can be applied to get epigenetic information transformed into a high-throughput endeavour to which systems biology and bioinformatics are making significant inroads. The data from ENCODE and GENCODE projects available through UCSC genome browser can be considered as benchmark for comparison and meta-analysis. A pipeline for integrating next generation sequencing data, microarray data, and putting them together with the existing database is discussed. The understanding of cancer genomics is changing the way we approach cancer diagnosis and treatment. To give a better understanding of utilizing available resources' we have chosen oral cancer to show how and what kind of analysis can be done. This review is a computational genomic primer that provides a bird's eye view of computational and bioinformatics' tools currently available to perform integrated genomic and system biology analyses of several carcinoma.

  1. Detecting Motifs in System Call Sequences

    CERN Document Server

    Wilson, William O; Aickelin, Uwe

    2010-01-01

    The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which repeat within time series data. The power of the algorithm is derived from its use of a small number of parameters with minimal assumptions. The algorithm searches from a completely neutral perspective that is independent of the data being analysed, and the underlying motifs. In this paper the motif tracking algorithm is applied to the search for patterns within sequences of low level system calls between the Linux kernel and the operating system's user space. The MTA is able to compress data found in large system call data sets to a limited number of motifs which summarise that data. The motifs provide a resource from which a profile of executed processes can be built. The potential for these profiles and new implications for security research are highlighted. A...

  2. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension...

  3. SSHCure: a flow-based SSH intrusion detection system

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hofstede, Rick; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  4. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  5. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kalafut, Andrew J. [Indiana University; Shue, Craig A [ORNL; Gupta, Prof. Minaxi [Indiana University

    2010-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.

  6. Detecting Fraud in Internet Auction Systems

    Science.gov (United States)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  7. A System View on Iterative MIMO Detection: Dynamic Sphere Detection versus Fixed Effort List Detection

    Directory of Open Access Journals (Sweden)

    Christina Gimmler-Dumont

    2012-01-01

    reliability information is fed back from the channel decoder to the MIMO detector. In this paper, we derive a basic framework to compare different soft-input soft-output MIMO detectors in open- and closed-loop systems. Within this framework, we analyze a depth-first sphere detector and a breadth-first fixed effort detector for different application scenarios and their effects on area and energy efficiency on the whole system. We present all system components under open- and closed-loop system aspects and determine the overall implementation cost for changing an open-loop system in a closed-loop system.

  8. System to Detect Racial-Based Bullying through Gamification

    National Research Council Canada - National Science Library

    Álvarez-Bermejo, José A; Belmonte-Ureña, Luis J; Martos-Martínez, Africa; Barragán-Martín, Ana B; del Mar Simón-Marquez, María

    2016-01-01

    Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following gamification principles and integrating less usual elements, such as social...

  9. A Driver Face Monitoring System for Fatigue and Distraction Detection

    Directory of Open Access Journals (Sweden)

    Mohamad-Hoseyn Sigari

    2013-01-01

    Full Text Available Driver face monitoring system is a real-time system that can detect driver fatigue and distraction using machine vision approaches. In this paper, a new approach is introduced for driver hypovigilance (fatigue and distraction detection based on the symptoms related to face and eye regions. In this method, face template matching and horizontal projection of top-half segment of face image are used to extract hypovigilance symptoms from face and eye, respectively. Head rotation is a symptom to detect distraction that is extracted from face region. The extracted symptoms from eye region are (1 percentage of eye closure, (2 eyelid distance changes with respect to the normal eyelid distance, and (3 eye closure rate. The first and second symptoms related to eye region are used for fatigue detection; the last one is used for distraction detection. In the proposed system, a fuzzy expert system combines the symptoms to estimate level of driver hypo-vigilance. There are three main contributions in the introduced method: (1 simple and efficient head rotation detection based on face template matching, (2 adaptive symptom extraction from eye region without explicit eye detection, and (3 normalizing and personalizing the extracted symptoms using a short training phase. These three contributions lead to develop an adaptive driver eye/face monitoring. Experiments show that the proposed system is relatively efficient for estimating the driver fatigue and distraction.

  10. Extension of a standoff explosive detection system to CBRN threats

    Science.gov (United States)

    Ford, Alan; Waterbury, Rob; Rose, Jeremy; Pohl, Ken; Eisterhold, Megan; Thorn, Thelma; Lee, Keesoo; Dottery, Ed

    2010-04-01

    Recent progress has been made on an explosive laser standoff detection system called TREDS-2 constructed from COTS components. The TREDS-2 system utilizes combination of Laser Induced Breakdown (LIBS), Townsend Effect Plasma Spectroscopy (TEPS) and Raman spectroscopy techniques with chemometric algorithms to detect hazardous materials. Extension of the detection capability of the TREDS-2 system on the real-time point detection of chemical, biological, radioactive, and nuclear threats has been tested and presented in this report. System performance of surface detection of a variety of CBRNE materials is shown. An overview of improvements to the explosives detection capabilities is given first. Challenges to sensing some specific CBRN threats are then discussed, along with the initial testing of TREDS-2 on CBRN surrogates on a limited number of surfaces. Signal processing using chemometric algorithms are shown as a demonstration of the system's capabilities. A path forward for using the specific technologies is also provided, as well as a discussion of the advantages that each technology brings to the CBRNE detection effort.

  11. An automated computer misuse detection system for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  12. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  13. Autonomous Underwater Munitions and Explosives of Concern Detection System

    Science.gov (United States)

    2015-03-01

    MR-201002) Autonomous Underwater Munitions and Explosives of Concern Detection System March 2015 This document has been... Autonomous Underwater Munitions and Explosives of Concern Detection System 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...Certification Program (ESTCP), 4800 Mark Center Drive , Suite 17D08,Alexandria,VA,22350-3605 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING

  14. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  15. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  16. A Robust Fault Detection Approach for Nonlinear Systems

    Institute of Scientific and Technical Information of China (English)

    Min-Ze Chen; Qi Zhao; Dong-Hua Zhou

    2006-01-01

    In this paper, we study the robust fault detection problem of nonlinear systems. Based on the Lyapunov method,a robust fault detection approach for a general class of nonlinear systems is proposed. A nonlinear observer is first provided,and a sufficient condition is given to make the observer locally stable. Then, a practical algorithm is presented to facilitate the realization of the proposed observer for robust fault detection. Finally, a numerical example is provided to show the effectiveness of the proposed approach.

  17. Detection and Ranging System of Flight Aid Lights

    Institute of Scientific and Technical Information of China (English)

    YU Zhi-jing; WANG Qiang

    2007-01-01

    Dynamic detection based on optics sensors and ranging radars is a new method to detect the luminous intensity of flight aid lights. The optics sensors can get the illumination information of each light, the ranging radar gets the distance information, and then data amalgamation technology is used to compute the luminous intensity of each light. A method to modify the errors of this dynamic detection system is presented. It avoids the accumulation error and measurement carrier's excursion error by using peak value detection based on optics sensors to estimate the accurate position of each light, then to modify the lights' lengthways distance information and transverse position information. The performance of the detection and ranging system is validated by some experiments and shown in pictures.

  18. Distributed intrusion detection system based on fuzzy rules

    Science.gov (United States)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  19. A fast and accurate FPGA based QRS detection system.

    Science.gov (United States)

    Shukla, Ashish; Macchiarulo, Luca

    2008-01-01

    An accurate Field Programmable Gate Array (FPGA) based ECG Analysis system is described in this paper. The design, based on a popular software based QRS detection algorithm, calculates the threshold value for the next peak detection cycle, from the median of eight previously detected peaks. The hardware design has accuracy in excess of 96% in detecting the beats correctly when tested with a subset of five 30 minute data records obtained from the MIT-BIH Arrhythmia database. The design, implemented using a proprietary design tool (System Generator), is an extension of our previous work and uses 76% resources available in a small-sized FPGA device (Xilinx Spartan xc3s500), has a higher detection accuracy as compared to our previous design and takes almost half the analysis time in comparison to software based approach.

  20. Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems

    CERN Document Server

    Twycross, Jamie; Whitbrook, Amanda

    2010-01-01

    Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when applied to computer intrusion detec- tion despite the fact that the biological immune system is a very effective anomaly detector. This may be because AIS algorithms have previously been based on the adaptive immune system and biologically-naive mod- els. This paper focuses on describing and testing a more complex and biologically-authentic AIS model, inspired by the interactions between the innate and adaptive immune systems. Its performance on a realistic process anomaly detection problem is shown to be better than standard AIS methods (negative-selection), policy-based anomaly detection methods (systrace), and an alternative innate AIS approach (the DCA). In addition, it is shown that runtime information can be used in combination with system call information to enhance detection capability.

  1. Detection of forced oscillations in power systems with multichannel methods

    Energy Technology Data Exchange (ETDEWEB)

    Follum, James D. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2015-09-30

    The increasing availability of high fidelity, geographically dispersed measurements in power systems improves the ability of researchers and engineers to study dynamic behaviors in the grid. One such behavior that is garnering increased attention is the presence of forced oscillations. Power system engineers are interested in forced oscillations because they are often symptomatic of the malfunction or misoperation of equipment. Though the resulting oscillation is not always large in amplitude, the root cause may be serious. In this report, multi-channel forced oscillation detection methods are developed. These methods leverage previously developed detection approaches based on the periodogram and spectral-coherence. Making use of geographically distributed channels of data is shown to improved detection performance and shorten the delay before an oscillation can be detected in the online environment. Results from simulated and measured power system data are presented.

  2. Network Security using Linux Intrusion Detection System / IJORCS

    Directory of Open Access Journals (Sweden)

    Arul Anitha

    2011-12-01

    Full Text Available Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic being a Linux based Intrusion Detection System(LIDs, takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  3. Detection of Component Failures for Smart Structure Control Systems

    Science.gov (United States)

    Okubo, Hiroshi

    Uncertainties in the dynamics model of a smart structure are often of significance due to model errors caused by parameter identification errors and reduced-order modeling of the system. Design of a model-based Failure Detection and Isolation (FDI) system for smart structures, therefore, needs careful consideration regarding robustness with respect to such model uncertainties. In this paper, we proposes a new method of robust fault detection that is insensitive to the disturbances caused by unknown modeling errors while it is highly sensitive to the component failures. The capability of the robust detection algorithm is examined for the sensor failure of a flexible smart beam control system. It is shown by numerical simulations that the proposed method suppresses the disturbances due to model errors and markedly improves the detection performance.

  4. a Uav-Based ROE Deer Fawn Detection System

    Science.gov (United States)

    Israel, M.

    2011-09-01

    This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  5. Spectral Target-Detecting System Using Sine-Wave Modulation

    Institute of Scientific and Technical Information of China (English)

    DENG Wei; ZHAO Chun-jiang; ZHANG Lu-da; CHENG Li-ping; Andrew Landers

    2011-01-01

    Target detection is one of the key technology of precision chemical application.Previously the digital coding modulation technique was commonly used to emit and receive the optical signal in the target detection systems previously in China.It was difficult to adjust the output power,and the anti-interference ability was weak in these systems.In order to resolve these problems,the target detection method based on analog sinewave modulation was studied.The spectral detecting system was set up in the aspects of working principle,electric circuit,and optical path.Lab testing was performed.The results showed that the reflected signal from the target varied inversely with detection distances.It indicated that it was feasible to establish the target detection system using analog sine-wave modulation technology.Furthermore,quantitative measurement of the reflected optical signal for near-infrared and visible light could be achieved by using this system.The research laid the foundation for the future development of the corresponding instrument.

  6. Noise Separation from the Weak Signal Chaotic Detection System

    Directory of Open Access Journals (Sweden)

    Hanjie Gu

    2014-11-01

    Full Text Available The traditional weak signal chaotic detection system still restricts some technical issues in the situation of the signal with noise, such as poor denoising ability and low detection precision. In this paper, we propose a novel weak signal chaotic detection system based on an improved wavelet transform algorithm. First, the traditional wavelet transform algorithm domain variables have been transformed and discretized to eliminate the redundant transform. Then, based on the discrete optimization, the wavelet coefficients have been optimized by threshold compromise strategy. The improved wavelet transform algorithm is applied in the weak signal chaotic detection system. The noise signal after finite discrete processing is treated as a perturbation of cycle power and put into a chaotic system for detecting weak signal under the noise conditions. The simulation experiments show that the proposed improved wavelet transform algorithm has a better denoising effect than the traditional wavelet transform algorithm. Moreover, the improved algorithm shows better accuracy and higher robustness in the weak signal chaotic detection system.

  7. Detection performance of laser range-gated imaging system

    Science.gov (United States)

    Xu, Jun; Li, Xiaofeng; Luo, Jijun; Zhang, Shengxiu; Xu, Yibin

    2010-10-01

    Laser radar is rapidly developing towards very capable sensors for number of applications such as military sensing and guidance, auto collision avoidance, robotic vision and atmospheric sensing. In this paper, the detection performance of non-scanned Laser Rang-gated (LRG) imaging system is studied. In order to compute the detection range of laser active imaging system, the range equation is derived by using laser illuminating model and considering factors which affect system imaging quality. According to the principle of laser radar and the characters of objects and the detectors in special applied setting, it mainly deduced the non-scanned laser radar range equation of the range-gated system, meanwhile, the SNR model of non-scanned LRG imaging system is set up. Then, relationship of the detection probability, the false alarm probability and the signal-to-noise ratio in the non-scanned LRG imaging system are analyzed, the influence factors of system's performance are pointed out, and the solution is proposed. The detection performance simulation software of non-scanned LRG imaging system is designed with MATLAB and the performance of the imaging system is simulated.

  8. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  9. A coincidence detection system based on real-time software

    Science.gov (United States)

    Ayuso, Sindulfo; José Blanco, Juan; Medina, José; Gómez-Herrero, Raúl; García-Población, Oscar; García Tejedor, Ignacio

    2016-09-01

    Conventional real-time coincidence systems use electronic circuitry to detect coincident pulses (hardware coincidence). In this work, a new concept of coincidence system based on real-time software (software coincidence) is presented. This system is based on the recurrent supervision of the analogue-to-digital converters status, which is described in detail. A prototype has been designed and built using a low-cost development platform. It has been applied to two different experimental sets for cosmic ray muon detection. Experimental muon measurements recorded simultaneously using conventional hardware coincidence and our software coincidence system have been compared, yielding identical results. These measurements have also been validated using simultaneous neutron monitor observations. This new software coincidence system provides remarkable advantages such as higher simplicity of interconnection and adjusting. Thus, our system replaces, at least, three Nuclear Instrument Modules (NIMs) required by conventional coincidence systems, reducing its cost by a factor of 40 and eliminating pulse delay adjustments.

  10. Dynamic light intensity detection system of aerodrome assistance light

    Science.gov (United States)

    Gao, Jianshu; Song, Jiye; Yu, Zhijing; Chen, Fei; Shi, Xudong; Gao, Qingji

    2007-11-01

    The techniques used in dynamic detection of airfield lighting intensity are introduced in this paper. These techniques can take place of the old method of checking all manually, and the system can detect the lights intensity online quickly and exactly, so as to find out the light faults and ensure the safety of planes taking off, landing and slipping. The system uses a car with a string of sensors which have been cosine calibrated and v(λ) calibrated to detect the light intensity. When the car is moving, the sensors can detect the lights' horizontal section. To accurately measure the distance from the measured aerodrome assistance light to the moving car, and then calculate the light intensity and protract the iso-candela curve, the Doppler ranging radar system is used. To guarantee the dependability of the system and the measurement precision, a video monitoring and guiding system is used to assure the car to run along the airfield lights line, then light orientation sensors are used to eliminate the radar's cumulating errors. The experiment indicates that this system is feasible and has high detecting precision.

  11. A cyber-physical system for senior collapse detection

    Science.gov (United States)

    Grewe, Lynne; Magaña-Zook, Steven

    2014-06-01

    Senior Collapse Detection (SCD) is a system that uses cyber-physical techniques to create a "smart home" system to predict and detect the falling of senior/geriatric participants in home environments. This software application addresses the needs of millions of senior citizens who live at home by themselves and can find themselves in situations where they have fallen and need assistance. We discuss how SCD uses imagery, depth and audio to fuse and interact in a system that does not require the senior to wear any devices allowing them to be more autonomous. The Microsoft Kinect Sensor is used to collect imagery, depth and audio. We will begin by discussing the physical attributes of the "collapse detection problem". Next, we will discuss the task of feature extraction resulting in skeleton and joint tracking. Improvements in error detection of joint tracking will be highlighted. Next, we discuss the main module of "fall detection" using our mid-level skeleton features. Attributes including acceleration, position and room environment factor into the SCD fall detection decision. Finally, how a detected fall and the resultant emergency response are handled will be presented. Results in a home environment will be given.

  12. Monitoring water supply systems for anomaly detection and response

    NARCIS (Netherlands)

    Bakker, M.; Lapikas, T.; Tangena, B.H.; Vreeburg, J.H.G.

    2012-01-01

    Water supply systems are vulnerable to damage caused by unintended or intended human actions, or due to aging of the system. In order to minimize the damages and the inconvenience for the customers, a software tool was developed to detect anomalies at an early stage, and to support the responsible s

  13. Direction finding antenna system for spark detection and localization

    Science.gov (United States)

    Topor, Raluca E.; Bucuci, Stefania C.; Tamas, Razvan D.; Danisor, Alin; Dumitrascu, Ana; Berescu, Serban

    2015-02-01

    This paper proposes a novel UWB antenna system for spark detection and localization by using the amplitude comparison direction finding (DF) method. The proposed design consists of two identical axially crossed "padlock" shaped UWB antennas, with unbalanced feeding. Simulation results show that such radiating systems can be used for assessing the direction of arrival for short pulses.

  14. On proximity detection systems for pico-projectors

    CERN Document Server

    Buckley, Edward

    2012-01-01

    It has been suggested that proximity detection systems could potentially be beneficial in increasing the eye-safe luminous flux of laser-based picoprojectors. In this letter it is shown that, whilst the benefit for LCOS-based systems could be significant, the impact upon scanned-beam projectors is far smaller.

  15. A detection system for energetic light heavy ions

    NARCIS (Netherlands)

    Engelen, C.P.M. van; Jelmersma, R.; Brink, A. van den; Kamermans, R.

    1984-01-01

    A light heavy ion detection system which consists of a gas-filled ionization chamber (IC) connected to a scattering chamber via a time-of-flight (TOF) system has been constructed. The entrance window of the IC has an area of 14 × 40 cm2, the active depth is 115 cm. Filled with CF4 at a pressure of 3

  16. Configuration of electro-optic fire source detection system

    Science.gov (United States)

    Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir

    2007-04-01

    The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.

  17. Vision-Based People Detection System for Heavy Machine Applications

    Directory of Open Access Journals (Sweden)

    Vincent Fremont

    2016-01-01

    Full Text Available This paper presents a vision-based people detection system for improving safety in heavy machines. We propose a perception system composed of a monocular fisheye camera and a LiDAR. Fisheye cameras have the advantage of a wide field-of-view, but the strong distortions that they create must be handled at the detection stage. Since people detection in fisheye images has not been well studied, we focus on investigating and quantifying the impact that strong radial distortions have on the appearance of people, and we propose approaches for handling this specificity, adapted from state-of-the-art people detection approaches. These adaptive approaches nevertheless have the drawback of high computational cost and complexity. Consequently, we also present a framework for harnessing the LiDAR modality in order to enhance the detection algorithm for different camera positions. A sequential LiDAR-based fusion architecture is used, which addresses directly the problem of reducing false detections and computational cost in an exclusively vision-based system. A heavy machine dataset was built, and different experiments were carried out to evaluate the performance of the system. The results are promising, in terms of both processing speed and performance.

  18. Automatic Emboli Detection System for the Artificial Heart

    Science.gov (United States)

    Steifer, T.; Lewandowski, M.; Karwat, P.; Gawlikowski, M.

    In spite of the progress in material engineering and ventricular assist devices construction, thromboembolism remains the most crucial problem in mechanical heart supporting systems. Therefore, the ability to monitor the patient's blood for clot formation should be considered an important factor in development of heart supporting systems. The well-known methods for automatic embolus detection are based on the monitoring of the ultrasound Doppler signal. A working system utilizing ultrasound Doppler is being developed for the purpose of flow estimation and emboli detection in the clinical artificial heart ReligaHeart EXT. Thesystem will be based on the existing dual channel multi-gate Doppler device with RF digital processing. A specially developed clamp-on cannula probe, equipped with 2 - 4 MHz piezoceramic transducers, enables easy system setup. We present the issuesrelated to the development of automatic emboli detection via Doppler measurements. We consider several algorithms for the flow estimation and emboli detection. We discuss their efficiency and confront them with the requirements of our experimental setup. Theoretical considerations are then met with preliminary experimental findings from a) flow studies with blood mimicking fluid and b) in-vitro flow studies with animal blood. Finally, we discuss some more methodological issues - we consider several possible approaches to the problem of verification of the accuracy of the detection system.

  19. A distributed deadlock detection algorithm for mobile computing system

    Institute of Scientific and Technical Information of China (English)

    CHENG Xin; LIU Hong-wei; ZUO De-cheng; JIN Feng; YANG Xiao-zong

    2005-01-01

    The mode of mobile computing originated from distributed computing and it has the un-idempotent operation property, therefore the deadlock detection algorithm designed for mobile computing systems will face challenges with regard to correctness and high efficiency. This paper attempts a fundamental study of deadlock detection for the AND model of mobile computing systems. First, the existing deadlock detection algorithms for distributed systems are classified into the resource node dependent (RD) and the resource node independent (RI) categories, and their corresponding weaknesses are discussed. Afterwards a new RI algorithm based on the AND model of mobile computing system is presented. The novelties of our algorithm are that: 1 ) the blocked nodes inform their predecessors and successors simultaneously; 2 ) the detection messages ( agents )hold the predecessors information of their originator; 3) no agent is stored midway. Additionally, the quit-inform scheme is introduced to treat the excessive victim quitting problem raised by the overlapped cycles. By these methods the proposed algorithm can detect a cycle of size n within n - 2 steps and with ( n2 - n - 2)/2 agents. The performance of our algorithm is compared with the most competitive RD and RI algorithms for distributed systems on a mobile agent simulation platform. Experiment results point out that our algorithm outperforms the two algorithms under the vast majority of resource configurations and concurrent workloads. The correctness of the proposed algorithm is formally proven by the invariant verification technique.

  20. Enhancing Tumor Detection in IR-UWB Breast Cancer System

    Directory of Open Access Journals (Sweden)

    Sara Fouad

    2017-01-01

    Full Text Available An ultra-wideband (UWB microwave system for breast cancer detection is presented. The proposed system includes monocycle pulse generator, antipodal Vivaldi antenna, breast model, and calibration algorithm for tumor detection. Firstly, our pulse generator employs transmission gate in glitch generator to achieve several advantages such as low power consumption and low ringing level. Secondly, the antipodal Vivaldi antenna is designed assuming FR4 dielectric substrate material, and developed antenna element (80×80 mm2 features a −10 dB return loss and bandwidth ranges from 2.3 GHz to more than 11 GHz. Thirdly, the phantom breast can be modeled as a layer of skin, fat, and then tumor is inserted in this layer. Finally, subtract and add algorithm (SAD is used as a calibration algorithm in tumor detection system. The proposed system suggested that horizontal antenna position with 90° between transmitting and receiving antennas is localized as a suitable antenna position with different rotating location and a 0.5 cm near to phantom. The mean advantages of this localization and tracking position around breast is a high received power signal approximately around mv as a higher recognized signal in tumor detection. Using our proposed system we can detect tumor in 5 mm diameter.

  1. Optoelectronic leak detection system for monitoring subsea structures

    Science.gov (United States)

    Moodie, D.,; Costello, L.; McStay, D.

    2010-04-01

    Leak detection and monitoring on subsea structures is an area of increasing interest for the detection and monitoring of production and control fluids for the oil and gas industry. Current techniques such as capacitive (dielectric) based measurement or passive acoustic systems have limitations and we report here an optoelectronic solution based upon fluorescence spectroscopy to provide a permanent monitoring solution. We report here a new class of optoelectronic subsea sensor for permanent, real time monitoring of hydrocarbon production systems. The system is capable of detecting small leaks of production or hydraulic fluid (ppm levels) over distances of 4-5 meters in a subsea environment. Ideally systems designed for such applications should be capable of working at depths of up to 3000m unattended for periods of 20+ years. The system uses advanced single emitter LED technology to meet the challenges of lifetime, power consumption, spatial coverage and delivery of a cost effective solution. The system is designed for permanent deployment on Christmas tree (XT), subsea processing systems (SPS) and associated equipment to provide enhanced leak detection capability.

  2. Security Policy Based on Firewall and Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hemdeep Kaur Bimbraw

    2014-11-01

    Full Text Available Firewalls are usually the first component of network security. They separate networks in different security levels by utilizing network access control policies. The major function of the firewall is to protect the private network from non-legitimate traffic. The main purpose of a firewall system is to control access to or from a protected network. It implements a network access policy by forcing connections to pass through the firewall, where they can be examined and evaluated. Intrusion detection is the process of monitoring and searching networks of computers and systems for security policy violations. Intrusion Detection Systems (IDSs are software or hardware products that automate this monitoring and analysis process. An IDS inspects all inbound and outbound network activity, system logs and events, and identifies suspicious patterns or events that may indicate a network or system attack from someone attempting to break into or compromise a system. The network security in today’s world is a major concern because of increasing threats from malicious users. Therefore, designing a correct network security policy is a challenging task. To design filtering rules to formulate a sound firewall security policy and implement intrusion detection system to capture network packets and detect attacks to fulfill this gap

  3. An integrated CMOS detection system for optical short-pulse

    Science.gov (United States)

    Kim, Chang-Gun; Hong, Nam-Pyo; Choi, Young-Wan

    2014-03-01

    We present design of a front-end readout system consisting of charge sensitive amplifier (CSA) and pulse shaper for detection of stochastic and ultra-small semiconductor scintillator signal. The semiconductor scintillator is double sided silicon detector (DSSD) or avalanche photo detector (APD) for high resolution and peak signal reliability of γ-ray or X-ray spectroscopy. Such system commonly uses low noise multichannel CSA. Each CSA in multichannel includes continuous reset system based on tens of MΩ and charge-integrating capacitor in feedback loop. The high value feedback resistor requires large area and huge power consumption for integrated circuits. In this paper, we analyze these problems and propose a CMOS short pulse detection system with a novel CSA. The novel CSA is composed of continuous reset system with combination of diode connected PMOS and 100 fF. This structure has linearity with increased input charge quantity from tens of femto-coulomb to pico-coulomb. Also, the front-end readout system includes both slow and fast shapers for detecting CSA output and preventing pile-up distortion. Shaping times of fast and slow shapers are 150 ns and 1.4 μs, respectively. Simulation results of the CMOS detection system for optical short-pulse implemented in 0.18 μm CMOS technology are presented.

  4. Fault Detection in Systems-A Fuzzy Approach

    Directory of Open Access Journals (Sweden)

    Ashok Kumar

    2004-04-01

    Full Text Available The task of fault detection is important when dealing with failures of crucial nature. After detection of faults in a system, it is advisable to suggest maintenance action before occurrenceof a failure. Fault detection may be done by observing various symptoms of the system during its operational stage. Sometimes, symptoms cannot be quantified easily but can be expressedin linguistic terms. Since linguistic terms are fuzzy quantifiers, these can be represented by fuzzy numbers. In this paper, two cases have been discussed, where a fault likely to affect a particular systemlsystems, is detected. In the first case, this is done by means of a compositional rule of inference. The second case is based on modified similarity measure. For both these  cases, linguistic terms have been expressed as trapezoidal fuzzy numbers

  5. Support system and method for detecting neurodegenerative disorder

    DEFF Research Database (Denmark)

    2013-01-01

    The present invention relates to a system and a method for detection of abnormal motor activity during REM sleep, and further to systems and method for assisting in detecting neurodegenerative disorders such as Parkinson's. One embodiment relates to a method for detection of abnormal motor activity...... during REM sleep comprising the steps of: performing polysomnographic recordings of a sleeping subject, thereby obtaining one or more electromyography (EMG) derivations, preferably surface EMG recordings, and one or more EEG derivations, and/or one or more electrooculargraphy (EOG) derivations, detecting...... one or more REM sleep stages, preferably based on the one or more EEG and/or EOG derivations, determining the level of muscle activity during the one or more REM sleep stages based on the one or more EMG derivations, wherein a subject having an increased level of muscle activity during REM sleep...

  6. Robust fault detection for switched linear systems with state delays.

    Science.gov (United States)

    Wang, Dong; Wang, Wei; Shi, Peng

    2009-06-01

    This correspondence deals with the problem of robust fault detection for discrete-time switched systems with state delays under an arbitrary switching signal. The fault detection filter is used as the residual generator, in which the filter parameters are dependent on the system mode. Attention is focused on designing the robust fault detection filter such that, for unknown inputs, control inputs, and model uncertainties, the estimation error between the residuals and faults is minimized. The problem of robust fault detection is converted into an H(infinity)-filtering problem. By a switched Lyapunov functional approach, a sufficient condition for the solvability of this problem is established in terms of linear matrix inequalities. A numerical example is provided to demonstrate the effectiveness of the proposed method.

  7. Innovative Detection System of Ochratoxin A by Thin Film Photodiodes

    Science.gov (United States)

    Caputo, Domenico; de Cesare, Giampiero; Fanelli, Corrado; Nascetti, Augusto; Ricelli, Alessandra; Scipinotti, Riccardo

    2007-01-01

    In this work we present, for the first time, a rapid, compact and innovative method for detection of Ochratoxin A (OTA) based on hydrogenated amorphous silicon (a-Si:H) sensors. 2 μl of acidified toluene containing OTA at different concentrations were spotted on the silica side of a High Performance Thin Layer Cromatography plate and aligned with a a-Si:H p-i-n photodiode deposited by Plasma Enhanced Chemical Vapor Deposition on a different glass substrate. As an UV radiation excites the mycotoxin, the re-emitted light is detected by the a-Si:H sensor. Results show a very good linearity between OTA concentration and the sensor photocurrent over almost three orders of magnitude. The minimum detected OTA concentration is equal to 0.1ng, showing that the presented system has the potential for a low cost system suitable for the early detection of toxins in foods.

  8. Data analysis of inertial sensor for train positioning detection system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seong Jin; Park, Sung Soo; Lee, Jae Ho; Kang, Dong Hoon [Korea Railroad Research Institute, Uiwang (Korea, Republic of)

    2015-02-15

    Train positioning detection information is fundamental for high-speed railroad inspection, making it possible to simultaneously determine the status and evaluate the integrity of railroad equipment. This paper presents the results of measurements and an analysis of an inertial measurement unit (IMU) used as a positioning detection sensors. Acceleration and angular rate measurements from the IMU were analyzed in the amplitude and frequency domains, with a discussion on vibration and train motions. Using these results and GPS information, the positioning detection of a Korean tilting train express was performed from Naju station to Illo station on the Honam-line. The results of a synchronized analysis of sensor measurements and train motion can help in the design of a train location detection system and improve the positioning detection performance.

