WorldWideScience

Sample records for incident detection system

  1. Targeting safety improvements through identification of incident origination and detection in a near-miss incident learning system

    International Nuclear Information System (INIS)

    Novak, Avrey; Nyflot, Matthew J.; Ermoian, Ralph P.; Jordan, Loucille E.; Sponseller, Patricia A.; Kane, Gabrielle M.; Ford, Eric C.; Zeng, Jing

    2016-01-01

    Purpose: Radiation treatment planning involves a complex workflow that has multiple potential points of vulnerability. This study utilizes an incident reporting system to identify the origination and detection points of near-miss errors, in order to guide their departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or applied a near-miss risk index (NMRI) to gauge severity. Methods: From 3/2012 to 3/2014, 1897 incidents were analyzed from a departmental incident learning system. All incidents were prospectively reviewed weekly by a multidisciplinary team and assigned a NMRI score ranging from 0 to 4 reflecting potential harm to the patient (no potential harm to potential critical harm). Incidents were classified by point of incident origination and detection based on a 103-step workflow. The individual steps were divided among nine broad workflow categories (patient assessment, imaging for radiation therapy (RT) planning, treatment planning, pretreatment plan review, treatment delivery, on-treatment quality management, post-treatment completion, equipment/software quality management, and other). The average NMRI scores of incidents originating or detected within each broad workflow area were calculated. Additionally, out of 103 individual process steps, 35 were classified as safety barriers, the process steps whose primary function is to catch errors. The safety barriers which most frequently detected incidents were identified and analyzed. Finally, the distance between event origination and detection was explored by grouping events by the number of broad workflow area events passed through before detection, and average NMRI scores were compared. Results: Near-miss incidents most commonly originated within treatment planning (33%). However, the incidents with the highest average NMRI scores originated during imaging for RT planning (NMRI = 2.0, average NMRI of all events = 1.5), specifically

  2. Targeting safety improvements through identification of incident origination and detection in a near-miss incident learning system

    Energy Technology Data Exchange (ETDEWEB)

    Novak, Avrey; Nyflot, Matthew J.; Ermoian, Ralph P.; Jordan, Loucille E.; Sponseller, Patricia A.; Kane, Gabrielle M.; Ford, Eric C.; Zeng, Jing, E-mail: jzeng13@uw.edu [Department of Radiation Oncology, University of Washington Medical Center, 1959 NE Pacific Street, Campus Box 356043, Seattle, Washington 98195 (United States)

    2016-05-15

    Purpose: Radiation treatment planning involves a complex workflow that has multiple potential points of vulnerability. This study utilizes an incident reporting system to identify the origination and detection points of near-miss errors, in order to guide their departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or applied a near-miss risk index (NMRI) to gauge severity. Methods: From 3/2012 to 3/2014, 1897 incidents were analyzed from a departmental incident learning system. All incidents were prospectively reviewed weekly by a multidisciplinary team and assigned a NMRI score ranging from 0 to 4 reflecting potential harm to the patient (no potential harm to potential critical harm). Incidents were classified by point of incident origination and detection based on a 103-step workflow. The individual steps were divided among nine broad workflow categories (patient assessment, imaging for radiation therapy (RT) planning, treatment planning, pretreatment plan review, treatment delivery, on-treatment quality management, post-treatment completion, equipment/software quality management, and other). The average NMRI scores of incidents originating or detected within each broad workflow area were calculated. Additionally, out of 103 individual process steps, 35 were classified as safety barriers, the process steps whose primary function is to catch errors. The safety barriers which most frequently detected incidents were identified and analyzed. Finally, the distance between event origination and detection was explored by grouping events by the number of broad workflow area events passed through before detection, and average NMRI scores were compared. Results: Near-miss incidents most commonly originated within treatment planning (33%). However, the incidents with the highest average NMRI scores originated during imaging for RT planning (NMRI = 2.0, average NMRI of all events = 1.5), specifically

  3. Improving Security Incidents Detection for Networked Multilevel Intelligent Control Systems in Railway Transport

    Directory of Open Access Journals (Sweden)

    A. V. Chernov

    2016-06-01

    Full Text Available Security monitoring and incident management systems have become the main research focus in the area of intelligent railway control systems. In this work, we discuss a system architecture of multilevel intelligent control system in Russian Railway transport and security incident classification and the handling of theprocess. We make a detailed explanation of problems and tasks of security information and event management system as an important part of a multilevel intelligent control system. We use a rough sets theory to detect an abnormal activity in the considered system. Our main result consists in the development of simple and fast detection techniques that are based on rough sets theory and allow investigating a new type of incidents.

  4. Real time freeway incident detection.

    Science.gov (United States)

    2014-04-01

    The US Department of Transportation (US-DOT) estimates that over half of all congestion : events are caused by highway incidents rather than by rush-hour traffic in big cities. Real-time : incident detection on freeways is an important part of any mo...

  5. Fuzzy Algorithm for the Detection of Incidents in the Transport System

    Science.gov (United States)

    Nikolaev, Andrey B.; Sapego, Yuliya S.; Jakubovich, Anatolij N.; Berner, Leonid I.; Stroganov, Victor Yu.

    2016-01-01

    In the paper it's proposed an algorithm for the management of traffic incidents, aimed at minimizing the impact of incidents on the road traffic in general. The proposed algorithm is based on the theory of fuzzy sets and provides identification of accidents, as well as the adoption of appropriate measures to address them as soon as possible. A…

  6. Incidence Handling and Response System

    OpenAIRE

    Kalbande, Prof. Dhananjay R.; Thampi, Dr. G. T.; Singh, Mr. Manish

    2009-01-01

    A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. I...

  7. Detecting Terrorism Incidence Type from News Summary

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2012-01-01

    The paper presents the experiments to detect terrorism incidence type from news summary data. We have applied classification techniques on news summary data to analyze the incidence and detect the type of incidence. A number of experiments are conducted using various classification algorithms...... and results show that a simple decision tree classifier can learn incidence type with satisfactory results from news data....

  8. Vuosaari Harbour Road Tunnel Traffic Management and Incident Detection System Design Issues

    Directory of Open Access Journals (Sweden)

    Caj Holm

    2006-11-01

    Full Text Available Helsinki is constructing in Vuosaari a new modem and effectivecargo harbour. All cargo harbour activities will be concentratedthere. The total project includes the harbour, a logisticsarea, traffic connections (road, railway and fairway and aBusiness Park. The road connection goes through the Porvarinlahtiroad tunnel. The harbour will commence operatingin 2008. This paper gives an oveTView of the tunnel design phasefunctional studies and risk analysis tunnel incident detectionsystem design issues and some specific environmental featuresof the tunnel.

  9. Design of a system for detecting and reporting security incidents and adverse events in thyroid and parathyroid surgery

    Directory of Open Access Journals (Sweden)

    José Luis PARDAL-REFOYO

    2016-03-01

    Full Text Available Introduction: Patient safety is defined as the reduction of risk of unnecessary harm associated with healthcare. Up to 9.3% of patients admitted into a hospital present some adverse event related to the assistance. This can cause damage to the patient, more instrumentation, increased morbidity, increased hospital stay and increased cost. To identify, record and analyze adverse events is necessary to have an incident reporting system. Objective: Developing a local system for reporting security incidents and adverse events in surgery of the thyroid gland. Method: A working group was formed with representatives from all units related to the process of thyroidectomy, checkpoints were established, checklists for each control point were designed, a strategic analysis of the group's activity was performed, a literature review was done in order to identify the major incident reporting systems, the items that the incident report form must have were identified and the form was designed. Results: The incident report form collects data on the patient, the communicator and the incident (type, cause, consequence, severity, frequency, risk matrix. It has a first paragraph with narrative sections and a second with drop-down lists. The form is accessible only to the working group for voluntary use. Conclusions: The purpose of the reporting system is learning and prevention.

  10. BEAP profiles as rapid test system for status analysis and early detection of process incidents in biogas plants.

    Science.gov (United States)

    Refai, Sarah; Berger, Stefanie; Wassmann, Kati; Hecht, Melanie; Dickhaus, Thomas; Deppenmeier, Uwe

    2017-03-01

    A method was developed to quantify the performance of microorganisms involved in different digestion levels in biogas plants. The test system was based on the addition of butyrate (BCON), ethanol (ECON), acetate (ACON) or propionate (PCON) to biogas sludge samples and the subsequent analysis of CH 4 formation in comparison to control samples. The combination of the four values was referred to as BEAP profile. Determination of BEAP profiles enabled rapid testing of a biogas plant's metabolic state within 24 h and an accurate mapping of all degradation levels in a lab-scale experimental setup. Furthermore, it was possible to distinguish between specific BEAP profiles for standard biogas plants and for biogas reactors with process incidents (beginning of NH 4 + -N inhibition, start of acidification, insufficient hydrolysis and potential mycotoxin effects). Finally, BEAP profiles also functioned as a warning system for the early prediction of critical NH 4 + -N concentrations leading to a drop of CH 4 formation.

  11. Cyber Incidents Involving Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this

  12. Medication incidents reported to an online incident reporting system.

    LENUS (Irish Health Repository)

    Alrwisan, Adel

    2011-01-15

    AIMS: Approximately 20% of deaths from adverse events are related to medication incidents, costing the NHS an additional £500 million annually. Less than 5% of adverse events are reported. This study aims to assess the reporting rate of medication incidents in NHS facilities in the north east of Scotland, and to describe the types and outcomes of reported incidents among different services. Furthermore, we wished to quantify the proportion of reported incidents according to the reporters\\' profession. METHODS: A retrospective description was made of medication incidents reported to an online reporting system (DATIX) over a 46-month-period (July 2005 to April 2009). Reports originated from acute and community hospitals, mental health, and primary care facilities. RESULTS: Over the study period there were 2,666 incidents reported with a mean monthly reporting rate of 78.2\\/month (SD±16.9). 6.1% of all incidents resulted in harm, with insulin being the most commonly implicated medication. Nearly three-quarters (74.2%, n=1,978) of total incidents originated from acute hospitals. Administration incidents were implicated in the majority of the reported medication incidents (59%), followed by prescribing (10.8%) and dispensing (9.9%), while the nondescript "other medication incidents" accounted for 20.3% of total incidents. The majority of reports were made by nursing and midwifery staff (80%), with medical and dental professionals reporting the lowest number of incidents (n=56, 2%). CONCLUSIONS: The majority of medication incidents in this study were reported by nursing and midwifery staff, and were due to administration incidents. There is a clear need to elucidate the reasons for the limited contribution of the medical and dental professionals to reporting medication incidents.

  13. Automated Incident Detection Using Real-Time Floating Car Data

    Directory of Open Access Journals (Sweden)

    Maarten Houbraken

    2017-01-01

    Full Text Available The aim of this paper is to demonstrate the feasibility of a live Automated Incident Detection (AID system using only Floating Car Data (FCD in one of the first large-scale FCD AID field trials. AID systems detect traffic events and alert upcoming drivers to improve traffic safety without human monitoring. These automated systems traditionally rely on traffic monitoring sensors embedded in the road. FCD allows for finer spatial granularity of traffic monitoring. However, low penetration rates of FCD probe vehicles and the data latency have historically hindered FCD AID deployment. We use a live country-wide FCD system monitoring an estimated 5.93% of all vehicles. An FCD AID system is presented and compared to the installed AID system (using loop sensor data on 2 different highways in Netherlands. Our results show the FCD AID can adequately monitor changing traffic conditions and follow the AID benchmark. The presented FCD AID is integrated with the road operator systems as part of an innovation project, making this, to the best of our knowledge, the first full chain technical feasibility trial of an FCD-only AID system. Additionally, FCD allows for AID on roads without installed sensors, allowing road safety improvements at low cost.

  14. Traffic incidents in motorways : An empirical proposal for incident detection using data from mobile phone operators

    NARCIS (Netherlands)

    Steenbruggen, John; Tranos, Emmanouil; Rietveld, P.

    2016-01-01

    This paper proves that mobile phone usage data is an easy to use, cheap and most importantly, reliable predictor of motorway incidents. Using econometric modelling, this paper provides a proof of concept of how mobile phone usage data can be utilised to detect motorway incidents. Greater Amsterdam

  15. National Fire Incident Reporting System (NFIRS)

    Data.gov (United States)

    Department of Homeland Security — The National Fire Incident Reporting System (NFIRS) is a reporting standard that fire departments use to uniformly report on the full range of their activities, from...

  16. Critical Incident Reporting Systems: Perceived Competing Social ...

    African Journals Online (AJOL)

    The safe operation of complex socio-technical systems is dependent upon the reporting of safety critical incidents by operators within a system. Through the action of reporting, systems develop the capability as a learning organisation to improve human and organisational performance. The aim of the study is therefore to ...

  17. NEA incident reporting system: Three years' experience

    International Nuclear Information System (INIS)

    Otsuka, Y.; Haeussermann, W.

    1984-01-01

    The paper presents an overview of the NEA Incident Reporting System (IRS) which was set up to collect, assess and disseminate on safety-related incidents in nuclear power plants. The IRS information exchange is significant in two senses. First, it enables regulatory authorities and utilities in participating countries to take appropriate action to prevent the reported mishaps occurring again elsewhere. Secondly, the continuous collection and systematic analysis of such information allows identification of areas of concern where safety research should be strengthened. There are two stages in the IRS information exchange. First, the national IRS Co-ordinator selects information on significant incidents, in accordance with a common reporting threshold, from the abnormal occurrences reported to the regulatory body, to be distributed through the NEA Secretariat. This screening is intended to exclude minor events, so that only significant information is sent to participating countries. Secondly, a group of experts periodically reviews the incidents reported during the preceding twelve months to identify major areas of concern. To assist this process, a computer-based data retrieval system is being developed for IRS incident reports. The paper gives some details of the IRS mechanism and discusses reporting criteria and the information included in a report. Areas of concern derived from reported incidents, an outline of the data retrieval system, and examples of feedback of lessons learned and possibilities for international co-operation are also discussed. (author)

  18. Integrating incident investigation into the management system

    International Nuclear Information System (INIS)

    Peterson, E.E.

    1992-01-01

    In the last 10 yr, the size and frequency of incidents affecting the communities and environment surrounding chemical processing facilities has increased. The chemical process industry, which has always concerned itself with the safety of its facilities, has responded by committing to stricter standards of operation and management. A critical element of these management practices is the use of a structured incident investigation program. Many facilities have implemented and disciplined themselves to perform good investigation of incidents. However, most of these facilities maintain incident investigation as part of their safety management programs. This allows the process to be disconnected from the management system that deals with the day-to-day business of the facility. The first step of integration is understanding the objectives and functions of the management system into which the integration is to occur. To begin, a common definition of management is needed. Management, for the purposes of this discussion, is defined as the system of activities used to control, coordinate, and improve the flow of work within a facility or organization. This definition refers to several concepts that need further development in order to understand how incident investigation can be integrated into a management system, including (a) flow of work, (b) control, and (c) improvement. Application can be made to the nuclear industry

  19. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  20. Portable modular detection system

    Energy Technology Data Exchange (ETDEWEB)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  1. Incident Command System - Environmental Unit responsibilities

    International Nuclear Information System (INIS)

    Hillman, S. O.

    1997-01-01

    The Incident Command System (ICS) for crisis management, used for response to oil spills by the Alyeska Pipeline Service Company throughout its facilities, including the Trans Alaska Pipeline and the Valdez Marine Terminal, was described. Special attention was given to the Environmental Unit within the ICS which functions as a primary support unit for the Incident Operations Section. Details of the Unit's function were provided. These include the collection, evaluation and dissemination of information on all environmental issues concerning the crisis, provision of advice and direction on environmental aspects, and up-front agency interaction. A checklist of tasks is included. 7 refs

  2. Detection of Cyberbullying Incidents on the Instagram Social Network

    OpenAIRE

    Hosseinmardi, Homa; Mattson, Sabrina Arredondo; Rafiq, Rahat Ibn; Han, Richard; Lv, Qin; Mishra, Shivakant

    2015-01-01

    Cyberbullying is a growing problem affecting more than half of all American teens. The main goal of this paper is to investigate fundamentally new approaches to understand and automatically detect incidents of cyberbullying over images in Instagram, a media-based mobile social network. To this end, we have collected a sample Instagram data set consisting of images and their associated comments, and designed a labeling study for cyberbullying as well as image content using human labelers at th...

  3. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  4. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  5. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  6. A nationwide medication incidents reporting system in the netherlands

    NARCIS (Netherlands)

    K.C. Cheung (Ka Chun); P.M.L.A. van den Bemt (Patricia); M.L. Bouvy (Marcel); M.E. Wensing (Michel); P.A. de Smet (Peter)

    2011-01-01

    textabstractObjective Many Dutch hospitals have established internal systems for reporting incidents. However, such internal systems do not allow learning from incidents that occur in other hospitals. Therefore a multicenter, information technology (IT) supported reporting system named central

  7. A nationwide medication incidents reporting system in The Netherlands

    NARCIS (Netherlands)

    Cheung, K.C.; Bemt, P.M. van den; Bouvy, M.L.; Wensing, M.J.P.; Smet, P.A.G.M. de

    2011-01-01

    Objective Many Dutch hospitals have established internal systems for reporting incidents. However, such internal systems do not allow learning from incidents that occur in other hospitals. Therefore a multicenter, information technology (IT) supported reporting system named central medication

  8. New York integrated incident management system evaluation project final report

    Science.gov (United States)

    2007-03-23

    The Integrated Incident Management System (IIMS) enables incident response personnel to transmit data about an incident to other responders and dispatchers on a real-time basis. When an incident is entered into IIMS, the system uses GPS to identify t...

  9. Oblique-incidence reflectivity difference application for morphology detection.

    Science.gov (United States)

    Zhan, Honglei; Zhao, Kun; Lü, Huibin; Jin, Kuijuan; Yang, Guozhen; Chen, Xiaohong

    2017-10-20

    Analogous with scanning electron microscopy, we use an oblique-incidence reflectivity difference (OIRD) approach for morphology detection. By scanning the active carbon clusters in a one-dimensional way and the reservoir rocks in a two-dimensional way, the morphology of the samples' surface can be revealed in OIRD signal images. High OIRD signals of active carbon samples refer to the centralized distribution areas of carbon, and the fluctuations are caused by the uneven distribution of carbon pellets. OIRD intensity is proportional to the thickness of materials. In terms of rocks, the trough areas with smaller values refer to the low-lying fields. The areas with relatively large OIRD intensities correspond to the protuberance areas of rocks. Consequently, OIRD is a sensitive yet rapid measure of surface detection in material and petrogeology science.

  10. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  11. Underwater laser detection system

    Science.gov (United States)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  12. Section based traffic detection on motorways for incident management

    NARCIS (Netherlands)

    Noort, M. van; Klunder, G.

    2007-01-01

    Current vehicle detection on motorways is based generally on either inductive loop systems or various alternatives such as video cameras. Recently, we encountered two new developments that take a different approach: one from The Netherlands using microwave sensors, and the other from Sweden using

  13. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  14. Pressure detection system

    International Nuclear Information System (INIS)

    Lawford, V.N.; Long, C.E.

    1975-01-01

    The pressure detection system described comprises a first bellows assembly that can be connected to a source of fluid under pressure, a pressure detection apparatus, a second bellows assembly connected to the first assembly and pipes with a coupling device connecting the second bellows assembly to the apparatus. The first and second assemblies can only be disconnected with difficulty from the source or not at all [fr

  15. Early Detection and Localization of Downhole Incidents in Managed Pressure Drilling

    DEFF Research Database (Denmark)

    Willersrud, Anders; Imsland, Lars; Blanke, Mogens

    2015-01-01

    Downhole incidents such as kick, lost circulation, pack-off, and hole cleaning issues are important contributors to downtime in drilling. In managed pressure drilling (MPD), operations margins are typically narrower, implying more frequent incidents and more severe consequences. Detection...

  16. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  17. Incident Management in Academic Information System using ITIL Framework

    Science.gov (United States)

    Palilingan, V. R.; Batmetan, J. R.

    2018-02-01

    Incident management is very important in order to ensure the continuity of a system. Information systems require incident management to ensure information systems can provide maximum service according to the service provided. Many of the problems that arise in academic information systems come from incidents that are not properly handled. The objective of this study aims to find the appropriate way of incident management. The incident can be managed so it will not be a big problem. This research uses the ITIL framework to solve incident problems. The technique used in this study is a technique adopted and developed from the service operations section of the ITIL framework. The results of this research found that 84.5% of incidents appearing in academic information systems can be handled quickly and appropriately. 15.5% incidents can be escalated so as to not cause any new problems. The model of incident management applied to make academic information system can run quickly in providing academic service in a good and efficient. The incident management model implemented in this research is able to manage resources appropriately so as to quickly and easily manage incidents.

  18. Water system virus detection

    Science.gov (United States)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J.

    1975-01-01

    A monitoring system developed to test the capability of a water recovery system to reject the passage of viruses into the recovered water is described. A nonpathogenic marker virus, bacteriophage F2, is fed into the process stream before the recovery unit and the reclaimed water is assayed for its presence. Detection of the marker virus consists of two major components, concentration and isolation of the marker virus, and detection of the marker virus. The concentration system involves adsorption of virus to cellulose acetate filters in the presence of trivalent cations and low pH with subsequent desorption of the virus using volumes of high pH buffer. The detection of the virus is performed by a passive immune agglutination test utilizing specially prepared polystyrene particles. An engineering preliminary design was performed as a parallel effort to the laboratory development of the marker virus test system. Engineering schematics and drawings of a fully functional laboratory prototype capable of zero-G operation are presented. The instrument consists of reagent pump/metering system, reagent storage containers, a filter concentrator, an incubation/detector system, and an electronic readout and control system.

  19. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  20. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  1. Automated Safety Incident Surveillance and Tracking System (ASISTS)

    Data.gov (United States)

    Department of Veterans Affairs — The Automated Safety Incident Surveillance and Tracking System (ASISTS) is a repository of Veterans Health Administration (VHA) employee accident data. Many types of...

  2. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  3. 49 CFR 191.9 - Distribution system: Incident report.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Distribution system: Incident report. 191.9... CONDITION REPORTS § 191.9 Distribution system: Incident report. (a) Except as provided in paragraph (c) of... report required by this section need not be submitted with respect to master meter systems or LNG...

  4. Safer healthcare at home: Detecting, correcting and learning from incidents involving infusion devices.

    Science.gov (United States)

    Lyons, Imogen; Blandford, Ann

    2018-02-01

    Complex medical devices such as infusion pumps are increasingly being used in patients' homes with little known about the impact on patient safety. Our aim was to better understand the risks to patient safety in this situation and how these risks might be minimised, by reference to incident reports. We identified 606 records of incidents associated with infusion devices that had occurred in a private home and were reported to the UK National Reporting and Learning Service (2005-2015 inclusive). We used thematic analysis to identify key themes. In this paper we focus on two emergent themes: detecting and diagnosing incidents; and locating the patient, lay caregivers and their family in incident reports. The majority of incidents were attributed to device malfunction, and resulted in the patient being under-dosed. Delays in recognising and responding to problems were identified, alongside challenges in identifying the cause. We propose a process model for fault diagnosis and correction. Patients and caregivers did not feature strongly in reports; we highlight how the device is in the home but of the care system, and propose an agent model to describe this; we also identify ways of mitigating this disjoint. Devices need to be appropriately tailored to the setting in which they are employed, and within a system of care that ensures they are used optimally and safely. Suggested features to improve patient safety include devices that can provide better feedback to identify problems and support resolution, alongside greater monitoring and technical support by care providers for both patients and frontline professionals. The proposed process and agent models provide a structure for reviewing safety and learning from incidents in home health care. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  5. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  6. Automated surveillance of 911 call data for detection of possible water contamination incidents

    Directory of Open Access Journals (Sweden)

    Dangel Chrissy

    2011-03-01

    Full Text Available Abstract Background Drinking water contamination, with the capability to affect large populations, poses a significant risk to public health. In recent water contamination events, the impact of contamination on public health appeared in data streams monitoring health-seeking behavior. While public health surveillance has traditionally focused on the detection of pathogens, developing methods for detection of illness from fast-acting chemicals has not been an emphasis. Methods An automated surveillance system was implemented for Cincinnati's drinking water contamination warning system to monitor health-related 911 calls in the city of Cincinnati. Incident codes indicative of possible water contamination were filtered from all 911 calls for analysis. The 911 surveillance system uses a space-time scan statistic to detect potential water contamination incidents. The frequency and characteristics of the 911 alarms over a 2.5 year period were studied. Results During the evaluation, 85 alarms occurred, although most occurred prior to the implementation of an additional alerting constraint in May 2009. Data were available for analysis approximately 48 minutes after calls indicating alarms may be generated 1-2 hours after a rapid increase in call volume. Most alerts occurred in areas of high population density. The average alarm area was 9.22 square kilometers. The average number of cases in an alarm was nine calls. Conclusions The 911 surveillance system provides timely notification of possible public health events, but did have limitations. While the alarms contained incident codes and location of the caller, additional information such as medical status was not available to assist validating the cause of the alarm. Furthermore, users indicated that a better understanding of 911 system functionality is necessary to understand how it would behave in an actual water contamination event.

  7. System Issues Leading to "Found-on-Floor" Incidents: A Multi-Incident Analysis.

    Science.gov (United States)

    Shaw, James; Bastawrous, Marina; Burns, Susan; McKay, Sandra

    2016-11-02

    Although attention to patient safety issues in the home care setting is growing, few studies have highlighted health system-level concerns that contribute to patient safety incidents in the home. Found-on-floor (FOF) incidents are a key patient safety issue that is unique to the home care setting and highlights a number of opportunities for system-level improvements to drive enhanced patient safety. We completed a multi-incident analysis of FOF incidents documented in the electronic record system of a home health care agency in Toronto, Canada, for the course of 1 year between January 2012 and February 2013. Length of stay (LOS) was identified as the cross-cutting theme, illustrating the following 3 key issues: (1) in the short LOS group, a lack of information continuity led to missed fall risk information by home care professionals; (2) in the medium LOS group, a lack of personal support worker/carer training in fall prevention led to inadequate fall prevention activity; and (3) in the long LOS group, a lack of accountability policy at a system level led to a lack of fall risk assessment follow-up. Our study suggests that considering LOS in the home care sector helps expose key system-level issues enabling safety incidents such as FOF to occur. Our multi-incident analysis identified a number of opportunities for system-level changes that might improve fall prevention practice and reduce the likelihood of FOF incidents in the home. Specifically, investment in electronic health records that are functional across the continuum of care, further research and understanding of the training and skills of personal support workers, and enhanced incentives or more punitive approaches (depending on the circumstances) to ensure accountability in home safety will strengthen the home care sector and help prevent FOF incidents among older people.

  8. Ultrasonic Leak Detection System

    Science.gov (United States)

    Youngquist, Robert C. (Inventor); Moerk, J. Steven (Inventor)

    1998-01-01

    A system for detecting ultrasonic vibrations. such as those generated by a small leak in a pressurized container. vessel. pipe. or the like. comprises an ultrasonic transducer assembly and a processing circuit for converting transducer signals into an audio frequency range signal. The audio frequency range signal can be used to drive a pair of headphones worn by an operator. A diode rectifier based mixing circuit provides a simple, inexpensive way to mix the transducer signal with a square wave signal generated by an oscillator, and thereby generate the audio frequency signal. The sensitivity of the system is greatly increased through proper selection and matching of the system components. and the use of noise rejection filters and elements. In addition, a parabolic collecting horn is preferably employed which is mounted on the transducer assembly housing. The collecting horn increases sensitivity of the system by amplifying the received signals. and provides directionality which facilitates easier location of an ultrasonic vibration source.

  9. Designed Incident Reporting System in P2TKN BATAN

    International Nuclear Information System (INIS)

    Supriatna, Piping; Sudarsyamsu S; Bambang S; Karyana, Edy

    2000-01-01

    Incident Reporting System is a routine activating for record all incident of Nuclear Plant Characteristic of the incident Reporting System (IRS) recording can be made locally, regionally or national scope. IRS recording of nuclear activity responsible to Nuclear Safety Technology Development Center (NSTDC). In this report has been designed IRS for nuclear incident in Batan, which the socialization in the field will be done step by step. The first step will be applied in NSTCD scope, the second step will be applied in PPTA Serpong area, and the third step will be applied in Batan area

  10. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  11. A nationwide medication incidents reporting system in The Netherlands.

    Science.gov (United States)

    Cheung, Ka-Chun; van den Bemt, Patricia M L A; Bouvy, Marcel L; Wensing, Michel; De Smet, Peter A G M

    2011-01-01

    Many Dutch hospitals have established internal systems for reporting incidents. However, such internal systems do not allow learning from incidents that occur in other hospitals. Therefore a multicenter, information technology (IT) supported reporting system named central medication incidents registration (CMR) was developed. This article describes the architecture, implementation and current status of the CMR in The Netherlands and compare it with similar systems in other countries. Adequate IT is required to sufficiently support a multicenter reporting system. The CMR system consists of a website, a database, a web-based reporting form, an application to import reports generated in other reporting systems, an application to generate an overview of reported medication incidents, and a national warning system for healthcare providers. From the start of CMR 90 of all 93 (96.8%) hospitals and 872 of 1948 (44.8%) community pharmacies participated. Between March 2006 and March 2010 the CMR comprised 15,694 reports of incidents. In the period from March 2010 to March 2011, 1642 reports were submitted by community pharmacies in CMR and the hospitals submitted 2517 reports. CMR is similar to various systems in other countries, but it seems to use more IT applications. The CMR is developing into a nationwide reporting system of medication incidents in The Netherlands, in which hospitals, community pharmacies, mental healthcare organizations and general practitioners participate. The architecture of the system met the requirements of a nationwide reporting system across different healthcare providers.

  12. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  13. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  14. Pediatric safety incidents from an intensive care reporting system.

    Science.gov (United States)

    Skapik, Julia Lynn; Pronovost, Peter J; Miller, Marlene R; Thompson, David A; Wu, Albert W

    2009-06-01

    Adverse events impose a great burden on patients and the health care system, but not enough is known about how to address incidents involving pediatric patients. This study examined the demographic factors, types of events, contributing system factors, and harm associated with incidents that occur in pediatric intensive care units. Cross-sectional analysis of 2 years of data on all pediatric safety incidents and near misses reported to the voluntary provider-recorded Intensive Care Unit Safety Reporting System in regards to harm and contributing factors. In 464 incidents reported from 23 intensive care units to the Intensive Care Unit Safety Reporting System, patients were physically injured in one third of incidents and harmed in some way in two thirds of incidents. Medication errors were the most common incident type, but were associated with less harm than other event types. Line, tube, and airway events comprised one third of incidents and were associated with more harm than other types. Patient contributing factors were a strong predictor of harm; training and education factors were also commonly cited. In multivariate analysis, patient factors were the strongest predictor of harm adjusting for age, sex, and race. Pediatric patients are commonly harmed in intensive care units. There are several potential ways to improve safety including protocols for high-risk procedures involving lines and tubes, improved monitoring, and staffing, training and communication initiatives. Providers may be able to identify patients at increased risk for harm and intervene to protect patient safety.

  15. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  16. Results of the implementation of a learning system with incidents in an radiotherapy department

    International Nuclear Information System (INIS)

    Radicchi, Lucas Augusto; Vilela, Ellen Pedroso Severino; Faustino, Fabio de Lima C.; Rodrigues, Fernanda Arantes C.; Gomes, Franciele N.; Souza, Guilherme Vicente de; Silva, Rose Marta S.; Toledo, Jose Carlos de

    2016-01-01

    An incident learning system (ILS) is an important tool for improving aspects of patient and staff safety. In radiation oncology, ILS has been implemented both at the institutional level as at the national level, allowing to share lessons learned from incidents that have already occurred. The objective of this study is to present the preliminary results of the ILS implemented in a radiation oncology department. In total, 128 incidents were reviewed by a multidisciplinary committee, and the professional groups that registered more were medical physicists, radiation oncologists and radiation therapists. In addition, incidents have occurred and have been detected mainly in the treatment step. The incident learning system proved to be an important process improvement tool, according to the results shown,the improvement actions proposed and the perception of the people involved. (author)

  17. Early Detection and Localization of Downhole Incidents in Managed Pressure Drilling

    DEFF Research Database (Denmark)

    Willersrud, Anders; Imsland, Lars; Blanke, Mogens

    2015-01-01

    Downhole incidents such as kick, lost circulation, pack-off, and hole cleaning issues are important contributors to downtime in drilling. In managed pressure drilling (MPD), operations margins are typically narrower, implying more frequent incidents and more severe consequences. Detection and han...

  18. Development and testing of incident detection algorithms. Vol. 2, research methodology and detailed results.

    Science.gov (United States)

    1976-04-01

    The development and testing of incident detection algorithms was based on Los Angeles and Minneapolis freeway surveillance data. Algorithms considered were based on times series and pattern recognition techniques. Attention was given to the effects o...

  19. Incident Command Systems: Because Life Happens

    Science.gov (United States)

    Isaac, Gayle; Moore, Brian

    2011-01-01

    Preparing for every possible contingency seems daunting, but with teamwork and some help from the government, it's almost do-able. There is a great system out there that will help business professionals and educators develop a strong, effective emergency preparedness plan. If they haven't done a good job of implementing a solid emergency response…

  20. An error taxonomy system for analysis of haemodialysis incidents.

    Science.gov (United States)

    Gu, Xiuzhu; Itoh, Kenji; Suzuki, Satoshi

    2014-12-01

    This paper describes the development of a haemodialysis error taxonomy system for analysing incidents and predicting the safety status of a dialysis organisation. The error taxonomy system was developed by adapting an error taxonomy system which assumed no specific specialty to haemodialysis situations. Its application was conducted with 1,909 incident reports collected from two dialysis facilities in Japan. Over 70% of haemodialysis incidents were reported as problems or complications related to dialyser, circuit, medication and setting of dialysis condition. Approximately 70% of errors took place immediately before and after the four hours of haemodialysis therapy. Error types most frequently made in the dialysis unit were omission and qualitative errors. Failures or complications classified to staff human factors, communication, task and organisational factors were found in most dialysis incidents. Device/equipment/materials, medicine and clinical documents were most likely to be involved in errors. Haemodialysis nurses were involved in more incidents related to medicine and documents, whereas dialysis technologists made more errors with device/equipment/materials. This error taxonomy system is able to investigate incidents and adverse events occurring in the dialysis setting but is also able to estimate safety-related status of an organisation, such as reporting culture. © 2014 European Dialysis and Transplant Nurses Association/European Renal Care Association.

  1. Analysis of Passenger Incident Data from Five Rail Transit Systems

    Directory of Open Access Journals (Sweden)

    Katharine Hunter-Zaworski

    2017-09-01

    Full Text Available The study results reported here are part of a larger research project that developed a manual for practitioners to improve safety at rail transit platform/train and platform/guideway interfaces. As part of that effort, passenger injury incident data was collected from five rail transit systems, and interviews were conducted with safety officers at other rail transit systems in the US and Canada. The data collected showed that stairs and escalators and general platform tripping produced more injury incidents than the platform/train and platform/guideway interfaces. Heavy rail transit with platforms that are higher than 24 inches from top of rail had more injury incidents than light rail transit that typically operates on low level platforms. Other causes of injury incidents included intoxication, attempted suicide, and distraction.

  2. Detection and incidence of Pernospora variabilis in quinoa seeds

    OpenAIRE

    Testen, A.M.; Backman, Paul A.

    2012-01-01

    This poster describes the research undertaken to determine the level of imported quinoa contamination with quinoa downy mildew, caused by Pernospora variabilis, as well as to develop a rapid method of detection by DNA primers. The majority of lots coming from a wide variety of sources were found to have been contaminated with the pathogen, indicating it is more widespread than anticipated. Additionally, DNA primers for P. variabilis were shown to be effective in identifying most cases of cont...

  3. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  4. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going ...

  5. Sensitivity of routine system for reporting patient safety incidents in an NHS hospital: retrospective patient case note review.

    Science.gov (United States)

    Sari, Ali Baba-Akbari; Sheldon, Trevor A; Cracknell, Alison; Turnbull, Alastair

    2007-01-13

    To evaluate the performance of a routine incident reporting system in identifying patient safety incidents. Two stage retrospective review of patients' case notes and analysis of data submitted to the routine incident reporting system on the same patients. A large NHS hospital in England. 1006 hospital admissions between January and May 2004: surgery (n=311), general medicine (n=251), elderly care (n=184), orthopaedics (n=131), urology (n=61), and three other specialties (n=68). Proportion of admissions with at least one patient safety incident; proportion and type of patient safety incidents missed by routine incident reporting and case note review methods. 324 patient safety incidents were identified in 230/1006 admissions (22.9%; 95% confidence interval 20.3% to 25.5%). 270 (83%) patient safety incidents were identified by case note review only, 21 (7%) by the routine reporting system only, and 33 (10%) by both methods. 110 admissions (10.9%; 9.0% to 12.8%) had at least one patient safety incident resulting in patient harm, all of which were detected by the case note review and six (5%) by the reporting system. The routine incident reporting system may be poor at identifying patient safety incidents, particularly those resulting in harm. Structured case note review may have a useful role in surveillance of routine incident reporting and associated quality improvement programmes.

  6. Fire detection and incidents localization based on public information channels and social media

    Science.gov (United States)

    Thanos, Konstantinos-Georgios; Skroumpelou, Katerina; Rizogiannis, Konstantinos; Kyriazanos, Dimitris M.; Astyakopoulos, Alkiviadis; Thomopoulos, Stelios C. A.

    2017-05-01

    In this paper a solution is presented aiming to assist the early detection and localization of a fire incident by exploiting crowdsourcing and unofficial civilian online reports. It consists of two components: (a) the potential fire incident detection and (b) the visualization component. The first component comprises two modules that run in parallel and aim to collect reports posted on public platforms and conclude to potential fire incident locations. It collects the public reports, distinguishes reports that refer to a potential fire incident and store the corresponding information in a structured way. The second module aggregates all these stored reports and conclude to a probable fire location, based on the amount of reports per area, the time and location of these reports. In further the result is entered to a fusion module which combines it with information collected by sensors if available in order to provide a more accurate fire event detection capability. The visualization component is a fully - operational public information channel which provides accurate and up-to-date information about active and past fires, raises awareness about forest fires and the relevant hazards among citizens. The channel has visualization capabilities for presenting in an efficient way information regarding detected fire incidents fire expansion areas, and relevant information such as detecting sensors and reporting origin. The paper concludes with insight to current CONOPS end user with regards to the inclusion of the proposed solution to the current CONOPS of fire detection.

  7. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  8. Incidence of systemic lupus erythematosus and lupus nephritis in Denmark

    DEFF Research Database (Denmark)

    Hermansen, Marie-Louise From; Lindhardsen, Jesper; Torp-Pedersen, Christian

    2016-01-01

    Objective. To determine the incidence of systemic lupus erythematosus (SLE) and SLE with concomitant or subsequent lupus nephritis (LN) in Denmark during 1995.2011, using data from the Danish National Patient Registry (NPR).  Methods. To assess the incidence of SLE, we identified all persons aged...... with or after first SLE registration.  Results. The overall annual incidence rate per 100,000 for SLE was 2.35 (95% CI 2.24.2.49); 0.69 (95% CI 0.60.0.78) for men and 3.96 (95% CI 3.75.4.17) for women. For LN, the mean annual incidence rate per 100,000 was estimated to be 0.45 (95% CI 0.38.0.53); 0.20 (95% CI 0...... (December 31, 2011) per 100,000 was 45.2 (95% CI 43.3.47.4) and 6.4 (95% CI 5.7.7.2) for SLE and LN, respectively.  Conclusion. Our Danish population-based data showed a stable incidence of SLE and LN. As expected, we found higher incidence rates among women than among men, particularly in younger persons....

  9. Protein detection system

    Science.gov (United States)

    Fruetel, Julie A [Livermore, CA; Fiechtner, Gregory J [Bethesda, MD; Kliner, Dahv A. V. [San Ramon, CA; McIlroy, Andrew [Livermore, CA

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  10. Piloting an online incident reporting system in Australasian emergency medicine.

    Science.gov (United States)

    Schultz, Timothy J; Crock, Carmel; Hansen, Kim; Deakin, Anita; Gosbell, Andrew

    2014-10-01

    Medical-specific incident reporting systems are critical to understanding error in healthcare but underreporting by doctors reduces their value. We conducted a pilot study of the implementation of an online ED-specific incident reporting system in Australasian hospitals and evaluated its use. The reporting system was based on the literature and input of experts. Thirty-one hospital EDs were approached to pilot the Emergency Medicine Events Register (EMER). The pilot evaluated: website usage and analytics, reporting behaviours and rates, the quality of information collected in EMER. Semi-structured interviews of three site champions responsible for implementing EMER were conducted. Seventeen EDs expressed interest; however, due to delays and other barriers reporting only occurred at three sites. Over 354 days, the website received 362 unique visitors and 77 incidents. The median time to report was 4.6 min. The reporting rate was 0.07 reports per doctor month, suggesting a reporting rate of 0.08% of ED presentations. Data quality, as measured by the number of completed non-mandatory fields and ability to classify incidents, was very high. The interviews identified enablers (the EMER system, site champions) and barriers (chiefly the context of EM) to EMER uptake. Collecting patient safety information by frontline doctors is essential to actively engage the profession in patent safety. Although the EMER system allowed easy online reporting of high quality incident data by doctors, site recruitment and system uptake proved difficult. System use by ED doctors requires dedicated and conscious effort from the profession. © 2014 Australasian College for Emergency Medicine and Australasian Society for Emergency Medicine.

