WorldWideScience

Sample records for incident detection system

  1. The design of a new criticality incident detection and alarm system

    International Nuclear Information System (INIS)

    Nobes, T.S.

    1999-01-01

    This paper presents a general review of criticality and its detection. After a brief description of what a criticality incident involves, an outline is given of detection methods and warning systems. (author)

  2. Targeting safety improvements through identification of incident origination and detection in a near-miss incident learning system

    International Nuclear Information System (INIS)

    Novak, Avrey; Nyflot, Matthew J.; Ermoian, Ralph P.; Jordan, Loucille E.; Sponseller, Patricia A.; Kane, Gabrielle M.; Ford, Eric C.; Zeng, Jing

    2016-01-01

    Purpose: Radiation treatment planning involves a complex workflow that has multiple potential points of vulnerability. This study utilizes an incident reporting system to identify the origination and detection points of near-miss errors, in order to guide their departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or applied a near-miss risk index (NMRI) to gauge severity. Methods: From 3/2012 to 3/2014, 1897 incidents were analyzed from a departmental incident learning system. All incidents were prospectively reviewed weekly by a multidisciplinary team and assigned a NMRI score ranging from 0 to 4 reflecting potential harm to the patient (no potential harm to potential critical harm). Incidents were classified by point of incident origination and detection based on a 103-step workflow. The individual steps were divided among nine broad workflow categories (patient assessment, imaging for radiation therapy (RT) planning, treatment planning, pretreatment plan review, treatment delivery, on-treatment quality management, post-treatment completion, equipment/software quality management, and other). The average NMRI scores of incidents originating or detected within each broad workflow area were calculated. Additionally, out of 103 individual process steps, 35 were classified as safety barriers, the process steps whose primary function is to catch errors. The safety barriers which most frequently detected incidents were identified and analyzed. Finally, the distance between event origination and detection was explored by grouping events by the number of broad workflow area events passed through before detection, and average NMRI scores were compared. Results: Near-miss incidents most commonly originated within treatment planning (33%). However, the incidents with the highest average NMRI scores originated during imaging for RT planning (NMRI = 2.0, average NMRI of all events = 1.5), specifically

  3. Targeting safety improvements through identification of incident origination and detection in a near-miss incident learning system

    Energy Technology Data Exchange (ETDEWEB)

    Novak, Avrey; Nyflot, Matthew J.; Ermoian, Ralph P.; Jordan, Loucille E.; Sponseller, Patricia A.; Kane, Gabrielle M.; Ford, Eric C.; Zeng, Jing, E-mail: jzeng13@uw.edu [Department of Radiation Oncology, University of Washington Medical Center, 1959 NE Pacific Street, Campus Box 356043, Seattle, Washington 98195 (United States)

    2016-05-15

    Purpose: Radiation treatment planning involves a complex workflow that has multiple potential points of vulnerability. This study utilizes an incident reporting system to identify the origination and detection points of near-miss errors, in order to guide their departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or applied a near-miss risk index (NMRI) to gauge severity. Methods: From 3/2012 to 3/2014, 1897 incidents were analyzed from a departmental incident learning system. All incidents were prospectively reviewed weekly by a multidisciplinary team and assigned a NMRI score ranging from 0 to 4 reflecting potential harm to the patient (no potential harm to potential critical harm). Incidents were classified by point of incident origination and detection based on a 103-step workflow. The individual steps were divided among nine broad workflow categories (patient assessment, imaging for radiation therapy (RT) planning, treatment planning, pretreatment plan review, treatment delivery, on-treatment quality management, post-treatment completion, equipment/software quality management, and other). The average NMRI scores of incidents originating or detected within each broad workflow area were calculated. Additionally, out of 103 individual process steps, 35 were classified as safety barriers, the process steps whose primary function is to catch errors. The safety barriers which most frequently detected incidents were identified and analyzed. Finally, the distance between event origination and detection was explored by grouping events by the number of broad workflow area events passed through before detection, and average NMRI scores were compared. Results: Near-miss incidents most commonly originated within treatment planning (33%). However, the incidents with the highest average NMRI scores originated during imaging for RT planning (NMRI = 2.0, average NMRI of all events = 1.5), specifically

  4. Falling-incident detection and throughput enhancement in a multi-camera video-surveillance system.

    Science.gov (United States)

    Shieh, Wann-Yun; Huang, Ju-Chin

    2012-09-01

    For most elderly, unpredictable falling incidents may occur at the corner of stairs or a long corridor due to body frailty. If we delay to rescue a falling elder who is likely fainting, more serious consequent injury may occur. Traditional secure or video surveillance systems need caregivers to monitor a centralized screen continuously, or need an elder to wear sensors to detect falling incidents, which explicitly waste much human power or cause inconvenience for elders. In this paper, we propose an automatic falling-detection algorithm and implement this algorithm in a multi-camera video surveillance system. The algorithm uses each camera to fetch the images from the regions required to be monitored. It then uses a falling-pattern recognition algorithm to determine if a falling incident has occurred. If yes, system will send short messages to someone needs to be noticed. The algorithm has been implemented in a DSP-based hardware acceleration board for functionality proof. Simulation results show that the accuracy of falling detection can achieve at least 90% and the throughput of a four-camera surveillance system can be improved by about 2.1 times. Copyright © 2011 IPEM. Published by Elsevier Ltd. All rights reserved.

  5. Criticality incident detection assessment methodology

    International Nuclear Information System (INIS)

    Haley, Richard M.; Warburton, Simon J.; Bowden, Russell L.

    2003-01-01

    In the United Kingdom, all nuclear facilities that handle, treat or store fissile material require a Criticality Incident Detection and Alarm System (CIDAS) to be installed, unless a case is made for the omission of such a system. Where it is concluded that a CIDAS is required, the primary objective is the reliable detection of criticality and the initiation of prompt evacuation of plant workers from the vicinity of the incident. This paper will examine and compare various methods that can be used to demonstrate that a CIDAS will satisfy the detection criterion. The paper will focus on fit-for-purpose and cost-effective methods for the assessment of gamma-based systems. In the experience of the authors this is particularly useful in demonstrating the efficacy of existing systems in operational plant. (author)

  6. A quantification of the effectiveness of EPID dosimetry and software-based plan verification systems in detecting incidents in radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Bojechko, Casey; Phillps, Mark; Kalet, Alan; Ford, Eric C., E-mail: eford@uw.edu [Department of Radiation Oncology, University of Washington, 1959 N. E. Pacific Street, Seattle, Washington 98195 (United States)

    2015-09-15

    Purpose: Complex treatments in radiation therapy require robust verification in order to prevent errors that can adversely affect the patient. For this purpose, the authors estimate the effectiveness of detecting errors with a “defense in depth” system composed of electronic portal imaging device (EPID) based dosimetry and a software-based system composed of rules-based and Bayesian network verifications. Methods: The authors analyzed incidents with a high potential severity score, scored as a 3 or 4 on a 4 point scale, recorded in an in-house voluntary incident reporting system, collected from February 2012 to August 2014. The incidents were categorized into different failure modes. The detectability, defined as the number of incidents that are detectable divided total number of incidents, was calculated for each failure mode. Results: In total, 343 incidents were used in this study. Of the incidents 67% were related to photon external beam therapy (EBRT). The majority of the EBRT incidents were related to patient positioning and only a small number of these could be detected by EPID dosimetry when performed prior to treatment (6%). A large fraction could be detected by in vivo dosimetry performed during the first fraction (74%). Rules-based and Bayesian network verifications were found to be complimentary to EPID dosimetry, able to detect errors related to patient prescriptions and documentation, and errors unrelated to photon EBRT. Combining all of the verification steps together, 91% of all EBRT incidents could be detected. Conclusions: This study shows that the defense in depth system is potentially able to detect a large majority of incidents. The most effective EPID-based dosimetry verification is in vivo measurements during the first fraction and is complemented by rules-based and Bayesian network plan checking.

  7. What are incident reports telling us? A comparative study at two Australian hospitals of medication errors identified at audit, detected by staff and reported to an incident system.

    Science.gov (United States)

    Westbrook, Johanna I; Li, Ling; Lehnbom, Elin C; Baysari, Melissa T; Braithwaite, Jeffrey; Burke, Rosemary; Conn, Chris; Day, Richard O

    2015-02-01

    To (i) compare medication errors identified at audit and observation with medication incident reports; (ii) identify differences between two hospitals in incident report frequency and medication error rates; (iii) identify prescribing error detection rates by staff. Audit of 3291 patient records at two hospitals to identify prescribing errors and evidence of their detection by staff. Medication administration errors were identified from a direct observational study of 180 nurses administering 7451 medications. Severity of errors was classified. Those likely to lead to patient harm were categorized as 'clinically important'. Two major academic teaching hospitals in Sydney, Australia. Rates of medication errors identified from audit and from direct observation were compared with reported medication incident reports. A total of 12 567 prescribing errors were identified at audit. Of these 1.2/1000 errors (95% CI: 0.6-1.8) had incident reports. Clinically important prescribing errors (n = 539) were detected by staff at a rate of 218.9/1000 (95% CI: 184.0-253.8), but only 13.0/1000 (95% CI: 3.4-22.5) were reported. 78.1% (n = 421) of clinically important prescribing errors were not detected. A total of 2043 drug administrations (27.4%; 95% CI: 26.4-28.4%) contained ≥ 1 errors; none had an incident report. Hospital A had a higher frequency of incident reports than Hospital B, but a lower rate of errors at audit. Prescribing errors with the potential to cause harm frequently go undetected. Reported incidents do not reflect the profile of medication errors which occur in hospitals or the underlying rates. This demonstrates the inaccuracy of using incident frequency to compare patient risk or quality performance within or across hospitals. New approaches including data mining of electronic clinical information systems are required to support more effective medication error detection and mitigation. © The Author 2015. Published by Oxford University Press in association

  8. Real time freeway incident detection.

    Science.gov (United States)

    2014-04-01

    The US Department of Transportation (US-DOT) estimates that over half of all congestion : events are caused by highway incidents rather than by rush-hour traffic in big cities. Real-time : incident detection on freeways is an important part of any mo...

  9. 'Oh, no it isn't!' 'Oh, yes it is!'. The omission of criticality incident detection systems in the UK

    International Nuclear Information System (INIS)

    Thorne, Peter R.; Bowden, Russell L; Venner, Jack

    2003-01-01

    In the UK, the default position is that every process involving fissile material should have a Criticality Incident Detection and Alarm System (CIDAS), unless a robust argument is made that such a system can be omitted. Implementation has been inconsistent and inefficient. In practice decisions appear to be subjective and there are different views and opinions. This paper argues two opposing points of view and presents some simple ground rules. (author)

  10. Real-time incident detection using social media data.

    Science.gov (United States)

    2016-05-09

    The effectiveness of traditional incident detection is often limited by sparse sensor coverage, and reporting incidents to emergency response systems : is labor-intensive. This research project mines tweet texts to extract incident information on bot...

  11. Fuzzy Algorithm for the Detection of Incidents in the Transport System

    Science.gov (United States)

    Nikolaev, Andrey B.; Sapego, Yuliya S.; Jakubovich, Anatolij N.; Berner, Leonid I.; Stroganov, Victor Yu.

    2016-01-01

    In the paper it's proposed an algorithm for the management of traffic incidents, aimed at minimizing the impact of incidents on the road traffic in general. The proposed algorithm is based on the theory of fuzzy sets and provides identification of accidents, as well as the adoption of appropriate measures to address them as soon as possible. A…

  12. Detecting Terrorism Incidence Type from News Summary

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2012-01-01

    The paper presents the experiments to detect terrorism incidence type from news summary data. We have applied classification techniques on news summary data to analyze the incidence and detect the type of incidence. A number of experiments are conducted using various classification algorithms...... and results show that a simple decision tree classifier can learn incidence type with satisfactory results from news data....

  13. Vuosaari Harbour Road Tunnel Traffic Management and Incident Detection System Design Issues

    Directory of Open Access Journals (Sweden)

    Caj Holm

    2006-11-01

    Full Text Available Helsinki is constructing in Vuosaari a new modem and effectivecargo harbour. All cargo harbour activities will be concentratedthere. The total project includes the harbour, a logisticsarea, traffic connections (road, railway and fairway and aBusiness Park. The road connection goes through the Porvarinlahtiroad tunnel. The harbour will commence operatingin 2008. This paper gives an oveTView of the tunnel design phasefunctional studies and risk analysis tunnel incident detectionsystem design issues and some specific environmental featuresof the tunnel.

  14. BEAP profiles as rapid test system for status analysis and early detection of process incidents in biogas plants.

    Science.gov (United States)

    Refai, Sarah; Berger, Stefanie; Wassmann, Kati; Hecht, Melanie; Dickhaus, Thomas; Deppenmeier, Uwe

    2017-03-01

    A method was developed to quantify the performance of microorganisms involved in different digestion levels in biogas plants. The test system was based on the addition of butyrate (BCON), ethanol (ECON), acetate (ACON) or propionate (PCON) to biogas sludge samples and the subsequent analysis of CH 4 formation in comparison to control samples. The combination of the four values was referred to as BEAP profile. Determination of BEAP profiles enabled rapid testing of a biogas plant's metabolic state within 24 h and an accurate mapping of all degradation levels in a lab-scale experimental setup. Furthermore, it was possible to distinguish between specific BEAP profiles for standard biogas plants and for biogas reactors with process incidents (beginning of NH 4 + -N inhibition, start of acidification, insufficient hydrolysis and potential mycotoxin effects). Finally, BEAP profiles also functioned as a warning system for the early prediction of critical NH 4 + -N concentrations leading to a drop of CH 4 formation.

  15. Cyber Incidents Involving Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert J. Turk

    2005-10-01

    The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Management Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this

  16. Medication incidents reported to an online incident reporting system.

    LENUS (Irish Health Repository)

    Alrwisan, Adel

    2011-01-15

    AIMS: Approximately 20% of deaths from adverse events are related to medication incidents, costing the NHS an additional £500 million annually. Less than 5% of adverse events are reported. This study aims to assess the reporting rate of medication incidents in NHS facilities in the north east of Scotland, and to describe the types and outcomes of reported incidents among different services. Furthermore, we wished to quantify the proportion of reported incidents according to the reporters\\' profession. METHODS: A retrospective description was made of medication incidents reported to an online reporting system (DATIX) over a 46-month-period (July 2005 to April 2009). Reports originated from acute and community hospitals, mental health, and primary care facilities. RESULTS: Over the study period there were 2,666 incidents reported with a mean monthly reporting rate of 78.2\\/month (SD±16.9). 6.1% of all incidents resulted in harm, with insulin being the most commonly implicated medication. Nearly three-quarters (74.2%, n=1,978) of total incidents originated from acute hospitals. Administration incidents were implicated in the majority of the reported medication incidents (59%), followed by prescribing (10.8%) and dispensing (9.9%), while the nondescript "other medication incidents" accounted for 20.3% of total incidents. The majority of reports were made by nursing and midwifery staff (80%), with medical and dental professionals reporting the lowest number of incidents (n=56, 2%). CONCLUSIONS: The majority of medication incidents in this study were reported by nursing and midwifery staff, and were due to administration incidents. There is a clear need to elucidate the reasons for the limited contribution of the medical and dental professionals to reporting medication incidents.