  9. HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    Seyedeh Yasaman Rashida

    2013-06-01

    Full Text Available In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.

  10. Simulation of network intrusion detection system with GPenSim

    OpenAIRE

    2011-01-01

    In recent years, network has penetrated into every aspect of our life with its rapid growth and popularization. More and more serious network security problems have occurred together with this process, especially network intrusion problem. It has seriously affected the normal use of network, so research of network intrusion detection has become one of the hottest research areas. This thesis simulated a network intrusion detection system based on particle filter to solve the network intrusion ...

  11. ARRAY PULSED EDDY CURRENT IMAGING SYSTEM USED TO DETECT CORROSION

    Institute of Scientific and Technical Information of China (English)

    Yang Binfeng; Luo Feilu; Cao Xiongheng; Xu Xiaojie

    2005-01-01

    A theory model is established to describe the voltage-current response function. The peak amplitude and the zero-crossing time of the transient signal is extracted as the imaging features, array pulsed eddy current (PEC) imaging is proposed to detect corrosion. The test results show that this system has the advantage of fast scanning speed, different imaging mode and quantitative detection, it has a broad application in the aviation nondestructive testing.

  12. DETECTION OF LUNG INVOLVEMENT BY HRCT IN SYSTEMIC LUPUS ERYTHEMATOSUS

    Institute of Scientific and Technical Information of China (English)

    沈加林; 陈克敏; 蒋蕴毅; 丁小龙

    2002-01-01

    Objective To assess the sensitivity of high-resolution CT (HRCT) in detecting pulmonary involvement attributed to systemic lupus erythematosus (SLE). Methods Plain chest radiography, HRCT, and pulmonary function testing of 36 patients with SLE were analyzed. Results The sensitivity of the pulmonary involvement by HRCT, plain chest radiography and pulmonary function testing were 88.9%,36.1%,and 33.3%, respectively. Conclusion HRCT played an important role in detecting pulmonary involvemen due to SLE, especially in early and mild cases.

  13. Ground-target detection system for digital video database

    Science.gov (United States)

    Liang, Yiqing; Huang, Jeffrey R.; Wolf, Wayne H.; Liu, Bede

    1998-07-01

    As more and more visual information is available on video, information indexing and retrieval of digital video data is becoming important. A digital video database embedded with visual information processing using image analysis and image understanding techniques such as automated target detection, classification, and identification can provide query results of higher quality. We address in this paper a robust digital video database system within which a target detection module is implemented and applied onto the keyframe images extracted by our digital library system. The tasks and application scenarios under consideration involve indexing video with information about detection and verification of artificial objects that exist in video scenes. Based on the scenario that the video sequences are acquired by an onboard camera mounted on Predator unmanned aircraft, we demonstrate how an incoming video stream is structured into different levels -- video program level, scene level, shot level, and object level, based on the analysis of video contents using global imagery information. We then consider that the keyframe representation is most appropriate for video processing and it holds the property that can be used as the input for our detection module. As a result, video processing becomes feasible in terms of decreased computational resources spent and increased confidence in the (detection) decisions reached. The architecture we proposed can respond to the query of whether artificial structures and suspected combat vehicles are detected. The architecture for ground detection takes advantage of the image understanding paradigm and it involves different methods to locate and identify the artificial object rather than nature background such as tree, grass, and cloud. Edge detection, morphological transformation, line and parallel line detection using Hough transform applied on key frame images at video shot level are introduced in our detection module. This function can

  14. A Hands-Free Obstacle Detection and Avoidance System

    Directory of Open Access Journals (Sweden)

    M. Abdul-Niby

    2015-06-01

    Full Text Available In this paper, we present a low cost hands-free detection and avoidance system designed to provide mobility assistance for visually impaired people. An ultrasonic sensor is attached to the jacket of the user and detects the obstacles in front. The information obtained is transferred to the user through audio messages and also by a vibration. The range of the detection is user-defined. A text-to-speech module is employed for the voice signal. The proposed obstacle avoidance device is cost effective, easy to use and easily upgraded.

  15. Special nuclear material detection studies with the SMANDRA mobile system

    Science.gov (United States)

    Cester, D.; Nebbia, G.; Stevanato, L.; Viesti, G.; Neri, F.; Petrucci, S.; Selmi, S.; Tintori, C.; Peerani, P.; Tomanin, A.

    2012-02-01

    The detection of special nuclear material has been studied with the SMANDRA mobile inspection system used both as a high sensitivity passive neutron/gamma spectroscopic tool and as an active inspection device using tagged neutrons. The detection of plutonium samples is possible with passive interrogation, the passive detection of uranium being much more difficult because of the low neutron yield and of the easiness of shielding the gamma rays. However, we show that active interrogation with tagged neutrons is able to provide signatures for the discrimination of uranium against other materials.

  16. Integrated polymer waveguides for absorbance detection in chemical analysis systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; El-Ali, Jamil; Wolff, Anders

    2003-01-01

    . The emphasis of this paper is on the signal-to-noise ratio of the detection and its relation to the sensitivity. Two absorbance cells with an optical path length of 100 μm and 1000 μm were characterized and compared in terms of sensitivity, limit of detection and effective path length for measurements......A chemical analysis system for absorbance detection with integrated polymer waveguides is reported for the first time. The fabrication procedure relies on structuring of a single layer of the photoresist SU-8, so both the microfluidic channel network and the optical components, which include planar...

  17. OBSTACLE DETECTION SYSTEM INVOLVING FUSION OF MULTIPLE SENSOR TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    C. Giannì

    2017-08-01

    Full Text Available Obstacle detection is a fundamental task for Unmanned Aerial Vehicles (UAV as a part of a Sense and Avoid system. In this study, we present a method of multi-sensor obstacle detection that demonstrated good results on different kind of obstacles. This method can be implemented on low-cost platforms involving a DSP or small FPGA. In this paper, we also present a study on the typical targets that can be tough to detect because of their characteristics of reflectivity, form factor, heterogeneity and show how data fusion can often overcome the limitations of each technology.

  18. Neutron-based land mine detection system development

    Energy Technology Data Exchange (ETDEWEB)

    Davis, H.A.; McDonald, T.E. Jr.; Nebel, R.A.; Pickrell, M.M.

    1997-10-01

    This is the final report of a one-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory (LANL). The goal of this project was to examine the feasibility of developing a land mine detection system that can detect nonmetallic (plastic) mines using the detection and analysis of prompt gamma neutron activation analysis (PGNAA). The authors approached this study by first carrying out a review of other nonmetallic land mine detection methods for comparison with the PGNAA concept. They reviewed issues associated with detecting and recording the return gamma signal resulting from neutrons interacting with high explosive in mines and they examined two neutron source technologies that have been under development at Los Alamos for the past several years for possible application to a PGNAA system. A major advantage of the PGNAA approach is it`s ability to discriminate detection speed and need for close proximity. The authors identified approaches to solving these problems through development of improved neutron sources and detection sensors.

  19. Detection of Coal Mine Spontaneous Combustion by Fuzzy Inference System

    Institute of Scientific and Technical Information of China (English)

    SUN Ji-ping; SONG Shu; MA Feng-ying; ZHANG Ya-li

    2006-01-01

    The spontaneous combustion is a smoldering process and characterized by a slow burning speed and a long duration. Therefore, it is a hazard to coal mines. Early detection of coal mine spontaneous combustion is quite difficult because of the complexity of different coal mines. And the traditional threshold discriminance is not suitable for spontaneous combustion detection due to the uncertainty of coalmine combustion. Restrictions of the single detection method will also affect the detection precision in the early time of spontaneous combustion. Although multiple detection methods can be adopted as a complementarity to improve the accuracy of detection, the synthesized method will increase the complicacy of criterion, making it difficult to estimate the combustion. To solve this problem, a fuzzy inference system based on CRI (Compositional Rule of Inference) and fuzzy reasoning method FITA (First Infer Then Aggregate) are presented. And the neural network is also developed to realize the fuzzy inference system. Finally, the effectiveness of the inference system is demonstrated by means of an experiment.

  20. An Improved Culture System for Virus Isolation and Detection

    Institute of Scientific and Technical Information of China (English)

    Yu-chen XIA; Zhi-hong HU; Zhi-juan QIU; Zhong-bin MA; Hua-lin WANG; Fei DENG

    2008-01-01

    Cell culture plays an important role in virology. It provides a platform for the detection and isolation of viruses as well as for the biochemistry and molecular biology based studies of viruses. In the present work, a new system that could permits multiple (different) cell lines to be simultaneously cultured in one dish was developed. In the system, each cell line was cultured in an isolated zone in the same dish or well and the system is therefore called an isolated co-culture system. The usefulness of this novel approach for virus isolation was demonstrated using a model system based on adenovirus.

  1. Energy detection UWB system based on pulse width modulation

    Directory of Open Access Journals (Sweden)

    Song Cui

    2014-05-01

    Full Text Available A new energy detection ultra-wideband system based on pulse width modulation is proposed. The bit error rate (BER performance of this new system is slightly worst than that of a pulse position modulation (PPM system in additive white Gaussian noise channels. In multipath channels, this system does not suffer from cross-modulation interference as PPM, so it can achieve better BER performance than PPM when cross-modulation interference occurs. In addition, when synchronisation errors occur, this system is more robust than PPM.

  2. Performance estimation for threat detection in CT systems

    Science.gov (United States)

    Montgomery, Trent; Karl, W. Clem; Castañón, David A.

    2017-05-01

    Detecting the presence of hazardous materials in suitcases and carry-on luggage is an important problem in aviation security. As the set of threats is expanding, there is a corresponding need to increase the capabilities of explosive detection systems to address these threats. However, there is a lack of principled tools for predicting the performance of alternative designs for detection systems. In this paper, we describe an approach for computing bounds on the achievable classification performance of material discrimination systems based on empirical statistics that estimate the f-divergence of the underlying features. Our approach can be used to examine alternative physical observation modalities and measurement configurations, as well as variations in reconstruction and feature extraction algorithms.

  3. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  4. An Android malware detection system based on machine learning

    Science.gov (United States)

    Wen, Long; Yu, Haiyang

    2017-08-01

    The Android smartphone, with its open source character and excellent performance, has attracted many users. However, the convenience of the Android platform also has motivated the development of malware. The traditional method which detects the malware based on the signature is unable to detect unknown applications. The article proposes a machine learning-based lightweight system that is capable of identifying malware on Android devices. In this system we extract features based on the static analysis and the dynamitic analysis, then a new feature selection approach based on principle component analysis (PCA) and relief are presented in the article to decrease the dimensions of the features. After that, a model will be constructed with support vector machine (SVM) for classification. Experimental results show that our system provides an effective method in Android malware detection.

  5. A multimodal emotion detection system during human-robot interaction.

    Science.gov (United States)

    Alonso-Martín, Fernando; Malfaz, María; Sequeira, João; Gorostiza, Javier F; Salichs, Miguel A

    2013-11-14

    In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human-robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS). Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA), which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA), has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE) and Computer Expression Recognition Toolbox (CERT). Once these new components (GEVA and GEFA) give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human-robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System). Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual) separately.

  6. A Multimodal Emotion Detection System during Human–Robot Interaction

    Directory of Open Access Journals (Sweden)

    Miguel A. Salichs

    2013-11-01

    Full Text Available In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human–robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS. Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA, which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA, has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE and Computer Expression Recognition Toolbox (CERT. Once these new components (GEVA and GEFA give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human–robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System. Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual separately.

  7. Compact endoscopic fluorescence detection system for gastrointestinal cancers

    Science.gov (United States)

    Nadeau, Valerie; Padgett, Miles J.; Hewett, Jacqueline; Sibbett, Wilson; Hamdan, Khaled; Mohammed, Sami; Tait, Iain; Cushieri, Alfred

    2001-04-01

    We describe a compact endoscopic imaging system for the detection of gastro-intestinal cancers. This system is designed to image ALA-induced PpIX fluorescence and allows the clinician to perform fluorescence endoscopy and white light endoscopy simultaneously. The system comprises a filtered mercury arclamp for illumination and fluorescence excitation, a dual camera system coupled to an endoscope for detection and a desktop PC for processing and display of images. The result is a real-time colour image onto which fluorescence information is superimposed. Preliminary in vivo results indicate an increased fluorescence level within cancers in comparison with normal tissue. In addition, the system allows point spectroscopy to be carried out by the insertion of an optical fibre probe down the biopsy channel of the endoscope.

  8. ENSEMBLE DESIGN OF MASQUERADER DETECTION SYSTEMS FOR INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2011-01-01

    Full Text Available Masqueraders are a category of intruders who impersonate other people on a computer system and use this entry point to use the information stored in the systems or throw other attacks into the network. This paper focuses on Ensemble Design of a Masquerader Detection System using Decision trees and Support Vector Machines for classification with two kernel functions linear and linear BSpline. The key idea is to find out specific patterns of command sequence that tells about user behaviour on a system, and use them to build classifiers that can perfectly recognize anomalous and normal behaviour. Real time truncated command line data set collected from a debian Linux server is used for performance comparison of the developed classifiers with the standard truncated command line data set of Schonlau[4]. The results show that Ensemble Design of Masquerader Detection Systems is much faster than individual Decision trees or Support Vector Machines.

  9. Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Hossein Jadidoleslamy

    2012-09-01

    Full Text Available One of most important existent issues in information security application domain is Intrusion Detection System (IDS; IDS is a defensive-aggressive system to protect information, verifying and responding tooccurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and trackingprevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.

  10. Flow system for optical activity detection of vegetable extracts employing molecular exclusion continuous chromatographic detection

    Science.gov (United States)

    Fajer, V.; Rodríguez, C.; Naranjo, S.; Mesa, G.; Mora, W.; Arista, E.; Cepero, T.; Fernández, H.

    2006-02-01

    The combination of molecular exclusion chromatography and laser polarimetric detection has turned into a carbohydrate separation and quantification system for plant fluids of industrial value, making it possible the evaluation of the quality of sugarcane juices, agave juices and many other plant extracts. Some previous papers described a system where liquid chromatography separation and polarimetric detection using a LASERPOL 101M polarimeter with He-Ne light source allowed the collection and quantification of discrete samples for analytical purposes. In this paper, the authors are introducing a new improved system which accomplishes polarimetric measurements in a continuous flux. Chromatograms of several carbohydrates standard solutions were obtained as useful references to study juice quality of several sugarcane varieties under different physiological conditions. Results by either discrete or continuous flux systems were compared in order to test the validation of the new system. An application of the system to the diagnostics of scalded foliar is described. A computer program allowing the output of the chromatograms to a display on line and the possibility of digital storing, maxima detections, zone integration, and some other possibilities make this system very competitive and self-convincing.

  11. DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM

    Directory of Open Access Journals (Sweden)

    Hongliang Liang

    2016-12-01

    Full Text Available iOS is a popular operating system on Apple’s smartphones, and recent security events have shown the possibility of stealing the users' privacy in iOS without being detected, such as XcodeGhost. So, we present the design and implementation of a malware vetting system, called DMIA. DMIA first collects runtime information of an app and then distinguish between malicious and normal apps by a novel machine learning model. We evaluated DMIA with 1000 apps from the official App Store. The results of experiments show that DMIA is effective in detecting malwares aimed to steal privacy.

  12. AN EFFICIENT APPROXIMATE MAXIMUM LIKELIHOOD SIGNAL DETECTION FOR MIMO SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Cao Xuehong

    2007-01-01

    This paper proposes an efficient approximate Maximum Likelihood (ML) detection method for Multiple-Input Multiple-Output (MIMO) systems, which searches local area instead of exhaustive search and selects valid search points in each transmit antenna signal constellation instead of all hyperplane. Both of the selection and search complexity can be reduced significantly. The method performs the tradeoff between computational complexity and system performance by adjusting the neighborhood size to select the valid search points. Simulation results show that the performance is comparable to that of the ML detection while the complexity is only as the small fraction of ML.

  13. Development of a Wearable-Sensor-Based Fall Detection System

    Directory of Open Access Journals (Sweden)

    Falin Wu

    2015-01-01

    Full Text Available Fall detection is a major challenge in the public healthcare domain, especially for the elderly as the decline of their physical fitness, and timely and reliable surveillance is necessary to mitigate the negative effects of falls. This paper develops a novel fall detection system based on a wearable device. The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient’s location.

  14. Development of a Wearable-Sensor-Based Fall Detection System

    Science.gov (United States)

    Zhao, Hengyang; Zhao, Yan; Zhong, Haibo

    2015-01-01

    Fall detection is a major challenge in the public healthcare domain, especially for the elderly as the decline of their physical fitness, and timely and reliable surveillance is necessary to mitigate the negative effects of falls. This paper develops a novel fall detection system based on a wearable device. The system monitors the movements of human body, recognizes a fall from normal daily activities by an effective quaternion algorithm, and automatically sends request for help to the caregivers with the patient's location. PMID:25784933

  15. Intrusion Detection System Using Hierarchical GMM and Dimensionality Reduction

    Directory of Open Access Journals (Sweden)

    L. Maria Michael

    2012-07-01

    Full Text Available The focus of this chapter is to provide the effective intrusion detection technique to protect Web server. The IDS protects an server from malicious attacks from the Internet if someone tries to break in through the firewall and tries to have access on any system in the trusted side and alerts the system administrator in case there is a breach in security. Gaussian Mixture Models (GMMs are among the most statistically mature methods for clustering the data. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection model is to collect behavioral features of non-normal operation and establish related feature library. In the existing system of anomaly based Intrusion Detection System, the work is based on the number of attacks on the network and using decision tree analysis for rule matching and grading. We are proposing an IDS approach that will use signature based and anomaly based identification scheme. And we are also proposing the rule pruning scheme with GMM(Gaussian Mixture Model. It does facilitate efficient way of handling large amount of rules. And we are planned to compare the performance of the IDS on different models. The Dimension Reduction focuses on using information obtained KDD Cup 99 data set for the selection of attributes to identify the type of attacks. The dimensionality reduction is performed on 41 attributes to 14 and 7 attributes based on Best First Search method and then apply the two classifying Algorithms ID3 and J48 Keywords-Intrusion detection, reliable networks, malicious routers, internet dependability, tolerance.

  16. A Subset Feature Elimination Mechanism for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Herve Nkiama

    2016-04-01

    Full Text Available several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the emergence of new technologies such as Cloud Computing or Big Data, large amount of network traffic are generated and the intrusion detection system must dynamically collected and analyzed the data produce by the incoming traffic. However in a large dataset not all features contribute to represent the traffic, therefore reducing and selecting a number of adequate features may improve the speed and accuracy of the intrusion detection system. In this study, a feature selection mechanism has been proposed which aims to eliminate non-relevant features as well as identify the features which will contribute to improve the detection rate, based on the score each features have established during the selection process. To achieve that objective, a recursive feature elimination process was employed and associated with a decision tree based classifier and later on, the suitable relevant features were identified. This approach was applied on the NSL-KDD dataset which is an improved version of the previous KDD 1999 Dataset, scikit-learn that is a machine learning library written in python was used in this paper. Using this approach, relevant features were identified inside the dataset and the accuracy rate was improved. These results lend to support the idea that features selection improve significantly the classifier performance. Understanding the factors that help identify relevant features will allow the design of a better intrusion detection system.

  17. Electrical breakdown detection system for dielectric elastomer actuators

    Science.gov (United States)

    Ghilardi, Michele; Busfield, James J. C.; Carpi, Federico

    2017-04-01

    Electrical breakdown of dielectric elastomer actuators (DEAs) is an issue that has to be carefully addressed when designing systems based on this novel technology. Indeed, in some systems electrical breakdown might have serious consequences, not only in terms of interruption of the desired function but also in terms of safety of the overall system (e.g. overheating and even burning). The risk for electrical breakdown often cannot be completely avoided by simply reducing the driving voltages, either because completely safe voltages might not generate sufficient actuation or because internal or external factors might change some properties of the actuator whilst in operation (for example the aging or fatigue of the material, or an externally imposed deformation decreasing the distance between the compliant electrodes). So, there is the clear need for reliable, simple and cost-effective detection systems that are able to acknowledge the occurrence of a breakdown event, making DEA-based devices able to monitor their status and become safer and "selfaware". Here a simple solution for a portable detection system is reported that is based on a voltage-divider configuration that detects the voltage drop at the DEA terminals and assesses the occurrence of breakdown via a microcontroller (Beaglebone Black single-board computer) combined with a real-time, ultra-low-latency processing unit (Bela cape an open-source embedded platform developed at Queen Mary University of London). The system was used to both generate the control signal that drives the actuator and constantly monitor the functionality of the actuator, detecting any breakdown event and discontinuing the supplied voltage accordingly, so as to obtain a safer controlled actuation. This paper presents preliminary tests of the detection system in different scenarios in order to assess its reliability.

  18. FaceID: A face detection and recognition system

    Energy Technology Data Exchange (ETDEWEB)

    Shah, M.B.; Rao, N.S.V.; Olman, V.; Uberbacher, E.C.; Mann, R.C.

    1996-12-31

    A face detection system that automatically locates faces in gray-level images is described. Also described is a system which matches a given face image with faces in a database. Face detection in an Image is performed by template matching using templates derived from a selected set of normalized faces. Instead of using original gray level images, vertical gradient images were calculated and used to make the system more robust against variations in lighting conditions and skin color. Faces of different sizes are detected by processing the image at several scales. Further, a coarse-to-fine strategy is used to speed up the processing, and a combination of whole face and face component templates are used to ensure low false detection rates. The input to the face recognition system is a normalized vertical gradient image of a face, which is compared against a database using a set of pretrained feedforward neural networks with a winner-take-all fuser. The training is performed by using an adaptation of the backpropagation algorithm. This system has been developed and tested using images from the FERET database and a set of images obtained from Rowley, et al and Sung and Poggio.

  19. Development of Contaminant Detection System using HTS SQUIDs

    Energy Technology Data Exchange (ETDEWEB)

    Ohtani, T.; Tanaka, S.; Narita, Y.; Ariyoshi, S. [National University Corporation, Toyohashi University of Technology, Toyohash (Japan); Suzuki, S. [Advance Food Technology Co., Ltd., Toyohashi (Japan)

    2015-12-15

    In terms of food safety, mixture of contaminants in food is a serious problem for not only consumers but also manufacturers. In general, the target size of the metallic contaminant to be removed is 0.5 mm. However, it is a difficult task for manufacturers to achieve this target, because of lower system sensitivity. Therefore, we developed a food contaminant detection system based on high-Tc RF superconducting quantum interference devices (SQUIDs), which are highly sensitive magnetic sensors. This study aims to improve the signal to noise ratio (SNR) of the system and detect a 0.5 mm diameter steel ball. Using a real time digital signal processing technique along with analog band-pass filters, we improved the SNR of the system. Owing to the improved SNR, a steel ball with a diameter as small as 0.3 mm, with stand-off distance of 117 mm was successfully detected. These results suggest that the proposed system is a promising candidate for the detection of metallic contaminants in food products.

  20. Traffic Congestion Detection System through Connected Vehicles and Big Data

    Directory of Open Access Journals (Sweden)

    Néstor Cárdenas-Benítez

    2016-04-01

    Full Text Available This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  1. Mental Fatigue Monitoring Using a Wearable Transparent Eye Detection System

    Directory of Open Access Journals (Sweden)

    Kota Sampei

    2016-01-01

    Full Text Available We propose mental fatigue measurement using a wearable eye detection system. The system is capable of acquiring movement of the pupil and blinking from the light reflected from the eye. The reflection is detected by dye-sensitized photovoltaic cells. Since these cells are patterned onto the eyeglass and do not require external input power, the system is notable for its lightweight and low power consumption and can be combined with other wearable devices, such as a head mounted display. We performed experiments to correlate information obtained by the eye detection system with the mental fatigue of the user. Since it is quite difficult to evaluate mental fatigue objectively and quantitatively, we assumed that the National Aeronautics and Space Administration Task Load Index (NASA-TLX had a strong correlation with te mental fatigue. While a subject was requested to conduct calculation tasks, the eye detection system collected his/her information that included position, velocity and total movement of the eye, and amount and frequency of blinking. Multiple regression analyses revealed the correlation between NASA-TLX and the information obtained for 3 out of 5 subjects.

  2. Traffic Congestion Detection System through Connected Vehicles and Big Data

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-01-01

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur. PMID:27136548

  3. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    Functionality Description Persistence mechanism Mimicry technique Camouflage malware image: • renaming its image • appending its image to victim... Age ”, ACSAC 2007 21. Chien Eric, “Techniques of Adware and Spyware”, White paper: Symantec Security Response, in proceedings of VB2005, Dublin...Johnson R. “A practical mimicry attack against powerful system-call monitors” In Proc. ACM Symposium on Information, Computer and Communications

  4. Controlled biological and biomimetic systems for landmine detection.

    Science.gov (United States)

    Habib, Maki K

    2007-08-30

    Humanitarian demining requires to accurately detect, locate and deactivate every single landmine and other buried mine-like objects as safely and as quickly as possible, and in the most non-invasive manner. The quality of landmine detection affects directly the efficiency and safety of this process. Most of the available methods to detect explosives and landmines are limited by their sensitivity and/or operational complexities. All landmines leak with time small amounts of their explosives that can be found on surrounding ground and plant life. Hence, explosive signatures represent the robust primary indicator of landmines. Accordingly, developing innovative technologies and efficient techniques to identify in real-time explosives residue in mined areas represents an attractive and promising approach. Biological and biologically inspired detection technology has the potential to compete with or be used in conjunction with other artificial technology to complement performance strengths. Biological systems are sensitive to many different scents concurrently, a property that has proven difficult to replicate artificially. Understanding biological systems presents unique opportunities for developing new capabilities through direct use of trained bio-systems, integration of living and non-living components, or inspiring new design by mimicking biological capabilities. It is expected that controlled bio-systems, biotechnology and microbial techniques will contribute to the advancement of mine detection and other application domains. This paper provides directions, evaluation and analysis on the progress of controlled biological and biomimetic systems for landmine detection. It introduces and discusses different approaches developed, underlining their relative advantages and limitations, and highlighting trends, safety and ecology concern, and possible future directions.

  5. Evaluation of computer-aided detection and diagnosis systems.

    Science.gov (United States)

    Petrick, Nicholas; Sahiner, Berkman; Armato, Samuel G; Bert, Alberto; Correale, Loredana; Delsanto, Silvia; Freedman, Matthew T; Fryd, David; Gur, David; Hadjiiski, Lubomir; Huo, Zhimin; Jiang, Yulei; Morra, Lia; Paquerault, Sophie; Raykar, Vikas; Samuelson, Frank; Summers, Ronald M; Tourassi, Georgia; Yoshida, Hiroyuki; Zheng, Bin; Zhou, Chuan; Chan, Heang-Ping

    2013-08-01

    Computer-aided detection and diagnosis (CAD) systems are increasingly being used as an aid by clinicians for detection and interpretation of diseases. Computer-aided detection systems mark regions of an image that may reveal specific abnormalities and are used to alert clinicians to these regions during image interpretation. Computer-aided diagnosis systems provide an assessment of a disease using image-based information alone or in combination with other relevant diagnostic data and are used by clinicians as a decision support in developing their diagnoses. While CAD systems are commercially available, standardized approaches for evaluating and reporting their performance have not yet been fully formalized in the literature or in a standardization effort. This deficiency has led to difficulty in the comparison of CAD devices and in understanding how the reported performance might translate into clinical practice. To address these important issues, the American Association of Physicists in Medicine (AAPM) formed the Computer Aided Detection in Diagnostic Imaging Subcommittee (CADSC), in part, to develop recommendations on approaches for assessing CAD system performance. The purpose of this paper is to convey the opinions of the AAPM CADSC members and to stimulate the development of consensus approaches and "best practices" for evaluating CAD systems. Both the assessment of a standalone CAD system and the evaluation of the impact of CAD on end-users are discussed. It is hoped that awareness of these important evaluation elements and the CADSC recommendations will lead to further development of structured guidelines for CAD performance assessment. Proper assessment of CAD system performance is expected to increase the understanding of a CAD system's effectiveness and limitations, which is expected to stimulate further research and development efforts on CAD technologies, reduce problems due to improper use, and eventually improve the utility and efficacy of CAD in

  6. The synchronous active neutron detection system for spent fuel assay

    Energy Technology Data Exchange (ETDEWEB)

    Pickrell, M.M.; Kendall, P.K.

    1994-10-01

    The authors have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit the unique operating features of a 14-MeV neutron generator developed by Schlumberger. This generator and a novel detection system will be applied to the direct measurement of the fissile material content in spent fuel in place of the indirect measures used at present. The technique they are investigating is termed synchronous active neutron detection (SAND). It closely follows a method that has been used routinely in other branches of physics to detect very small signals in the presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed {open_quotes}lock-in{close_quotes} amplifiers. The authors have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. This approach is possible because the Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. The results to date are preliminary but quite promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly. It also appears to be quite resilient to background neutron interference. The interrogating neutrons appear to be nonthermal and penetrating. Although a significant amount of work remains to fully explore the relevant physics and optimize the instrument design, the underlying concept appears sound.

  7. Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS

    CERN Document Server

    Sangeetha, S; 10.5121/ijnsa.2010.2204

    2010-01-01

    The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS consist of semantic IDS and Fuzzy based IDS. Rule based IDS looks for the specific pattern which is defined as malicious. A non-intrusive regular pattern can be malicious if it occurs several times with a short time interval. For detecting such malicious activities, FASIDS is proposed in this paper. At application layer, HTTP traffic's header and payload are analyzed for possible intrusion. In the proposed misuse detection module, the semantic intrusion detection system works on the basis of rules that define various application layer misuses that are found in the network. An attack identified by the IDS is based on a corresponding rule in the rule-base. An event that doesn't make a 'hit' on the rule-base is given to a Fuzzy Intrusion Detection System (FIDS) for further analysis.

  8. Comparison and Characterization of Android-Based Fall Detection Systems

    Directory of Open Access Journals (Sweden)

    Rafael Luque

    2014-10-01

    Full Text Available Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones’ potential (and in particular, the Android Operating System can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed and false positives (conventional movements that are erroneously classified as falls. In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  9. Comparison and characterization of Android-based fall detection systems.

    Science.gov (United States)

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  10. Human visual system-based smoking event detection

    Science.gov (United States)

    Odetallah, Amjad D.; Agaian, Sos S.