  11. The evaluation of a web-based incident reporting system.

    Science.gov (United States)

    Kuo, Ya-Hui; Lee, Ting-Ting; Mills, Mary Etta; Lin, Kuan-Chia

    2012-07-01

    A Web-based reporting system is essential to report incident events anonymously and confidentially. The purpose of this study was to evaluate a Web-based reporting system in Taiwan. User satisfaction and impact of system use were evaluated through a survey answered by 249 nurses. Incident events reported in paper and electronic systems were collected for comparison purposes. Study variables included system user satisfaction, willingness to report, number of reports, severity of the events, and efficiency of the reporting process. Results revealed that senior nurses were less willing to report events, nurses on internal medicine units had higher satisfaction than others, and lowest satisfaction was related to the time it took to file a report. In addition, the Web-based reporting system was used more often than the paper system. The percentages of events reported were significantly higher in the Web-based system in laboratory, environment/device, and incidents occurring in other units, whereas the proportions of reports involving bedsores and dislocation of endotracheal tubes were decreased. Finally, moderate injury event reporting decreased, whereas minor or minimal injury event reporting increased. The study recommends that the data entry process be simplified and the network system be improved to increase user satisfaction and reporting rates.

  12. Incidence of systemic inflammatory response syndrome after endovascular aortic repair

    DEFF Research Database (Denmark)

    De La Motte, L; Vogt, K; Jensen, Leif Panduro

    2011-01-01

    AIM: The aim of this study was to estimate the incidence of the post-implantation syndrome/systemic inflammatory response syndrome (SIRS) after endovascular aortic repair. METHODS: All patients, undergoing elective primary endovascular repair of an asymptomatic infrarenal abdominal aortic aneurysm...

  13. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  14. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  15. Radiation detecting system

    International Nuclear Information System (INIS)

    1975-01-01

    In spectrophotometry systems, a usual arrangement for modulating the radiation is a rotating disc having one or more sectors removed. A beam of radiation may be blocked by the disc except when a cut-away sector is in the path of the beam. With a double-beam system, a cut-away sector of 180 0 may be used so that when the first path is blocked, the second is allowed through, and vice versa. One or both sides of the disc may be formed as mirrors to facilitate beam switching and to allow use of more than two beams for background compensation purposes or for analysis of more than one substance within a sample. (G.T.H.)

  16. Fault Detection for Nonlinear Systems

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, H.H.

    1998-01-01

    The paper describes a general method for designing fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of methods based o...

  17. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  18. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  19. PCR-Based Method for the Detection of Toxic Mushrooms Causing Food-Poisoning Incidents.

    Science.gov (United States)

    Nomura, Chie; Masayama, Atsushi; Yamaguchi, Mizuka; Sakuma, Daisuke; Kajimura, Keiji

    2017-01-01

    In this study, species-specific identification of five toxic mushrooms, Chlorophyllum molybdites, Gymnopilus junonius, Hypholoma fasciculare, Pleurocybella porrigens, and Tricholoma ustale, which have been involved in food-poisoning incidents in Japan, was investigated. Specific primer pairs targeting internal transcribed spacer (ITS) regions were designed for PCR detection. The specific amplicons were obtained from fresh, cooked, and simulated gastric fluid (SGF)-treated samples. No amplicons were detected from other mushrooms with similar morphology. Our method using one-step extraction of mushrooms allows rapid detection within 2.5 hr. It could be utilized for rapid identification or screening of toxic mushrooms.

  20. Eosinophilia detected by automated blood cell counting in ambulatory North American outpatients. Incidence and clinical significance.

    Science.gov (United States)

    Brigden, M; Graydon, C

    1997-09-01

    To audit a cohort of ambulatory outpatients with eosinophilia detected on automated blood cell counting. Specific objectives included the determination of whether the eosinophilia had been anticipated, the etiology of the eosinophilia, the clinical follow-up and investigations performed on patients with eosinophilia, and the effect of the detection of eosinophilia on patient management and ultimate clinical outcome. A year-long retrospective review of all patients with an absolute eosinophil count of greater than 0.7 x 10(9)/L. A large outpatient laboratory system. The patient population was managed by family physicians and specialists. Data collection included the results of the hematology profile, the absolute eosinophil count, the clinical situation responsible for the hematologic profile determination, and the probable cause of eosinophilia. Individual physicians were surveyed to determine if discovery of the eosinophilia had changed patient management plan or clinical outcome. Out of 195,300 patients who had a hematology profile performed, 225 were found to have an absolute eosinophilia count higher than 0.7 x 10(9)/L. The overall incidence of eosinophilia in the study population was 0.1%. The eosinophilia was not anticipated in 85% of patients. No obvious cause was detected for the eosinophilia in 36% of patients. Various allergic diseases were responsible for the eosinophilia in the majority of the remaining patients. Fewer than 9% of individuals manifested a serious systemic illness or parasitemia. Further clinical follow-up had been performed in 69% of patients. Additional laboratory tests had been ordered in 59% of patients. The laboratory tests most frequently ordered were a repeat hematology profile or stool examinations for ova and parasites. In only two instances did the discovery of the eosinophilia appear to result in a significant change in patient management or ultimate clinical income. The vast majority of eosinophilias detected in ambulatory

  1. Incidence and risk of heart failure in systemic lupus erythematosus.

    Science.gov (United States)

    Kim, Chang H; Al-Kindi, Sadeer G; Jandali, Bochra; Askari, Ali D; Zacharias, Michael; Oliveira, Guilherme H

    2017-02-01

    Although case series suggest a higher burden of cardiovascular risk factors in patients with systemic lupus erythematosus (SLE) compared with the general population, the association between SLE and heart failure (HF) remains undefined. We sought to investigate the incidence and risk of HF in patients with SLE. In April 2016, we performed a retrospective cohort analysis using the Explorys platform, which provides aggregated electronic medical record data from 26 major integrated healthcare systems across the USA from 1999 to present. Demographic and regression analyses were performed to assess the impact of SLE on HF incidence. Among 45 284 540 individuals in the database, we identified 95 400 (0.21%) with SLE and 98 900 (0.22%) with a new diagnosis of HF between May 2015 and April 2016. HF incidence was markedly higher in the SLE group compared with controls (0.97% vs 0.22%, relative risk (RR): 4.6 (95% CI 4.3 to 4.9)), as were other cardiovascular risk factors. In regression analysis, SLE was an independent predictor of HF (adjusted OR: 3.17 (2.63 to 3.83), prisk but decreasing RR with advancing age in both sexes. Renal involvement in SLE correlated with earlier and higher incidence of HF. The findings of this study suggest that patients with SLE have significantly higher risk of developing HF and a worse cardiovascular risk profile compared with the general population. These results need to be confirmed by prospective studies. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  2. Establishing national medical imaging incident reporting systems: issues and challenges.

    Science.gov (United States)

    Jones, D Neil; Benveniste, Klee A; Schultz, Timothy J; Mandel, Catherine J; Runciman, William B

    2010-08-01

    Radiology incident reporting systems provide one source of invaluable patient safety data that, when combined with appropriate analysis and action, can result in significantly safer health care, which is now an urgent priority for governments worldwide. Such systems require integration into a wider safety, quality, and risk management framework because many issues have global implications, and they also require an international classification scheme, which is now being developed. These systems can be used to inform global research activities as identified by the World Health Organization, many of which intersect with the activities of and issues seen in medical imaging departments. How to ensure that radiologists (and doctors in general) report incidents, and are engaged in the process, is a challenge. However, as demonstrated with the example of the Australian Radiology Events Register, this can be achieved when the reporting system is integrated with their professional organization and its other related activities (such as training and education) and administered by a patient safety organization. Copyright 2010 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  3. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  4. Prevention of a wrong-location misadministration through the use of an intradepartmental incident learning system

    Energy Technology Data Exchange (ETDEWEB)

    Ford, Eric C.; Smith, Koren; Harris, Kendra; Terezakis, Stephanie [Department of Radiation Oncology and Molecular Radiation Sciences, Johns Hopkins University, Baltimore, Maryland 21231 (United States)

    2012-11-15

    Purpose: A series of examples are presented in which potential errors in the delivery of radiation therapy were prevented through use of incident learning. These examples underscore the value of reporting near miss incidents. Methods: Using a departmental incident learning system, eight incidents were noted over a two-year period in which fields were treated 'out-of-sequence,' that is, fields from a boost phase were treated, while the patient was still in the initial phase of treatment. As a result, an error-prevention policy was instituted in which radiation treatment fields are 'hidden' within the oncology information system (OIS) when they are not in current use. In this way, fields are only available to be treated in the intended sequence and, importantly, old fields cannot be activated at the linear accelerator control console. Results: No out-of-sequence treatments have been reported in more than two years since the policy change. Furthermore, at least three near-miss incidents were detected and corrected as a result of the policy change. In the first two, the policy operated as intended to directly prevent an error in field scheduling. In the third near-miss, the policy operated 'off target' to prevent a type of error scenario that it was not directly intended to prevent. In this incident, an incorrect digitally reconstructed radiograph (DRR) was scheduled in the OIS for a patient receiving lung cancer treatment. The incorrect DRR had an isocenter which was misplaced by approximately two centimeters. The error was a result of a field from an old plan being scheduled instead of the intended new plan. As a result of the policy described above, the DRR field could not be activated for treatment however and the error was discovered and corrected. Other quality control barriers in place would have been unlikely to have detected this error. Conclusions: In these examples, a policy was adopted based on incident learning, which

  5. Prevention of a wrong-location misadministration through the use of an intradepartmental incident learning system

    International Nuclear Information System (INIS)

    Ford, Eric C.; Smith, Koren; Harris, Kendra; Terezakis, Stephanie

    2012-01-01

    Purpose: A series of examples are presented in which potential errors in the delivery of radiation therapy were prevented through use of incident learning. These examples underscore the value of reporting near miss incidents. Methods: Using a departmental incident learning system, eight incidents were noted over a two-year period in which fields were treated “out-of-sequence,” that is, fields from a boost phase were treated, while the patient was still in the initial phase of treatment. As a result, an error-prevention policy was instituted in which radiation treatment fields are “hidden” within the oncology information system (OIS) when they are not in current use. In this way, fields are only available to be treated in the intended sequence and, importantly, old fields cannot be activated at the linear accelerator control console. Results: No out-of-sequence treatments have been reported in more than two years since the policy change. Furthermore, at least three near-miss incidents were detected and corrected as a result of the policy change. In the first two, the policy operated as intended to directly prevent an error in field scheduling. In the third near-miss, the policy operated “off target” to prevent a type of error scenario that it was not directly intended to prevent. In this incident, an incorrect digitally reconstructed radiograph (DRR) was scheduled in the OIS for a patient receiving lung cancer treatment. The incorrect DRR had an isocenter which was misplaced by approximately two centimeters. The error was a result of a field from an old plan being scheduled instead of the intended new plan. As a result of the policy described above, the DRR field could not be activated for treatment however and the error was discovered and corrected. Other quality control barriers in place would have been unlikely to have detected this error. Conclusions: In these examples, a policy was adopted based on incident learning, which prevented several errors

  6. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...

  7. Semi autonomous mine detection system

    Energy Technology Data Exchange (ETDEWEB)

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  8. Development of the decision make supporting system on incident management

    International Nuclear Information System (INIS)

    Kasamatsu, Mizuki; Hanada, Satoshi; Noda, Eisuke

    2017-01-01

    Decision Make Supporting System is designed to support appropriate decision made by top management in the nuclear severe conditions. With crisis response in nuclear power plant (NPP), information entanglement between sites and control centers during intense situations interfere with prompt and accurate decision making. This research started with that kind of background. In order to solve the issue of the information entanglement, Mitsubishi Heavy Industries, Inc. (MHI) carried out the development of the Decision Make Supporting System and the system applies the technology combining the human factors engineering (HFE) and information and communication technology (ICT). During the crisis response, various commands, reactions and communications in a human system need to be managed. Therefore, the combined HFE method including detailed task analysis, user experience (UX), graphic user interface (GUI) and related human-system interface (HSI) design method is applied to the design of the system. These design results systematize the functions that prevent interference with decision-making in the headquarters for incident management. This new solution as a system enhances the safety improvement of the NPP and contributes to develop the skills and abilities of the resources in the NPP. The system has three key features for supporting emergency situations: 'understanding the situation', 'planning the next action', and 'managing resources'. The system helps commanders and responders to grasp the whole situation and allows them to share information in real time to get a whole picture, and the system accumulates the data of the past events in the chronological order to understand correctly how they happened and plan the next action by using a knowledge database that MHI has been developed. If the unexpected event happens which are not in the incident scenario, the system provides support to formulate alternative strategies and measures. With this

  9. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  10. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  11. A review and discussion of flight management system incidents reported to the Aviation Safety Reporting System

    Science.gov (United States)

    1992-02-01

    This report covers the activities related to the description, classification and : analysis of the types and kinds of flight crew errors, incidents and actions, as : reported to the Aviation Safety Reporting System (ASRS) database, that can occur as ...

  12. The Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  13. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  14. Nucleic acid detection system and method for detecting influenza

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  15. Ultrasonic System Approach to Obstacle Detection and Edge Detection

    Directory of Open Access Journals (Sweden)

    Yin Thu Win

    2011-04-01

    Full Text Available In this paper, ultrasonic system approach to obstacle detection and edge detection for industrial and rescue operations has been presented. The developed system consists of tough sonic sensor configure with personal computer for monitoring. First, the mathematical model has been presented for the object detection system. Then the numerical simulation has been performed using Matlab platform. The experiments have been conducted using ultrasonic frequency. The curtain, paper and bamboo sheet have been considered as a media during experiments. The presented system is highly accurate for object detection and edge detection behind the obstacle.

  16. Incidence of systemic inflammatory response syndrome after endovascular aortic repair

    DEFF Research Database (Denmark)

    De La Motte, L; Vogt, K; Jensen, Leif Panduro

    2011-01-01

    AIM: The aim of this study was to estimate the incidence of the post-implantation syndrome/systemic inflammatory response syndrome (SIRS) after endovascular aortic repair. METHODS: All patients, undergoing elective primary endovascular repair of an asymptomatic infrarenal abdominal aortic aneurysm...... during 2007, were retrospectively evaluated for SIRS within the first 5 postoperative days. The only exclusion-criteria were missing data. SIRS was assessed using the criteria defined by the American College of Chest Physicians and Society of Critical Care Medicine Consensus Conference Committee. RESULTS......: Sixty-six patients were included, 40 (60%) met the SIRS criteria within the first 5 postoperative days (95% of the 40 patients met the criteria within 3 days). We found no significant differences between the SIRS and the non-SIRS group in baseline characteristics or other data including volume...

  17. Learning to Detect Traffic Incidents from Data Based on Tree Augmented Naive Bayesian Classifiers

    Directory of Open Access Journals (Sweden)

    Dawei Li

    2017-01-01

    Full Text Available This study develops a tree augmented naive Bayesian (TAN classifier based incident detection algorithm. Compared with the Bayesian networks based detection algorithms developed in the previous studies, this algorithm has less dependency on experts’ knowledge. The structure of TAN classifier for incident detection is learned from data. The discretization of continuous attributes is processed using an entropy-based method automatically. A simulation dataset on the section of the Ayer Rajah Expressway (AYE in Singapore is used to demonstrate the development of proposed algorithm, including wavelet denoising, normalization, entropy-based discretization, and structure learning. The performance of TAN based algorithm is evaluated compared with the previous developed Bayesian network (BN based and multilayer feed forward (MLF neural networks based algorithms with the same AYE data. The experiment results show that the TAN based algorithms perform better than the BN classifiers and have a similar performance to the MLF based algorithm. However, TAN based algorithm would have wider vista of applications because the theory of TAN classifiers is much less complicated than MLF. It should be found from the experiment that the TAN classifier based algorithm has a significant superiority over the speed of model training and calibration compared with MLF.

  18. The incidence and risk factors of asymptomatic primary spontaneous pneumothorax detected during health check-ups.

    Science.gov (United States)

    Mitani, Akihisa; Hakamata, Yukichika; Hosoi, Megumi; Horie, Masafumi; Murano, Yoko; Saito, Akira; Yanagimoto, Shintaro; Tsuji, Shoji; Yamamoto, Kazuhiko; Nagase, Takahide

    2017-12-07

    Patients with primary spontaneous pneumothorax (PSP) usually complain of sudden-onset dyspnea and pleuritic chest pain. However, asymptomatic PSP has been incidentally detected on chest X-rays. In this study, we analyzed the incidence, characteristics, risk factors, and prognosis of asymptomatic PSP detected during regular medical check-ups in university students. In this study, 101,709 chest X-rays were performed during medical check-ups for students at the University of Tokyo between April 2011 and March 2016. Among them, 43 cases of asymptomatic PSP (0.042%) were detected. We calculated the lung collapse rate of pneumothorax using Kircher's method. We also analyzed risk factors associated with asymptomatic PSP using characteristics inspected in medical check-ups. The incidence of asymptomatic PSP was significantly higher in men than in women (0.050% vs 0.018%). Multivariate analysis revealed an association of younger age, greater height, lower body mass index, and greater height growth per year with an increased risk of asymptomatic PSP in male students. Mild lung collapse (up is very important because a considerable number of patients with mild lung collapse eventually require an invasive medical procedure.

  19. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  20. MRI detection of unsuspected vertebral injury in acute spinal trauma: incidence and significance

    International Nuclear Information System (INIS)

    Qaiyum, M.; Tyrrell, P.N.M.; McCall, I.W.; Cassar-Pullicino, V.N.

    2001-01-01

    Objective. Multilevel spinal injury is well recognised. Previous studies reviewing the radiographs of spinal injury patients have shown an incidence of 15.2% of unsuspected spinal injury. It is recognised that magnetic resonance imaging (MRI) can identify injuries that are not demonstrated on radiographs. The objective of this study was to determine the incidence and significance of spinal injuries using MRI in comparison with radiographs.Design and patients. The radiographs and MR images of 110 acute spinal injury patients were reviewed independently of each other and the findings were then correlated to determine any unsuspected injury.Results. MRI detected vertebral body bone bruises (microtrabecular bone injury) in 41.8% of spinal injury patients which were not seen on radiographs. These bone bruises were best appreciated on sagittal short tau inversion recovery MR sequences and seen at contiguous and non-contiguous levels in relation to the primary injury.Conclusion. This level of incidence of bone bruises has not previously been appreciated. We recommend that patients undergoing MRI for an injured segment of the spine are better assessed by MRI of the entire spine at the same time to exclude further injury. (orig.)

  1. Pulsed helium ionization detection system

    Science.gov (United States)

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  2. Complicated systems for neutron detection

    International Nuclear Information System (INIS)

    Kozlov, I.M.; Nikotin, O.P.; Chekrenev, A.S.

    1982-01-01

    The design of the system for detecting delayed neutrons due to heavy nuclei photofission is described. The system comprises a large number of 3 He proportional counters of thermal neutrons. Each counter is equipped with an individual amplifier, discriminator and pUlse shaper. The tuning of a detector comprising several counters has been realized by changing the discrimination voltage in such a manner that the point of the ν radiation initial counting for all counters is under the same voltage of the high voltage source. Such method permits not only to reduce the tuning time but to obtain also an optimum value of perfect separation of signals from neutrons and ν radiation. Data processing has been performed by the commutator which permits to add signals in different versions. The choice of the version has been determined by output control potentials. The commutator functions have been recorded in the symbols of algebra logics. The described detector with the commutator has been employed in kinetic measurements of photofission delayed neutrons, for detecting fission neutrons with neutron background, from (α, n) for measuring the distribution of a number of instantaneous neutrons per fission act. The above principles of the detectors structure and data processing and recording facilities permit to unite according power supplies any number of thermal neutron counters and apply more complicated circuats of counter signal commutators

  3. Safer travel, improved economic productivity : incident management systems

    Science.gov (United States)

    1999-01-01

    This brochure gives an overview of how incident management technologies can be used to reduce incident-related congestion and increase road safety. It focuses on the need for interagency cooperation and the benefits that can be derived from the coope...

  4. Detection of incidents and follow-up by the regulatory bodies

    International Nuclear Information System (INIS)

    Gouffon, A.

    1990-12-01

    Although France has established a large nuclear program based on PWR type reactors, experience gained up to this are are quite modest. Concept of PWR-900 reactors is based mostly on safety analyses and evaluations done a priori. At the time of their construction and start-up they have been considered as advanced safe systems. No data were available concerning any incidents during operation. The Three Mile Island accident in 1979 has changed the attitude concerning reactor safety. The result is the procedure adopted by Electricite de France for follow-up of incident situations during operation of a number of PWR-900 plants. Standardization of this type of NPPs demands extremely strict standards and control of safety systems. This safety analysis procedure consists of the following: analysis of incidents based on data collected by EDF during operation; every regular annual shutdown of a unit is the subject of detailed analysis; together with the detailed analysis, principal elements of operating experience for the series of PWR units are submitted for analysis to a permanent regulatory body

  5. FLEXible Damage Detection and Verification System

    Data.gov (United States)

    National Aeronautics and Space Administration — This project expands on the previously demonstrated Flat Surface Damage Detection System (FSDDS) capabilities.  The Flexible Damage Detection and Verification System...

  6. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  7. A Portable Infrasonic Detection System

    Science.gov (United States)

    Shams, Qamar A.; Burkett, Cecil G.; Zuckerwar, Allan J.; Lawrenson, Christopher C.; Masterman, Michael

    2008-01-01

    During last couple of years, NASA Langley has designed and developed a portable infrasonic detection system which can be used to make useful infrasound measurements at a location where it was not possible previously. The system comprises an electret condenser microphone, having a 3-inch membrane diameter, and a small, compact windscreen. Electret-based technology offers the lowest possible background noise, because Johnson noise generated in the supporting electronics (preamplifier) is minimized. The microphone features a high membrane compliance with a large backchamber volume, a prepolarized backplane and a high impedance preamplifier located inside the backchamber. The windscreen, based on the high transmission coefficient of infrasound through matter, is made of a material having a low acoustic impedance and sufficiently thick wall to insure structural stability. Close-cell polyurethane foam has been found to serve the purpose well. In the proposed test, test parameters will be sensitivity, background noise, signal fidelity (harmonic distortion), and temporal stability. The design and results of the compact system, based upon laboratory and field experiments, will be presented.

  8. Campylobacter spp. as emerging food-borne pathogen - incidence, detection and resistance

    Directory of Open Access Journals (Sweden)

    S. Smole Možina

    2005-02-01

    Full Text Available Campylobacter jejuni and Campylobacter. coli are the leading cause of bacterial food-borne enteric infection with still increasing incidence in the most developed countries. Consuming and/or handling poultry meat is the most consistent risk factor, linked to the high prevalence of campylobacters in retail poultry meat. Recent data about the incidence of human campylobacteriosis and prevalence of C.jejuni and C. coli in poultry meat are presented. Important aspects of Campylobacter transmission along the food chain are discussed – physiological specificities possibly enabling adaptation and survival in the food production environment as well as the emerging resistance to antimicrobial agents used in veterinary and human medicine. Recent advances in detection and identification methods of Campylobacter spp. are mentioned as a basis for preventive strategies to bring these food-borne pat hogens under control. Recent risk assessments show that mitigation strategies could be applied at different points from food-animals production to the finalconsumptionoffoods.Educating the consumers is important,sincecritical control point remains the hygiene in the final food preparation.

  9. Relationship of the imaging properties of the I.I./TV based DR system for incident exposures

    International Nuclear Information System (INIS)

    Ogura, Toshihiro

    1993-01-01

    We investigated imaging properties of a 2048 x 2048 matrix I.I./TV based digital radiography (DR) system (DR-2000 H) for various incident exposures. It should be noted that the resolution property of the I.I./TV based DR system depends on the incident exposures, the level of signal current from the TV image pickup tube and also regarding the size of the iris in the TV lens. Digital Wiener spectra and the detectabilities of low-contrast objects were measured for different incident exposures. It can be clearly seen that the noise properties and detectabilities decreased with a decrease in the incident exposures. The digital Wiener spectra also seemed to depend on the specific combination of the MTF's of the optical lenses, the level of signal current from the TV image pickup tube and quantum mottle. We must pay attention to these parameters when acquiring clinical images and evaluating the imaging properties. Furthermore, because the sensitivity of this system is higher than that of screen-film system, an X-ray tube of 0.2-mm focal spot is available routinely, the effect of geometric unsharpness can be reduced in practical clinical implementation; the resolving power of the DR system with 7''-I.I. mode at a certain magnification factor are equivalent or even superior to the resolving power of screen-film system employed. (author)

  10. Health information systems' usability-related use errors in patient safety incidents

    OpenAIRE

    Hautamäki E; Kinnunen U-M; Palojoki S

    2017-01-01

    Health information systems contain usability issues that cause use errors, which may pose a risk to patient safety. The aim of this study was to identify what kind of usability issues in information systems cause use errors that lead to patient safety incidents. Patient safety incidents reported into an incident reporting system in a Finnish hospital district during the year 2014 (n=2500) were analyzed from the perspectives of usability and use errors. An inductive content analysis was carrie...

  11. Critical incidence reporting systems - an option in equine anaesthesia? Results from a panel meeting.

    Science.gov (United States)

    Hartnack, Sonja; Bettschart-Wolfensberger, Regula; Driessen, Bernd; Pang, Daniel; Wohlfender, Franziska

    2013-11-01

    To provide a brief introduction into Critical Incident Reporting Systems (CIRS) as used in human medicine, and to report the discussion from a recent panel meeting discussion with 23 equine anaesthetists in preparation for a new CEPEF-4 (Confidential Enquiry into Perioperative Equine Fatalities) study. Moderated group discussions, and review of literature. The first group discussion focused on the definition of 'preventable critical incidents' and/or 'near misses' in the context of equine anaesthesia. The second group discussion focused on categorizing critical incidents according to an established framework for analysing risk and safety in clinical medicine. While critical incidents do occur in equine anaesthesia, no critical incident reporting system including systematic collection and analysis of critical incidents is in place. Critical incident reporting systems could be used to improve safety in equine anaesthesia - in addition to other study types such as mortality studies. © 2013 Association of Veterinary Anaesthetists and the American College of Veterinary Anesthesia and Analgesia.

  12. Hazard detection in noise-related incidents - the role of driving experience with battery electric vehicles.

    Science.gov (United States)

    Cocron, Peter; Bachl, Veronika; Früh, Laura; Koch, Iris; Krems, Josef F

    2014-12-01

    The low noise emission of battery electric vehicles (BEVs) has led to discussions about how to address potential safety issues for other road users. Legislative actions have already been undertaken to implement artificial sounds. In previous research, BEV drivers reported that due to low noise emission they paid particular attention to pedestrians and bicyclists. For the current research, we developed a hazard detection task to test whether drivers with BEV experience respond faster to incidents, which arise due to the low noise emission, than inexperienced drivers. The first study (N=65) revealed that BEV experience only played a minor role in drivers' response to hazards resulting from low BEV noise. The tendency to respond, reaction times and hazard evaluations were similar among experienced and inexperienced BEV drivers; only small trends in the assumed direction were observed. Still, both groups clearly differentiated between critical and non-critical scenarios and responded accordingly. In the second study (N=58), we investigated additionally if sensitization to low noise emission of BEVs had an effect on hazard perception in incidents where the noise difference is crucial. Again, participants in all groups differentiated between critical and non-critical scenarios. Even though trends in response rates and latencies occurred, experience and sensitization to low noise seemed to only play a minor role in detecting hazards due to low BEV noise. An additional global evaluation of BEV noise further suggests that even after a short test drive, the lack of noise is perceived more as a comfort feature than a safety threat. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. The development of an incident event reporting system for nursing students.

    Science.gov (United States)

    Chiou, Shwu-Fen; Huang, Ean-Wen; Chuang, Jen-Hsiang

    2009-01-01

    Incident events may occur when nursing students are present in the clinical setting. Their inexperience and unfamiliarity with clinical practice put them at risk for making mistakes that could potentially harm patients and themselves. However, there are deficiencies with incident event reporting systems, including incomplete data and delayed reports. The purpose of this study was to develop an incident event reporting system for nursing students in clinical settings and evaluate its effectiveness. This study was undertaken in three phases. In the first phase, a literature review and focus groups were used to develop the architecture of the reporting system. In the second phase, the reporting system was implemented. Data from incident events that involved nursing students were collected for a 12-month period. In the third phase, a pre-post trial was undertaken to evaluate the performance of the reporting system. The ASP.NET software and Microsoft Access 2003 were used to create an interactive web-based interface and design a database for the reporting system. Email notifications alerted the nursing student's teacher when an incident event was reported. One year after installing the reporting system, the number of reported incident events increased tenfold. However, the time to report the incident event and the time required to complete the reporting procedures were shorter than before implementation of the reporting system. The incident event reporting system appeared to be effective in more comprehensively reporting the number of incident events and shorten the time required for reporting them compared to traditional written reports.

  14. STRATEG - an incident training system for thermohydraulic effects and principles

    International Nuclear Information System (INIS)

    Rehn, H.; Majohr, N.

    1993-01-01

    STRATEG is a 1:10 scale glass model of a PWR (Biblis B reactor coolant circuit) built by RWE in 1986 on the site of the Biblis plant as a training model. The model can be used for training of normal operation and incident situations since all important operating and incident sequences of a PWR can be simulated. Thermodynamic phenomena can also be demonstrated occurring under various operating situations and in particular associated with malfunctions. (Z.S.) 1 tab., 3 figs., 1 ref

  15. Incidence of cervical human papillomavirus infection in systemic lupus erythematosus women.

    Science.gov (United States)

    Mendoza-Pinto, C; García-Carrasco, M; Vallejo-Ruiz, V; Méndez-Martínez, S; Taboada-Cole, A; Etchegaray-Morales, I; Muñóz-Guarneros, M; Reyes-Leyva, J; López-Colombo, A

    2017-08-01

    Objectives Our objective was to study the incidence, persistence and clearance of human papillomavirus infection in systemic lupus erythematosus women and assess risk factors for persistence of human papillomavirus infection. Methods We carried out a prospective, observational cohort study of 127 systemic lupus erythematosus women. Patients were evaluated at baseline and at three years. Traditional and systemic lupus erythematosus women-related disease risk factors were collected. Gynaecological evaluations and cervical cytology screening were made. Human papillomavirus detection and genotyping were made by polymerase chain reaction and linear array. Results The cumulative prevalence of human papillomavirus infection increased from 22.8% at baseline to 33.8% at three years; p = lupus erythematosus women, the cumulative prevalence of human papillomavirus infection, including high risk-human papillomavirus and multiple human papillomavirus infections, may increase over time. Most persistent infections were low risk-human papillomavirus. The number of lifetime sexual partners and the cumulative cyclophosphamide dose were independently associated with incident human papillomavirus infection.

  16. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  17. System Safety Assessment Based on Past Incidents in Oil and Gas Industries: A Focused Approach in Forecasting of Minor, Severe, Critical, and Catastrophic Incidents, 2010–2015

    Directory of Open Access Journals (Sweden)

    Praveen Patel

    2016-01-01

    Full Text Available Accident in an occupation which occurred due to series of repetitive minor incidents within the working environment. This work demonstrates the critical system safety assessment based on various incidents that took place to the different system and subsystem of two Indian oil refineries in five years of span 2010 to 2015. The categorization of incidents and hazard rate function of each incident category were classified and calculated. The result of Weibull analysis estimators in the form of scale and shape parameters provides useful information of incidents forecasting and their patterns in a particular time.

  18. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  19. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    Science.gov (United States)

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  20. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  1. Incidence of Congenital Spinal Abnormalities Among Pediatric Patients and Their Association With Scoliosis and Systemic Anomalies.

    Science.gov (United States)

    Passias, Peter G; Poorman, Gregory W; Jalai, Cyrus M; Diebo, Bassel G; Vira, Shaleen; Horn, Samantha R; Baker, Joseph F; Shenoy, Kartik; Hasan, Saqib; Buza, John; Bronson, Wesley; Paul, Justin C; Kaye, Ian; Foster, Norah A; Cassilly, Ryan T; Oren, Jonathan H; Moskovich, Ronald; Line, Breton; Oh, Cheongeun; Bess, Shay; LaFage, Virginie; Errico, Thomas J

    2017-10-09

    Congenital abnormalities when present, according to VACTERL theory, occur nonrandomly with other congenital anomalies. This study estimates the prevalence of congenital spinal anomalies, and their concurrence with other systemic anomalies. A retrospective cohort analysis on Health care Cost and Utilization Project's Kids Inpatient Database (KID), years 2000, 2003, 2006, 2009 was performed. ICD-9 coding identified congenital anomalies of the spine and other body systems. Overall incidence of congenital spinal abnormalities in pediatric patients, and the concurrence of spinal anomaly diagnoses with other organ system anomalies. Frequencies of congenital spine anomalies were estimated using KID hospital-and-year-adjusted weights. Poisson distribution in contingency tables tabulated concurrence of other congenital anomalies, grouped by body system. Of 12,039,432 patients, rates per 100,000 cases were: 9.1 hemivertebra, 4.3 Klippel-Fiel, 56.3 Chiari malformation, 52.6 tethered cord, 83.4 spina bifida, 1.2 absence of vertebra, and 6.2 diastematomyelia. Diastematomyelia had the highest concurrence of other anomalies: 70.1% of diastematomyelia patients had at least one other congenital anomaly. Next, 63.2% of hemivertebra, and 35.2% of Klippel-Fiel patients had concurrent anomalies. Of the other systems deformities cooccuring, cardiac system had the highest concurrent incidence (6.5% overall). In light of VACTERL's definition of a patient being diagnosed with at least 3 VACTERL anomalies, hemivertebra patients had the highest cooccurrence of ≥3 anomalies (31.3%). With detailed analysis of hemivertebra patients, secundum ASD (14.49%), atresia of large intestine (10.2%), renal agenesis (7.43%) frequently cooccured. Congenital abnormalities of the spine are associated with serious systemic anomalies that may have delayed presentations. These patients continue to be at a very high, and maybe higher than previously thought, risk for comorbidities that can cause devastating

  2. 49 CFR 191.15 - Transmission and gathering systems: Incident report.

    Science.gov (United States)

    2010-10-01

    ...-RELATED CONDITION REPORTS § 191.15 Transmission and gathering systems: Incident report. (a) Except as... 49 Transportation 3 2010-10-01 2010-10-01 false Transmission and gathering systems: Incident report. 191.15 Section 191.15 Transportation Other Regulations Relating to Transportation (Continued...

  3. Age-related incidence of pulmonary embolism and additional pathologic findings detected by computed tomography pulmonary angiography

    International Nuclear Information System (INIS)

    Groth, M.; Henes, F.O.; Mayer, U.; Regier, M.; Adam, G.; Begemann, P.G.C.

    2012-01-01

    Objective: To compare the incidence of pulmonary embolism (PE) and additional pathologic findings (APF) detected by computed tomography pulmonary angiography (CTPA) according to different age-groups. Materials and methods: 1353 consecutive CTPA cases for suspected PE were retrospectively reviewed. Patients were divided into seven age groups: ≤29, 30–39, 40–49, 50–59, 60–69, 70–79 and ≥80 years. Differences between the groups were tested using Fisher's exact or chi-square test. A p-value 0.0024). Conclusion: The incidences of PE and APF detected by CTPA reveal no significant differences between various age groups.

  4. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  5. Meteorological Integration for the Biological Warning and Incident Characterization (BWIC) System: General Guidance for BWIC Cities

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, William J.; Wang, Weiguo; Rutz, Frederick C.; Chapman, Elaine G.; Rishel, Jeremy P.; Xie, YuLong; Seiple, Timothy E.; Allwine, K Jerry

    2007-02-16

    The U.S. Department of Homeland Security (DHS) is responsible for developing systems to detect the release of aerosolized bioagents in urban environments. The system that accomplishes this, known as BioWatch, is a robust first-generation monitoring system. In conjunction with the BioWatch detection network, DHS has also developed a software tool for cities to use to assist in their response when a bioagent is detected. This tool, the Biological Warning and Incident Characterization (BWIC) System, will eventually be deployed to all BioWatch cities to aid in the interpretation of the public health significance of indicators from the BioWatch networks. BWIC consists of a set of integrated modules, including meteorological models, that estimate the effect of a biological agent on a city’s population once it has been detected. For the meteorological models in BWIC to successfully calculate the distribution of biological material, they must have as input accurate meteorological data, and wind fields in particular. The purpose of this document is to provide guidance for cities to use in identifying sources of good-quality local meteorological data that BWIC needs to function properly. This process of finding sources of local meteorological data, evaluating the data quality and gaps in coverage, and getting the data into BWIC, referred to as meteorological integration, is described. The good news for many cities is that meteorological measurement networks are becoming increasingly common. Most of these networks allow their data to be distributed in real time via the internet. Thus, cities will often only need to evaluate the quality of available measurements and perhaps add a modest number of stations where coverage is poor.

  6. Incidence of Type II CRISPR1-Cas Systems in Enterococcus Is Species-Dependent.

    Directory of Open Access Journals (Sweden)

    Casandra Lyons

    Full Text Available CRISPR-Cas systems, which obstruct both viral infection and incorporation of mobile genetic elements by horizontal transfer, are a specific immune response common to prokaryotes. Antiviral protection by CRISPR-Cas comes at a cost, as horizontally-acquired genes may increase fitness and provide rapid adaptation to habitat change. To date, investigations into the prevalence of CRISPR have primarily focused on pathogenic and clinical bacteria, while less is known about CRISPR dynamics in commensal and environmental species. We designed PCR primers and coupled these with DNA sequencing of products to detect and characterize the presence of cas1, a universal CRISPR-associated gene and proxy for the Type II CRISPR1-Cas system, in environmental and non-clinical Enterococcus isolates. CRISPR1-cas1 was detected in approximately 33% of the 275 strains examined, and differences in CRISPR1 carriage between species was significant. Incidence of cas1 in E. hirae was 73%, nearly three times that of E. faecalis (23.6% and 10 times more frequent than in E. durans (7.1%. Also, this is the first report of CRISPR1 presence in E. durans, as well as in the plant-associated species E. casseliflavus and E. sulfureus. Significant differences in CRISPR1-cas1 incidence among Enterococcus species support the hypothesis that there is a tradeoff between protection and adaptability. The differences in the habitats of enterococcal species may exert varying selective pressure that results in a species-dependent distribution of CRISPR-Cas systems.

  7. Incidence of Type II CRISPR1-Cas Systems in Enterococcus Is Species-Dependent

    Science.gov (United States)

    Lyons, Casandra; Raustad, Nicole; Bustos, Mario A.; Shiaris, Michael

    2015-01-01

    CRISPR-Cas systems, which obstruct both viral infection and incorporation of mobile genetic elements by horizontal transfer, are a specific immune response common to prokaryotes. Antiviral protection by CRISPR-Cas comes at a cost, as horizontally-acquired genes may increase fitness and provide rapid adaptation to habitat change. To date, investigations into the prevalence of CRISPR have primarily focused on pathogenic and clinical bacteria, while less is known about CRISPR dynamics in commensal and environmental species. We designed PCR primers and coupled these with DNA sequencing of products to detect and characterize the presence of cas1, a universal CRISPR-associated gene and proxy for the Type II CRISPR1-Cas system, in environmental and non-clinical Enterococcus isolates. CRISPR1-cas1 was detected in approximately 33% of the 275 strains examined, and differences in CRISPR1 carriage between species was significant. Incidence of cas1 in E. hirae was 73%, nearly three times that of E. faecalis (23.6%) and 10 times more frequent than in E. durans (7.1%). Also, this is the first report of CRISPR1 presence in E. durans, as well as in the plant-associated species E. casseliflavus and E. sulfureus. Significant differences in CRISPR1-cas1 incidence among Enterococcus species support the hypothesis that there is a tradeoff between protection and adaptability. The differences in the habitats of enterococcal species may exert varying selective pressure that results in a species-dependent distribution of CRISPR-Cas systems. PMID:26600384

  8. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, W C

    1986-12-04

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  9. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, W.C.