  17. The nuclear reactor remote monitoring system as an instrument for early detection and evaluation of incidents or accidents

    International Nuclear Information System (INIS)

    Eder, E.

    1981-01-01

    The remote monitoring system for nuclear reactors (KFUe) in Bavaria is a technical means to support the supervising authority. The measuring devices installed in the KFUe make it possible to perceive very early such accidents which could be liable for unplanned releases of greater amounts of radioactive substances. The data compiled by the KFUe will be also used as basis for further statutory supervisions, if necessary. When alarm thresholds in the measuring devices are exceeded the stand-by supervision staff on the Bavarian State Office for Environmental Protection will be informed automatically. Further decisions will be met by the supervision staff. (orig.) [de

  18. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  19. Traffic incidents in motorways : An empirical proposal for incident detection using data from mobile phone operators

    NARCIS (Netherlands)

    Steenbruggen, John; Tranos, Emmanouil; Rietveld, P.

    2016-01-01

    This paper proves that mobile phone usage data is an easy to use, cheap and most importantly, reliable predictor of motorway incidents. Using econometric modelling, this paper provides a proof of concept of how mobile phone usage data can be utilised to detect motorway incidents. Greater Amsterdam

  20. Automated Incident Detection Using Real-Time Floating Car Data

    Directory of Open Access Journals (Sweden)

    Maarten Houbraken

    2017-01-01

    Full Text Available The aim of this paper is to demonstrate the feasibility of a live Automated Incident Detection (AID system using only Floating Car Data (FCD in one of the first large-scale FCD AID field trials. AID systems detect traffic events and alert upcoming drivers to improve traffic safety without human monitoring. These automated systems traditionally rely on traffic monitoring sensors embedded in the road. FCD allows for finer spatial granularity of traffic monitoring. However, low penetration rates of FCD probe vehicles and the data latency have historically hindered FCD AID deployment. We use a live country-wide FCD system monitoring an estimated 5.93% of all vehicles. An FCD AID system is presented and compared to the installed AID system (using loop sensor data on 2 different highways in Netherlands. Our results show the FCD AID can adequately monitor changing traffic conditions and follow the AID benchmark. The presented FCD AID is integrated with the road operator systems as part of an innovation project, making this, to the best of our knowledge, the first full chain technical feasibility trial of an FCD-only AID system. Additionally, FCD allows for AID on roads without installed sensors, allowing road safety improvements at low cost.

  1. Statistical text classifier to detect specific type of medical incidents.

    Science.gov (United States)

    Wong, Zoie Shui-Yee; Akiyama, Masanori

    2013-01-01

    WHO Patient Safety has put focus to increase the coherence and expressiveness of patient safety classification with the foundation of International Classification for Patient Safety (ICPS). Text classification and statistical approaches has showed to be successful to identifysafety problems in the Aviation industryusing incident text information. It has been challenging to comprehend the taxonomy of medical incidents in a structured manner. Independent reporting mechanisms for patient safety incidents have been established in the UK, Canada, Australia, Japan, Hong Kong etc. This research demonstrates the potential to construct statistical text classifiers to detect specific type of medical incidents using incident text data. An illustrative example for classifying look-alike sound-alike (LASA) medication incidents using structured text from 227 advisories related to medication errors from Global Patient Safety Alerts (GPSA) is shown in this poster presentation. The classifier was built using logistic regression model. ROC curve and the AUC value indicated that this is a satisfactory good model.

  2. National Fire Incident Reporting System (NFIRS)

    Data.gov (United States)

    Department of Homeland Security — The National Fire Incident Reporting System (NFIRS) is a reporting standard that fire departments use to uniformly report on the full range of their activities, from...

  3. Critical Incident Reporting Systems: Perceived Competing Social ...

    African Journals Online (AJOL)

    The safe operation of complex socio-technical systems is dependent upon the reporting of safety critical incidents by operators within a system. Through the action of reporting, systems develop the capability as a learning organisation to improve human and organisational performance. The aim of the study is therefore to ...

  4. A critical incident reporting system in anaesthesia.

    Science.gov (United States)

    Madzimbamuto, F D; Chiware, R

    2001-01-01

    To audit the recently established Critical Incident Reporting System in the Department of Anaesthesia and Critical Care Medicine, University of Zimbabwe Medical School. The system was set up with the purpose of improving the quality of care delivered by the department. Cross sectional study. A critical incident was defined as 'any adverse and reversible event in theatre, during or immediately after surgery that if it persisted without correction would cause harm to the patient'. The anaesthetic or recovery room staff filled a critical incident form anonymously. Data was collected from critical incident reporting forms for analysis. The anaesthetic service in the two teaching hospitals of Harare Central and Parirenyatwa General Hospitals. Between May and October 2000, 62 completed critical incident forms were collected. The nature of the incident and the monitoring used were recorded, the cause was classified as human, equipment or monitoring failure and the outcome for each patient reported. There was no formal system for reminding staff to fill in their critical incident forms. A total of 14,165 operations were performed over the reporting period: 62 critical incident forms were collected, reporting 130 incidents, giving a rate of 0.92% (130/14,165). Of these, 42 patients were emergencies and 20 elective. The incidents were hypotension, hypoxia, bradycardia, ECG changes, aspiration, laryngospasm, high spinal, and cardiac arrest. Monitoring present on patients who had critical incidents was: capnography 57%, oxymetry 90% and ECG 100%. Other monitors are not reported. Human error contributed in 32/62 of patients and equipment failure in 31/62 of patients. Patient outcome showed 15% died, 23% were unplanned admissions to HDU while 62% were discharged to the ward with little or no adverse outcome. Despite some under reporting, the critical incident rate was within the range reported in the literature. Supervision of juniors is not adequate, especially on call. The

  5. NEA incident reporting system: Three years' experience

    International Nuclear Information System (INIS)

    Otsuka, Y.; Haeussermann, W.

    1984-01-01

    The paper presents an overview of the NEA Incident Reporting System (IRS) which was set up to collect, assess and disseminate on safety-related incidents in nuclear power plants. The IRS information exchange is significant in two senses. First, it enables regulatory authorities and utilities in participating countries to take appropriate action to prevent the reported mishaps occurring again elsewhere. Secondly, the continuous collection and systematic analysis of such information allows identification of areas of concern where safety research should be strengthened. There are two stages in the IRS information exchange. First, the national IRS Co-ordinator selects information on significant incidents, in accordance with a common reporting threshold, from the abnormal occurrences reported to the regulatory body, to be distributed through the NEA Secretariat. This screening is intended to exclude minor events, so that only significant information is sent to participating countries. Secondly, a group of experts periodically reviews the incidents reported during the preceding twelve months to identify major areas of concern. To assist this process, a computer-based data retrieval system is being developed for IRS incident reports. The paper gives some details of the IRS mechanism and discusses reporting criteria and the information included in a report. Areas of concern derived from reported incidents, an outline of the data retrieval system, and examples of feedback of lessons learned and possibilities for international co-operation are also discussed. (author)

  6. Integrating incident investigation into the management system

    International Nuclear Information System (INIS)

    Peterson, E.E.

    1992-01-01

    In the last 10 yr, the size and frequency of incidents affecting the communities and environment surrounding chemical processing facilities has increased. The chemical process industry, which has always concerned itself with the safety of its facilities, has responded by committing to stricter standards of operation and management. A critical element of these management practices is the use of a structured incident investigation program. Many facilities have implemented and disciplined themselves to perform good investigation of incidents. However, most of these facilities maintain incident investigation as part of their safety management programs. This allows the process to be disconnected from the management system that deals with the day-to-day business of the facility. The first step of integration is understanding the objectives and functions of the management system into which the integration is to occur. To begin, a common definition of management is needed. Management, for the purposes of this discussion, is defined as the system of activities used to control, coordinate, and improve the flow of work within a facility or organization. This definition refers to several concepts that need further development in order to understand how incident investigation can be integrated into a management system, including (a) flow of work, (b) control, and (c) improvement. Application can be made to the nuclear industry

  7. Incident Command System - Environmental Unit responsibilities

    International Nuclear Information System (INIS)

    Hillman, S. O.

    1997-01-01

    The Incident Command System (ICS) for crisis management, used for response to oil spills by the Alyeska Pipeline Service Company throughout its facilities, including the Trans Alaska Pipeline and the Valdez Marine Terminal, was described. Special attention was given to the Environmental Unit within the ICS which functions as a primary support unit for the Incident Operations Section. Details of the Unit's function were provided. These include the collection, evaluation and dissemination of information on all environmental issues concerning the crisis, provision of advice and direction on environmental aspects, and up-front agency interaction. A checklist of tasks is included. 7 refs

  8. Incident detection and isolation in drilling using analytical redundancy relations

    DEFF Research Database (Denmark)

    Willersrud, Anders; Blanke, Mogens; Imsland, Lars

    2015-01-01

    must be avoided. This paper employs model-based diagnosis using analytical redundancy relations to obtain residuals which are affected differently by the different incidents. Residuals are found to be non-Gaussian - they follow a multivariate t-distribution - hence, a dedicated generalized likelihood...... measurements available. In the latter case, isolation capability is shown to be reduced to group-wise isolation, but the method would still detect all serious events with the prescribed false alarm probability...

  9. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  10. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  11. Enhancing spatial detection accuracy for syndromic surveillance with street level incidence data

    Directory of Open Access Journals (Sweden)

    Alemi Farrokh

    2010-01-01

    Full Text Available Abstract Background The Department of Defense Military Health System operates a syndromic surveillance system that monitors medical records at more than 450 non-combat Military Treatment Facilities (MTF worldwide. The Electronic Surveillance System for Early Notification of Community-based Epidemics (ESSENCE uses both temporal and spatial algorithms to detect disease outbreaks. This study focuses on spatial detection and attempts to improve the effectiveness of the ESSENCE implementation of the spatial scan statistic by increasing the spatial resolution of incidence data from zip codes to street address level. Methods Influenza-Like Illness (ILI was used as a test syndrome to develop methods to improve the spatial accuracy of detected alerts. Simulated incident clusters of various sizes were superimposed on real ILI incidents from the 2008/2009 influenza season. Clusters were detected using the spatial scan statistic and their displacement from simulated loci was measured. Detected cluster size distributions were also evaluated for compliance with simulated cluster sizes. Results Relative to the ESSENCE zip code based method, clusters detected using street level incidents were displaced on average 65% less for 2 and 5 mile radius clusters and 31% less for 10 mile radius clusters. Detected cluster size distributions for the street address method were quasi normal and sizes tended to slightly exceed simulated radii. ESSENCE methods yielded fragmented distributions and had high rates of zero radius and oversized clusters. Conclusions Spatial detection accuracy improved notably with regard to both location and size when incidents were geocoded to street addresses rather than zip code centroids. Since street address geocoding success rates were only 73.5%, zip codes were still used for more than one quarter of ILI cases. Thus, further advances in spatial detection accuracy are dependant on systematic improvements in the collection of individual

  12. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  13. Oblique-incidence reflectivity difference application for morphology detection.

    Science.gov (United States)

    Zhan, Honglei; Zhao, Kun; Lü, Huibin; Jin, Kuijuan; Yang, Guozhen; Chen, Xiaohong

    2017-10-20

    Analogous with scanning electron microscopy, we use an oblique-incidence reflectivity difference (OIRD) approach for morphology detection. By scanning the active carbon clusters in a one-dimensional way and the reservoir rocks in a two-dimensional way, the morphology of the samples' surface can be revealed in OIRD signal images. High OIRD signals of active carbon samples refer to the centralized distribution areas of carbon, and the fluctuations are caused by the uneven distribution of carbon pellets. OIRD intensity is proportional to the thickness of materials. In terms of rocks, the trough areas with smaller values refer to the low-lying fields. The areas with relatively large OIRD intensities correspond to the protuberance areas of rocks. Consequently, OIRD is a sensitive yet rapid measure of surface detection in material and petrogeology science.

  14. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  15. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  16. Section based traffic detection on motorways for incident management

    NARCIS (Netherlands)

    Noort, M. van; Klunder, G.

    2007-01-01

    Current vehicle detection on motorways is based generally on either inductive loop systems or various alternatives such as video cameras. Recently, we encountered two new developments that take a different approach: one from The Netherlands using microwave sensors, and the other from Sweden using

  17. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  18. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  19. Incident Management in Academic Information System using ITIL Framework

    Science.gov (United States)

    Palilingan, V. R.; Batmetan, J. R.

    2018-02-01

    Incident management is very important in order to ensure the continuity of a system. Information systems require incident management to ensure information systems can provide maximum service according to the service provided. Many of the problems that arise in academic information systems come from incidents that are not properly handled. The objective of this study aims to find the appropriate way of incident management. The incident can be managed so it will not be a big problem. This research uses the ITIL framework to solve incident problems. The technique used in this study is a technique adopted and developed from the service operations section of the ITIL framework. The results of this research found that 84.5% of incidents appearing in academic information systems can be handled quickly and appropriately. 15.5% incidents can be escalated so as to not cause any new problems. The model of incident management applied to make academic information system can run quickly in providing academic service in a good and efficient. The incident management model implemented in this research is able to manage resources appropriately so as to quickly and easily manage incidents.

  20. DEVELOPING INCIDENT DETECTION ALGORITHM BASED ON THE MAMDANI FUZZY INFERENCE ALGORITHM

    Directory of Open Access Journals (Sweden)

    Andrey Borisovich Nikolaev

    2017-09-01

    Full Text Available Application of fuzzy logic in the incident detection system allows making a decision under uncertainty. The phase of incident detection is a process of finding difficulties in traffic. The difficulty in traffic is the main sign that there was a road accident and requires a reaction for its elimination. This leads to the use of input data that must be relevant to the vehicles and the road. These data must be considered together, and should be compared with the corresponding values for further analysis. The main parameters of the traffic flow, which can characterize its current state, are a flow rate, a volume flow. Necessary to analyze the input data received from the sensors. After processing the input data, using the previously entered fuzzy rules, will be taken action that will improve the situation in traffic or at least not allow it worse.

  1. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  2. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  3. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  4. Automated Safety Incident Surveillance and Tracking System (ASISTS)

    Data.gov (United States)

    Department of Veterans Affairs — The Automated Safety Incident Surveillance and Tracking System (ASISTS) is a repository of Veterans Health Administration (VHA) employee accident data. Many types of...

  5. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  6. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  7. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  8. Remote Voice Detection System

    National Research Council Canada - National Science Library

    Blackmon, Fletcher A

    2007-01-01

    A device and system to remotely detect vocalizations of speech. The skin located on the throat region of a speaking person or a reflective layer on the skin on the throat region vibrates in response to vocalizations of speech by the person...