    2012-06-01

    Human action (e.g. smoking, eating, and phoning) analysis is an important task in various application domains like video surveillance, video retrieval, human-computer interaction systems, and so on. Smoke detection is a crucial task in many video surveillance applications and could have a great impact to raise the level of safety of urban areas, public parks, airplanes, hospitals, schools and others. The detection task is challenging since there is no prior knowledge about the object's shape, texture and color. In addition, its visual features will change under different lighting and weather conditions. This paper presents a new scheme of a system for detecting human smoking events, or small smoke, in a sequence of images. In developed system, motion detection and background subtraction are combined with motion-region-saving, skin-based image segmentation, and smoke-based image segmentation to capture potential smoke regions which are further analyzed to decide on the occurrence of smoking events. Experimental results show the effectiveness of the proposed approach. As well, the developed method is capable of detecting the small smoking events of uncertain actions with various cigarette sizes, colors, and shapes.

  11. Intrusion Detection System using Self Organizing Map: A Survey

    Directory of Open Access Journals (Sweden)

    Kruti Choksi

    2014-12-01

    Full Text Available Due to usage of computer every field, Network Security is the major concerned in today’s scenario. Every year the number of users and speed of network is increasing, along with it online fraud or security threats are also increasing. Every day a new attack is generated to harm the system or network. It is necessary to protect the system or networks from various threats by using Intrusion Detection System which can detect “known” as well as “unknown” attack and generate alerts if any unusual behavior in the traffic. There are various approaches for IDS, but in this paper, survey is focused on IDS using Self Organizing Map. SOM is unsupervised, fast conversion and automatic clustering algorithm which is able to handle novelty detection. The main objective of the survey is to find and address the current challenges of SOM. Our survey shows that the existing IDS based on SOM have poor detection rate for U2R and R2L attacks. To improve it, proper normalization technique should be used. During the survey we also found that HSOM and GHSOM are advance model of SOM which have their own unique feature for better performance of IDS. GHSOM is efficient due to its low computation time. This survey is beneficial to design and develop efficient SOM based IDS having less computation time and better detection rate.

  12. Photoelectric detection system of inside flaws of metal tube

    Science.gov (United States)

    Lu, Dong; Xiang, Yang; Zhang, Guangwei; Yu, Dachuan

    2000-10-01

    This paper introduces a photoelectric detection system, i.e. the internal surface of the metal tube illuminated by Xenon light through fiber bundle, is imaged on CCD optical receiver by endoscope. The image can be converted to video frequency signal, then this signal can be converted to digital signal by a sampling control system, which processed by a computer. SO the measurement system can clearly display the surface flaws of workspace of complicated construction, and quantitatively measure sorts of flaws by an image processing system.

  13. Statistical Outlier Detection for Jury Based Grading Systems

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Clemmensen, Line Katrine Harder; Rosas, Harvey

    2013-01-01

    This paper presents an algorithm that was developed to identify statistical outliers from the scores of grading jury members in a large project-based first year design course. The background and requirements for the outlier detection system are presented. The outlier detection algorithm...... and the follow-up procedures for score validation and appeals are described in detail. Finally, the impact of various elements of the outlier detection algorithm, their interactions, and the sensitivity of their numerical values are investigated. It is shown that the difference in the mean score produced...... by a grading jury before and after a suspected outlier is removed from the mean is the single most effective criterion for identifying potential outliers but that all of the criteria included in the algorithm have an effect on the outlier detection process....

  14. Optimization of PET system design for lesion detection

    Energy Technology Data Exchange (ETDEWEB)

    Qi, Jinyi

    2000-10-13

    Traditionally, the figures of merit used in designing a PET scanner are spatial resolution, noise equivalent count rate, noise equivalent sensitivity, etc. These measures, however, do not directly reflect the lesion detectability using the PET scanner. Here we propose to optimize PET scanner design directly for lesion detection. The signal-to-noise ratio (SNR) of lesion detection can be easily computed using the theoretical expressions that we have previously derived. Because no time consuming Monte Carlo simulation is needed, the theoretical expressions allow evaluation of a large range of parameters. The PET system parameters can then be chosen to achieve the maximum SNR for lesion detection. The simulation study shown in this paper was focused a single ring PET scanner without depth of interaction measurement. Randoms and scatters were also ignored.

  15. Innovative Detection System of Ochratoxin A by Thin Film Photodiodes

    Directory of Open Access Journals (Sweden)

    Riccardo Scipinotti

    2007-07-01

    Full Text Available In this work we present, for the first time, a rapid, compact and innovativemethod for detection of Ochratoxin A (OTA based on hydrogenated amorphous silicon (a-Si:H sensors. 2 μl of acidified toluene containing OTA at different concentrations werespotted on the silica side of a High Performance Thin Layer Cromatography plate andaligned with a a-Si:H p-i-n photodiode deposited by Plasma Enhanced Chemical VaporDeposition on a different glass substrate. As an UV radiation excites the mycotoxin, the re-emitted light is detected by the a-Si:H sensor. Results show a very good linearity betweenOTA concentration and the sensor photocurrent over almost three orders of magnitude. Theminimum detected OTA concentration is equal to 0.1ng, showing that the presented systemhas the potential for a low cost system suitable for the early detection of toxins in foods.

  16. Planetary Systems Detection, Formation and Habitability of Extrasolar Planets

    CERN Document Server

    Ollivier, Marc; Casoli, Fabienne; Encrenaz, Thérèse; Selsis, Franck

    2009-01-01

    Over the past ten years, the discovery of extrasolar planets has opened a new field of astronomy, and this area of research is rapidly growing, from both the observational and theoretical point of view. The presence of many giant exoplanets in the close vicinity of their star shows that these newly discovered planetary systems are very different from the solar system. New theoretical models are being developed in order to understand their formation scenarios, and new observational methods are being implemented to increase the sensitivity of exoplanet detections. In the present book, the authors address the question of planetary systems from all aspects. Starting from the facts (the detection of more than 300 extraterrestrial planets), they first describe the various methods used for these discoveries and propose a synthetic analysis of their global properties. They then consider the observations of young stars and circumstellar disks and address the case of the solar system as a specific example, different fr...

  17. Dynamic detection for computer virus based on immune system

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2008-01-01

    Inspired by biological immune system,a new dynamic detection model for computer virus based on immune system is proposed.The quantitative description of the model is given.The problem of dynamic description for self and nonself in a computer virus immune system is solved,which reduces the size of self set.The new concept of dynamic tolerance,as well as the new mechanisms of gene evolution and gene coding for immature detectors is presented,improving the generating efficiency of mature detectors,reducing the false-negative and false-positive rates.Therefore,the difficult problem,in which the detector training cost is exponentially related to the size of self-set in a traditional computer immune system,is thus overcome.The theory analysis and experimental results show that the proposed model has better time efficiency and detecting ability than the classic model ARTIS.

  18. Review of current neutron detection systems for emergency response

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul; Kruschwitz, Craig

    2014-09-01

    Neutron detectors are used in a myriad of applications—from safeguarding special nuclear materials (SNM) to determining lattice spacing in soft materials. The transformational changes taking place in neutron detection and imaging techniques in the last few years are largely being driven by the global shortage of helium-3 (3He). This article reviews the status of neutron sensors used specifically for SNM detection in radiological emergency response. These neutron detectors must be highly efficient, be rugged, have fast electronics to measure neutron multiplicity, and be capable of measuring direction of the neutron sources and possibly image them with high spatial resolution. Neutron detection is an indirect physical process: neutrons react with nuclei in materials to initiate the release of one or more charged particles that produce electric signals that can be processed by the detection system. Therefore, neutron detection requires conversion materials as active elements of the detection system; these materials may include boron-10 (10B), lithium-6 (6Li), and gadollinium-157 (157Gd), to name a few, but the number of materials available for neutron detection is limited. However, in recent years, pulse-shape-discriminating plastic scintillators, scintillators made of helium-4 (4He) under high pressure, pillar and trench semiconductor diodes, and exotic semiconductor neutron detectors made from uranium oxide and other materials have widely expanded the parameter space in neutron detection methodology. In this article we will pay special attention to semiconductor-based neutron sensors. Modern microfabricated nanotubes covered inside with neutron converter materials and with very high aspect ratios for better charge transport will be discussed.

  19. Novel space-time multiuser detection algorithm of WCDMA system

    Institute of Scientific and Technical Information of China (English)

    Zhang Xiaofei; Xu Dazhuan; Yang Bei

    2005-01-01

    The structure and performance of space-time multiuser detection receiver at base stations of WCDMA system is analyzed, in which smart antenna is employed. WCDMA uplink signal model is established in this paper. Space-time multiuser receiver presented in this paper combines 2D-RAKE with parallel interference cancellation (PIC), and the improved parallel interference cancellation methods are given. A novel space-time multiuser detection scheme,2DRAKE-GPPIC is proposed. This scheme employs smart antenna to suppress unexpected DOA (Direction Of Arrival) signal, uses RAKE receiver to combine different delays of expected signal, and utilizes grouped partial parallel interference cancellation (GPPIC) algorithm to suppress further the interference signal in the main lobe of array antennas. The simulation results reveal that the scheme of space-time multiuser detection presented in this paper has better performance for WCDMA system.

  20. System for Steam Leak Detection by using CCTV Camera

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Young Chul; Lee, Min Soo; Choi, Hui Ju [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Son, Ki Sung; Jeon, Hyeong Seop [SAEAN.Co., Seoul (Korea, Republic of)

    2012-05-15

    There are many pipes in the secondary cooling systems of nuclear power plants and coal-fired power plants. In these pipes, high pressure fluids are moving with at high velocity, which can cause steam leakage due to pipe thinning. Steam leakage is one of the major issues for the structural fracture of pipes. Therefore, a method to inspect a large area of piping systems quickly and accurately is needed. Steam leakage is almost invisible, because the flow has very high velocity and pressure. Therefore, it is very difficult to detect a steam leakage. In this paper, we proposed the method for detecting steam leakage using image signal processing. Our basic idea comes from a heat shimmer, which shines with a soft light that looks as if it is being shaken slightly. To test the performance of this technique, experiments have been performed for a steam generator. Results show that the proposed technique is quite powerful for steam leak detection

  1. Assessment of Radiation Background Variation for Moving Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Laboratory; Rennie, John Alan [Los Alamos National Laboratory; Toevs, James Waldo [Los Alamos National Laboratory; Wallace, Darrin J. [Los Alamos National Laboratory; Abhold, Mark Edward [Los Alamos National Laboratory

    2015-07-13

    The introduction points out that radiation backgrounds fluctuate across very short distances: factors include geology, soil composition, altitude, building structures, topography, and other manmade structures; and asphalt and concrete can vary significantly over short distances. Brief descriptions are given of the detection system, experimental setup, and background variation measurements. It is concluded that positive and negative gradients can greatly reduce the detection sensitivity of an MDS: negative gradients create opportunities for false negatives (nondetection), and positive gradients create a potentially unacceptable FAR (above 1%); the location of use for mobile detection is important to understand; spectroscopic systems provide more information for screening out false alarms and may be preferred for mobile use; and mobile monitor testing at LANL accounts for expected variations in the background.

  2. Automatic Vehicle License Recognition Based on Video Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; CHEN Yang; HE Yinghua; WU Jun

    2006-01-01

    Traditional methods of license character extraction cannot meet the requirements of recognition accuracy and speed rendered by the video vehicular detection system.Therefore, a license plate localization method based on multi-scale edge detection and a character segmentation algorithm based on Markov random field model is presented.Results of experiments demonstrate that the method yields more accurate license character extraction in contrast to traditional localization method based on edge detection by difference operator and character segmentation based on threshold.The accuracy increases from 90% to 94% under preferable illumination, while under poor condition, it increases more than 5%.When the two improved algorithms are used, the accuracy and speed of automatic license recognition meet the system's requirement even under the noisy circumstance or uneven illumination.

  3. Lock-In Imaging System for Detecting Disturbances in Fluid

    Science.gov (United States)

    Park, Yeonjoon (Inventor); Choi, Sang Hyouk (Inventor); King, Glen C. (Inventor); Elliott, James R. (Inventor); Dimarcantonio, Albert L. (Inventor)

    2014-01-01

    A lock-in imaging system is configured for detecting a disturbance in air. The system includes an airplane, an interferometer, and a telescopic imaging camera. The airplane includes a fuselage and a pair of wings. The airplane is configured for flight in air. The interferometer is operatively disposed on the airplane and configured for producing an interference pattern by splitting a beam of light into two beams along two paths and recombining the two beams at a junction point in a front flight path of the airplane during flight. The telescopic imaging camera is configured for capturing an image of the beams at the junction point. The telescopic imaging camera is configured for detecting the disturbance in air in an optical path, based on an index of refraction of the image, as detected at the junction point.

  4. Detection System Design of Electric Vehicle Wiring Harness

    Institute of Scientific and Technical Information of China (English)

    SUN Jian-Xin; LI Xiao-Peng

    2015-01-01

    This paper introduces a method of harness testing system for electric vehicle wiring harness wiring .The system has implemented some commonly used electric wiring harness state detection using the way of the upper machine and lower machine communicate with each other, Such as normal, open circuit, short circuit, fault, etc. And then the lower machine send the wiring harness status to the upper machine, and then the upper machine parses the line state, and at the same time shows the test results, And then stores the test results in the database. After all, we can call at any time to check the date and the results of detection. It changes the traditional manual test mode of operation and Implements the detection process of automation and intellectualization.

  5. Breathing detection with a portable impedance measurement system: first measurements.

    Science.gov (United States)

    Cordes, Axel; Foussier, Jerome; Leonhardt, Steffen

    2009-01-01

    For monitoring the health status of individuals, detection of breathing and heart activity is important. From an electrical point of view, it is known that breathing and heart activity change the electrical impedance distribution in the human body over the time due to ventilation (high impedance) and blood shifts (low impedance). Thus, it is possible to detect both important vital parameters by measuring the impedance of the thorax or the region around lung and heart. For some measurement scenarios it is also essential to detect these parameters contactless. For instance, monitoring bus drivers health could help to limit accidents, but directly connected systems limit the drivers free moving space. One measurement technology for measuring the impedance changes in the chest without cables is the magnetic impedance tomography (MIT). This article describes a portable measurement system we developed for this scenario that allows to measure breathing contactless. Furthermore, first measurements with five volunteers were performed and analyzed.

  6. Conflict Detection and Merging in Model based SCM Systems

    OpenAIRE

    Waqar Mehmood; Arshad Ali

    2014-01-01

    This study presents a fine-grained approach to the problem of conflict detection and merging in model-based Software Configuration Management (SCM) systems. Traditional SCM systems uses textual or structured data to represent models at fine-grained level. Our approach is based on defining graph structure to represent models data at fine-grained level. The approach is based on transforming the textual or structured data into graph structure and then performing the diff, merge and evolution con...

  7. Developing nucleic acid-based electrical detection systems

    OpenAIRE

    Gabig-Ciminska Magdalena

    2006-01-01

    Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and r...

  8. Analytical applications of MD-FIA-optical detection systems

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A brief introduction of recent research works in our laboratory concerning microdialysis(MD) based on optical detection combined with FIA is made in this mini-review. A biosensor system has been designed and realized the real time in vivo monitoring of some important clinic substances such as calcium, uric acid. The system has also been used to study the in vitro binding of drug-protein.

  9. A Particle Filtering Approach to Change Detection for Nonlinear Systems

    Directory of Open Access Journals (Sweden)

    P. S. Krishnaprasad

    2004-11-01

    Full Text Available We present a change detection method for nonlinear stochastic systems based on particle filtering. We assume that the parameters of the system before and after change are known. The statistic for this method is chosen in such a way that it can be calculated recursively while the computational complexity of the method remains constant with respect to time. We present simulation results that show the advantages of this method compared to linearization techniques.

  10. Developing nucleic acid-based electrical detection systems

    OpenAIRE

    Gabig-Ciminska Magdalena

    2006-01-01

    Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and r...

  11. All-to-all sequenced fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D.; Smith, Brian Edward

    2010-11-02

    An apparatus, program product and method enable nodal fault detection by sequencing communications between all system nodes. A master node may coordinate communications between two slave nodes before sequencing to and initiating communications between a new pair of slave nodes. The communications may be analyzed to determine the nodal fault.

  12. Investigation of the Bruce B delayed neutron detection system

    Energy Technology Data Exchange (ETDEWEB)

    Carriere, O. [Bruce Power, Plant Design Engineering, Chemistry Design, Tiverton, Ontario (Canada); Univ. of Ottawa, Chemical Engineering, Ottawa, Ontario (Canada)

    2003-07-01

    My work at Bruce Power was to investigate the sensitivity of the Bruce B Delayed Neutron Detection System. Specifically the requirement was to determine whether (software) manipulation of data alone would improve sensitivity or whether hardware changes would also be required. This paper will describe the analyses of current and historical data and the results thereof. (author)

  13. Corner Detection Based on Human Visual System Model

    Institute of Scientific and Technical Information of China (English)

    LU Xiaoguang; ZHOU Jie

    2001-01-01

    Corners are useful features in computer vision tasks.In this paper,we present an algorithm for corner detection based on a human visual system model.Experimental results proved that it ismore effective than conventional corner detector under uneven illumination conditions.

  14. Towards Improved Airborne Fire Detection Systems Using Beetle Inspired Infrared Detection and Fire Searching Strategies

    Directory of Open Access Journals (Sweden)

    Herbert Bousack

    2015-06-01

    Full Text Available Every year forest fires cause severe financial losses in many countries of the world. Additionally, lives of humans as well as of countless animals are often lost. Due to global warming, the problem of wildfires is getting out of control; hence, the burning of thousands of hectares is obviously increasing. Most important, therefore, is the early detection of an emerging fire before its intensity becomes too high. More than ever, a need for early warning systems capable of detecting small fires from distances as large as possible exists. A look to nature shows that pyrophilous “fire beetles” of the genus Melanophila can be regarded as natural airborne fire detection systems because their larvae can only develop in the wood of fire-killed trees. There is evidence that Melanophila beetles can detect large fires from distances of more than 100 km by visual and infrared cues. In a biomimetic approach, a concept has been developed to use the surveying strategy of the “fire beetles” for the reliable detection of a smoke plume of a fire from large distances by means of a basal infrared emission zone. Future infrared sensors necessary for this ability are also inspired by the natural infrared receptors of Melanophila beetles.

  15. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    Energy Technology Data Exchange (ETDEWEB)

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  16. A Multiple-Channel Sub-Band Transient Detection System

    Energy Technology Data Exchange (ETDEWEB)

    David A. Smith

    1998-11-01

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of

  17. INFERNO: a system for early outbreak detection and signature forecasting.

    Science.gov (United States)

    Naumova, Elena N; O'Neil, E; MacNeill, I

    2005-08-26

    Public health surveillance systems that monitor daily disease incidence provide valuable information about threats to public health and enable public health authorities to detect enteric outbreaks rapidly. This report describes the INtegrated Forecasts and EaRly eNteric Outbreak (INFERNO) detection system of algorithms for outbreak detection and forecasting. INFERNO incorporates existing knowledge of infectious disease epidemiology into adaptive forecasts and uses the concept of an outbreak signature as a composite of disease epidemic curves. Four main components comprise the system: 1) training, 2) warning and flagging, 3) signature forecasting, and 4) evaluation. The unifying goal of the system is to gain insight into the nature of temporal variations in the incidence of infection. Daily collected records are smoothed initially by using a loess-type smoother. Upon receipt of new data, the smoothing is updated; estimates are made of the first two derivatives of the smoothed curve, which are used for near-term forecasting. Recent data and near-term forecasts are used to compute a five level, color-coded warning index to quantify the level of concern. Warning algorithms are designed to balance false detection of an epidemic (Type I errors) with failure to correctly detect an epidemic (Type II errors). If the warning index signals a sufficiently high probability of an epidemic, the fitting of a gamma-based signature curve to the actual data produces a forecast of the possible size of the outbreak. Although the system is under development, its potential has been demonstrated through successful use of emergency department records associated with a substantial waterborne outbreak of cryptosporidiosis that occurred in Milwaukee, Wisconsin, in 1993. Prospects for further development, including adjustment for seasonality and reporting delays, are also outlined.

  18. Spatial Cloud Detection and Retrieval System for Satellite Images

    Directory of Open Access Journals (Sweden)

    Ayman Nasr

    2013-01-01

    Full Text Available In last the decade we witnessed a large increase in data generated by earth observing satellites. Hence, intelligent processing of the huge amount of data received by hundreds of earth receiving stations, with specific satellite image oriented approaches, presents itself as a pressing need. One of the most important steps in earlier stages of satellite image processing is cloud detection. Satellite images having a large percentage of cloud cannot be used in further analysis. While there are many approaches that deal with different semantic meaning, there are rarely approaches that deal specifically with cloud detection and retrieval. In this paper we introduce a novel approach that spatially detect and retrieve clouds in satellite images using their unique properties .Our approach is developed as spatial cloud detection and retrieval system (SCDRS that introduce a complete framework for specific semantic retrieval system. It uses a Query by polygon (QBP paradigm for the content of interest instead of using the more conventional rectangular query by image approach. First, we extract features from the satellite images using multiple tile sizes using spatial and textural properties of cloud regions. Second, we retrieve our tiles using a parametric statistical approach within a multilevel refinement process. Our approach has been experimentally validated against the conventional ones yielding enhanced precision and recall rates in the same time it gives more precise detection of cloud coverage regions.

  19. Novel approach for low-cost muzzle flash detection system

    Science.gov (United States)

    Voskoboinik, Asher

    2008-04-01

    A low-cost muzzle flash detection based on CMOS sensor technology is proposed. This low-cost technology makes it possible to detect various transient events with characteristic times between dozens of microseconds up to dozens of milliseconds while sophisticated algorithms successfully separate them from false alarms by utilizing differences in geometrical characteristics and/or temporal signatures. The proposed system consists of off-the-shelf smart CMOS cameras with built-in signal and image processing capabilities for pre-processing together with allocated memory for storing a buffer of images for further post-processing. Such a sensor does not require sending giant amounts of raw data to a real-time processing unit but provides all calculations in-situ where processing results are the output of the sensor. This patented CMOS muzzle flash detection concept exhibits high-performance detection capability with very low false-alarm rates. It was found that most false-alarms due to sun glints are from sources at distances of 500-700 meters from the sensor and can be distinguished by time examination techniques from muzzle flash signals. This will enable to eliminate up to 80% of falsealarms due to sun specular reflections in the battle field. Additional effort to distinguish sun glints from suspected muzzle flash signal is made by optimization of the spectral band in Near-IR region. The proposed system can be used for muzzle detection of small arms, missiles and rockets and other military applications.

  20. Digital Signal Processing Based Real Time Vehicular Detection System

    Institute of Scientific and Technical Information of China (English)

    YANG Zhaoxuan; LIN Tao; LI Xiangping; LIU Chunyi; GAO Jian

    2005-01-01

    Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.

  1. Sensor integration study for a shallow tunnel detection system.

    Energy Technology Data Exchange (ETDEWEB)

    Yee, Mark L.; Abbott, Robert E.; Bonal, Nedra; Elbring, Gregory Jay; Senglaub, Michael E.

    2010-02-01

    During the past several years, there has been a growing recognition of the threats posed by the use of shallow tunnels against both international border security and the integrity of critical facilities. This has led to the development and testing of a variety of geophysical and surveillance techniques for the detection of these clandestine tunnels. The challenges of detection of these tunnels arising from the complexity of the near surface environment, the subtlety of the tunnel signatures themselves, and the frequent siting of these tunnels in urban environments with a high level of cultural noise, have time and again shown that any single technique is not robust enough to solve the tunnel detection problem in all cases. The question then arises as to how to best combine the multiple techniques currently available to create an integrated system that results in the best chance of detecting these tunnels in a variety of clutter environments and geologies. This study utilizes Taguchi analysis with simulated sensor detection performance to address this question. The analysis results show that ambient noise has the most effect on detection performance over the effects of tunnel characteristics and geological factors.

  2. Alcohol Detection and Automatic Drunken Drive Avoiding System

    Directory of Open Access Journals (Sweden)

    Prof. P. H. Kulkarni

    2014-04-01

    Full Text Available The main aim of this project is to design an embedded system for implementing a efficient alcohol detection system that will be useful to avoid accidents. There are many different types of accidents which occur in daily life. Accidents may cause due to many reasons it may be due to brake fail. Most often accidents occur due to over drunken person. Though there are laws to punish drunken drivers they cannot be fully implemented. Because traffic police cannot stand on every road to check each and every car driver whether he/she has drunk or not. This can be a major reason for accidents. So there is a need for a effective system to check drunken drivers. Therefore in order to avoid these accidents we have implemented a prototype project. In our project, Initially we check whether the person has drunken or not by using the MQ3 GAS sensor. In this system, sensor circuit is used to detect whether the alcohol was consumed by driver or not. To this end, we have designed such a system that when alcohol concentration is detected then car will be stopped and the related information will go to nearby location through GSM. This project is based on EMBEDDED C programming using AVR-AT mega 16 microcontroller.

  3. Automatic fault detection on BIPV systems without solar irradiation data

    CERN Document Server

    Leloux, Jonathan; Luna, Alberto; Desportes, Adrien

    2014-01-01

    BIPV systems are small PV generation units spread out over the territory, and whose characteristics are very diverse. This makes difficult a cost-effective procedure for monitoring, fault detection, performance analyses, operation and maintenance. As a result, many problems affecting BIPV systems go undetected. In order to carry out effective automatic fault detection procedures, we need a performance indicator that is reliable and that can be applied on many PV systems at a very low cost. The existing approaches for analyzing the performance of PV systems are often based on the Performance Ratio (PR), whose accuracy depends on good solar irradiation data, which in turn can be very difficult to obtain or cost-prohibitive for the BIPV owner. We present an alternative fault detection procedure based on a performance indicator that can be constructed on the sole basis of the energy production data measured at the BIPV systems. This procedure does not require the input of operating conditions data, such as solar ...

  4. DAIDALUS: Detect and Avoid Alerting Logic for Unmanned Systems

    Science.gov (United States)

    Munoz, Cesar; Narkawicz, Anthony; Hagen, George; Upchurch, Jason; Dutle, Aaron; Consiglio, Maria; Chamberlain, James

    2015-01-01

    This paper presents DAIDALUS (Detect and Avoid Alerting Logic for Unmanned Systems), a reference implementation of a detect and avoid concept intended to support the integration of Unmanned Aircraft Systems into civil airspace. DAIDALUS consists of self-separation and alerting algorithms that provide situational awareness to UAS remote pilots. These algorithms have been formally specified in a mathematical notation and verified for correctness in an interactive theorem prover. The software implementation has been verified against the formal models and validated against multiple stressing cases jointly developed by the US Air Force Research Laboratory, MIT Lincoln Laboratory, and NASA. The DAIDALUS reference implementation is currently under consideration for inclusion in the appendices to the Minimum Operational Performance Standards for Unmanned Aircraft Systems presently being developed by RTCA Special Committee 228.

  5. An in-house developed annular bright field detection system

    Science.gov (United States)

    Lari, Leonardo; Wright, Ian; Pingstone, Daniel; Steward, Jonathan; Gilks, Daniel; Lazarov, Vlado K.

    2014-06-01

    Annular bright field (ABF) detectors have been developed in the last few years allowing the direct imaging of low-Z atoms from oxygen down to hydrogen. These types of detectors are now available as standard attachments for the latest generation of top-end electron microscopes. However these systems cannot always be installed in previous generation microscopes. In this paper we report the preliminary results of an in-house implementation of a ABF detection system on a CEOS aberration corrected JEOL 2200FS STEM. This has been obtained by exploiting the standard BF detector coupled with a high vacuum compatible, X-ray tight and retractable shadowing mechanism. This results in the acquisition of near zero-angle scattered electrons with inner collection semi-angle from 2.0 mrad to 23 mrad and outer semi-angle in the range from 3.0 mrad to 35 mrad. The characteristics and performances of this ABF detection system are discussed.

  6. Understanding Gravitational Waves from Inspiral Binary Systems and its Detection

    CERN Document Server

    Antelis, Javier M

    2016-01-01

    The discovery of the events GW150926 and GW151226 has experimentally confirmed the existence of gravitational waves (GW) and has demonstrated the existence of binary stellar-mass black hole systems. This finding marks the beginning of a new era that will reveal unexpected features of our universe. This work presents a basic insight to the fundamental theory of GW emitted by inspiral binary systems and describes the scientific and technological efforts developed to measure this waves using the interferometer-based detector called LIGO. Subsequently, the work proposes a comprehensive data analysis methodology based on the matched filter algorithm which aims to detect GW signals emitted by inspiral binary systems of astrophysical sources. The method is validated with freely available LIGO data which contain injected GW signals. Results of experiments performed to assess detection carried out show that the method was able to recover the 85% of the injected GW.

  7. Moving Object Detection in Heterogeneous Conditions in Embedded Systems

    Directory of Open Access Journals (Sweden)

    Alessandro Garbo

    2017-07-01

    Full Text Available This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory resources. We run experimental results on several video sequences (both home-made and publicly available, showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  8. Internet Intrusion Detection System Service in a Cloud

    Directory of Open Access Journals (Sweden)

    Amirreza Zarrabi

    2012-09-01

    Full Text Available Intrusion Detection Systems (IDS have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and signs of attack. IDS aroused the concern of users as an important computer network security technology. In recent times, with the advent of Cloud Computing, the concepts of Software as a Service (SaaS, where vendors provide key software products as services over the internet that can be accessed by users to perform complex tasks, have become increasingly popular. Cloud Computing is a method to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. We introduce a Cloud Intrusion Detection System Services (CIDSS which is developed based on Cloud Computing and can make up for the deficiency of traditional intrusion detection, and proved to be great scalable. CIDSS can be utilized to overcome the critical challenge of keeping the client secure from cyber attacks while benefit the features which are presented by Cloud Computing technology.

  9. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳俊; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting human faces in color images. The algorithm consists of three image processing steps. The first step is human skin color statistics. Then it separates skin regions from non-skin regions. After that, it locates the frontal human face(s) within the skin regions. In the first step, 250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors. This chroma chart is used to generate, from the original color image, a gray scale image whose gray value at a pixel shows its likelihood of representing the skin. The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into separate skin regions from non skin regions. Finally, multiple face templates matching is used to determine if a given skin region represents a frontal human face or not. Test of the system with more than 400 color images showed that the resulting detection rate was 83%, which is better than most color-based face detection systems. The average speed for face detection is 0.8 second/image (400×300 pixels) on a Pentium 3 (800MHz) PC.

  10. E-commerce Review System to Detect False Reviews.

    Science.gov (United States)

    Kolhar, Manjur

    2017-08-15

    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we proposed an e-commerce review system framework developed using the cumulative sum method to detect and remove malicious review ratings.