    1989-01-24

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  10. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, Wayne C. (Durango, CO)

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  11. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  12. Risk factors for radiotherapy incidents and impact of an online electronic reporting system

    International Nuclear Information System (INIS)

    Chang, David W.; Cheetham, Lynn; Marvelde, Luc te; Bressel, Mathias; Kron, Tomas; Gill, Suki; Tai, Keen Hun; Ball, David; Rose, William; Silva, Linas; Foroudi, Farshad

    2014-01-01

    Background and purpose: To ascertain the rate, type, significance, trends and the potential risk factors associated with radiotherapy incidents in a large academic department. Materials and methods: Data for all radiotherapy activities from July 2001 to January 2011 were reviewed from radiotherapy incident reporting forms. Patient and treatment data were obtained from the radiotherapy record and verification database (MOSAIQ) and the patient database (HOSPRO). Logistic regression analyses were performed to determine variables associated with radiotherapy incidents. Results: In that time, 65,376 courses of radiotherapy were delivered with a reported incident rate of 2.64 per 100 courses. The rate of incidents per course increased (1.96 per 100 courses to 3.52 per 100 courses, p < 0.001) whereas the proportion of reported incidents resulting in >5% deviation in dose (10.50 to 2.75%, p < 0.001) had decreased after the introduction of an online electronic reporting system. The following variables were associated with an increased rate of incidents: afternoon treatment time, paediatric patients, males, inpatients, palliative plans, head-and-neck, skin, sarcoma and haematological malignancies. In general, complex plans were associated with higher incidence rates. Conclusion: Radiotherapy incidents were infrequent and most did not result in significant dose deviation. A number of risk factors were identified and these could be used to highlight high-risk cases in the future. Introduction of an online electronic reporting system resulted in a significant increase in the number of incidents being reported

  13. Resveratrol Reduces the Incidence of Portal Vein System Thrombosis after Splenectomy in a Rat Fibrosis Model

    Science.gov (United States)

    Xu, Meng; Xue, Wanli; Ma, Zhenhua; Bai, Jigang

    2016-01-01

    Purpose. To investigate the preventive effect of resveratrol (RES) on the formation of portal vein system thrombosis (PVST) in a rat fibrosis model. Methods. A total of 64 male SD rats, weighing 200–300 g, were divided into five groups: Sham operation, Splenectomy I, Splenectomy II, RES, and low molecular weight heparin (LMWH), with the former two groups as nonfibrosis controls. Blood samples were subjected to biochemical assays. Platelet apoptosis was measured by flow cytometry. All rats were euthanized for PVST detection one week after operation. Results. No PVST occurred in nonfibrosis controls. Compared to Splenectomy II, the incidences of PVST in RES and LMWH groups were significantly decreased (both p Splenectomy II (all p splenectomy in cirrhotic rat. Regulation of platelet function and induction of platelet apoptosis might be the underlying mechanisms. PMID:27433290

  14. SU-E-T-511: Inter-Rater Variability in Classification of Incidents in a New Incident Reporting System

    International Nuclear Information System (INIS)

    Pappas, D; Reis, S; Ali, A; Kapur, A

    2015-01-01

    Purpose To determine how consistent the results of different raters are when reviewing the same cases within the Radiation Oncology Incident Learning System (ROILS). Methods Three second-year medical physics graduate students filled out incident reports in spreadsheets set up to mimic ROILS. All students studied the same 33 cases and independently entered their assessments, for a total of 99 reviewed cases. The narratives for these cases were obtained from a published International Commission on Radiological Protection (ICRP) report which included shorter narratives selected from the Radiation Oncology Safety Information System (ROSIS) database. Each category of questions was reviewed to see how consistent the results were by utilizing free-marginal multirater kappa analysis. The percentage of cases where all raters shared full agreement or full disagreement was recorded to show which questions were answered consistently by multiple raters for a given case. The consistency among the raters was analyzed between ICRP and ROSIS cases to see if either group led to more reliable results. Results The categories where all raters agreed 100 percent in their choices were the event type (93.94 percent of cases 0.946 kappa) and the likelihood of the event being harmful to the patient (42.42 percent of cases 0.409 kappa). The categories where all raters disagreed 100 percent in their choices were the dosimetric severity scale (39.39 percent of cases 0.139 kappa) and the potential future toxicity (48.48 percent of cases 0.205 kappa). ROSIS had more cases where all raters disagreed than ICRP (23.06 percent of cases compared to 15.58 percent, respectively). Conclusion Despite reviewing the same cases, the results among the three raters was widespread. ROSIS narratives were shorter than ICRP, which suggests that longer narratives lead to more consistent results. This study shows that the incident reporting system can be optimized to yield more consistent results

  15. SU-E-T-511: Inter-Rater Variability in Classification of Incidents in a New Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Pappas, D; Reis, S; Ali, A [Hofstra University, Hempstead, NY (United States); Kapur, A [Long Island Jewish Medical Center, New Hyde Park, NY (United States)

    2015-06-15

    Purpose To determine how consistent the results of different raters are when reviewing the same cases within the Radiation Oncology Incident Learning System (ROILS). Methods Three second-year medical physics graduate students filled out incident reports in spreadsheets set up to mimic ROILS. All students studied the same 33 cases and independently entered their assessments, for a total of 99 reviewed cases. The narratives for these cases were obtained from a published International Commission on Radiological Protection (ICRP) report which included shorter narratives selected from the Radiation Oncology Safety Information System (ROSIS) database. Each category of questions was reviewed to see how consistent the results were by utilizing free-marginal multirater kappa analysis. The percentage of cases where all raters shared full agreement or full disagreement was recorded to show which questions were answered consistently by multiple raters for a given case. The consistency among the raters was analyzed between ICRP and ROSIS cases to see if either group led to more reliable results. Results The categories where all raters agreed 100 percent in their choices were the event type (93.94 percent of cases 0.946 kappa) and the likelihood of the event being harmful to the patient (42.42 percent of cases 0.409 kappa). The categories where all raters disagreed 100 percent in their choices were the dosimetric severity scale (39.39 percent of cases 0.139 kappa) and the potential future toxicity (48.48 percent of cases 0.205 kappa). ROSIS had more cases where all raters disagreed than ICRP (23.06 percent of cases compared to 15.58 percent, respectively). Conclusion Despite reviewing the same cases, the results among the three raters was widespread. ROSIS narratives were shorter than ICRP, which suggests that longer narratives lead to more consistent results. This study shows that the incident reporting system can be optimized to yield more consistent results.

  16. Expandable coating cocoon leak detection system

    Science.gov (United States)

    Hauser, R. L.; Kochansky, M. C.

    1972-01-01

    Development of system and materials for detecting leaks in cocoon protective coatings are discussed. Method of applying materials for leak determination is presented. Pressurization of system following application of materials will cause formation of bubble if leak exists.

  17. International Cyber Incident Repository System: Information Sharing on a Global Scale

    Energy Technology Data Exchange (ETDEWEB)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.; Israeli, Daniel

    2017-02-02

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelated Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.

  18. A web-based incident reporting system and multidisciplinary collaborative projects for patient safety in a Japanese hospital.

    Science.gov (United States)

    Nakajima, K; Kurata, Y; Takeda, H

    2005-04-01

    When patient safety programs were mandated for Japanese health care institutions, a safety culture, a tool for collecting incident reports, an organizational arrangement for multidisciplinary collaboration, and interventional methods for improvement had to be established. Observational study of effects of new patient safety programs. Osaka University Hospital, a large government-run teaching hospital. A voluntary and anonymous web-based incident reporting system was introduced. For the new organizational structure a clinical risk management committee, a department of clinical quality management, and area clinical risk managers were established with their respective roles clearly defined to advance the plan-do-study-act cycle and to integrate efforts. For preventive action, alert procedures, staff education, ward rounds by peers, a system oriented approach for reducing errors, and various feedback channels were introduced. Continuous incident reporting by all hospital staff has been observed since the introduction of the new system. Several error inducing situations have been improved: wrong choice of drug in computer prescribing, maladministration of drugs due to a look-alike appearance or confusion about the manipulation of a medical device, and poor after hours service of the blood transfusion unit. Staff participation in educational seminars has been dramatically improved. Ward rounds have detected problematic procedures which needed to be dealt with. Patient safety programs based on a web-based incident reporting system, responsible persons, staff education, and a variety of feedback procedures can help promote a safety culture, multidisciplinary collaboration, and strong managerial leadership resulting in system oriented improvement.

  19. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  20. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  1. Association among house infestation index, dengue incidence, and sociodemographic indicators: surveillance using geographic information system.

    Science.gov (United States)

    Vargas, Waldemir Paixão; Kawa, Hélia; Sabroza, Paulo Chagastelles; Soares, Valdenir Bandeira; Honório, Nildimar Alves; de Almeida, Andréa Sobral

    2015-08-05

    We identified dengue transmission areas by using the Geographic Information Systems located at local surveillance units of the Itaboraí municipality in state of Rio de Janeiro. We considered the association among the house infestation index, the disease incidence, and sociodemographic indicators during a prominent dengue outbreak in 2007 and 2008. In this ecological study, the Local Surveillance Units (UVLs) of the municipality were used as spatial pattern units. For the house analysis, we used the period of higher vector density that occurred previous to the larger magnitude epidemic range of dengue cases. The average dengue incidence rates calculated in this epidemic range were smoothed using the Bayesian method. The associations among the House Infestation Index (HI), the Bayesian rate of the average dengue incidence, and the sociodemographic indicators were evaluated using a Pearson's correlation coefficient. The areas that were at a higher risk of dengue occurrence were detected using a kernel density estimation with the kernel quartic function. The dengue transmission pattern in Itaboraí showed that the increase in the vector density preceded the increase in incidence. The HI was positively correlated to the Bayesian dengue incidence rate (r = 0.641; p = 0.01). The higher risk areas were those that were close to the main highways. In the Kernel density estimation analysis, we observed that the regions that were at a higher risk of dengue were those that were located in the UVLs and had the highest population densities; these locations were typically located along major highways. Four nuclei were identified as epicenters of high risk. The spatial analysis units used in this research, i.e., UVLs, served as a methodological resource for examining the compatibility of different information sources concerning the disease, the vector indices, and the municipal sociodemographic aspects and were arranged in distinct cartographic bases. Dengue is a multi

  2. Web-based GIS for spatial pattern detection: application to malaria incidence in Vietnam.

    Science.gov (United States)

    Bui, Thanh Quang; Pham, Hai Minh

    2016-01-01

    There is a great concern on how to build up an interoperable health information system of public health and health information technology within the development of public information and health surveillance programme. Technically, some major issues remain regarding to health data visualization, spatial processing of health data, health information dissemination, data sharing and the access of local communities to health information. In combination with GIS, we propose a technical framework for web-based health data visualization and spatial analysis. Data was collected from open map-servers and geocoded by open data kit package and data geocoding tools. The Web-based system is designed based on Open-source frameworks and libraries. The system provides Web-based analyst tool for pattern detection through three spatial tests: Nearest neighbour, K function, and Spatial Autocorrelation. The result is a web-based GIS, through which end users can detect disease patterns via selecting area, spatial test parameters and contribute to managers and decision makers. The end users can be health practitioners, educators, local communities, health sector authorities and decision makers. This web-based system allows for the improvement of health related services to public sector users as well as citizens in a secure manner. The combination of spatial statistics and web-based GIS can be a solution that helps empower health practitioners in direct and specific intersectional actions, thus provide for better analysis, control and decision-making.

  3. Resveratrol Reduces the Incidence of Portal Vein System Thrombosis after Splenectomy in a Rat Fibrosis Model

    Directory of Open Access Journals (Sweden)

    Meng Xu

    2016-01-01

    Full Text Available Purpose. To investigate the preventive effect of resveratrol (RES on the formation of portal vein system thrombosis (PVST in a rat fibrosis model. Methods. A total of 64 male SD rats, weighing 200–300 g, were divided into five groups: Sham operation, Splenectomy I, Splenectomy II, RES, and low molecular weight heparin (LMWH, with the former two groups as nonfibrosis controls. Blood samples were subjected to biochemical assays. Platelet apoptosis was measured by flow cytometry. All rats were euthanized for PVST detection one week after operation. Results. No PVST occurred in nonfibrosis controls. Compared to Splenectomy II, the incidences of PVST in RES and LMWH groups were significantly decreased (both p<0.05. Two rats in LMWH group died before euthanasia due to intra-abdominal hemorrhage. In RES group, significant decreases in platelet aggregation, platelet radical oxygen species (ROS production, and increase in platelet nitric oxide (NO synthesis and platelet apoptosis were observed when compared with Splenectomy II (all p<0.001, while in LMWH group only significant decrease in platelet aggregation was observed. Conclusion. Prophylactic application of RES could safely reduce the incidence of PVST after splenectomy in cirrhotic rat. Regulation of platelet function and induction of platelet apoptosis might be the underlying mechanisms.

  4. Using Pareto Analysis with Trend Analysis: Statistical Techniques to Investigate Incident Reports within a Housing System

    Science.gov (United States)

    Luna, Andrew L.

    1998-01-01

    The purpose of this study was to determine trends and difficulties concerning student incident reports within the residence halls as they relate to the incident reporting system from the Department of Housing and Residential Life at a Southeastern Doctoral I Granting Institution. This study used the frequency distributions of each classified…

  5. Increased incidence of Mycoplasma pneumoniae infections detected by laboratory-based surveillance in Denmark in 2010

    DEFF Research Database (Denmark)

    Rasmussen, J N; Voldstedlund, M; Andersen, R L

    2010-01-01

    In Denmark recurrent epidemics of Mycoplasma pneumoniae infections have been described since the 1950s at intervals of approximately four to six years. The latest epidemic occurred in 2004/05 followed by two years of high incidence and more than three years of low incidence. Due to a recent incre...

  6. Sporadic incidence of Fascioliasis detected during Hepatobiliary procedures: A study of 18 patients from Sulaimaniyah governorate

    Directory of Open Access Journals (Sweden)

    Hawramy Tahir Abdullah Hussein

    2012-12-01

    Full Text Available Abstract Background Fascioliasis is an often-neglected zoonotic disease and currently is an emerging infection in Iraq. Fascioliasis has two distinct phases, an acute phase, exhibiting the hepatic migratory stage of the fluke’s life cycle, and a chronic biliary phase manifested with the presence of the parasite in the bile ducts through hepatic tissue. The incidence of Fascioliasis in Sulaimaniyah governorate was unexpected observation. We believe that shedding light on this disease in our locality will increase our physician awareness and experience in early detection, treatment in order to avoid unnecessary surgeries. Findings We retrospectively evaluated this disease in terms of the demographic features, clinical presentations, and managements by reviewing the medical records of 18 patients, who were admitted to the Sulaimani Teaching Hospital and Kurdistan Centre for Gastroenterology and Hepatology. Patients were complained from hepatobiliary and/or upper gastrointestinal symptoms and diagnosed accidentally with Fascioliasis during hepatobiliary surgeries and ERCP by direct visualization of the flukes and stone analysis. Elevated liver enzymes, white blood cells count and eosinophilia were notable laboratory indices. The dilated CBD, gallstones, liver cysts and abscess were found common in radiological images. Fascioliasis diagnosed during conventional surgical CBD exploration and choledochodoudenostomy, open cholecystectomy, surgical drainage of liver abscess, ERCP and during gallstone analysis. Conclusion Fascioliasis is indeed an emerging disease in our locality, but it is often underestimated and ignored. We recommend the differential diagnosis of patients suffering from Rt. Hypochondrial pain, fever and eosinophilia. The watercress ingestion was a common factor in patient’s history.

  7. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  8. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  9. Human Factors of Remotely Piloted Aircraft Systems: Lessons from Incident Reports

    Science.gov (United States)

    Hobbs, Alan; Null, Cynthia

    2016-01-01

    An exploratory study is being conducted to examine the feasibility of collecting voluntary critical incident reports from RPAS pilots. Twenty-three experienced RPAS pilots volunteered to participate in focus groups in which they described critical incidents from their own experience. Participants were asked to recall (1) incidents that revealed a system flaw, or (2) highlighted a case where the human operator contributed to system resilience or mission success. Participants were asked to only report incidents that could be included in a public document. A total of 90 incidents were reported. Human factor issues included the impact of reduced sensory cues, traffic separation in the absence of an out-the-window view, control latencies, vigilance during monotonous and ultra-long endurance flights, control station design considerations, transfer of control between control stations, the management of lost link procedures, and decision-making during emergencies.

  10. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... integrity and facilitating to describe the structural system performance and its functionality throughout the service life. The structural system performance is described with its functionality, its deterioration and its behavior under extreme loading. The structural system reliability given the damage...

  11. Studies on normal incidence backscattering in nodule areas using the multibeam-hydrosweep system

    Digital Repository Service at National Institute of Oceanography (India)

    Pathak, D.; Chakraborty, B.

    The acoustic response from areas of varying nodule abundance and number densities in the Central Indian Ocean has been studied by using the echo peak amplitudes of the normal incidence beam in the Multibeam Hydrosweep system. It is observed...

  12. Design and Implementation of Domain Hijacking Detection System

    Directory of Open Access Journals (Sweden)

    Xue Jupo

    2015-01-01

    Full Text Available As the basement of Internet application, DNS plays a very critical role in the network running. On Jan. 21st, 2014, the occurrence of a serious DNS hijacking in Internet has aroused the attentions to the DNS security incident again. This paper comes up with a new method to detect DSN hijacking through the construction of a high-speed cache in terms of the corresponding relation between domain name and server IP. With this method, we build a cache with the domain name and the IP. With this cache, domain name can be detected if DSN hijacking happens in DNS cache server and this system can detect domain name hijacking efficiently after it happens.

  13. Voice activity detection for speaker verification systems

    Science.gov (United States)

    Borowski, Filip

    2008-01-01

    Complex algorithm for speech activity detection was presented in this article. It is based on speech enhancement, features extraction and final detection algorithm. The first one was published in ETSI standard as a module of "Advanced front-end feature extraction algorithm" in distributed speech recognition system. It consists of two main parts, noise estimatiom and Wiener filtering. For the final detection modified linear prediction coefficients and spectral entropy features are extracted form denoised signal.

  14. Safer healthcare at home: Detecting, correcting and learning from incidents involving infusion devices

    OpenAIRE

    Lyons, I.; Blandford, A. E.

    2018-01-01

    OBJECTIVE: Complex medical devices such as infusion pumps are increasingly being used in patients’ homes with little known about the impact on patient safety. Our aim was to better understand the risks to patient safety in this situation and how these risks might be minimised, by reference to incident reports. DESIGN: We identified 606 records of incidents associated with infusion devices that had occurred in a private home and were reported to the UK National Reporting and Learni...

  15. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  16. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  17. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  18. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  19. Estimating Concussion Incidence Using Sports Injury Surveillance Systems: Complexities and Potential Pitfalls.

    Science.gov (United States)

    Kerr, Zachary Y; Zuckerman, Scott L; Register-Mihalik, Johna K; Wasserman, Erin B; Valovich McLeod, Tamara C; Dompier, Thomas P; Comstock, R Dawn; Marshall, Stephen W

    2017-08-01

    Numerous sports injury surveillance systems exist with the capability of tracking concussion incidence data. It is important for the consumers of sport-related concussion data, be they researchers or the public, to have a comprehensive understanding of the strengths and limitations of sports injury surveillance systems. This article discusses issues of system design and analysis that affect the interpretation and understanding of sport-related concussion incidence data from sports injury surveillance systems. Such understanding will help inform the design of sports injury surveillance systems and research studies that aim to identify risk factors, develop prevention strategies, and evaluate prevention mechanisms. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    International Nuclear Information System (INIS)

    NSTec Environmental Restoration

    2007-01-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS

  1. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2007-04-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the

  2. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  3. Detecting data anomalies methods in distributed systems

    Science.gov (United States)

    Mosiej, Lukasz

    2009-06-01

    Distributed systems became most popular systems in big companies. Nowadays many telecommunications companies want to hold large volumes of data about all customers. Obviously, those data cannot be stored in single database because of many technical difficulties, such as data access efficiency, security reasons, etc. On the other hand there is no need to hold all data in one place, because companies already have dedicated systems to perform specific tasks. In the distributed systems there is a redundancy of data and each system holds only interesting data in appropriate form. Data updated in one system should be also updated in the rest of systems, which hold that data. There are technical problems to update those data in all systems in transactional way. This article is about data anomalies in distributed systems. Avail data anomalies detection methods are shown. Furthermore, a new initial concept of new data anomalies detection methods is described on the last section.

  4. Multispectral imaging system for contaminant detection

    Science.gov (United States)

    Poole, Gavin H. (Inventor)

    2003-01-01

    An automated inspection system for detecting digestive contaminants on food items as they are being processed for consumption includes a conveyor for transporting the food items, a light sealed enclosure which surrounds a portion of the conveyor, with a light source and a multispectral or hyperspectral digital imaging camera disposed within the enclosure. Operation of the conveyor, light source and camera are controlled by a central computer unit. Light reflected by the food items within the enclosure is detected in predetermined wavelength bands, and detected intensity values are analyzed to detect the presence of digestive contamination.

  5. [Analysis of an incident notification system and register in a critical care unit].

    Science.gov (United States)

    Murillo-Pérez, M A; García-Iglesias, M; Palomino-Sánchez, I; Cano Ruiz, G; Cuenca Solanas, M; Alted López, E

    2016-01-01

    To analyse the incident communicated through a notification system and register in a critical care unit. A cross-sectional descriptive study was conducted by performing an analysis of the records of incidents communicated anonymously and voluntarily from January 2007 to December 2013 in a critical care unit of adult patients with severe trauma. incident type and class, professional reports, and suggestions for improvement measures. A descriptive analysis was performed on the variables. Out of a total of 275 incidents reported, 58.5% of them were adverse events. Incident distributed by classes: medication, 33.7%; vascular access-drainage-catheter-sensor, 19.6%; devices-equipment, 13.3%, procedures, 11.5%; airway tract and mechanical ventilation, 10%; nursing care, 4.1%; inter-professional communication, 3%; diagnostic test, 3%; patient identification, 1.1%, and transfusion 0.7%. In the medication group, administrative errors accounted for a total of 62%; in vascular access-drainage-catheter-sensor group, central venous lines, a total of 27%; in devices and equipment group, respirators, a total of 46.9%; in airway self-extubations, a total of 32.1%. As regards to medication errors, 62% were incidents without damage. Incident notification by profession: doctors, 43%, residents, 5.6%, nurses, 51%, and technical assistants, 0.4%. Adverse events are the most communicated incidents. The events related to medication administration are the most frequent, although most of them were without damage. Nurses and doctors communicate the incidents with the same frequency. In order to highlight the low incident notification despite it being an anonymous and volunteer system, therefore, it is suggested to study measurements to increase the level of communication. Copyright © 2016 Elsevier España, S.L.U. y SEEIUC. All rights reserved.

  6. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  7. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  8. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  9. Symmetry consideration in zero loop-area Sagnac interferometry at oblique incidence for detecting magneto-optic Kerr effects.

    Science.gov (United States)

    Zhu, X D

    2017-08-01

    I present a detailed account of a zero loop-area Sagnac interferometer operated at oblique incidence for detecting magneto-optic Kerr effects arising from a magnetized sample. In particular, I describe the symmetry consideration and various optical arrangements available to such an interferometer that enables measurements of magneto-optic effects due to both in-plane and out-of-plane magnetization of the sample with optimizable signal-to-noise ratios.

  10. SU-E-P-07: Retrospective Analysis of Incident Reports at a Radiology Department: Feedback From Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Kakinohana, Y; Toita, T; Heianna, J; Murayama, S [School of medicine, University of the Ryukyus, Nishihara-cho, Okinawa (Japan)

    2015-06-15

    Purpose: To provide an overview of reported incidents that occurred in a radiology department and to describe the most common causal source of incidents. Methods: Incident reports from the radiology department at the University of the Ryukyus Hospital between 2008 and 2013 were collected and analyzed retrospectively. The incident report form contains the following items, causal factors of the incident and desirable corrective actions to prevent recurrence of similar incidents. These items allow the institution to investigate/analyze root causes of the incidents and suggest measures to be taken to prevent further, similar incidents. The ‘causal factors of the incident’ item comprises multiple selections from among 24 selections and includes some synonymous selections. In this study, this item was re-categorized into four causal source types: (i) carelessness, (ii) lack of skill or knowledge, (iii) deficiencies in communication, and (iv) external factors. Results: There were a total of 7490 incident reports over the study period and 276 (3.7%) were identified as originating from the radiology department. The most frequent causal source type was carelessness (62%). The other three types showed similar frequencies (10–14%). The staff members involved in incidents indicate three predominant desirable corrective actions to prevent or decrease the recurrence of similar incidents. These are ‘improvement in communication’ (24%), ‘staff training/education’ (19%), and ‘daily medical procedures’ (22%), and the most frequent was ‘improvement in communication’. Even though the most frequent causal factor was related to carelessness, the most desirable corrective action indicated by the staff members was related to communication. Conclusion: Our finding suggests that the most immediate causes are strongly related to carelessness. However, the most likely underlying causes of incidents would be related to deficiencies in effective communication. At our

  11. Incidence of systemic lupus erythematosus (SLE) in HIV seropositive ...

    African Journals Online (AJOL)

    Background: Viral agents especially retroviruses play either an aetiologic or contributory role in autoimmune diseases. Aim: To determine the rate of occurrence of systemic lupus erythematosus (SLE) in already confirmed HIV positive individuals. Methods: Subjects comprised of already diagnosed patients with HIV and ...

  12. Incidence of systemic lupus erythematosus (SLE) in HIV seropositive ...

    African Journals Online (AJOL)

    Abstract. Background: Viral agents especially retroviruses play either an aetiologic or contributory role in autoimmune diseases. Aim: To determine the rate of occurrence of systemic lupus erythematosus (SLE) in already confirmed HIV positive individuals. Methods: Subjects comprised of already diagnosed patients with HIV ...

  13. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  14. Automated Hydrogen Gas Leak Detection System

    Science.gov (United States)

    1995-01-01

    The Gencorp Aerojet Automated Hydrogen Gas Leak Detection System was developed through the cooperation of industry, academia, and the Government. Although the original purpose of the system was to detect leaks in the main engine of the space shuttle while on the launch pad, it also has significant commercial potential in applications for which there are no existing commercial systems. With high sensitivity, the system can detect hydrogen leaks at low concentrations in inert environments. The sensors are integrated with hardware and software to form a complete system. Several of these systems have already been purchased for use on the Ford Motor Company assembly line for natural gas vehicles. This system to detect trace hydrogen gas leaks from pressurized systems consists of a microprocessor-based control unit that operates a network of sensors. The sensors can be deployed around pipes, connectors, flanges, and tanks of pressurized systems where leaks may occur. The control unit monitors the sensors and provides the operator with a visual representation of the magnitude and locations of the leak as a function of time. The system can be customized to fit the user's needs; for example, it can monitor and display the condition of the flanges and fittings associated with the tank of a natural gas vehicle.

  15. Patient safety incidents involving neuromuscular blockade: analysis of the UK National Reporting and Learning System data from 2006 to 2008.

    Science.gov (United States)

    Arnot-Smith, J; Smith, A F

    2010-11-01

    Neuromuscular blockade is a powerful anaesthetic tool that has the potential for significant adverse outcomes. We sought to explore the national picture by analysing incidents relating to neuromuscular blockade in anaesthesia from the National Reporting and Learning System from England and Wales between 2006 and 2008. We searched the database of incidents using SNOMED CT search terms and reading the free text of relevant incidents. There were 231 incidents arising from the use or reversal of neuromuscular blocking agents. The main themes identified were: non-availability of drugs (45 incidents, 19%), possible unintentional awareness under general anaesthesia (42 incidents, 18%), potential allergic reaction (31 incidents, 13%), problems with reversal of blockade (13 incidents, 6%), storage (13 incidents, 6%) and prolonged apnoea (11 incidents, 5%). We make recommendations to reduce human error in the use of neuromuscular blocking agents and on future incident reporting in anaesthesia. © 2010 The Authors. Anaesthesia © 2010 The Association of Anaesthetists of Great Britain and Ireland.

  16. Detection systems for radioactive ion beams; Systeme de detection en ions radioactifs

    Energy Technology Data Exchange (ETDEWEB)

    Savajols, H

    2002-07-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  17. [Analysis of incidence and mortality for upper digestive tract cancers and results of early detection and treatment program in Feicheng, Shandong Province].

    Science.gov (United States)

    Yi, L; Zhao, T; Li, Y Y; Chen, W Q; Zhao, D L

    2017-05-06

    Objective: To investigate the trend of esophageal and stomach cancer incidence and mortality in Feicheng during 2000 to 2013, and to evaluate the effects of the national project of screening for upper digestive tract cancers from 2006 to 2015 in Feicheng. Methods: We collected 26 569 cases, which were coded of C15 and C16 in the 10th edition of international classification of diseases (ICD) during the period of 2000-2013. The data came from cancer registration system of Feicheng, Shandong Province, China. These cases already covered 21 679 882 person-year. The annual percent change (APC) of incidence and mortalit were analyzed. The risk factors of upper gastrointestinal cancer were investigated and evaluated for people aging 40-69 in three street offices and eleven townships of Feicheng, and endoscopic screening was conducted among people who was in high risk. The corresponding data were used to analyze the early detection project of upper gastrointestinal cancer screening and early diagnosis, with the index of detection rate, early diagnosis rate, early treatment rate and other indicators. Result: There were 26 569 new cases of esophageal cancer and gastric cancer occurred in Feicheng from 2000 to 2013. The incidence of esophageal cancer gradually increased since 2000 with 76.06 per 100 000 people (575/756 005) and reached the peak in 2010 with incidence rate of 118.76 per 100 000 people (852/717 429), with the annual percent change at about 4.3% (95 %CI: 2.7%-5.9%) and showed a downward trend after then but has no significance, with APC about-7.1% (95 %CI: -15.8%-2.5%). The incidence of gastric cancer was increased from 2000 with an incidence rate of 37.70 per 100 000 people (285/756 005) to 2013 with an incidence rate of 54.59 per 100 000 (538/985 512), with an annual percent change of about 3.3% (95 %CI: 2.1%-4.5%). Esophageal cancer and gastric cancer mortality showed a relatively stable trend during 2000 to 2013, esophageal cancer with APC about 0.1% (95 %CI

  18. Fault diagnosis of downhole drilling incidents using adaptive observers and statistical change detection

    DEFF Research Database (Denmark)

    Willersrud, Anders; Blanke, Mogens; Imsland, Lars

    2015-01-01

    are assessed and optimized using data-based learning to obtainthresholds for hypothesis testing. Data from a 1400 m horizontal ow loop isused to test the method, and successful diagnosis of the incidents drillstringwashout (pipe leakage), lost circulation, gas in ux, and drill bit plugging aredemonstrated....

  19. WS-006: EPR-First Responders: Operations in the control system incident

    International Nuclear Information System (INIS)

    2011-01-01

    The purpose of this working session is about the operations in a control system incident. The participants can apply the knowledge acquired in a bus accident exercise where the passengers are in contamination risk by dangerous material. They have to identify the incident commander, the type of response required, the risks of the emergency, the requirements for transporting the victims to the hospital and the actors involved in a radiological emergency

  20. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  1. Expert System Detects Power-Distribution Faults

    Science.gov (United States)

    Walters, Jerry L.; Quinn, Todd M.

    1994-01-01

    Autonomous Power Expert (APEX) computer program is prototype expert-system program detecting faults in electrical-power-distribution system. Assists human operators in diagnosing faults and deciding what adjustments or repairs needed for immediate recovery from faults or for maintenance to correct initially nonthreatening conditions that could develop into faults. Written in Lisp.

  2. SU-E-T-310: Targeting Safety Improvements Through Analysis of Near-Miss Error Detection Points in An Incident Learning Database

    Energy Technology Data Exchange (ETDEWEB)

    Novak, A; Nyflot, M; Sponseller, P; Howard, J; Logan, W; Holland, L; Jordan, L; Carlson, J; Ermoian, R; Kane, G; Ford, E; Zeng, J [University of Washington, Seattle, WA (United States)

    2014-06-01

    Purpose: Radiation treatment planning involves a complex workflow that can make safety improvement efforts challenging. This study utilizes an incident reporting system to identify detection points of near-miss errors, in order to guide our departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or their patterns. Methods: 1377 incidents were analyzed from a departmental nearmiss error reporting system from 3/2012–10/2013. All incidents were prospectively reviewed weekly by a multi-disciplinary team, and assigned a near-miss severity score ranging from 0–4 reflecting potential harm (no harm to critical). A 98-step consensus workflow was used to determine origination and detection points of near-miss errors, categorized into 7 major steps (patient assessment/orders, simulation, contouring/treatment planning, pre-treatment plan checks, therapist/on-treatment review, post-treatment checks, and equipment issues). Categories were compared using ANOVA. Results: In the 7-step workflow, 23% of near-miss errors were detected within the same step in the workflow, while an additional 37% were detected by the next step in the workflow, and 23% were detected two steps downstream. Errors detected further from origination were more severe (p<.001; Figure 1). The most common source of near-miss errors was treatment planning/contouring, with 476 near misses (35%). Of those 476, only 72(15%) were found before leaving treatment planning, 213(45%) were found at physics plan checks, and 191(40%) were caught at the therapist pre-treatment chart review or on portal imaging. Errors that passed through physics plan checks and were detected by therapists were more severe than other errors originating in contouring/treatment planning (1.81 vs 1.33, p<0.001). Conclusion: Errors caught by radiation treatment therapists tend to be more severe than errors caught earlier in the workflow, highlighting the importance of safety

  3. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  4. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  5. A cable detection lidar system for helicopters

    Science.gov (United States)

    Grossmann, Benoist; Capbern, Alain; Defour, Martin; Fertala, Remi

    1992-01-01

    Helicopters in low-level flight are endangered by power lines or telephone wires, especially when flying at night and under poor visibility conditions. In order to prevent 'wire strike', Thomson has developed a lidar system consisting of a pulsed diode laser emitting in the near infrared region (lambda = 0.9 microns). The HOWARD (Helicopter Obstacle Warning and Detection) System utilizes a high repetition rate diode laser (PRE = 20 KHz) along with counter-rotating prisms for laser beam deflection with a total field of view of 30 degrees. This system was successfully field tested in 1991. HOWARD can detect one inch wires at ranges up to 200 meters. We are presently in the process of developing a flyable compact lidar system capable of detection ranges in the order of 400 meters.

  6. Design of Weft Detection System in The Stenter Machine

    Science.gov (United States)

    Gu, Minming; Xu, Xianju; Dai, Wenzhan

    2017-12-01

    In order to build an effective automatic weft-straightening system, it is important for the sensing device to detect most the possible fabric styles, designs, colours and structures, an optical sensing system that detects the angular orientation of weft threads in a moving web of a textile has been built. It contains an adjustable light source, two lens systems and photodiode sensor array. The sensor array includes 13 radial pattern of photosensitive areas that each generate an electrical signal proportional to the total intensity of the light incident on the area. The moving shadow of a weft thread passing over the area will modulate the output signal. A signal processed circuit was built to do the I/V conversion, amplifying, hardware filtering. An embed micro control system then deals with the information of these signals, calculates the angle of the weft drew. Finally, the experiments were done, the results showed that the weft detection system can deal with the fabric weft skew up to 30° and has achieved good results in the application.

  7. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  8. Fault detection and isolation for complex system

    Science.gov (United States)

    Jing, Chan Shi; Bayuaji, Luhur; Samad, R.; Mustafa, M.; Abdullah, N. R. H.; Zain, Z. M.; Pebrianti, Dwi

    2017-07-01

    Fault Detection and Isolation (FDI) is a method to monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. A two wheel robot is used as a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. The proposed method for the fault identification is using hybrid technique that combines Kalman filter and Artificial Neural Network (ANN). The Kalman filter is able to recognize the data from the sensors of the system and indicate the fault of the system in the sensor reading. Error prediction is based on the fault magnitude and the time occurrence of fault. Additionally, Artificial Neural Network (ANN) is another algorithm used to determine the type of fault and isolate the fault in the system.

  9. An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System

    International Nuclear Information System (INIS)

    Terezakis, Stephanie A.; Harris, Kendra M.; Ford, Eric; Michalski, Jeff; DeWeese, Theodore; Santanam, Lakshmi; Mutic, Sasa; Gay, Hiram

    2013-01-01

    Purpose: Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials: All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results: Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ≥2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions: A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement

  10. An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Terezakis, Stephanie A., E-mail: stereza1@jhmi.edu [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Harris, Kendra M. [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Ford, Eric [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Department of Radiation Oncology, University of Washington, Seattle, Washington (United States); Michalski, Jeff [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States); DeWeese, Theodore [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Santanam, Lakshmi; Mutic, Sasa; Gay, Hiram [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States)

    2013-03-15

    Purpose: Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials: All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results: Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ≥2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions: A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement.

  11. The effect of a workflow-based response system on hospital-wide voluntary incident reporting rates.

    Science.gov (United States)

    Wang, Szu-Chang; Li, Ying-Chun; Huang, Hung-Chi

    2013-02-01

    Hospital incident reporting systems are usually evaluated on their theoretical benefit to the hospital or increase in reporting rates alone. To evaluate a workflow-based response system on staff incident reporting rates. A prospective cohort study of incident reports made by staff members before (2006-2007) and after (2008-2009) the system was implemented on 1 January 2008 at a medical center in southern Taiwan. Pre-system and post-system data were based on 713 129 and 730 176 inpatient days and 160 692 and 168 850 emergency department visits. The addition of a workflow-based response system to a reporting system processing incident reports and intra-hospital responses. Voluntary incident reporting rates and distribution of incident severities. Inpatient reports [9.9 vs. 28.8 per 10 000 patient days; rate ratio (RR): 2.9, 95% confidence interval (CI): 2.7-3.2, P reports (5.9 vs. 19.2 per 10 000 visits, RR: 3.3, 95% CI: 2.6-4.1, P system reported incidents were more evenly distributed over five severity levels than pre-sytem incidents, moving more toward the very severe level (RR: 17.6, 95% CI: 8.4-37.0, P system to the hospital incident reporting system significantly increased hospital-wide voluntary incident report rates at all incident injury levels.

  12. Sci-Fri AM: Quality, Safety, and Professional Issues 06: An Evaluation of Incident Reporting and Learning using the Canadian National System for Incident Reporting – Radiation Treatment

    International Nuclear Information System (INIS)

    Montgomery, Logan; Kildea, John

    2016-01-01

    We report on the development and clinical deployment of an in-house incident reporting and learning system that implements the taxonomy of the Canadian National System for Incident Reporting – Radiation Treatment (NSIR-RT). In producing our new system, we aimed to: Analyze actual incidents, as well as potentially dangerous latent conditions. Produce recommendations on the NSIR-RT taxonomy. Incorporate features to divide reporting responsibility among clinical staff and expedite incident categorization within the NSIR-RT framework. Share anonymized incident data with the national database. Our multistep incident reporting workflow is focused around an initial report and a detailed follow-up investigation. An investigator, chosen at the time of reporting, is tasked with performing the investigation. The investigation feature is connected to our electronic medical records database to allow automatic field population and quick reference of patient and treatment information. Additional features include a robust visualization suite, as well as the ability to flag incidents for discussion at monthly Risk Management meetings and task ameliorating actions to staff. Our system was deployed into clinical use in January 2016. Over the first three months of use, 45 valid incidents were reported; 31 of which were reported as actual incidents as opposed to near-misses or reportable circumstances. However, we suspect there is ambiguity within our centre in determining the appropriate event type, which may be arising from the taxonomy itself. Preliminary trending analysis aided in revealing workflow issues pertaining to storage of treatment accessories and treatment planning delays. Extensive analysis will be undertaken as more data are accrued.

  13. Multilayer optical disc system using homodyne detection

    Science.gov (United States)

    Kurokawa, Takahiro; Ide, Tatsuro; Tanaka, Yukinobu; Watanabe, Koichi

    2014-09-01

    A write/read system using high-productivity multilayer optical discs was developed. The recording medium used in the system consists of planar recording layers and a separated guide layer, and is fabricated by web coating and lamination process. The recording layers in the medium are made of one-photon-absorption material, on which data can be recorded with a normal laser diode. The developed system is capable of focusing and tracking on the medium and amplifying readout signals by using phase-diversity homodyne detection. A highly layer-selective focusing method using homodyne detection was also proposed. This method obtains stable focus-error signals with clearly separated S-shaped curves even when layer spacing is quite narrow, causing large interlayer crosstalk. Writing on the medium and reading with the signal amplification effect of homodyne detection was demonstrated. In addition, the effectiveness of the method was experimentally evaluated.

  14. Incidence of thromboembolism following detection by trans-oesophageal echocardiography of left atrial thrombus

    Directory of Open Access Journals (Sweden)

    Ciara Mahon

    2015-09-01

    Conclusion: This is the only study to date that has looked at the incidence of ischemic stroke following a confirmed LAA thrombus, LA thrombus or pre-thrombus state. This single centre study found low stroke rates over a six month follow-up period in patients with a confirmed LAA thrombus, LA thrombus or pre-thrombus state and optimization of OAC. Larger studies would be required to confirm these findings.