  9. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  10. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  11. The key incident monitoring and management system - history and role in quality improvement.

    Science.gov (United States)

    Badrick, Tony; Gay, Stephanie; Mackay, Mark; Sikaris, Ken

    2018-01-26

    The determination of reliable, practical Quality Indicators (QIs) from presentation of the patient with a pathology request form through to the clinician receiving the report (the Total Testing Process or TTP) is a key step in identifying areas where improvement is necessary in laboratories. The Australasian QIs programme Key Incident Monitoring and Management System (KIMMS) began in 2008. It records incidents (process defects) and episodes (occasions at which incidents may occur) to calculate incident rates. KIMMS also uses the Failure Mode Effects Analysis (FMEA) to assign quantified risk to each incident type. The system defines risk as incident frequency multiplied by both a harm rating (on a 1-10 scale) and detection difficulty score (also a 1-10 scale). Between 2008 and 2016, laboratories participating rose from 22 to 69. Episodes rose from 13.2 to 43.4 million; incidents rose from 114,082 to 756,432. We attribute the rise in incident rate from 0.86% to 1.75% to increased monitoring. Haemolysis shows the highest incidence (22.6% of total incidents) and the highest risk (26.68% of total risk). "Sample is suspected to be from the wrong patient" has the second lowest frequency, but receives the highest harm rating (10/10) and detection difficulty score (10/10), so it is calculated to be the 8th highest risk (2.92%). Similarly, retracted (incorrect) reports QI has the 10th highest frequency (3.9%) but the harm/difficulty calculation confers the second highest risk (11.17%). TTP incident rates are generally low (less than 2% of observed episodes), however, incident risks, their frequencies multiplied by both ratings of harm and discovery difficulty scores, concentrate improvement attention and resources on the monitored incident types most important to manage.

  12. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  13. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  14. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  15. Incidence of systemic lupus erythematosus and lupus nephritis in Denmark

    DEFF Research Database (Denmark)

    Hermansen, Marie-Louise From; Lindhardsen, Jesper; Torp-Pedersen, Christian

    2016-01-01

    Objective. To determine the incidence of systemic lupus erythematosus (SLE) and SLE with concomitant or subsequent lupus nephritis (LN) in Denmark during 1995.2011, using data from the Danish National Patient Registry (NPR).  Methods. To assess the incidence of SLE, we identified all persons aged...

  16. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  17. Arc fault detection system

    Science.gov (United States)

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  18. Counterbalanced radiation detection system

    International Nuclear Information System (INIS)

    Platz, W.

    1987-01-01

    A counterbalanced radiation detection system is described comprising: (a) a stand; (b) a first radiation detector; (c) a first radiation detector arm means for tiltably connecting the first radiation detector with the stand; (d) a second radiation detector; (e) a second radiation detector arm means for tiltably connecting the second radiation detector with the stand, whereby the tilting angles of the radiation detector arm means define a distance between the radiation detectors; and (f) a torque transforming means connected between the first and second radiation detector arm means for transforming the torque created by one of the radiation detectors in a sense opposed to the torque created by the other radiation detector

  19. Results of the implementation of a learning system with incidents in an radiotherapy department

    International Nuclear Information System (INIS)

    Radicchi, Lucas Augusto; Vilela, Ellen Pedroso Severino; Faustino, Fabio de Lima C.; Rodrigues, Fernanda Arantes C.; Gomes, Franciele N.; Souza, Guilherme Vicente de; Silva, Rose Marta S.; Toledo, Jose Carlos de

    2016-01-01

    An incident learning system (ILS) is an important tool for improving aspects of patient and staff safety. In radiation oncology, ILS has been implemented both at the institutional level as at the national level, allowing to share lessons learned from incidents that have already occurred. The objective of this study is to present the preliminary results of the ILS implemented in a radiation oncology department. In total, 128 incidents were reviewed by a multidisciplinary committee, and the professional groups that registered more were medical physicists, radiation oncologists and radiation therapists. In addition, incidents have occurred and have been detected mainly in the treatment step. The incident learning system proved to be an important process improvement tool, according to the results shown,the improvement actions proposed and the perception of the people involved. (author)

  20. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  1. Development and testing of incident detection algorithms. Vol. 2, research methodology and detailed results.

    Science.gov (United States)

    1976-04-01

    The development and testing of incident detection algorithms was based on Los Angeles and Minneapolis freeway surveillance data. Algorithms considered were based on times series and pattern recognition techniques. Attention was given to the effects o...

  2. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  3. An error taxonomy system for analysis of haemodialysis incidents.

    Science.gov (United States)

    Gu, Xiuzhu; Itoh, Kenji; Suzuki, Satoshi

    2014-12-01

    This paper describes the development of a haemodialysis error taxonomy system for analysing incidents and predicting the safety status of a dialysis organisation. The error taxonomy system was developed by adapting an error taxonomy system which assumed no specific specialty to haemodialysis situations. Its application was conducted with 1,909 incident reports collected from two dialysis facilities in Japan. Over 70% of haemodialysis incidents were reported as problems or complications related to dialyser, circuit, medication and setting of dialysis condition. Approximately 70% of errors took place immediately before and after the four hours of haemodialysis therapy. Error types most frequently made in the dialysis unit were omission and qualitative errors. Failures or complications classified to staff human factors, communication, task and organisational factors were found in most dialysis incidents. Device/equipment/materials, medicine and clinical documents were most likely to be involved in errors. Haemodialysis nurses were involved in more incidents related to medicine and documents, whereas dialysis technologists made more errors with device/equipment/materials. This error taxonomy system is able to investigate incidents and adverse events occurring in the dialysis setting but is also able to estimate safety-related status of an organisation, such as reporting culture. © 2014 European Dialysis and Transplant Nurses Association/European Renal Care Association.

  4. IMPLEMENTATION OF INCIDENT DETECTION ALGORITHM BASED ON FUZZY LOGIC IN PTV VISSIM

    Directory of Open Access Journals (Sweden)

    Andrey Borisovich Nikolaev

    2017-05-01

    Full Text Available Traffic incident management is a major challenge in the management of movement, requiring constant attention and significant investment, as well as fast and accurate solutions in order to re-establish normal traffic conditions. Automatic control methods are becoming an important factor for the reduction of traffic congestion caused by an arising incident. In this paper, the algorithm of automatic detection incident based on fuzzy logic is implemented in the software PTV VISSIM. 9 different types of tests were conducted on the two lane road section segment with changing traffic conditions: the location of the road accident, loading of traffic. The main conclusion of the research is that the proposed algorithm for the incidents detection demonstrates good performance in the time of detection and false alarms

  5. Annual incidence and standardized incidence ratio of cerebrovascular accidents in patients with systemic lupus erythematosus.

    Science.gov (United States)

    Mok, C C; Ho, L Y; To, C H

    2009-01-01

    To study the annual incidence and standardized incidence ratio (SIR) of cerebrovascular accident (CVA) in patients with systemic lupus erythematosus (SLE). The annual incidence of CVA from 1999 to 2007 in a longitudinal cohort of SLE patients was calculated each year and compared with that of the regional population within the same study period. Age-specific SIRs and outcome of CVA in SLE patients were also studied. In 2007, there were 490 SLE patients in our cohort. The mean annual incidence of CVA between 1999 and 2007 was 6.45/1000 patients and no obvious trend over time was observed. Of the 20 CVAs in patients with SLE, 18 (90%) were ischaemic stroke whereas two (10%) were haemorrhagic stroke. The mean SIR of all types of CVA in SLE patients was 2.02 [95% confidence interval (CI) 1.30-3.81; p = 0.002]. The SIR of ischaemic stroke decreased with age and the stroke incidence was no longer significantly higher than that of the population in patients aged >or= 60 years. Haemorrhagic stroke occurred mainly in younger SLE patients. The duration of hospitalization and the mortality rate for CVA was non-significantly higher in SLE than in non-SLE patients. The incidence of CVA in SLE remained constant over the 8 years between 1999 and 2007. Younger SLE patients are at substantially increased risk of CVA compared to age-matched population. The duration of hospitalization and the mortality rate for CVA are similar in SLE and non-SLE patients.

  6. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  7. An incident command system in practice and reality

    International Nuclear Information System (INIS)

    Spitzer, J.D.

    1992-01-01

    The basic organizational problems and options for forming a pollution response organization are described. Problems with multi-agency response organizations include poor coordination and lack of accountability. Alternatives to autonomous organizations operating with minimal coordination are the multi-agency/organization teams working under a controlling organization, and organizations formed into a single response organization (the incident command system or ICS). Design criteria for an ICS include flexibility as to the jurisdiction and agency, adaptable organizational structure, capability to expand in a logical manner, and uniform elements in terminology, organization, and procedures. ICS in practice is illustrated both by the CANUSLAK exercise undertaken in August 1990 and a real incident that occurred several days after the exercise was finished. CANUSLAK involved the US Coast Guard and its Canadian and Michigan counterparts in a simulated incident in the St. Clair river. The real incident was the explosion of the gasoline-carrying tank vessel Jupiter in the Saginaw River. In both instances, ICS combined many organizations into one team with a single incident commander. The eight basic components of ICS are common terminology, modular organization, integrated communications, unified command structure, consolidated action plan, manageable span of control, designated incident facilities, and comprehensive resource management. ICS has been tailored to a wide range of applications and is not only used in major disasters but as a part of routine operations. 18 refs., 5 figs

  8. Introduction of a prehospital critical incident monitoring system--pilot project results.

    Science.gov (United States)

    Stella, Julian; Davis, Anna; Jennings, Paul; Bartley, Bruce

    2008-01-01

    trend/further observation and analysis responses (5.2%; CI = 4.9-5.5%). The pilot project demonstrates successful implementation of an incident monitoring system within a regional, prehospital environment. The combination of incident detecting techniques has a high yield with potential to capture different error types. The large proportion of incidents in the "near miss" category allows analysis of incidents without patient harm. The majority of incidents were system related and many were mitigated by circumstance. The model used is appropriate for ongoing incident monitoring in this setting.

  9. The evaluation of a web-based incident reporting system.

    Science.gov (United States)

    Kuo, Ya-Hui; Lee, Ting-Ting; Mills, Mary Etta; Lin, Kuan-Chia

    2012-07-01

    A Web-based reporting system is essential to report incident events anonymously and confidentially. The purpose of this study was to evaluate a Web-based reporting system in Taiwan. User satisfaction and impact of system use were evaluated through a survey answered by 249 nurses. Incident events reported in paper and electronic systems were collected for comparison purposes. Study variables included system user satisfaction, willingness to report, number of reports, severity of the events, and efficiency of the reporting process. Results revealed that senior nurses were less willing to report events, nurses on internal medicine units had higher satisfaction than others, and lowest satisfaction was related to the time it took to file a report. In addition, the Web-based reporting system was used more often than the paper system. The percentages of events reported were significantly higher in the Web-based system in laboratory, environment/device, and incidents occurring in other units, whereas the proportions of reports involving bedsores and dislocation of endotracheal tubes were decreased. Finally, moderate injury event reporting decreased, whereas minor or minimal injury event reporting increased. The study recommends that the data entry process be simplified and the network system be improved to increase user satisfaction and reporting rates.

  10. Antigen detection systems

    Science.gov (United States)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  11. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  12. Fault diagnosis of downhole drilling incidents using adaptive observers and statistical change detection

    DEFF Research Database (Denmark)

    Willersrud, Anders; Blanke, Mogens; Imsland, Lars

    2015-01-01

    Downhole abnormal incidents during oil and gas drilling causes costly delays, any may also potentially lead to dangerous scenarios. Dierent incidents willcause changes to dierent parts of the physics of the process. Estimating thechanges in physical parameters, and correlating these with changes ...... expectedfrom various defects, can be used to diagnose faults while in development.This paper shows how estimated friction parameters and ow rates can de-tect and isolate the type of incident, as well as isolating the position of adefect. Estimates are shown to be subjected to non......-Gaussian,t-distributednoise, and a dedicated multivariate statistical change detection approach isused that detects and isolates faults by detecting simultaneous changes inestimated parameters and ow rates. The properties of the multivariate di-agnosis method are analyzed, and it is shown how detection and false alarmprobabilities...... are assessed and optimized using data-based learning to obtainthresholds for hypothesis testing. Data from a 1400 m horizontal ow loop isused to test the method, and successful diagnosis of the incidents drillstringwashout (pipe leakage), lost circulation, gas in ux, and drill bit plugging aredemonstrated....

  13. Successful emergency operations and the Incident Command System

    International Nuclear Information System (INIS)

    Montgomery, M.

    1994-01-01

    The Incident Command System (ICS) was developed to provide an ''all-risk'' system of effective emergency scene management. The Cy-Fair Volunteer Fire Department (CFVFD) has made ICS an integral part of their operations since 1987. On January 26, 1993, CFVFD was called to investigate a petroleum odor and possible spill near State Highway 6 and Jackrabbit Road in northwest Harris County. Over the next six-hour period, the dispatch center received over 100 calls an hour regarding this incident. Personnel from CFVFD, the oil company, mutual aid fire departments, and private contractors worked around the dock to successfully contain, clean and reduce the effects of a 25,000 gallon crude oil spill next to a 141-foot diameter oil storage tank at the Satsuma Station. Among the keys to success was proper use of the Incident Command System (ICS). Problems overcome included the lack of a readily available water source, limited foam supplies, time of day, and incident duration

  14. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  15. Early Detection and Localization of Downhole Incidents in Managed Pressure Drilling

    DEFF Research Database (Denmark)

    Willersrud, Anders; Imsland, Lars; Blanke, Mogens

    2015-01-01

    Downhole incidents such as kick, lost circulation, pack-off, and hole cleaning issues are important contributors to downtime in drilling. In managed pressure drilling (MPD), operations margins are typically narrower, implying more frequent incidents and more severe consequences. Detection...... and handling of symptoms of downhole drilling contingencies at an early stage are therefore crucial for the reliability and safety of MPD operations. In this paper we describe a method for early detection and localization of such incidents, based on a fit for purpose model of the downhole pressure hydraulics...... successfully been tested on experimental data from a medium-scale horizontal flow loop in Sta- vanger, Norway. The flow loop represents a 700 m borehole with emulation of the following downhole contingencies: drillstring washout, drill bit nozzle plugging, gas influx and fluid loss. In the tests...

  16. Influence on ultrasonic incident angle and defect detection sensitivity by cast stainless steel structure

    International Nuclear Information System (INIS)

    Kurozumi, Y.