  11. Noninvasive biological sensor system for detection of drunk driving.

    Science.gov (United States)

    Murata, Kohji; Fujita, Etsunori; Kojima, Shigeyuki; Maeda, Shinitirou; Ogura, Yumi; Kamei, Tsutomu; Tsuji, Toshio; Kaneko, Shigehiko; Yoshizumi, Masao; Suzuki, Nobutaka

    2011-01-01

    Systems capable of monitoring the biological condition of a driver and issuing warnings during instances of drowsiness have recently been studied. Moreover, many researchers have reported that biological signals, such as brain waves, pulsation waves, and heart rate, are different between people who have and have not consumed alcohol. Currently, we are developing a noninvasive system to detect individuals driving under the influence of alcohol by measuring biological signals. We used the frequency time series analysis to attempt to distinguish between normal and intoxicated states of a person as the basis of the sensing system.

  12. Fluorescence video endoscopic system for early cancer detection

    Science.gov (United States)

    Lytle, A. Charles; Dunn, J. B.; Paspa, Paul M.; Doiron, Daniel R.; Balchum, Oscar J.

    1990-06-01

    A video system is being developed to allow the detection of cancerous lesions that are too small to be accurately identified visually or with x-ray. The system makes use of standard endoscopes and provides a video display of both the color image and a false color fluorescence image, with automated switching between the two views. Excitation of the fluorescence marker, Heinatoporphyrin Derivative (HpD) , or it ' 5 purified form , diheinatoporphyrin ether! ester (DHE) , is provided by a krypton ion laser operating in the violet. A brief discussion of fluorescence diagnostic theory and a description of the prototype system, its clinical use , and performance is reviewed.

  13. A Weld Defects Detection System Based on a Spectrometer

    Directory of Open Access Journals (Sweden)

    Sadek C. A. Alfaro

    2009-04-01

    Full Text Available Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects.

  14. Towards a global flood detection system using social media

    Science.gov (United States)

    de Bruijn, Jens; de Moel, Hans; Jongman, Brenden; Aerts, Jeroen

    2017-04-01

    It is widely recognized that an early warning is critical in improving international disaster response. Analysis of social media in real-time can provide valuable information about an event or help to detect unexpected events. For successful and reliable detection systems that work globally, it is important that sufficient data is available and that the algorithm works both in data-rich and data-poor environments. In this study, both a new geotagging system and multi-level event detection system for flood hazards was developed using Twitter data. Geotagging algorithms that regard one tweet as a single document are well-studied. However, no algorithms exist that combine several sequential tweets mentioning keywords regarding a specific event type. Within the time frame of an event, multiple users use event related keywords that refer to the same place name. This notion allows us to treat several sequential tweets posted in the last 24 hours as one document. For all these tweets, we collect a series of spatial indicators given in the tweet metadata and extract additional topological indicators from the text. Using these indicators, we can reduce ambiguity and thus better estimate what locations are tweeted about. Using these localized tweets, Bayesian change-point analysis is used to find significant increases of tweets mentioning countries, provinces or towns. In data-poor environments detection of events on a country level is possible, while in other, data-rich, environments detection on a city level is achieved. Additionally, on a city-level we analyse the spatial dependence of mentioned places. If multiple places within a limited spatial extent are mentioned, detection confidence increases. We run the algorithm using 2 years of Twitter data with flood related keywords in 13 major languages and validate against a flood event database. We find that the geotagging algorithm yields significantly more data than previously developed algorithms and successfully deals

  15. Simulated performance of a position sensitive radiation detecting system (COCAE)

    CERN Document Server

    Karafasoulis, K; Seferlis, S; Kaissas, I; Lambropoulos, C; Loukas, D; Poritiriadis, C

    2011-01-01

    Extensive simulations of a portable radiation detecting system have been performed in order to explore important performance parameters. The instrument consists of a stack of ten detecting layers made of pixelated Cadmium Telluride (CdTe) crystals. Its aim is to localize and identify radiation sources, by exploiting the Compton imaging technique. In this paper we present performance parameters based on simulation studies. Specifically the ratio of incompletely absorbed photons, the detector's absolute efficiency as well as its energy and angular resolution are evaluated in a wide range of incident photon energies.

  16. Soft-Fault Detection Technologies Developed for Electrical Power Systems

    Science.gov (United States)

    Button, Robert M.

    2004-01-01

    The NASA Glenn Research Center, partner universities, and defense contractors are working to develop intelligent power management and distribution (PMAD) technologies for future spacecraft and launch vehicles. The goals are to provide higher performance (efficiency, transient response, and stability), higher fault tolerance, and higher reliability through the application of digital control and communication technologies. It is also expected that these technologies will eventually reduce the design, development, manufacturing, and integration costs for large, electrical power systems for space vehicles. The main focus of this research has been to incorporate digital control, communications, and intelligent algorithms into power electronic devices such as direct-current to direct-current (dc-dc) converters and protective switchgear. These technologies, in turn, will enable revolutionary changes in the way electrical power systems are designed, developed, configured, and integrated in aerospace vehicles and satellites. Initial successes in integrating modern, digital controllers have proven that transient response performance can be improved using advanced nonlinear control algorithms. One technology being developed includes the detection of "soft faults," those not typically covered by current systems in use today. Soft faults include arcing faults, corona discharge faults, and undetected leakage currents. Using digital control and advanced signal analysis algorithms, we have shown that it is possible to reliably detect arcing faults in high-voltage dc power distribution systems (see the preceding photograph). Another research effort has shown that low-level leakage faults and cable degradation can be detected by analyzing power system parameters over time. This additional fault detection capability will result in higher reliability for long-lived power systems such as reusable launch vehicles and space exploration missions.

  17. A Simulated Multiagent-Based Architecture for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Onashoga S. Adebukola

    2013-04-01

    Full Text Available In this work, a Multiagent-based architecture for Intrusion Detection System (MIDS is proposed to overcome the shortcoming of current Mobile Agent-based Intrusion Detection System. MIDS is divided into three major phases namely: Data gathering, Detection and the Response phases. The data gathering stage involves data collection based on the features in the distributed system and profiling. The data collection components are distributed on both host and network. Closed Pattern Mining (CPM algorithm is introduced for profiling users’ activities in network database. The CPM algorithm is built on the concept of Frequent Pattern-growth algorithm by mining a prefix-tree called CPM-tree, which contains only the closed itemsets and its associated support count. According to the administrator’s specified thresholds, CPM-tree maintains only closed patterns online and incrementally outputs the current closed frequent pattern of users’ activities in real time. MIDS makes use of mobile and static agents to carry out the functions of intrusion detection. Each of these agents is built with rule-based reasoning to autonomously detect intrusions. Java 1.1.8 is chosen as the implementation language and IBM’s Java based mobile agent framework, Aglet 1.0.3 as the platform for running the mobile and static agents. In order to test the robustness of the system, a real-time simulation is carried out on University of Agriculture, Abeokuta (UNAAB network dataset and the results showed an accuracy of 99.94%, False Positive Rate (FPR of 0.13% and False Negative Rate (FNR of 0.04%. This shows an improved performance of MIDS when compared with other known MA-IDSs.

  18. Power system distributed oscilation detection based on Synchrophasor data

    Science.gov (United States)

    Ning, Jiawei

    Along with increasing demand for electricity, integration of renewable energy and deregulation of power market, power industry is facing unprecedented challenges nowadays. Within the last couple of decades, several serious blackouts have been taking place in United States. As an effective approach to prevent that, power system small signal stability monitoring has been drawing more interests and attentions from researchers. With wide-spread implementation of Synchrophasors around the world in the last decade, power systems real-time online monitoring becomes much more feasible. Comparing with planning study analysis, real-time online monitoring would benefit control room operators immediately and directly. Among all online monitoring methods, Oscillation Modal Analysis (OMA), a modal identification method based on routine measurement data where the input is unmeasured ambient excitation, is a great tool to evaluate and monitor power system small signal stability. Indeed, high sampling Synchrophasor data around power system is fitted perfectly as inputs to OMA. Existing methods in OMA for power systems are all based on centralized algorithms applying at control centers only; however, with rapid growing number of online Synchrophasors the computation burden at control centers is and will be continually exponentially expanded. The increasing computation time at control center compromises the real-time feature of online monitoring. The communication efforts between substation and control center will also be out of reach. Meanwhile, it is difficult or even impossible for centralized algorithms to detect some poorly damped local modes. In order to avert previous shortcomings of centralized OMA methods and embrace the new changes in the power systems, two new distributed oscillation detection methods with two new decentralized structures are presented in this dissertation. Since the new schemes brought substations into the big oscillation detection picture, the proposed

  19. A novel mobile system for radiation detection and monitoring

    Science.gov (United States)

    Biafore, Mauro

    2014-05-01

    A novel mobile system for real time, wide area radiation surveillance has been developed within the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). The REWARD sensing units are small, mobile portable units with low energy consumption, which consist of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit is integrated by a wireless communication interface to send the data remotely to a monitoring base station as well as a GPS system to calculate the position of the tag. The system also incorporates middleware and high-level software to provide web-service interfaces for the exchange of information. A central monitoring and decision support system has been designed to process the data from the sensing units and to compare them with historical record in order to generate an alarm when an abnormal situation is detected. A security framework ensures protection against unauthorized access to the network and data, ensuring the privacy of the communications and contributing to the overall robustness and reliability of the REWARD system. The REWARD system has been designed for many different scenarios such as nuclear terrorism threats, lost radioactive sources, radioactive contamination or nuclear accidents. It can be deployed in emergency units and in general in any type of mobile or static equipment, but also inside public/private buildings or infrastructures. The complete system is scalable in terms of complexity and cost and offers very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system allows for a realistic introduction to the market. Authorities may start with a basic, low cost system and increase the complexity based on their

  20. A distributed signature detection method for detecting intrusions in sensor systems.

    Science.gov (United States)

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  1. Detection and classification results for an impulse radar mine detection system

    Science.gov (United States)

    Ericsson, Anders; Gustafsson, Anders

    1997-07-01

    At Sweden's Defence Research Establishment, FOA, a hand-held mine detection device is under development. The system is based on impulse radar technique, which due to its large band width, has shown to be an effective means to find objects buried shallow in the ground. Working with radar technique gives an obvious advantage compared to e.g., metal detectors when searching for plastic mines, or when the search is performed in an area highly contaminated with metal fragments or when the soil itself is rich of ferrite. The paper concentrates on detection and classification of minelike objects from measurements in an indoor testing environment. The focus is on evaluating how methods, partly already successfully proven, work in a 'difficult' environment, namely extremely dry sand. The result shows that metal objects and a stone that was used as object, are fairly easy to detect and to classify correct. The fact that the stone is classifiable, means that the false alarm rate can be reduced. It is also possible to detect a nylon cylinder, but here is the result quite sensitive to parameters of the detection algorithm. This is due to that the permittivity of the sand in the experiment is extremely low and close to the one for nylon. For the same reason, a non-metallic AP mine is not detectable or classifiable in the dry sand. The results indicate that even thought he methods work in more normal environments, other detection and classification algorithms than the presented ones have to be used in extreme cases like this one, in order ensure the function of the device.

  2. A fault detection and isolation filter for discrete linear systems.

    Science.gov (United States)

    Giovanini, L; Dondo, R

    2003-10-01

    The problem of fault and/or abrupt disturbances detection and isolation for discrete linear systems is analyzed in this work. A strategy for detecting and isolating faults and/or abrupt disturbances is presented. The strategy is an extension of an already existing result in the continuous time domain to the discrete domain. The resulting detection algorithm is a Kalman filter with a special structure. The filter generates a residuals vector in such a way that each element of this vector is related with one fault or disturbance. Therefore the effects of the other faults, disturbances, and measurement noises in this element are minimized. The necessary stability and convergence conditions are briefly exposed. A numerical example is also presented.

  3. A Computer-Aided Detection System for Digital Chest Radiographs

    Directory of Open Access Journals (Sweden)

    Juan Manuel Carrillo-de-Gea

    2016-01-01

    Full Text Available Computer-aided detection systems aim at the automatic detection of diseases using different medical imaging modalities. In this paper, a novel approach to detecting normality/pathology in digital chest radiographs is proposed. The problem tackled is complicated since it is not focused on particular diseases but anything that differs from what is considered as normality. First, the areas of interest of the chest are found using template matching on the images. Then, a texture descriptor called local binary patterns (LBP is computed for those areas. After that, LBP histograms are applied in a classifier algorithm, which produces the final normality/pathology decision. Our experimental results show the feasibility of the proposal, with success rates above 87% in the best cases. Moreover, our technique is able to locate the possible areas of pathology in nonnormal radiographs. Strengths and limitations of the proposed approach are described in the Conclusions.

  4. Design and Implementation of Domain Hijacking Detection System

    Directory of Open Access Journals (Sweden)

    Xue Jupo

    2015-01-01

    Full Text Available As the basement of Internet application, DNS plays a very critical role in the network running. On Jan. 21st, 2014, the occurrence of a serious DNS hijacking in Internet has aroused the attentions to the DNS security incident again. This paper comes up with a new method to detect DSN hijacking through the construction of a high-speed cache in terms of the corresponding relation between domain name and server IP. With this method, we build a cache with the domain name and the IP. With this cache, domain name can be detected if DSN hijacking happens in DNS cache server and this system can detect domain name hijacking efficiently after it happens.

  5. Tomato seeds maturity detection system based on chlorophyll fluorescence

    Science.gov (United States)

    Li, Cuiling; Wang, Xiu; Meng, Zhijun

    2016-10-01

    Chlorophyll fluorescence intensity can be used as seed maturity and quality evaluation indicator. Chlorophyll fluorescence intensity of seed coats is tested to judge the level of chlorophyll content in seeds, and further to judge the maturity and quality of seeds. This research developed a detection system of tomato seeds maturity based on chlorophyll fluorescence spectrum technology, the system included an excitation light source unit, a fluorescent signal acquisition unit and a data processing unit. The excitation light source unit consisted of two high power LEDs, two radiators and two constant current power supplies, and it was designed to excite chlorophyll fluorescence of tomato seeds. The fluorescent signal acquisition unit was made up of a fluorescence spectrometer, an optical fiber, an optical fiber scaffolds and a narrowband filter. The data processing unit mainly included a computer. Tomato fruits of green ripe stage, discoloration stage, firm ripe stage and full ripe stage were harvested, and their seeds were collected directly. In this research, the developed tomato seeds maturity testing system was used to collect fluorescence spectrums of tomato seeds of different maturities. Principal component analysis (PCA) method was utilized to reduce the dimension of spectral data and extract principal components, and PCA was combined with linear discriminant analysis (LDA) to establish discriminant model of tomato seeds maturity, the discriminant accuracy was greater than 90%. Research results show that using chlorophyll fluorescence spectrum technology is feasible for seeds maturity detection, and the developed tomato seeds maturity testing system has high detection accuracy.

  6. Network Intrusion Detection System Based On Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Vipin Das

    2010-12-01

    Full Text Available Network and system security is of paramount importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured system evolution. Intrusion Detection Systems (IDS are one of these solutions. The main function of Intrusion Detection System is to protect the resources from threats. It analyzes and predicts the behaviours of users, and then these behaviours will be considered an attack or a normal behaviour. We use Rough Set Theory (RST and Support Vector Machine (SVM to detect network intrusions. First, packets are captured from the network, RST is used to pre-process the data and reduce the dimensions. The features selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments compare the results with Principal Component Analysis (PCA and show RST and SVM schema could reduce the false positive rate and increase the accuracy.

  7. Error detection and prevention in Embedded Systems Software

    DEFF Research Database (Denmark)

    Kamel, Hani Fouad

    1996-01-01

    Despite many efforts to structure the development and design processes of embedded systems, errors are discovered at the final stages of production and sometimes after the delivery of the products. The cost of such errors can be prohibitive.Different design techniques to detect such errors...... systems, a formal model for such systems is introduced. The main characteristics of embedded systems design and the interaction of these properties are described. A taxonomy for the structure of the software developed for such systems based on the amount of processes and processors involved is presented...... will be presented. Moreover, we will try to describe the causes of these errors and the countermeasures that can be taken to avoid them. The main theme is that prevention is better than cure.The presentation is structured in three parts. The first part deals with an introduction to the subject area of embedded...

  8. Immune System Approaches to Intrusion Detection - A Review

    CERN Document Server

    Kim, Jungwon; Aickelin, Uwe; Greensmith, Julie; Tedesco, Gianni; Twycross, Jamie

    2008-01-01

    The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

  9. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    Science.gov (United States)

    2001-02-01

    beach . They would like to design a system that is rugged enough to withstand the forces associated with delivery (14,000 gs/300rev/sec), miniaturized...Detection nand Identification with Field Analytical Instrumentation, Volume 3, Issues 4-5, 1999 Spencer, Carmen , Director, CB Defense Directorate...oxidation process and the ruthenium chelate is recycled . The labeled component is captured on the surface of para-magnetic beads which are brought to

  10. Adaptive Road Crack Detection System by Pavement Classification

    Directory of Open Access Journals (Sweden)

    Alejandro Amírola

    2011-10-01

    Full Text Available This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement.

  11. Adaptive Road Crack Detection System by Pavement Classification

    Science.gov (United States)

    Gavilán, Miguel; Balcones, David; Marcos, Oscar; Llorca, David F.; Sotelo, Miguel A.; Parra, Ignacio; Ocaña, Manuel; Aliseda, Pedro; Yarza, Pedro; Amírola, Alejandro

    2011-01-01

    This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS) with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement. PMID:22163717

  12. Dynamic analysis methods for detecting anomalies in asynchronously interacting systems

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Akshat; Solis, John Hector; Matschke, Benjamin

    2014-01-01

    Detecting modifications to digital system designs, whether malicious or benign, is problematic due to the complexity of the systems being analyzed. Moreover, static analysis techniques and tools can only be used during the initial design and implementation phases to verify safety and liveness properties. It is computationally intractable to guarantee that any previously verified properties still hold after a system, or even a single component, has been produced by a third-party manufacturer. In this paper we explore new approaches for creating a robust system design by investigating highly-structured computational models that simplify verification and analysis. Our approach avoids the need to fully reconstruct the implemented system by incorporating a small verification component that dynamically detects for deviations from the design specification at run-time. The first approach encodes information extracted from the original system design algebraically into a verification component. During run-time this component randomly queries the implementation for trace information and verifies that no design-level properties have been violated. If any deviation is detected then a pre-specified fail-safe or notification behavior is triggered. Our second approach utilizes a partitioning methodology to view liveness and safety properties as a distributed decision task and the implementation as a proposed protocol that solves this task. Thus the problem of verifying safety and liveness properties is translated to that of verifying that the implementation solves the associated decision task. We develop upon results from distributed systems and algebraic topology to construct a learning mechanism for verifying safety and liveness properties from samples of run-time executions.

  13. Detection of Septic System Performance via Remote Sensing Technologies

    Science.gov (United States)

    Patterson, A. H.; Kuszmaul, J. S.; Harvey, C.

    2005-05-01

    Failing and improperly managed septic systems can affect water quality in their environs and cause health problems for individuals or community residents. When unchecked, failing systems can allow disease-causing pathogens to enter groundwater aquifers and pollute surface waters, contaminating drinking water, recreational waterways, and fishing grounds. Early detection of septic system leakage and failure can limit the extent of these problems. External symptoms which occur over an improperly functioning septic system can include lush or greener growth of vegetation, distress of vegetation, excessive soil moisture levels, or pooling of surface effluent. The use of remote sensing technologies coupled with attainable permit records to successfully identify these features could enable the appropriate agencies to target problem areas without extensive field inspection. High-resolution, airborne imagery was identified as having the potential to detect relative changes in soil moisture, to delineate individual leach fields, and to locate effluent discharges into water bodies. In addition, vegetation patterns responding to nutrient-rich effluent and increased soil moisture could be examined using a vegetation index. Both thermal- and color-infrared imagery were acquired for a study area in Jackson County, Mississippi, adjacent to the Gulf of Mexico. Within this coastal neighborhood known to have significant septic system failures, over 50 volunteer residents supplied information regarding the function of their systems and access to their property. Following data collection, regression methods were used to nominate the major indicators of malfunctioning systems. A ranking system for the "level of function" was derived from these analyses. A model was created which inputs data from attainable records and imagery analysis and outputs a predicted level of septic system function. The end product of this research will permit evaluation of septic system performance to be

  14. [Immunochromatographic Test System for the Detection of T-2 Toxin].

    Science.gov (United States)

    Petrakova, A V; Urusova, A E; Voznyak, M V; Zherdeva, A V; Dzantiev, B B

    2015-01-01

    An immunochromatographic test system was developed for the detection of T-2 toxin (T2T), which is one of priority contaminants of cereals. The detection is based on the competition between T2T in the sample and the T2T-protein conjugate immobilized on the test strip for the binding to the complexes of anti-T2T antibodies with gold nanoparticles serving as the marker. The results of the competition are recorded as the coloration in the test zone of the test strip produced by the marker. The optimum dilution of the sample for the reliable high-sensitivity analysis corresponds to the final methanol concentration equal to 20%. The deceleration of the movement of reactants along the test strip due to the use of additional membranes impregnated with 10% BSA resulted in the decrease in the detection limit of T2T. The test system was examined for the detection of T2T in water-methanol extracts of maize grains. The disappearance of the color in the test zone, which attests to the presence of mycotoxin, was observed for grain samples containing T2T at a concentration of 53 μg/kg or more (the final T2T concentration in the immunochromatorgaphic assay is 3 ng/mL). The video-digital detection limit of T2T is 16 μg/kg (0.9 ng/mL). The duration of the assay is 15 min. The results of the present study suggest that the developed test system is suitable for the control of the maximum allowable T2T content.

  15. Multi-planet extrasolar systems-detection and dynamics

    Institute of Scientific and Technical Information of China (English)

    Cristian Beaugé; Sylvio Ferraz-Mello; Tatiana A.Michtchenko

    2012-01-01

    20 years after the discovery of the first planets outside our solar system,the current exoplanetary population includes more than 700 confirmed planets around main sequence stars.Approximately 50% belong to multiple-planet systems in very diverse dynamical configurations,from two-planet hierarchical systems to multiple resonances that could only have been attained as the consequence of a smooth largescale orbital migration.The first part of this paper reviews the main detection techniques employed for the detection and orbital characterization of multiple-planet systems,from the (now) classical radial velocity (RV) method to the use of transit time variations (TTV) for the identification of additional planetary bodies orbiting the same star.In the second part we discuss the dynamical evolution of multi-planet systems due to their mutual gravitational interactions.We analyze possible modes of motion for hierarchical,secular or resonant configurations,and what stability criteria can be defined in each case.In some cases,the dynamics can be well approximated by simple analytical expressions for the Hamiltonian function,while other configurations can only be studied with semi-analytical or numerical tools.In particular,we show how meanmotion resonances can generate complex structures in the phase space where different libration islands and circulation domains are separated by chaotic layers.In all cases we use real exoplanetary systems as working examples.

  16. Integrated Micro-Optical Fluorescence Detection System for Microfluidic Electrochromatography

    Energy Technology Data Exchange (ETDEWEB)

    ALLERMAN,ANDREW A.; ARNOLD,DON W.; ASBILL,RANDOLPH E.; BAILEY,CHRISTOPHER G.; CARTER,TONY RAY; KEMME,SHANALYN A.; MATZKE,CAROLYN M.; SAMORA,SALLY; SWEATT,WILLIAM C.; WARREN,MIAL E.; WENDT,JOEL R.

    1999-09-16

    The authors describe the design and microfabrication of an extremely compact optical system as a key element in an integrated capillary-channel electrochromatograph with laser induced fluorescence detection. The optical design uses substrate-mode propagation within the fused silica substrate. The optical system includes a vertical cavity surface-emitting laser (VCSEL) array, two high performance microlenses and a commercial photodetector. The microlenses are multilevel diffractive optics patterned by electron beam lithography and etched by reactive ion etching in fused silica. Two generations of optical subsystems are described. The first generation design is integrated directly onto the capillary channel-containing substrate with a 6 mm separation between the VCSEL and photodetector. The second generation design separates the optical system onto its own module and the source to detector length is further compressed to 3.5 mm. The systems are designed for indirect fluorescence detection using infrared dyes. The first generation design has been tested with a 750 nm VCSEL exciting a 10{sup -4} M solution of CY-7 dye. The observed signal-to-noise ratio of better than 100:1 demonstrates that the background signal from scattered pump light is low despite the compact size of the optical system and meets the system sensitivity requirements.

  17. Doppler radar sensor positioning in a fall detection system.

    Science.gov (United States)

    Liu, Liang; Popescu, Mihail; Ho, K C; Skubic, Marjorie; Rantz, Marilyn

    2012-01-01

    Falling is a common health problem for more than a third of the United States population over 65. We are currently developing a Doppler radar based fall detection system that already has showed promising results. In this paper, we study the sensor positioning in the environment with respect to the subject. We investigate three sensor positions, floor, wall and ceiling of the room, in two experimental configurations. Within each system configuration, subjects performed falls towards or across the radar sensors. We collected 90 falls and 341 non falls for the first configuration and 126 falls and 817 non falls for the second one. Radar signature classification was performed using a SVM classifier. Fall detection performance was evaluated using the area under the ROC curves (AUCs) for each sensor deployment. We found that a fall is more likely to be detected if the subject is falling toward or away from the sensor and a ceiling Doppler radar is more reliable for fall detection than a wall mounted one.

  18. Autonomous mine detection system (AMDS) neutralization payload module

    Science.gov (United States)

    Majerus, M.; Vanaman, R.; Wright, N.

    2010-04-01

    The Autonomous Mine Detection System (AMDS) program is developing a landmine and explosive hazards standoff detection, marking, and neutralization system for dismounted soldiers. The AMDS Capabilities Development Document (CDD) has identified the requirement to deploy three payload modules for small robotic platforms: mine detection and marking, explosives detection and marking, and neutralization. This paper addresses the neutralization payload module. There are a number of challenges that must be overcome for the neutralization payload module to be successfully integrated into AMDS. The neutralizer must meet stringent size, weight, and power (SWaP) requirements to be compatible with a small robot. The neutralizer must be effective against a broad threat, to include metal and plastic-cased Anti-Personnel (AP) and Anti-Tank (AT) landmines, explosive devices, and Unexploded Explosive Ordnance (UXO.) It must adapt to a variety of threat concealments, overburdens, and emplacement methods, to include soil, gravel, asphalt, and concrete. A unique neutralization technology is being investigated for adaptation to the AMDS Neutralization Module. This paper will describe review this technology and how the other two payload modules influence its design for minimizing SWaP. Recent modeling and experimental efforts will be included.

  19. A color based face detection system using multiple templates

    Institute of Scientific and Technical Information of China (English)

    王涛; 卜佳酸; 陈纯

    2003-01-01

    A color based system using multiple templates was developed and implemented for detecting hu-man faces in color images.The algorithm comsists of three image processing steps.The first step is human skin color statistics.Then it separates skin regions from non-skin regions.After that,it locates the frontal human face(s) within the skin regions.In the first step,250 skin samples from persons of different ethnicities are used to determine the color distribution of human skin in chromatic color space in order to get a chroma chart showing likelihoods of skin colors.This chroma chart is used to generate,from the original color image,a gray scale image whose gray value at a pixel shows its likelihood of representing the shin,The algorithm uses an adaptive thresholding process to achieve the optimal threshold value for dividing the gray scale image into sep-arate skin regions from non skin regions.Finally,multiple face templates matching is used to determine if a given skin region represents a frontal human face or not.Test of the system with more than 400 color images showed that the resulting detection rate was 83%,which is better than most colou-based face detection sys-tems.The average speed for face detection is 0.8 second/image(400×300pixels) on a Pentium 3(800MHz) PC.

  20. Detecting and Characterizing Planetary Systems with Transit Timing

    CERN Document Server

    Steffen, Jason H; Ford, Eric B; Agol, Eric; Holman, Matthew J

    2007-01-01

    In the coming decades, research in extrasolar planets aims to advance two goals: 1) detecting and characterizing low-mass planets increasingly similar to the Earth, and 2) improving our understanding of planet formation. We present a new planet detection method that is capable of making large advances towards both of these objectives and describe a modest network of telescopes that is able to make the requisite observations. In a system where a known planet transits its host star, a second planet in that system will cause the time between transits to vary. These transit timing variations can be used to infer the orbital elements and mass of the perturbing planet even if it has a mass that is smaller than the mass of the Earth. This detection technique complements other techniques because it is most sensitive in mean-motion resonances where, due to degeneracies, other techniques have reduced sensitivity. Small ground-based observatories have already exceeded the photometric precision necessary to detect sub-Ea...

  1. Triplexer Monitor Design for Failure Detection in FTTH System

    Science.gov (United States)

    Fu, Minglei; Le, Zichun; Hu, Jinhua; Fei, Xia

    2012-09-01

    Triplexer was one of the key components in FTTH systems, which employed an analog overlay channel for video broadcasting in addition to bidirectional digital transmission. To enhance the survivability of triplexer as well as the robustness of FTTH system, a multi-ports device named triplexer monitor was designed and realized, by which failures at triplexer ports can be detected and localized. Triplexer monitor was composed of integrated circuits and its four input ports were connected with the beam splitter whose power division ratio was 95∶5. By means of detecting the sampled optical signal from the beam splitters, triplexer monitor tracked the status of the four ports in triplexer (e.g. 1310 nm, 1490 nm, 1550 nm and com ports). In this paper, the operation scenario of the triplexer monitor with external optical devices was addressed. And the integrated circuit structure of the triplexer monitor was also given. Furthermore, a failure localization algorithm was proposed, which based on the state transition diagram. In order to measure the failure detection and localization time under the circumstance of different failed ports, an experimental test-bed was built. Experiment results showed that the detection time for the failure at 1310 nm port by the triplexer monitor was less than 8.20 ms. For the failure at 1490 nm or 1550 nm port it was less than 8.20 ms and for the failure at com port it was less than 7.20 ms.

  2. Performance assessment of heroin and cocaine vapor particle detection systems

    Science.gov (United States)

    Hoglund, David E.; Lucero, Daniel P.

    1994-03-01

    This paper discusses the preparation to assess the performance of heroin and cocaine vapor/particle detection systems. Equipment available commercially and field prototype system equipment will be assessed. Breadboard or brassboard devices or prototype modules will not be assessed. The assessment comprises a performance specifications verification and target response and a controlled field test for equipment available commercially only. Special purpose test procedures, tools, and detection targets were developed to ensure the reproducibility and control of all assessment tests. The sampling equipment parameters and their relative importance and the test procedures and objectives were defined and designed to maximize the information obtained within the test constraints. Test results will be obtained for standardized fundamental representative targets, independent of detection strategy, which can be correlated to a wide range of applications by the potential users. United States Customs Service will not form conclusions regarding the equipment performance for specific applications. It is anticipated the utility of the assessment program will be in availing equipment standardized test results to law enforcement agencies to examine the compatibility of the equipment performance with their requirements, applications, and detection strategy.