  15. Incidence of Systemic Lupus Erythematosus and Lupus Nephritis in Denmark: A Nationwide Cohort Study.

    Science.gov (United States)

    Hermansen, Marie-Louise F; Lindhardsen, Jesper; Torp-Pedersen, Christian; Faurschou, Mikkel; Jacobsen, Søren

    2016-07-01

    To determine the incidence of systemic lupus erythematosus (SLE) and SLE with concomitant or subsequent lupus nephritis (LN) in Denmark during 1995-2011, using data from the Danish National Patient Registry (NPR). To assess the incidence of SLE, we identified all persons aged ≥ 18 years in the NPR with at least 1 International Classification of Diseases, 10th ed (ICD-10) code of SLE and at least 365 days of followup under this diagnosis. Identification of LN cases was based on fulfillment of these criteria and ≥ 1 registration under an ICD-10 code of nephritis concomitantly with or after first SLE registration. The overall annual incidence rate per 100,000 for SLE was 2.35 (95% CI 2.24-2.49); 0.69 (95% CI 0.60-0.78) for men and 3.96 (95% CI 3.75-4.17) for women. For LN, the mean annual incidence rate per 100,000 was estimated to be 0.45 (95% CI 0.38-0.53); 0.20 (95% CI 0.13-0.28) for men and 0.69 (95% CI 0.57-0.83) for women. The differences in SLE incidence rates between sexes decreased by age, and the incidence did not differ between men and women after the age of 60 years for LN. The estimated incidences showed no trends by calendar time. Estimated overall point prevalence (December 31, 2011) per 100,000 was 45.2 (95% CI 43.3-47.4) and 6.4 (95% CI 5.7-7.2) for SLE and LN, respectively. Our Danish population-based data showed a stable incidence of SLE and LN. As expected, we found higher incidence rates among women than among men, particularly in younger persons.

  16. Learning From Incident Reporting? Analysis of Incidents Resulting in Patient Injuries in a Web-Based System in Swedish Health Care.

    Science.gov (United States)

    Ahlberg, Eva-Lena; Elfström, Johan; Borgstedt, Madeleine Risberg; Öhrn, Annica; Andersson, Christer; Sjödahl, Rune; Nilsen, Per

    2017-11-04

    Incident reporting (IR) systems have the potential to improve patient safety if they enable learning from the reported risks and incidents. The aim of this study was to investigate incidents registered in an IR system in a Swedish county council. The study was conducted in the County Council of Östergötland, Sweden. Data were retrieved from the IR system, which included 4755 incidents occurring in somatic care that resulted in patient injuries from 2004 to 2012. One hundred correctly classified patient injuries were randomly sampled from 3 injury severity levels: injuries leading to deaths, permanent harm, and temporary harm. Three aspects were analyzed: handling of the incident, causes of the incident, and actions taken to prevent its recurrence. Of the 300 injuries, 79% were handled in the departments where they occurred. The department head decided what actions should be taken to prevent recurrence in response to 95% of the injuries. A total of 448 causes were identified for the injuries; problems associated with procedures, routines, and guidelines were most common. Decisions taken for 80% of the injuries could be classified using the IR system documentation and root cause analysis. The most commonly pursued type of action was change of work routine or guideline. The handling, causes, and actions taken to prevent recurrence were similar for injuries of different severity levels. Various forms of feedback (information, education, and dialogue) were an integral aspect of the IR system. However, this feedback was primarily intradepartmental and did not yield much organizational learning.

  17. Critical Incident Stress Management (CISM) in complex systems: cultural adaptation and safety impacts in healthcare.

    Science.gov (United States)

    Müller-Leonhardt, Alice; Mitchell, Shannon G; Vogt, Joachim; Schürmann, Tim

    2014-07-01

    In complex systems, such as hospitals or air traffic control operations, critical incidents (CIs) are unavoidable. These incidents can not only become critical for victims but also for professionals working at the "sharp end" who may have to deal with critical incident stress (CIS) reactions that may be severe and impede emotional, physical, cognitive and social functioning. These CIS reactions may occur not only under exceptional conditions but also during every-day work and become an important safety issue. In contrast to air traffic management (ATM) operations in Europe, which have readily adopted critical incident stress management (CISM), most hospitals have not yet implemented comprehensive peer support programs. This survey was conducted in 2010 at the only European general hospital setting which implemented CISM program since 2004. The aim of the article is to describe possible contribution of CISM in hospital settings framed from the perspective of organizational safety and individual health for healthcare professionals. Findings affirm that daily work related incidents also can become critical for healthcare professionals. Program efficiency appears to be influenced by the professional culture, as well as organizational structure and policies. Overall, findings demonstrate that the adaptation of the CISM program in general hospitals takes time but, once established, it may serve as a mechanism for changing professional culture, thereby permitting the framing of even small incidents or near misses as an opportunity to provide valuable feedback to the system. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Pharmaceutical sales of pseudoephedrine: the impact of electronic tracking systems on methamphetamine crime incidents.

    Science.gov (United States)

    Mazerolle, Lorraine; McGuffog, Ingrid; Ferris, Jason; Chamlin, Mitchell B

    2017-03-01

    Electronic tracking systems (ETS) are used extensively in pharmacies across the United States and Australia to control suspicious sales of pseudoephedrine. This study measures the impact of one ETS-Project STOP-on the capacity of police to reduce production, supply and possession of methamphetamine. Using official police data of incidents of production, supply and possession from January 1996 to December 2011 (n = 192 data points/months over 16 years), we used a quasi-experimental, time-series approach. The State of Queensland, Australia. No individual participants are included in the study. The unit of analysis is reported police incidents. The study examines the impact of the ETS on production (n = 5938 incidents), drug supply and trafficking (n = 20 094 incidents) and drug possession or use (n = 118 926) of methamphetamine. Introduction of the ETS in November 2005 was associated with an insignificant decrease (P = 0.15) in the production of methamphetamine. The intervention was associated with a statistically significant increase in supply incidents (P = 0.0001). There was no statistically significant effect on the incidence of possession (P = 0.59). Electronic tracking systems can reduce the capacity of people to produce methamphetamine domestically, but seem unlikely to affect other aspects of the methamphetamine problem such as possession, distribution and importation. © 2016 Society for the Study of Addiction.

  19. Expert system structures for fault detection in spaceborne power systems

    Science.gov (United States)

    Watson, Karan; Russell, B. Don; Hackler, Irene

    1988-01-01

    This paper presents an architecture for an expert system structure suitable for use with power system fault detection algorithms. The system described is not for the purpose of reacting to faults which have occurred, but rather for the purpose of performing on-line diagnostics and parameter evaluation to determine potential or incipient fault conditions. The system is also designed to detect high impedance or arcing faults which cannot be detected by conventional protection devices. This system is part of an overall monitoring computer hierarchy which would provide a full evaluation of the status of the power system and react to both incipient and catastrophic faults. An approximate hardware structure is suggested and software requirements are discussed. Modifications to CLIPS software, to capitalize on features offered by expert systems, are presented. It is suggested that such a system would have significant advantages over existing protection philosophy.

  20. Quality review of an adverse incident reporting system and root cause analysis of serious adverse surgical incidents in a teaching hospital of Scotland

    Directory of Open Access Journals (Sweden)

    Khorsandi Maziar

    2012-08-01

    Full Text Available Abstract Background A significant proportion of surgical patients are unintentionally harmed during their hospital stay. Root Cause Analysis (RCA aims to determine the aetiology of adverse incidents that lead to patient harm and produce a series of recommendations, which would minimise the risk of recurrence of similar events, if appropriately applied to clinical practice. A review of the quality of the adverse incident reporting system and the RCA of serious adverse incidents at the Department of Surgery of Ninewells hospital, in Dundee, United Kingdom was performed. Methods The Adverse Incident Management (AIM database of the Department of Surgery of Ninewells Hospital was retrospectively reviewed. Details of all serious (red, sentinel incidents recorded between May 2004 and December 2009, including the RCA reports and outcomes, where applicable, were reviewed. Additional related information was gathered by interviewing the involved members of staff. Results The total number of reported surgical incidents was 3142, of which 81 (2.58% cases had been reported as red or sentinel. 19 of the 81 incidents (23.4% had been inappropriately reported as red. In 31 reports (38.2% vital information with regards to the details of the adverse incidents had not been recorded. In 12 cases (14.8% the description of incidents was of poor quality. RCA was performed for 47 cases (58% and only 12 cases (15% received recommendations aiming to improve clinical practice. Conclusion The results of our study demonstrate the need for improvement in the quality of incident reporting. There are enormous benefits to be gained by this time and resource consuming process, however appropriate staff training on the use of this system is a pre-requisite. Furthermore, sufficient support and resources are required for the implementation of RCA recommendations in clinical practice.

  1. Medication incidents related to automated dose dispensing in community pharmacies and hospitals--a reporting system study.

    Directory of Open Access Journals (Sweden)

    Ka-Chun Cheung

    Full Text Available INTRODUCTION: Automated dose dispensing (ADD is being introduced in several countries and the use of this technology is expected to increase as a growing number of elderly people need to manage their medication at home. ADD aims to improve medication safety and treatment adherence, but it may introduce new safety issues. This descriptive study provides insight into the nature and consequences of medication incidents related to ADD, as reported by healthcare professionals in community pharmacies and hospitals. METHODS: The medication incidents that were submitted to the Dutch Central Medication incidents Registration (CMR reporting system were selected and characterized independently by two researchers. MAIN OUTCOME MEASURES: Person discovering the incident, phase of the medication process in which the incident occurred, immediate cause of the incident, nature of incident from the healthcare provider's perspective, nature of incident from the patient's perspective, and consequent harm to the patient caused by the incident. RESULTS: From January 2012 to February 2013 the CMR received 15,113 incidents: 3,685 (24.4% incidents from community pharmacies and 11,428 (75.6% incidents from hospitals. Eventually 1 of 50 reported incidents (268/15,113 = 1.8% were related to ADD; in community pharmacies more incidents (227/3,685 = 6.2% were related to ADD than in hospitals (41/11,428 = 0.4%. The immediate cause of an incident was often a change in the patient's medicine regimen or relocation. Most reported incidents occurred in two phases: entering the prescription into the pharmacy information system and filling the ADD bag. CONCLUSION: A proportion of incidents was related to ADD and is reported regularly, especially by community pharmacies. In two phases, entering the prescription into the pharmacy information system and filling the ADD bag, most incidents occurred. A change in the patient's medicine regimen or relocation was the immediate causes of an

  2. System for particle concentration and detection

    Science.gov (United States)

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  3. Sunglass detection method for automation of video surveillance system

    Science.gov (United States)

    Sikandar, Tasriva; Samsudin, Wan Nur Azhani W.; Hawari Ghazali, Kamarul; Mohd, Izzeldin I.; Fazle Rabbi, Mohammad

    2018-04-01

    Wearing sunglass to hide face from surveillance camera is a common activity in criminal incidences. Therefore, sunglass detection from surveillance video has become a demanding issue in automation of security systems. In this paper we propose an image processing method to detect sunglass from surveillance images. Specifically, a unique feature using facial height and width has been employed to identify the covered region of the face. The presence of covered area by sunglass is evaluated using facial height-width ratio. Threshold value of covered area percentage is used to classify the glass wearing face. Two different types of glasses have been considered i.e. eye glass and sunglass. The results of this study demonstrate that the proposed method is able to detect sunglasses in two different illumination conditions such as, room illumination as well as in the presence of sunlight. In addition, due to the multi-level checking in facial region, this method has 100% accuracy of detecting sunglass. However, in an exceptional case where fabric surrounding the face has similar color as skin, the correct detection rate was found 93.33% for eye glass.

  4. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  5. Microcomputer-based video motion detection system

    International Nuclear Information System (INIS)

    Howington, L.C.

    1979-01-01

    This system was developed to enhance the volumetric intrusion detection capability of the Oak Ridge Y-12 Plant's security program. Not only does the system exhibit an extended range of detection over present infrared, microwave, and ultrasonic devices, it also provides an instantaneous assessment capability by providing the operator with a closed-circuit television (CCTV) image of the alarm scene as soon as motion is detected. The system consists of a custom-built, microcomputer-based, video processor which analyzes the signals received from a network of video cameras. The operator can view the camera images as they are displayed on a CCTV monitor while alarm scenes are displayed on a second monitor. Motion is detected by digitizing and comparing successive video frames and making an alarm decision based on the degree of mismatch. The software-based nature of the microcomputer lends a great deal of flexibility and adaptability in making the alarm decision. Alarm decision variables which are easily adjusted through software are the percent change in gray level required to label a pixel (picture element) as suspect, the number of suspect pixels required to generate an alarm, the pixel pattern to be sampled from the image, and the rate at which a new reference frame is taken. The system is currently being evaluated in a warehouse for potential application in several areas of the Plant. This paper discusses the hardware and software design of the system as well as problems encountered in its implementation and results obtained

  6. HASCAL -- A system for estimating contamination and doses from incidents at worldwide nuclear facilities

    International Nuclear Information System (INIS)

    Sjoreen, A.L.

    1995-01-01

    The Hazard Assessment System for Consequence Analysis (HASCAL) is being developed to support the analysis of radiological incidents anywhere in the world for the Defense Nuclear Agency (DNA). HASCAL is a component of the Hazard Prediction and Assessment Capability (HPAC), which is a comprehensive nuclear, biological, and chemical hazard effects planning and forecasting modeling system that is being developed by DNA. HASCAL computes best-guess estimates of the consequences of radiological incidents. HASCAL estimates the amount of radioactivity released, its atmospheric transport and deposition, and the resulting radiological doses

  7. Egg weight detection on machine vision system

    Science.gov (United States)

    Cen, Yike; Ying, Yibin; Rao, Xiuqin

    2006-10-01

    A machine vision system for egg weight detection was developed. Egg image was grabbed by a CCD camera and a frame grabber. An indicator composed of R, G, B intensity was used for image segmentation. A series of algorithms were developed to evaluate egg's vertical diameter, maximal horizontal diameter, upper horizontal diameter and nether horizontal diameter. Based on extracted four size features of vertical and maximal/upper/nether horizontal diameter, a regression model between egg's weight and its size was established using SAS, which was used to detect egg's weight. The experiment results indicated that, for egg weight detection on the machine vision system, the correlative coefficient of the regression model was 0.9781 and the absolute error was no more than +/-3 g, which would be lower work load on human graders and an increased flexibility in the egg quality control process in egg's industrialization.

  8. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  9. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  10. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  11. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  12. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  13. Trends in incidence and tumour grade in screen-detected ductal carcinoma in situ and invasive breast cancer.

    Science.gov (United States)

    Luiten, Jacky D; Voogd, Adri C; Luiten, Ernest J T; Duijm, Lucien E M

    2017-11-01

    In a biennial screening mammography programme, we analysed the trends in incidence of screen-detected DCIS and invasive breast cancers in the era of screen-film mammography (SFM) screening, the period of the transition to full-field digital mammography (FFDM) screening and the period of FFDM screening. We also investigated a possible association between the incidence and grading of screen-detected DCIS and invasive breast cancer. In the southern part of the Netherlands, FFDM screening gradually replaced SFM screening between May 2009 and April 2010. We included a consecutive series of 484, 422 screens obtained between July 2005 and July 2015 and divided these screens into three groups; SFM-only cohort, transition cohort and FFDM-only cohort. A total of 3059 referred women were diagnosed with DCIS (n = 623) or invasive breast cancer (n = 2436). The majority of DCIS were high-grade (48.2%), whereas the majority of the invasive breast cancers were low-grade (45.4%) or intermediate-grade (41.6%). The cancer detection rate (CDR) per 1000 screened women showed the same distribution by grade in both groups. The transition to FFDM was characterised by an increased overall detection rate of invasive cancers. Screening mammography detects mostly high-grade DCIS and low- or intermediate-grade invasive cancers. The grade distribution as well as the CDR in the years after the introduction of FFDM remained stable compared to the era of SFM screening. By diagnosing and treating high-grade DCIS, which otherwise may develop into high-grade invasive carcinoma, our findings provide new evidence for the beneficial value of screening mammography programmes.

  14. Nuclear power plant operating experiences from the IAEA / Nea incident reporting system 2002-2005

    International Nuclear Information System (INIS)

    2006-01-01

    The Incident Reporting System (IRS) is an essential element of the international operating experience feedback system for nuclear power plants. The IRS is jointly operated and managed by the Nuclear Energy Agency (NEA), a semi-autonomous body within the Organisation for Economic Co-operation and Development (OECD), and the International Atomic Energy Agency (IAEA), a specialized agency within the United Nations System. (author)

  15. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  16. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    International Nuclear Information System (INIS)

    Dimitrovski, D.; Kittley, S.

    2015-01-01

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  17. Incidence and outcomes of primary central nervous system lymphoma in solid organ transplant recipients.

    Science.gov (United States)

    Mahale, Parag; Shiels, Meredith S; Lynch, Charles F; Engels, Eric A

    2018-02-01

    Primary central nervous system lymphoma (PCNSL) risk is greatly increased in immunosuppressed human immunodeficiency virus-infected people. Using data from the US transplant registry linked with 17 cancer registries (1987-2014), we studied PCNSL and systemic non-Hodgkin lymphoma (NHL) in 288 029 solid organ transplant recipients. Transplant recipients had elevated incidence for PCNSL compared with the general population (standardized incidence ratio = 65.1; N = 168), and this elevation was stronger than for systemic NHL (standardized incidence ratio=11.5; N = 2043). Compared to kidney recipients, PCNSL incidence was lower in liver recipients (adjusted incidence rate ratio [aIRR] = 0.52), similar in heart and/or lung recipients, and higher in other/multiple organ recipients (aIRR = 2.45). PCNSL incidence was higher in Asians/Pacific Islanders than non-Hispanic whites (aIRR = 2.09); after induction immunosuppression with alemtuzumab (aIRR = 3.12), monoclonal antibodies (aIRR = 1.83), or polyclonal antibodies (aIRR = 2.03); in recipients who were Epstein-Barr virus-seronegative at the time of transplant and at risk of primary infection (aIRR = 1.95); and within the first 1.5 years after transplant. Compared to other recipients, those with PCNSL had increased risk of death (adjusted hazard ratio [aHR] = 11.79) or graft failure/retransplantation (aHR = 3.24). Recipients with PCNSL also had higher mortality than those with systemic NHL (aHR = 1.48). In conclusion, PCNSL risk is highly elevated among transplant recipients, and it carries a poor prognosis. © 2017 The American Society of Transplantation and the American Society of Transplant Surgeons.

  18. Radiological incidents in radiotherapy

    International Nuclear Information System (INIS)

    Hobzova, L.; Novotny, J.

    2008-01-01

    In many countries a reporting system of radiological incidents to national regulatory body exists and providers of radiotherapy treatment are obliged to report all major and/or in some countries all incidents occurring in institution. State Office for Nuclear Safety (SONS) is providing a systematic guidance for radiotherapy departments from 1997 by requiring inclusion of radiation safety problems into Quality assurance manual, which is the basic document for obtaining a license of SONS for handling with sources of ionizing radiation. For that purpose SONS also issued the recommendation 'Introduction of QA system for important sources in radiotherapy-radiological incidents' in which the radiological incidents are defined and the basic guidance for their classification (category A, B, C, D), investigation and reporting are given. At regular periods the SONS in co-operation with radiotherapy centers is making a survey of all radiological incidents occurring in institutions and it is presenting obtained information in synoptic communication (2003 Motolske dny, 2005 Novy Jicin). This presentation is another summary report of radiological incidents that occurred in our radiotherapy institutions during last 3 years. Emphasis is given not only to survey and statistics, but also to analysis of reasons of the radiological incidents and to their detection and prevention. Analyses of incidents in radiotherapy have led to a much broader understanding of incident causation. Information about the error should be shared as early as possible during or after investigation by all radiotherapy centers. Learning from incidents, errors and near misses should be a part of improvement of the QA system in institutions. Generally, it is recommended that all radiotherapy facilities should participate in the reporting, analyzing and learning system to facilitate the dissemination of knowledge throughout the whole country to prevent errors in radiotherapy.(authors)

  19. The non-technical skills used by anaesthetic technicians in critical incidents reported to the Australian Incident Monitoring System between 2002 and 2008.

    Science.gov (United States)

    Rutherford, J S; Flin, R; Irwin, A

    2015-07-01

    The outcome of critical incidents in the operating theatre has been shown to be influenced by the behaviour of anaesthetic technicians (ATs) assisting anaesthetists, but the specific non-technical skills involved have not been described. We performed a review of critical incidents (n=1433) reported to the Australian Incident Monitoring System between 2002 and 2008 to identify which non-technical skills were used by ATs. The reports were assessed if they mentioned anaesthetic assistance or had the boxes ticked to identify "inadequate assistance" or "absent supervision or assistance". A total of 90 critical incidents involving ATs were retrieved, 69 of which described their use of non-technical skills. In 20 reports, the ATs ameliorated the critical incident, whilst in 46 they exacerbated the critical incident, and three cases had both positive and negative non-technical skills described. Situation awareness was identified in 39 reports, task management in 23, teamwork in 21 and decision-making in two, but there were no descriptions of issues related to leadership, stress or fatigue management. Situation awareness, task management and teamwork appear to be important non-technical skills for ATs in the development or management of critical incidents in the operating theatre. This analysis has been used to support the development of a non-technical skills taxonomy for anaesthetic assistants.

  20. Adult Perpetrator Gender Asymmetries in Child Sexual Assault Victim Selection: Results from the 2000 National Incident-Based Reporting System

    Science.gov (United States)

    McCloskey, Kathy A.; Raphael, Desreen N.

    2005-01-01

    Data from the 2000 National Incident-Based Reporting System (NIBRS) show that while males make up about nine out of every 10 adult sexual assault perpetrators, totaling about 26,878 incidents within the reporting period, females account for about one out of 10 perpetrators, totaling about 1,162 incidents. Male sexual assault perpetrators offend…

  1. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ...) Each fire detection system must be divided into zones to limit the area covered by any particular alarm... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  2. RO-ILS: Radiation Oncology Incident Learning System: A report from the first year of experience.

    Science.gov (United States)

    Hoopes, David J; Dicker, Adam P; Eads, Nadine L; Ezzell, Gary A; Fraass, Benedick A; Kwiatkowski, Theresa M; Lash, Kathy; Patton, Gregory A; Piotrowski, Tom; Tomlinson, Cindy; Ford, Eric C

    2015-01-01

    Incident learning is a critical tool to improve patient safety. The Patient Safety and Quality Improvement Act of 2005 established essential legal protections to allow for the collection and analysis of medical incidents nationwide. Working with a federally listed patient safety organization (PSO), the American Society for Radiation Oncology and the American Association of Physicists in Medicine established RO-ILS: Radiation Oncology Incident Learning System (RO-ILS). This paper provides an overview of the RO-ILS background, development, structure, and workflow, as well as examples of preliminary data and lessons learned. RO-ILS is actively collecting, analyzing, and reporting patient safety events. As of February 24, 2015, 46 institutions have signed contracts with Clarity PSO, with 33 contracts pending. Of these, 27 sites have entered 739 patient safety events into local database space, with 358 events (48%) pushed to the national database. To establish an optimal safety culture, radiation oncology departments should establish formal systems for incident learning that include participation in a nationwide incident learning program such as RO-ILS. Copyright © 2015 American Society for Radiation Oncology. Published by Elsevier Inc. All rights reserved.

  3. Chemical detection system and related methods

    Energy Technology Data Exchange (ETDEWEB)

    Caffrey, Augustine J.; Chichester, David L.; Egger, Ann E.; Krebs, Kenneth M.; Seabury, Edward H.; Van Siclen, Clinton D.; Wharton, C. Jayson; Zabriskie, John M.

    2017-06-27

    A chemical detection system includes a frame, an emitter coupled to the frame, and a detector coupled to the frame proximate the emitter. The system also includes a shielding system coupled to the frame and positioned at least partially between the emitter and the detector, wherein the frame positions a sensing surface of the detector in a direction substantially parallel to a plane extending along a front portion of the frame. A method of analyzing composition of a suspect object includes directing neutrons at the object, detecting gamma rays emitted from the object, and communicating spectrometer information regarding the gamma rays. The method also includes presenting a GUI to a user with a dynamic status of an ongoing neutron spectroscopy process. The dynamic status includes a present confidence for a plurality of compounds being present in the suspect object responsive to changes in the spectrometer information during the ongoing process.

  4. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  5. A prototype forensic toolkit for industrial-control-systems incident response

    Science.gov (United States)

    Carr, Nickolas B.; Rowe, Neil C.

    2015-05-01

    Industrial control systems (ICSs) are an important part of critical infrastructure in cyberspace. They are especially vulnerable to cyber-attacks because of their legacy hardware and software and the difficulty of changing it. We first survey the history of intrusions into ICSs, the more serious of which involved a continuing adversary presence on an ICS network. We discuss some common vulnerabilities and the categories of possible attacks, noting the frequent use of software written a long time ago. We propose a framework for designing ICS incident response under the constraints that no new software must be required and that interventions cannot impede the continuous processing that is the norm for such systems. We then discuss a prototype toolkit we built using the Windows Management Instrumentation Command-Line tool for host-based analysis and the Bro intrusion-detection software for network-based analysis. Particularly useful techniques we used were learning the historical range of parameters of numeric quantities so as to recognize anomalies, learning the usual addresses of connections to a node, observing Internet addresses (usually rare), observing anomalous network protocols such as unencrypted data transfers, observing unusual scheduled tasks, and comparing key files through registry entries and hash values to find malicious modifications. We tested our methods on actual data from ICSs including publicly-available data, voluntarily-submitted data, and researcher-provided "advanced persistent threat" data. We found instances of interesting behavior in our experiments. Intrusions were generally easy to see because of the repetitive nature of most processing on ICSs, but operators need to be motivated to look.

  6. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1984-01-01

    A research program is under way at the Argonne National Laboratory under the sponsorship of the USNRC Office of Nuclear Regulatory Research to evaluate and develop improved leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  7. Tools for Detecting Causality in Space Systems

    Science.gov (United States)

    Johnson, J.; Wing, S.

    2017-12-01

    Complex systems such as the solar and magnetospheric envivonment often exhibit patterns of behavior that suggest underlying organizing principles. Causality is a key organizing principle that is particularly difficult to establish in strongly coupled nonlinear systems, but essential for understanding and modeling the behavior of systems. While traditional methods of time-series analysis can identify linear correlations, they do not adequately quantify the distinction between causal and coincidental dependence. We discuss tools for detecting causality including: granger causality, transfer entropy, conditional redundancy, and convergent cross maps. The tools are illustrated by applications to magnetospheric and solar physics including radiation belt, Dst (a magnetospheric state variable), substorm, and solar cycle dynamics.

  8. Analysis of Aviation Safety Reporting System Incident Data Associated With the Technical Challenges of the Vehicle Systems Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This analysis was conducted to support the Vehicle Systems Safety Technology (VSST) Project of the Aviation Safety Program (AVsP) milestone VSST4.2.1.01, "Identification of VSST-Related Trends." In particular, this is a review of incident data from the NASA Aviation Safety Reporting System (ASRS). The following three VSST-related technical challenges (TCs) were the focus of the incidents searched in the ASRS database: (1) Vechicle health assurance, (2) Effective crew-system interactions and decisions in all conditions; and (3) Aircraft loss of control prevention, mitigation, and recovery.

  9. Editorial: Incident command systems: A dynamic tension among goals, rules and practice

    NARCIS (Netherlands)

    Boersma, F.K.; Comfort, L.K.; Groenendaal, J.; Wolbers, J.J.

    2014-01-01

    This special issue examines the process of implementation, change and adaptation of Incident Command Systems (ICS) as a strategy for mobilizing and managing disaster operations in comparative perspective, focusing on ICS in practice in the United States, France, the Netherlands and Norway. Shorter

  10. Early detection of the incidence of malignancy in mammograms using digital image correlation

    International Nuclear Information System (INIS)

    Espitia, J.; Jacome, J.; Torres, C.

    2016-01-01

    The digital image correlation has proved an effective way for Pattern Recognition, this research to identify the using Findings digitally extracted from a mammographic image, which is the means used by more specialists to determine if a person is a candidate or not, a Suffer Breast Cancer. This shown that early detection of symptom logy 'carcinogenic' is the key . (Author)

  11. Increased incidence of acute kidney injury with aprotinin use during cardiac surgery detected with urinary NGAL

    DEFF Research Database (Denmark)

    Wagener, G.; Gubitosa, G.; Wang, S.

    2008-01-01

    BACKGROUND: Use of aprotinin has been associated with acute kidney injury after cardiac surgery. Neutrophil gelatinase-associated lipocalin (NGAL) is a novel, very sensitive marker for renal injury. Urinary NGAL may be able to detect renal injury caused by aprotinin. This study determined if the ...

  12. Fault Detection for Quantized Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Wei-Wei Che

    2013-01-01

    Full Text Available The fault detection problem in the finite frequency domain for networked control systems with signal quantization is considered. With the logarithmic quantizer consideration, a quantized fault detection observer is designed by employing a performance index which is used to increase the fault sensitivity in finite frequency domain. The quantized measurement signals are dealt with by utilizing the sector bound method, in which the quantization error is treated as sector-bounded uncertainty. By using the Kalman-Yakubovich-Popov (GKYP Lemma, an iterative LMI-based optimization algorithm is developed for designing the quantized fault detection observer. And a numerical example is given to illustrate the effectiveness of the proposed method.

  13. Incidence and Detection of Meniscal Ramp Lesions on Magnetic Resonance Imaging in Patients With Anterior Cruciate Ligament Reconstruction.

    Science.gov (United States)

    DePhillipo, Nicholas N; Cinque, Mark E; Chahla, Jorge; Geeslin, Andrew G; Engebretsen, Lars; LaPrade, Robert F

    2017-08-01

    Meniscal ramp lesions have been reported to be present in 9% to 17% of patients undergoing anterior cruciate ligament (ACL) reconstruction. Detection at the time of arthroscopy can be accomplished based on clinical suspicion and careful evaluation. Preoperative assessment via magnetic resonance imaging (MRI) has been reported to have a low sensitivity in identifying meniscal ramp lesions. To investigate the incidence of meniscal ramp lesions in patients with ACL tears and the sensitivity of preoperative MRI for the detection of ramp lesions. Case series; Level of evidence, 4. All patients who underwent ACL reconstruction by a single surgeon between 2010 and 2016 were included in this study, and patients with medial meniscal ramp lesions found at the time of arthroscopy were identified. The sensitivity of MRI compared with the gold standard of arthroscopic evaluation was determined by review of the preoperative MRI musculoskeletal radiologist report, mimicking the clinical scenario. The incidence was calculated based on arthroscopic findings, and the potential secondary signs of meniscal ramp tears were evaluated on MRI. In a consecutive series of 301 ACL reconstructions, 50 patients (33 male, 17 female) with a mean age of 29.6 years (range, 14-61 years) were diagnosed with a medial meniscal ramp lesion at arthroscopic evaluation (16.6% incidence). The sensitivity of MRI for ramp lesions was 48% based on the preoperative MRI report. A secondary finding of a posteromedial tibial bone bruise was identified on preoperative MRI in 36 of the 50 patients with ramp lesions in a retrospective MRI review by 2 orthopaedic surgeons. Medial meniscal ramp lesions were present in approximately 17% of 301 patients undergoing ACL reconstruction, and less than one-half were diagnosed on the preoperative MRI. A posteromedial tibial bone bruise was found to be a secondary sign of a ramp lesion in 72% of patients. Increased awareness of this potentially combined injury pattern is

  14. Safety incidents involving confused and forgetful older patients in a specialised care setting--analysis of the safety incidents reported to the HaiPro reporting system.

    Science.gov (United States)

    Kinnunen-Luovi, Kaisa; Saarnio, Reetta; Isola, Arja

    2014-09-01

    To describe the safety incidents involving confused and forgetful older patients in a specialised care setting entered in the HaiPro reporting system. About 10% of patients experience a safety incident during hospitalisation, which causes or could cause them harm. The possibility of a safety incident during hospitalisation increases significantly with age. A mild or moderate memory disorder and acute confusion are often present in the safety incidents originating with an older patient. The design of the study was action research with this study using findings from one of the first-phase studies, which included qualitative and quantitative analysed data. Data were collected from the reporting system for safety incidents (HaiPro) in a university hospital in Finland. There were 672 reported safety incidents from four acute medical wards during the years 2009-2011, which were scrutinised. Seventy-five of them were linked to a confused patient and were analysed. The majority of the safety incidents analysed involved patient-related accidents. In addition to challenging behaviour, contributing factors included ward routines, shortage of nursing staff, environmental factors and staff knowledge and skills. Nurses tried to secure the patient safety in many different ways, but the modes of actions were insufficient. Nursing staff need evidence-based information on how to assess the cognitive status of a confused patient and how to encounter such patients. The number of nursing staff and ward routines should be examined critically and put in proportion to the care intensity demands caused by the patient's confused state. The findings can be used as a starting point in the prevention of safety incidents and in improving the care of older patients. © 2013 John Wiley & Sons Ltd.

  15. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  16. Systems analysis of voluntary reported anaesthetic safety incidents occurring in a university teaching hospital.

    Science.gov (United States)

    McMillan, Matthew W; Lehnus, Kristina S

    2018-01-01

    To identify factors contributing to the development of anaesthetic safety incidents. Prospective, descriptive, voluntary reporting audit of safety incidents with subsequent systems analysis. All animals anaesthetized in a multispecies veterinary teaching hospital from November 2014 to October 2016. Peri-anaesthetic incidents that risked or caused unnecessary harm to an animal were reported by anaesthetists alongside animal morbidity and mortality data. A modified systems analysis framework was used to identify contributing factors from the following categories: Animal and Owner, Task and Technology, Individual, Team, Work Environmental, and Organizational and Management. The outcome was graded using a simple descriptive scale. Data were analysed using Pearson's Chi-Square test for association and univariable and multivariable logistic regression analysis. Totally, 3379 anaesthetics were performed during the audit period. Of these, 174 incident reports were analysed, 163 of which impacted safe veterinary care and 26 incidents were considered to have had major or catastrophic outcomes. Incident outcome was believed to have been limited by anaesthetist intervention in 104 (63.8%) cases. Various factors were identified as: Individual in 123 (70.7%), Team in 108 (62.1%), Organizational and Management in 94 (54.0%), Task and Technology in 80 (46.0%), Work Environmental in 53 (30.5%) and Animal and Owner in 36 (20.7%) incidents. Individual factors were rarely seen in isolation. Significant associations were identified between Experience and Supervision, X 2 (1, n=174)=54177, p=0.001, Failure to follow a standard operating procedure and Task Management, X 2 (2, n=174)=11318, p=0.001, and Staffing and Poor Scheduling, X 2 (1, n=174)=36742, p=0.001. Animal Condition [odds ratio (OR)=16210, 95% confidence interval (CI)=5573-47147)] and anaesthetist Decision Making (OR=3437, 95% CI=1184-9974) were risk factors for catastrophic and major outcomes. Individual factors contribute

  17. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  18. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  19. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  20. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  1. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  2. National critical incident reporting systems relevant to anaesthesia: a European survey.

    Science.gov (United States)

    Reed, S; Arnal, D; Frank, O; Gomez-Arnau, J I; Hansen, J; Lester, O; Mikkelsen, K L; Rhaiem, T; Rosenberg, P H; St Pierre, M; Schleppers, A; Staender, S; Smith, A F

    2014-03-01

    Critical incident reporting is a key tool in the promotion of patient safety in anaesthesia. We surveyed representatives of national incident reporting systems in six European countries, inviting information on scope and organization, and intelligence on factors determining success and failure. Some systems are government-run and nationally conceived; others started out as small, specialty-focused initiatives, which have since acquired a national reach. However, both national co-ordination and specialty enthusiasts seem to be necessary for an optimally functioning system. The role of reporting culture, definitional issues, and dissemination is discussed. We make recommendations for others intending to start new systems and speculate on the prospects for sharing patient safety lessons relevant to anaesthesia at European level.

  3. A novel mobile system for radiation detection and monitoring

    Science.gov (United States)

    Biafore, Mauro

    2014-05-01

    evolving needs and budget constraints. On 24th September 2013, REWARD project received a prize as the best Innovative project related to the Not Conventional Threat (NCT) Chemical Biological Radiological Nuclear explosives (CBRNe) products. A highly distinguished jury stated that "the developed detection and surveillance system offers a perfect solution for end-users to enhance crucial capabilities in RN analysis, risk communication and surveillance in case of a radiation incident". A demonstration of the REWARD system is planned in Naples on September 2014. More information about the REWARD project can be found at www.reward-project.eu.

  4. A System for Traffic Violation Detection

    Directory of Open Access Journals (Sweden)

    Nourdine Aliane

    2014-11-01

    Full Text Available This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations.

  5. Incidence and prevalence of systemic sclerosis in Campo Grande, State of Mato Grosso do Sul, Brazil.

    Science.gov (United States)

    Horimoto, Alex Magno Coelho; Matos, Erica Naomi Naka; Costa, Márcio Reis da; Takahashi, Fernanda; Rezende, Marcelo Cruz; Kanomata, Letícia Barrios; Locatelli, Elisangela Possebon Pradebon; Finotti, Leandro Tavares; Maegawa, Flávia Kamy Maciel; Rondon, Rosa Maria Ribeiro; Machado, Natália Pereira; Couto, Flávia Midori Arakaki Ayres Tavares do; Figueiredo, Túlia Peixoto Alves de; Ovidio, Raphael Antonio; Costa, Izaias Pereira da

    Systemic sclerosis is an autoimmune disease which shows extreme heterogeneity in its clinical presentation and that follows a variable and unpredictable course. Although some discrepancies in the incidence and prevalence rates between geographical regions may reflect methodological differences in the definition and verification of cases, they may also reflect true local differences. To determine the prevalence and incidence of systemic sclerosis in the city of Campo Grande, state capital of Mato Grosso do Sul (MS), Brazil, during the period from January to December 2014. All health care services of the city of Campo Grande - MS with attending in the specialty of Rheumatology were invited to participate in the study through a standardized form of clinical and socio-demographic assessment. Physicians of any specialty could report a suspected case of systemic sclerosis, but necessarily the definitive diagnosis should be established by a rheumatologist, in order to warrant the standardization of diagnostic criteria and exclusion of other diseases resembling systemic sclerosis. At the end of the study, 15 rheumatologists reported that they attended patients with systemic sclerosis and sent the completed forms containing epidemiological data of patients. The incidence rate of systemic sclerosis in Campo Grande for the year 2014 was 11.9 per million inhabitants and the prevalence rate was 105.6 per million inhabitants. Systemic sclerosis patients were mostly women, white, with a mean age of 50.58 years, showing the limited form of the disease with a mean duration of the disease of 8.19 years. Regarding laboratory tests, 94.4% were positive for antinuclear antibody, 41.6% for anti-centromere antibody and 19.1% for anti-Scl70; anti-RNA Polymerase III was performed in 37 patients, with 16.2% positive. The city of Campo Grande, the state capital of MS, presented a lower incidence/prevalence of systemic sclerosis in comparison with those numbers found in US studies and close

  6. Trust Evaluation for Embedded Systems Security research challenges identified from an incident network scenario

    OpenAIRE

    Gehrmann, Christian; Löfvenberg , Jacob

    2011-01-01

    This paper is about trust establishment and trust evaluations techniques. A short background about trust, trusted computing and security in embedded systems is given. An analysis has been done of an incident network scenario with roaming users and a set of basic security needs has been identified. These needs have been used to derive security requirements for devices and systems, supporting the considered scenario. Using the requirements, a list of major security challenges for...

  7. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  8. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  9. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  10. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  11. Detecting New Planets in Transiting Systems

    OpenAIRE

    Steffen, Jason H.

    2006-01-01

    I present an initial investigation into a new planet detection technique that uses the transit timing of a known, transiting planet. The transits of a solitary planet orbiting a star occur at equally spaced intervals in time. If a second planet is present, dynamical interactions within the system will cause the time interval between transits to vary. These transit time variations can be used to infer the orbital elements of the unseen, perturbing planet. I show analytic expressions for the am...

  12. An Automated Flying-Insect Detection System

    Science.gov (United States)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2007-01-01

    An automated flying-insect detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland-security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect s wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing-beat signatures are preprocessed (Fourier transformed) in real time to display a periodic signal. These signals are sent to the end user where they are graphically. All AFIDS data are preprocessed in the field with the use of a laptop computer equipped with LabVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al-GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing-beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation. Preliminary data indicate that AFIDS has

  13. Integrating incident data from five reporting systems to assess patient safety: making sense of the elephant.

    Science.gov (United States)

    Levtzion-Korach, Osnat; Frankel, Allan; Alcalai, Hanna; Keohane, Carol; Orav, John; Graydon-Baker, Erin; Barnes, Janet; Gordon, Kathleen; Puopulo, Anne Louise; Tomov, Elena Ivanova; Sato, Luke; Bates, David W

    2010-09-01

    A study was conducted to examine and compare information gleaned from five different reporting systems within one institution: incident reporting, patient complaints, risk management, medical malpractice claims, and executive walk rounds. These data sources vary in the timing of the reporting (retrospective or prospective), severity of the events, and profession of the reporters. A common methodology was developed for classifying incidents. Data specific to each incident were abstracted from each system and then categorized using the same framework into one of 23 categories. Overall, there was little overlap, although each reporting system identified important safety issues. Communication problems were common among patient complaints and malpractice claims; malpractice claims' leading category was clinical judgement. Walk rounds identified issues with equipment and supplies. Adverse event reporting systems highlighted identification issues, especially mislabelled specimens. The frequency of contributions of reports by provider group varied substantially by system. Physicians accounted for 50% of risk management reports, but in adverse event reporting, where nurses were the main reporters, physicians accounted for only 2.5% of reports. Complaints and malpractice claims come primarily from patients. The five reporting systems each identified different yet complementary patient safety issues. To obtain a comprehensive picture of their patient safety problems and to develop priorities for improving safety, hospitals should use a broad portfolio of approaches and then synthesize the messages from all individual approaches into a collated and cohesive whole.