    2004-01-01

    It is well known that ultrasonic waves are affected strongly by macro-structures in cast stainless steel, as in the primary pipe or other components in pressurized water reactors (PWRs). In this work, ultrasonic refractive angles and defect detection sensitivities are investigated at different incident angles to cast stainless steel. The aims of the investigation are to clarify the transmission of ultrasonic waves in cast stainless steel and to contribute to the transducer design. The results are that ultrasonic refractive angles in cast stainless steel shift towards the 45-degree direction with respect to the direction of dendritic structures by 11.8 degrees at the maximum and that the sensitivity of transducer for inner surface breaking cracks increases with decreasing incident angle. However, in an ultrasonic inspection of actual welds at smaller incident angles, a trade-off occurs between increased defect detection sensitivity and decreased defect discrimination capability due to intense false signals produced by non-defective features. (orig.)

  17. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  18. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  19. Sensitivity Analysis Based SVM Application on Automatic Incident Detection of Rural Road in China

    Directory of Open Access Journals (Sweden)

    Xingliang Liu

    2018-01-01

    Full Text Available Traditional automatic incident detection methods such as artificial neural networks, backpropagation neural network, and Markov chains are not suitable for addressing the incident detection problem of rural roads in China which have a relatively high accident rate and a low reaction speed caused by the character of small traffic volume. This study applies the support vector machine (SVM and parameter sensitivity analysis methods to build an accident detection algorithm in a rural road condition, based on real-time data collected in a field experiment. The sensitivity of four parameters (speed, front distance, vehicle group time interval, and free driving ratio is analyzed, and the data sets of two parameters with a significant sensitivity are chosen to form the traffic state feature vector. The SVM and k-fold cross validation (K-CV methods are used to build the accident detection algorithm, which shows an excellent performance in detection accuracy (98.15% of the training data set and 87.5% of the testing data set. Therefore, the problem of low incident reaction speed of rural roads in China could be solved to some extent.

  20. Radiation detecting system

    International Nuclear Information System (INIS)

    1975-01-01

    In spectrophotometry systems, a usual arrangement for modulating the radiation is a rotating disc having one or more sectors removed. A beam of radiation may be blocked by the disc except when a cut-away sector is in the path of the beam. With a double-beam system, a cut-away sector of 180 0 may be used so that when the first path is blocked, the second is allowed through, and vice versa. One or both sides of the disc may be formed as mirrors to facilitate beam switching and to allow use of more than two beams for background compensation purposes or for analysis of more than one substance within a sample. (G.T.H.)

  1. Radiation detection system

    Science.gov (United States)

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  2. Detection of incidents and follow-up by the regulatory bodies; La detection des incidents et le suivi des enseignements par les autorites de surete

    Energy Technology Data Exchange (ETDEWEB)

    Gouffon, A

    1990-12-01

    Although France has established a large nuclear program based on PWR type reactors, experience gained up to this are are quite modest. Concept of PWR-900 reactors is based mostly on safety analyses and evaluations done a priori. At the time of their construction and start-up they have been considered as advanced safe systems. No data were available concerning any incidents during operation. The Three Mile Island accident in 1979 has changed the attitude concerning reactor safety. The result is the procedure adopted by Electricite de France for follow-up of incident situations during operation of a number of PWR-900 plants. Standardization of this type of NPPs demands extremely strict standards and control of safety systems. This safety analysis procedure consists of the following: analysis of incidents based on data collected by EDF during operation; every regular annual shutdown of a unit is the subject of detailed analysis; together with the detailed analysis, principal elements of operating experience for the series of PWR units are submitted for analysis to a permanent regulatory body.

  3. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  4. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  5. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  6. Prevention of a wrong-location misadministration through the use of an intradepartmental incident learning system

    International Nuclear Information System (INIS)

    Ford, Eric C.; Smith, Koren; Harris, Kendra; Terezakis, Stephanie

    2012-01-01

    Purpose: A series of examples are presented in which potential errors in the delivery of radiation therapy were prevented through use of incident learning. These examples underscore the value of reporting near miss incidents. Methods: Using a departmental incident learning system, eight incidents were noted over a two-year period in which fields were treated “out-of-sequence,” that is, fields from a boost phase were treated, while the patient was still in the initial phase of treatment. As a result, an error-prevention policy was instituted in which radiation treatment fields are “hidden” within the oncology information system (OIS) when they are not in current use. In this way, fields are only available to be treated in the intended sequence and, importantly, old fields cannot be activated at the linear accelerator control console. Results: No out-of-sequence treatments have been reported in more than two years since the policy change. Furthermore, at least three near-miss incidents were detected and corrected as a result of the policy change. In the first two, the policy operated as intended to directly prevent an error in field scheduling. In the third near-miss, the policy operated “off target” to prevent a type of error scenario that it was not directly intended to prevent. In this incident, an incorrect digitally reconstructed radiograph (DRR) was scheduled in the OIS for a patient receiving lung cancer treatment. The incorrect DRR had an isocenter which was misplaced by approximately two centimeters. The error was a result of a field from an old plan being scheduled instead of the intended new plan. As a result of the policy described above, the DRR field could not be activated for treatment however and the error was discovered and corrected. Other quality control barriers in place would have been unlikely to have detected this error. Conclusions: In these examples, a policy was adopted based on incident learning, which prevented several errors

  7. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  8. Development of the decision make supporting system on incident management

    International Nuclear Information System (INIS)

    Kasamatsu, Mizuki; Hanada, Satoshi; Noda, Eisuke

    2017-01-01

    Decision Make Supporting System is designed to support appropriate decision made by top management in the nuclear severe conditions. With crisis response in nuclear power plant (NPP), information entanglement between sites and control centers during intense situations interfere with prompt and accurate decision making. This research started with that kind of background. In order to solve the issue of the information entanglement, Mitsubishi Heavy Industries, Inc. (MHI) carried out the development of the Decision Make Supporting System and the system applies the technology combining the human factors engineering (HFE) and information and communication technology (ICT). During the crisis response, various commands, reactions and communications in a human system need to be managed. Therefore, the combined HFE method including detailed task analysis, user experience (UX), graphic user interface (GUI) and related human-system interface (HSI) design method is applied to the design of the system. These design results systematize the functions that prevent interference with decision-making in the headquarters for incident management. This new solution as a system enhances the safety improvement of the NPP and contributes to develop the skills and abilities of the resources in the NPP. The system has three key features for supporting emergency situations: 'understanding the situation', 'planning the next action', and 'managing resources'. The system helps commanders and responders to grasp the whole situation and allows them to share information in real time to get a whole picture, and the system accumulates the data of the past events in the chronological order to understand correctly how they happened and plan the next action by using a knowledge database that MHI has been developed. If the unexpected event happens which are not in the incident scenario, the system provides support to formulate alternative strategies and measures. With this

  9. Explaining implementation behaviour of the National Incident Management System (NIMS).

    Science.gov (United States)

    Jensen, Jessica; Youngs, George

    2015-04-01

    This paper explains the perceived implementation behaviour of counties in the United States with respect to the National Incident Management System (NIMS). The system represents a massive and historic policy mandate designed to restructure, standardise and thereby unify the efforts of a wide variety of emergency management entities. Specifically, this study examined variables identified in the NIMS and policy literature that might influence the behavioural intentions and actual behaviour of counties. It found that three key factors limit or promote how counties intend to implement NIMS and how they actually implement the system: policy characteristics related to NIMS, implementer views and a measure of local capacity. One additional variable-inter-organisational characteristics-was found to influence only actual behaviour. This study's findings suggest that the purpose underlying NIMS may not be fulfilled and confirm what disaster research has long suggested: the potential for standardisation in emergency management is limited. © 2015 The Author(s). Disasters © Overseas Development Institute, 2015.

  10. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  11. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  12. Detection of the specific binding on protein microarrays by oblique-incidence reflectivity difference method

    International Nuclear Information System (INIS)

    Lu, Heng; Wen, Juan; Wang, Xu; Yuan, Kun; Lu, Huibin; Zhou, Yueliang; Jin, Kuijuan; Yang, Guozhen; Li, Wei; Ruan, Kangcheng

    2010-01-01

    The specific binding between Cy5-labeled goat anti-mouse Immunoglobulin G (IgG) and mouse IgG with a concentration range from 625 to 10 4 µg ml −1 has been detected successfully by the oblique-incidence reflectivity difference (OI-RD) method in each procedure of microarray fabrication. The experimental data prove that the OI-RD method can be employed not only to distinguish the different concentrations in label-free fashion but also to detect the antibody–antigen capture. In addition, the differential treatment of the OI-RD signals can decrease the negative influences of glass slide as the microarray upholder. Therefore the OI-RD technique has promising applications for the label-free and high-throughput detection of protein microarrays

  13. A grey incidence algorithm to detect high-Z material using cosmic ray muons

    Science.gov (United States)

    He, W.; Xiao, S.; Shuai, M.; Chen, Y.; Lan, M.; Wei, M.; An, Q.; Lai, X.

    2017-10-01

    Muon scattering tomography (MST) is a method for using cosmic muons to scan cargo containers and vehicles for special nuclear materials. However, the flux of cosmic ray muons is low, in the real life application, the detection has to be done a short timescale with small numbers of muons. In this paper, we present a novel approach to detection of special nuclear material by using cosmic ray muons. We use the degree of grey incidence to distinguish typical waste fuel material, uranium, from low-Z material, medium-Z material and other high-Z materials of tungsten and lead. The result shows that using this algorithm, it is possible to detect high-Z materials with an acceptable timescale.

  14. Road Anomalies Detection System Evaluation.

    Science.gov (United States)

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  15. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  16. Breast implants and breast cancer: a review of incidence, detection, mortality, and survival.

    Science.gov (United States)

    Deapen, Dennis

    2007-12-01

    Soon after breast implants were commercially introduced over 30 years ago, questions about potential carcinogenicity were raised. Animal experiments dating back to the mid-twentieth century demonstrated that foreign body implantation of many materials, including silicone, can induce sarcomas. Indeed, female breast cancer incidence rates in the United States have increased substantially over that period. Of the several published studies from various countries that have formally investigated the risk of breast cancer among augmentation mammaplasty patients, none show any evidence of increased risk. In fact, most find lower than expected risk, some with statistically significant reductions. Similarly, breast cancer mortality among these patients is generally found to be below that expected of other similar women. Delayed detection of breast cancer is a concern for these patients because implants can interfere with mammography. However, using indicators such as stage at diagnosis and tumor size, current research shows that augmentation patients do not experience delayed detection. Furthermore, several comparisons of post-breast cancer survival of augmented versus nonaugmented patients have found no significant differences. In summary, breast implants are not associated with an increased risk of breast cancer incidence or death, and these patients do not experience delayed detection or poorer post-breast cancer survival.

  17. Learning to Detect Traffic Incidents from Data Based on Tree Augmented Naive Bayesian Classifiers

    Directory of Open Access Journals (Sweden)

    Dawei Li

    2017-01-01

    Full Text Available This study develops a tree augmented naive Bayesian (TAN classifier based incident detection algorithm. Compared with the Bayesian networks based detection algorithms developed in the previous studies, this algorithm has less dependency on experts’ knowledge. The structure of TAN classifier for incident detection is learned from data. The discretization of continuous attributes is processed using an entropy-based method automatically. A simulation dataset on the section of the Ayer Rajah Expressway (AYE in Singapore is used to demonstrate the development of proposed algorithm, including wavelet denoising, normalization, entropy-based discretization, and structure learning. The performance of TAN based algorithm is evaluated compared with the previous developed Bayesian network (BN based and multilayer feed forward (MLF neural networks based algorithms with the same AYE data. The experiment results show that the TAN based algorithms perform better than the BN classifiers and have a similar performance to the MLF based algorithm. However, TAN based algorithm would have wider vista of applications because the theory of TAN classifiers is much less complicated than MLF. It should be found from the experiment that the TAN classifier based algorithm has a significant superiority over the speed of model training and calibration compared with MLF.

  18. Detection system for the identification of heavy ions

    International Nuclear Information System (INIS)

    Abriola, Daniel H.; Arazi, Andres; Achterberg, Erhard; Capurro, Oscar A.; Fernandez Niello, Jorge O.; Ferrero, Armando M. J.; Liberman, Rosa G.; Marti, Guillermo V.; Pacheco, Alberto J.; Ramirez, Marcelo C.; Testoni, Jorge E.

    1999-01-01

    The TANDAR laboratory has a magnetic spectrometer as one of its detection facilities. This device allows the separation of incident particles according to the relation between their lineal momentum and their charge state. To complete this identification there are two alternatives: 1) A system of three detectors consisting of a multiwire detector, an ionization chamber and scintillators; 2) A segmented anode ionization chamber. (author)

  19. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  20. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  1. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  2. Detection system of sodium oxide vapors

    International Nuclear Information System (INIS)

    Hundal, Rolv.

    1976-01-01

    The description is given of a sodium oxide vapor detection system which comprises a containment, a light source located to send a light beam into and through this containment and a photodetector located to intercept the light from the source after it has covered a given path through the containment. In response to the intensity of the incident light, the photodetector produces an output signal representative of it. The feature of this device is a first polarizer located near the light source, along the path of the light coming from it and designed to polarize the light projected through the containment in a given plane, and a second polarizer located near the photodetector, along the path of the polarized light and designed virtually to prevent all the light rays whose orientation differs from the given polarization plane from reaching the photodetector [fr

  3. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  4. Medication Incidents Related to Automated Dose Dispensing in Community Pharmacies and Hospitals - A Reporting System Study

    Science.gov (United States)

    Cheung, Ka-Chun; van den Bemt, Patricia M. L. A.; Bouvy, Marcel L.; Wensing, Michel; De Smet, Peter A. G. M.

    2014-01-01

    Introduction Automated dose dispensing (ADD) is being introduced in several countries and the use of this technology is expected to increase as a growing number of elderly people need to manage their medication at home. ADD aims to improve medication safety and treatment adherence, but it may introduce new safety issues. This descriptive study provides insight into the nature and consequences of medication incidents related to ADD, as reported by healthcare professionals in community pharmacies and hospitals. Methods The medication incidents that were submitted to the Dutch Central Medication incidents Registration (CMR) reporting system were selected and characterized independently by two researchers. Main Outcome Measures Person discovering the incident, phase of the medication process in which the incident occurred, immediate cause of the incident, nature of incident from the healthcare provider's perspective, nature of incident from the patient's perspective, and consequent harm to the patient caused by the incident. Results From January 2012 to February 2013 the CMR received 15,113 incidents: 3,685 (24.4%) incidents from community pharmacies and 11,428 (75.6%) incidents from hospitals. Eventually 1 of 50 reported incidents (268/15,113 = 1.8%) were related to ADD; in community pharmacies more incidents (227/3,685 = 6.2%) were related to ADD than in hospitals (41/11,428 = 0.4%). The immediate cause of an incident was often a change in the patient's medicine regimen or relocation. Most reported incidents occurred in two phases: entering the prescription into the pharmacy information system and filling the ADD bag. Conclusion A proportion of incidents was related to ADD and is reported regularly, especially by community pharmacies. In two phases, entering the prescription into the pharmacy information system and filling the ADD bag, most incidents occurred. A change in the patient's medicine regimen or relocation was the immediate causes of an incident

  5. Detection of incidents and follow-up by the regulatory bodies

    International Nuclear Information System (INIS)

    Gouffon, A.