  3. POF hydrogen detection sensor systems for launch vehicles applications

    Science.gov (United States)

    Kazemi, Alex A.; Larson, David B.; Wuestling, Mark D.

    2011-06-01

    This paper describes the first successful Plastic Optical Fiber (POF) cable and glass fiber hydrogen detection sensor systems developed for Delta IV Launch Vehicle. Hydrogen detection in space application is very challenging; the hydrogen detection is priority for rocket industry and every transport device or any application where hydrogen is involved. H2 sensors are necessary to monitor the detection possible leak to avoid explosion, which can be highly dangerous. The hydrogen sensors had to perform in temperatures between -18° C to 60° C (0° F to 140° F). The response of the sensor in this temperature regime was characterized to ensure proper response of the sensors to fugitive hydrogen leakage during vehicle ground operations. We developed the first 75 m combination of POF and glass fiber H2 sensors. Performed detail investigation of POF-glass cables for attenuation loss, thermal, humidity, temperature, shock, accelerate testing for life expectancy. Also evaluated absorption, operating and high/low temperatures, and harsh environmental for glass-POF cables connectors. The same test procedures were performed for glass multi mode fiber part of the H2 and O2 sensors. A new optical waveguides was designed and developed to decrease the impact of both noise and long term drift of sensor. A field testing of sensors was performed at NASA Stennis on the Aerospike X-33 to quantify the element of the sensor package that was responsible for hydrogen detection and temperature.

  4. A survey on RBF Neural Network for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Henali Sheth

    2014-12-01

    Full Text Available Network security is a hot burning issue nowadays. With the help of technology advancement intruders or hackers are adopting new methods to create different attacks in order to harm network security. Intrusion detection system (IDS is a kind of security software which inspects all incoming and outgoing network traffic and it will generate alerts if any attack or unusual behavior is found in a network. Various approaches are used for IDS such as data mining, neural network, genetic and statistical approach. Among this Neural Network is more suitable approach for IDS. This paper describes RBF neural network approach for Intrusion detection system. RBF is a feed forward and supervise technique of neural network.RBF approach has good classification ability but its performance depends on its parameters. Based on survey we find that RBF approach has some short comings. In order to overcome this we need to do proper optimization of RBF parameters.

  5. Real-time EEG-based happiness detection system.

    Science.gov (United States)

    Jatupaiboon, Noppadon; Pan-ngum, Setha; Israsena, Pasin

    2013-01-01

    We propose to use real-time EEG signal to classify happy and unhappy emotions elicited by pictures and classical music. We use PSD as a feature and SVM as a classifier. The average accuracies of subject-dependent model and subject-independent model are approximately 75.62% and 65.12%, respectively. Considering each pair of channels, temporal pair of channels (T7 and T8) gives a better result than the other area. Considering different frequency bands, high-frequency bands (Beta and Gamma) give a better result than low-frequency bands. Considering different time durations for emotion elicitation, that result from 30 seconds does not have significant difference compared with the result from 60 seconds. From all of these results, we implement real-time EEG-based happiness detection system using only one pair of channels. Furthermore, we develop games based on the happiness detection system to help user recognize and control the happiness.

  6. Real-time moving object detection for video monitoring systems

    Institute of Scientific and Technical Information of China (English)

    Wei Zhiqiang; Ji Xiaopeng; Wang Peng

    2006-01-01

    Moving object detection is one of the challenging problems in video monitoring systems, especially when the illumination changes and shadow exists. A method for real-time moving object detection is described. A new background model is proposed to handle the illumination varition problem. With optical flow technology and background subtraction, a moving object is extracted quickly and accurately. An effective shadow elimination algorithm based on color features is used to refine the moving objects. Experimental results demonstrate that the proposed method can update the background exactly and quickly along with the varition of illumination, and the shadow can be eliminated effectively. The proposed algorithm is a real-time one which the foundation for further object recognition and understanding of video monitoring systems.

  7. Numerical simulation of a laser-acoustic landmine detection system

    Science.gov (United States)

    Lancranjan, Ion I.; Miclos, Sorin; Savastru, Dan; Savastru, Roxana; Opran, Constantin

    2012-06-01

    The preliminary numerical simulation results obtained in the analysis of a landmine detection system based on laser excitation of acoustic - seismic waves in the soil and observing its surface vibration above the embedded landmine are presented. The presented numerical simulations comprise three main parts: 1) Laser oscillator and laser beam propagation and absorption in soil; a laser oscillator operated in Q-switched regime is considered; different laser wavelengths are investigated. 2) Acoustic - seismic wave generation by absorption in soil of laser pulse energy; 3) Evaluation of acoustic - seismic wave generation by the buried in soil landmine; 4) Comparison of Distributed Feed- Back Fiber Laser (DFB-FL) and Laser Doppler Vibrometer (LDV) detector used for soil vibrations evaluation. The above mentioned numerical simulation is dedicated for evaluation of an integrated portable detection system.

  8. Detection of qubit-oscillator entanglement in nanoelectromechanical systems.

    Science.gov (United States)

    Schmidt, Thomas L; Børkje, Kjetil; Bruder, Christoph; Trauzettel, Björn

    2010-04-30

    Experiments over the past years have demonstrated that it is possible to bring nanomechanical resonators and superconducting qubits close to the quantum regime and to measure their properties with an accuracy close to the Heisenberg uncertainty limit. Therefore, it is just a question of time before we will routinely see true quantum effects in nanomechanical systems. One of the hallmarks of quantum mechanics is the existence of entangled states. We propose a realistic scenario making it possible to detect entanglement of a mechanical resonator and a qubit in a nanoelectromechanical setup. The detection scheme involves only standard current and noise measurements of an atomic point contact coupled to an oscillator and a qubit. This setup could allow for the first observation of entanglement between a continuous and a discrete quantum system in the solid state.

  9. A novel wearable smart button system for fall detection

    Science.gov (United States)

    Zhuang, Wei; Sun, Xiang; Zhi, Yueyan; Han, Yue; Mao, Hande

    2017-05-01

    Fall has been the second most cause of accidental injury to death in the world. It has been a serious threat to the physical and mental health of the elders. Therefore, developing wearable node system with fall detecting ability has become increasingly pressing at present. A novel smart button for long-term fall detection is proposed in this paper, which is able to accurately monitor the falling behavior, and sending warning message online as well. The smart button is based on the tri-axis acceleration sensor which is used to collect the body motion signals. By using the statistical metrics of acceleration characteristics, a new SVM classification algorithm with high positive accuracy and stability is proposed so as to classify the falls and activities of daily living, and the results can be real-time displayed on Android based mobile phone. The experiments show that our wearable node system can continuously monitor the falling behavior with positive rate 94.8%.

  10. Embedded Sensor System for Early Pathology Detection in Building Construction

    Directory of Open Access Journals (Sweden)

    Carlos J. Escudero Cascon

    2009-08-01

    Full Text Available Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and wireless sensor networks (WSN are becoming popular and cheap, enabling the design of an alternative pathology detection system to monitor structures based on these technologies. This article introduces a ZigBee WSN system, intending to be autonomous, easy to use and with low power consumption. Its functional parts are fully discussed with diagrams, as well as the protocol used to collect samples from sensor nodes. Finally, several tests focused on range and power consumption of our prototype are shown, analysing whether the results obtained were as expected or not.

  11. Multisensor system for toxic gases detection generated on indoor environments

    Science.gov (United States)

    Durán, C. M.; Monsalve, P. A. G.; Mosquera, C. J.

    2016-11-01

    This work describes a wireless multisensory system for different toxic gases detection generated on indoor environments (i.e., Underground coal mines, etc.). The artificial multisensory system proposed in this study was developed through a set of six chemical gas sensors (MQ) of low cost with overlapping sensitivities to detect hazardous gases in the air. A statistical parameter was implemented to the data set and two pattern recognition methods such as Principal Component Analysis (PCA) and Discriminant Function Analysis (DFA) were used for feature selection. The toxic gases categories were classified with a Probabilistic Neural Network (PNN) in order to validate the results previously obtained. The tests were carried out to verify feasibility of the application through a wireless communication model which allowed to monitor and store the information of the sensor signals for the appropriate analysis. The success rate in the measures discrimination was 100%, using an artificial neural network where leave-one-out was used as cross validation method.

  12. Embedded Sensor System for Early Pathology Detection in Building Construction

    CERN Document Server

    Torres, Santiago J Barro

    2009-01-01

    Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and wireless sensor networks (WSN) are becoming popular and cheap, enabling the design of an alternative pathology detection system to monitor structures based on these technologies. This article introduces a ZigBee WSN system, intending to be autonomous, easy to use and with low power consumption. Its functional parts are fully discussed with diagrams, as well as the protocol used to collect samples from sensor nodes. Finally, several tests focused on range and power consumption of our prototype are shown, analysing whether the results obtained were as expected or not.

  13. 46 CFR 161.002-10 - Automatic fire detecting system control unit.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Automatic fire detecting system control unit. 161.002-10...-10 Automatic fire detecting system control unit. (a) General. The fire detecting system control unit... and the battery to be charged. (h) Automatic fire detecting system, battery charging and control—(1...

  14. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    OpenAIRE

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang

    2010-01-01

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  15. Tuberculosis case detection in a state prison system.

    OpenAIRE

    Brock, N N; Reeves, M; LaMarre, M; DeVoe, B

    1998-01-01

    OBJECTIVE: This study was designed to describe the epidemiology of tuberculosis ((TB) among inmates in the Georgia state prison system; to evaluate the effectiveness of the TB case detection methods used; to evaluate the use of contact tracing for inmate TB cases; and to determine rates of completion of therapy. METHODS: Using a standardized form, the authors abstracted data from reports to the Centers for Disease Control and Prevention, prison hospital medical charts, and county health depar...

  16. A Simple System for the Early Detection of Breast Cancer

    Science.gov (United States)

    2015-07-01

    informatics, immunology , benign cancer , prognostic studies, baseline diagnostics, heatmaps, ROCurves 2 Major Activities 1. Production of IMS arrays...AD______________ AWARD NUMBER: W81XWH-14-1-0231 TITLE: A Simple System for the Early Detection of Breast Cancer PRINCIPAL INVESTIGATOR...0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing

  17. Detection of Variation Sources in a Serial Production System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Variation is the fundamental cause of poor quality. In order to reduce variation and seek quality improvement opportunities, it is important to understand how variation is added and transmitted across the processes of the manufacturing system. In this paper, we introduce a model for variation transmission and give the method of detecting variation sources in a series connection manufacturing processes. Finally, an example of the application of this method is given.

  18. An Astigmatic Detection System for Polymeric Cantilever-based Sensors

    DEFF Research Database (Denmark)

    Hwu, En-Te; Liao, Hsien-Shun; Bosco, Filippo;

    2012-01-01

    We demonstrate the use of an astigmatic detection system (ADS) for resonance frequency identification of polymer microcantilever sensors. The ADS technology is based on a DVD optical head combined with an optical microscope (OM). The optical head has a signal bandwidth of 80 MHz, allowing thermal...... submicrometer-sized cantilevers. The resonant frequency of SU-8 microcantilevers is measured by both thermal fluctuation and excited vibration measurement modes of the ADS....

  19. Neutron Interrogation System For Underwater Threat Detection And Identification

    Science.gov (United States)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-01

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  20. Research of on-line detection system for power capacitor

    Science.gov (United States)

    Yao, Junda; Qian, Zheng; Yu, Hao; Xia, Jiuyun

    2016-01-01

    The hidden danger exists in the power capacitor of power system due to long-time operation under the environment of high voltage. Thus, it is possible to induce serious fault, and the on-line detection system is urgently required. In this paper, two methods of the on-line detection system are compared in order to realize the better real-time condition detection. The first method is based on the STM microprocessor with an internal 12 bit A/D converter, which converts analog signals which is arrived from the sample circuit into digital signals, and then the FFT algorithm is used to accomplish the measurement of the voltage and current values of the capacitor. The second method is based on the special electric energy metering IC, which can obtain RMS (Root Mean Square) of voltage and current by processing the sampled data of the voltage and current, and store RMS of voltage and current in its certain registers. The operating condition of the capacitor can be obtained after getting the values of voltage and current. By comparing the measuring results of two methods, the second method could achieve a higher measurement accuracy and more simple construction.

  1. A novel detecting system with full fluorescent spectra for pesticides

    Science.gov (United States)

    Wang, Zhong dong; Zheng, Ya Juan; Ruan, Gui cai; Wang, Yu tian

    2006-11-01

    A detecting system is developed applying the technologies of fiber-optic sensing, grating dispersion and multi-channel image sensing (Charge Coupled Device) based on the fluorescence mechanism of carbaryl. In this system, a pulsed xenon lamp is used as an excitation light source, optical fibers are selected to transmit and detect fluorescence, fluorescence dispersion is implemented with a small-sized flat field grating spectrometer and data gathering and A/D conversion are conducted with a high speed signal processing module. Moreover, the system is used to measure the fluorescence characteristics of carbaryl. The results show that a full fluorescence spectrum of carbaryl can be obtained in a single exposure under a UV excitation wavelength of 319nm, has a good linear relationship in the range of 4.0~100.0 ng/mL of carbaryl liquor and the minimum detecting limit is 4.0ng/mL with the linear correlation coefficient r being 0.9986. When this instrument is likewise applied for measuring carbaryl in river and ground water,the recovery may approach 100 %.

  2. Copyright Detection System for Videos Using TIRI-DCT Algorithm

    Directory of Open Access Journals (Sweden)

    S. Nirmal

    2012-12-01

    Full Text Available The copyright detection system is used to detect whether a video is copyrighted or not by extracting the features or fingerprints of a video and matching them with fingerprints other videos. The system is mainly used for copyright applications of multimedia content. The copyright detection system depends on an algorithm to extract fingerprints which is the TIRI-DCT Algorithm of a video followed by an approximate search algorithm which is the Inverted File Based Similarity Search. To find whether a video is copyrighted or not, the query video is taken and the feature values of the video are extracted using the fingerprint extraction algorithm, it extracts feature values from special images called frames constructed from the video. Each frame represents a part or a segment of the video and contains both temporal and spatial information of the video segment. These images are called Temporally Informative Representative Images (TIRI. The fingerprints of all the videos in the database are extracted and stored in advance. The approximate search algorithm searches the fingerprints which is stored in the database and produces the closest matches to the fingerprint of the query video and based on the match the query video is found whether it is a copyrighted video or not.

  3. Joint detection and combining schemes in MIMO-HARQ systems

    Institute of Scientific and Technical Information of China (English)

    XIE Gang; XIONG Fang; ZHAO Yi; LIU Yuan-an

    2007-01-01

    This article mainly investigates the combining schemes for hybrid automatic retransmission request (HARQ) protocols in multiple-input multiple-output (MIMO) wireless communication systems. A novel scheme, which joins MIMO detection and HARQ combining, called mid-combining, is presented in this article. Based on the position of HARQ combining, we classify the HARQ combining schemes into three types, named pre-combining, mid-combining, and post-combining. The simulation results show that mid- combining can increase the system throughput for all SNRs.

  4. Face detection for interactive tabletop viewscreen system using olfactory display

    Science.gov (United States)

    Sakamoto, Kunio; Kanazawa, Fumihiro

    2009-10-01

    An olfactory display is a device that delivers smells to the nose. It provides us with special effects, for example to emit smell as if you were there or to give a trigger for reminding us of memories. The authors have developed a tabletop display system connected with the olfactory display. For delivering a flavor to user's nose, the system needs to recognition and measure positions of user's face and nose. In this paper, the authors describe an olfactory display which enables to detect the nose position for an effective delivery.

  5. Seismic wave detection system based on fully distributed acoustic sensing

    Science.gov (United States)

    Jiang, Yue; Xu, Tuanwei; Feng, Shengwen; Huang, Jianfen; Yang, Yang; Guo, Gaoran; Li, Fang

    2016-11-01

    This paper presents a seismic wave detection system based on fully distributed acoustic sensing. Combined with Φ- OTDR and PGC demodulation technology, the system can detect and acquire seismic wave in real time. The system has a frequency response of 3.05 dB from 5 Hz to 1 kHz, whose sampling interval of each channel of 1 meter on total sensing distance up to 10 km. By comparing with the geophone in laboratory, the data show that in the time domain and frequency domain, two waveforms coincide consistently, and the correlation coefficient could be larger than 0.98. Through the analysis of the data of the array experiment and the oil well experiment, DAS system shows a consistent time domain and frequency domain response and a clearer trail of seismic wave signal as well as a higher signal-noise rate which indicate that the system we proposed is expected to become the next generation of seismic exploration equipment.

  6. Rule Generalisation in Intrusion Detection Systems using Snort

    CERN Document Server

    Aickelin, Uwe; Hesketh-Roberts, Thomas

    2008-01-01

    Intrusion Detection Systems (ids)provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An ids responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of ids use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source ids that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard d...

  7. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  8. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  9. Understanding plant immunity as a surveillance system to detect invasion.

    Science.gov (United States)

    Cook, David E; Mesarich, Carl H; Thomma, Bart P H J

    2015-01-01

    Various conceptual models to describe the plant immune system have been presented. The most recent paradigm to gain wide acceptance in the field is often referred to as the zigzag model, which reconciles the previously formulated gene-for-gene hypothesis with the recognition of general elicitors in a single model. This review focuses on the limitations of the current paradigm of molecular plant-microbe interactions and how it too narrowly defines the plant immune system. As such, we discuss an alternative view of plant innate immunity as a system that evolves to detect invasion. This view accommodates the range from mutualistic to parasitic symbioses that plants form with diverse organisms, as well as the spectrum of ligands that the plant immune system perceives. Finally, how this view can contribute to the current practice of resistance breeding is discussed.

  10. Can a safeguards accountancy system really detect an unauthorized removal

    Energy Technology Data Exchange (ETDEWEB)

    Ehinger, M.H.; Ellis, J.H.

    1981-11-01

    Theoretical investigations and system studies indicate safeguards material balance data from reprocessing plants can be used to detect unauthorized removals. Plant systems have been modeled and simulated data used to demonstrate the techniques. But how sensitive are the techniques when used with actual plant data. What is the effect of safeguards applications on plant operability. Can safeguards be acceptable to plant operators, and are there any benefits to be derived. The Barnwell Nuclear Fuel Plant (BNFP) has been devoted to answering these and other questions over the past several years. A computerized system of near-real-time accounting and in-process inventory has been implemented and demonstrated during actual plant test runs. Measured inventories and hourly material balance closures have been made to assess safeguards in an operating plant application. The tests have culminated in actual removals of material from the operating plant to investigate the response and measure the sensitivity of the safeguards and data evaluation system.

  11. An Intrusion Detection System for Kaminsky DNS Cache poisoning

    Directory of Open Access Journals (Sweden)

    Dhrubajyoti Pathak, Kaushik Baruah

    2013-09-01

    Full Text Available Domain Name System (DNS is the largest and most actively distributed, hierarchical and scalable database system which plays an incredibly inevitable role behind the functioning of the Internet as we know it today. A DNS translates human readable and meaningful domain names such as www.iitg.ernet.in into an Internet Protocol (IP address such as 202.141.80.6. It is used for locating a resource on the World Wide Web. Without a DNS, the Internet services as we know it, would come to a halt. In our thesis, we proposed an Intrusion Detection System(IDS for Kaminsky cache poisoning attacks. Our system relies on the existing properties of the DNS protocol.

  12. An EEG-Based Fatigue Detection and Mitigation System.

    Science.gov (United States)

    Huang, Kuan-Chih; Huang, Teng-Yi; Chuang, Chun-Hsiang; King, Jung-Tai; Wang, Yu-Kai; Lin, Chin-Teng; Jung, Tzyy-Ping

    2016-06-01

    Research has indicated that fatigue is a critical factor in cognitive lapses because it negatively affects an individual's internal state, which is then manifested physiologically. This study explores neurophysiological changes, measured by electroencephalogram (EEG), due to fatigue. This study further demonstrates the feasibility of an online closed-loop EEG-based fatigue detection and mitigation system that detects physiological change and can thereby prevent fatigue-related cognitive lapses. More importantly, this work compares the efficacy of fatigue detection and mitigation between the EEG-based and a nonEEG-based random method. Twelve healthy subjects participated in a sustained-attention driving experiment. Each participant's EEG signal was monitored continuously and a warning was delivered in real-time to participants once the EEG signature of fatigue was detected. Study results indicate suppression of the alpha- and theta-power of an occipital component and improved behavioral performance following a warning signal; these findings are in line with those in previous studies. However, study results also showed reduced warning efficacy (i.e. increased response times (RTs) to lane deviations) accompanied by increased alpha-power due to the fluctuation of warnings over time. Furthermore, a comparison of EEG-based and nonEEG-based random approaches clearly demonstrated the necessity of adaptive fatigue-mitigation systems, based on a subject's cognitive level, to deliver warnings. Analytical results clearly demonstrate and validate the efficacy of this online closed-loop EEG-based fatigue detection and mitigation mechanism to identify cognitive lapses that may lead to catastrophic incidents in countless operational environments.

  13. Aircraft Low Altitude Wind Shear Detection and Warning System.

    Science.gov (United States)

    Sinclair, Peter C.; Kuhn, Peter M.

    1991-01-01

    There is now considerable evidence to substantiate the causal relationship between low altitude wind shear (LAWS) and the recent increase in low-altitude aircraft accidents. The National Research Council has found that for the period 1964 to 1982, LAWS was involved in nearly all the weather-related air carrier fatalities. However, at present, there is no acceptable method, technique, or hardware system that provides the necessary safety margins, for spatial and timely detection of LAWS from an aircraft during the critical phases of landing and takeoff. The Federal Aviation Administration (FAA) has addressed this matter and supports the development of an airborne system for detecting hazardous LAWS with at least a one minute warning of the potential hazard to the pilot. One of the purposes of this paper is to show from some of our preliminary flight measurement research that a forward looking infrared radiometer (FLIR) system can be used to successfully detect the cool downdraft of downbursts [microbursts/macrobursts (MB)] and thunderstorm gust front outflows that are responsible for most of the LAWS events. The FLIR system provides a much greater safety margin for the pilot than that provided by reactive designs such as inertial-air speed systems that require the actual penetration of the MB before a pilot warning can be initiated. Our preliminary results indicate that an advanced airborne FLIR system could provide the pilot with remote indication of MB threat, location, movement, and predicted MB hazards along the flight path ahead of the aircraft.In a proof-of-concept experiment, we have flight tested a prototype FLIR system (nonscanning, fixed range) near and within Colorado MBs with excellent detectability. The results show that a minimum warning time of one-four minutes (5×10 km), depending on aircraft speed, is available to the pilot prior to a MB encounter. Analysis of the flight data with respect to a modified `hazard index' indicates the severe hazard

  14. OLAWSDS:An Online Arabic Web Spam Detection System

    Directory of Open Access Journals (Sweden)

    Mohammed N. Al-Kabi

    2014-01-01

    Full Text Available For marketing purposes, Some Websites designers and administrators use illegal Search Engine Optimization (SEO techniques to optimize the ranking of their Web pages and mislead the search engines. Some Arabic Web pages use both content and link features, to increase artificially the rank of their Web pages in the Search Engine Results Pages (SERPs. This study represents an enhancement to previous work in this field. It includes the design and implementation of an online Arabic Web spam detection system, based on algorithms and mathematical foundations, which can detect the Arabic content and link web spam depending on the tree of the spam detection conditions, beside depending on the user’s feedback through a custom Web browser. The users can participate in making the decision about any Web page, through their feedbacks, so they judge if the Arabic Web pages in the browser are relevant for their particular queries or not. The proposed system uses the extracted content and link features from Arabic Web pages to determine whether to label each Web page as a spam or as a non-spam. This system also attempts to learn from the user’s feedback to enhance automatically its performance. Statistical analysis is adopted in this study to evaluate the proposed system. Statistical Package for the Social Sciences (SPSS software is used to evaluate this new system which considers the users feedbacks as dependent variables, while Arabic content and links features on the other hand are considered independent variables. The statistical analysis with the SPSS is used to apply a variety of tests, such as the test of the analysis of variance (ANOVA. ANOVA is used to show the relationships between the dependent and independent variables in the dataset, which leads to solving problems and building intelligent decisions and results.

  15. Study on the performance of data fusion system for sonar signal detection

    Institute of Scientific and Technical Information of China (English)

    XIANG Ming; WANG Zhao; LI Hong; ZHAO Junwei; GONG Xianyi

    2000-01-01

    The mathematical model and fusion algorithm for multisensor data fusion are presented, and applied to integrate the decisions obtained by multiple sonars in a distributed detection system. Assuming that all the sonars and the fusion system operate at the same false alarm probability, the expression for the detection probability of the fusion system is obtained.Computer simulations reveals that the detection probability and detection range of the fusion system are significantly improved compared to the original distributed detection system.

  16. Hybrid object detection system for x-ray radiographs

    Science.gov (United States)

    Vita, Joshua A.; Wantuch, Andrew C.; Jimenez, Edward S.; Bray, Iliana E.

    2016-10-01

    While object detection is a relatively well-developed field with respect to visible light photographs, there are significantly fewer algorithms designed to work with other imaging modalities. X-ray radiographs have many unique characteristics that introduce additional challenges that can cause common image processing and object detection algorithms to begin to fail. Examples of these problematic attributes include the fact that radiographs are only represented in gray scale with similar textures and that transmission overlap occurs when multiple objects are overlaid on top of each other. In this paper we not only analyze the effectiveness of common object detection techniques as applied to our specific database, but also outline how we combined various techniques to improve overall performance. While significant strides have been made towards developing a robust object detection algorithm for use with the given database, it is still a work in progress. Further research will be needed in order to deal with the specific obstacles posed by radiographs and X-ray imaging systems. Success in this project would have disruptive repercussions in fields ranging from medical imaging to manufacturing quality assurance and national security.

  17. A Vehicle License Plate Detection and Recognition System

    Directory of Open Access Journals (Sweden)

    Khalid W. Maglad

    2012-01-01

    Full Text Available Problem statement: Automatic vehicle license plate detection and recognition is a key technique in most of traffic related applications and is an active research topic in the image processing domain. Different methods, techniques and algorithms have been developed for license plate detection and recognitions. Approach: Due to the varying characteristics of the license plate from country to country like numbering system, colors, language of characters, style (font and sizes of license plate, further research is still needed in this area. Results: In most of the Middle East countries, they use the combination of Arabic and English letters, along with their countries logo. Thus, it makes the localization of plate number, the differentiation between Arabic and English letters and logo’s object and finally the recognition of those characters become a more challenging research task. The use of artificial neural network has proved itself beneficial for plate recognition, but it has not been applied for the plate detection. Radial Basis Function (RBF neural network is used both for the detection and recognition of Saudi Arabian license plates. Conclusion/Recommendations: The proposed approach has been tested on 200 front images of national license plate of Saudi Arabia. A higher percentage of accuracy has been obtained to show that the significant of this approach. The study could be further investigated in other Middle East countries.

  18. Electronic system for floor surface type detection in robotics applications

    Science.gov (United States)

    Tarapata, Grzegorz; Paczesny, Daniel; Tarasiuk, Łukasz

    2016-11-01

    The paper reports a recognizing method base on ultrasonic transducers utilized for the surface types detection. Ultra-sonic signal is transmitted toward the examined substrate, then reflected and scattered signal goes back to another ultra-sonic receiver. Thee measuring signal is generated by a piezo-electric transducer located at specified distance from the tested substrate. The detector is a second piezo-electric transducer located next to the transmitter. Depending on thee type of substrate which is exposed by an ultrasonic wave, the signal is partially absorbed inn the material, diffused and reflected towards the receiver. To measure the level of received signal, the dedicated electronic circuit was design and implemented in the presented systems. Such system was designed too recognize two types of floor surface: solid (like concrete, ceramic stiles, wood) and soft (carpets, floor coverings). The method will be applied in electronic detection system dedicated to autonomous cleaning robots due to selection of appropriate cleaning method. This work presents the concept of ultrasonic signals utilization, the design of both the measurement system and the measuring stand and as well number of wide tests results which validates correctness of applied ultrasonic method.

  19. Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE

    Directory of Open Access Journals (Sweden)

    Basappa B. Kodada

    2012-01-01

    Full Text Available Grid Computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. It is based on networks and able to enable large scale aggregation and sharing of computational, data, sensors and other resources across institutional boundaries. Integrated Globus Tool Kit with Web services is to present OGSA (Open Grid Services Architecture as the standardservice grid architecture. In OGSA, everything is abstracted as a service, including computers, applications, data as well as instruments. The services and resources in Grid are heterogeneous and dynamic, and they also belong to different domains. Grid Services are still new to business system & asmore systems are being attached to it, any threat to it could bring collapse and huge harm. May be intruder come with a new form of attack. Grid Computing is a Global Infrastructure on the internet has led to asecurity attacks on the Computing Infrastructure. The wide varieties of IDS (Intrusion Detection System are available which are designed to handle the specific types of attacks. The technique of [27] will protect future attacks in Service Grid Computing Environment at the Grid Infrastructure but there is no technique can protect these types of attacks inside the grid at the node level. So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System – Inside Grid Computing Environment which can provide the protection against the complete threats inside the Grid Environment.

  20. Improvements in detection system for pulse radiolysis facility

    CERN Document Server

    Rao, V N; Manimaran, P; Mishra, R K; Mohan, H; Mukherjee, T; Nadkarni, S A; Sapre, A V; Shinde, S J; Toley, M

    2002-01-01

    This report describes the improvements made in the detection system of the pulse radiolysis facility based on a 7 MeV Linear Electron Accelerator (LINAC) located in the Radiation Chemistry and Chemical Dynamics Division of Bhabha Atomic Research Centre. The facility was created in 1986 for kinetic studies of transient species whose absorption lies between 200 and 700 nm. The newly developed detection circuits consist of a silicon (Si) photodiode (PD) detector for the wavelength range 450-1100 nm and a germanium (Ge) photodiode detector for the wavelength range 900-1600 nm. With these photodiode-based detection set-up, kinetic experiments are now routinely carried out in the wavelength range 450-1600 nm. The performance of these circuits has been tested using standard chemical systems. The rise time has been found to be 150 ns. The photo-multiplier tube (PMT) bleeder circuit has been modified. A new DC back-off circuit has been built and installed in order to avoid droop at longer time scales. A steady baselin...