  14. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  15. Optimum electromagnetic weapons detection system. [Airport security

    Energy Technology Data Exchange (ETDEWEB)

    Capots, L.H.; Gregory, W.D.; George, J.P.

    1973-09-01

    An optimized weapons detection system based on the ''active'' or ''a.c. susceptibility'' principle is described. For such uses as airport security the method should be capable of screening both passengers and hand baggage simultaneously. This detector uses the latest basic research results obtained on studies of a.c. susceptibility of metals, and identifies weapons characteristics using those results obtained from identifying chemical spectra with search routines, employing minicomputers. The detector is capable of characterizing both magnetic and non-magnetic weapons with a precision otherwise presently unavailable. System design and test data are presented.

  16. System and method for detecting gas

    Science.gov (United States)

    Chow, Oscar Ken; Moulthrop, Lawrence Clinton; Dreier, Ken Wayne; Miller, Jacob Andrew

    2010-03-16

    A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

  17. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [Virginia Commonwealth University, Richmond, VA (United States); National Radiation Oncology Program (10P4H), Richmond, VA (United States); Grover, S; Malik, G [TSG Innovations Inc., Richmond, VA (United States)

    2014-06-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  18. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    International Nuclear Information System (INIS)

    Kapoor, R; Palta, J; Hagan, M; Grover, S; Malik, G

    2014-01-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  19. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  20. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  1. Intraoperative multichannel audio-visual information recording and automatic surgical phase and incident detection.

    Science.gov (United States)

    Suzuki, Takashi; Sakurai, Yasuo; Yoshimitsu, Kitaro; Nambu, Kyojiro; Muragaki, Yoshihiro; Iseki, Hiroshi

    2010-01-01

    Identification, analysis, and treatment of potential risk in surgical workflow are the key to decrease medical errors in operating room. For the automatic analysis of recorded surgical information, this study reports multichannel audio visual recording system, and its review and analysis system. Motion in operating room is quantified using video file size without motion tracking. Conversation among surgical staff is quantified using fast Fourier transformation and frequency filter without speech recognition. The results suggested the progression phase of surgical procedure.

  2. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  3. Incidence and prevalence of systemic lupus erythematosus among the native Arab population in UAE.

    Science.gov (United States)

    Al Dhanhani, A M; Agarwal, M; Othman, Y S; Bakoush, O

    2017-05-01

    Background and objectives There is a paucity of information about the epidemiology of systemic lupus erythematosus (SLE) amongst Arabs. The objective of this study was to determine the incidence and prevalence of SLE among the native Arab population of United Arab Emirates (UAE). Methods Patients with SLE were identified from three sources: medical records of two local tertiary hospitals (four years; 2009 to 2012), laboratory requests for serum double stranded deoxyribonucleic acid and serum anti-nuclear antibody and confirmed histopathologic diagnosis of SLE (skin and kidney biopsy specimens). All the patients identified with SLE met the criteria of the American College of Rheumatology. Incidence and prevalence were calculated using the state records of the UAE native population as the denominator. The age-adjusted incidence was calculated by direct standardization using the World Health Organization world standard population 2000-2025. Results Sixteen new cases (13 females and three males) fulfilled the American College of Rheumatology SLE criteria. The mean (±SD) age at time of diagnosis was 28.6 ± 12.4 years. The crude incidence ratio (per 100,000 population) was 3.5, 1.1, 2.1 and 2.1 in years 2009, 2010, 2011, 2012, respectively. The age-standardized incidence per 100,000 population for the four years was 8.6 (95% confidence interval 4.2-15.9). The age-standardized prevalence of SLE among the native population according to the 2012 population consensus was 103/100,000 population (95% confidence interval 84.5-124.4). Conclusion The age-adjusted incidence and prevalence among UAE Arabs is higher than has been reported among most other Caucasian populations. Furthermore, the prevalence of SLE in UAE seems much higher than other similar Arab countries in the Gulf region.

  4. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  5. Notification system of incidents without damage in the health system of Castilla y León (Spain

    Directory of Open Access Journals (Sweden)

    María José PEREZ-BOILLOS

    2017-03-01

    Full Text Available Introduction and objective: Patient safety is an important part of the quality work in the Regional Health Management of Castilla y León. Numerous projects are part of this line, including the no-harm incident reporting system. Objective: Reporting incidents without harm can significantly improve patient safety and improve an organization's safety culture. Material and method: After an exhaustive analysis of the available systems, it was decided to develop an own system, SISNOT (system of notification of incidents without damage, which followed the characteristics recommended by the international organisms in relation to these systems in the health field. Results: 3249 notifications were made through SISNOT, between primary and specialized care, of which 48% could have had high damage in case of reoccurrence of the incident. Conclusions: The implementation of SISNOT has been carried out in all hospitals and in primary care. The results obtained are unequal in each unit. This is due to numerous local barriers: leadership, characteristics of professionals, etc. Although there is a common, lack of safety culture. This is a challenge to keep working.

  6. Collision Detection for Underwater ROV Manipulator Systems.

    Science.gov (United States)

    Sivčev, Satja; Rossi, Matija; Coleman, Joseph; Omerdić, Edin; Dooly, Gerard; Toal, Daniel

    2018-04-06

    Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  7. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  8. Control systems, personnel policies and management initiatives to limit pollution incidents

    International Nuclear Information System (INIS)

    Martin, B.F.

    1991-01-01

    After the regulatory requirements are met, an important collateral step in the continuing Hazardous Waste/Environmental Management cycle of activities is to minimize the possibility of a pollution incident, spill, contamination, mislabeling, mishandling or exposure, since this minimizes a major contingent liability of the company. Human failure accounts for 88% of accidents, 10% occur from mechanical failure and only 2% are unpreventable force majeure. This implies that fully 98% of all accidents can be prevented or minimized. Good engineering, production, management and educational practices can be formulated to minimize the occurrence and effects of accidental pollution incidents. Hazardous Material/Environmental Management tends to focus on technical and regulatory objectives, a reactionary mode caused in part by the rapidly changing regulatory environment and the need to continually adapt to these changes. Management functions such as personnel management and situational management get shortchanged in research and in practice. What is needed is a system that incorporates change readily, adapts personnel to change easily and mobilizes all the human resources of a company in meeting environmental and regulatory goals in the same way other goals of the company are met. Feedback Loop/Control System concepts have been applied to management practice in the popular Management By Objectives School as well as other schools of management practice. An Environmental Management program is proposed which incorporates feedback loop/ control systems to facilitate operations and training objectives and requirements. By incorporating Environmental and Hazardous Waste goals with other management goals in a system involving all levels of management and workers on the same team, the proposed system will reduce the probability of accidental pollution incidents and thus the contingent liability of a spill or other incident

  9. Medical students' perceptions of a novel institutional incident reporting system : A thematic analysis.

    Science.gov (United States)

    Gordon, Morris; Parakh, Dillan

    2017-10-01

    Errors in healthcare are a major patient safety issue, with incident reporting a key solution. The incident reporting system has been integrated within a new medical curriculum, encouraging medical students to take part in this key safety process. The aim of this study was to describe the system and assess how students perceived the reporting system with regards to its role in enhancing safety. Employing a thematic analysis, this study used interviews with medical students at the end of the first year. Thematic indices were developed according to the information emerging from the data. Through open, axial and then selective stages of coding, an understanding of how the system was perceived was established. Analysis of the interview specified five core themes: (1) Aims of the incident reporting system; (2) internalized cognition of the system; (3) the impact of the reporting system; (4) threshold for reporting; (5) feedback on the systems operation. Selective analysis revealed three overriding findings: lack of error awareness and error wisdom as underpinned by key theoretical constructs, student support of the principle of safety, and perceptions of a blame culture. Students did not interpret reporting as a manner to support institutional learning and safety, rather many perceived it as a tool for a blame culture. The impact reporting had on students was unexpected and may give insight into how other undergraduates and early graduates interpret such a system. Future studies should aim to produce interventions that can support a reporting culture.

  10. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  11. Fault detection and diagnosis of photovoltaic systems

    Science.gov (United States)

    Wu, Xing

    The rapid growth of the solar industry over the past several years has expanded the significance of photovoltaic (PV) systems. One of the primary aims of research in building-integrated PV systems is to improve the performance of the system's efficiency, availability, and reliability. Although much work has been done on technological design to increase a photovoltaic module's efficiency, there is little research so far on fault diagnosis for PV systems. Faults in a PV system, if not detected, may not only reduce power generation, but also threaten the availability and reliability, effectively the "security" of the whole system. In this paper, first a circuit-based simulation baseline model of a PV system with maximum power point tracking (MPPT) is developed using MATLAB software. MATLAB is one of the most popular tools for integrating computation, visualization and programming in an easy-to-use modeling environment. Second, data collection of a PV system at variable surface temperatures and insolation levels under normal operation is acquired. The developed simulation model of PV system is then calibrated and improved by comparing modeled I-V and P-V characteristics with measured I--V and P--V characteristics to make sure the simulated curves are close to those measured values from the experiments. Finally, based on the circuit-based simulation model, a PV model of various types of faults will be developed by changing conditions or inputs in the MATLAB model, and the I--V and P--V characteristic curves, and the time-dependent voltage and current characteristics of the fault modalities will be characterized for each type of fault. These will be developed as benchmark I-V or P-V, or prototype transient curves. If a fault occurs in a PV system, polling and comparing actual measured I--V and P--V characteristic curves with both normal operational curves and these baseline fault curves will aid in fault diagnosis.

  12. Survey to identify depth of penetration of critical incident reporting systems in Austrian healthcare facilities.

    Science.gov (United States)

    Sendlhofer, Gerald; Eder, Harald; Leitgeb, Karina; Gorges, Roland; Jakse, Heidelinde; Raiger, Marianne; Türk, Silvia; Petschnig, Walter; Pregartner, Gudrun; Kamolz, Lars-Peter; Brunner, Gernot

    2018-01-01

    Incident reporting systems or so-called critical incident reporting systems (CIRS) were first recommended for use in health care more than 15 years ago. The uses of these CIRS are highly variable among countries, ranging from being used to report critical incidents, falls, or sentinel events resulting in death. In Austria, CIRS have only been introduced to the health care sector relatively recently. The goal of this work, therefore, was to determine whether and specifically how CIRS are used in Austria. A working group from the Austrian Society for Quality and Safety in Healthcare (ASQS) developed a survey on the topic of CIRS to collect information on penetration of CIRS in general and on how CIRS reports are used to increase patient safety. Three hundred seventy-one health care professionals from 274 health care facilities were contacted via e-mail. Seventy-eight respondents (21.0%) completed the online survey, thereof 66 from hospitals and 12 from other facilities (outpatient clinics, nursing homes). In all, 64.1% of the respondents indicated that CIRS were used in the entire health care facility; 20.6% had not yet introduced CIRS and 15.4% used CIRS only in particular areas. Most often, critical incidents without any harm to patients were reported (76.9%); however, some health care facilities also use their CIRS to report patient falls (16.7%), needle stick injuries (17.9%), technical problems (51.3%), or critical incidents involving health care professionals. CIRS are not yet extensively or homogeneously used in Austria. Inconsistencies exist with respect to which events are reported as well as how they are followed up and reported to health care professionals. Further recommendations for general use are needed to support the dissemination in Austrian health care environments.

  13. Detection of HPV16 in Esophageal Cancer in a High-Incidence Region of Malawi.

    Science.gov (United States)

    Geßner, Anja Lidwina; Borkowetz, Angelika; Baier, Michael; Göhlert, Angela; Wilhelm, Torsten J; Thumbs, Alexander; Borgstein, Eric; Jansen, Lars; Beer, Katrin; Mothes, Henning; Dürst, Matthias

    2018-02-12

    This study was designed to explore the role of human papillomavirus (HPV) in esophageal squamous cell carcinoma (ESCC). Fifty-five patients receiving diagnostic upper gastrointestinal endoscopy at Zomba Central Hospital or Queen Elizabeth Hospital in Blantyre (Malawi) in 2010, were included in our study. Formalin-fixed paraffin-embedded biopsies were collected for histopathological diagnosis. HPV DNA was detected using multiplex Quantitative PCR (qPCR) and in situ hybridization (ISH). p16 INK4a staining served as a surrogate marker for HPV oncogene activity. Cell proliferation was determined by Ki-67 staining. Human immunodeficiency virus (HIV) status was evaluated by serology. Data on the consumption of alcohol and tobacco, and history of tuberculosis (TBC), oral thrush, and Herpes zoster, were obtained by questionnaire. Forty patients displayed ESCC, three displayed dysplastic epithelium, and 12 displayed normal epithelium. HPV16 was detected in six ESCC specimens and in one dysplastic lesion. Among HPV-positive patients, viral load varied from 0.001 to 2.5 copies per tumor cell. HPV DNA presence could not be confirmed by ISH. p16 INK4a positivity correlated with the presence of HPV DNA ( p = 0.03). Of particular note is that the Ki-67 proliferation index, in areas with diffuse nuclear or cytoplasmatic p16 INK4a staining ≥50%, was significantly higher in HPV-positive tumors compared to the corresponding p16 INK4a stained areas of HPV-negative tumors ( p = 0.004). HPV infection in ESCC was not associated with the consumption of tobacco or alcohol, but there were significantly more patients drinking locally brewed alcohol among HPV-positive tumor patients compared to non-tumor patients ( p = 0.02) and compared to HPV-negative tumor patients ( p = 0.047). There was no association between HIV infection, history of TBC, Herpes zoster, oral thrush, or HPV infection, in ESCC patients. Our indirect evidence for viral oncogene activity is restricted to single tumor cell

  14. Detection of HPV16 in Esophageal Cancer in a High-Incidence Region of Malawi

    Directory of Open Access Journals (Sweden)

    Anja Lidwina Geßner

    2018-02-01

    Full Text Available This study was designed to explore the role of human papillomavirus (HPV in esophageal squamous cell carcinoma (ESCC. Fifty-five patients receiving diagnostic upper gastrointestinal endoscopy at Zomba Central Hospital or Queen Elizabeth Hospital in Blantyre (Malawi in 2010, were included in our study. Formalin-fixed paraffin-embedded biopsies were collected for histopathological diagnosis. HPV DNA was detected using multiplex Quantitative PCR (qPCR and in situ hybridization (ISH. p16INK4a staining served as a surrogate marker for HPV oncogene activity. Cell proliferation was determined by Ki-67 staining. Human immunodeficiency virus (HIV status was evaluated by serology. Data on the consumption of alcohol and tobacco, and history of tuberculosis (TBC, oral thrush, and Herpes zoster, were obtained by questionnaire. Forty patients displayed ESCC, three displayed dysplastic epithelium, and 12 displayed normal epithelium. HPV16 was detected in six ESCC specimens and in one dysplastic lesion. Among HPV-positive patients, viral load varied from 0.001 to 2.5 copies per tumor cell. HPV DNA presence could not be confirmed by ISH. p16INK4a positivity correlated with the presence of HPV DNA (p = 0.03. Of particular note is that the Ki-67 proliferation index, in areas with diffuse nuclear or cytoplasmatic p16INK4a staining ≥50%, was significantly higher in HPV-positive tumors compared to the corresponding p16INK4a stained areas of HPV-negative tumors (p = 0.004. HPV infection in ESCC was not associated with the consumption of tobacco or alcohol, but there were significantly more patients drinking locally brewed alcohol among HPV-positive tumor patients compared to non-tumor patients (p = 0.02 and compared to HPV-negative tumor patients (p = 0.047. There was no association between HIV infection, history of TBC, Herpes zoster, oral thrush, or HPV infection, in ESCC patients. Our indirect evidence for viral oncogene activity is restricted to single tumor

  15. Study for the development of a standardized system of incidents in radiotherapy

    International Nuclear Information System (INIS)

    Ribeiro, A.LC.; Silva, A.L. da; Moreira, J.G.R.; Silva, K.R.R. da

    2017-01-01

    Radiotherapy is a modality that, along with surgery, has become essential for the success of cancer treatment. Over the years, radiotherapy has been improved to increase the effectiveness of the chances of cure. The objective of this study was to capture data from on-site visits in two clinics that offer the radiotherapy service in the state of Rio de Janeiro. After observing that each clinic had similar procedures, however, with some different methods and in view of these data obtained, a model was developed for an institutional system of incident record with the purpose of sharing results to assist in the improvement of safety protocols to mitigate possible accidents in one or more units. We conclude that this system has everything to fulfill the proposal of assisting in learning incidents. However, it is primary and updates will be of utmost importance for your improvement

  16. Theory and analysis of a large field polarization imaging system with obliquely incident light.

    Science.gov (United States)

    Lu, Xiaotian; Jin, Weiqi; Li, Li; Wang, Xia; Qiu, Su; Liu, Jing

    2018-02-05

    Polarization imaging technology provides information about not only the irradiance of a target but also the polarization degree and angle of polarization, which indicates extensive application potential. However, polarization imaging theory is based on paraxial optics. When a beam of obliquely incident light passes an analyser, the direction of light propagation is not perpendicular to the surface of the analyser and the applicability of the traditional paraxial optical polarization imaging theory is challenged. This paper investigates a theoretical model of a polarization imaging system with obliquely incident light and establishes a polarization imaging transmission model with a large field of obliquely incident light. In an imaging experiment with an integrating sphere light source and rotatable polarizer, the polarization imaging transmission model is verified and analysed for two cases of natural light and linearly polarized light incidence. Although the results indicate that the theoretical model is consistent with the experimental results, the theoretical model distinctly differs from the traditional paraxial approximation model. The results prove the accuracy and necessity of the theoretical model and the theoretical guiding significance for theoretical and systematic research of large field polarization imaging.

  17. Patient safety is improved with an incident learning system-Clinical evidence in brachytherapy.

    Science.gov (United States)

    Deufel, Christopher L; McLemore, Luke B; de Los Santos, Luis E Fong; Classic, Kelly L; Park, Sean S; Furutani, Keith M

    2017-10-01

    Health leaders have advocated for incident learning systems (ILSs) to prevent errors, but there is limited evidence demonstrating that ILSs improve cancer patient safety. Herein, we report a long-term retrospective review of ILS reports for the brachytherapy practice at a large academic institution. Over a nine-year period, the brachytherapy practice was encouraged to report all standard operating procedure deviations, including low risk deviations. A multidisciplinary committee assigned root causes and risk scores to all incidents. Evidence based practice changes were made using ILS data, and relevant incidents were communicated to all staff in order to reduce recurrence rates. 5258 brachytherapy procedures were performed and 2238 incidents were reported from 2007 to 2015. A ramp-up period was observed in ILS participation between 2007 (0.12 submissions/procedures) and 2011 (1.55 submissions/procedures). Participation remained stable between 2011 and 2015, and we achieved a 60% (psafety policy and a 70% (ppatient care. Safety improvements have been sustained over several years. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  18. Incidence, clinical features, treatment and outcome of primary central nervous system lymphoma in Norway.

    Science.gov (United States)

    Salvesen Haldorsen, Ingfrid; Aarseth, Jan Harald; Hollender, Aase; Larsen, John Ludvig; Espeland, Ansgar; Mella, Olav

    2004-01-01

    The incidence of primary central nervous system lymphoma (PCNSL) has been reported to increase in some parts of the world, while being stable in other regions. In an attempt to characterize the incidence rate, clinical features, treatment, outcome, and prognostic factors of PCNSL in Norway, we report our experience in a large unselected series of patients. Clinical features, histological diagnosis, radiological findings, treatment, and outcome of all patients diagnosed with PCNSL in Norway in the years 1989-1998 were registered. During the 10-year period 58 new cases of histologically verified PCNSL were registered in Norway. The annual incidence rate of PCNSL was on average 1.34 cases per million people with a non-significant increasing trend (p=0.069). For patients diagnosed before death (n=45) the estimated survival following histological diagnosis was 55%, 47%, and 23% at 1, 2, and 5 years, respectively. In Cox-regression analysis age, WHO performance status and treatment had independent prognostic impact on survival. In the studied decade, there was a non-significant trend towards increased incidence of PCNSL, perhaps due to increased availability of diagnostic imaging, especially magnetic resonance imaging.

  19. Recovering about 5 km of LHC Beam Vacuum System after Sector 3-4 Incident

    CERN Document Server

    Baglin, Vincent; Jenninger, Berthold; Jimenez, Jose; Mahner, Edgar; Schneider, Gerhard; Sinturel, Alexandre; Vidal, Alexis

    2010-01-01

    During the sec­tor 3-4 incident, the two apertures of the 3 km long cryogenic vacuum sectors of the CERN Large Hadron Collider (LHC) were brutally vented to helium. A systematic visual inspection of the beam pipe revealed the presence of soot, metallic debris and super insulation debris. After four month of cleaning, the beam vacuum system was recovered. This paper describes the tools and methodologies developed during this period, the achieved performances and discusses possible upgrades

  20. Policy Options to Address Crucial Communication Gaps in the Incident Command System

    Science.gov (United States)

    2012-09-01

    federal agencies that were the early adopters. This chapter also discusses the development of the ICS in Australia . The development of the Australian ...ICS is a key parallel to the United States system and the lessons learned from Australia can be applied here. This chapter concludes with incidents...morning. After the full area was surveyed for damage assessment, the number of people left homeless was estimated at close to 10,000, and damage estimates

  1. Fast fault detection for power distribution systems

    OpenAIRE

    Öhrström, Magnus

    2003-01-01

    The main topic of this licentiate thesis is fast faultdetection. The thesis summaries the work performed in theproject“Fast fault detection for distributionsystems”. In the first chapters of the thesis the term“fast”is used in a general manner. The term is laterdefined based upon considerations and conclusions made in thefirst chapters and then related to a specific time. To be able to understand and appreciate why fast faultdetection is necessary, power system faults and theirconsequences ar...

  2. Exploring human error in military aviation flight safety events using post-incident classification systems.

    Science.gov (United States)

    Hooper, Brionny J; O'Hare, David P A

    2013-08-01

    Human error classification systems theoretically allow researchers to analyze postaccident data in an objective and consistent manner. The Human Factors Analysis and Classification System (HFACS) framework is one such practical analysis tool that has been widely used to classify human error in aviation. The Cognitive Error Taxonomy (CET) is another. It has been postulated that the focus on interrelationships within HFACS can facilitate the identification of the underlying causes of pilot error. The CET provides increased granularity at the level of unsafe acts. The aim was to analyze the influence of factors at higher organizational levels on the unsafe acts of front-line operators and to compare the errors of fixed-wing and rotary-wing operations. This study analyzed 288 aircraft incidents involving human error from an Australasian military organization occurring between 2001 and 2008. Action errors accounted for almost twice (44%) the proportion of rotary wing compared to fixed wing (23%) incidents. Both classificatory systems showed significant relationships between precursor factors such as the physical environment, mental and physiological states, crew resource management, training and personal readiness, and skill-based, but not decision-based, acts. The CET analysis showed different predisposing factors for different aspects of skill-based behaviors. Skill-based errors in military operations are more prevalent in rotary wing incidents and are related to higher level supervisory processes in the organization. The Cognitive Error Taxonomy provides increased granularity to HFACS analyses of unsafe acts.

  3. Properties of incident reporting systems in relation to statistical trend and pattern analysis

    International Nuclear Information System (INIS)

    Kalfsbeek, H.W.; Arsenis, S.P.

    1990-01-01

    This paper describes the properties deemed desirable for an incident reporting system in order to render it useful for extracting valid statistical trend and pattern information. The perspective under which a data collection system is seen in this paper is the following: data are essentially gathered on a set of variables describing an event or incident (the items featuring on a reporting format) in order to learn about (multiple) dependencies (called interactions) between these variables. Hence, the necessary features of the data source are highlighted and potential problem sources limiting the validity of the results to be obtained are identified. In this frame, important issues are the reporting completeness, related to the reporting criteria and reporting frequency, and of course the reporting contents and quality. The choice of the report items (the variables) and their categorization (code dictionary) may influence (bias) the insights gained from trend and pattern analyses, as may the presence or absence of a structure for correlating the reported issues within an incident. The issues addressed in this paper are brought in relation to some real world reporting systems on safety related events in Nuclear Power Plants, so that their possibilities and limitations with regard to statistical trend and pattern analysis become manifest

  4. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  5. Method and system for detecting explosives

    Science.gov (United States)

    Reber, Edward L [Idaho Falls, ID; Jewell, James K [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID; Seabury, Edward H [Idaho Falls, ID; Blackwood, Larry G [Idaho Falls, ID; Edwards, Andrew J [Idaho Falls, ID; Derr, Kurt W [Idaho Falls, ID

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  6. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  7. Simulation Model of Mobile Detection Systems

    International Nuclear Information System (INIS)

    Edmunds, T.; Faissol, D.; Yao, Y.

    2009-01-01

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  8. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... space. (b) The fire detection system must be designed to minimize false alarms. ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a...

  9. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  10. Linear systems formulation of scattering theory for rough surfaces with arbitrary incident and scattering angles.

    Science.gov (United States)

    Krywonos, Andrey; Harvey, James E; Choi, Narak

    2011-06-01

    Scattering effects from microtopographic surface roughness are merely nonparaxial diffraction phenomena resulting from random phase variations in the reflected or transmitted wavefront. Rayleigh-Rice, Beckmann-Kirchhoff. or Harvey-Shack surface scatter theories are commonly used to predict surface scatter effects. Smooth-surface and/or paraxial approximations have severely limited the range of applicability of each of the above theoretical treatments. A recent linear systems formulation of nonparaxial scalar diffraction theory applied to surface scatter phenomena resulted first in an empirically modified Beckmann-Kirchhoff surface scatter model, then a generalized Harvey-Shack theory that produces accurate results for rougher surfaces than the Rayleigh-Rice theory and for larger incident and scattered angles than the classical Beckmann-Kirchhoff and the original Harvey-Shack theories. These new developments simplify the analysis and understanding of nonintuitive scattering behavior from rough surfaces illuminated at arbitrary incident angles.

  11. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  12. Optical fiber-applied radiation detection system

    International Nuclear Information System (INIS)

    Nishiura, Ryuichi; Uranaka, Yasuo; Izumi, Nobuyuki

    2001-01-01

    A technique to measure radiation by using plastic scintillation fibers doped radiation fluorescent (scintillator) to plastic optical fiber for a radiation sensor, was developed. The technique contains some superiority such as high flexibility due to using fibers, relatively easy large area due to detecting portion of whole of fibers, and no electromagnetic noise effect due to optical radiation detection and signal transmission. Measurable to wide range of and continuous radiation distribution along optical fiber cable at a testing portion using scintillation fiber and flight time method, the optical fiber-applied radiation sensing system can effectively monitor space radiation dose or apparatus operation condition monitoring. And, a portable type scintillation optical fiber body surface pollution monitor can measure pollution concentration of radioactive materials attached onto body surface by arranging scintillation fiber processed to a plate with small size and flexibility around a man to be tested. Here were described on outline and fundamental properties of various application products using these plastic scintillation fiber. (G.K.)

  13. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  14. Distributed gas detection system and method

    Science.gov (United States)

    Challener, William Albert; Palit, Sabarni; Karp, Jason Harris; Kasten, Ansas Matthias; Choudhury, Niloy

    2017-11-21

    A distributed gas detection system includes one or more hollow core fibers disposed in different locations, one or more solid core fibers optically coupled with the one or more hollow core fibers and configured to receive light of one or more wavelengths from a light source, and an interrogator device configured to receive at least some of the light propagating through the one or more solid core fibers and the one or more hollow core fibers. The interrogator device is configured to identify a location of a presence of a gas-of-interest by examining absorption of at least one of the wavelengths of the light at least one of the hollow core fibers.

  15. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  16. Systems and methods for detecting neutrons

    Science.gov (United States)

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  17. Decision algorithms in fire detection systems

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2011-01-01

    Full Text Available Analogue (and addressable fire detection systems enables a new quality in improving sensitivity to real fires and reducing susceptibility to nuisance alarm sources. Different decision algorithms types were developed with intention to improve sensitivity and reduce false alarm occurrence. At the beginning, it was free alarm level adjustment based on preset level. Majority of multi-criteria decision work was based on multi-sensor (multi-signature decision algorithms - using different type of sensors on the same location or, rather, using different aspects (level and rise of one sensor measured value. Our idea is to improve sensitivity and reduce false alarm occurrence by forming groups of sensors that work in similar conditions (same world side in the building, same or similar technology or working time. Original multi-criteria decision algorithms based on level, rise and difference of level and rise from group average are discussed in this paper.

  18. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  19. Incidence Rate of Concomitant Systemic Diseases in the Aging Population with Postmenopausal Osteoporosis

    Directory of Open Access Journals (Sweden)

    Selçuk Sayılır

    2016-08-01

    Full Text Available Objective: To evaluate the concomitant systemic diseases with postmenopausal osteoporosis and to investigate the points to be considered in treatment approach of patients with osteoporosis. Materials and Methods: The study included 110 female patients admitted to our clinic and followed up after postmenopausal osteoporosis diagnosis. Besides the demographic data; the concomitant diseases of the patients such as hypertension, hypo-hyperthyroidism, diabetes mellitus, Alzheimer’s disease, malignancy, osteoarthritis, gastrointestinal system diseases, chronic obstructive pulmonary disease (COPD- asthma and depression were also recorded. Results: The mean age of the patients included in our study was 65.9±9.8 years. When the concomitant systemic diseases were examined; 40 patients had hypertension, 32 patients had osteoarthritis, 24 patients had gastrointestinal tract problems, 22 patients had thyroid disease, 21 patients had depression, 15 patients had hyperlipidemia, 12 patients had diabetes mellitus, 10 patients had COPD - asthma, 7 patients had cardiac diseases, 5 patients had malignancy and 2 patients had Alzheimer disease. Conclusion: Osteoporosis is a common disease in the geriatric population. As a chronic disease with an increasing incidence with aging; it can cause many health problems, prevalently pathological bone fractures, in our country and all over the world. Constitutively, prophylaxis of osteoporosis should be the first step. Because systemic diseases with increasing incidence with aging may affect the severity of osteoporosis and impair the treatment; it is important for both clinicians and the society to have sufficient information about osteoporosis.

  20. IAEA/NEA Fuel Incident Notification and Analysis System (FINAS) guidelines

    International Nuclear Information System (INIS)

    2006-01-01

    The Fuel Incident Notification and Analysis System (FINAS) is an international system jointly operated by the International Atomic Energy Agency (IAEA) and the Nuclear Energy Agency of the Organisation for Economic Cooperation and Development (OECD/NEA). The fundamental objective of FINAS is to contribute to improving the safety of fuel cycle facilities, which are operated worldwide. This objective can be achieved by providing timely and detailed information on both technical and human factors related to events of safety significance, which occur at these facilities. The purpose of these guidelines, which supersede the previous NEA FINAS guidelines is to describe the system and to give users the necessary background and guidance to enable them to produce FINAS reports meeting a high standard of quality while retaining the high efficiency of the system expected by all Member States operating FCFs. These guidelines have been jointly developed and approved by the NEA/IAEA

  1. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  2. Information Capacity of Direct Detection Optical Transmission Systems

    Science.gov (United States)

    Mecozzi, Antonio; Shtaif, Mark

    2018-02-01

    We show that the spectral efficiency of a direct detection transmission system is at most 1 bit/s/Hz less than the spectral efficiency of a system employing coherent detection with the same modulation format. Correspondingly, the capacity per complex degree of freedom in systems using direct detection is lower by at most 1 bit.

  3. Application examples of the reports of the NEA Incident Reporting System of the OECD and evolution of the system

    International Nuclear Information System (INIS)

    Libmann, J.

    1989-06-01

    Some reports of the work group no. 1 of the Nuclear Installations Security Committee of NEA, are summarized. An example of the report coding system concerning human factors, is given. The aim of the study is to improve the report contents as well as the coding system. In this case, a fast data selection is possible, and allows an efficient analysis of a particular situation. Moreover, the corrective procedures of the nuclear installation conception or operation can be easily modified, by the national organisations. Due to the improvements in quality, the opinion of the member countries on the incident reporting systems efficiency was enhanced [fr

  4. SU-F-T-223: Radiotherapy Incident Reporting and Analysis System (RIRAS):Early Experience

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [National Radiation Oncology Program (10P4H), Dept. of Veterans Affairs, Richmond, VA (United States); Burkett, D; Leidholdt, E [National Health Physics Program (10P4X), Dept. of Veterans Affairs, Little Rock, AR (United States)

    2016-06-15

    Background & Purpose: RIRAS is a web-based information system deployed on the Veterans Health Administration intranet in early 2014 to collect adverse events and good catch data; analyze the causes and contributing factors; and find ways to prevent future occurrences. Material and Methods: Incident learning consists of a feedback loop which starts with reporting an event, followed by analysis of contributing factors, and culminates in the development of a patient safety work product (PSWP) to prevent recurrence. RIRAS permits both anonymous and non-anonymous reporting. Each report is analyzed by a team of medical physicists who are independent of the reporting facility. The analysts usually contact the reporting facilities for additional information. We analyzed all reports and held telephonic interviews (when necessary) with the reporters. We then generated PSWPs with corrective/preventive and learning actions. Anonymous reporting is handled in the same manner, except without the ability to further interview the reporter. Results: In a significant number of reports, the causes and recommended preventive actions were considerably altered by the independent analysis and additional information from the facility. 130 reports have been entered in RIRAS; 9 misadministrations, 83 good catches, 3 anonymous good catches, and 35 earlier reported incidents from FY2005-14. 45% of the reported incidents occurred in the treatment delivery stages, 19% in on-treatment management, and 16% in pre-treatment verification. 80% of the good catches were found in the treatment delivery workflow. Majority of these incidents were due to inconsistent patient setup instructions or documentation, nonadherence to policies and procedures, lax time-out policy, distracted RTTs, and inadequate RTT staffing. Conclusion: RIRAS has identified many areas for improvement and elevated the quality and safety of radiation treatments in the VHA. We found that the ability to learn is significantly

  5. Incidence and predictors of urotoxic adverse events in cyclophosphamide-treated patients with systemic necrotizing vasculitides.

    Science.gov (United States)

    Le Guenno, Guillaume; Mahr, Alfred; Pagnoux, Christian; Dhote, Robin; Guillevin, Loïc

    2011-05-01

    To assess hemorrhagic cystitis and urinary tract cancer incidence and predictors in cyclophosphamide (CYC)-treated patients with systemic necrotizing vasculitis (SNV). The French Vasculitis Study Group database, which contains longitudinal data on SNV patients, was searched for urinary tract cancer and/or hemorrhagic cystitis occurrences in patients diagnosed as having Wegener's granulomatosis (WG), microscopic polyangiitis, Churg-Strauss syndrome, or polyarteritis nodosa. The observed incidence of urinary tract cancer was compared to the expected incidence in the general population by calculating standardized incidence ratios (SIRs). Relationships between urinary tract cancer and/or hemorrhagic cystitis and 10 variables, including CYC dosage and administration route, were investigated by survival analyses for a nested subgroup of patients for whom detailed information on CYC exposure was available. Among the 805 patients observed over 4,230 patient-years (mean followup 5.3 years), 22 cases of hemorrhagic cystitis and 7 of urinary tract cancer were identified in 27 patients. The SIRs for urinary tract cancer were 5.00 for all patients with SNV (P = 0.001) and 5.96 for patients with WG (P = 0.03). Based on 467 patients with detailed CYC information, cumulative CYC dose (hazard ratio [HR] for 10-gm increments 1.09; P = 0.03), ever-oral CYC administration (HR 5.50; P = 0.001), and WG (HR 2.96; P = 0.01) independently predicted urinary tract cancer and/or hemorrhagic cystitis. According to univariate analyses, smoking (ever) (HR 8.20; P = 0.02) and a prior hemorrhagic cystitis episode (HR 5.20; P = 0.046) significantly predicted urinary tract cancer. Our findings indicate that CYC treatment of SNV is associated with a 5-fold higher risk of developing urinary tract cancer. Urotoxicity risk in SNV is associated with the cumulative CYC dose and its oral administration, and might be higher in WG. Copyright © 2011 by the American College of Rheumatology.

  6. International recommendations for national patient safety incident reporting systems: an expert Delphi consensus-building process.

    Science.gov (United States)

    Howell, Ann-Marie; Burns, Elaine M; Hull, Louise; Mayer, Erik; Sevdalis, Nick; Darzi, Ara

    2017-02-01

    Patient safety incident reporting systems (PSRS) have been established for over a decade, but uncertainty remains regarding the role that they can and ought to play in quantifying healthcare-related harm and improving care. To establish international, expert consensus on the purpose of PSRS regarding monitoring and learning from incidents and developing recommendations for their future role. After a scoping review of the literature, semi-structured interviews with experts in PSRS were conducted. Based on these findings, a survey-based questionnaire was developed and subsequently completed by a larger expert panel. Using a Delphi approach, consensus was reached regarding the ideal role of PSRSs. Recommendations for best practice were devised. Forty recommendations emerged from the Delphi procedure on the role and use of PSRS. Experts agreed reporting system should not be used as an epidemiological tool to monitor the rate of harm over time or to appraise the relative safety of hospitals. They agreed reporting is a valuable mechanism for identifying organisational safety needs. The benefit of a national system was clear with respect to medication error, device failures, hospital-acquired infections and never events as these problems often require solutions at a national level. Experts recommended training for senior healthcare professionals in incident investigation. Consensus recommendation was for hospitals to take responsibility for creating safety solutions locally that could be shared nationally. We obtained reasonable consensus among experts on aims and specifications of PSRS. This information can be used to reflect on existing and future PSRS, and their role within the wider patient safety landscape. The role of PSRS as instruments for learning needs to be elaborated and developed further internationally. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  7. The Development of Power Detection System Using One-Chip Microcontroller

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Sa Hyun; Choi, Nkak II; Lee, Sung Kil; Lim, Yang Su; Cho Geum Bae; Baek, Hyung Lae [Chosun University, Kwangju(Korea)

    2002-04-01

    This paper describes on the development of power detection system with one-chop microcontroller. The designed system is composed of power detection circuits and analyzing software. The system detects 3-phases voltage, 3-phases current, external temperature, leakage current and stores in flash memory AT89C52 was used as CPU and AM29F040 was used as memory to store the data. The analysis software was developed to detect the cause of the electrical fire incidents. With a data-compression technology, the data can be stored for the 43.5 days in a normal state, four hours and fifteen minutes in emergency state. (author). 7 refs., 22 figs., 2 tabs.

  8. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  9. Distributed Impact Detection System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  10. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  11. The hospital incident command system: modified model for hospitals in iran.

    Science.gov (United States)

    Djalali, Ahmadreza; Hosseinijenab, Vahid; Peyravi, Mahmoudreza; Nekoei-Moghadam, Mahmood; Hosseini, Bashir; Schoenthal, Lisa; Koenig, Kristi L

    2015-03-27

    Effectiveness of hospital management of disasters requires a well-defined and rehearsed system. The Hospital Incident Command System (HICS), as a standardized method for command and control, was established in Iranian hospitals, but it has performed fairly during disaster exercises. This paper describes the process for, and modifications to HICS undertaken to optimize disaster management in hospitals in Iran. In 2013, a group of 11 subject matter experts participated in an expert consensus modified Delphi to develop modifications to the 2006 version of HICS. The following changes were recommended by the expert panel and subsequently implemented: 1) A Quality Control Officer was added to the Command group; 2) Security was defined as a new section; 3) Infrastructure and Business Continuity Branches were moved from the Operations Section to the Logistics and the Administration Sections, respectively; and 4) the Planning Section was merged within the Finance/Administration Section. An expert consensus group developed a modified HICS that is more feasible to implement given the managerial organization of hospitals in Iran. This new model may enhance hospital performance in managing disasters. Additional studies are needed to test the feasibility and efficacy of the modified HICS in Iran, both during simulations and actual disasters. This process may be a useful model for other countries desiring to improve disaster incident management systems for their hospitals.

  12. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  13. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  14. Planet Detectability in the Alpha Centauri System

    Science.gov (United States)

    Zhao, Lily; Fischer, Debra A.; Brewer, John; Giguere, Matt; Rojas-Ayala, Bárbara

    2018-01-01

    We use more than a decade of radial-velocity measurements for α {Cen} A, B, and Proxima Centauri from the High Accuracy Radial Velocity Planet Searcher, CTIO High Resolution Spectrograph, and the Ultraviolet and Visual Echelle Spectrograph to identify the M\\sin i and orbital periods of planets that could have been detected if they existed. At each point in a mass–period grid, we sample a simulated, Keplerian signal with the precision and cadence of existing data and assess the probability that the signal could have been produced by noise alone. Existing data places detection thresholds in the classically defined habitable zones at about M\\sin i of 53 {M}\\oplus for α {Cen} A, 8.4 {M}\\oplus for α {Cen} B, and 0.47 {M}\\oplus for Proxima Centauri. Additionally, we examine the impact of systematic errors, or “red noise” in the data. A comparison of white- and red-noise simulations highlights quasi-periodic variability in the radial velocities that may be caused by systematic errors, photospheric velocity signals, or planetary signals. For example, the red-noise simulations show a peak above white-noise simulations at the period of Proxima Centauri b. We also carry out a spectroscopic analysis of the chemical composition of the α {Centauri} stars. The stars have super-solar metallicity with ratios of C/O and Mg/Si that are similar to the Sun, suggesting that any small planets in the α {Cen} system may be compositionally similar to our terrestrial planets. Although the small projected separation of α {Cen} A and B currently hampers extreme-precision radial-velocity measurements, the angular separation is now increasing. By 2019, α {Cen} A and B will be ideal targets for renewed Doppler planet surveys.