    1990-12-01

    Although France has established a large nuclear program based on PWR type reactors, experience gained up to this are are quite modest. Concept of PWR-900 reactors is based mostly on safety analyses and evaluations done a priori. At the time of their construction and start-up they have been considered as advanced safe systems. No data were available concerning any incidents during operation. The Three Mile Island accident in 1979 has changed the attitude concerning reactor safety. The result is the procedure adopted by Electricite de France for follow-up of incident situations during operation of a number of PWR-900 plants. Standardization of this type of NPPs demands extremely strict standards and control of safety systems. This safety analysis procedure consists of the following: analysis of incidents based on data collected by EDF during operation; every regular annual shutdown of a unit is the subject of detailed analysis; together with the detailed analysis, principal elements of operating experience for the series of PWR units are submitted for analysis to a permanent regulatory body

  6. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  7. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  8. Safer travel, improved economic productivity : incident management systems

    Science.gov (United States)

    1999-01-01

    This brochure gives an overview of how incident management technologies can be used to reduce incident-related congestion and increase road safety. It focuses on the need for interagency cooperation and the benefits that can be derived from the coope...

  9. Hazard detection in noise-related incidents - the role of driving experience with battery electric vehicles.

    Science.gov (United States)

    Cocron, Peter; Bachl, Veronika; Früh, Laura; Koch, Iris; Krems, Josef F

    2014-12-01

    The low noise emission of battery electric vehicles (BEVs) has led to discussions about how to address potential safety issues for other road users. Legislative actions have already been undertaken to implement artificial sounds. In previous research, BEV drivers reported that due to low noise emission they paid particular attention to pedestrians and bicyclists. For the current research, we developed a hazard detection task to test whether drivers with BEV experience respond faster to incidents, which arise due to the low noise emission, than inexperienced drivers. The first study (N=65) revealed that BEV experience only played a minor role in drivers' response to hazards resulting from low BEV noise. The tendency to respond, reaction times and hazard evaluations were similar among experienced and inexperienced BEV drivers; only small trends in the assumed direction were observed. Still, both groups clearly differentiated between critical and non-critical scenarios and responded accordingly. In the second study (N=58), we investigated additionally if sensitization to low noise emission of BEVs had an effect on hazard perception in incidents where the noise difference is crucial. Again, participants in all groups differentiated between critical and non-critical scenarios. Even though trends in response rates and latencies occurred, experience and sensitization to low noise seemed to only play a minor role in detecting hazards due to low BEV noise. An additional global evaluation of BEV noise further suggests that even after a short test drive, the lack of noise is perceived more as a comfort feature than a safety threat. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Nuclear detection systems in traffic

    International Nuclear Information System (INIS)

    Farkas, T.; Pernicka, L.; Svec, A.

    2005-01-01

    Illicit trafficking in nuclear materials (nuclear criminality) has become a problem, due to the circulation of a high number of radioactive sources caused by the changes of the organisational infrastructures to supervise these material within the successor states of the former Soviet Union. Aim of this paper is to point out the technical requirements and the practicability of an useful monitoring system at preselected traffic check points (railway and highway border crossings, industrial sites entry gates, international airports). The ITRAP lab test was designed to work as strict benchmark to qualify border monitoring systems 67 with very low false alarm rates, in addition the minimum sensitivity to give an alarm has been defined for fix-installed systems, pocket type and hand held instruments. For the neutron tests a special prepared Californium source ( 252 Cf) was used to simulate the weapons plutonium. The source is shielded against gamma radiation, use a moderator and provides the required neutron rate of 20000 n/s at 2 rn distance. To test the false alarm rate (rate of false positive ) the same test facility , under the same background conditions, was used but without a radioactive test source. The ITRAP lab tests for the fix-installed systems started at May 1998 and first results were given in September 1998. Only 2 of 14 fix-installed monitoring systems could fulfil the minimum requirement for neutron detection. 7 of 14 fix-installed monitoring systems (50%) passed the ITRAP lab test. The analytical method developed and used for certification of installed radiation monitors in the Slovak Institute of Metrology consists in measurement of radiation activity of selected radionuclide in defined conditions. (authors)

  11. Critical incidence reporting systems - an option in equine anaesthesia? Results from a panel meeting.

    Science.gov (United States)

    Hartnack, Sonja; Bettschart-Wolfensberger, Regula; Driessen, Bernd; Pang, Daniel; Wohlfender, Franziska

    2013-11-01

    To provide a brief introduction into Critical Incident Reporting Systems (CIRS) as used in human medicine, and to report the discussion from a recent panel meeting discussion with 23 equine anaesthetists in preparation for a new CEPEF-4 (Confidential Enquiry into Perioperative Equine Fatalities) study. Moderated group discussions, and review of literature. The first group discussion focused on the definition of 'preventable critical incidents' and/or 'near misses' in the context of equine anaesthesia. The second group discussion focused on categorizing critical incidents according to an established framework for analysing risk and safety in clinical medicine. While critical incidents do occur in equine anaesthesia, no critical incident reporting system including systematic collection and analysis of critical incidents is in place. Critical incident reporting systems could be used to improve safety in equine anaesthesia - in addition to other study types such as mortality studies. © 2013 Association of Veterinary Anaesthetists and the American College of Veterinary Anesthesia and Analgesia.

  12. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  13. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  14. STRATEG - an incident training system for thermohydraulic effects and principles

    International Nuclear Information System (INIS)

    Rehn, H.; Majohr, N.

    1993-01-01

    STRATEG is a 1:10 scale glass model of a PWR (Biblis B reactor coolant circuit) built by RWE in 1986 on the site of the Biblis plant as a training model. The model can be used for training of normal operation and incident situations since all important operating and incident sequences of a PWR can be simulated. Thermodynamic phenomena can also be demonstrated occurring under various operating situations and in particular associated with malfunctions. (Z.S.) 1 tab., 3 figs., 1 ref

  15. Incidence of cervical human papillomavirus infection in systemic lupus erythematosus women.

    Science.gov (United States)

    Mendoza-Pinto, C; García-Carrasco, M; Vallejo-Ruiz, V; Méndez-Martínez, S; Taboada-Cole, A; Etchegaray-Morales, I; Muñóz-Guarneros, M; Reyes-Leyva, J; López-Colombo, A

    2017-08-01

    Objectives Our objective was to study the incidence, persistence and clearance of human papillomavirus infection in systemic lupus erythematosus women and assess risk factors for persistence of human papillomavirus infection. Methods We carried out a prospective, observational cohort study of 127 systemic lupus erythematosus women. Patients were evaluated at baseline and at three years. Traditional and systemic lupus erythematosus women-related disease risk factors were collected. Gynaecological evaluations and cervical cytology screening were made. Human papillomavirus detection and genotyping were made by polymerase chain reaction and linear array. Results The cumulative prevalence of human papillomavirus infection increased from 22.8% at baseline to 33.8% at three years; p = lupus erythematosus women, the cumulative prevalence of human papillomavirus infection, including high risk-human papillomavirus and multiple human papillomavirus infections, may increase over time. Most persistent infections were low risk-human papillomavirus. The number of lifetime sexual partners and the cumulative cyclophosphamide dose were independently associated with incident human papillomavirus infection.

  16. Designing System Reforms: Using a Systems Approach to Translate Incident Analyses into Prevention Strategies

    Science.gov (United States)

    Goode, Natassia; Read, Gemma J. M.; van Mulken, Michelle R. H.; Clacy, Amanda; Salmon, Paul M.

    2016-01-01

    Advocates of systems thinking approaches argue that accident prevention strategies should focus on reforming the system rather than on fixing the “broken components.” However, little guidance exists on how organizations can translate incident data into prevention strategies that address the systemic causes of accidents. This article describes and evaluates a series of systems thinking prevention strategies that were designed in response to the analysis of multiple incidents. The study was undertaken in the led outdoor activity (LOA) sector in Australia, which delivers supervised or instructed outdoor activities such as canyoning, sea kayaking, rock climbing and camping. The design process involved workshops with practitioners, and focussed on incident data analyzed using Rasmussen's AcciMap technique. A series of reflection points based on the systemic causes of accidents was used to guide the design process, and the AcciMap technique was used to represent the prevention strategies and the relationships between them, leading to the creation of PreventiMaps. An evaluation of the PreventiMaps revealed that all of them incorporated the core principles of the systems thinking approach and many proposed prevention strategies for improving vertical integration across the LOA system. However, the majority failed to address the migration of work practices and the erosion of risk controls. Overall, the findings suggest that the design process was partially successful in helping practitioners to translate incident data into prevention strategies that addressed the systemic causes of accidents; refinement of the design process is required to focus practitioners more on designing monitoring and feedback mechanisms to support decisions at the higher levels of the system. PMID:28066296

  17. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  18. System Safety Assessment Based on Past Incidents in Oil and Gas Industries: A Focused Approach in Forecasting of Minor, Severe, Critical, and Catastrophic Incidents, 2010–2015

    Directory of Open Access Journals (Sweden)

    Praveen Patel

    2016-01-01

    Full Text Available Accident in an occupation which occurred due to series of repetitive minor incidents within the working environment. This work demonstrates the critical system safety assessment based on various incidents that took place to the different system and subsystem of two Indian oil refineries in five years of span 2010 to 2015. The categorization of incidents and hazard rate function of each incident category were classified and calculated. The result of Weibull analysis estimators in the form of scale and shape parameters provides useful information of incidents forecasting and their patterns in a particular time.

  19. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  20. Trends in Thyroid Cancer Incidence in Korean Children (1999-2012) Based on Palpation and Nonpalpation Detection Methods

    Science.gov (United States)

    Cho, Yoon Young; Jang, Hye Won; Joung, Ji Young; Park, Sun-Mi; Jeong, Dae Joon; Kim, Sun Wook; Chung, Jae Hoon

    2015-01-01

    Background The incidence of childhood thyroid cancer is increasing in several populations; however, contributing factors have not been adequately discussed. Objectives Our aim was to identify trends of childhood thyroid cancer based on the Korea Central Cancer Registry (KCCR) database and to elucidate changes in detection methods of cancers using a single-center database. Methods Data from the KCCR and Statistics Korea between 1999 and 2012 were used to calculate the crude incidence of thyroid cancer in children. To analyze detection methods for cancers, pediatric patients (aged 0-19 years, n = 126) who underwent thyroid surgery for thyroid cancers at our institution were identified. Subjects were divided into two groups by detection method: (1) palpation group and (2) screening group. Results The crude incidence of childhood thyroid cancer increased from 0.5 per 100,000 in 1999 to 1.7 in 2012. The proportion of thyroid cancer among total cancers also increased from 4.4% in 1999 to 10.6% in 2012. Among 126 children from our institution, 91 cases (72%) were identified as palpable neck masses, and the remainder were discovered during imaging studies. The numbers in both groups gradually increased during the study period. Conclusions The incidence of childhood thyroid cancer has steadily increased in Korea. Regarding the detection methods of cancers, most tumors are detected by palpation rather than screening, although the rate of masses identified during screening has increased. PMID:26835429

  1. Comparing detection and disclosure of traffic incidents in social networks: an intelligent approach based on Twitter vs. Waze

    Directory of Open Access Journals (Sweden)

    Sebastián Vallejos

    2018-03-01

    Full Text Available Nowadays, social networks have become  in a  communication  medium widely  used to disseminate any type  of  information. In  particular,  the  shared  information  in  social  networks  usually  includes  a  considerable number of traffic incidents reports of specific cities. In light of this, specialized social networks have emerged for detecting and disseminating traffic incidents, differentiating from generic social networks in which a wide variety of  topics  are  communicated.  In this  context,  Twitter  is  a  case  in  point  of  a  generic  social  network  in  which  its users often share information about traffic incidents, while Waze is a social network specialized in traffic. In this paper we present a comparative study between Waze and an intelligent approach that detects traffic incidents by analyzing publications shared in Twitter. The comparative study was carried out considering Ciudad Autónoma de Buenos  Aires  (CABA,  Argentina,  as  the  region  of  interest.  The results of this work suggest that both social networks should be considered as complementary sources of information. This conclusion is based on the fact that the proportion of mutual detections, i.e. traffic incidents detected by both approaches, was considerably low since it did not exceed 6% of the cases. Moreover, the results do not show that any of the approaches tend to anticipate in time to the other one in the detection of traffic incidents.

  2. Nonbronchial systemic arteries: incidence and endovascular interventional management for hemoptysis

    International Nuclear Information System (INIS)

    Jiang Sen; Zhu Xiaohua; Sun Xiwen; You Zhengqian; Ma Jun; Yu Dong; Peng Gang; Jie Bing; Sun Chunyi

    2009-01-01

    Objective: To investigate the incidence and relation to primary diseases of the nonbronchial systemic arteries (NBSA) supply to the pulmonary lesions, and to evaluate the clinical value of transcatheter arterial embolization (TAE) of the responsibly NBSA for hemoptysis. Methods: The aortography and subclavian artery angiography were performed in 139 patients with hemoptysis, including pulmonary tuberculosis in 66 cases (2 cases with post-thoracoplasty, 1 case with post-lobectomy, and 1 case with ventricular septal defect), bronchiectasis in 41 (1 case with post-lobectomy and 1 case with post-ligation of patent ductus arteriosus), bronchiogenic carcinoma in 15, unknown hemoptysis in 7, silicosis in 3, broncholithiasis in 3, bronchial cysts in 1, empyema in 1, postoperative lung cancer in 1, and chronic pulmonary embolism in 1, respectively. TAE was performed in patients with the discoverable responsible NBSA. The frequency, distribution and relation to primary diseases of the responsible NBSA were evaluated and the clinical results and complications were observed. Follow-up time ranged from 6 months to 5 years. Results: Seventy-three patients (52.5%) had nonbronchial systemic contributions, including 5 cases of post-thoracotomy with pulmonary lesions, 1 case complicating with ventricular septal defect, 1 case with post-ligation of patent ductus arteriosus, and 1 case of chronic pulmonary embolism. The total number of NBSA were 181 including posterior intercostal arteries (n=88), internal thoracic arteries (n=27), inferior phrenic arteries (n=21), proper esophageal arteries (n=20), lateral thoracic arteries (n=9), subscapular arteries (n=7), costocervical trunks (n=5) and thyrocervical trunks (n=4). Main responsible NBSA were posterior intercostal arteries (n=75) and branches of subclavian and axillary artery (n=44) in patients with pulmonary tuberculosis, and proper esophageal arteries (n=16) and inferior phrenic arteries (n=17) in bronchiectasis. The clinical

  3. Incidence of Congenital Spinal Abnormalities Among Pediatric Patients and Their Association With Scoliosis and Systemic Anomalies.