  1. An Efficient Collision Detection Scheme for Generation-2 RFID Systems

    Directory of Open Access Journals (Sweden)

    Cheng Jin

    2012-09-01

    Full Text Available In radio-frequency identification (RFID systems, tag collision resolution is a significant issue for fast tag identification. Dynamic framed slotted ALOHA (DFSA is one of the most widely used algorithms to resolve tag collision. Collision detection (CD plays an important role in determining the efficiency of DFSA-based algorithms because most DFSA-based algorithms determine the next frame size according to the number of collided slots in the current frame. Existing CD methods do not respond quickly enough to detect a collision and have difficulty in distinguishing a collision from noise, resulting in a degradation of system efficiency. This paper presents a CD scheme based on the EPCglobal Class-1 Generation-2 protocol to improve CD efficiency. This scheme enables fast and accurate CD by detecting the number of pulses transmitted by tags. The effectiveness and practical feasibility of the scheme is verified by simulation and implementation. Performance evaluation results show that the proposed scheme achieves faster identification speed than the conventional methods, especially under noise conditions.

  2. Detectability of Glycine in Solar-type System Precursors

    CERN Document Server

    Jimenez-Serra, Izaskun; Caselli, Paola; Viti, Serena

    2014-01-01

    Glycine (NH2CH2COOH) is the simplest amino acid relevant for life. Its detection in the interstellar medium is key to understand the formation mechanisms of pre-biotic molecules and their subsequent delivery onto planetary systems. Glycine has extensively been searched for toward hot molecular cores, although these studies did not yield any firm detection. In contrast to hot cores, low-mass star forming regions, and in particular their earliest stages represented by cold pre-stellar cores, may be better suited for the detection of glycine as well as more relevant for the study of pre-biotic chemistry in young Solar System analogs. We present 1D spherically symmetric radiative transfer calculations of the glycine emission expected to arise from the low-mass pre-stellar core L1544. Water vapour has recently been reported toward this core, indicating that a small fraction of the grain mantles in L1544 (~0.5%) has been injected into the gas phase. Assuming that glycine is photo-desorbed together with water in L15...

  3. Practical comparison of aberration detection algorithms for biosurveillance systems.

    Science.gov (United States)

    Zhou, Hong; Burkom, Howard; Winston, Carla A; Dey, Achintya; Ajani, Umed

    2015-10-01

    National syndromic surveillance systems require optimal anomaly detection methods. For method performance comparison, we injected multi-day signals stochastically drawn from lognormal distributions into time series of aggregated daily visit counts from the U.S. Centers for Disease Control and Prevention's BioSense syndromic surveillance system. The time series corresponded to three different syndrome groups: rash, upper respiratory infection, and gastrointestinal illness. We included a sample of facilities with data reported every day and with median daily syndromic counts ⩾1 over the entire study period. We compared anomaly detection methods of five control chart adaptations, a linear regression model and a Poisson regression model. We assessed sensitivity and timeliness of these methods for detection of multi-day signals. At a daily background alert rate of 1% and 2%, the sensitivities and timeliness ranged from 24 to 77% and 3.3 to 6.1days, respectively. The overall sensitivity and timeliness increased substantially after stratification by weekday versus weekend and holiday. Adjusting the baseline syndromic count by the total number of facility visits gave consistently improved sensitivity and timeliness without stratification, but it provided better performance when combined with stratification. The daily syndrome/total-visit proportion method did not improve the performance. In general, alerting based on linear regression outperformed control chart based methods. A Poisson regression model obtained the best sensitivity in the series with high-count data.

  4. Fault detection in rotor bearing systems using time frequency techniques

    Science.gov (United States)

    Chandra, N. Harish; Sekhar, A. S.

    2016-05-01

    Faults such as misalignment, rotor cracks and rotor to stator rub can exist collectively in rotor bearing systems. It is an important task for rotor dynamic personnel to monitor and detect faults in rotating machinery. In this paper, the rotor startup vibrations are utilized to solve the fault identification problem using time frequency techniques. Numerical simulations are performed through finite element analysis of the rotor bearing system with individual and collective combinations of faults as mentioned above. Three signal processing tools namely Short Time Fourier Transform (STFT), Continuous Wavelet Transform (CWT) and Hilbert Huang Transform (HHT) are compared to evaluate their detection performance. The effect of addition of Signal to Noise ratio (SNR) on three time frequency techniques is presented. The comparative study is focused towards detecting the least possible level of the fault induced and the computational time consumed. The computation time consumed by HHT is very less when compared to CWT based diagnosis. However, for noisy data CWT is more preferred over HHT. To identify fault characteristics using wavelets a procedure to adjust resolution of the mother wavelet is presented in detail. Experiments are conducted to obtain the run-up data of a rotor bearing setup for diagnosis of shaft misalignment and rotor stator rubbing faults.

  5. Wavelet features for failure detection and identification in vibration systems

    Science.gov (United States)

    Deckert, James C.; Rhenals, Alonso E.; Tenney, Robert R.; Willsky, Alan S.

    1992-12-01

    The result of this effort is an extremely flexible and powerful methodology for failure detection and identification (FDI) in vibrating systems. The essential elements of this methodology are: (1) an off-line set of techniques to identify high-energy, statistically significant features in the continuous wavelet transform (CWT); (2) a CWT-based preprocessor to extract the most useful features from the sensor signal; and (3) simple artificial neural networks (incorporating a mechanism to defer any decision if the current feature sample is determined to be ambiguous) for the subsequent classification task. For the helicopter intermediate gearbox test-stand data and centrifugal and fire pump shipboard (mild operating condition) data used, the algorithms designed using this method achieved perfect detection performance (1.000 probability of detection, and 0.000 false alarm probability), with a probability less than 0.04 that a decision would be deferred-based on only 500 milliseconds of data from each sample case. While this effort shows the exceptional promise of our wavelet-based method for FDI in vibrating systems, more demanding applications, which also have other sources of high-energy vibration, raise additional technical issues that could provide the focus for a Phase 2 effort.

  6. Detection of decoupled input/output pairs in multivariable systems.

    Science.gov (United States)

    Potts, Alain Segundo; Massaro, Leandro Cuenca; Garcia, Claudio

    2015-03-01

    A method is proposed to detect if there is no coupling between an input and an output in systems operating in open-loop, that is, without a supervisory controller. The proposed technique is applicable to multiple input multiple output (MIMO) systems, whose intent is to detect no-model input/output (IO) combinations in a transfer matrix. Traditional approaches for selecting IO pairs are usually performed after the plant model is identified. The presented approach is applied during the pre-identification stage and is based on IO cross-correlation, signal filtering and fuzzy logic analysis. A case study involving the identification of a 7×6 simulated Fluid Catalytic Cracking (FCC) is discussed, as well as an influence analysis of detecting no-model IO pairs in the identification process and in the performance index of a Model Predictive Controller (MPC) applied to a 2×2 simulated distillation column. Finally, the method is tested with a real dataset obtained from an FCC unit of a petrol refinery.

  7. Charged System Search Algorithm Utilized for Structural Damage Detection

    Directory of Open Access Journals (Sweden)

    Zahra Tabrizian

    2014-01-01

    Full Text Available This paper presents damage detection and assessment methodology based on the changes in dynamic parameters of a structural system. The method is applied at an element level using a finite element model. According to continuum damage mechanics, damage is represented by a reduction factor of the element stiffness. A recently developed metaheuristic optimization algorithm known as the charged system search (CSS is utilized for locating and quantifying the damaged areas of the structure. In order to demonstrate the abilities of this method, three examples are included comprising of a 10-elements cantilever beam, a Bowstring plane truss, and a 39-element three-story three-bay plane frame. The possible damage types in structures by considering several damage scenarios and using incomplete modal data are modeled. Finally, results are obtained from the CSS algorithm by detecting damage in these structures and compared to the results of the PSOPC algorithm. In addition, the effect of noise is shown in the results of the CSS algorithm by suitable diagrams. As is illustrated, this method has acceptable results in the structural detection damage with low computational time.

  8. Application of Improved HMM Algorithm in Slag Detection System

    Institute of Scientific and Technical Information of China (English)

    TAN Da-peng; LI Pei-yu; PAN Xiao-hong

    2009-01-01

    To solve the problems of ladle slag detection system (SDS),such as high cost,short service life,and inconvenient maintenance,a new SDS realization method based on hidden Markov model (HMM) was put forward.The physical process of continuous casting was analyzed,and vibration signal was considered as the main detecting signal according to the difference in shock vibration generated by molten steel and slag because of their difference in density.Automatic control experiment platform oriented to SDS was established,and vibration sensor was installed far away from molten steel,which could solve the problem of easy power consumption by the sensor.The combination of vector quantization technology with learning process parameters of HMM was optimized,and its revaluation formula was revised to enhance its recognition effectiveness.Industrial field experiments proved that this system requires low cost and little rebuilding for current devices,and its slag detection rate can exceed 95 %.

  9. Detecting and isolating abrupt changes in linear switching systems

    Science.gov (United States)

    Nazari, Sohail; Zhao, Qing; Huang, Biao

    2015-04-01

    In this paper, a novel fault detection and isolation (FDI) method for switching linear systems is developed. All input and output signals are assumed to be corrupted with measurement noises. In the proposed method, a 'lifted' linear model named as stochastic hybrid decoupling polynomial (SHDP) is introduced. The SHDP model governs the dynamics of the switching linear system with all different modes, and is independent of the switching sequence. The error-in-variable (EIV) representation of SHDP is derived, and is used for the fault residual generation and isolation following the well-adopted local approach. The proposed FDI method can detect and isolate the fault-induced abrupt changes in switching models' parameters without estimating the switching modes. Furthermore, in this paper, the analytical expressions of the gradient vector and Hessian matrix are obtained based on the EIV SHDP formulation, so that they can be used to implement the online fault detection scheme. The performance of the proposed method is then illustrated by simulation examples.

  10. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  11. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  12. Cloud Computing for Network Security Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Jin Yang

    2013-01-01

    Full Text Available In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper analyzes the characteristics of current cloud computing, and then proposes a comprehensive real-time network risk evaluation model for cloud computing based on the correspondence between the artificial immune system antibody and pathogen invasion intensity. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that this model improves the ability of intrusion detection and can support for the security of current cloud computing.

  13. Compute Element and Interface Box for the Hazard Detection System

    Science.gov (United States)

    Villalpando, Carlos Y.; Khanoyan, Garen; Stern, Ryan A.; Some, Raphael R.; Bailey, Erik S.; Carson, John M.; Vaughan, Geoffrey M.; Werner, Robert A.; Salomon, Phil M.; Martin, Keith E.; Spaulding, Matthew D.; Luna, Michael E.; Motaghedi, Shui H.; Trawny, Nikolas; Johnson, Andrew E.; Ivanov, Tonislav I.; Huertas, Andres; Whitaker, William D.; Goldberg, Steven B.

    2013-01-01

    The Autonomous Landing and Hazard Avoidance Technology (ALHAT) program is building a sensor that enables a spacecraft to evaluate autonomously a potential landing area to generate a list of hazardous and safe landing sites. It will also provide navigation inputs relative to those safe sites. The Hazard Detection System Compute Element (HDS-CE) box combines a field-programmable gate array (FPGA) board for sensor integration and timing, with a multicore computer board for processing. The FPGA does system-level timing and data aggregation, and acts as a go-between, removing the real-time requirements from the processor and labeling events with a high resolution time. The processor manages the behavior of the system, controls the instruments connected to the HDS-CE, and services the "heavy lifting" computational requirements for analyzing the potential landing spots.

  14. A Multi-Dimensional approach towards Intrusion Detection System

    CERN Document Server

    Thakur, Manoj Rameshchandra

    2012-01-01

    In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of CPU cycles per request are divided into multiple dimensions. Rather than analyzing raw bytes of data corresponding to the values of the network parameters, a mature function is inferred during the training phase for each dimension. This mature function takes a dimension value as an input and returns a value that represents the level of abnormality in the system usage with respect to that dimension. This mature function is referred to as Individual Anomaly Indicator. Individual Anomaly Indicators recorded for each of the dimensions are then used to generate a Global Anomaly Indicator, a function with n variables (n is the number of dimensions) that provides the Global Anomaly Factor, an indicator of anomaly in the system usage based on all the dimensions consid...

  15. On detection performance and system configuration of MIMO radar

    Institute of Scientific and Technical Information of China (English)

    TANG Jun; WU Yong; PENG YingNing; WANG XiuTan

    2009-01-01

    Multiple-input multiple-output (MIMO) radar is a new concept with some new characteristics, such as multiple orthogonal waveforms and omnidirectional coverage. Based on Stein's lemma, we use relative entropy as a precise and general measure of error exponent to study detection performance for both MIMO radar and phased array radar. And based on derived analytical results, we further study the system configuration problem of Bistatic MIMO radar systems, where transmitters and receivers are located in different positions. Some interesting results are presented. For phased array radar, when the total numbers of transmitters and receivers are fixed, we should always make the number of transmitters equal to the number of receivers. For MIMO radar, we should use a small number of transmitters in low signal noise ratio (SNR) region, and make the number of transmitters equal to the number of receivers in high SNR region. These results are instructive for deployment of bistatic MIMO radar systems in the future.

  16. Low Cost Night Vision System for Intruder Detection

    Science.gov (United States)

    Ng, Liang S.; Yusoff, Wan Azhar Wan; R, Dhinesh; Sak, J. S.

    2016-02-01

    The growth in production of Android devices has resulted in greater functionalities as well as lower costs. This has made previously more expensive systems such as night vision affordable for more businesses and end users. We designed and implemented robust and low cost night vision systems based on red-green-blue (RGB) colour histogram for a static camera as well as a camera on an unmanned aerial vehicle (UAV), using OpenCV library on Intel compatible notebook computers, running Ubuntu Linux operating system, with less than 8GB of RAM. They were tested against human intruders under low light conditions (indoor, outdoor, night time) and were shown to have successfully detected the intruders.

  17. An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

    CERN Document Server

    Tedesco, Gianni

    2009-01-01

    Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

  18. Tetraphenylporphyrin as a protein label for triple detection analytical systems

    Directory of Open Access Journals (Sweden)

    Kamila Konopińska

    2015-12-01

    Full Text Available Porphyrins and metalloporphyrins are promising new protein labels that can be detected using multiple techniques; improving the reliability of the analysis and broadening the range of the linear response. Here, we investigate the potential of 5,10,15,20-tetraphenyl-21H,23H-porphyrin (Tpp as a hybrid protein label. The electrochemical and optical properties of porphyrin conjugated with bovine serum albumin (BSA, chicken egg albumin (CEA and immunoglobulin G (IgG were determined and optimal conditions for Tpp-protein conjugation established. Model conjugates of carboxylated Tpp with BSA and short peptides were characterized using differential pulse voltammetry, UV–Vis spectrophotometry and spectrofluorimetry. These results reveal that Tpp is a promising molecule to be used in a triple detection protein labelling system.

  19. Optimization and evaluation of the human fall detection system

    Science.gov (United States)

    Alzoubi, Hadeel; Ramzan, Naeem; Shahriar, Hasan; Alzubi, Raid; Gibson, Ryan; Amira, Abbes

    2016-10-01

    Falls are the most critical health problem for elderly people, which are often, cause significant injuries. To tackle a serious risk that made by the fall, we develop an automatic wearable fall detection system utilizing two devices (mobile phone and wireless sensor) based on three axes accelerometer signals. The goal of this study is to find an effective machine learning method that distinguish falls from activities of daily living (ADL) using only a single triaxial accelerometer. In addition, comparing the performance results for wearable sensor and mobile device data .The proposed model detects the fall by using seven different classifiers and the significant performance is demonstrated using accuracy, recall, precision and F-measure. Our model obtained accuracy over 99% on wearable device data and over 97% on mobile phone data.

  20. AN ENHANCED DETECTION ALGORITHM FOR V-BLAST SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Su Xin; Yi Kechu; Tian Bin; Sun Yongjun

    2006-01-01

    A decoding method complemented by Maximum Likelihood (ML) detection for V-BLAST (Vertical Bell Labs Layered Space-Time) system is presented. The ranked layers are divided into several groups. ML decoding is performed jointly for the layers within the same group while the Decision Feedback Equalization (DFE) is performed for groups. Based on the assumption of QPSK modulation and the quasi-static flat fading channel, simulations are made to testify the performance of the proposed algorithm. The results show that the algorithm outperforms the original V-BLAST detection dramatically in Symbol Error Probability (SEP) performance. Specifically, Signal-to-Noise Ratio (SNR) improvement of 3.4dB is obtained for SEP of 10-2 (4×4case), with a reasonable complexity maintained.

  1. Similarity measure application to fault detection of flight system

    Institute of Scientific and Technical Information of China (English)

    KIM J H; LEE S H; WANG Hong-mei

    2009-01-01

    Fault detection technique is introduced with similarity measure. The characteristics of conventional similarity measure based on fuzzy number are discussed. With the help of distance measure, similarity measure is constructed explicitly. The designed distance-based similarity measure is applicable to general fuzzy membership functions including non-convex fuzzy membership function, whereas fuzzy number-based similarity measure has limitation to calculate the similarity of general fuzzy membership functions. The applicability of the proposed similarity measure to general fuzzy membership structures is proven by identifying the definition. To decide fault detection of flight system, the experimental data (pitching moment coefficients and lift coefficients) are transformed into fuzzy membership functions. Distance-based similarity measure is applied to the obtained fuzzy membership functions, and similarity computation and analysis are obtained with the fault and normal operation coefficients.

  2. Log Summarization and Anomaly Detection for TroubleshootingDistributed Systems

    Energy Technology Data Exchange (ETDEWEB)

    Gunter, Dan; Tierney, Brian L.; Brown, Aaron; Swany, Martin; Bresnahan, John; Schopf, Jennifer M.

    2007-08-01

    Today's system monitoring tools are capable of detectingsystem failures such as host failures, OS errors, and network partitionsin near-real time. Unfortunately, the same cannot yet be said of theend-to-end distributed softwarestack. Any given action, for example,reliably transferring a directory of files, can involve a wide range ofcomplex and interrelated actions across multiple pieces of software:checking user certificates and permissions, getting details for allfiles, performing third-party transfers, understanding re-try policydecisions, etc. We present an infrastructure for troubleshooting complexmiddleware, a general purpose technique for configurable logsummarization, and an anomaly detection technique that works in near-realtime on running Grid middleware. We present results gathered using thisinfrastructure from instrumented Grid middleware and applications runningon the Emulab testbed. From these results, we analyze the effectivenessof several algorithms at accurately detecting a variety of performanceanomalies.

  3. ``DELF'', a large solid angle detection system for heavy fragments

    Science.gov (United States)

    Bougault, R.; Duchon, J.; Gautier, J. M.; Genoux-Lubain, A.; Le Brun, C.; Lecolley, J. F.; Lefebvres, F.; Louvel, M.; Mosrin, P.; Regimbart, R.

    1987-09-01

    To detect the heavy fragments ( Z > 8) emitted at large angle (30° < θ < 150°) in heavy ion collisions at GANIL, a large solid angle detection system has been built. It consists of 18 independent cells surrounding the target, the beam axis being the revolution axis. In each cell, a fragment penetrates at first into a parallel plate avalanche counter with localization which gives velocity, position and {∂E}/{∂x} measurements and then into an ionization chamber with longitudinal field for the residual energy measurement. The Z evaluation is performed over a large range of velocities (0.05 < {E}/{A} < 5 MeV/u) for atomic numbers ranging from 8 to 90.

  4. System-theoretic approach to image interest point detection

    CERN Document Server

    Pimenov, Vitaly

    2010-01-01

    Interest point detection is a common task in various computer vision applications. Although a big variety of detector are developed so far computational efficiency of interest point based image analysis remains to be the problem. Current paper proposes a system-theoretic approach to interest point detection. Starting from the analysis of interdependency between detector and descriptor it is shown that given a descriptor it is possible to introduce to notion of detector redundancy. Furthermore for each detector it is possible to construct its irredundant and equivalent modification. Modified detector possesses lower computational complexity and is preferable. It is also shown that several known approaches to reduce computational complexity of image registration can be generalized in terms of proposed theory.

  5. A Distributed Control System for Rapid Astronomical Transient Detection

    CERN Document Server

    Wren, J; Brumby, S; Casperson, D E; Galassi, M; McGowan, K; Starr, D; Vestrand, W T; White, R; Wozniak, P R

    2002-01-01

    The Rapid Telescope for Optical Response (RAPTOR) program consists of a network of robotic telescopes dedicated to the search for fast optical transients. The pilot project is composed of three observatories separated by approximately 38 kilometers located near Los Alamos, New Mexico. Each of these observatories is composed of a telescope, mount, enclosure, and weather station, all operating robotically to perform individual or coordinated transient searches. The telescopes employ rapidly slewing mounts capable of slewing a 250 pound load 180 degrees in under 2 seconds with arcsecond precision. Each telescope consists of wide-field cameras for transient detection and a narrow-field camera with greater resolution and sensitivity. The telescopes work together by employing a closed-loop system for transient detection and follow-up. Using the combined data from simultaneous observations, transient alerts are generated and distributed via the Internet. Each RAPTOR telescope also has the capability of rapidly respo...

  6. OCT detection of neural activity in American cockroach nervous system

    Science.gov (United States)

    Gorczyńska, Iwona; Wyszkowska, Joanna; Bukowska, Danuta; Ruminski, Daniel; Karnowski, Karol; Stankiewicz, Maria; Wojtkowski, Maciej

    2013-03-01

    We show results of a project which focuses on detection of activity in neural tissue with Optical Coherence Tomography (OCT) methods. Experiments were performed in neural cords dissected from the American cockroach (Periplaneta americana L.). Functional OCT imaging was performed with ultrahigh resolution spectral / Fourier domain OCT system (axial resolution 2.5 μm). Electrical stimulation (voltage pulses) was applied to the sensory cercal nerve of the neural cord. Optical detection of functional activation of the sample was performed in the connective between the terminal abdominal ganglion and the fifth abdominal ganglion. Functional OCT data were collected over time with the OCT beam illuminating selected single point in the connectives (i.e. OCT M-scans were acquired). Phase changes of the OCT signal were analyzed to visualize occurrence of activation in the neural cord. Electrophysiology recordings (microelectrode method) were also performed as a reference method to demonstrate electrical response of the sample to stimulation.

  7. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  8. Minimum Detectable Activity for Tomographic Gamma Scanning System

    Energy Technology Data Exchange (ETDEWEB)

    Venkataraman, Ram [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Smith, Susan [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Kirkpatrick, J. M. [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Croft, Stephen [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    For any radiation measurement system, it is useful to explore and establish the detection limits and a minimum detectable activity (MDA) for the radionuclides of interest, even if the system is to be used at far higher values. The MDA serves as an important figure of merit, and often a system is optimized and configured so that it can meet the MDA requirements of a measurement campaign. The non-destructive assay (NDA) systems based on gamma ray analysis are no exception and well established conventions, such the Currie method, exist for estimating the detection limits and the MDA. However, the Tomographic Gamma Scanning (TGS) technique poses some challenges for the estimation of detection limits and MDAs. The TGS combines high resolution gamma ray spectrometry (HRGS) with low spatial resolution image reconstruction techniques. In non-imaging gamma ray based NDA techniques measured counts in a full energy peak can be used to estimate the activity of a radionuclide, independently of other counting trials. However, in the case of the TGS each “view” is a full spectral grab (each a counting trial), and each scan consists of 150 spectral grabs in the transmission and emission scans per vertical layer of the item. The set of views in a complete scan are then used to solve for the radionuclide activities on a voxel by voxel basis, over 16 layers of a 10x10 voxel grid. Thus, the raw count data are not independent trials any more, but rather constitute input to a matrix solution for the emission image values at the various locations inside the item volume used in the reconstruction. So, the validity of the methods used to estimate MDA for an imaging technique such as TGS warrant a close scrutiny, because the pair-counting concept of Currie is not directly applicable. One can also raise questions as to whether the TGS, along with other image reconstruction techniques which heavily intertwine data, is a suitable method if one expects to measure samples whose activities

  9. Immunoliposome-PCR: a generic ultrasensitive quantitative antigen detection system

    Directory of Open Access Journals (Sweden)

    He Junkun

    2012-06-01

    encapsulate multiple reporters per liposome also helps overcome the effect of polymerase inhibitors present in biological specimens. Finally, the biotin-labeled liposome detection reagent can be coupled through a NeutrAvidin bridge to a multitude of biotin-labeled probes, making ILPCR a highly generic assay system.

  10. The 5th Umpire: Automating Cricket's Edge Detection System

    Directory of Open Access Journals (Sweden)

    R. Rock

    2013-02-01

    Full Text Available The game of cricket and the use of technology in the sport have grown rapidly over the past decade. However, technology-based systems introduced to adjudicate decisions such as run outs, stumpings, boundary infringements and close catches are still prone to human error, and thus their acceptance has not been fully embraced by cricketing administrators. In particular, technology is not employed for bat-pad decisions. Although the snickometer may assist in adjudicating such decisions it depends heavily on human interpretation. The aim of this study is to investigate the use of Wavelets in developing an edgedetection adjudication system for the game of cricket. Artificial Intelligence (AI tools, namely Neural Networks, will be employed to automate this edge detection process. Live audio samples of ball-on-bat and ball-on-pad events from a cricket match will be recorded. DSP analysis, feature extraction and neural network classification will then be employed on these samples. Results will show the ability of the neural network to differentiate between these key events. This is crucial to developing a fully automated edge detection system.

  11. Eyegaze Detection from Monocular Camera Image for Eyegaze Communication System

    Science.gov (United States)

    Ohtera, Ryo; Horiuchi, Takahiko; Kotera, Hiroaki

    An eyegaze interface is one of the key technologies as an input device in the ubiquitous-computing society. In particular, an eyegaze communication system is very important and useful for severely handicapped users such as quadriplegic patients. Most of the conventional eyegaze tracking algorithms require specific light sources, equipment and devices. In this study, a simple eyegaze detection algorithm is proposed using a single monocular video camera. The proposed algorithm works under the condition of fixed head pose, but slight movement of the face is accepted. In our system, we assume that all users have the same eyeball size based on physiological eyeball models. However, we succeed to calibrate the physiologic movement of the eyeball center depending on the gazing direction by approximating it as a change in the eyeball radius. In the gaze detection stage, the iris is extracted from a captured face frame by using the Hough transform. Then, the eyegaze angle is derived by calculating the Euclidean distance of the iris centers between the extracted frame and a reference frame captured in the calibration process. We apply our system to an eyegaze communication interface, and verified the performance through key typing experiments with a visual keyboard on display.

  12. Detecting and Refactoring Operational Smells within the Domain Name System

    Directory of Open Access Journals (Sweden)

    Marwan Radwan

    2015-04-01

    Full Text Available The Domain Name System (DNS is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.

  13. Development of terahertz endoscopic system for cancer detection

    Science.gov (United States)

    Doradla, Pallavi; Alavi, Karim; Joseph, Cecil S.; Giles, Robert H.

    2016-02-01

    Terahertz (THz) imaging is emerging as a robust platform for a myriad of applications in the fields of security, health, astronomy and material science. The terahertz regime with wavelengths spanning from microns to millimeters is a potentially safe and noninvasive medical imaging modality for detecting cancers. Endoscopic imaging systems provide high flexibility in examining the interior surfaces of an organ or tissue. Researchers have been working on the development of THz endoscopes with photoconductive antennas, which necessarily operate under high voltage, and require at least two channels to measure the reflected signal from the specimen. This manuscript provides the design and imperative steps involved in the development of a single-channel terahertz endoscopic system. The continuous-wave terahertz imaging system utilizes a single flexible terahertz waveguide channel to transmit and collect the back reflected intrinsic terahertz signal from the sample and is capable of operation in both transmission and reflection modalities. To determine the feasibility of using a terahertz endoscope for cancer detection, the co- and cross-polarized terahertz remittance from human colonic tissue specimens were collected at 584 GHz frequency. The two dimensional terahertz images obtained using polarization specific detection exhibited intrinsic contrast between cancerous and normal regions of fresh colorectal tissue. The level of contrast observed using endoscopic imaging correlates well with the contrast levels observed in the free space ex vivo terahertz reflectance studies of human colonic tissue. The prototype device developed in this study represents a significant step towards clinical endoscopic application of THz technology for in vivo colon cancer screening.

  14. Fault detection and isolation of sensors in aeration control systems.

    Science.gov (United States)

    Carlsson, Bengt; Zambrano, Jesús

    2016-01-01

    In this paper, we consider the problem of fault detection (FD) and isolation in the aeration system of an activated sludge process. For this study, the dissolved oxygen in each aerated zone is assumed to be controlled automatically. As the basis for an FD method we use the ratio of air flow rates into different zones. The method is evaluated in two scenarios: using the Benchmark Simulation Model no. 1 (BSM1) by Monte Carlo simulations and using data from a wastewater treatment plant. The FD method shows good results for a correct and early FD and isolation.

  15. Methods and systems for detecting abnormal digital traffic

    Science.gov (United States)

    Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA

    2011-03-22

    Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.

  16. Trace detection of analytes using portable raman systems

    Science.gov (United States)

    Alam, M. Kathleen; Hotchkiss, Peter J.; Martin, Laura E.; Jones, David Alexander

    2015-11-24

    Apparatuses and methods for in situ detection of a trace amount of an analyte are disclosed herein. In a general embodiment, the present disclosure provides a surface-enhanced Raman spectroscopy (SERS) insert including a passageway therethrough, where the passageway has a SERS surface positioned therein. The SERS surface is configured to adsorb molecules of an analyte of interest. A concentrated sample is caused to flow over the SERS surface. The SERS insert is then provided to a portable Raman spectroscopy system, where it is analyzed for the analyte of interest.

  17. Detecting recurrence domains of dynamical systems by symbolic dynamics.

    Science.gov (United States)

    beim Graben, Peter; Hutt, Axel

    2013-04-12

    We propose an algorithm for the detection of recurrence domains of complex dynamical systems from time series. Our approach exploits the characteristic checkerboard texture of recurrence domains exhibited in recurrence plots. In phase space, recurrence plots yield intersecting balls around sampling points that could be merged into cells of a phase space partition. We construct this partition by a rewriting grammar applied to the symbolic dynamics of time indices. A maximum entropy principle defines the optimal size of intersecting balls. The final application to high-dimensional brain signals yields an optimal symbolic recurrence plot revealing functional components of the signal.

  18. Performance Enhancement of Intrusion Detection using Neuro - Fuzzy Intelligent System

    Directory of Open Access Journals (Sweden)

    Dr. K. S. Anil Kumar

    2014-10-01

    Full Text Available This research work aims at developing hybrid algorithms using data mining techniques for the effective enhancement of anomaly intrusion detection performance. Many proposed algorithms have not addressed their reliability with varying amount of malicious activity or their adaptability for real time use. The study incorporates a theoretical basis for improvement in performance of IDS using K-medoids Algorithm, Fuzzy Set Algorithm, Fuzzy Rule System and Neural Network techniques. Also statistical significance of estimates has been looked into for finalizing the best one using DARPA network traffic datasets.

  19. Spacecraft dynamics characterization and control system failure detection

    Science.gov (United States)

    Vandervelde, Wallace E.