  15. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  16. A remotely piloted aircraft system in major incident management: concept and pilot, feasibility study.

    Science.gov (United States)

    Abrahamsen, Håkon B

    2015-06-10

    Major incidents are complex, dynamic and bewildering task environments characterised by simultaneous, rapidly changing events, uncertainty and ill-structured problems. Efficient management, communication, decision-making and allocation of scarce medical resources at the chaotic scene of a major incident is challenging and often relies on sparse information and data. Communication and information sharing is primarily voice-to-voice through phone or radio on specified radio frequencies. Visual cues are abundant and difficult to communicate between teams and team members that are not co-located. The aim was to assess the concept and feasibility of using a remotely piloted aircraft (RPA) system to support remote sensing in simulated major incident exercises. We carried out an experimental, pilot feasibility study. A custom-made, remotely controlled, multirotor unmanned aerial vehicle with vertical take-off and landing was equipped with digital colour- and thermal imaging cameras, a laser beam, a mechanical gripper arm and an avalanche transceiver. We collected data in five simulated exercises: 1) mass casualty traffic accident, 2) mountain rescue, 3) avalanche with buried victims, 4) fisherman through thin ice and 5) search for casualties in the dark. The unmanned aerial vehicle was remotely controlled, with high precision, in close proximity to air space obstacles at very low levels without compromising work on the ground. Payload capacity and tolerance to wind and turbulence were limited. Aerial video, shot from different altitudes, and remote aerial avalanche beacon search were streamed wirelessly in real time to a monitor at a ground base. Electromagnetic interference disturbed signal reception in the ground monitor. A small remotely piloted aircraft can be used as an effective tool carrier, although limited by its payload capacity, wind speed and flight endurance. Remote sensing using already existing remotely piloted aircraft technology in pre

  17. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  18. Endotoxemia, immune response to periodontal pathogens, and systemic inflammation associate with incident cardiovascular disease events.

    Science.gov (United States)

    Pussinen, Pirkko J; Tuomisto, Karolina; Jousilahti, Pekka; Havulinna, Aki S; Sundvall, Jouko; Salomaa, Veikko

    2007-06-01

    In periodontitis, overgrowth of gram-negative bacteria may cause endotoxemia and systemic inflammation leading to cardiovascular diseases (CVD). We investigated in a prospective study the associations of serum endotoxin, antibodies to periodontal pathogens, and inflammation markers with the risk of incident CVD. The FINRISK 1992 cohort of 6051 individuals was followed up for 10 years. We examined 185 incident CVD events and a control cohort of 320 individuals using a prospective case-cohort design. High antibody response to periodontal pathogens independently predicted incident CVD events with hazard ratios (HR, quartile 4 versus quartiles 1 to 3, 95% CI) of 1.87 (1.13 to 3.08). The subjects with a high antibody response and high CRP or interleukin (IL)-6 had multivariate-adjusted HRs of 3.01 (1.27 to 7.09) and 3.11 (1.42 to 6.83) compared with low-responders, respectively. The corresponding HRs for high endotoxin concentration were 1.82 (1.22 to 2.73, alone), 3.92 (1.99 to 7.74, with CRP), 3.54 (1.78 to 7.03, with IL-6), and 2.26 (1.13 to 4.52, with tumor necrosis factor (TNF)-alpha) after adjusting for age and gender. These associations were abolished after adjusting for serum lipids. High endotoxin/HDL ratio, however, had a multivariate-adjusted HR of 1.92 (1.19 to 3.08) for CVD events. Our results suggest that the exposure to periodontal pathogens or endotoxin induces systemic inflammation leading to increased risk for CVD.

  19. Results of the implementation of a learning system with incidents in an radiotherapy department; Resultados da implementacao de um sistema de aprendizagem com incidentes em um Departamento de Radioterapia

    Energy Technology Data Exchange (ETDEWEB)

    Radicchi, Lucas Augusto; Vilela, Ellen Pedroso Severino; Faustino, Fabio de Lima C.; Rodrigues, Fernanda Arantes C.; Gomes, Franciele N.; Souza, Guilherme Vicente de; Silva, Rose Marta S. [Hospital de Cancer de Barretos, SP (Brazil); Toledo, Jose Carlos de [Universidade Federal de Sao Carlos (UFSCar), SP (Brazil)

    2016-07-01

    An incident learning system (ILS) is an important tool for improving aspects of patient and staff safety. In radiation oncology, ILS has been implemented both at the institutional level as at the national level, allowing to share lessons learned from incidents that have already occurred. The objective of this study is to present the preliminary results of the ILS implemented in a radiation oncology department. In total, 128 incidents were reviewed by a multidisciplinary committee, and the professional groups that registered more were medical physicists, radiation oncologists and radiation therapists. In addition, incidents have occurred and have been detected mainly in the treatment step. The incident learning system proved to be an important process improvement tool, according to the results shown,the improvement actions proposed and the perception of the people involved. (author)

  20. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the Atmospheric Environment Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This study analyzed aircraft incidents in the NASA Aviation Safety Reporting System (ASRS) that apply to two of the three technical challenges (TCs) in NASA's Aviation Safety Program's Atmospheric Environment Safety Technology Project. The aircraft incidents are related to airframe icing and atmospheric hazards TCs. The study reviewed incidents that listed their primary problem as weather or environment-nonweather between 1994 and 2011 for aircraft defined by Federal Aviation Regulations (FAR) Parts 121, 135, and 91. The study investigated the phases of flight, a variety of anomalies, flight conditions, and incidents by FAR part, along with other categories. The first part of the analysis focused on airframe-icing-related incidents and found 275 incidents out of 3526 weather-related incidents over the 18-yr period. The second portion of the study focused on atmospheric hazards and found 4647 incidents over the same time period. Atmospheric hazards-related incidents included a range of conditions from clear air turbulence and wake vortex, to controlled flight toward terrain, ground encounters, and incursions.

  1. Creating European guidelines for Chiropractic Incident Reporting and Learning Systems (CIRLS: relevance and structure

    Directory of Open Access Journals (Sweden)

    Wangler Martin

    2011-04-01

    Full Text Available Abstract Background In 2009, the heads of the Executive Council of the European Chiropractors' Union (ECU and the European Academy of Chiropractic (EAC involved in the European Committee for Standardization (CEN process for the chiropractic profession, set out to establish European guidelines for the reporting of adverse reactions to chiropractic treatment. There were a number of reasons for this: first, to improve the overall quality of patient care by aiming to reduce the application of potentially harmful interventions and to facilitate the treatment of patients within the context of achieving maximum benefit with a minimum risk of harm; second, to inform the training objectives for the Graduate Education and Continuing Professional Development programmes of all 19 ECU member nations, regarding knowledge and skills to be acquired for maximising patient safety; and third, to develop a guideline on patient safety incident reporting as it is likely to be part of future CEN standards for ECU member nations. Objective To introduce patient safety incident reporting within the context of chiropractic practice in Europe and to help individual countries and their national professional associations to develop or improve reporting and learning systems. Discussion Providing health care of any kind, including the provision of chiropractic treatment, can be a complex and, at times, a risky activity. Safety in healthcare cannot be guaranteed, it can only be improved. One of the most important aspects of any learning and reporting system lies in the appropriate use of the data and information it gathers. Reporting should not just be seen as a vehicle for obtaining information on patient safety issues, but also be utilised as a tool to facilitate learning, advance quality improvement and to ultimately minimise the rate of the occurrence of errors linked to patient care. Conclusions Before a reporting and learning system can be established it has to be clear

  2. Abdominal wall injuries occurring after blunt trauma: incidence and grading system.

    Science.gov (United States)

    Dennis, Ryan W; Marshall, Andre; Deshmukh, Harshal; Bender, Jeffrey S; Kulvatunyou, Narong; Lees, Jason S; Albrecht, Roxie M

    2009-03-01

    Traumatic abdominal wall injuries (AWIs) are being increasingly recognized after blunt force injury. All available abdominal/pelvic computed axial tomography (CAT) scans of blunt trauma patients evaluated at our level I trauma center from January 2005 to August 2006 were reviewed for the presence of AWI. AWI was graded using a severity-based numeric system. AWI grade was then compared with variables from a prospectively maintained trauma registry. Of 1,549 reviewed CAT scans, 9% showed AWI (grade I = 53%, grade II = 28%, grade III = 9%, grade IV = 8%, and grade V = 2%). There was no association between AWI and seatbelt use, Injury Severity Score, weight, or need for abdominal surgery. AWI occurs in 9% of blunt trauma patients undergoing abdominal/pelvic CAT scans. The incidence of herniation on CAT at presentation after blunt trauma is .2%, and the incidence of patients at risk of future hernia formation is 1.5%. AWI can be effectively cataloged using a straightforward numeric grading system.

  3. On the Appropriateness of Incident Management Systems in Developing Countries: A Case from the UAE

    Directory of Open Access Journals (Sweden)

    Faouzi Kamoun

    2010-12-01

    Full Text Available Road traffic incidents are eliciting growing public concerns due to their devastating social, economical, and environmental impacts. The severity of these random events is particularly alarming in developing countries, where the situation is just worsening. Recently, Incident Management Systems (IMSs have been proposed as powerful tools to enhance the coordination and management of rescue operations during traffic accidents. However, most of the available commercial IMS solutions are designed for large metropolitan cities and within the contexts of developed nations. This paper explores the issues of appropriateness and customization of IMS solutions in developing countries through an exploratory inquiry consisting of a case study from the United Arab Emirates (UAE. The paper also explores the important issues related to managing the organizational changes that an IMS introduces to the operations of the command and control room. This contribution calls for the development of more comprehensive theoretical frameworks that can guide towards the implementation of appropriate IMS solutions in developing countries. Our research highlights the need for developing countries to acquire appropriate IMS solutions that are tailored to the local organizational work context in which these systems will be used. The experience reported herein can also inspire other public safety agencies in developing countries to consider the option of developing customized IMS solutions that best suit their needs.

  4. The Incidence of Lesions of Different Systems and Organs in Children with Gastroesophageal Reflux Disease

    Directory of Open Access Journals (Sweden)

    O.Z. Gnateyko

    2016-09-01

    Full Text Available Introduction. Gastroesophageal reflux disease (GERD — a chronic recurrent disease caused by the disturbances of the motor-evacuating function of the gastroesophageal zone and is characterized by spontaneous and/or regular reflux of the gastric or duodenal fluid that leads to the damage of the distal part of the esophagus. GERD is one of the most frequent diseases that affect the esophagus. Taking into the account the huge amount of the causes, which may lead to GERD, its etiology is still not well defined, and the contribution of each factor requires further analysis. The aim of the study was to analyze the peculiarities and the incidence of GERD association with other organ and system pathologies.Materials and methods. Clinical analysis of 73 cases of GERD in school-aged children has been performed. The incidence of GERD combination with other system and organ pathologies has been evaluated using thorough anamnesis and patient’s medical history analysis. Results. In 66 % of children with GERD, the association of this pathology with other digestive tract diseases has been revealed, in 50.7 % — with lesions of musculoskeletal system, in 12.3 % — with urinary tract pathology. Almost one third of children with GERD suffered from congenital defects of different organs and systems, such as dolichosigmoid, mitral valve prolapse, nephroptosis/rotation of the kidneys/pyelectasis/bladder-pelvic reflux, gallbladder deformities. The article presents the analysis of a clinical case of the combination of cardiovascular, digestive and urinary lesions that enables us to assume the presence of possible common etiology factor of the diagnosed diseases. The analyzed data regarding the association of GERD with other organ and system pathologies, as well as the results of other research groups indicate a probable common component in their etiology. The common factor in the described cases of the combination of pathologies may be a violation of the

  5. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  6. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  7. An Immunity-Based Anomaly Detection System with Sensor Agents

    Directory of Open Access Journals (Sweden)

    Yoshiteru Ishida

    2009-11-01

    Full Text Available This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user’s command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  8. An immunity-based anomaly detection system with sensor agents.

    Science.gov (United States)

    Okamoto, Takeshi; Ishida, Yoshiteru

    2009-01-01

    This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user's command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  9. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  10. Mathematical model as means of optimization of the automation system of the process of incidents of information security management

    Directory of Open Access Journals (Sweden)

    Yulia G. Krasnozhon

    2018-03-01

    Full Text Available Modern information technologies have an increasing importance for development dynamics and management structure of an enterprise. The management efficiency of implementation of modern information technologies directly related to the quality of information security incident management. However, issues of assessment of the impact of information security incidents management on quality and efficiency of the enterprise management system are not sufficiently highlighted neither in Russian nor in foreign literature. The main direction to approach these problems is the optimization of the process automation system of the information security incident management. Today a special attention is paid to IT-technologies while dealing with information security incidents at mission-critical facilities in Russian Federation such as the Federal Tax Service of Russia (FTS. It is proposed to use the mathematical apparatus of queueing theory in order to build a mathematical model of the system optimization. The developed model allows to estimate quality of the management taking into account the rules and restrictions imposed on the system by the effects of information security incidents. Here an example is given in order to demonstrate the system in work. The obtained statistical data are shown. An implementation of the system discussed here will improve the quality of the Russian FTS services and make responses to information security incidents faster.

  11. Influence of commercial laying hen housing systems on the incidence and identification of Salmonella and Campylobacter.

    Science.gov (United States)

    Jones, D R; Guard, J; Gast, R K; Buhr, R J; Fedorka-Cray, P J; Abdo, Z; Plumblee, J R; Bourassa, D V; Cox, N A; Rigsby, L L; Robison, C I; Regmi, P; Karcher, D M

    2016-05-01

    The housing of laying hens is important for social, industrial, and regulatory aspects. Many studies have compared hen housing systems on the research farm, but few have fully examined commercial housing systems and management strategies. The current study compared hens housed in commercial cage-free aviary, conventional cage, and enriched colony cage systems. Environmental and eggshell pool samples were collected from selected cages/segments of the housing systems throughout the production cycle and monitored for Salmonella and Campylobacter prevalence. At 77 wk of age, 120 hens per housing system were examined for Salmonella and Campylobacter colonization in the: adrenal glands, spleen, ceca, follicles, and upper reproductive tract. All isolates detected from environmental swabs, eggshell pools, and tissues were identified for serotype. Two predominant Salmonella were detected in all samples:S.Braenderup andS.Kentucky.Campylobacter coli and C. jejuni were the only Campylobacter detected in the flocks. Across all housing systems, approximately 7% of hens were colonized with Salmonella, whereas >90% were colonized with Campylobacter Salmonella Braenderup was the isolate most frequently detected in environmental swabs (PCampylobacter jejuni was the isolate most frequently found in environmental swabs (P<0.01), while housing system impacted the prevalence of C. coli and jejuniin ceca (P<0.0001). The results of this study provide a greater understanding of the impact of hen housing systems on hen health and product safety. Additionally, producers and academia can utilize the findings to make informed decisions on hen housing and management strategies to enhance hen health and food safety. Published by Oxford University Press on behalf of Poultry Science Association 2016. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  12. System and method for detecting cells or components thereof

    Science.gov (United States)

    Porter, Marc D [Ames, IA; Lipert, Robert J [Ames, IA; Doyle, Robert T [Ames, IA; Grubisha, Desiree S [Corona, CA; Rahman, Salma [Ames, IA

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  13. Pilot Study for the Creation of a European Union Radiation Accident and Incident Data Exchange System (EURAIDE)

    International Nuclear Information System (INIS)

    Stewart, J.E.; Lefaure, C; Czarwinski, R.

    2004-01-01

    This study has had the objective of evaluating the feasibility of: (i) facilitating the establishment of national radiation accident and incident databases where there are none and to encourage the compatibility of such databases, (ii) establishing a European network to exchange radiological protection feedback from accidents and incidents, (iii) establishing summary reports of relevant accidents and incidents with the aim of identifying lessons to be learned, so that they can be used in radiation protection training programs, and (iv) upgrading the radiological safety in the countries applying to join the EU, by integrating them into the above efficient feedback exchange system. This report details the first stage of the project, which was to review the status of existing (or proposed) national mechanisms for collating data on radiation incidents. The objectives of this initial review were to: i) obtain detailed information regarding the means of capturing and collating data, the format of established or proposed data systems and accessibility of the final data, ii) to use this information to consider how a European platform to gather relevant data/accident reports might be established., and iii) to consider how the various elements of national data systems might be harmonised in order to facilitate the presentation and distribution of lessons learned. It was considered that the key aspects that would need to be addressed in order to determine the feasibility of a European wide data exchange mechanism were: - the criteria used for the classification and categorisation of incidents, - criteria for the selection of incidents from national data systems for inclusion in a European-wide system, - the implication of possible language problems. In order to illicit the required information a detailed questionnaire was sent to a total of 31 countries, being existing European Member States, applicant or associated countries. A full list of the countries and institutions

  14. Blind Leak Detection for Closed Systems

    Science.gov (United States)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  15. Nuclear power plant operating experiences from the IAEA/NEA Incident Reporting System 1999-2002

    International Nuclear Information System (INIS)

    2003-01-01

    Incident reporting has become an increasingly important aspect of the operation and regulation of all public health and safety-related industries. Diverse industries such as aeronautics, chemicals, pharmaceuticals and explosives all depend on operating experience feedback to provide lessons learned about safety. The Incident Reporting System (IRS) is an essential element of the system for feeding back international operating experience for nuclear power plants. IRS reports contain information on events of Safety significance with important lessons learned. These experiences assist in reducing or eliminating recurrence of events at other plants. The IRS is jointly operated and managed by the Nuclear Energy Agency (NEA), a semi-autonomous body within the Organisation for Economic Co-operation and Development (OECD), and the International Atomic Energy Agency (IAEA). It is important that sufficient national resources be allocated to enable timely and high quality reporting of events important to safety, and to share these events in the IRS database. The first report, which covered the period July 1996 - June 1999, was widely acclaimed and encouraged both agencies to prepare this second report in order to highlight important lessons learned from around 300 events reported to the IRS for the period July 1999 - December 2002. Several areas were selected in this report to show the range of important topics available in the IRS. These include different types of failure in a variety of plant systems, as well as human performance considerations. This report is primarily aimed at senior officials in industry and government who have decision-making roles in the nuclear power industry

  16. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  17. Laser Obstacle Detection System Flight Testing

    National Research Council Canada - National Science Library

    Davis, Timothy

    2003-01-01

    ...). The Aviation Applied Technology Directorate (AATD) was contracted to mount the HELLAS sensor on the nose of a UH-60L Blackhawk helicopter and to conduct flight tests to evaluate the HELLAS obstacle detection sensor...

  18. Optimizing Systems of Threshold Detection Sensors

    National Research Council Canada - National Science Library

    Banschbach, David C

    2008-01-01

    .... Below the threshold all signals are ignored. We develop a mathematical model for setting individual sensor thresholds to obtain optimal probability of detecting a significant event, given a limit on the total number of false positives allowed...

  19. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Yuichi Satsumi

    2008-11-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  20. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Hajime Aoyama

    2007-06-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  1. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  2. SARA (Spectroscopic Ambient Radiation Detection) Spectroscopic Monitoring Systems for Online Environmental Radiation Monitoring Edition 2008

    International Nuclear Information System (INIS)

    Holzheimer, C.; Hartmann, S.

    2009-01-01

    In the wake of a nuclear incident, it is essential that you can react promptly and provide a completely reliable assessment of the radiological situation. First and foremost, it is vital that your radiation early warning system can automatically detect any man-made isotopes in the environment and identify any changes in the composition of the ambient radiation. Before appropriate countermeasures can be implemented, it is crucial that authorities have accurate information about the type of contamination and its dispersion. TechniData's spectroscopic online monitoring system will improve your existing monitoring systems, provide important information about the composition of ambient radiation during an incident, and therefore help you to make the right decisions

  3. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  4. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  5. RETRAN code analysis of Tsuruga-2 plant chemical volume control system (CVCS) reactor coolant leakage incident

    International Nuclear Information System (INIS)

    Kawai, H.

    2001-01-01

    JAPC purchased RETRAN, a program for transient thermal hydraulic analysis of complex fluid flow system, from the U.S. Electric Power Research Institute in 1992. Since then, JAPC has been utilizing RETRAN to evaluate safety margins of actual plant operation, in coping with troubles (investigating trouble causes and establishing countermeasures), and supporting reactor operation (reviewing operational procedures etc.). In this paper, a result of plant analysis performed on a CVCS reactor primary coolant leakage incident which occurred at JAPC's Tsuruga-2 plant (4-loop PWR, 3423 MWt, 1160 MW) on July 12 of 1999 and, based on the result, we made a plan to modify our operational procedure for reactor primary coolant leakage events in order to make earlier plant shutdown and this reduced primary coolant leakage. (author)

  6. TU-D-201-04: Veracity of Data Elements in Radiation Oncology Incident Learning Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kapur, A [Northwell Health System, New Hyde Park, NY (United States); Evans, S [Yale University New Haven, CT (United States); Brown, D [University of California, San Diego, La Jolla, CA (United States); Ezzell, G [Mayo Clinic Arizona, Phoenix, AZ (United States); Hoopes, D [The University of California San Diego, San Diego, CA (United States); Dieterich, S [UC Davis Medical Center, Sacramento, CA (United States); Kapetanovic, K; Tomlinson, C [American Society for Radiation Oncology, Fairfax, VA (United States)

    2016-06-15

    Purpose: Incident learning systems encompass volumes, varieties, values, and velocities of underlying data elements consistent with the V’s of big data. Veracity, the 5th V however exists only if there is high inter-rater reliability (IRR) within the data elements. The purpose of this work was to assess IRR in the nationally deployed RO-ILS: Radiation Oncology-Incident Learning System (R) sponsored by the American Society for Radiation Oncology (ASTRO) and the American Association of Physicists in Medicine (AAPM). Methods: Ten incident reports covering a wide range of scenarios were created in standardized narrative and video formats and disseminated to 67 volunteers of multiple disciplines from 26 institutions along with two published narratives from the International Commission of Radiological Protection to assess IRR on a nationally representative level. The volunteers were instructed to independently enter the associated data elements in a test version of RO-ILS over a 3-week period. All responses were aggregated into a spreadsheet to assess IRR using free-marginal kappa metrics. Results: 48 volunteers from 21 institutions completed all reports in the study period. The average kappa score for all raters across all critical data elements was 0.659 [range 0.326–1.000]. Statistically significant differences (p <0.05) were noted between reporters of different disciplines and raters with varying levels of experience. Kappa scores were high for event classification (0.781) and contributory factors (0.777) and low for likelihood-of-harm (0.326). IRR was highest among AAPM-ASTRO members (0.672) and lowest among trainees (0.463). Conclusion: A moderate-to-substantial level of IRR in RO-ILS was noted in this study. Although the number of events reviewed in this study was small, opportunities for improving the taxonomy for the lower scoring data elements as well as specific educational targets for training were identified by assessing data veracity quantitatively

  7. TU-D-201-04: Veracity of Data Elements in Radiation Oncology Incident Learning Systems

    International Nuclear Information System (INIS)

    Kapur, A; Evans, S; Brown, D; Ezzell, G; Hoopes, D; Dieterich, S; Kapetanovic, K; Tomlinson, C

    2016-01-01

    Purpose: Incident learning systems encompass volumes, varieties, values, and velocities of underlying data elements consistent with the V’s of big data. Veracity, the 5th V however exists only if there is high inter-rater reliability (IRR) within the data elements. The purpose of this work was to assess IRR in the nationally deployed RO-ILS: Radiation Oncology-Incident Learning System (R) sponsored by the American Society for Radiation Oncology (ASTRO) and the American Association of Physicists in Medicine (AAPM). Methods: Ten incident reports covering a wide range of scenarios were created in standardized narrative and video formats and disseminated to 67 volunteers of multiple disciplines from 26 institutions along with two published narratives from the International Commission of Radiological Protection to assess IRR on a nationally representative level. The volunteers were instructed to independently enter the associated data elements in a test version of RO-ILS over a 3-week period. All responses were aggregated into a spreadsheet to assess IRR using free-marginal kappa metrics. Results: 48 volunteers from 21 institutions completed all reports in the study period. The average kappa score for all raters across all critical data elements was 0.659 [range 0.326–1.000]. Statistically significant differences (p <0.05) were noted between reporters of different disciplines and raters with varying levels of experience. Kappa scores were high for event classification (0.781) and contributory factors (0.777) and low for likelihood-of-harm (0.326). IRR was highest among AAPM-ASTRO members (0.672) and lowest among trainees (0.463). Conclusion: A moderate-to-substantial level of IRR in RO-ILS was noted in this study. Although the number of events reviewed in this study was small, opportunities for improving the taxonomy for the lower scoring data elements as well as specific educational targets for training were identified by assessing data veracity quantitatively

  8. Early forest fire detection using radio-acoustic sounding system.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ince, Turker

    2009-01-01

    Automated early fire detection systems have recently received a significant amount of attention due to their importance in protecting the global environment. Some emergent technologies such as ground-based, satellite-based remote sensing and distributed sensor networks systems have been used to detect forest fires in the early stages. In this study, a radio-acoustic sounding system with fine space and time resolution capabilities for continuous monitoring and early detection of forest fires is proposed. Simulations show that remote thermal mapping of a particular forest region by the proposed system could be a potential solution to the problem of early detection of forest fires.

  9. Model Based Aircraft Upset Detection and Recovery System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes a system for detecting upset conditions and providing the corresponding control recovery actions to maintain flight integrity for general...

  10. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...... results show that the proposed method detects different fault scenarios of wind turbines under the stochastic external condition....

  11. Radar-Based Intruder Detection for a Robotic Security System

    National Research Council Canada - National Science Library

    Cory, Phil

    1998-01-01

    .... The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station...

  12. Tracking Polychlorinated Biphenyls (PCB) after an incident along a river system - Case study Elbe River

    Science.gov (United States)

    Kleisinger, Carmen; Dietrich, Stephan; Kehl, Nora; Claus, Evelyn; Schubert, Birgit

    2017-04-01

    In spring 2015, extremely high concentrations of Polychlorinated Biphenyls (PCB) well above the long-term average were detected in suspended particulate matter (SPM) within the River Elbe. They were released due to abrasive blasting of the old coating from a bridge in the upper part of the River, approximately 50 km upstream of the first measurement site. PCBs are persistent organic pollutants, preferentially bound to fine-grained fractions of the SPM. Results from monitoring of contaminants in SPM along the Elbe indicate the further dispersal of the PCB-contaminated sediments. These measurements include yearly investigations on PCB concentrations in sediments in the inner reaches of the Elbe, an additional longitudinal survey in 2015 and monthly monitoring of PCBs in SPM at stations along the river including the Elbe estuary (Germany). The Elbe estuary is of major economic importance since Hamburg harbour, one of the largest harbours in Europe, is located there. Maintaining the harbour includes dredging and, i.a., relocating large amounts of the dredged material within the water body. High PCB concentrations in sediments could lead to restrictions on the relocation of these sediments. This study aims at tracking the fate of PCB contaminated material released from the point source of the incident site along the whole river stretch and at estimating its impact on the quality of sediments and consequently on dredging activities in the estuary. The ratio of high (PCB 138, 152 and 180) versus low (PCB 28, 52, 101) chlorinated PCB congeners proved to be a suitable tracer to distinguish the PCB load released by the incident from the long-term background signals. As Delor 106/Clophen A60, which contains approx. 90% hexa- to decachloric congeners, was an additive in the coating of the bridge, the pattern of PCBs released by the incident is dominated by the highly chlorinated PCB-congeners PCB 138, 153 and 180. At the tidal weir Geesthacht, the entrance to the estuary, an

  13. Detecting impossible changes in infancy: a three-system account

    Science.gov (United States)

    Wang, Su-hua; Baillargeon, Renée

    2012-01-01

    Can infants detect that an object has magically disappeared, broken apart or changed color while briefly hidden? Recent research suggests that infants detect some but not other ‘impossible’ changes; and that various contextual manipulations can induce infants to detect changes they would not otherwise detect. We present an account that includes three systems: a physical-reasoning, an object-tracking, and an object-representation system. What impossible changes infants detect depends on what object information is included in the physical-reasoning system; this information becomes subject to a principle of persistence, which states that objects can undergo no spontaneous or uncaused change. What contextual manipulations induce infants to detect impossible changes depends on complex interplays between the physical-reasoning system and the object-tracking and object-representation systems. PMID:18078778

  14. Development of a Tailored Methodology and Forensic Toolkit for Industrial Control Systems Incident Response

    Science.gov (United States)

    2014-06-01

    amount of ICS network segmentation is exchanged for the ability to easily manage patches, antivirus definitions, and firmware updates. Patch...the operation cyber-physical systems. Because antivirus signatures exist for much broad-audience malware, the detection rate is high and there is...Backdoor keys are placed in the default software classes under \\InProcServer32\\@=expand:”C:\\WINDOWS\\temp\\install.ocx” within HKEY_USERS in the registry

  15. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    . Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  16. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  17. Report on Boeing pipeline leak detection system

    International Nuclear Information System (INIS)

    Aichele, W.T.

    1978-08-01

    Testing was performed on both simulated (test) and existing (water) pipelines to evaluate the Boeing leak detection technique. This technique uses a transformer mounted around the pipe to induce a voltage level onto the pipeline. The induced ground potential is measured from a distant ground probe, inserted into the surrounding soil, with respect to the excited pipeline. The induced voltage level will depend on the soil characteristics, the distance from the excited pipeline, and the probe types. If liquid should leak from the excited pipeline, the escaping liquid will modify the induced potential of the soil surrounding the excited pipeline. This will change the response of the quiescent soil characteristics and cause the voltage level on the detecting probes in the area of the leak to increase. This voltage increase will indicate a soil anomaly. However, the liquid does not have to reach the detection probe to reveal an anomalous soil condition. Several different detection probes were used and evaluated for sensitivity and response time. Although not evaluated during this test, results indicate that a wire laid parallel to the pipe axis may be the best probe configuration. A general sensitivity figure for any of the probes cannot be made from these tests; however, the technique used will reliably detect a pipeline leak of ten gallons. An additional test was performed using the Boeing pipeline leak detection technique to locate the position and depth of an underground pipeline. This test showed that the location and depth of an excited pipeline could be determined from above the ground where other methods for pipeline location had previously failed

  18. Hand, foot and mouth disease in China: evaluating an automated system for the detection of outbreaks

    Science.gov (United States)

    Li, Zhongjie; Lai, Shengjie; Zhang, Honglong; Wang, Liping; Zhou, Dinglun; Liu, Jizeng; Lan, Yajia; Ma, Jiaqi; Yu, Hongjie; Buckeridge, David L; Pittayawonganan, Chakrarat; Clements, Archie CA; Hu, Wenbiao

    2014-01-01

    Abstract Objective To evaluate the performance of China’s infectious disease automated alert and response system in the detection of outbreaks of hand, foot and mouth (HFM) disease. Methods We estimated size, duration and delay in reporting HFM disease outbreaks from cases notified between 1 May 2008 and 30 April 2010 and between 1 May 2010 and 30 April 2012, before and after automatic alert and response included HFM disease. Sensitivity, specificity and timeliness of detection of aberrations in the incidence of HFM disease outbreaks were estimated by comparing automated detections to observations of public health staff. Findings The alert and response system recorded 106 005 aberrations in the incidence of HFM disease between 1 May 2010 and 30 April 2012 – a mean of 5.6 aberrations per 100 days in each county that reported HFM disease. The response system had a sensitivity of 92.7% and a specificity of 95.0%. The mean delay between the reporting of the first case of an outbreak and detection of that outbreak by the response system was 2.1 days. Between the first and second study periods, the mean size of an HFM disease outbreak decreased from 19.4 to 15.8 cases and the mean interval between the onset and initial reporting of such an outbreak to the public health emergency reporting system decreased from 10.0 to 9.1 days. Conclusion The automated alert and response system shows good sensitivity in the detection of HFM disease outbreaks and appears to be relatively rapid. Continued use of this system should allow more effective prevention and limitation of such outbreaks in China. PMID:25378756

  19. Benefits, barriers, and limitations on the use of Hospital Incident Command System

    Directory of Open Access Journals (Sweden)

    Shahin Shooshtari

    2017-01-01

    Full Text Available Hospital Incident Command System (HICS has been established with the mission of prevention, response, and recovery in hazards. Regarding the key role of hospitals in medical management of events, the present study is aimed at investigating benefits, barriers, and limitations of applying HICS in hospital. Employing a review study, articles related to the aforementioned subject published from 1995 to 2016 were extracted from accredited websites and databases such as PubMed, Google Scholar, Elsevier, and SID by searching keywords such as HICS, benefits, barriers, and limitations. Then, those articles were summarized and reported. Using of HICS can cause creating preparedness in facing disasters, constructive management in strategies of controlling events, and disasters. Therefore, experiences indicate that there are some limitations in the system such as failure to assess the strength and severity of vulnerabilities of hospital, no observation of standards for disaster management in the design, constructing and equipping hospitals, and the absence of a model for evaluating the system. Accordingly, the conducted studies were investigated for probing the performance HICS. With regard to the role of health in disaster management, it requires advanced international methods in facing disasters. Using accurate models for assessing, the investigation of preparedness of hospitals in precrisis conditions based on components such as command, communications, security, safety, development of action plans, changes in staff's attitudes through effective operational training and exercises and creation of required maneuvers seems necessary.

  20. Operating Experience from Events Reported to the IAEA Incident Reporting System for Research Reactors

    International Nuclear Information System (INIS)

    2015-03-01

    Operating experience feedback is an effective mechanism in providing lessons learned from events and the associated corrective actions to prevent them, helping to improve safety at nuclear installations. The Incident Reporting System for Research Reactors (IRSRR), which is operated by the IAEA, is an important tool for international exchange of operating experience feedback for research reactors. The IRSRR reports contain information on events of safety significance with their root causes and lessons learned which help in reducing the occurrence of similar events at research reactors. To improve the effectiveness of the system, it is essential that national organizations demonstrate an appropriate interest for the timely reporting of events important to safety and share the information in the IRSRR database. At their biennial technical meetings, the IRSRR national coordinators recommended collecting the operating experience from the events reported to the IRSRR and disseminating it in an IAEA publication. This publication highlights the root causes, safety significance, lessons learned, corrective actions and the causal factors for the events reported to the IRSRR up to September 2014. The publication also contains relevant summary information on research reactor events from sources other than the IRSRR, operating experience feedback from the International Reporting System for Operating Experience considered relevant to research reactors, and a description of the elements of an operating experience programme as established by the IAEA safety standards. This publication will be of use to research reactor operating organizations, regulators and designers, and any other organizations or individuals involved in the safety of research reactors

  1. A safety incident reporting system for primary care. A systematic literature review and consensus procedure by the LINNEAUS collaboration on patient safety in primary care

    NARCIS (Netherlands)

    Klemp, Kerstin; Zwart, Dorien; Hansen, Jørgen; Hellebek, Torben; Luettel, Dagmar; Verstappen, Wim; Beyer, Martin; Gerlach, Ferdin M.; Hoffmann, Barbara; Esmail, Aneez

    2015-01-01

    Background: Incident reporting is widely used in both patient safety improvement programmes, and in research on patient safety.Objective: To identify the key requirements for incident reporting systems in primary care; to develop an Internet-based incident reporting and learning system for primary

  2. Thermoelectric-Driven Sustainable Sensing and Actuation Systems for Fault-Tolerant Nuclear Incidents

    Energy Technology Data Exchange (ETDEWEB)

    Longtin, Jon [Stony Brook Univ., NY (United States)

    2016-02-08

    The Fukushima Daiichi nuclear incident in March 2011 represented an unprecedented stress test on the safety and backup systems of a nuclear power plant. The lack of reliable information from key components due to station blackout was a serious setback, leaving sensing, actuation, and reporting systems unable to communicate, and safety was compromised. Although there were several independent backup power sources for required safety function on site, ultimately the batteries were drained and the systems stopped working. If, however, key system components were instrumented with self-powered sensing and actuation packages that could report indefinitely on the status of the system, then critical system information could be obtained while providing core actuation and control during off-normal status for as long as needed. This research project focused on the development of such a self-powered sensing and actuation system. The electrical power is derived from intrinsic heat in the reactor components, which is both reliable and plentiful. The key concept was based around using thermoelectric generators that can be integrated directly onto key nuclear components, including pipes, pump housings, heat exchangers, reactor vessels, and shielding structures, as well as secondary-side components. Thermoelectric generators are solid-state devices capable of converting heat directly into electricity. They are commercially available technology. They are compact, have no moving parts, are silent, and have excellent reliability. The key components to the sensor package include a thermoelectric generator (TEG), microcontroller, signal processing, and a wireless radio package, environmental hardening to survive radiation, flooding, vibration, mechanical shock (explosions), corrosion, and excessive temperature. The energy harvested from the intrinsic heat of reactor components can be then made available to power sensors, provide bi-directional communication, recharge batteries for other

  3. Thermoelectric-Driven Sustainable Sensing and Actuation Systems for Fault-Tolerant Nuclear Incidents

    International Nuclear Information System (INIS)

    Longtin, Jon

    2015-09-01

    The Fukushima Daiichi nuclear incident in March 2011 represented an unprecedented stress test on the safety and backup systems of a nuclear power plant. The lack of reliable information from key components due to station blackout was a serious setback, leaving sensing, actuation, and reporting systems unable to communicate, and safety was compromised. Although there were several independent backup power sources for required safety function on site, ultimately the batteries were drained and the systems stopped working. If, however, key system components were instrumented with self-powered sensing and actuation packages that could report indefinitely on the status of the system, then critical system information could be obtained while providing core actuation and control during off-normal status for as long as needed. This research project focused on the development of such a self-powered sensing and actuation system. The electrical power is derived from intrinsic heat in the reactor components, which is both reliable and plentiful. The key concept was based around using thermoelectric generators that can be integrated directly onto key nuclear components, including pipes, pump housings, heat exchangers, reactor vessels, and shielding structures, as well as secondary-side components. Thermoelectric generators are solid-state devices capable of converting heat directly into electricity. They are commercially available technology. They are compact, have no moving parts, are silent, and have excellent reliability. The key components to the sensor package include a thermoelectric generator (TEG), microcontroller, signal processing, and a wireless radio package, environmental hardening to survive radiation, flooding, vibration, mechanical shock (explosions), corrosion, and excessive temperature. The energy harvested from the intrinsic heat of reactor components can be then made available to power sensors, provide bi-directional communication, recharge batteries for other

  4. Intrusion Detection in NEAR System by Anti-denoising Traffic Data Series using Discrete Wavelet Transform

    Directory of Open Access Journals (Sweden)

    VANCEA, F.

    2014-11-01

    Full Text Available The paper presents two methods for detecting anomalies in data series derived from network traffic. Intrusion detection systems based on network traffic analysis are able to respond to incidents never seen before by detecting anomalies in data series extracted from the traffic. Some anomalies manifest themselves as pulses of various sizes and shapes, superimposed on series corresponding to normal traffic. In order to detect those impulses we propose two methods based on discrete wavelet transformation. Their effectiveness expressed in relative thresholds on pulse amplitude for no false negatives and no false positives is then evaluated against pulse duration and Hurst characteristic of original series. Different base functions are also evaluated for efficiency in the context of the proposed methods.

  5. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...

  6. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  7. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  8. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...... in a standard setup and a synthesis method for fault detectors is given. Further, fault detection problems with both parametric faults and faults described by external input signals are also shortly considered....

  9. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  10. Advanced Ground Systems Maintenance Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The Inductive Monitoring System (IMS) software utilizes techniques from the fields of model-based reasoning, machine learning, and data mining to build system...

  11. Online Real-Time Tribology Failure Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Under NASA Phase I funding, we have developed a system for the ball bearing fault detection and identification. Our system can effectively identify multiple fault...

  12. Radiation sensitive devices and systems for detection of radioactive materials and related methods

    Science.gov (United States)

    Kotter, Dale K

    2014-12-02

    Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

  13. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  14. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  15. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  16. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  17. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  18. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  19. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  20. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  1. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  2. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  3. Marshall Grazing Incidence X-ray Spectrometer (MaGIXS) Slit-Jaw Imaging System

    Science.gov (United States)

    Wilkerson, P.; Champey, P. R.; Winebarger, A. R.; Kobayashi, K.; Savage, S. L.