    Science.gov (United States)

    Passias, Peter G; Poorman, Gregory W; Jalai, Cyrus M; Diebo, Bassel G; Vira, Shaleen; Horn, Samantha R; Baker, Joseph F; Shenoy, Kartik; Hasan, Saqib; Buza, John; Bronson, Wesley; Paul, Justin C; Kaye, Ian; Foster, Norah A; Cassilly, Ryan T; Oren, Jonathan H; Moskovich, Ronald; Line, Breton; Oh, Cheongeun; Bess, Shay; LaFage, Virginie; Errico, Thomas J

    2017-10-09

    Congenital abnormalities when present, according to VACTERL theory, occur nonrandomly with other congenital anomalies. This study estimates the prevalence of congenital spinal anomalies, and their concurrence with other systemic anomalies. A retrospective cohort analysis on Health care Cost and Utilization Project's Kids Inpatient Database (KID), years 2000, 2003, 2006, 2009 was performed. ICD-9 coding identified congenital anomalies of the spine and other body systems. Overall incidence of congenital spinal abnormalities in pediatric patients, and the concurrence of spinal anomaly diagnoses with other organ system anomalies. Frequencies of congenital spine anomalies were estimated using KID hospital-and-year-adjusted weights. Poisson distribution in contingency tables tabulated concurrence of other congenital anomalies, grouped by body system. Of 12,039,432 patients, rates per 100,000 cases were: 9.1 hemivertebra, 4.3 Klippel-Fiel, 56.3 Chiari malformation, 52.6 tethered cord, 83.4 spina bifida, 1.2 absence of vertebra, and 6.2 diastematomyelia. Diastematomyelia had the highest concurrence of other anomalies: 70.1% of diastematomyelia patients had at least one other congenital anomaly. Next, 63.2% of hemivertebra, and 35.2% of Klippel-Fiel patients had concurrent anomalies. Of the other systems deformities cooccuring, cardiac system had the highest concurrent incidence (6.5% overall). In light of VACTERL's definition of a patient being diagnosed with at least 3 VACTERL anomalies, hemivertebra patients had the highest cooccurrence of ≥3 anomalies (31.3%). With detailed analysis of hemivertebra patients, secundum ASD (14.49%), atresia of large intestine (10.2%), renal agenesis (7.43%) frequently cooccured. Congenital abnormalities of the spine are associated with serious systemic anomalies that may have delayed presentations. These patients continue to be at a very high, and maybe higher than previously thought, risk for comorbidities that can cause devastating

  4. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  5. Sporadic incidence of Fascioliasis detected during hepatobiliary procedures: a study of 18 patients from Sulaimaniyah governorate.

    Science.gov (United States)

    Hawramy, Tahir Abdullah Hussein; Saeed, Kamal Ahmed; Qaradaghy, Seerwan Hama Sharif; Karboli, Taha Ahmed; Nore, Beston Faiek; Bayati, Noora Hisham Abood

    2012-12-21

    Fascioliasis is an often-neglected zoonotic disease and currently is an emerging infection in Iraq. Fascioliasis has two distinct phases, an acute phase, exhibiting the hepatic migratory stage of the fluke's life cycle, and a chronic biliary phase manifested with the presence of the parasite in the bile ducts through hepatic tissue. The incidence of Fascioliasis in Sulaimaniyah governorate was unexpected observation. We believe that shedding light on this disease in our locality will increase our physician awareness and experience in early detection, treatment in order to avoid unnecessary surgeries. We retrospectively evaluated this disease in terms of the demographic features, clinical presentations, and managements by reviewing the medical records of 18 patients, who were admitted to the Sulaimani Teaching Hospital and Kurdistan Centre for Gastroenterology and Hepatology. Patients were complained from hepatobiliary and/or upper gastrointestinal symptoms and diagnosed accidentally with Fascioliasis during hepatobiliary surgeries and ERCP by direct visualization of the flukes and stone analysis. Elevated liver enzymes, white blood cells count and eosinophilia were notable laboratory indices. The dilated CBD, gallstones, liver cysts and abscess were found common in radiological images. Fascioliasis diagnosed during conventional surgical CBD exploration and choledochodoudenostomy, open cholecystectomy, surgical drainage of liver abscess, ERCP and during gallstone analysis. Fascioliasis is indeed an emerging disease in our locality, but it is often underestimated and ignored. We recommend the differential diagnosis of patients suffering from Rt. Hypochondrial pain, fever and eosinophilia. The watercress ingestion was a common factor in patient's history.

  6. Detection systems for radioactive ion beams

    International Nuclear Information System (INIS)

    Savajols, H.

    2002-01-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  7. Meteorological Integration for the Biological Warning and Incident Characterization (BWIC) System: General Guidance for BWIC Cities

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, William J.; Wang, Weiguo; Rutz, Frederick C.; Chapman, Elaine G.; Rishel, Jeremy P.; Xie, YuLong; Seiple, Timothy E.; Allwine, K Jerry

    2007-02-16

    The U.S. Department of Homeland Security (DHS) is responsible for developing systems to detect the release of aerosolized bioagents in urban environments. The system that accomplishes this, known as BioWatch, is a robust first-generation monitoring system. In conjunction with the BioWatch detection network, DHS has also developed a software tool for cities to use to assist in their response when a bioagent is detected. This tool, the Biological Warning and Incident Characterization (BWIC) System, will eventually be deployed to all BioWatch cities to aid in the interpretation of the public health significance of indicators from the BioWatch networks. BWIC consists of a set of integrated modules, including meteorological models, that estimate the effect of a biological agent on a city’s population once it has been detected. For the meteorological models in BWIC to successfully calculate the distribution of biological material, they must have as input accurate meteorological data, and wind fields in particular. The purpose of this document is to provide guidance for cities to use in identifying sources of good-quality local meteorological data that BWIC needs to function properly. This process of finding sources of local meteorological data, evaluating the data quality and gaps in coverage, and getting the data into BWIC, referred to as meteorological integration, is described. The good news for many cities is that meteorological measurement networks are becoming increasingly common. Most of these networks allow their data to be distributed in real time via the internet. Thus, cities will often only need to evaluate the quality of available measurements and perhaps add a modest number of stations where coverage is poor.

  8. Incidence of Type II CRISPR1-Cas Systems in Enterococcus Is Species-Dependent.

    Directory of Open Access Journals (Sweden)

    Casandra Lyons

    Full Text Available CRISPR-Cas systems, which obstruct both viral infection and incorporation of mobile genetic elements by horizontal transfer, are a specific immune response common to prokaryotes. Antiviral protection by CRISPR-Cas comes at a cost, as horizontally-acquired genes may increase fitness and provide rapid adaptation to habitat change. To date, investigations into the prevalence of CRISPR have primarily focused on pathogenic and clinical bacteria, while less is known about CRISPR dynamics in commensal and environmental species. We designed PCR primers and coupled these with DNA sequencing of products to detect and characterize the presence of cas1, a universal CRISPR-associated gene and proxy for the Type II CRISPR1-Cas system, in environmental and non-clinical Enterococcus isolates. CRISPR1-cas1 was detected in approximately 33% of the 275 strains examined, and differences in CRISPR1 carriage between species was significant. Incidence of cas1 in E. hirae was 73%, nearly three times that of E. faecalis (23.6% and 10 times more frequent than in E. durans (7.1%. Also, this is the first report of CRISPR1 presence in E. durans, as well as in the plant-associated species E. casseliflavus and E. sulfureus. Significant differences in CRISPR1-cas1 incidence among Enterococcus species support the hypothesis that there is a tradeoff between protection and adaptability. The differences in the habitats of enterococcal species may exert varying selective pressure that results in a species-dependent distribution of CRISPR-Cas systems.

  9. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  10. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  11. Risk factors for radiotherapy incidents and impact of an online electronic reporting system

    International Nuclear Information System (INIS)

    Chang, David W.; Cheetham, Lynn; Marvelde, Luc te; Bressel, Mathias; Kron, Tomas; Gill, Suki; Tai, Keen Hun; Ball, David; Rose, William; Silva, Linas; Foroudi, Farshad

    2014-01-01

    Background and purpose: To ascertain the rate, type, significance, trends and the potential risk factors associated with radiotherapy incidents in a large academic department. Materials and methods: Data for all radiotherapy activities from July 2001 to January 2011 were reviewed from radiotherapy incident reporting forms. Patient and treatment data were obtained from the radiotherapy record and verification database (MOSAIQ) and the patient database (HOSPRO). Logistic regression analyses were performed to determine variables associated with radiotherapy incidents. Results: In that time, 65,376 courses of radiotherapy were delivered with a reported incident rate of 2.64 per 100 courses. The rate of incidents per course increased (1.96 per 100 courses to 3.52 per 100 courses, p < 0.001) whereas the proportion of reported incidents resulting in >5% deviation in dose (10.50 to 2.75%, p < 0.001) had decreased after the introduction of an online electronic reporting system. The following variables were associated with an increased rate of incidents: afternoon treatment time, paediatric patients, males, inpatients, palliative plans, head-and-neck, skin, sarcoma and haematological malignancies. In general, complex plans were associated with higher incidence rates. Conclusion: Radiotherapy incidents were infrequent and most did not result in significant dose deviation. A number of risk factors were identified and these could be used to highlight high-risk cases in the future. Introduction of an online electronic reporting system resulted in a significant increase in the number of incidents being reported

  12. Incidence of postangiographic silent brain infarction detected by diffusion-weighted MR imaging

    International Nuclear Information System (INIS)

    Mori, Harushi; Hayashi, Naoto; Aoki, Shigeki

    2002-01-01

    We surveyed to assess for the incidence of clinically silent brain infarction after cerebral catheter angiography. Diffusion-weighted images were performed shortly after 33 cerebral catheter angiographies. We found totally 11 abnormally high intensity spots in 5 of 33 patients on diffusion-weighted images and, therefore, the incidence was calculated as 15.2%. This incidence is higher than has been estimated based on the incidence of neurological deficits (about 0.5%) after cerebral angiography. Diffusion-weighted MR imaging is suitable to monitor the safety of angiographic procedures and material. (author)

  13. SU-E-T-511: Inter-Rater Variability in Classification of Incidents in a New Incident Reporting System

    International Nuclear Information System (INIS)

    Pappas, D; Reis, S; Ali, A; Kapur, A

    2015-01-01

    Purpose To determine how consistent the results of different raters are when reviewing the same cases within the Radiation Oncology Incident Learning System (ROILS). Methods Three second-year medical physics graduate students filled out incident reports in spreadsheets set up to mimic ROILS. All students studied the same 33 cases and independently entered their assessments, for a total of 99 reviewed cases. The narratives for these cases were obtained from a published International Commission on Radiological Protection (ICRP) report which included shorter narratives selected from the Radiation Oncology Safety Information System (ROSIS) database. Each category of questions was reviewed to see how consistent the results were by utilizing free-marginal multirater kappa analysis. The percentage of cases where all raters shared full agreement or full disagreement was recorded to show which questions were answered consistently by multiple raters for a given case. The consistency among the raters was analyzed between ICRP and ROSIS cases to see if either group led to more reliable results. Results The categories where all raters agreed 100 percent in their choices were the event type (93.94 percent of cases 0.946 kappa) and the likelihood of the event being harmful to the patient (42.42 percent of cases 0.409 kappa). The categories where all raters disagreed 100 percent in their choices were the dosimetric severity scale (39.39 percent of cases 0.139 kappa) and the potential future toxicity (48.48 percent of cases 0.205 kappa). ROSIS had more cases where all raters disagreed than ICRP (23.06 percent of cases compared to 15.58 percent, respectively). Conclusion Despite reviewing the same cases, the results among the three raters was widespread. ROSIS narratives were shorter than ICRP, which suggests that longer narratives lead to more consistent results. This study shows that the incident reporting system can be optimized to yield more consistent results

  14. SU-E-T-511: Inter-Rater Variability in Classification of Incidents in a New Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Pappas, D; Reis, S; Ali, A [Hofstra University, Hempstead, NY (United States); Kapur, A [Long Island Jewish Medical Center, New Hyde Park, NY (United States)

    2015-06-15

    Purpose To determine how consistent the results of different raters are when reviewing the same cases within the Radiation Oncology Incident Learning System (ROILS). Methods Three second-year medical physics graduate students filled out incident reports in spreadsheets set up to mimic ROILS. All students studied the same 33 cases and independently entered their assessments, for a total of 99 reviewed cases. The narratives for these cases were obtained from a published International Commission on Radiological Protection (ICRP) report which included shorter narratives selected from the Radiation Oncology Safety Information System (ROSIS) database. Each category of questions was reviewed to see how consistent the results were by utilizing free-marginal multirater kappa analysis. The percentage of cases where all raters shared full agreement or full disagreement was recorded to show which questions were answered consistently by multiple raters for a given case. The consistency among the raters was analyzed between ICRP and ROSIS cases to see if either group led to more reliable results. Results The categories where all raters agreed 100 percent in their choices were the event type (93.94 percent of cases 0.946 kappa) and the likelihood of the event being harmful to the patient (42.42 percent of cases 0.409 kappa). The categories where all raters disagreed 100 percent in their choices were the dosimetric severity scale (39.39 percent of cases 0.139 kappa) and the potential future toxicity (48.48 percent of cases 0.205 kappa). ROSIS had more cases where all raters disagreed than ICRP (23.06 percent of cases compared to 15.58 percent, respectively). Conclusion Despite reviewing the same cases, the results among the three raters was widespread. ROSIS narratives were shorter than ICRP, which suggests that longer narratives lead to more consistent results. This study shows that the incident reporting system can be optimized to yield more consistent results.

  15. EMS helicopter incidents reported to the NASA Aviation Safety Reporting System

    Science.gov (United States)

    Connell, Linda J.; Reynard, William D.

    1993-01-01

    The objectives of this evaluation were to: Identify the types of safety-related incidents reported to the Aviation Safety Reporting System (ASRS) in Emergency Medical Service (EMS) helicopter operations; Describe the operational conditions surrounding these incidents, such as weather, airspace, flight phase, time of day; and Assess the contribution to these incidents of selected human factors considerations, such as communication, distraction, time pressure, workload, and flight/duty impact.