    1990-08-01

    Two important aspects of the control of large space structures are studied: the modeling of deployed or erected structures including nonlinear joint characteristics; and the detection and isolation of failures of the components of control systems for large space structures. The emphasis in the first task is on efficient representation of the dynamics of large and complex structures having a great many joints. The initial emphasis in the second task is on experimental evaluation of FDI methodologies using ground-based facilities in place at NASA Langley Research Center and Marshall Space Flight Center. The progress to date on both research tasks is summarized.

  20. Near-Optimal Detection in MIMO Systems using Gibbs Sampling

    DEFF Research Database (Denmark)

    Hansen, Morten; Hassibi, Babak; Dimakis, Georgios Alexandros

    2009-01-01

    In this paper we study a Markov Chain Monte Carlo (MCMC) Gibbs sampler for solving the integer least-squares problem. In digital communication the problem is equivalent to preforming Maximum Likelihood (ML) detection in Multiple-Input Multiple-Output (MIMO) systems. While the use of MCMC methods...... for such problems has already been proposed, our method is novel in that we optimize the "temperature" parameter so that in steady state, i.e., after the Markov chain has mixed, there is only polynomially (rather than exponentially) small probability of encountering the optimal solution. More precisely, we obtain...

  1. Image change detection systems, methods, and articles of manufacture

    Science.gov (United States)

    Jones, James L.; Lassahn, Gordon D.; Lancaster, Gregory D.

    2010-01-05

    Aspects of the invention relate to image change detection systems, methods, and articles of manufacture. According to one aspect, a method of identifying differences between a plurality of images is described. The method includes loading a source image and a target image into memory of a computer, constructing source and target edge images from the source and target images to enable processing of multiband images, displaying the source and target images on a display device of the computer, aligning the source and target edge images, switching displaying of the source image and the target image on the display device, to enable identification of differences between the source image and the target image.

  2. Systems and methods for detecting x-rays

    Science.gov (United States)

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2006-05-02

    Systems and methods for detecting x-rays are disclosed herein. One or more x-ray-sensitive scintillators can be configured from a plurality of heavy element nano-sized particles and a plastic material, such as polystyrene. As will be explained in greater detail herein, the heavy element nano-sized particles (e.g., PbWO4) can be compounded into the plastic material with at least one dopant that permits the plastic material to scintillate. X-rays interact with the heavy element nano-sized particles to produce electrons that can deposit energy in the x-ray sensitive scintillator, which in turn can produce light.

  3. Noncoherent detection of DQPSK in OFDM systems using predictive VA

    Science.gov (United States)

    Veludandi, Vineel K.; Vasudevan, K.

    2017-01-01

    Noncoherent detection of differential quaternary phase shift keying (DQPSK) signals in OFDM systems is efficiently implemented using a predictive Viterbi algorithm (VA) operating on a trellis with just S T = MP‑1 states instead of M P states, where M denotes an M-ary PSK constellation and P denotes the order of the prediction filter. The prediction filter coefficients are generated based on the channel DFT alone making a high SNR approximation, since the estimation of the noise-variance using training symbols results in loss of throughput.

  4. Detection of Camplylobacter Species Using a Fluorogenic Real-Time PCR Detection System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Objective:Traditional methods for the detecction of C.jejuni are slow,labour-intensive and costly,especially when large numbers of samples are involved,In this report,we describe a PapManfluorogenic PCR system to rapidly detect and quantitate C.Jejuni.Methods: TapMan PCR uses a pair of primers and a fluorescently-labeled TaqMan probe,The C.jejuni-specific primers and probe were designed through a specific primer designing program based on C.jejuni-specific sequence,Campylobacter strains and non-campylobacters were tested with this assay.Spiked chicken rinse,milk and water samples were also tested.Results:This PCR assay detected all 22C.jejuni and two C.coli strains tested,while none of the 23 non-campylobacters tested positive.The assay was 100% specific for campylobacters,This assay can quantitate C.jejuni over a 5-log range,with the thershold of detection being less than 100 cfu in water and approximately 1000 cfu in chicken rines,The TaqMan PCR assay gave positive signals for chicken rinse,milk,and water samples inoculated with C.jejuni at 1.5-3.5cfu/25ml sample within 2h,after enrichment in Preston broth at 37℃ for 3-4h and then at 42℃ for 16-20h.Conclusion.:the Taqman PCR assay can be used for the detection and enumeration of C.jejuni from milk,chicken,and water samples with a short enrichment step.This technology should be useful for the food industry in monitoring levels of C.jejunit and C.coli at various critical control points in a food processing facility.

  5. Automated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes

    Directory of Open Access Journals (Sweden)

    Frances Bernadette C. De Ocampo

    2015-05-01

    Full Text Available Signature-based Intrusion Detection System (IDS helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion patterns that are manually created. If the signature database of the Signature-based IDS is not updated, network attacks just pass through this type of IDS without being noticed. To avoid this, an Anomaly-based IDS is used in order to countercheck if a network traffic that is not detected by Signature-based IDS is a true malicious traffic or not. In doing so, the Anomaly-based IDS might come up with several numbers of logs containing numerous network attacks which could possibly be a false positive. This is the reason why the Anomaly-based IDS is not perfect, it would readily alarm the system that a network traffic is an attack just because it is not on its baseline. In order to resolve the problem between these two IDSs, the goal is to correlate data between the logs of the Anomaly-based IDS and the packet that has been captured in order to determine if a network traffic is really malicious or not. With the supervision of a security expert, the malicious network traffic would be verified as malicious. Using machine learning, the researchers can identify which algorithm is better than the other algorithms in classifying if a certain network traffic is really malicious. Upon doing so, the creation of signatures would follow by basing the automated creation of signatures from the detected malicious traffic.

  6. System to Detect Racial-based Bullying through Gamification

    Directory of Open Access Journals (Sweden)

    José Antonio Álvarez-Bermejo

    2016-11-01

    Full Text Available Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following gamification principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. Grounded Theory and User Centered Design were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination.

  7. System to Detect Racial-Based Bullying through Gamification

    Science.gov (United States)

    Álvarez-Bermejo, José A.; Belmonte-Ureña, Luis J.; Martos-Martínez, Africa; Barragán-Martín, Ana B.; del Mar Simón-Marquez, María

    2016-01-01

    Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following “gamification” principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. “Grounded Theory” and “User Centered Design” were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination. PMID:27933006

  8. CASCADE - a multi-layer Boron-10 neutron detection system

    CERN Document Server

    Köhli, M; Allmendinger, F; Perrevoort, A -K; Schröder, T; Martin, N; Schmidt, C J; Schmidt, U

    2016-01-01

    The globally increased demand for helium-3 along with the limited availability of this gas calls for the development of alternative technologies for the large ESS instrumentation pool. We report on the CASCADE Project - a novel detection system, which has been developed for the purposes of neutron spin echo spectroscopy. It features 2D spatially resolved detection of thermal neutrons at high rates. The CASCADE detector is composed of a stack of solid boron-10 coated Gas Electron Multiplier foils, which serve both as a neutron converter and as an amplifier for the primary ionization deposited in the standard Argon-CO2 counting gas environment. This multi-layer setup efficiently increases the detection efficiency and serves as a helium-3 alternative. It has furthermore been possible to extract the signal of the charge traversing the stack to identify the very thin conversion layer of about 1 micrometer. This allows the precise determination of the time-of-flight, necessary for the application in MIEZE spin echo...

  9. HYBRID FEATURE SELECTION ALGORITHM FOR INTRUSION DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    Seyed Reza Hasani

    2014-01-01

    Full Text Available Network security is a serious global concern. Usefulness Intrusion Detection Systems (IDS are increasing incredibly in Information Security research using Soft computing techniques. In the previous researches having irrelevant and redundant features are recognized causes of increasing the processing speed of evaluating the known intrusive patterns. In addition, an efficient feature selection method eliminates dimension of data and reduce redundancy and ambiguity caused by none important attributes. Therefore, feature selection methods are well-known methods to overcome this problem. There are various approaches being utilized in intrusion detections, they are able to perform their method and relatively they are achieved with some improvements. This work is based on the enhancement of the highest Detection Rate (DR algorithm which is Linear Genetic Programming (LGP reducing the False Alarm Rate (FAR incorporates with Bees Algorithm. Finally, Support Vector Machine (SVM is one of the best candidate solutions to settle IDSs problems. In this study four sample dataset containing 4000 random records are excluded randomly from this dataset for training and testing purposes. Experimental results show that the LGP_BA method improves the accuracy and efficiency compared with the previous related research and the feature subcategory offered by LGP_BA gives a superior representation of data.

  10. System to Detect Racial-Based Bullying through Gamification.

    Science.gov (United States)

    Álvarez-Bermejo, José A; Belmonte-Ureña, Luis J; Martos-Martínez, Africa; Barragán-Martín, Ana B; Del Mar Simón-Marquez, María

    2016-01-01

    Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following "gamification" principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. "Grounded Theory" and "User Centered Design" were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination.

  11. An adaptive tracking observer for failure-detection systems

    Science.gov (United States)

    Sidar, M.

    1982-01-01

    The design problem of adaptive observers applied to linear, constant and variable parameters, multi-input, multi-output systems, is considered. It is shown that, in order to keep the observer's (or Kalman filter) false-alarm rate (FAR) under a certain specified value, it is necessary to have an acceptable proper matching between the observer (or KF) model and the system parameters. An adaptive observer algorithm is introduced in order to maintain desired system-observer model matching, despite initial mismatching and/or system parameter variations. Only a properly designed adaptive observer is able to detect abrupt changes in the system (actuator, sensor failures, etc.) with adequate reliability and FAR. Conditions for convergence for the adaptive process were obtained, leading to a simple adaptive law (algorithm) with the possibility of an a priori choice of fixed adaptive gains. Simulation results show good tracking performance with small observer output errors and accurate and fast parameter identification, in both deterministic and stochastic cases.

  12. System and method of detecting cavitation in pumps

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Bin; Sharma, Santosh Kumar; Yan, Ting; Dimino, Steven A.

    2017-10-03

    A system and method for detecting cavitation in pumps for fixed and variable supply frequency applications is disclosed. The system includes a controller having a processor programmed to repeatedly receive real-time operating current data from a motor driving a pump, generate a current frequency spectrum from the current data, and analyze current data within a pair of signature frequency bands of the current frequency spectrum. The processor is further programmed to repeatedly determine fault signatures as a function of the current data within the pair of signature frequency bands, repeatedly determine fault indices based on the fault signatures and a dynamic reference signature, compare the fault indices to a reference index, and identify a cavitation condition in a pump based on a comparison between the reference index and a current fault index.

  13. Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS

    CERN Document Server

    Jemili, Farah; Ahmed, Mohamed Ben

    2009-01-01

    This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to recognize its type and to predict the possible intrusions that will follow it. The proposed system takes into account the uncertainty and imprecision that can affect the statistical data of the historic. The systematic utilization of an unique probability distribution to represent this type of knowledge supposes a too rich subjective information and risk to be in part arbitrary. One of the first objectives of this work was therefore to permit the consistency between the manner of which we represent information and information which we really dispose.

  14. A Survey of Artificial Immune System Based Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Hua Yang

    2014-01-01

    Full Text Available In the area of computer security, Intrusion Detection (ID is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS. The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs. This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  15. Multi-sources information fusion algorithm in airborne detection systems

    Institute of Scientific and Technical Information of China (English)

    Yang Yan; Jing Zhanrong; Gao Tian; Wang Huilong

    2007-01-01

    To aim at the multimode character of the data from the airplane detecting system, the paper combines DempsterSharer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation.

  16. Detecting quantum speedup in closed and open systems

    Science.gov (United States)

    Xu, Zhen-Yu

    2016-07-01

    We construct a general measure for detecting the quantum speedup in both closed and open systems. The speed measure is based on the changing rate of the position of quantum states on a manifold with appropriate monotone Riemannian metrics. Any increase in speed is a clear signature of dynamical speedup. To clarify the mechanisms for quantum speedup, we first introduce the concept of longitudinal and transverse types of speedup: the former stems from the time evolution process itself with fixed initial conditions, while the latter is a result of adjusting initial conditions. We then apply the proposed measure to several typical closed and open quantum systems, illustrating that quantum coherence (or entanglement) and the memory effect of the environment together can become resources for longitudinally or transversely accelerating dynamical evolution under specific conditions and assumptions.

  17. Organ culture system as a means to detect celiac disease.

    Science.gov (United States)

    Picarelli, Antonio; Libanori, Valerio; De Nitto, Daniela; Saponara, Annarita; Di Tola, Marco; Donato, Giuseppe

    2010-01-01

    Anti-endomysial and anti-transglutaminase antibodies can be produced in vitro by the intestinal mucosa of celiac disease (CD) patients in clinical remission, when the culture is performed in the presence of gliadin peptides. Our aim was to use this organ culture system as a means to detect the pathognomonic antibodies of celiac disease (CD) in the culture supernatants. Organ culture was performed in the presence of three different activators to evaluate which one induced the strongest antibody response in intestinal mucosa from patients in clinical remission of CD. Our data confirm the high efficiency of synthetic peptide 31-43 as a specific immunological activator in CD and demonstrate its capability to stimulate production/secretion of CD-specific antibodies. We envision that this organ culture system may prove to be useful as a new technique for CD diagnosis.

  18. High Resolution Software Defined Radar System for Target Detection

    Directory of Open Access Journals (Sweden)

    S. Costanzo

    2013-01-01

    Full Text Available The Universal Software Radio Peripheral USRP NI2920, a software defined transceiver so far mainly used in Software Defined Radio applications, is adopted in this work to design a high resolution L-Band Software Defined Radar system. The enhanced available bandwidth, due to the Gigabit Ethernet interface, is exploited to obtain a higher slant-range resolution with respect to the existing Software Defined Radar implementations. A specific LabVIEW application, performing radar operations, is discussed, and successful validations are presented to demonstrate the accurate target detection capability of the proposed software radar architecture. In particular, outdoor and indoor test are performed by adopting a metal plate as reference structure located at different distances from the designed radar system, and results obtained from the measured echo are successfully processed to accurately reveal the correct target position, with the predicted slant-range resolution equal to 6 m.

  19. High Altitude Aerial Natural Gas Leak Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Richard T. Wainner; Mickey B. Frish; B. David Green; Matthew C. Laderer; Mark G. Allen; Joseph R. Morency

    2006-12-31

    The objective of this program was to develop and demonstrate a cost-effective and power-efficient advanced standoff sensing technology able to detect and quantify, from a high-altitude (> 10,000 ft) aircraft, natural gas leaking from a high-pressure pipeline. The advanced technology is based on an enhanced version of the Remote Methane Leak Detector (RMLD) platform developed previously by Physical Sciences Inc. (PSI). The RMLD combines a telecommunications-style diode laser, fiber-optic components, and low-cost DSP electronics with the well-understood principles of Wavelength Modulation Spectroscopy (WMS), to indicate the presence of natural gas located between the operator and a topographic target. The transceiver transmits a laser beam onto a topographic target and receives some of the laser light reflected by the target. The controller processes the received light signal to deduce the amount of methane in the laser's path. For use in the airborne platform, we modified three aspects of the RMLD, by: (1) inserting an Erbium-doped optical fiber laser amplifier to increase the transmitted laser power from 10 mW to 5W; (2) increasing the optical receiver diameter from 10 cm to 25 cm; and (3) altering the laser wavelength from 1653 nm to 1618 nm. The modified RMLD system provides a path-integrated methane concentration sensitivity {approx}5000 ppm-m, sufficient to detect the presence of a leak from a high capacity transmission line while discriminating against attenuation by ambient methane. In ground-based simulations of the aerial leak detection scenario, we demonstrated the ability to measure methane leaks within the laser beam path when it illuminates a topographic target 2000 m away. We also demonstrated simulated leak detection from ranges of 200 m using the 25 cm optical receiver without the fiber amplifier.

  20. Analysis of Public Datasets for Wearable Fall Detection Systems

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2017-06-01

    Full Text Available Due to the boom of wireless handheld devices such as smartwatches and smartphones, wearable Fall Detection Systems (FDSs have become a major focus of attention among the research community during the last years. The effectiveness of a wearable FDS must be contrasted against a wide variety of measurements obtained from inertial sensors during the occurrence of falls and Activities of Daily Living (ADLs. In this regard, the access to public databases constitutes the basis for an open and systematic assessment of fall detection techniques. This paper reviews and appraises twelve existing available data repositories containing measurements of ADLs and emulated falls envisaged for the evaluation of fall detection algorithms in wearable FDSs. The analysis of the found datasets is performed in a comprehensive way, taking into account the multiple factors involved in the definition of the testbeds deployed for the generation of the mobility samples. The study of the traces brings to light the lack of a common experimental benchmarking procedure and, consequently, the large heterogeneity of the datasets from a number of perspectives (length and number of samples, typology of the emulated falls and ADLs, characteristics of the test subjects, features and positions of the sensors, etc.. Concerning this, the statistical analysis of the samples reveals the impact of the sensor range on the reliability of the traces. In addition, the study evidences the importance of the selection of the ADLs and the need of categorizing the ADLs depending on the intensity of the movements in order to evaluate the capability of a certain detection algorithm to discriminate falls from ADLs.

  1. Extending TOPS: Ontology-driven Anomaly Detection and Analysis System

    Science.gov (United States)

    Votava, P.; Nemani, R. R.; Michaelis, A.

    2010-12-01

    Terrestrial Observation and Prediction System (TOPS) is a flexible modeling software system that integrates ecosystem models with frequent satellite and surface weather observations to produce ecosystem nowcasts (assessments of current conditions) and forecasts useful in natural resources management, public health and disaster management. We have been extending the Terrestrial Observation and Prediction System (TOPS) to include a capability for automated anomaly detection and analysis of both on-line (streaming) and off-line data. In order to best capture the knowledge about data hierarchies, Earth science models and implied dependencies between anomalies and occurrences of observable events such as urbanization, deforestation, or fires, we have developed an ontology to serve as a knowledge base. We can query the knowledge base and answer questions about dataset compatibilities, similarities and dependencies so that we can, for example, automatically analyze similar datasets in order to verify a given anomaly occurrence in multiple data sources. We are further extending the system to go beyond anomaly detection towards reasoning about possible causes of anomalies that are also encoded in the knowledge base as either learned or implied knowledge. This enables us to scale up the analysis by eliminating a large number of anomalies early on during the processing by either failure to verify them from other sources, or matching them directly with other observable events without having to perform an extensive and time-consuming exploration and analysis. The knowledge is captured using OWL ontology language, where connections are defined in a schema that is later extended by including specific instances of datasets and models. The information is stored using Sesame server and is accessible through both Java API and web services using SeRQL and SPARQL query languages. Inference is provided using OWLIM component integrated with Sesame.

  2. A dual-sided coded-aperture radiation detection system

    Science.gov (United States)

    Penny, R. D.; Hood, W. E.; Polichar, R. M.; Cardone, F. H.; Chavez, L. G.; Grubbs, S. G.; Huntley, B. P.; Kuharski, R. A.; Shyffer, R. T.; Fabris, L.; Ziock, K. P.; Labov, S. E.; Nelson, K.

    2011-10-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5×5×50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  3. Long distance high power optical laser fiber break detection and continuity monitoring systems and methods

    Energy Technology Data Exchange (ETDEWEB)

    Rinzler, Charles C.; Gray, William C.; Faircloth, Brian O.; Zediker, Mark S.

    2016-02-23

    A monitoring and detection system for use on high power laser systems, long distance high power laser systems and tools for performing high power laser operations. In particular, the monitoring and detection systems provide break detection and continuity protection for performing high power laser operations on, and in, remote and difficult to access locations.

  4. Multi-parameter optimization of a neutron backscattering landmine detection system.

    Science.gov (United States)

    Metwally, Walid A

    2015-11-01

    A study was performed to enhance the neutron moderation and investigate the response of a landmine detection system based on measuring backscattered neutrons with a (3)He detector. Parameters affecting the system's response were simultaneously optimized to improve the sensitivity of the detection system. The optimized sensitivity of the detection system was analyzed for different horizontal and lateral positions of a landmine.

  5. 21 CFR 866.5900 - Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system.

    Science.gov (United States)

    2010-04-01

    ... regulator (CFTR) gene mutation detection system. 866.5900 Section 866.5900 Food and Drugs FOOD AND DRUG... DEVICES Immunological Test Systems § 866.5900 Cystic fibrosis transmembrane conductance regulator (CFTR) gene mutation detection system. (a) Identification. The CFTR gene mutation detection system is a...

  6. Long distance high power optical laser fiber break detection and continuity monitoring systems and methods

    Energy Technology Data Exchange (ETDEWEB)

    Rinzler, Charles C.; Gray, William C.; Faircloth, Brian O.; Zediker, Mark S.

    2016-02-23

    A monitoring and detection system for use on high power laser systems, long distance high power laser systems and tools for performing high power laser operations. In particular, the monitoring and detection systems provide break detection and continuity protection for performing high power laser operations on, and in, remote and difficult to access locations.

  7. 46 CFR 108.407 - Detectors for electric fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Detectors for electric fire detection system. 108.407... DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.407 Detectors for electric fire detection system. (a) Each detector in an electric fire detection system must be located where— (1)...

  8. Development of a Vehicle-Mounted Crop Detection System

    Institute of Scientific and Technical Information of China (English)

    ZHONG Zhen-jiang; SUN Hong; LI Min-zan; ZHANG Feng; LI Xiu-hua

    2014-01-01

    In order to monitor plant chlorophyll content in real-time, a new vehicle-mounted detection system was developed to measure crop canopy spectral characteristics. It was designed to work as a wireless sensor network with one control unit and one measuring unit. The control unit included a personal digital assistant (PDA) device with a ZigBee wireless network coordinator. As the coordinator of the whole wireless network, the control unit was used to receive, display and store all the data sent from sensor nodes. The measuring unit consisted of several optical sensor nodes. All the sensor nodes were mounted on an on-board mechanical structure so that the measuring unit could collect the canopy spectral data while moving. Each sensor node contained four optical channels to measure the light radiation at the wavebands of 550, 650, 766, and 850 nm. The calibration tests veriifed a good performance in terms of the wireless transmission ability and the sensor measurement precision. Both stationary and moving ifeld experiments were also conducted in a winter wheat experimental ifeld. There was a high correlation between chlorophyll content and vegetation index, and several estimation models of the chlorophyll content were established. The highest R2 of the estimation models was 0.718. The results showed that the vehicle-mounted crop detection system has potential for ifeld application.

  9. Real-Time EEG-Based Happiness Detection System

    Directory of Open Access Journals (Sweden)

    Noppadon Jatupaiboon

    2013-01-01

    Full Text Available We propose to use real-time EEG signal to classify happy and unhappy emotions elicited by pictures and classical music. We use PSD as a feature and SVM as a classifier. The average accuracies of subject-dependent model and subject-independent model are approximately 75.62% and 65.12%, respectively. Considering each pair of channels, temporal pair of channels (T7 and T8 gives a better result than the other area. Considering different frequency bands, high-frequency bands (Beta and Gamma give a better result than low-frequency bands. Considering different time durations for emotion elicitation, that result from 30 seconds does not have significant difference compared with the result from 60 seconds. From all of these results, we implement real-time EEG-based happiness detection system using only one pair of channels. Furthermore, we develop games based on the happiness detection system to help user recognize and control the happiness.

  10. A logarithmic detection system for heavy ion experiments

    Science.gov (United States)

    Wang, Jinchuan; Zhan, Wenlong; Guo, Zhongyan; Xi, Hongfei; Zhou, Jianqun; Lei, Huaihong; Zhao, Youxiong; Luo, Yongfeng

    1996-02-01

    The performance of a logarithmic detection system is investigated for the 25 MeV/u 40Ar induced reaction. The detection system consists of four parts: an axial ionization chamber (IC), a position sensitive silicon detector (PSSD), a large area PIN silicon photodiode (SPD) and a 16 element CsI(Tl) scintillator array. The energy resolutions for IC and PSSD tested with241 Am (5.486 MeV) sources were 3 and 2.6% (FWHM), respectively. Fragments with Z values from Z = 2 to Z = 21 were identified in the reaction 40Ar + 115In. A Z resolving power of Z/(ΔZ) ~ 44.5 (FWHM) for Z = 18 has been achieved, and the energy dynamic range for α-particles was about 2-130 MeV. A position resolution of 0.86+/-0.03 mm (FWHM) for PSSD was obtained for the reaction 40Ar + 27Al with 1 μs amplifier shaping time.

  11. Foundations for Improvements to Passive Detection Systems - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Labov, S E; Pleasance, L; Sokkappa, P; Craig, W; Chapline, G; Frank, M; Gronberg, J; Jernigan, J G; Johnson, S; Kammeraad, J; Lange, D; Meyer, A; Nelson, K; Pohl, B; Wright, D; Wurtz, R

    2004-10-07

    This project explores the scientific foundation and approach for improving passive detection systems for plutonium and highly enriched uranium in real applications. Sources of gamma-ray radiation of interest were chosen to represent a range of national security threats, naturally occurring radioactive materials, industrial and medical radiation sources, and natural background radiation. The gamma-ray flux emerging from these sources, which include unclassified criticality experiment configurations as surrogates for nuclear weapons, were modeled in detail. The performance of several types of gamma-ray imaging systems using Compton scattering were modeled and compared. A mechanism was created to model the combine sources and background emissions and have the simulated radiation ''scene'' impinge on a model of a detector. These modeling tools are now being used in various projects to optimize detector performance and model detector sensitivity in complex measuring environments. This study also developed several automated algorithms for isotope identification from gamma-ray spectra and compared these to each other and to algorithms already in use. Verification testing indicates that these alternative isotope identification algorithms produced less false positive and false negative results than the ''GADRAS'' algorithms currently in use. In addition to these algorithms that used binned spectra, a new approach to isotope identification using ''event mode'' analysis was developed. Finally, a technique using muons to detect nuclear material was explored.

  12. Computed tomography imaging system design for shape threat detection

    Science.gov (United States)

    Masoudi, Ahmad; Thamvichai, Ratchaneekorn; Neifeld, Mark A.

    2017-04-01

    In the first part of this work, we present two methods for improving the shape-threat detection performance of x-ray computed tomography. Our work uses a fixed-gantry system employing 25 x-ray sources. We first utilize Kullback-Leibler divergence and Mahalanobis distance to determine the optimal single-source single-exposure measurement. The second method employs gradient search on Bhattacharyya bound on error rate (Pe) to determine an optimal multiplexed measurement that simultaneously utilizes all available sources in a single exposure. With limited total resources of 106 photons, the multiplexed measurement provides a 41.8× reduction in Pe relative to the single-source measurement. In the second part, we consider multiple exposures and develop an adaptive measurement strategy for x-ray threat detection. Using the adaptive strategy, we design the next measurement based on information retrieved from previous measurements. We determine both optimal "next measurement" and stopping criterion to insure a target Pe using sequential hypothesis testing framework. With adaptive single-source measurements, we can reduce Pe by a factor of 40× relative to the measurements employing all sources in sequence. We also observe that there is a trade-off between measurement SNR and number of detectors when we study the performance of systems with reduced detector numbers.

  13. Scintillation Light Detection System in LArIAT

    Energy Technology Data Exchange (ETDEWEB)

    Kryczynski, Pawel [Cracow, INP

    2016-02-29

    The LArIAT experiment is currently taking data at Fermilab using a Liquid Argon TPC, with the aim of studying particle interactions and characterizing detector response for neutrino detectors using argon. In parallel, it serves as a test-bench to develop and evaluate the performance of the simulation, reconstruction, and analysis software used in LAr neutrino experiments. LArIAT also takes advantage of the scintillating capabilities of liquid argon and will evaluate the feasibility of using the light signal to determine calorimetric information and particle identification. To test this possibility, a scintillation light detection system consisting of high Quantum Efficiency (QE) PMT and Silicon Photomultiplier (SiPM) devices is installed in the cryostat, viewing the interior of the TPC. Light collection efficiency is maximized by means of lining the walls with reflector foils covered by a wavelength shifter layer. Collecting the light reflected at the boundaries of the active volume greatly improves also the uniformity of the light yield. Presented here are initial results of the LArIAT light detection system calibration together with the preliminary results of the dedicated simulation and its application in future LAr TPC experiments

  14. Detecting Topological Defect Dark Matter Using Coherent Laser Ranging System.

    Science.gov (United States)

    Yang, Wanpeng; Leng, Jianxiao; Zhang, Shuangyou; Zhao, Jianye

    2016-07-08

    In the last few decades, optical frequency combs with high intensity, broad optical bandwidth, and directly traceable discrete wavelengths have triggered rapid developments in distance metrology. However, optical frequency combs to date have been limited to determine the absolute distance to an object (such as satellite missions). We propose a scheme for the detection of topological defect dark matter using a coherent laser ranging system composed of dual-combs and an optical clock via nongravitational signatures. The dark matter field, which comprises a defect, may interact with standard model particles, including quarks and photons, resulting in the alteration of their masses. Thus, a topological defect may function as a dielectric material with a distinctive frequency-depend index of refraction, which would cause the time delay of a periodic extraterrestrial or terrestrial light. When a topological defect passes through the Earth, the optical path of long-distance vacuum path is altered, this change in optical path can be detected through the coherent laser ranging system. Compared to continuous wavelength(cw) laser interferometry methods, dual-comb interferometry in our scheme excludes systematic misjudgement by measuring the absolute optical path length.

  15. Penstock failure detection system at the "Valsan" hydro power plant

    Science.gov (United States)

    Georgescu, A. M.; Coşoiu, C. I.; Alboiu, N.; Hlevca, D.; Tataroiu, R.; Popescu, O.

    2012-11-01

    "Valsan" is a small Hydro Power Plant, 5 MW, situated at about 160 km north of Bucharest, Romania, on the small "Valsan" river in a remote mountainous area. It is equipped with a single Francis turbine. The penstock is located in the access shaft of the HPP. "Hidroelectrica", the Romanian company that operates the HPP, was trying to implement a remote penstock failure detection system. Starting from a classic hydraulic problem, the authors of the paper derived a method for failure detection and localization on the pipe. The method assumes the existence of 2 flow meters and 2 pressure transducers at the inlet and outlet of the pressurized pipe. Calculations have to be based on experimental values measured in a permanent regime for different values of the flow rate. The method was at first tested on a pipe, in the Hydraulic Laboratory of the Technical University of Civil Engineering Bucharest. Pipe failure was modelled by opening of a valve on a tee branch of the analyzed pipe. Experimental results were found to be in good agreement with theoretical ones. The penstock of the "Valsan" HPP, was modelled in EPANET, in order to: i) test the method at a larger scale; ii) get the right flow and pressure transducers that are needed to implement it. At the request of "Hidroelectrica" a routine that computes the efficiency of the turbine was added to the monitoring software. After the system was implemented, another series of measurements were performed at the site in order to validate it. Failure was modelled by opening an existing valve on a branch of the penstock. Detection of the failure was correct and almost instantaneous, while failure location was accurate within 5% of the total penstock length.