    2017-12-01

    The Marshall Grazing Incidence X-ray Spectrometer is a NASA sounding rocket payload providing a 0.6 - 2.5 nm spectrum with unprecedented spatial and spectral resolution. The instrument is comprised of a novel optical design, featuring a Wolter1 grazing incidence telescope, which produces a focused solar image on a slit plate, an identical pair of stigmatic optics, a planar diffraction grating and a low-noise detector. When MaGIXS flies on a suborbital launch in 2019, a slit-jaw camera system will reimage the focal plane of the telescope providing a reference for pointing the telescope on the solar disk and aligning the data to supporting observations from satellites and other rockets. The telescope focuses the X-ray and EUV image of the sun onto a plate covered with a phosphor coating that absorbs EUV photons, which then fluoresces in visible light. This 10-week REU project was aimed at optimizing an off-axis mounted camera with 600-line resolution NTSC video for extremely low light imaging of the slit plate. Radiometric calculations indicate an intensity of less than 1 lux at the slit jaw plane, which set the requirement for camera sensitivity. We selected a Watec 910DB EIA charge-coupled device (CCD) monochrome camera, which has a manufacturer quoted sensitivity of 0.0001 lux at F1.2. A high magnification and low distortion lens was then identified to image the slit jaw plane from a distance of approximately 10 cm. With the selected CCD camera, tests show that at extreme low-light levels, we achieve a higher resolution than expected, with only a moderate drop in frame rate. Based on sounding rocket flight heritage, the launch vehicle attitude control system is known to stabilize the instrument pointing such that jitter does not degrade video quality for context imaging. Future steps towards implementation of the imaging system will include ruggedizing the flight camera housing and mounting the selected camera and lens combination to the instrument structure.

  4. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  5. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  6. Environmentally Adaptive UXO Detection and Classification Systems

    Science.gov (United States)

    2016-04-01

    in this experiment was designed to collect acoustical sonar data from underwater objects in a relatively controlled and clutter-free environment...public release; distribution is unlimited. N/A This Final Report addresses the problem of detecting and classifying underwater munitions using data...Applied Physics Laboratory ATR Automatic Target Recognition BOSS Buried Object Scanning Sonar CGF Cumulant Generating Function CPA Closest Point of

  7. Detection and quantification system for monitoring instruments

    Science.gov (United States)

    Dzenitis, John M [Danville, CA; Hertzog, Claudia K [Houston, TX; Makarewicz, Anthony J [Livermore, CA; Henderer, Bruce D [Livermore, CA; Riot, Vincent J [Oakland, CA

    2008-08-12

    A method of detecting real events by obtaining a set of recent signal results, calculating measures of the noise or variation based on the set of recent signal results, calculating an expected baseline value based on the set of recent signal results, determining sample deviation, calculating an allowable deviation by multiplying the sample deviation by a threshold factor, setting an alarm threshold from the baseline value plus or minus the allowable deviation, and determining whether the signal results exceed the alarm threshold.

  8. Assessment of leak detection systems for LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1987-01-01

    This topical report summarizes work performed by the Argonne National Laboratory as subcontractor on on-line leak monitoring of LWRs during the 12 months from October 1985 to September 1986. The use of at least three different methods is recommended for leakage detection in reactors. Monitoring of sump-flow and airborne particulate radioactivity are suggested. A third method could involve monitoring condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity

  9. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  10. Incidence, risk factors and outcome of nosocomial pneumonia in patients with central nervous system infections

    Directory of Open Access Journals (Sweden)

    Gajović Olgica

    2011-01-01

    Full Text Available Introduction. Pneumonia is the most frequent nosocomial infection in intensive care units. The reported frequency varies with definition, the type of hospital or intensive care units and the population of patients. The incidence ranges from 6.8-27%. Objective. The objective of this study was to determine the frequency, risk factors and mortality of nosocomial pneumonia in intensive care patients. Methods. We analyzed retrospectively and prospectively the collected data of 180 patients with central nervous system infections who needed to stay in the intensive care unit for more than 48 hours. This study was conducted from 2003 to 2009 at the Clinical Centre of Kragujevac. Results. During the study period, 54 (30% patients developed nosocomial pneumonia. The time to develop pneumonia was 10±6 days. We found that the following risk factors for the development of nosocomial pneumonia were statistically significant: age, Glasgow Coma Scale (GCS score <9, mechanical ventilation, duration of mechanical ventilation, tracheostomy, presence of nasogastric tube and enteral feeding. The most commonly isolated pathogens were Klebsiella-Enterobacter spp. (33.3%, Pseudomonas aeruginosa (24.1%, Acinetobacter spp. (16.6% and Staphylococcus aureus (25.9%. Conclusion. Nosocomial pneumonia is the major cause of morbidity and mortality of patients with central nervous system infections. Patients on mechanical ventilation are particularly at a high risk. The mortality rate of patients with nosocomial pneumonia was 54.4% and it was five times higher than in patients without pneumonia.

  11. Developing an incident management system to support Ebola response -- Liberia, July-August 2014.

    Science.gov (United States)

    Pillai, Satish K; Nyenswah, Tolbert; Rouse, Edward; Arwady, M Allison; Forrester, Joseph D; Hunter, Jennifer C; Matanock, Almea; Ayscue, Patrick; Monroe, Benjamin; Schafer, Ilana J; Poblano, Luis; Neatherlin, John; Montgomery, Joel M; De Cock, Kevin M

    2014-10-17

    The ongoing Ebola virus disease (Ebola) outbreak in West Africa is the largest and most sustained Ebola epidemic recorded, with 6,574 cases. Among the five affected countries of West Africa (Liberia, Sierra Leone, Guinea, Nigeria, and Senegal), Liberia has had the highest number cases (3,458). This epidemic has severely strained the public health and health care infrastructure of Liberia, has resulted in restrictions in civil liberties, and has disrupted international travel. As part of the initial response, the Liberian Ministry of Health and Social Welfare (MOHSW) developed a national task force and technical expert committee to oversee the management of the Ebola-related activities. During the third week of July 2014, CDC deployed a team of epidemiologists, data management specialists, emergency management specialists, and health communicators to assist MOHSW in its response to the growing Ebola epidemic. One aspect of CDC's response was to work with MOHSW in instituting incident management system (IMS) principles to enhance the organization of the response. This report describes MOHSW's Ebola response structure as of mid-July, the plans made during the initial assessment of the response structure, the implementation of interventions aimed at improving the system, and plans for further development of the response structure for the Ebola epidemic in Liberia.

  12. Compensation of errors due to incident beam drift in a 3 DOF measurement system for linear guide motion.

    Science.gov (United States)

    Hu, Pengcheng; Mao, Shuai; Tan, Jiu-Bin

    2015-11-02

    A measurement system with three degrees of freedom (3 DOF) that compensates for errors caused by incident beam drift is proposed. The system's measurement model (i.e. its mathematical foundation) is analyzed, and a measurement module (i.e. the designed orientation measurement unit) is developed and adopted to measure simultaneously straightness errors and the incident beam direction; thus, the errors due to incident beam drift can be compensated. The experimental results show that the proposed system has a deviation of 1 μm in the range of 200 mm for distance measurements, and a deviation of 1.3 μm in the range of 2 mm for straightness error measurements.

  13. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  14. Thermometry of the system “heat-resistant sample - incident plasma stream”

    Science.gov (United States)

    Sargsyan, M. A.; Chinnov, V. F.; Kavyrshin, D. I.; Gadzhiev, M. Kh; Khromov, M. A.; Chistolinov, A. V.; Senchenko, V. N.

    2017-11-01

    To study the interacting system “heat-resistant sample – an incident plasma stream” a setup of synchronized measurement equipment was developed and tested that recorded the main parameters of such interaction. Heat resistance tests were carried out on the samples of MPG-6 grade isotropic graphite, and samples of pyrolytic graphite that were subjected to a long (60 … 100 s) exposure to nitrogen, argon and air plasma streams at atmospheric pressure. As plasma generators a series of plasma torches with a vortex stabilization of the stream and an expanding anode channels was used. The temperature and composition of the plasma in the jet and near the sample were determined using two AvaSpec2048 and AvaSpec3648 scanning optical spectrometers and the MS5402i spectrograph with the Andor matrix at its outlet. The surface temperature of the sample was determined in real time using three independent ways: two pyrometric systems - a high-speed micro-pyrometer FMP1001 and a two-position visualization of the heated sample by high-speed Motion Pro X3 and VS-FAST cameras, and the spectral analysis of the wide-range thermal radiation of the samples. The main method for determining the rate of material loss during the action of a plasma jet on it was to analyze a two-position synchronous visualization of the “jet-sample” system. When a crater was formed on the surface of the sample under the “dagger” effect of a plasma jet, a video recording system of the crater zone was used, backlit using the “laser knife” method.

  15. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  16. Ventilator-Related Adverse Events: A Taxonomy and Findings From 3 Incident Reporting Systems

    Science.gov (United States)

    Pham, Julius Cuong; Williams, Tamara L; Sparnon, Erin M; Cillie, Tam K; Scharen, Hilda F; Marella, William M

    2016-01-01

    BACKGROUND: In 2009, researchers from Johns Hopkins University's Armstrong Institute for Patient Safety and Quality; public agencies, including the FDA; and private partners, including the Emergency Care Research Institute and the University HealthSystem Consortium (UHC) Safety Intelligence Patient Safety Organization, sought to form a public-private partnership for the promotion of patient safety (P5S) to advance patient safety through voluntary partnerships. The study objective was to test the concept of the P5S to advance our understanding of safety issues related to ventilator events, to develop a common classification system for categorizing adverse events related to mechanical ventilators, and to perform a comparison of adverse events across different adverse event reporting systems. METHODS: We performed a cross-sectional analysis of ventilator-related adverse events reported in 2012 from the following incident reporting systems: the Pennsylvania Patient Safety Authority's Patient Safety Reporting System, UHC's Safety Intelligence Patient Safety Organization database, and the FDA's Manufacturer and User Facility Device Experience database. Once each organization had its dataset of ventilator-related adverse events, reviewers read the narrative descriptions of each event and classified it according to the developed common taxonomy. RESULTS: A Pennsylvania Patient Safety Authority, FDA, and UHC search provided 252, 274, and 700 relevant reports, respectively. The 3 event types most commonly reported to the UHC and the Pennsylvania Patient Safety Authority's Patient Safety Reporting System databases were airway/breathing circuit issue, human factor issues, and ventilator malfunction events. The top 3 event types reported to the FDA were ventilator malfunction, power source issue, and alarm failure. CONCLUSIONS: Overall, we found that (1) through the development of a common taxonomy, adverse events from 3 reporting systems can be evaluated, (2) the types of

  17. Research of an emergency medical system for mass casualty incidents in Shanghai, China: a system dynamics model.

    Science.gov (United States)

    Yu, Wenya; Lv, Yipeng; Hu, Chaoqun; Liu, Xu; Chen, Haiping; Xue, Chen; Zhang, Lulu

    2018-01-01

    Emergency medical system for mass casualty incidents (EMS-MCIs) is a global issue. However, China lacks such studies extremely, which cannot meet the requirement of rapid decision-support system. This study aims to realize modeling EMS-MCIs in Shanghai, to improve mass casualty incident (MCI) rescue efficiency in China, and to provide a possible method of making rapid rescue decisions during MCIs. This study established a system dynamics (SD) model of EMS-MCIs using the Vensim DSS program. Intervention scenarios were designed as adjusting scales of MCIs, allocation of ambulances, allocation of emergency medical staff, and efficiency of organization and command. Mortality increased with the increasing scale of MCIs, medical rescue capability of hospitals was relatively good, but the efficiency of organization and command was poor, and the prehospital time was too long. Mortality declined significantly when increasing ambulances and improving the efficiency of organization and command; triage and on-site first-aid time were shortened if increasing the availability of emergency medical staff. The effect was the most evident when 2,000 people were involved in MCIs; however, the influence was very small under the scale of 5,000 people. The keys to decrease the mortality of MCIs were shortening the prehospital time and improving the efficiency of organization and command. For small-scale MCIs, improving the utilization rate of health resources was important in decreasing the mortality. For large-scale MCIs, increasing the number of ambulances and emergency medical professionals was the core to decrease prehospital time and mortality. For super-large-scale MCIs, increasing health resources was the premise.

  18. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  19. Robust fault detection of wind energy conversion systems based on dynamic neural networks.

    Science.gov (United States)

    Talebi, Nasser; Sadrnia, Mohammad Ali; Darabi, Ahmad

    2014-01-01

    Occurrence of faults in wind energy conversion systems (WECSs) is inevitable. In order to detect the occurred faults at the appropriate time, avoid heavy economic losses, ensure safe system operation, prevent damage to adjacent relevant systems, and facilitate timely repair of failed components; a fault detection system (FDS) is required. Recurrent neural networks (RNNs) have gained a noticeable position in FDSs and they have been widely used for modeling of complex dynamical systems. One method for designing an FDS is to prepare a dynamic neural model emulating the normal system behavior. By comparing the outputs of the real system and neural model, incidence of the faults can be identified. In this paper, by utilizing a comprehensive dynamic model which contains both mechanical and electrical components of the WECS, an FDS is suggested using dynamic RNNs. The presented FDS detects faults of the generator's angular velocity sensor, pitch angle sensors, and pitch actuators. Robustness of the FDS is achieved by employing an adaptive threshold. Simulation results show that the proposed scheme is capable to detect the faults shortly and it has very low false and missed alarms rate.

  20. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  1. Development of humidity leak detection system for pipelines of WWER

    International Nuclear Information System (INIS)

    Gonor, V.K.; Morozov, S.A.; Polionov, V.P.; Portyanoj, A.G.; Shvetsov, D.M.; Konoplev, N.I.; Molyavkin, A.N.

    2007-01-01

    With allowance made for the basic requirements for the NPP pipeline leak detection system and for the accumulated experience one analyzed the basic engineering approaches to design a humidity leak detection system for the WWER primary pipelines. Paper presents the results of the feasibility study of the diagnostic algorithm service ability and the leak detection humidity system characteristics. Making use of the Kupol-M code and of the thermal bench simulating the Kalinin NPP 3-rd power unit dull basalt heat insulation pipeline leak the system is shown to meet the basic requirements stipulated in the present-day leak-before-break concept [ru

  2. [Preliminary results of an anonymous internet-based reporting system for critical incidents in ambulatory primary care].

    Science.gov (United States)

    Brun, A

    2005-03-01

    To learn from errors is not always easy, especially if they happened to others! This paper describes the organization and management of a critical incident reporting system for primary care physicians in Switzerland and reports about the difficulties and experiences during the first 18 months since the start of the program. It seems to be particularly difficult to enhance the attentiveness of physicians for apparently harmless daily critical incidents and to motivate them to report it even in an anonymous reporting system. As incentives for more intensive participation there are the hope for comments on reported cases by other participants and the expectation that reported errors will be avoided by the readers.

  3. Incidence and Interrelated Factors in Patients With Congenital Hypothyroidism as Detected by Newborn Screening in Guangxi, China

    Directory of Open Access Journals (Sweden)

    Xin Fan MD

    2015-01-01

    Full Text Available Background. A newborn screening program (NSP for congenital hypothyroidism (CH was carried out in Guangxi in order to understand the incidence of CH and the factors interrelated to major types of CH in this region of China. Methods. During 2009 to 2013, data from 930 612 newborns attending NSP in Guangxi were collected. Patients were classified with either permanent CH (PCH or transient CH (TCH after 2 years of progressive study. Results. A total of 1210 patients were confirmed with CH with an incidence of 1/769, including 68 PCH and 126 TCH cases with incidences of 1/6673 and 1/3385, respectively. The frequency of thyroid stimulating hormone values greater than 5 mIU/L was 7.2%, which, based on WHO guidelines, suggests that the population was mildly iodine deficient. Conclusions. The incidence of CH was high in Guangxi. Approximately two thirds of CH patients were TCH, which may be due to a deficiency in iodine within the population.

  4. Risk Factors for Incident Diabetic Polyneuropathy in a Cohort With Screen-Detected Type 2 Diabetes Followed for 13 Years

    DEFF Research Database (Denmark)

    Andersen, Signe T; Witte, Daniel R; Dalsgaard, Else-Marie

    2018-01-01

    OBJECTIVE: To study incident diabetic polyneuropathy (DPN) prospectively during the first 13 years after a screening-based diagnosis of type 2 diabetes and determine the associated risk factors for the development of DPN. RESEARCH DESIGN AND METHODS: We assessed DPN longitudinally in the Danish arm...

  5. Risk Factor Detection as a Metric of STARHS Performance for HIV Incidence Surveillance Among Female Sex Workers in Kigali, Rwanda

    NARCIS (Netherlands)

    Braunstein, Sarah L.; van de Wijgert, Janneke H.; Vyankandondera, Joseph; Kestelyn, Evelyne; Ntirushwa, Justin; Nash, Denis

    2012-01-01

    The epidemiologic utility of STARHS hinges not only on producing accurate estimates of HIV incidence, but also on identifying risk factors for recent HIV infection. As part of an HIV seroincidence study, 800 Rwandan female sex workers (FSW) were HIV tested, with those testing positive further tested

  6. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  7. How to detect trap cluster systems?

    International Nuclear Information System (INIS)

    Mandowski, Arkadiusz

    2008-01-01

    Spatially correlated traps and recombination centres (trap-recombination centre pairs and larger clusters) are responsible for many anomalous phenomena that are difficult to explain in the framework of both classical models, i.e. model of localized transitions (LT) and the simple trap model (STM), even with a number of discrete energy levels. However, these 'anomalous' effects may provide a good platform for identifying trap cluster systems. This paper considers selected cluster-type effects, mainly relating to an anomalous dependence of TL on absorbed dose in the system of isolated clusters (ICs). Some consequences for interacting cluster (IAC) systems, involving both localized and delocalized transitions occurring simultaneously, are also discussed

  8. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  9. A Novel Vision Sensing System for Tomato Quality Detection.

    Science.gov (United States)

    Srivastava, Satyam; Boyat, Sachin; Sadistap, Shashikant

    2014-01-01

    Producing tomato is a daunting task as the crop of tomato is exposed to attacks from various microorganisms. The symptoms of the attacks are usually changed in color, bacterial spots, special kind of specks, and sunken areas with concentric rings having different colors on the tomato outer surface. This paper addresses a vision sensing based system for tomato quality inspection. A novel approach has been developed for tomato fruit detection and disease detection. Developed system consists of USB based camera module having 12.0 megapixel interfaced with ARM-9 processor. Zigbee module has been interfaced with developed system for wireless transmission from host system to PC based server for further processing. Algorithm development consists of three major steps, preprocessing steps like noise rejection, segmentation and scaling, classification and recognition, and automatic disease detection and classification. Tomato samples have been collected from local market and data acquisition has been performed for data base preparation and various processing steps. Developed system can detect as well as classify the various diseases in tomato samples. Various pattern recognition and soft computing techniques have been implemented for data analysis as well as different parameters prediction like shelf life of the tomato, quality index based on disease detection and classification, freshness detection, maturity index detection, and different suggestions for detected diseases. Results are validated with aroma sensing technique using commercial Alpha Mos 3000 system. Accuracy has been calculated from extracted results, which is around 92%.

  10. Detection and Prognostics on Low Dimensional Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper describes the application of known and novel prognostic algorithms on systems that can be described by low dimensional, potentially nonlinear dynamics....

  11. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  12. Vision-based fall detection system for improving safety of elderly people

    KAUST Repository

    Harrou, Fouzi

    2017-12-06

    Recognition of human movements is very useful for several applications, such as smart rooms, interactive virtual reality systems, human detection and environment modeling. The objective of this work focuses on the detection and classification of falls based on variations in human silhouette shape, a key challenge in computer vision. Falls are a major health concern, specifically for the elderly. In this study, the detection is achieved with a multivariate exponentially weighted moving average (MEWMA) monitoring scheme, which is effective in detecting falls because it is sensitive to small changes. Unfortunately, an MEWMA statistic fails to differentiate real falls from some fall-like gestures. To remedy this limitation, a classification stage based on a support vector machine (SVM) is applied on detected sequences. To validate this methodology, two fall detection datasets have been tested: the University of Rzeszow fall detection dataset (URFD) and the fall detection dataset (FDD). The results of the MEWMA-based SVM are compared with three other classifiers: neural network (NN), naïve Bayes and K-nearest neighbor (KNN). These results show the capability of the developed strategy to distinguish fall events, suggesting that it can raise an early alert in the fall incidents.

  13. Central nervous system complications during pediatric extracorporeal life support: incidence and risk factors.

    Science.gov (United States)

    Cengiz, Pelin; Seidel, Kristy; Rycus, Peter T; Brogan, Thomas V; Roberts, Joan S

    2005-12-01

    Identify the incidence and risk factors for development of acute, severe central nervous system (CNS) complications of pediatric extracorporeal life support (ECLS). Retrospective review of Extracorporeal Life Support Organization (ELSO) registry database. Pediatric intensive care units of 115 tertiary centers internationally. Pediatric patients, 1 month to 18 yrs of age, who had ECLS between the years 1981-2002. Data concerning 4,942 patients who underwent one run of ECLS were analyzed. Six hundred thirty-six patients (12.9%) developed acute, severe CNS complications. Patients who required ECLS during extracorporeal cardiopulmonary resuscitation (n = 161; 3.3%) were more likely to develop CNS complications (n = 42; 26.1%) than patients who did not have extracorporeal cardiopulmonary resuscitation (p 3.0 mg/dL, use of inotropes, presence of myocardial stun, and requirement of cardiopulmonary resuscitation during ECLS independently predicted development of CNS complications. Patients who have metabolic acidosis, a bicarbonate or inotrope/vasopressor requirement, cardiopulmonary resuscitation, or a left ventricular assist device before initiation of ECLS are at greater risk for development of CNS complications. After initiation of ECLS, patients who develop renal failure or metabolic acidosis or undergo venoarterial ECLS should be closely monitored for development of CNS complications.

  14. The United States Department of Energy (DOE) Computerized Accident/Incident Reporting System (CAIRS)

    International Nuclear Information System (INIS)

    Briscoe, G.J.

    1993-01-01

    The Department of Energy's (DOE) Computerized Accident/Incident Reporting System (CAIRS) is a comprehensive data base containing more than 50,000 investigation reports of injury/illness, property damage and vehicle accident cases representing safety data from 1975 to the present for more than 150 DOE contractor organizations. A special feature is that the text of each accident report is translated using a controlled dictionary and rigid sentence structure called Factor Relationship and Sequence of Events (FRASE) that enhances the ability to retrieve specific types of information and to perform detailed analyses. DOE summary and individual contractor reports are prepared quarterly and annually. In addition, ''Safety Performance Profile'' reports for individual organizations are prepared to provide advance information to appraisal teams, and special topical reports are prepared for areas of concern such as an increase in the number of security injuries or environmental releases. The data base is open to all DOE and Contractor registered users with no access restrictions other than that required by the Privacy Act

  15. Selective tuberculosis incidence estimation by digital computer information technologies in the MS Excel system

    Directory of Open Access Journals (Sweden)

    G. I. Ilnitsky

    2014-01-01

    Full Text Available The incidence of tuberculosis was estimated in different age groups of people, applying the digital computer information technologies of tracking. For this, the author used the annual forms of the reporting materials stipulated by the Ministry of Health of Ukraine, the results of his observations, and the data of bank information accumulation in the MS Excel system. The initial positions were formed in terms of the epidemiological indicators of Ukraine and the Lvov Region during a 10-year period (2000-2009 that was, in relation with different initial characteristics, divided into Step 1 (2000-2004 in which the tuberculosis epidemic situation progressively deteriorated and Step 2 (2005-2009 in which relative morbidity was relatively stabilized. The results were processed using the MS Excel statistical and mathematical functions that were parametric and nonparametric in establishing a correlation when estimating the changes in epidemic parameters. The findings of studies among the general population could lead to the conclusion that the mean tuberculosis morbidity in Ukraine was much greater than that in the Lvov Region irrespective of the age of a population. At the same time, the morbidity rate in the foci of tuberculosis infection suggested that it rose among both the children, adolescents, and adults, which provided a rationale for that therapeutic and preventive measures should be better implemented.

  16. Recent events in NPPs and incident reporting system (IRS) activity. Working material

    International Nuclear Information System (INIS)

    1996-01-01

    The IAEA convened the 1996 Joint Meeting to Exchange Information on Recent Events in Nuclear Power Plants and the Technical Committee-Annual Meeting of the Incident Reporting System (IRS) national co-ordinators, organized jointly with the Nuclear Energy Agency (NEA) of the OECD in Paris, France from 22-26 April 1996. These consecutive meetings took place at the OECD Headquarters, 2 rue Andre Pascal. The main objective of the first meeting (22-24 April 1996) was to exchange and discuss information on recent events which occurred in NPPs. The second meeting (25-26 April 1996) was devoted to the IAEA and NEA activity in the framework of the IRS. The main issues of the programme at the meetings were as follows: in-depth discussion on NPP recent events, presented by the participants; panel discussion on operational safety experience issues identified by the participants; IAEA and NEA activities on IRS subjects in 1995-1996 and plans for the future; issues from the inter-agency's IRS Advisory Committee. Annexes I and II provide more information on the programme at the meetings. A list of participants is given in Annex III (50 participants from 22 countries and 3 international organization). Annexes IV and V provide information on national presentations on recent events. Figs, tabs

  17. A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hongliang Zhu

    2017-01-01

    Full Text Available In big data era, the single detection techniques have already not met the demand of complex network attacks and advanced persistent threats, but there is no uniform standard to make different correlation analysis detection be performed efficiently and accurately. In this paper, we put forward a universal correlation analysis detection model and algorithm by introducing state transition diagram. Based on analyzing and comparing the current correlation detection modes, we formalize the correlation patterns and propose a framework according to data packet timing and behavior qualities and then design a new universal algorithm to implement the method. Finally, experiment, which sets up a lightweight intrusion detection system using KDD1999 dataset, shows that the correlation detection model and algorithm can improve the performance and guarantee high detection rates.

  18. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  19. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  20. Analysis of Pump-Turbine S Instability and Reverse Waterhammer Incidents in Hydropower Systems

    Energy Technology Data Exchange (ETDEWEB)

    Pejovic, Dr. Stanislav [University of Toronto; Zhang, Qin Fen [ORNL; Karney, Professor Byran W. [University of Toronto; Gajic, Prof. Aleksandar [University of Belgrade, Belgrade, Serbia

    2011-01-01

    Hydraulic systems continually experience dynamic transients or oscillations which threaten the hydroelectric plant from extreme water hammer pressures or resonance. In particular, the minimum pressure variations downstream of the turbine runner during the load rejection or other events may cause dangerous water column separation and subsequent rejoinder. Water column separation can be easily observed from the measurements of site transient tests, and has indeed caused serious historical damages to the machine and water conveyance system. Several technical issues regarding water column separation in draft tubes, including S instability of turbine characteristic curves, numerical instability and uncertainty of computer programs, are discussed here through case studies and available model and site test data. Catastrophic accidents experienced at a Kaplan turbine and in a long tailrace tunnel project, as well as other troubles detected in a more timely fashion, are revisited in order to demonstrate the severity of reverse water hammer. However, as there is no simple design solutions for such complex systems, this paper emphasizes that the design of hydraulic systems is always difficult, difficulties that are compounded when the phenomena in question are non-linear (water hammer), dynamic (involving wave interaction and complex devices of turbines, controls, and electrical systems), and non-monotonic (severity of response is seldom simply connected to severity of load as with vibrations and resonance, and the complexity of transient loads), and thus may lead to high economic and safety challenges and consequences.

  1. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  2. Incidence of Artifacts and Deviating Values in Research Data Obtained from an Anesthesia Information Management System in Children.

    Science.gov (United States)

    Hoorweg, Anne-Lee J; Pasma, Wietze; van Wolfswinkel, Leo; de Graaff, Jurgen C

    2018-02-01

    Vital parameter data collected in anesthesia information management systems are often used for clinical research. The validity of this type of research is dependent on the number of artifacts. In this prospective observational cohort study, the incidence of artifacts in anesthesia information management system data was investigated in children undergoing anesthesia for noncardiac procedures. Secondary outcomes included the incidence of artifacts among deviating and nondeviating values, among the anesthesia phases, and among different anesthetic techniques. We included 136 anesthetics representing 10,236 min of anesthesia time. The incidence of artifacts was 0.5% for heart rate (95% CI: 0.4 to 0.7%), 1.3% for oxygen saturation (1.1 to 1.5%), 7.5% for end-tidal carbon dioxide (6.9 to 8.0%), 5.0% for noninvasive blood pressure (4.0 to 6.0%), and 7.3% for invasive blood pressure (5.9 to 8.8%). The incidence of artifacts among deviating values was 3.1% for heart rate (2.1 to 4.4%), 10.8% for oxygen saturation (7.6 to 14.8%), 14.1% for end-tidal carbon dioxide (13.0 to 15.2%), 14.4% for noninvasive blood pressure (10.3 to 19.4%), and 38.4% for invasive blood pressure (30.3 to 47.1%). Not all values in anesthesia information management systems are valid. The incidence of artifacts stored in the present pediatric anesthesia practice was low for heart rate and oxygen saturation, whereas noninvasive and invasive blood pressure and end-tidal carbon dioxide had higher artifact incidences. Deviating values are more often artifacts than values in a normal range, and artifacts are associated with the phase of anesthesia and anesthetic technique. Development of (automatic) data validation systems or solutions to deal with artifacts in data is warranted.

  3. Investigation of photon detection probability dependence of SPADnet-I digital photon counter as a function of angle of incidence, wavelength and polarization

    Energy Technology Data Exchange (ETDEWEB)

    Játékos, Balázs, E-mail: jatekosb@eik.bme.hu; Ujhelyi, Ferenc; Lőrincz, Emőke; Erdei, Gábor

    2015-01-01

    SPADnet-I is a prototype, fully digital, high spatial and temporal resolution silicon photon counter, based on standard CMOS imaging technology, developed by the SPADnet consortium. Being a novel device, the exact dependence of photon detection probability (PDP) of SPADnet-I was not known as a function of angle of incidence, wavelength and polarization of the incident light. Our targeted application area of this sensor is next generation PET detector modules, where they will be used along with LYSO:Ce scintillators. Hence, we performed an extended investigation of PDP in a wide range of angle of incidence (0° to 80°), concentrating onto a 60 nm broad wavelength interval around the characteristic emission peak (λ=420 nm) of the scintillator. In the case where the sensor was optically coupled to a scintillator, our experiments showed a notable dependence of PDP on angle, polarization and wavelength. The sensor has an average PDP of approximately 30% from 0° to 60° angle of incidence, where it starts to drop rapidly. The PDP turned out not to be polarization dependent below 30°. If the sensor is used without a scintillator (i.e. the light source is in air), the polarization dependence is much less expressed, it begins only from 50°.

  4. Development of a staff recall system for mass casualty incidents using cell phone text messaging.

    Science.gov (United States)

    Epstein, Richard H; Ekbatani, Ali; Kaplan, Javier; Shechter, Ronen; Grunwald, Zvi

    2010-03-01

    After a mass casualty incident (MCI), rapid mobilization of hospital personnel is required because of an expected surge of victims. Risk assessment of our department's manual phone tree recall system revealed multiple weaknesses that would limit an effective response. Because cell phone use is widespread within the department, we developed and tested a staff recall system, based in our anesthesia information management system (AIMS), using Short Message Service (SMS) text messaging. We sent test text messages to anesthesia staff members' cell phone numbers, determined the distance from their home to the hospital, and stored this information in our AIMS. Latency testing for the time from transmission of SMS test messages from the server to return of an e-mail reply was determined at 2 different times on 2 different dates, 1 of which was a busy holiday weekend, using volunteers within the department. Two unannounced simulated disaster recall drills were conducted, with text messages sent asking for the anticipated time to return to the hospital. A timeline of available staff on site was determined. Reasons for failure to respond to the disaster notification message were tabulated. Latency data were fit by a log-normal distribution with an average of 82 seconds from message transmission to e-mail reply. Replies to the simulated disaster alert were received from approximately 50% of staff, with 16 projecting that they would have been able to be back at the hospital within 30 minutes on both dates. There would have been 21 and 23 staff in-house at 30 minutes, and 32 and 37 staff in-house at 60 minutes on the first and second test date, respectively, including in-house staff. Of the nonresponders to the alert, 48% indicated that their cell phone was not with them or was turned off, whereas 22% missed the message. Our SMS staff recall system is likely to be able to rapidly mobilize sufficient numbers of anesthesia personnel in response to an MCI, but actual performance

  5. Application of Real-Time Automated Traffic Incident Response Plan Management System: A Web Structure for the Regional Highway Network in China

    Directory of Open Access Journals (Sweden)

    Yongfeng Ma

    2014-01-01

    Full Text Available Traffic incidents, caused by various factors, may lead to heavy traffic delay and be harmful to traffic capacity of downstream sections. Traffic incident management (TIM systems have been developed widely to respond to traffic incidents intelligently and reduce the losses. Traffic incident response plans, as an important component of TIM, can effectively guide responders as to what and how to do in traffic incidents. In the paper, a real-time automated traffic incident response plan management system was developed, which could generate and manage traffic incident response plans timely and automatically. A web application structure and a physical structure were designed to implement and show these functions. A standard framework of data storage was also developed to save information about traffic incidents and generated response plans. Furthermore, a conformation survey and case-based reasoning (CBR were introduced to identify traffic incident and generate traffic incident response plans automatically, respectively. Twenty-three traffic crash-related incidents were selected and three indicators were used to measure the system performance. Results showed that 20 of 23 cases could be retrieved effectively and accurately. The system is practicable to generate traffic incident response plans and has been implemented in China.

  6. A physiology-based seizure detection system for multichannel EEG.

    Directory of Open Access Journals (Sweden)

    Chia-Ping Shen

    Full Text Available BACKGROUND: Epilepsy is a common chronic neurological disorder characterized by recurrent unprovoked seizures. Electroencephalogram (EEG signals play a critical role in the diagnosis of epilepsy. Multichannel EEGs contain more information than do single-channel EEGs. Automatic detection algorithms for spikes or seizures have traditionally been implemented on single-channel EEG, and algorithms for multichannel EEG are unavailable. METHODOLOGY: This study proposes a physiology-based detection system for epileptic seizures that uses multichannel EEG signals. The proposed technique was tested on two EEG data sets acquired from 18 patients. Both unipolar and bipolar EEG signals were analyzed. We employed sample entropy (SampEn, statistical values, and concepts used in clinical neurophysiology (e.g., phase reversals and potential fields of a bipolar EEG to extract the features. We further tested the performance of a genetic algorithm cascaded with a support vector machine and post-classification spike matching. PRINCIPAL FINDINGS: We obtained 86.69% spike detection and 99.77% seizure detection for Data Set I. The detection system was further validated using the model trained by Data Set I on Data Set II. The system again showed high performance, with 91.18% detection of spikes and 99.22% seizure detection. CONCLUSION: We report a de novo EEG classification system for seizure and spike detection on multichannel EEG that includes physiology-based knowledge to enhance the performance of this type of system.

  7. National Incident Management System (NIMS) Standards Review Panel Workshop Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, Robert D.; Kirk, Jennifer L.; Stanton, James R.; Shebell, Peter; Schwartz, Deborah S.; Judd, Kathleen S.; Gelston, Gariann M.

    2006-02-07

    The importance and need for full compliant implementation of NIMS nationwide was clearly demonstrated during the Hurricane Katrina event, which was clearly expressed in Secretary Chertoff's October 4, 2005 letter addressed to the State's governors. It states, ''Hurricane Katrina was a stark reminder of how critical it is for our nation to approach incident management in a coordinated, consistent, and efficient manner. We must be able to come together, at all levels of government, to prevent, prepare for, respond to, and recover from any emergency or disaster. Our operations must be seamless and based on common incident management doctrine, because the challenges we face as a nation are far greater than capabilities of any one jurisdiction.'' The NIMS is a system/architecture for organizing response on a ''national'' level. It incorporations ICS as a main component of that structure (i.e., it institutionalizes ICS in NIMS). In a paper published on the NIMS Website, the following statements were made: ''NIMS represents a core set of doctrine, principles, terminology, and organizational processes to enable effective, efficient and collaborative incident management at all levels. To provide the framework for interoperability and compatibility, the NIMS is based on a balance between flexibility and standardization.'' Thus the NIC is challenged with the need to adopt quality SDO generated standards to support NIMS compliance, but in doing so maintain the flexibility necessary so that response operations can be tailored for the specific jurisdictional and geographical needs across the nation. In support of this large and complex challenge facing the NIC, the Pacific Northwest National Laboratory (PNNL) was asked to provide technical support to the NIC, through their DHS Science and Technology ? Standards Portfolio Contract, to help identify, review, and develop key standards for NIMS compliance. Upon

  8. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  9. Hospital Incident Command System (HICS) performance in Iran; decision making during disasters.

    Science.gov (United States)

    Djalali, Ahmadreza; Castren, Maaret; Hosseinijenab, Vahid; Khatib, Mahmoud; Ohlen, Gunnar; Kurland, Lisa

    2012-02-06

    Hospitals are cornerstones for health care in a community and must continue to function in the face of a disaster. The Hospital Incident Command System (HICS) is a method by which the hospital operates when an emergency is declared. Hospitals are often ill equipped to evaluate the strengths and vulnerabilities of their own management systems before the occurrence of an actual disaster. The main objective of this study was to measure the decision making performance according to HICS job actions sheets using tabletop exercises. This observational study was conducted between May 1st 2008 and August 31st 2009. Twenty three Iranian hospitals were included. A tabletop exercise was developed for each hospital which in turn was based on the highest probable risk. The job action sheets of the HICS were used as measurements of performance. Each indicator was considered as 1, 2 or 3 in accordance with the HICS. Fair performance was determined as hospitals had a hospital disaster management plan. The performance according to HICS was intermediate for 83% (n = 19) of the participating hospitals. No hospital had a high level of performance. The performance level for the individual sections was intermediate or fair, except for the logistic and finance sections which demonstrated a higher level of performance. The public hospitals had overall higher performances than university hospitals (P = 0.04). The decision making performance in the Iranian hospitals, as measured during table top exercises and using the indicators proposed by HICS was intermediate to poor. In addition, this study demonstrates that the HICS job action sheets can be used as a template for measuring the hospital response. Simulations can be used to assess preparedness, but the correlation with outcome remains to be studied.

  10. Hospital incident command system (HICS performance in Iran; decision making during disasters

    Directory of Open Access Journals (Sweden)

    Djalali Ahmadreza

    2012-02-01

    Full Text Available Abstract Background Hospitals are cornerstones for health care in a community and must continue to function in the face of a disaster. The Hospital Incident Command System (HICS is a method by which the hospital operates when an emergency is declared. Hospitals are often ill equipped to evaluate the strengths and vulnerabilities of their own management systems before the occurrence of an actual disaster. The main objective of this study was to measure the decision making performance according to HICS job actions sheets using tabletop exercises. Methods This observational study was conducted between May 1st 2008 and August 31st 2009. Twenty three Iranian hospitals were included. A tabletop exercise was developed for each hospital which in turn was based on the highest probable risk. The job action sheets of the HICS were used as measurements of performance. Each indicator was considered as 1, 2 or 3 in accordance with the HICS. Fair performance was determined as Results None of the participating hospitals had a hospital disaster management plan. The performance according to HICS was intermediate for 83% (n = 19 of the participating hospitals. No hospital had a high level of performance. The performance level for the individual sections was intermediate or fair, except for the logistic and finance sections which demonstrated a higher level of performance. The public hospitals had overall higher performances than university hospitals (P = 0.04. Conclusions The decision making performance in the Iranian hospitals, as measured during table top exercises and using the indicators proposed by HICS was intermediate to poor. In addition, this study demonstrates that the HICS job action sheets can be used as a template for measuring the hospital response. Simulations can be used to assess preparedness, but the correlation with outcome remains to be studied.

  11. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  12. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  13. Fiber-Optic Based Compact Gas Leak Detection System

    Science.gov (United States)

    deGroot, Wim A.

    1995-01-01

    A propellant leak detection system based on Raman scattering principles is introduced. The proposed system is flexible and versatile as the result of the use of optical fibers. It is shown that multiple species can be monitored simultaneously. In this paper oxygen, nitrogen, carbon monoxide, and hydrogen are detected and monitored. The current detection sensitivity for both hydrogen and carbon monoxide is 1% partial pressure at ambient conditions. The sensitivity for oxygen and nitrogen is 0.5% partial pressure. The response time to changes in species concentration is three minutes. This system can be used to monitor multiple species at several locations.

  14. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  15. Differences Between Methods of Detecting Medication Errors: A Secondary Analysis of Medication Administration Errors Using Incident Reports, the Global Trigger Tool Method, and Observations.

    Science.gov (United States)

    Härkänen, Marja; Turunen, Hannele; Vehviläinen-Julkunen, Katri

    2016-03-24

    This study aimed to compare medication administration errors detected by 3 different methods in terms of severity, type, and contributing factors. The study was performed in one university hospital in Finland. A convenience sample of medication administration errors (n = 451) reported on incident reports or detected by reviewing randomly selected patient records via the Global Trigger Tool method and direct observations of patient record reviews were collected for reanalysis. The severity of the medication administration errors, the types thereof, and factors contributing to such errors were reclassified using the National Coordinating Council for Medication Error Reporting and Prevention's taxonomy of medication errors. The observational method revealed fewer medication errors that were more likely to cause harm to patients than did the incident reports or the Global Trigger Tool method. The incident reports and the Global Trigger Tool method mainly revealed wrong doses, whereas most medication administration errors in the observational data were errors involving the use of the incorrect technique. In addition, each method produced different information regarding the factors contributing to medication administration errors. Based on the study's findings and the limitations of each method, a combination of different methods should be used to discover representative information concerning medication administration errors. To increase medication administration safety, advanced multiprofessional collaboration, effective communication, adequate skills, more systematic medication processes, and distraction-free work environments are needed.