  16. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  17. Resveratrol Reduces the Incidence of Portal Vein System Thrombosis after Splenectomy in a Rat Fibrosis Model

    Science.gov (United States)

    Xu, Meng; Xue, Wanli; Ma, Zhenhua; Bai, Jigang

    2016-01-01

    Purpose. To investigate the preventive effect of resveratrol (RES) on the formation of portal vein system thrombosis (PVST) in a rat fibrosis model. Methods. A total of 64 male SD rats, weighing 200–300 g, were divided into five groups: Sham operation, Splenectomy I, Splenectomy II, RES, and low molecular weight heparin (LMWH), with the former two groups as nonfibrosis controls. Blood samples were subjected to biochemical assays. Platelet apoptosis was measured by flow cytometry. All rats were euthanized for PVST detection one week after operation. Results. No PVST occurred in nonfibrosis controls. Compared to Splenectomy II, the incidences of PVST in RES and LMWH groups were significantly decreased (both p Splenectomy II (all p splenectomy in cirrhotic rat. Regulation of platelet function and induction of platelet apoptosis might be the underlying mechanisms. PMID:27433290

  18. Web-based GIS for spatial pattern detection: application to malaria incidence in Vietnam.

    Science.gov (United States)

    Bui, Thanh Quang; Pham, Hai Minh

    2016-01-01

    There is a great concern on how to build up an interoperable health information system of public health and health information technology within the development of public information and health surveillance programme. Technically, some major issues remain regarding to health data visualization, spatial processing of health data, health information dissemination, data sharing and the access of local communities to health information. In combination with GIS, we propose a technical framework for web-based health data visualization and spatial analysis. Data was collected from open map-servers and geocoded by open data kit package and data geocoding tools. The Web-based system is designed based on Open-source frameworks and libraries. The system provides Web-based analyst tool for pattern detection through three spatial tests: Nearest neighbour, K function, and Spatial Autocorrelation. The result is a web-based GIS, through which end users can detect disease patterns via selecting area, spatial test parameters and contribute to managers and decision makers. The end users can be health practitioners, educators, local communities, health sector authorities and decision makers. This web-based system allows for the improvement of health related services to public sector users as well as citizens in a secure manner. The combination of spatial statistics and web-based GIS can be a solution that helps empower health practitioners in direct and specific intersectional actions, thus provide for better analysis, control and decision-making.

  19. International Cyber Incident Repository System: Information Sharing on a Global Scale

    Energy Technology Data Exchange (ETDEWEB)

    Joyce, Amanda L.; Evans, PhD, Nathaniel; Tanzman, Edward A.; Israeli, Daniel

    2017-02-02

    According to the 2016 Internet Security Threat Report, the largest number of cyber attacks were recorded last year (2015), reaching a total of 430 million incidents throughout the world. As the number of cyber incidents increases, the need for information and intelligence sharing increases, as well. This fairly large increase in cyber incidents is driving the need for an international cyber incident data reporting system. The goal of the cyber incident reporting system is to make available shared and collected information about cyber events among participating international parties. In its 2014 report, Insurance Industry Working Session Readout Report-Insurance for CyberRelated Critical Infrastructure Loss: Key Issues, on the outcomes of a working session on cyber insurance, the U.S. Department of Homeland Security observed that “many participants cited the need for a secure method through which organizations could pool and share cyber incident information” and noted that one underwriter emphasized the importance of internationally harmonized data taxonomies. This cyber incident data reporting system could benefit all nations that take part in reporting incidents to provide a more common operating picture. In addition, this reporting system could allow for trending and anticipated attacks and could potentially benefit participating members by enabling them to get in front of potential attacks. The purpose of this paper is to identify options for consideration for such a system in fostering cooperative cyber defense.

  20. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  1. Increased incidence of Mycoplasma pneumoniae infections detected by laboratory-based surveillance in Denmark in 2010

    DEFF Research Database (Denmark)

    Rasmussen, J N; Voldstedlund, M; Andersen, R L

    2010-01-01

    In Denmark recurrent epidemics of Mycoplasma pneumoniae infections have been described since the 1950s at intervals of approximately four to six years. The latest epidemic occurred in 2004/05 followed by two years of high incidence and more than three years of low incidence. Due to a recent incre...

  2. Sporadic incidence of Fascioliasis detected during Hepatobiliary procedures: A study of 18 patients from Sulaimaniyah governorate

    Science.gov (United States)

    2012-01-01

    Background Fascioliasis is an often-neglected zoonotic disease and currently is an emerging infection in Iraq. Fascioliasis has two distinct phases, an acute phase, exhibiting the hepatic migratory stage of the fluke’s life cycle, and a chronic biliary phase manifested with the presence of the parasite in the bile ducts through hepatic tissue. The incidence of Fascioliasis in Sulaimaniyah governorate was unexpected observation. We believe that shedding light on this disease in our locality will increase our physician awareness and experience in early detection, treatment in order to avoid unnecessary surgeries. Findings We retrospectively evaluated this disease in terms of the demographic features, clinical presentations, and managements by reviewing the medical records of 18 patients, who were admitted to the Sulaimani Teaching Hospital and Kurdistan Centre for Gastroenterology and Hepatology. Patients were complained from hepatobiliary and/or upper gastrointestinal symptoms and diagnosed accidentally with Fascioliasis during hepatobiliary surgeries and ERCP by direct visualization of the flukes and stone analysis. Elevated liver enzymes, white blood cells count and eosinophilia were notable laboratory indices. The dilated CBD, gallstones, liver cysts and abscess were found common in radiological images. Fascioliasis diagnosed during conventional surgical CBD exploration and choledochodoudenostomy, open cholecystectomy, surgical drainage of liver abscess, ERCP and during gallstone analysis. Conclusion Fascioliasis is indeed an emerging disease in our locality, but it is often underestimated and ignored. We recommend the differential diagnosis of patients suffering from Rt. Hypochondrial pain, fever and eosinophilia. The watercress ingestion was a common factor in patient’s history. PMID:23259859

  3. Sporadic incidence of Fascioliasis detected during Hepatobiliary procedures: A study of 18 patients from Sulaimaniyah governorate

    Directory of Open Access Journals (Sweden)

    Hawramy Tahir Abdullah Hussein

    2012-12-01

    Full Text Available Abstract Background Fascioliasis is an often-neglected zoonotic disease and currently is an emerging infection in Iraq. Fascioliasis has two distinct phases, an acute phase, exhibiting the hepatic migratory stage of the fluke’s life cycle, and a chronic biliary phase manifested with the presence of the parasite in the bile ducts through hepatic tissue. The incidence of Fascioliasis in Sulaimaniyah governorate was unexpected observation. We believe that shedding light on this disease in our locality will increase our physician awareness and experience in early detection, treatment in order to avoid unnecessary surgeries. Findings We retrospectively evaluated this disease in terms of the demographic features, clinical presentations, and managements by reviewing the medical records of 18 patients, who were admitted to the Sulaimani Teaching Hospital and Kurdistan Centre for Gastroenterology and Hepatology. Patients were complained from hepatobiliary and/or upper gastrointestinal symptoms and diagnosed accidentally with Fascioliasis during hepatobiliary surgeries and ERCP by direct visualization of the flukes and stone analysis. Elevated liver enzymes, white blood cells count and eosinophilia were notable laboratory indices. The dilated CBD, gallstones, liver cysts and abscess were found common in radiological images. Fascioliasis diagnosed during conventional surgical CBD exploration and choledochodoudenostomy, open cholecystectomy, surgical drainage of liver abscess, ERCP and during gallstone analysis. Conclusion Fascioliasis is indeed an emerging disease in our locality, but it is often underestimated and ignored. We recommend the differential diagnosis of patients suffering from Rt. Hypochondrial pain, fever and eosinophilia. The watercress ingestion was a common factor in patient’s history.

  4. The Incidence of Primary Systemic Vasculitis in Jerusalem: A 20-year Hospital-based Retrospective Study.

    Science.gov (United States)

    Nesher, Gideon; Ben-Chetrit, Eli; Mazal, Bracha; Breuer, Gabriel S

    2016-06-01

    The incidence of primary systemic vasculitides varies among different geographic regions and ethnic origins. The aim of this study was to examine the incidence rates of vasculitides in the Jerusalem Jewish population, and to examine possible trends in incidence rates over a 20-year period. The clinical databases of inpatients at the 2 medical centers in Jerusalem were searched for patients with vasculitis diagnosed between 1990-2009. Individual records were then reviewed by one of the authors. The significance of trends in incidence rates throughout the study period was evaluated by Pearson correlation coefficient. The average annual incidence rate of polyarteritis nodosa was 3.6/million adults (95% CI 1.6-4.7). Incidence rates did not change significantly during this period (r = 0.39, p = 0.088). The incidence of granulomatosis with polyangiitis (GPA) was 4.1 (2.2-5.9) for the whole period, during which it increased significantly (r = 0.53, p Jerusalem are in the lower range of global incidence rates. While GPA and MPA incidence are increasing, GCA incidence is decreasing.

  5. Using Pareto Analysis with Trend Analysis: Statistical Techniques to Investigate Incident Reports within a Housing System

    Science.gov (United States)

    Luna, Andrew L.

    1998-01-01

    The purpose of this study was to determine trends and difficulties concerning student incident reports within the residence halls as they relate to the incident reporting system from the Department of Housing and Residential Life at a Southeastern Doctoral I Granting Institution. This study used the frequency distributions of each classified…

  6. Incidence of systemic inflammatory response syndrome after endovascular aortic repair

    DEFF Research Database (Denmark)

    De La Motte, L; Vogt, K; Jensen, Leif Panduro

    2011-01-01

    : Sixty-six patients were included, 40 (60%) met the SIRS criteria within the first 5 postoperative days (95% of the 40 patients met the criteria within 3 days). We found no significant differences between the SIRS and the non-SIRS group in baseline characteristics or other data including volume...... in the groups (3% in the SIRS group vs. none in the non-SIRS group). CONCLUSION: The high incidence of SIRS after EVAR is unexpected considering the minimally invasive procedure. Further studies on the cause of this response and measures to attenuate the response seem appropriate....... during 2007, were retrospectively evaluated for SIRS within the first 5 postoperative days. The only exclusion-criteria were missing data. SIRS was assessed using the criteria defined by the American College of Chest Physicians and Society of Critical Care Medicine Consensus Conference Committee. RESULTS...

  7. Development of a Tailored Methodology and Forensic Toolkit for Industrial Control Systems Incident Response

    Science.gov (United States)

    2014-06-01

    for industrial control systems ,” in Proceedings of the VDE Kongress, 2004. [15] K. Stouffer et al., “Special publication 800-82: Guide to industrial...TAILORED METHODOLOGY AND FORENSIC TOOLKIT FOR INDUSTRIAL CONTROL SYSTEMS INCIDENT RESPONSE by Nicholas B. Carr June 2014 Thesis Co...CONTROL SYSTEMS INCIDENT RESPONSE 5. FUNDING NUMBERS 6. AUTHOR(S) Nicholas B. Carr 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval

  8. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  9. US Army Nuclear Burst Detection System (NBDS)

    International Nuclear Information System (INIS)

    Glaser, R.F.

    1980-07-01

    The Nuclear Burst Detection System (NBDS) was developed to meet the Army requirements of an unattended, automatic nuclear burst reporting system. It provides pertinent data for battlefield commanders on a timely basis with high reliability

  10. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  11. Studies on normal incidence backscattering in nodule areas using the multibeam-hydrosweep system

    Digital Repository Service at National Institute of Oceanography (India)

    Pathak, D.; Chakraborty, B.

    The acoustic response from areas of varying nodule abundance and number densities in the Central Indian Ocean has been studied by using the echo peak amplitudes of the normal incidence beam in the Multibeam Hydrosweep system. It is observed...

  12. Development of the environmental neutron detection system

    International Nuclear Information System (INIS)

    Kume, Kyo

    2002-03-01

    Environmental neutron detection system was proposed and developed. The main goal of this system was set to detect fast and thermal neutrons with the identical detectors setup without degraders. This system consists of a 10 B doped liquid scintillator for n detection and CsI scintillators for simultaneous γ emission from 10 B doped in the liquid scintillator after the n capture reaction. The first setup was optimized for the thermal n detection, while the second setup was for the fast n detection. It was shown that the thermal n flux was obtained in the first setup by using the method of the γ coincidence method with the help of the Monte Carlo calculation. The second setup was designed to improve the detection efficiency for the fast n, and was shown qualitatively that both the pulse shape discrimination and the coincidence methods are efficient. There will be more improvements, particularly for the quantitative discussion. (author)

  13. Age-related incidence of pulmonary embolism and additional pathologic findings detected by computed tomography pulmonary angiography

    Energy Technology Data Exchange (ETDEWEB)

    Groth, M., E-mail: groth.michael@googlemail.com [Center for Radiology and Endoscopy, Department of Diagnostic and Interventional Radiology, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany); Henes, F.O., E-mail: f.henes@uke.uni-hamburg.de [Center for Radiology and Endoscopy, Department of Diagnostic and Interventional Radiology, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany); Mayer, U., E-mail: mayer@uke.uni-hamburg.de [Emergency Department, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany); Regier, M., E-mail: m.regier@uke.uni-hamburg.de [Center for Radiology and Endoscopy, Department of Diagnostic and Interventional Radiology, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany); Adam, G., E-mail: g.adam@uke.uni-hamburg.de [Center for Radiology and Endoscopy, Department of Diagnostic and Interventional Radiology, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany); Begemann, P.G.C., E-mail: p.begemann@me.com [Center for Radiology and Endoscopy, Department of Diagnostic and Interventional Radiology, University Medical Center Hamburg-Eppendorf, Martinistr. 52, 20246 Hamburg (Germany)

    2012-08-15

    Objective: To compare the incidence of pulmonary embolism (PE) and additional pathologic findings (APF) detected by computed tomography pulmonary angiography (CTPA) according to different age-groups. Materials and methods: 1353 consecutive CTPA cases for suspected PE were retrospectively reviewed. Patients were divided into seven age groups: {<=}29, 30-39, 40-49, 50-59, 60-69, 70-79 and {>=}80 years. Differences between the groups were tested using Fisher's exact or chi-square test. A p-value < 0.0024 indicated statistical significance when Bonferroni correction was used. Results: Incidence rates of PE ranged from 11.4% to 25.4% in different age groups. The three main APF were pleural effusion, pneumonia and pulmonary nodules. No significant difference was found between the incidences of PE in different age groups. Furthermore, APF in different age groups revealed no significant differences (all p-values > 0.0024). Conclusion: The incidences of PE and APF detected by CTPA reveal no significant differences between various age groups.

  14. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  15. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  16. System tuning and measurement error detection testing

    International Nuclear Information System (INIS)

    Krejci, Petr; Machek, Jindrich

    2008-09-01

    The project includes the use of the PEANO (Process Evaluation and Analysis by Neural Operators) system to verify the monitoring of the status of dependent measurements with a view to early measurement fault detection and estimation of selected signal levels. At the present stage, the system's capabilities of detecting measurement errors was assessed and the quality of the estimates was evaluated for various system configurations and the formation of empiric models, and rules were sought for system training at chosen process data recording parameters and operating modes. The aim was to find a suitable system configuration and to document the quality of the tuned system on artificial failures

  17. Symmetry consideration in zero loop-area Sagnac interferometry at oblique incidence for detecting magneto-optic Kerr effects.

    Science.gov (United States)

    Zhu, X D

    2017-08-01

    I present a detailed account of a zero loop-area Sagnac interferometer operated at oblique incidence for detecting magneto-optic Kerr effects arising from a magnetized sample. In particular, I describe the symmetry consideration and various optical arrangements available to such an interferometer that enables measurements of magneto-optic effects due to both in-plane and out-of-plane magnetization of the sample with optimizable signal-to-noise ratios.