  16. Detection of speaking with a new respiratory inductive plethysmography system.

    Science.gov (United States)

    Wilhelm, Frank H; Handke, Eva M; Roth, Walton T

    2003-01-01

    The LifeShirt system, a garment with integrated sensors connected to a handheld computer, allows recording of a wide variety of clinically important cardiorespiratory data continuously for extended periods outside the laboratory or clinic. The device includes sensors for assessment of physical activity and posture since both can affect physiological activation and need to be controlled. Speaking is another potential confounding factor in the interpretation of physiological data. Auditory speech recording is problematic because it can pick up sources other than the person's voice (external microphone) or is obtrusive (throat microphone). The abdominal and thoracic calibrated respiratory inductive plethysmography (RIP) sensors integrated in the LifeShirt system might be an adequate alternative for detecting speech. In a laboratory experiment we determined respiratory parameters indicative of speech. Eighteen subjects were instructed to sit quietly, write, and speak continuously, for 4 min each. Nine parameters were derived from the RIP signals and averaged over each minute. In addition, nine variability parameters were computed as their coefficients of breath-by-breath variation. Inspiratory/expiratory time (IE-ratio) best distinguished speaking from writing with 98% correct classification at a cutoff criterion of 0.52. This criterion was equally successful in distinguishing speaking from sitting quietly. Discriminant analyses indicated that linear combinations of IE-ratio and a variety of other parameters did not reliably improve classification accuracy across tasks and replications. These results demonstrate the high efficacy of RIP-derived IE-ratio for speech detection and suggest that auditory recording is not necessary for detection of speech in ambulatory assessment.

  17. Magneto-mechanical trapping systems for biological target detection

    KAUST Repository

    Li, Fuquan

    2014-03-29

    We demonstrate a magnetic microsystem capable of detecting nucleic acids via the size difference between bare magnetic beads and bead compounds. The bead compounds are formed through linking nonmagnetic beads and magnetic beads by the target nucleic acids. The system comprises a tunnel magneto-resistive (TMR) sensor, a trapping well, and a bead-concentrator. The TMR sensor detects the stray field of magnetic beads inside the trapping well, while the sensor output depends on the number of beads. The size of the bead compounds is larger than that of bare magnetic beads, and fewer magnetic beads are required to fill the trapping well. The bead-concentrator, in turn, is capable of filling the trap in a controlled fashion and so to shorten the assay time. The bead-concentrator includes conducting loops surrounding the trapping well and a conducting line underneath. The central conducting line serves to attract magnetic beads in the trapping well and provides a magnetic field to magnetize them so to make them detectable by the TMR sensor. This system excels by its simplicity in that the DNA is incubated with magnetic and nonmagnetic beads, and the solution is then applied to the chip and analyzed in a single step. In current experiments, a signal-to-noise ratio of 40.3 dB was obtained for a solution containing 20.8 nM of DNA. The sensitivity and applicability of this method can be controlled by the size or concentration of the nonmagnetic bead, or by the dimension of the trapping well.

  18. Analysis of SDFT based phase detection system for grid synchronization of distributed generation systems

    Directory of Open Access Journals (Sweden)

    B. Chitti Babu

    2014-12-01

    Full Text Available A fast and exact detection of phase and fundamental frequency of grid voltage/current is essential for calculating accurate reference signal in order to implement the control algorithm of inverter-interfaced distributed generation (DG system and realize precise harmonic compensation. However, the methods adapted in the literature based on phase locked loop (PLL exhibits large phase error, be difficult to implement, and their performance is also indistinct under conditions where the grid frequency varies or the supply is distorted with low frequency harmonics. This paper explores an improved phase detection system for DG system based on Sliding Discrete Fourier Transform (SDFT. The proposed SDFT based phase detection shows a robust phase tracking capability with fast transient response under adverse situation of the grid. Moreover, SDFT phase detection system is more efficient as it requires small number of operations to extract a single frequency component, thereby reducing computational complexity and simpler than DFT. The superior performance of proposed SDFT phase detection system is analyzed and the obtained results are compared with Discrete Fourier Transform (DFT filtering to confirm the feasibility of the study under different grid environment such as high frequency harmonic injection, frequency deviation, and phase variation etc.

  19. System and method for detecting a faulty object in a system

    Science.gov (United States)

    Gunnels, John A.; Gustavson, Fred Gehrung; Engle, Robert Daniel

    2009-03-17

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  20. System and method for detecting a faulty object in a system

    Science.gov (United States)

    Gunnels, John A.; Gustavson, Fred Gehrung; Engle, Robert Daniel

    2010-12-14

    A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

  1. RESEARCH ON EXPERT SYSTEM OF FAULT DETECTION AND DIAGNOSING FOR PNEUMATIC SYSTEM OF AUTOMATIC PRODUCTION LINE

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Fault detection and diagnosis for pneumatic system of automatic production line are studied. An expert system using fuzzy-neural network and pneumatic circuit fault diagnosis instrument are designed. The mathematical model of various pneumatic faults and experimental device are built. In the end, some experiments are done, which shows that the expert system using fuzzy-neural network can diagnose fast and truly fault of pneumatic circuit.

  2. Multisensor Network System for Wildfire Detection Using Infrared Image Processing

    Directory of Open Access Journals (Sweden)

    I. Bosch

    2013-01-01

    Full Text Available This paper presents the next step in the evolution of multi-sensor wireless network systems in the early automatic detection of forest fires. This network allows remote monitoring of each of the locations as well as communication between each of the sensors and with the control stations. The result is an increased coverage area, with quicker and safer responses. To determine the presence of a forest wildfire, the system employs decision fusion in thermal imaging, which can exploit various expected characteristics of a real fire, including short-term persistence and long-term increases over time. Results from testing in the laboratory and in a real environment are presented to authenticate and verify the accuracy of the operation of the proposed system. The system performance is gauged by the number of alarms and the time to the first alarm (corresponding to a real fire, for different probability of false alarm (PFA. The necessity of including decision fusion is thereby demonstrated.

  3. Linac based photofission inspection system employing novel detection concepts

    Science.gov (United States)

    Stevenson, John; Gozani, Tsahi; Elsalim, Mashal; Condron, Cathie; Brown, Craig

    2011-10-01

    Rapiscan Systems is developing a LINAC based cargo inspection system for detection of special nuclear material (SNM) in cargo containers. The system, called Photofission Based Alarm Resolution (PBAR) is being developed under a DHD/DNDO Advanced Technology Demonstration (ATD) program. The PBAR system is based on the Rapiscan Eagle P9000 X-ray system, which is a portal system with a commercial 9 MeV LINAC X-ray source. For the purposes of the DNDO ATD program, a conveyor system was installed in the portal to allow scanning and precise positioning of 20 ft ISO cargo containers. The system uses a two step inspection process. In the first step, the basic scan, the container is quickly and completely inspected using two independent radiography arrays: the conventional primary array with high spatial resolution and a lower resolution spectroscopic array employing the novel Z-Spec method. The primary array uses cadmium tungstate (CdWO 4) detectors with conventional current mode readouts using photodiodes. The Z-Spec array uses small plastic scintillators capable of performing very fast (up to 10 8 cps) gamma-ray spectroscopy. The two radiography arrays are used to locate high-Z objects in the image such as lead, tungsten, uranium, which could be potential shielding materials as well as SNM itself. In the current system, the Z-Spec works by measuring the energy spectrum of transmitted X-rays. For high-Z materials the higher end of the energy spectrum is more attenuated than for low-Z materials and thus has a lower mean energy and a narrower width than low- and medium-Z materials. The second step in the inspection process is the direct scan or alarm clearing scan. In this step, areas of the container image, which were identified as high Z, are re-inspected. This is done by precisely repositioning the container to the location of the high-Z object and performing a stationary irradiation of the area with X-ray beam. Since there are a large number of photons in the 9 MV

  4. Wireless system for explosion detection in underground structures

    Science.gov (United States)

    Chikhradze, M.; Bochorishvili, N.; Akhvlediani, I.; Kukhalashvili, D.; Kalichava, I.; Mataradze, E.

    2009-06-01

    Considering the growing threat of terrorist or accidental explosions in underground stations, underground highway and railway sections improvement of system for protecting people from explosions appears urgent. Current automatic protective devices with blast identification module and blast damping absorbers of various designs as their basic elements cannot be considered effective. Analysis revealed that low reliability of blast detection and delayed generation of start signal for the activation of an absorber are the major disadvantages of protective devices. Besides the transmission of trigger signal to an energy absorber through cable communication reduces the reliability of the operation of protective device due to a possible damage of electric wiring under blast or mechanical attack. This paper presents the outcomes of the studies conducted to select accurate criteria for blast identification and to design wireless system of activation of defensive device. The results of testing of blast detection methods (seismic, EMP, optical, on overpressure) showed that the proposed method, which implies constant monitoring of overpressure in terms of its reliability and response speed, best meets the requirements. Proposed wireless system for explosions identification and activation of protective device consists of transmitter and receiver modules. Transmitter module contains sensor and microprocessor equipped with blast identification software. Receiver module produces activation signal for operation of absorber. Tests were performed in the underground experimental base of Mining Institute. The time between the moment of receiving signal by the sensor and activation of absorber - 640 microsecond; distance between transmitter and receiver in direct tunnel - at least 150m; in tunnel with 900 bending - 50m. This research is sponsored by NATO's Public Diplomacy Division in the framework of "Science for Peace".

  5. A Multi-Layer Phoswich Radioxenon Detection System

    Energy Technology Data Exchange (ETDEWEB)

    David M. Hamby

    2008-07-14

    Laboratory radioactive sources were used to characterize the phoswich detector. The CaF{sub 2} scintillator has a low light-yield and slow decay time, thus produces very small signals due to low-energy gamma rays or X-rays. Therefore, detection of 30 keV X-rays (from the xenon radioisotopes) using this layer and discriminating its very small signals from electronic noise was a challenging task. Several solutions were considered and experimentally evaluated. We found that the best solution would be extending the fast triangular filter from 10 taps to 30 taps. This will extend the peaking time of this filter from 25 nsec to 75 nsec. The digital filter is implemented in FPGA on our DPP2.0 and is used to trigger the detection system. Functionality of the new filter in capturing and discriminating 30 keV X-rays was confirmed by using a {sup 133}Ba gamma-ray source. Development of the DPP GUI software has continued with the addition of two new panels to display histograms of beta/gamma and beta/x-ray coincidence events. This includes coincidence events from a single channel, as well as two-channel, coincidence event. A pileup rejection algorithm has been implemented in the FPGA code, and controls to adjust its sensitivity have been added to the GUI. Work has begun on a new prototype system to develop a USB host interface between the PC and the FPGA to end reliance on Opal Kelly prototyping boards; the hardware for this system has been completely assembled, and the PC-side software is currently in development.

  6. Spacecraft dynamics characterization and control system failure detection, volume 1

    Science.gov (United States)

    1992-07-01

    The work under this grant has been directed to two aspects of the control of flexible spacecraft: (1) the modeling of deployed or erected structures including nonlinear joint characteristics; and (2) the detection and isolation of failures of the components of control systems for large space structures. The motivation for the first of these research tasks is the fact that very large assemblies in space will have to be built or deployed in situ. A likely scenario is, in fact, a combination of these wherein modules which are folded for transportation into orbit are erected to their final configuration and then jointed with other such erected modules to form the full assembly. Any such erectable modules will have joints. It remains to be seen whether or not joints designed for operational assemblies will have nonlinear properties, but it seems prudent to develop a methodology for dealing with that possibility. The motivation for the second of these research tasks is the fact that we foresee large assemblies in space which will require active control to damp vibrations and/or hold a desired shape. Lightweight structures will be very flexible, with many elastic modes having very low frequencies. In order to control these modes well, the control system will likely require many sensors and many actuators, probably distributed over much of the structure. The combination of a large number of control system components with long operational periods virtually guarantees that these systems will suffer control system component failures during operation. The control system must be designed to tolerate failures of some sensors and actuators, and still be able to continue to perform its function.

  7. Electrometrical Methods Application for Detection of Heating System Pipeline Corrosion

    Science.gov (United States)

    Vetrov, A.; Ilyin, Y.; Isaev, V.; Rondel, A.; Shapovalov, N.

    2004-12-01

    Coated steel underground pipelines are widely used for the petroleum and gaze transportation, for the water and heat supply. The soils, where the pipelines are placed, are usually highly corrosive for pipe's metal. In the places of crippling of external coating the corrosion processes begin, and this can provoke a pipe breakage. To ensure the pipeline survivability it is necessary to carry out the control of pipeline conditions. The geophysical methods are used to provide such diagnostic. Authors have studied the corrosion processes of the municipal heating system pipelines in Saint-Petersburg (Russia) using the air thermal imaging method, the investigation of electromagnetic fields and spontaneous polarization, measurements of electrode potentials of metal tubes. The pipeline reparation works, which have been provided this year, allowed us to make the visual observation of pipes. The investigation object comprises a pipeline composed of two parallel tubes, which are placed 1-2 meters deep. The fact that the Russian Federation and CIS countries still use the direct heat supply system makes impossible any addition of anticorrosion components to circulating water. Pipelines operate under high pressure (up to 5 atm) and high temperature (designed temperature is 150°C). Tube's isolation is meant for heat loss minimization, and ordinary has poor hydro-isolation. Some pipeline construction elements (sliding and fixed bearings, pressure compensators, heat enclosures) are often non-isolated, and tube's metal contacts with soil. Hard usage condition, ingress of technical contamination cause, stray currents etc. cause high accidental rate. Realization of geophysical diagnostics, including electrometry, is hampered in a city by underground communication systems, power lines, isolating ground cover (asphalt), limitation of the working area with buildings. These restrictions form the investigation conditions. In order to detect and localize isolation (coat) defects authors

  8. Using Gunshot Detection Systems to Fight Explosive Fishing Practices

    Science.gov (United States)

    Showen, R. L.; Dunson, J. C.; Woodman, G.; Christopher, S.; Wilson, S.

    2015-12-01

    Blast fishing (using explosives to catch fish) causes extensive damage to coral reefs, especially in the Coral Triangle in Southeast Asia. Subsistence fishermen and larger consortiums, often with criminal links, throw an explosive into a school of fish, killing all sea life within range. This unsustainable practice is becoming more prevalent, and threatens the protein supply of as many as a billion people. Ending blast fishing will require combined technical and societal methods aimed at both deterring the practice, and catching those responsible. Our work aims to significantly improve enforcement. We are re-purposing SST's ShotSpotter gunshot detection system, (trusted and valued by police around the world), substituting hydrophones for the present microphones. Using multilateration and trained human reviewers, the system can give prompt blast alerts, location data, and acoustic waveforms to law enforcement officials. We hope to establish a prototype system in Malaysia in 2015, and have already secured governmental approvals for installation and tests with local law enforcement. The Scubazoo media firm in Malaysia is working with resorts, dive operations, and celebrity sponsors, and is planning to produce videos to illustrate the severity of the problem to both governments and the public. Because there is little hard data concerning the prevalence of blast fishing in either marine protected areas or open waters, the system can also indicate to the world the actual blast rates and patterns of use. The Teng Hoi environmental NGO in Hong Kong showed in 2004 that acoustic waves from typical bombs propagate on the order of 20 km, so an underwater locator system with a small number of sensors can feasibly cover a sizable coral region. Our present plans are to mount sensors on piers, buoys, and boats, but if possible we would also like to integrate with other existing acoustic arrays to strengthen the fight against blast fishing.

  9. A ring system detected around the Centaur (10199) Chariklo

    CERN Document Server

    Braga-Ribas, F; Ortiz, J L; Snodgrass, C; Roques, F; Vieira-Martins, R; Camargo, J I B; Assafin, M; Duffard, R; Jehin, E; Pollock, J; Leiva, R; Emilio, M; Machado, D I; Colazo, C; Lellouch, E; Skottfelt, J; Gillon, M; Ligier, N; Maquet, L; Benedetti-Rossi, G; Gomes, A Ramos; Kervella, P; Monteiro, H; Sfair, R; Moutamid, M El; Tancredi, G; Spagnotto, J; Maury, A; Morales, N; Gil-Hutton, R; Roland, S; Ceretta, A; Gu, S -h; Wang, X -b; Harpsøe, K; Rabus, M; Manfroid, J; Opitom, C; Vanzi, L; Mehret, L; Lorenzini, L; Schneiter, E M; Melia, R; Lecacheux, J; Colas, F; Vachier, F; Widemann, T; Almenares, L; Sandness, R G; Char, F; Perez, V; Lemos, P; Martinez, N; Jørgensen, U G; Dominik, M; Roig, F; Reichart, D E; LaCluyze, A P; Haislip, J B; Ivarsen, K M; Moore, J P; Frank, N R; Lambas, D G

    2014-01-01

    Until now, rings have been detected in the Solar System exclusively around the four giant planets. Here we report the discovery of the first minor-body ring system around the Centaur object (10199) Chariklo, a body with equivalent radius 124$\\pm$9 km. A multi-chord stellar occultation revealed the presence of two dense rings around Chariklo, with widths of about 7 km and 3 km, optical depths 0.4 and 0.06, and orbital radii 391 and 405 km, respectively. The present orientation of the ring is consistent with an edge-on geometry in 2008, thus providing a simple explanation for the dimming of Chariklo's system between 1997 and 2008, and for the gradual disappearance of ice and other absorption features in its spectrum over the same period. This implies that the rings are partially composed of water ice. These rings may be the remnants of a debris disk, which were possibly confined by embedded kilometre-sized satellites.

  10. Self-Homodyne Detection in Optical Communication Systems

    Directory of Open Access Journals (Sweden)

    Benjamin J. Puttnam

    2014-05-01

    Full Text Available We review work on self-homodyne detection (SHD for optical communication systems. SHD uses a transmitted pilot-tone (PT, originating from the transmitter laser, to exploit phase noise cancellation at a coherent receiver and to enable transmitter linewidth tolerance and potential energy savings. We give an overview of SHD performance, outlining the key contributors to the optical signal-to-noise ratio penalty compared to equivalent intradyne systems, and summarize the advantages, differences and similarities between schemes using polarization-division multiplexed PTs (PDM-SHD and those using space-division multiplexed PTs (SDM-SHD. For PDM-SHD, we review the extensive work on the transmission of advanced modulation formats and techniques to minimize the trade-off with spectral efficiency, as well as recent work on digital SHD, where the SHD receiver is combined with an polarization-diversity ID front-end receiver to provide both polarization and modulation format alignment. We then focus on SDM-SHD systems, describing experimental results using multi-core fibers (MCFs with up to 19 cores, including high capacity transmission with broad-linewidth lasers and experiments incorporating SDM-SHD in networking. Additionally, we discuss the requirement for polarization tracking of the PTs at the receiver and path length alignment and review some variants of SHD before outlining the future challenges of self-homodyne optical transmission and gaps in current knowledge.

  11. Cable Damage Detection System and Algorithms Using Time Domain Reflectometry

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A; Robbins, C L; Wade, K A; Souza, P R

    2009-03-24

    This report describes the hardware system and the set of algorithms we have developed for detecting damage in cables for the Advanced Development and Process Technologies (ADAPT) Program. This program is part of the W80 Life Extension Program (LEP). The system could be generalized for application to other systems in the future. Critical cables can undergo various types of damage (e.g. short circuits, open circuits, punctures, compression) that manifest as changes in the dielectric/impedance properties of the cables. For our specific problem, only one end of the cable is accessible, and no exemplars of actual damage are available. This work addresses the detection of dielectric/impedance anomalies in transient time domain reflectometry (TDR) measurements on the cables. The approach is to interrogate the cable using time domain reflectometry (TDR) techniques, in which a known pulse is inserted into the cable, and reflections from the cable are measured. The key operating principle is that any important cable damage will manifest itself as an electrical impedance discontinuity that can be measured in the TDR response signal. Machine learning classification algorithms are effectively eliminated from consideration, because only a small number of cables is available for testing; so a sufficient sample size is not attainable. Nonetheless, a key requirement is to achieve very high probability of detection and very low probability of false alarm. The approach is to compare TDR signals from possibly damaged cables to signals or an empirical model derived from reference cables that are known to be undamaged. This requires that the TDR signals are reasonably repeatable from test to test on the same cable, and from cable to cable. Empirical studies show that the repeatability issue is the 'long pole in the tent' for damage detection, because it is has been difficult to achieve reasonable repeatability. This one factor dominated the project. The two-step model

  12. Cable Damage Detection System and Algorithms Using Time Domain Reflectometry

    Energy Technology Data Exchange (ETDEWEB)

    Clark, G A; Robbins, C L; Wade, K A; Souza, P R

    2009-03-24

    This report describes the hardware system and the set of algorithms we have developed for detecting damage in cables for the Advanced Development and Process Technologies (ADAPT) Program. This program is part of the W80 Life Extension Program (LEP). The system could be generalized for application to other systems in the future. Critical cables can undergo various types of damage (e.g. short circuits, open circuits, punctures, compression) that manifest as changes in the dielectric/impedance properties of the cables. For our specific problem, only one end of the cable is accessible, and no exemplars of actual damage are available. This work addresses the detection of dielectric/impedance anomalies in transient time domain reflectometry (TDR) measurements on the cables. The approach is to interrogate the cable using time domain reflectometry (TDR) techniques, in which a known pulse is inserted into the cable, and reflections from the cable are measured. The key operating principle is that any important cable damage will manifest itself as an electrical impedance discontinuity that can be measured in the TDR response signal. Machine learning classification algorithms are effectively eliminated from consideration, because only a small number of cables is available for testing; so a sufficient sample size is not attainable. Nonetheless, a key requirement is to achieve very high probability of detection and very low probability of false alarm. The approach is to compare TDR signals from possibly damaged cables to signals or an empirical model derived from reference cables that are known to be undamaged. This requires that the TDR signals are reasonably repeatable from test to test on the same cable, and from cable to cable. Empirical studies show that the repeatability issue is the 'long pole in the tent' for damage detection, because it is has been difficult to achieve reasonable repeatability. This one factor dominated the project. The two-step model

  13. Protein- protein interaction detection system using fluorescent protein microdomains

    Science.gov (United States)

    Waldo, Geoffrey S.; Cabantous, Stephanie

    2010-02-23

    The invention provides a protein labeling and interaction detection system based on engineered fragments of fluorescent and chromophoric proteins that require fused interacting polypeptides to drive the association of the fragments, and further are soluble and stable, and do not change the solubility of polypeptides to which they are fused. In one embodiment, a test protein X is fused to a sixteen amino acid fragment of GFP (.beta.-strand 10, amino acids 198-214), engineered to not perturb fusion protein solubility. A second test protein Y is fused to a sixteen amino acid fragment of GFP (.beta.-strand 11, amino acids 215-230), engineered to not perturb fusion protein solubility. When X and Y interact, they bring the GFP strands into proximity, and are detected by complementation with a third GFP fragment consisting of GFP amino acids 1-198 (strands 1-9). When GFP strands 10 and 11 are held together by interaction of protein X and Y, they spontaneous association with GFP strands 1-9, resulting in structural complementation, folding, and concomitant GFP fluorescence.

  14. A Rudimentary Optical System in Detecting Ripeness of Red Watermelon

    Science.gov (United States)

    Ezan Abdullah, Noor; Hashim, Hadzli; Fathullah Sulaiman, Muhammad; Korlina Madzhi, Nina; Faiz Mohd Sampian, Ahmad; Aima Ismail, Faridatul

    2015-11-01

    The purpose of this project is to detect the ripeness and quality of the watermelon particularly for red watermelon. The ripeness of the watermelon will be evaluated by using near-infrared spectroscopy sensor (NRIS). The color wavelength will classify the ripeness of the watermelon. An infrared light will be used to get the appropriate wavelength from the watermelon either from the rind or inner of it and the signal received will be analyzed. An appropriate algorithm is used to extract the information of the inner of the watermelon. A microcontroller namely Programmable Interface Controller (PIC) will be used to execute the algorithm and the result will be displayed on Liquid Crystal Display (LCD). Based on the result obtain from the device, the data is computed by using Statistical Package for the Social Sciences (SPSS). This approach is vital to verify the relationship between unripe and ripeness of red watermelon. The objective of this project is to produce an efficient system to detect the ripeness of the watermelon.

  15. Sensitive dc SQUIDs for detection of small spin systems

    Energy Technology Data Exchange (ETDEWEB)

    Woelbing, R.; Nagel, J.; Kemmler, M.; Konovalenko, K.; Turad, M.; Werner, R.; Kleiner, R.; Koelle, D. [Physikalisches Institut - Experimentalphysik II and Center for Collective Quantum Phenomena, Universitaet Tuebingen (Germany); Kieler, O.; Weimann, T.; Kohlmann, J.; Zorin, A. [Fachbereich 2.4 ' ' Quantenelektronik' ' , Physikalisch-Technische Bundesanstalt, Braunschweig (Germany); Kleisz, E.; Menzel, S.; Buechner, B.; Klingeler, R. [Leibniz-Institut fuer Festkoerper- und Werkstoffforschung (IFW) Dresden (Germany)

    2011-07-01

    Investigation on small spin systems, e.g. macromolecules, require ultrasensitive devices for sensing the magnetization reversal of such particles with the ultimate goal of single spin flip detection. For this purpose we examine submicron dimension SQUIDs, which can detect the magnetization reversal of small spin particles directly in strong magnetic fields. We fabricated dc SQUIDs based on Nb/HfTi/Nb Josephson junctions with areas down to 200 nm x 200 nm, as well as on YBa{sub 2}Cu{sub 3}O{sub 7} (YBCO) grain boundary junctions (GBJs) with linewidths down to 80 nm. The critical current densities for both types of junctions are relatively large (j{sub c}>10{sup 5}A/cm{sup 2} at 4.2 K), which provides high critical currents even for submicron sized junctions. The Nb/HfTi/Nb and the YBCO SQUIDs have been characterized by electric transport and noise measurements at low and high fields up to the tesla range, showing low noise performance.

  16. Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    A. Kaleel Rahuman

    2012-01-01

    Full Text Available Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA devices have provided larger and faster resources. This proposes architecture called “BV-TCAM” is presented, which is implemented for an FPGA-based Network Intrusion Detection Systems (NIDS. The BV-TCAM architecture combines the Ternary Content Addressable Memory (TCAM and Bit Vector (BV algorithm to effectively compress the data representation and throughput. A tree bitmap implementation of the BV algorithm is used for source and destination port lookup while a TCAM performs lookup for other header fields, which can be represented as a prefix or exact value. With the aid of small embedded TCAM, packet classification can be implemented in relatively small part of the available logic of an FPGA. The BV-TCAM architecture has been modelled by VHDL. Simulations were performed by MODELSIM. This architecture have to be synthesized and implement our design using Xilinx FPGA device."

  17. Cosmic ray detection based measurement systems: a preliminary study

    Science.gov (United States)

    Bodini, I.; Bonomi, G.; Cambiaghi, D.; Magalini, A.; Zenoni, A.

    2007-11-01

    Cosmic rays, mostly composed of high energy muons, continuously hit the Earth's surface (at sea level the rate is about 10 000 m-2 min-1). Various technologies are adopted for their detection and are widespread in the field of particle and nuclear physics. In this paper, cosmic ray muon detection techniques are assessed for measurement applications in engineering, where these methods could be suitable for several applications, with specific reference to situations where environmental conditions are weakly controlled and/or where the parts to be measured are hardly accessible. Since cosmic ray showering phenomena show statistical nature, the Monte Carlo technique has been adopted to numerically simulate a particular application, where a set of muon detectors are employed for alignment measurements on an industrial press. An analysis has been performed to estimate the expected measurement uncertainty and system resolution, which result to be strongly dependent on the dimensions and geometry of the set-up, on the presence of materials interposed between detectors and, ultimately, on the elapsed time available for the data taking.

  18. Design of a Fault Detection and Isolation System for Intelligent Vehicle Navigation System

    Directory of Open Access Journals (Sweden)

    Wei Huang

    2015-01-01

    Full Text Available This paper deals with the design of a fault detection and isolation (FDI system for an intelligent vehicle, a vehicle equipped with advanced driver assistance system (ADAS. The ADASs are outfitted with sensors for acquiring various information about the vehicle and its surroundings. Since these sensors are sensitive to faults, an efficient FDI system should be developed. The designed FDI system is comprised of three parts: a detection part, a decision part, and a fault management part. The detection part applies a generalized observer scheme (GOS. In the GOS, there is bank of extended Kalman filters (EKFs, each excited by all except one sensor measurement. The residual generated from the measurement update of each EKF is therefore sensitive to all sensor faults but one. This way, the fault sensitivity pattern of the residual makes it possible to detect a fault and locate the faulty sensor. The designed FDI system has been implemented and tested off-line with actual experiment data. Good results have been obtained with diagnosing individual sensor faults and outputting fault-free vehicle states.

  19. Image-Based Pothole Detection System for ITS Service and Road Management System

    Directory of Open Access Journals (Sweden)

    Seung-Ki Ryu

    2015-01-01

    Full Text Available Potholes can generate damage such as flat tire and wheel damage, impact and damage of lower vehicle, vehicle collision, and major accidents. Thus, accurately and quickly detecting potholes is one of the important tasks for determining proper strategies in ITS (Intelligent Transportation System service and road management system. Several efforts have been made for developing a technology which can automatically detect and recognize potholes. In this study, a pothole detection method based on two-dimensional (2D images is proposed for improving the existing method and designing a pothole detection system to be applied to ITS service and road management system. For experiments, 2D road images that were collected by a survey vehicle in Korea were used and the performance of the proposed method was compared with that of the existing method for several conditions such as road, recording, and brightness. The results are promising, and the information extracted using the proposed method can be used, not only in determining the preliminary maintenance for a road management system and in taking immediate action for their repair and maintenance, but also in providing alert information of potholes to drivers as one of ITS services.

  20. Underwater lidar system: design challenges and application in pollution detection

    Science.gov (United States)

    Gupta, Pradip; Sankolli, Swati; Chakraborty, A.

    2016-05-01

    The present remote sensing techniques have imposed limitations in the applications of LIDAR Technology. The fundamental sampling inadequacy of the remote sensing data obtained from satellites is that they cannot resolve in the third spatial dimension, the vertical. This limits our possibilities of measuring any vertical variability in the water column. Also the interaction between the physical and biological process in the oceans and their effects at subsequent depths cannot be modeled with present techniques. The idea behind this paper is to introduce underwater LIDAR measurement system by using a LIDAR mounted on an Autonomous Underwater Vehicle (AUV). The paper introduces working principles and design parameters for the LIDAR mounted AUV (AUV-LIDAR). Among several applications the papers discusses the possible use and advantages of AUV-LIDAR in water pollution detection through profiling of Dissolved Organic Matter (DOM) in water bodies.