  16. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    National Research Council Canada - National Science Library

    2001-01-01

    .... and Canadian military personnel. In light of these concerns both defense departments have increased efforts to develop and field biological agent detection systems to help protect their military forces and fixed assets...

  17. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  18. A model for anomaly classification in intrusion detection systems

    Science.gov (United States)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  19. Developing a real-time incident decision support system (IDSS) for the freight industry.

    Science.gov (United States)

    2015-01-01

    Our nation's economy is highly dependent on reliable and cost-effective truck-freight : transportation. Delays to truck movement are of particular concern to the nation. Building upon : our previous effort, we developed an Incident Decision Support S...

  20. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  1. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  2. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.

  3. Occupancy change detection system and method

    Science.gov (United States)

    Bruemmer, David J [Idaho Falls, ID; Few, Douglas A [Idaho Falls, ID

    2009-09-01

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

  4. Incidence of Artifacts and Deviating Values in Research Data Obtained from an Anesthesia Information Management System in Children

    NARCIS (Netherlands)

    Hoorweg, Anne-Lee J; Pasma, Wietze; van Wolfswinkel, Leo; de Graaff, Jurgen C

    BACKGROUND: Vital parameter data collected in anesthesia information management systems are often used for clinical research. The validity of this type of research is dependent on the number of artifacts. METHODS: In this prospective observational cohort study, the incidence of artifacts in

  5. Principal Experiences with Crisis Management Professional Development, Collaboration, and Implementation of the National Incident Management System Phases of Emergency Management

    Science.gov (United States)

    Naradko, Anthony M.

    2017-01-01

    The purpose of this qualitative single-subject case study was to identify the elements critical to crisis management professional development for school principals; the factors influencing the implementation of the National Incident Management System Phases of Emergency Management (2010) for principals; and the necessary elements for fostering…

  6. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  7. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  8. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  9. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  10. Methods to detect faulty splices in the superconducting magnet system of the LHC

    International Nuclear Information System (INIS)

    Bailey, R.; Bellesia, B.; Lasheras, N.Catalan; Dahlerup-Petersen, K.; Denz, R.; Robles, C.; Koratzinos, M.; Pojer, M.; Ponce, L.; Saban, R.; Schmidt, R.

    2009-01-01

    The incident of 19 September 2008 at the LHC was caused by a faulty inter-magnet splice of about 200 n(Omega) resistance. Cryogenic and electrical techniques have been developed to detect other abnormal splices, either between or inside the magnets. The existing quench protection system can be used to detect internal splices with R > 20 n(Omega). Since this system does not cover the bus between magnets, the cryogenic system is used to measure the rate of temperature rise due to ohmic heating. Accuracy of a few mK/h, corresponding to a few Watts, has been achieved, allowing detection of excess resistance, if it is more than 40 n(Omega) in a cryogenic subsector (two optical cells). Follow-up electrical measurements are made in regions identified by the cryogenic system. These techniques have detected two abnormal internal magnet splices of 100 n(Omega) and 50 n(Omega) respectively. In 2009, this ad hoc system will be replaced with a permanent one to monitor all splices at the n(Omega) level

  11. Detection of short range order in SiO{sub 2} thin-films by grazing-incidence wide and small-angle X-ray scattering

    Energy Technology Data Exchange (ETDEWEB)

    Nagata, Kohki, E-mail: nagata.koki@iri-tokyo.jp [Tokyo Metropolitan Industrial Technology Research Institute, 2-4-10 Aomi, Koto-ku, Tokyo 135-0064 (Japan); School of Science and Technology, Meiji University, 1-1-1 Higashimita, Tama-ku, Kawasaki, Kanagawa 214-8571 (Japan); Ogura, Atsushi [School of Science and Technology, Meiji University, 1-1-1 Higashimita, Tama-ku, Kawasaki, Kanagawa 214-8571 (Japan); Hirosawa, Ichiro [Japan Synchrotron Radiation Research Institute (JASRI), 1-1-1, Kouto, Sayo-cho, Sayo-gun, Hyogo 679-5198 (Japan); Suwa, Tomoyuki; Teramoto, Akinobu; Ohmi, Tadahiro [New Industry Creation Hatchery Center, Tohoku University, 6-6-10 Aramakiazaaoba, Aoba-ku, Sendai, Miyagi 980-8579 (Japan)

    2016-04-21

    The effects of the fabrication process conditions on the microstructure of silicon dioxide thin films of <10 nm thickness are presented. The microstructure was investigated using grazing-incidence wide and small-angle X-ray scattering methods with synchrotron radiation. The combination of a high brilliance light source and grazing incident configuration enabled the observation of very weak diffuse X-ray scattering from SiO{sub 2} thin films. The results revealed different microstructures, which were dependent on oxidizing species or temperature. The micro-level properties differed from bulk properties reported in the previous literature. It was indicated that these differences originate from inner stress. The detailed structure in an amorphous thin film was not revealed owing to detection difficulties.

  12. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of met...

  13. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  14. A TNA explosives-detection system in airline baggage

    Energy Technology Data Exchange (ETDEWEB)

    Shea, P.; Gozani, T. (Science Applications International Corp., Santa Clara, CA (USA)); Bozorgmanesh, H. (Science Applications International Corp., San Diego, CA (USA))

    1990-12-20

    Existing technologies that are applied to explosives-detection in passenger baggage are briefly discussed. A system based on thermal-neutron analysis (TNA) is described. The actual performance of the system in the field on passenger bags is given. The application of the TNA in an integrated airport security system is discussed in view of the intense public debate on this issue. (orig.).

  15. Th17/Treg imbalance induced by increased incidence of atherosclerosis in patients with systemic lupus erythematosus (SLE).

    Science.gov (United States)

    Zhu, Mengya; Mo, Hanyou; Li, Dong; Luo, Xiaohong; Zhang, Lihua

    2013-07-01

    The objective of the study was to investigate whether the immunological factors in patients with Systemic Lupus Erythematosus (SLE) and a high incidence of atherosclerosis correlate with a Th17/Treg imbalance. All cases were recruited from the Affiliated Hospital of Guilin Medical University: a random sample of 42 cases with SLE and atherosclerosis, 39 positive control cases with SLE alone with no anomalies detected via coronary artery angiography or carotid color Doppler ultrasound examination, as well as 45 normal controls based on physical examination were included. The serum expression levels of IL-10, IL-17, IL-6, TNF-α, Th17, Th17 cell transcription factor RORγt, and Treg cell transcription factor Foxp3 were measured in each group of patients. Correlations among Th17/Treg, their secreted cell factors, transcription factors, SLE, and SLE with concurrent atherosclerosis (SLE + AS) were analyzed. The results are as follows: (1) total cholesterol and triacylglycerol levels in the SLE and SLE + AS groups were higher than those in the control group (P < 0.05 and P < 0.01); (2) serum IL-10 in the SLE + AS group was lower than the SLE and control groups; however, serum IL-17 and IL-6 levels in the SLE + AS group were elevated compared to the SLE and control groups (average P < 0.01); (3) the percentage of Treg cells in the SLE + AS patients was lower than those found in the SLE and control groups; in contrast, percentages of serum Th17 cells in SLE + AS patients were higher than the SLE and control groups (average P < 0.01); (4) FoxP3 expression in the SLE + AS group was lower than levels observed in the SLE and control groups (average P < 0.05); in contrast, RORγt expression in the SLE + AS group was higher than levels found in the SLE and control groups (average P < 0.05). The abnormal balance between Th17 cells and Treg cells in SLE + AS patients has obvious implications for Th17 migration. The results suggest that Th17 cell proportion and function can be

  16. A System View on Iterative MIMO Detection: Dynamic Sphere Detection versus Fixed Effort List Detection

    Directory of Open Access Journals (Sweden)

    Christina Gimmler-Dumont

    2012-01-01

    reliability information is fed back from the channel decoder to the MIMO detector. In this paper, we derive a basic framework to compare different soft-input soft-output MIMO detectors in open- and closed-loop systems. Within this framework, we analyze a depth-first sphere detector and a breadth-first fixed effort detector for different application scenarios and their effects on area and energy efficiency on the whole system. We present all system components under open- and closed-loop system aspects and determine the overall implementation cost for changing an open-loop system in a closed-loop system.

  17. [Patient safety -- mission for the future: The importance of Critical Incident Reporting Systems (CIRS) in clinical practice].

    Science.gov (United States)

    Maas, Matthias; Güß, Tim

    2014-07-01

    Every day patients experience harm due to errors and complications. To improve this situation, patient safety is increasingly becoming important in the treatment process. One aspect to increase patient safety is the Critical Incident Reporting System (CIRS). Observers and members of the care team are given the opportunity to anonymously report critical incidents and thus allow an analysis by an evaluation team. The goal is not to sanction the behavior of an individual, but to identify particular structural and organizational sources of error and to derive improvements. © Georg Thieme Verlag Stuttgart · New York.

  18. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kalafut, Andrew J. [Indiana University; Shue, Craig A [ORNL; Gupta, Prof. Minaxi [Indiana University

    2010-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.

  19. Detecting Fraud in Internet Auction Systems

    Science.gov (United States)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  20. Incidences and Risk Factors of Organ Manifestations in the Early Course of Systemic Sclerosis: A Longitudinal EUSTAR Study.

    Directory of Open Access Journals (Sweden)

    Veronika K Jaeger

    Full Text Available Systemic sclerosis (SSc is a rare and clinically heterogeneous autoimmune disorder characterised by fibrosis and microvascular obliteration of the skin and internal organs. Organ involvement mostly manifests after a variable period of the onset of Raynaud's phenomenon (RP. We aimed to map the incidence and predictors of pulmonary, cardiac, gastrointestinal (GI and renal involvement in the early course of SSc.In the EUSTAR cohort, patients with early SSc were identified as those who had a visit within the first year after RP onset. Incident SSc organ manifestations and their risk factors were assessed using Kaplan-Meier methods and Cox regression analysis.Of the 695 SSc patients who had a baseline visit within 1 year after RP onset, the incident non-RP manifestations (in order of frequency were: skin sclerosis (75% GI symptoms (71%, impaired diffusing capacity for monoxide40mmHg (14%, and renal crisis (3%. In the heart, incidence rates were highest for diastolic dysfunction, followed by conduction blocks and pericardial effusion. While the main baseline risk factor for a short timespan to develop FVC impairment was diffuse skin involvement, for PAPsys>40mmHg it was higher patient age. The main risk factors for incident cardiac manifestations were anti-topoisomerase autoantibody positivity and older age. Male sex, anti-RNA-polymerase-III positivity, and older age were risk factors associated with incident renal crisis.In SSc patients presenting early after RP onset, approximately half of all incident organ manifestations occur within 2 years and have a simultaneous rather than a sequential onset. These findings have implications for the design of new diagnostic and therapeutic strategies aimed to 'widen' the still very narrow 'window of opportunity'. They may also enable physicians to counsel and manage patients presenting early in the course of SSc more accurately.

  1. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  2. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  3. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  4. Alternative vehicle detection technologies for traffic signal systems : technical report.

    Science.gov (United States)

    2009-02-01

    Due to the well-documented problems associated with inductive loops, most jurisdictions have : replaced many intersection loops with video image vehicle detection systems (VIVDS). While VIVDS : have overcome some of the problems with loops such as tr...

  5. A Driver Face Monitoring System for Fatigue and Distraction Detection

    Directory of Open Access Journals (Sweden)

    Mohamad-Hoseyn Sigari

    2013-01-01

    Full Text Available Driver face monitoring system is a real-time system that can detect driver fatigue and distraction using machine vision approaches. In this paper, a new approach is introduced for driver hypovigilance (fatigue and distraction detection based on the symptoms related to face and eye regions. In this method, face template matching and horizontal projection of top-half segment of face image are used to extract hypovigilance symptoms from face and eye, respectively. Head rotation is a symptom to detect distraction that is extracted from face region. The extracted symptoms from eye region are (1 percentage of eye closure, (2 eyelid distance changes with respect to the normal eyelid distance, and (3 eye closure rate. The first and second symptoms related to eye region are used for fatigue detection; the last one is used for distraction detection. In the proposed system, a fuzzy expert system combines the symptoms to estimate level of driver hypo-vigilance. There are three main contributions in the introduced method: (1 simple and efficient head rotation detection based on face template matching, (2 adaptive symptom extraction from eye region without explicit eye detection, and (3 normalizing and personalizing the extracted symptoms using a short training phase. These three contributions lead to develop an adaptive driver eye/face monitoring. Experiments show that the proposed system is relatively efficient for estimating the driver fatigue and distraction.

  6. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  7. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  8. Design and implementation of network attack analysis and detect system

    International Nuclear Information System (INIS)

    Lu Zhigang; Wu Huan; Liu Baoxu

    2007-01-01

    This paper first analyzes the present research state of IDS (intrusion detection system), classifies and compares existing methods. According to the problems existing in IDS, such as false-positives, false-negatives and low information visualization, this paper suggests a system named NAADS which supports multi data sources. Through a series of methods such as clustering analysis, association analysis and visualization, rate of detection and usability of NAADS are increased. (authors)

  9. Detecting new objects and building models with active robot system

    OpenAIRE

    Stergaršek Kuzmič, Eva

    2010-01-01

    An important element of a cognitive robotic system is the ability to detect novel objects and learn their representations, which are suitable for later recognition and manipulation. The basic assumption of our work is that the detection and segmentation of new objects can be facilitated by an active robotic system, which can not only observe the objects but can also manipulate them. Manipulation supports object segmentation and the accumulation of object features, which provides the basis for...

  10. Fault Detection and Performance Monitoring in PV Systems

    OpenAIRE

    Vasco Brogueira Andrade

    2017-01-01

    Given the exponential growth of the PV sector in recent years and the market?s overall need for new PV monitoring solutions, this dissertation aims at creating an automatic fault detection tool for PV systems, more specifically for shading and soiling situations. By detecting deviations in the measured PV systems? data patterns, this tool aims at providing essential information for the deployment of the right maintenance strategy for each situation.

  11. Biodosimetry: Medicine, Science, and Systems to Support the Medical Decision-Maker Following a Large Scale Nuclear or Radiation Incident

    International Nuclear Information System (INIS)

    Coleman, C. Norman; Koerner, John F.

    2016-01-01

    The public health and medical response to a radiological or nuclear incident requires the capability to sort, assess, treat, triage and to ultimately discharge, refer or transport people to their next step in medical care. The size of the incident and scarcity of resources at the location of each medical decision point will determine how patients are triaged and treated. This will be a rapidly evolving situation impacting medical responders at regional, national and international levels. As capabilities, diagnostics and medical countermeasures improve, a dynamic system-based approach is needed to plan for and manage the incident, and to adapt effectively in real time. In that the concepts and terms can be unfamiliar and possibly confusing, resources and a concept of operations must be considered well in advance. An essential underlying tenet is that medical evaluation and care will be managed by health-care professionals with biodosimetry assays providing critical supporting data. (authors)

  12. A cross-national comparison of incident reporting systems implemented in German and Swiss hospitals.

    Science.gov (United States)

    Manser, Tanja; Imhof, Michael; Lessing, Constanze; Briner, Matthias

    2017-06-01

    This study aimed to empirically compare incident reporting systems (IRS) in two European countries and to explore the relationship of IRS characteristics with context factors such as hospital characteristics and characteristics of clinical risk management (CRM). We performed exploratory, secondary analyses of data on characteristics of IRS from nationwide surveys of CRM practices. The survey was originally sent to 2136 hospitals in Germany and Switzerland. Persons responsible for CRM in 622 hospitals completed the survey (response rate 29%). None. Differences between IRS in German and Swiss hospitals were assessed using Chi2, Fisher's Exact and Freeman-Halton-Tests, as appropriate. To explore interrelations between IRS characteristics and context factors (i.e. hospital and CRM characteristics) we computed Cramer's V. Comparing participating hospitals across countries, Swiss hospitals had implemented IRS earlier, more frequently and more often provided introductory IRS training systematically. German hospitals had more frequently systematically implemented standardized procedures for event analyses. IRS characteristics were significantly associated with hospital characteristics such as hospital type as well as with CRM characteristics such as existence of strategic CRM objectives and of a dedicated position for central CRM coordination. This study contributes to an improved understanding of differences in the way IRS are set up in two European countries and explores related context factors. This opens up new possibilities for empirically informed, strategic interventions to further improve dissemination of IRS and thus support hospitals in their efforts to move patient safety forward. © The Author 2017. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  13. A System for Detecting Miscues in Dyslexic Read Speech

    DEFF Research Database (Denmark)

    Rasmussen, Morten Højfeldt; Tan, Zheng-Hua; Lindberg, Børge

    2009-01-01

    While miscue detection in general is a well explored research field little attention has so far been paid to miscue detection in dyslexic read speech. This domain differs substantially from the domains that are commonly researched, as for example dyslexic read speech includes frequent regressions...... that the system detects miscues at a false alarm rate of 5.3% and a miscue detection rate of 40.1%. These results are worse than current state of the art reading tutors perhaps indicating that dyslexic read speech is a challenge to handle....

  14. A safety incident reporting system for primary care. A systematic literature review and consensus procedure by the LINNEAUS collaboration on patient safety in primary care.

    Science.gov (United States)

    Klemp, Kerstin; Zwart, Dorien; Hansen, Jørgen; Hellebek, Torben; Luettel, Dagmar; Verstappen, Wim; Beyer, Martin; Gerlach, Ferdin M; Hoffmann, Barbara; Esmail, Aneez

    2015-09-01

    Incident reporting is widely used in both patient safety improvement programmes, and in research on patient safety. To identify the key requirements for incident reporting systems in primary care; to develop an Internet-based incident reporting and learning system for primary care. A literature review looking at the purpose, design and requirements of an incident reporting system (IRS) was used to update an existing incident reporting system, widely used in Germany. Then, an international expert panel with knowledge on IRS developed the criteria for the design of a new web-based incident reporting system for European primary care. A small demonstration project was used to create a web-based reporting system, to be made freely available for practitioners and researchers. The expert group compiled recommendations regarding the desirable features of an incident reporting system for European primary care. These features covered the purpose of reporting, who should be involved in reporting, the mode of reporting, design considerations, feedback mechanisms and preconditions necessary for the implementation of an IRS. A freely available web-based reporting form was developed, based on these criteria. It can be modified for local contexts. Practitioners and researchers can use this system as a means of recording patient safety incidents in their locality and use it as a basis for learning from errors. The LINNEAUS collaboration has provided a freely available incident reporting system that can be modified for a local context and used throughout Europe.

  15. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  16. A comparison of self-report and antiretroviral detection to inform estimates of antiretroviral therapy coverage, viral load suppression and HIV incidence in Kwazulu-Natal, South Africa.

    Science.gov (United States)

    Huerga, Helena; Shiferie, Fisseha; Grebe, Eduard; Giuliani, Ruggero; Farhat, Jihane Ben; Van-Cutsem, Gilles; Cohen, Karen

    2017-09-29

    Accurately identifying individuals who are on antiretroviral therapy (ART) is important to determine ART coverage and proportion on ART who are virally suppressed. ART is also included in recent infection testing algorithms used to estimate incidence. We compared estimates of ART coverage, viral load suppression rates and HIV incidence using ART self-report and detection of antiretroviral (ARV) drugs and we identified factors associated with discordance between the methods. Cross-sectional population-based survey in KwaZulu-Natal, South Africa. Individuals 15-59 years were eligible. Interviews included questions about ARV use. Rapid HIV testing was performed at the participants' home. Blood specimens were collected for ARV detection, LAg-Avidity HIV incidence testing and viral load quantification in HIV-positive individuals. Multivariate logistic regression models were used to identify socio-demographic covariates associated with discordance between self-reported ART and ARV detection. Of the 5649 individuals surveyed, 1423 were HIV-positive. Median age was 34 years and 76.3% were women. ART coverage was estimated at 51.4% (95%CI:48.5-54.3), 53.1% (95%CI:50.2-55.9) and 56.1% (95%CI:53.5-58.8) using self-reported ART, ARV detection and both methods combined (classified as ART exposed if ARV detected and/or ART reported) respectively. ART coverage estimates using the 3 methods were fairly similar within sex and age categories except in individuals aged 15-19 years: 33.3% (95%CI:23.3-45.2), 33.8% (95%CI:23.9-45.4%) and 44.3% (95%CI:39.3-46.7) using self-reported ART, ARV detection and both methods combined. Viral suppression below 1000cp/mL in individuals on ART was estimated at 89.8% (95%CI:87.3-91.9), 93.1% (95%CI:91.0-94.8) and 88.7% (95%CI:86.2-90.7) using self-reported ART, ARV detection and both methods combined respectively. HIV incidence was estimated at 1.4 (95%CI:0.8-2.0) new cases/100 person-years when employing no measure of ARV use, 1.1/100PY (95%CI:0

  17. The risk of incident type 2 diabetes in a Korean metabolically healthy obese population: the role of systemic inflammation.

    Science.gov (United States)

    Jung, Chang Hee; Lee, Min Jung; Kang, Yu Mi; Jang, Jung Eun; Leem, Jaechan; Hwang, Jenie Yoonoo; Kim, Eun Hee; Park, Joong-Yeol; Kim, Hong-Kyu; Lee, Woo Je

    2015-03-01

    This study sought to investigate whether the metabolically healthy obese (MHO) phenotype is associated with an increased risk of incident type 2 diabetes in a Korean population and, if so, whether systemic inflammation affects this risk in MHO individuals. The study population comprised 36 135 Koreans without type 2 diabetes. Participants were stratified by body mass index (cutoff value, 25.0 kg/m(2)) and metabolic health state (assessed using Adult Treatment Panel-III criteria). High-sensitive C-reactive protein (hsCRP) was used as a surrogate marker of systemic inflammation. Subjects were classified into low (ie, hsCRP systemic inflammation groups. During a median followup of 36.5 months (range, 4.8-81.7 mo), 635 of the 36 135 individuals (1.8%) developed type 2 diabetes. The MHO group had a significantly higher risk of incident type 2 diabetes (multivariate-adjusted hazard ratio [HR], 1.57; 95% confidence interval [CI], 1.16-2.11) than the metabolically healthy nonobese (MHNO) group. However, the risk of the MHO group varied according to the degree of systemic inflammation. Compared with the MHNO/low systemic inflammation group, the risk of type 2 diabetes in the MHO/low systemic inflammation group was not significantly elevated (multivariate-adjusted HR, 1.61; 95% CI, 0.77-3.34). However, the MHO/high systemic inflammation group had an elevated risk of incident type 2 diabetes (multivariate-adjusted HR, 3.73; 95% CI 2.36-5.88). MHO subjects show a substantially higher risk of incident type 2 diabetes than MHNO subjects. The level of systemic inflammation partially explains this increased risk.

  18. The association of remotely sensed outdoor fine particulate matter with cancer incidence of respiratory system in the USA.

    Science.gov (United States)

    Al-Hamdan, Ashraf Z; Albashaireh, Reem N; Al-Hamdan, Mohammad Z; Crosson, William L

    2017-05-12

    This study aimed to assess the association between exposure to fine particulate matter (PM 2.5 ) and respiratory system cancer incidence in the US population (n = 295,404,580) using a satellite-derived estimate of PM 2.5 concentrations. Linear and logistic regression analyses were performed to determine whether PM 2.5 was related to the odds of respiratory system cancer (RSC) incidence based on gender and race. Positive linear regressions were found between PM 2.5 concentrations and the age-adjusted RSC incidence rates for all groups (Males, Females, Whites, and Blacks) except for Asians and American Indians. The linear relationships between PM 2.5 and RSC incidence rate per 1 μg/m 3 PM 2.5 increase for Males, Females, Whites, Blacks, and all categories combined had slopes of, respectively, 7.02 (R 2 = 0.36), 2.14 (R 2 = 0.14), 3.92 (R 2 = 0.23), 5.02 (R 2 = 0.21), and 4.15 (R 2 = 0.28). Similarly, the logistic regression odds ratios per 10 μg/m 3 increase of PM 2.5 were greater than one for all categories except for Asians and American Indians, indicating that PM 2.5 is related to the odds of RSC incidence. The age-adjusted odds ratio for males (OR = 2.16, 95% CI = 1.56-3.01) was higher than that for females (OR = 1.50, 95% CI = 1.09-2.06), and it was higher for Blacks (OR = 2.12, 95% CI = 1.43-3.14) than for Whites (OR = 1.72, 95% CI = 1.23-2.42). The odds ratios for all categories were attenuated with the inclusion of the smoking covariate, reflecting the effect of smoking on RSC incidence besides PM 2.5 .

  19. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  20. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  1. Incidence and risk factors for central nervous system relapse in children and adolescents with acute lymphoblastic leukemia

    Science.gov (United States)

    Cancela, Camila Silva Peres; Murao, Mitiko; Viana, Marcos Borato; de Oliveira, Benigna Maria

    2012-01-01

    Background Despite all the advances in the treatment of childhood acute lymphoblastic leukemia, central nervous system relapse remains an important obstacle to curing these patients. This study analyzed the incidence of central nervous system relapse and the risk factors for its occurrence in children and adolescents with acute lymphoblastic leukemia. Methods This study has a retrospective cohort design. The studied population comprised 199 children and adolescents with a diagnosis of acute lymphoblastic leukemia followed up at Hospital das Clinicas, Universidade Federal de Minas Gerais (HC-UFMG) between March 2001 and August 2009 and submitted to the Grupo Brasileiro de Tratamento de Leucemia da Infância - acute lymphoblastic leukemia (GBTLI-LLA-99) treatment protocol. Results The estimated probabilities of overall survival and event free survival at 5 years were 69.5% (± 3.6%) and 58.8% (± 4.0%), respectively. The cumulative incidence of central nervous system (isolated or combined) relapse was 11.0% at 8 years. The estimated rate of isolated central nervous system relapse at 8 years was 6.8%. In patients with a blood leukocyte count at diagnosis ≥ 50 x 109/L, the estimated rate of isolated or combined central nervous system relapse was higher than in the group with a count 50 x 109/L at diagnosis seems to be a significant prognostic factor for a higher incidence of central nervous system relapse in childhood acute lymphoblastic leukemia. PMID:23323068

  2. A neuromorphic system for object detection and classification

    Science.gov (United States)

    Khosla, Deepak; Chen, Yang; Kim, Kyungnam; Cheng, Shinko Y.; Honda, Alexander L.; Zhang, Lei

    2013-05-01

    Unattended object detection, recognition and tracking on unmanned reconnaissance platforms in battlefields and urban spaces are topics of emerging importance. In this paper, we present an unattended object recognition system that automatically detects objects of interest in videos and classifies them into various categories (e.g., person, car, truck, etc.). Our system is inspired by recent findings in visual neuroscience on feed-forward object detection and recognition pipeline and mirrors that via two main neuromorphic modules (1) A front-end detection module that combines form and motion based visual attention to search for and detect "integrated" object percepts as is hypothesized to occur in the human visual pathways; (2) A back-end recognition module that processes only the detected object percepts through a neuromorphic object classification algorithm based on multi-scale convolutional neural networks, which can be efficiently implemented in COTS hardware. Our neuromorphic system was evaluated using a variety of urban area video data collected from both stationary and moving platforms. The data are quite challenging as it includes targets at long ranges, occurring under variable conditions of illuminations and occlusion with high clutter. The experimental results of our system showed excellent detection and classification performance. In addition, the proposed bio-inspired approach is good for hardware implementation due to its low complexity and mapping to off-the-shelf conventional hardware.

  3. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the System-Wide Safety and Assurance Technologies Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2015-01-01

    The Aviation Safety Program (AvSP) System-Wide Safety and Assurance Technologies (SSAT) Project asked the AvSP Systems and Portfolio Analysis Team to identify SSAT-related trends. SSAT had four technical challenges: advance safety assurance to enable deployment of NextGen systems; automated discovery of precursors to aviation safety incidents; increasing safety of human-automation interaction by incorporating human performance, and prognostic algorithm design for safety assurance. This report reviews incident data from the NASA Aviation Safety Reporting System (ASRS) for system-component-failure- or-malfunction- (SCFM-) related and human-factor-related incidents for commercial or cargo air carriers (Part 121), commuter airlines (Part 135), and general aviation (Part 91). The data was analyzed by Federal Aviation Regulations (FAR) part, phase of flight, SCFM category, human factor category, and a variety of anomalies and results. There were 38 894 SCFM-related incidents and 83 478 human-factorrelated incidents analyzed between January 1993 and April 2011.

  4. Detection device for off-gas system accidents

    International Nuclear Information System (INIS)

    Kubota, Ryuji; Tsuruoka, Ryozo; Yamanari, Shozo.

    1984-01-01

    Purpose: To rapidly isolate the off-gas system by detecting the off-gas system failure accident in a short time. Constitution: Radiation monitors are disposed to ducts connecting an exhaust gas area and an air conditioning system as a portion of a turbine building. The ducts are disposed independently such that they ventilate only the atmosphere in the exhaust gas area and do not mix the atmosphere in the turbine building. Since radioactivity issued upon off-gas accidents to the exhaust gas area is sucked to the duct, it can be detected by radiation detection monitors in a short time after the accident. Further, since the operator judges it as the off-gas system accident, the off-gas system can be isolated in a short time after the accident. (Moriyama, K.)

  5. Evaluation of video detection systems, volume 3 : effects of windy conditions in the performance of video detection systems.

    Science.gov (United States)

    2008-05-01

    The performance of three Video Detection Systems (VDS), namely Autoscope, Iteris, and Peek, was evaluated : at stop bar and advance locations, at an instrumented signalized intersection located in Rantoul, Illinois, utilizing : a side-by-side install...

  6. Evaluation of video detection systems, volume 4 : effects of adverse weather conditions in the performance of video detection systems.

    Science.gov (United States)

    2009-03-01

    The performance of three video detection systems (VDS): Iteris, Autoscope, and Peek, was evaluated : using a side-by-side installation at a signalized intersection under various adverse weather conditions including : rain and snow in both day and nig...

  7. Evaluation of video detection systems, volume 1 : effects of configuration changes in the performance of video detection systems.

    Science.gov (United States)

    2009-10-01

    The effects of modifying the configuration of three video detection (VD) systems (Iteris, Autoscope, and Peek) : are evaluated in daytime and nighttime conditions. Four types of errors were used: false, missed, stuck-on, and : dropped calls. The thre...

  8. A UAV-BASED ROE DEER FAWN DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    M. Israel

    2012-09-01

    Full Text Available This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  9. a Uav-Based ROE Deer Fawn Detection System

    Science.gov (United States)

    Israel, M.

    2011-09-01

    This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  10. Detection of forced oscillations in power systems with multichannel methods

    Energy Technology Data Exchange (ETDEWEB)

    Follum, James D. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2015-09-30

    The increasing availability of high fidelity, geographically dispersed measurements in power systems improves the ability of researchers and engineers to study dynamic behaviors in the grid. One such behavior that is garnering increased attention is the presence of forced oscillations. Power system engineers are interested in forced oscillations because they are often symptomatic of the malfunction or misoperation of equipment. Though the resulting oscillation is not always large in amplitude, the root cause may be serious. In this report, multi-channel forced oscillation detection methods are developed. These methods leverage previously developed detection approaches based on the periodogram and spectral-coherence. Making use of geographically distributed channels of data is shown to improved detection performance and shorten the delay before an oscillation can be detected in the online environment. Results from simulated and measured power system data are presented.

  11. Detection and Location of Structural Degradation in Mechanical Systems

    International Nuclear Information System (INIS)

    Blakeman, E.D.; Damiano, B.; Phillips, L.D.

    1999-01-01

    The investigation of a diagnostic method for detecting and locating the source of structural degradation in a mechanical system is described in this paper. The diagnostic method uses a mathematical model of the mechanical system to determine relationships between system parameters and measurable spectral features. These relationships are incorporated into a neural network, which associates measured spectral features with system parameters. Condition diagnosis is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system

  12. Systems for early damage detection and on-line diagnosis

    International Nuclear Information System (INIS)

    Wach, D.; Dio, W.H.; Schuette, A.

    1987-01-01

    Advanced microelectronics and computer technology allow to implement powerful and cost-effective systems. Comprehensive expert knowledge (knowledge base) is available and has been implemented in part in in-situ systems. Further developments to comprehensive on-line diagnosis systems will enhance effectivity further and will be available to the reactor operator as an early-warning system. Optimum and reliable provision of information to assess safety-related reactor systems in one of the basic requirements for the operator to be able to correctly assess the situation at any point of time and to settle for the correct actions to be taken in particular in deviations/incidents. (orig./DG) [de

  13. A Knowledge-based System for Estimating Incident Clearance Duration for Maryland : I-95 a Case Study for the Project of MD-17-SHA/UM/4-19 : “Development of a Traffic Management Decision Support Tool for Freeway Incident Traffic Management (FITM) Plan Deployment”

    Science.gov (United States)

    2017-12-01

    For the incident response operations to be appreciated by the general public, it is essential that responsible highway agencies be capable of providing the estimated clearance duration of a detected incident at the level sufficiently reliable for mot...

  14. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  15. Detection performance of laser range-gated imaging system

    Science.gov (United States)

    Xu, Jun; Li, Xiaofeng; Luo, Jijun; Zhang, Shengxiu; Xu, Yibin

    2010-10-01

    Laser radar is rapidly developing towards very capable sensors for number of applications such as military sensing and guidance, auto collision avoidance, robotic vision and atmospheric sensing. In this paper, the detection performance of non-scanned Laser Rang-gated (LRG) imaging system is studied. In order to compute the detection range of laser active imaging system, the range equation is derived by using laser illuminating model and considering factors which affect system imaging quality. According to the principle of laser radar and the characters of objects and the detectors in special applied setting, it mainly deduced the non-scanned laser radar range equation of the range-gated system, meanwhile, the SNR model of non-scanned LRG imaging system is set up. Then, relationship of the detection probability, the false alarm probability and the signal-to-noise ratio in the non-scanned LRG imaging system are analyzed, the influence factors of system's performance are pointed out, and the solution is proposed. The detection performance simulation software of non-scanned LRG imaging system is designed with MATLAB and the performance of the imaging system is simulated.

  16. Incidence and Risk Factors of Stroke or Systemic Embolism in Patients With Atrial Fibrillation and Heart Failure

    DEFF Research Database (Denmark)

    Iguchi, Moritake; Tezuka, Yuji; Ogawa, Hisashi

    2018-01-01

    BACKGROUND: Heart failure (HF) is a heterogeneous syndrome, but the effect of the type and severity of HF on the incidence of stroke or systemic embolism (SE) in atrial fibrillation (AF) patients is unclear.Methods and Results:The Fushimi AF Registry is a community-based prospective survey of AF ...... of HF in patients with AF. The incidence of stroke/SE was markedly increased in the 30 days after admission for HF, but compensated 'stable' HF did not appear to confer an independent risk.......BACKGROUND: Heart failure (HF) is a heterogeneous syndrome, but the effect of the type and severity of HF on the incidence of stroke or systemic embolism (SE) in atrial fibrillation (AF) patients is unclear.Methods and Results:The Fushimi AF Registry is a community-based prospective survey of AF....... On multivariate analysis, the incidence of stroke/SE was not associated with pre-existing HF (hazard ratio (HR), 1.24; 95% confidence interval (CI), 0.92-1.64) or each criterion for the definition of pre-existing HF, but was associated with high B-type natriuretic peptide (BNP) or N-terminal proBNP levels (above...

  17. Experimental applications for the MARK-1 and MARK-1A pulsed ionizing radiation detection systems. Volume 3

    International Nuclear Information System (INIS)

    Harker, Y.D.; Lawrence, R.S.; Yoon, W.Y.; Lones, J.L.

    1993-12-01

    This report is the third volume in a three volume set describing the MARK series of pulsed ionizing radiation detection systems. This volume describes the MARK-1A detection system, compares it with the MARK-1 system, and describes the experimental testing of the detection systems. Volume 1 of this set presents the technical specifications for the MARK-1 detection system. Volume 2 is an operations manual specifically for the MARK-1 system, but it generally applies to the MARK-1A system as well. These detection systems operate remotely and detect photon radiation from a single or a multiple pulsed source. They contain multiple detector (eight in the MARK-1 and ten in the MARK-1A) for determination of does and incident photon effective energy. The multiple detector arrangement, having different detector sizes and shield thicknesses, provides the capability of determining the effective photon energy of the radiation spectrum. Dose measurements using these units are consistent with TLD measurements. The detection range is from 3 nanorads to 90 microrads per source burst; the response is linear over that range. Three units were built and are ready for field deployment

  18. Are hospitals ready to response to disasters? Challenges, opportunities and strategies of Hospital Emergency Incident Command System (HEICS

    Directory of Open Access Journals (Sweden)

    Mohammad Hossein Yarmohammadian

    2011-01-01

    Full Text Available Background: Applying an effective management system in emergency incidents provides maximum efficiency with using minimum facilities and human resources. Hospital Emergency Incident Command System (HEICS is one of the most reliable emergency incident command systems to make hospitals more efficient and to increase patient safety. This research was to study requirements, barriers, and strategies of HEICS in hospitals affiliated to Isfahan University of Medical Sciences (IUMS. Methods: This was a qualitative research carried out in Isfahan Province, Iran during 2008-09. The study population included senior hospital managers of IUMS and key informants in emergency incident management across Isfahan Province. Sampling method was in non-random purposeful form and snowball technique was used. The research in-strument for data collection was semi-structured interview; collected data was analyzed by Colaizzi Technique. Results: Findings of study were categorized into three general categories including requirements (organizational and sub-organizational, barriers (internal and external of HEICS establishment, and providing short, mid and long term strategies. These categories are explained in details in the main text. Conclusions: Regarding the existing barriers in establishment of HEICS, it is recommended that responsible authori-ties in different levels of health care system prepare necessary conditions for implementing such system as soon as possible via encouraging and supporting systems. This paper may help health policy makers to get reasonable frame-work and have comprehensive view for establishing HEICS in hospitals. It is necessary to consider requirements and viewpoints of stakeholders before any health policy making or planning.

  19. The current incidence of viral disease in korean sweet potatoes and development of multiplex rt-PCR assays for simultaneous detection of eight sweet potato viruses.

    Science.gov (United States)

    Kwak, Hae-Ryun; Kim, Mi-Kyeong; Shin, Jun-Chul; Lee, Ye-Ji; Seo, Jang-Kyun; Lee, Hyeong-Un; Jung, Mi-Nam; Kim, Sun-Hyung; Choi, Hong-Soo

    2014-12-01

    Sweet potato is grown extensively from tropical to temperate regions and is an important food crop worldwide. In this study, we established detection methods for 17 major sweet potato viruses using single and multiplex RT-PCR assays. To investigate the current incidence of viral diseases, we collected 154 samples of various sweet potato cultivars showing virus-like symptoms from 40 fields in 10 Korean regions, and analyzed them by RT-PCR using specific primers for each of the 17 viruses. Of the 17 possible viruses, we detected eight in our samples. Sweet potato feathery mottle virus (SPFMV) and sweet potato virus C (SPVC) were most commonly detected, infecting approximately 87% and 85% of samples, respectively. Furthermore, Sweet potato symptomless virus 1 (SPSMV-1), Sweet potato virus G (SPVG), Sweet potato leaf curl virus (SPLCV), Sweet potato virus 2 ( SPV2), Sweet potato chlorotic fleck virus (SPCFV), and Sweet potato latent virus (SPLV) were detected in 67%, 58%, 47%, 41%, 31%, and 20% of samples, respectively. This study presents the first documented occurrence of four viruses (SPVC, SPV2, SPCFV, and SPSMV-1) in Korea. Based on the results of our survey, we developed multiplex RT-PCR assays for simple and simultaneous detection of the eight sweet potato viruses we recorded.

  20. The Current Incidence of Viral Disease in Korean Sweet Potatoes and Development of Multiplex RT-PCR Assays for Simultaneous Detection of Eight Sweet Potato Viruses

    Directory of Open Access Journals (Sweden)

    Hae-Ryun Kwak

    2014-12-01

    Full Text Available Sweet potato is grown extensively from tropical to temperate regions and is an important food crop worldwide. In this study, we established detection methods for 17 major sweet potato viruses using single and multiplex RT-PCR assays. To investigate the current incidence of viral diseases, we collected 154 samples of various sweet potato cultivars showing virus-like symptoms from 40 fields in 10 Korean regions, and analyzed them by RT-PCR using specific primers for each of the 17 viruses. Of the 17 possible viruses, we detected eight in our samples. Sweet potato feathery mottle virus (SPFMV and sweet potato virus C (SPVC were most commonly detected, infecting approximately 87% and 85% of samples, respectively. Furthermore, Sweet potato symptomless virus 1 (SPSMV-1, Sweet potato virus G (SPVG, Sweet potato leaf curl virus (SPLCV, Sweet potato virus 2 ( SPV2, Sweet potato chlorotic fleck virus (SPCFV, and Sweet potato latent virus (SPLV were detected in 67%, 58%, 47%, 41%, 31%, and 20% of samples, respectively. This study presents the first documented occurrence of four viruses (SPVC, SPV2, SPCFV, and SPSMV-1 in Korea. Based on the results of our survey, we developed multiplex RT-PCR assays for simple and simultaneous detection of the eight sweet potato viruses we recorded.