  18. Implementation of the National Incident Management System (NIMS)/Incident Command System (ICS) in the Federal Radiological Monitoring and Assessment Center(FRMAC) - Emergency Phase

    International Nuclear Information System (INIS)

    NSTec Environmental Restoration

    2007-01-01

    Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, including acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS

  19. IDAS-RR: an incident data base system for research reactors

    International Nuclear Information System (INIS)

    Matsumoto, Kiyoshi; Kohsaka, Atsuo; Kaminaga, Masanori; Murayama, Youji; Ohnishi, Nobuaki; Maniwa, Masaki.

    1990-03-01

    An Incident Data Base System for Research Reactors, IDAS-RR, has been developed. IDAS-RR has information about abnormal incidents (failures, transients, accidents, etc.) of research reactors in the world. Data reference, input, editing and other functions of IDAS-RR are menu driven. The routine processing and data base management functions are performed by the system software and hardware. PC-9801 equipment was selected as the hardware because of its portability and popularity. IDAS-RR provides effective reference information for the following activities. 1) Analysis of abnormal incident of research reactors, 2) Detail analysis of research reactor behavior in the abnormal incident for building the knowledge base of the reactor emergency diagnostic system for research reactor, 3) Planning counter-measure for emergency situation in the research reactor. This report is a user's manual of IDAS-RR. (author)

  20. The worldwide incidence and prevalence of systemic lupus erythematosus: a systematic review of epidemiological studies.

    Science.gov (United States)

    Rees, Frances; Doherty, Michael; Grainge, Matthew J; Lanyon, Peter; Zhang, Weiya

    2017-11-01

    The aim was to review the worldwide incidence and prevalence of SLE and variation with age, sex, ethnicity and time. A systematic search of MEDLINE and EMBASE search engines was carried out using Medical Subject Headings and keyword search terms for Systemic Lupus Erythematosus combined with incidence, prevalence and epidemiology in August 2013 and updated in September 2016. Author, journal, year of publication, country, region, case-finding method, study period, number of incident or prevalent cases, incidence (per 100 000 person-years) or prevalence (per 100 000 persons) and age, sex or ethnic group-specific incidence or prevalence were collected. The highest estimates of incidence and prevalence of SLE were in North America [23.2/100 000 person-years (95% CI: 23.4, 24.0) and 241/100 000 people (95% CI: 130, 352), respectively]. The lowest incidences of SLE were reported in Africa and Ukraine (0.3/100 000 person-years), and the lowest prevalence was in Northern Australia (0 cases in a sample of 847 people). Women were more frequently affected than men for every age and ethnic group. Incidence peaked in middle adulthood and occurred later for men. People of Black ethnicity had the highest incidence and prevalence of SLE, whereas those with White ethnicity had the lowest incidence and prevalence. There appeared to be an increasing trend of SLE prevalence with time. There are worldwide differences in the incidence and prevalence of SLE that vary with sex, age, ethnicity and time. Further study of genetic and environmental risk factors may explain the reasons for these differences. More epidemiological studies in Africa are warranted. © The Author 2017. Published by Oxford University Press on behalf of the British Society for Rheumatology. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  1. SU-E-P-07: Retrospective Analysis of Incident Reports at a Radiology Department: Feedback From Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Kakinohana, Y; Toita, T; Heianna, J; Murayama, S [School of medicine, University of the Ryukyus, Nishihara-cho, Okinawa (Japan)

    2015-06-15

    Purpose: To provide an overview of reported incidents that occurred in a radiology department and to describe the most common causal source of incidents. Methods: Incident reports from the radiology department at the University of the Ryukyus Hospital between 2008 and 2013 were collected and analyzed retrospectively. The incident report form contains the following items, causal factors of the incident and desirable corrective actions to prevent recurrence of similar incidents. These items allow the institution to investigate/analyze root causes of the incidents and suggest measures to be taken to prevent further, similar incidents. The ‘causal factors of the incident’ item comprises multiple selections from among 24 selections and includes some synonymous selections. In this study, this item was re-categorized into four causal source types: (i) carelessness, (ii) lack of skill or knowledge, (iii) deficiencies in communication, and (iv) external factors. Results: There were a total of 7490 incident reports over the study period and 276 (3.7%) were identified as originating from the radiology department. The most frequent causal source type was carelessness (62%). The other three types showed similar frequencies (10–14%). The staff members involved in incidents indicate three predominant desirable corrective actions to prevent or decrease the recurrence of similar incidents. These are ‘improvement in communication’ (24%), ‘staff training/education’ (19%), and ‘daily medical procedures’ (22%), and the most frequent was ‘improvement in communication’. Even though the most frequent causal factor was related to carelessness, the most desirable corrective action indicated by the staff members was related to communication. Conclusion: Our finding suggests that the most immediate causes are strongly related to carelessness. However, the most likely underlying causes of incidents would be related to deficiencies in effective communication. At our

  2. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    people try to reveal sensitive information of Internet users, also called as phishing. Phishing detection has received great attention but there has...node. Figure 3 describes the result of modified nodes from the original RDR rule tree. Red- coloured ‘X’ sign represents the stopping rule, and the...green- coloured boxes describe the refined rule. However, when human knowledge is applied to those incorrectly classified data, not all of the

  3. [Analysis of an incident notification system and register in a critical care unit].

    Science.gov (United States)

    Murillo-Pérez, M A; García-Iglesias, M; Palomino-Sánchez, I; Cano Ruiz, G; Cuenca Solanas, M; Alted López, E

    2016-01-01

    To analyse the incident communicated through a notification system and register in a critical care unit. A cross-sectional descriptive study was conducted by performing an analysis of the records of incidents communicated anonymously and voluntarily from January 2007 to December 2013 in a critical care unit of adult patients with severe trauma. incident type and class, professional reports, and suggestions for improvement measures. A descriptive analysis was performed on the variables. Out of a total of 275 incidents reported, 58.5% of them were adverse events. Incident distributed by classes: medication, 33.7%; vascular access-drainage-catheter-sensor, 19.6%; devices-equipment, 13.3%, procedures, 11.5%; airway tract and mechanical ventilation, 10%; nursing care, 4.1%; inter-professional communication, 3%; diagnostic test, 3%; patient identification, 1.1%, and transfusion 0.7%. In the medication group, administrative errors accounted for a total of 62%; in vascular access-drainage-catheter-sensor group, central venous lines, a total of 27%; in devices and equipment group, respirators, a total of 46.9%; in airway self-extubations, a total of 32.1%. As regards to medication errors, 62% were incidents without damage. Incident notification by profession: doctors, 43%, residents, 5.6%, nurses, 51%, and technical assistants, 0.4%. Adverse events are the most communicated incidents. The events related to medication administration are the most frequent, although most of them were without damage. Nurses and doctors communicate the incidents with the same frequency. In order to highlight the low incident notification despite it being an anonymous and volunteer system, therefore, it is suggested to study measurements to increase the level of communication. Copyright © 2016 Elsevier España, S.L.U. y SEEIUC. All rights reserved.

  4. IMI - An information system for effective Multidisciplinary Incident Management

    NARCIS (Netherlands)

    Lee, M.D.E. van der; Vugt, M. van der

    2004-01-01

    The field of crisis response and disaster management can be characterized, upon many other factors, by distributed operations, not daily routine work and multidisciplinary aspects. In designing and developing information systems for crisis response these factors need special attention. On behalf of

  5. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  6. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  7. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes; Harrou, Fouzi; Sun, Ying; Kara, Kamel; Chouder, Aissa; Silvestre, Santiago

    2017-01-01

    and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model

  8. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  9. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  10. SU-E-T-310: Targeting Safety Improvements Through Analysis of Near-Miss Error Detection Points in An Incident Learning Database

    International Nuclear Information System (INIS)

    Novak, A; Nyflot, M; Sponseller, P; Howard, J; Logan, W; Holland, L; Jordan, L; Carlson, J; Ermoian, R; Kane, G; Ford, E; Zeng, J

    2014-01-01

    Purpose: Radiation treatment planning involves a complex workflow that can make safety improvement efforts challenging. This study utilizes an incident reporting system to identify detection points of near-miss errors, in order to guide our departmental safety improvement efforts. Previous studies have examined where errors arise, but not where they are detected or their patterns. Methods: 1377 incidents were analyzed from a departmental nearmiss error reporting system from 3/2012–10/2013. All incidents were prospectively reviewed weekly by a multi-disciplinary team, and assigned a near-miss severity score ranging from 0–4 reflecting potential harm (no harm to critical). A 98-step consensus workflow was used to determine origination and detection points of near-miss errors, categorized into 7 major steps (patient assessment/orders, simulation, contouring/treatment planning, pre-treatment plan checks, therapist/on-treatment review, post-treatment checks, and equipment issues). Categories were compared using ANOVA. Results: In the 7-step workflow, 23% of near-miss errors were detected within the same step in the workflow, while an additional 37% were detected by the next step in the workflow, and 23% were detected two steps downstream. Errors detected further from origination were more severe (p<.001; Figure 1). The most common source of near-miss errors was treatment planning/contouring, with 476 near misses (35%). Of those 476, only 72(15%) were found before leaving treatment planning, 213(45%) were found at physics plan checks, and 191(40%) were caught at the therapist pre-treatment chart review or on portal imaging. Errors that passed through physics plan checks and were detected by therapists were more severe than other errors originating in contouring/treatment planning (1.81 vs 1.33, p<0.001). Conclusion: Errors caught by radiation treatment therapists tend to be more severe than errors caught earlier in the workflow, highlighting the importance of safety

  11. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  12. Caltrans fog detection and warning system.

    Science.gov (United States)

    2009-01-01

    The California Department of Transportation (Caltrans) has implemented a fog detection and warning system on Highway 99 near Fresno. The entire central valley region is susceptible to Tule fog, which can reduce visibility tremendously, sometimes to n...

  13. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando; Laleg-Kirati, Taous-Meriem

    2012-01-01

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological

  14. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  15. WS-006: EPR-First Responders: Operations in the control system incident

    International Nuclear Information System (INIS)

    2011-01-01

    The purpose of this working session is about the operations in a control system incident. The participants can apply the knowledge acquired in a bus accident exercise where the passengers are in contamination risk by dangerous material. They have to identify the incident commander, the type of response required, the risks of the emergency, the requirements for transporting the victims to the hospital and the actors involved in a radiological emergency

  16. Doubler system quench detection threshold

    International Nuclear Information System (INIS)

    Kuepke, K.; Kuchnir, M.; Martin, P.

    1983-01-01

    The experimental study leading to the determination of the sensitivity needed for protecting the Fermilab Doubler from damage during quenches is presented. The quench voltage thresholds involved were obtained from measurements made on Doubler cable of resistance x temperature and voltage x time during quenches under several currents and from data collected during operation of the Doubler Quench Protection System as implemented in the B-12 string of 20 magnets. At 4kA, a quench voltage threshold in excess of 5.OV will limit the peak Doubler cable temperature to 452K for quenches originating in the magnet coils whereas a threshold of 0.5V is required for quenches originating outside of coils

  17. The parameterization of microchannel-plate-based detection systems

    Science.gov (United States)

    Gershman, Daniel J.; Gliese, Ulrik; Dorelli, John C.; Avanov, Levon A.; Barrie, Alexander C.; Chornay, Dennis J.; MacDonald, Elizabeth A.; Holland, Matthew P.; Giles, Barbara L.; Pollock, Craig J.

    2016-10-01

    The most common instrument for low-energy plasmas consists of a top-hat electrostatic analyzer (ESA) geometry coupled with a microchannel-plate-based (MCP-based) detection system. While the electrostatic optics for such sensors are readily simulated and parameterized during the laboratory calibration process, the detection system is often less well characterized. Here we develop a comprehensive mathematical description of particle detection systems. As a function of instrument azimuthal angle, we parameterize (1) particle scattering within the ESA and at the surface of the MCP, (2) the probability distribution of MCP gain for an incident particle, (3) electron charge cloud spreading between the MCP and anode board, and (4) capacitive coupling between adjacent discrete anodes. Using the Dual Electron Spectrometers on the Fast Plasma Investigation on NASA's Magnetospheric Multiscale mission as an example, we demonstrate a method for extracting these fundamental detection system parameters from laboratory calibration. We further show that parameters that will evolve in flight, namely, MCP gain, can be determined through application of this model to specifically tailored in-flight calibration activities. This methodology provides a robust characterization of sensor suite performance throughout mission lifetime. The model developed in this work is not only applicable to existing sensors but also can be used as an analytical design tool for future particle instrumentation.

  18. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  19. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  20. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  1. Incidence of thromboembolism following detection by trans-oesophageal echocardiography of left atrial thrombus

    Directory of Open Access Journals (Sweden)

    Ciara Mahon

    2015-09-01

    Conclusion: This is the only study to date that has looked at the incidence of ischemic stroke following a confirmed LAA thrombus, LA thrombus or pre-thrombus state. This single centre study found low stroke rates over a six month follow-up period in patients with a confirmed LAA thrombus, LA thrombus or pre-thrombus state and optimization of OAC. Larger studies would be required to confirm these findings.

  2. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  3. Detection systems for radioactive ion beams; Systeme de detection en ions radioactifs

    Energy Technology Data Exchange (ETDEWEB)

    Savajols, H

    2002-07-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  4. A new digital correlation flaw detection system

    International Nuclear Information System (INIS)

    Lee, B.B.; Furgason, E.S.

    1981-01-01

    A new portable digital random signal flaw detection system is described which uses a digital delay line to replace the acoustic delay line of the original random signal system. Using this new system, a comparison was made between the two types of transmit signals which have been used in previous systems--m-sequences and random signals. This comparison has not been possible with these previous correlation flaw detection systems. Results indicated that for high-speed short code operation, the m-sequences produced slightly lower range sidelobes than typical samples of a clipped random signal. For normal long code operation, results indicated that system performance is essentially equivalent in resolution and signal-to-noise ratio using either m-sequences or clipped and sampled random signals. Further results also showed that for normal long code operation, the system produces outputs equivalent in resolution to pulse-echo systems, but with the added benefit of signal-to-noise ratio enhancement

  5. An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System

    International Nuclear Information System (INIS)

    Terezakis, Stephanie A.; Harris, Kendra M.; Ford, Eric; Michalski, Jeff; DeWeese, Theodore; Santanam, Lakshmi; Mutic, Sasa; Gay, Hiram

    2013-01-01

    Purpose: Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials: All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results: Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ≥2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions: A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement

  6. An Evaluation of Departmental Radiation Oncology Incident Reports: Anticipating a National Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Terezakis, Stephanie A., E-mail: stereza1@jhmi.edu [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Harris, Kendra M. [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Ford, Eric [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Department of Radiation Oncology, University of Washington, Seattle, Washington (United States); Michalski, Jeff [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States); DeWeese, Theodore [Department of Radiation Oncology and Molecular Radiation Sciences, The Johns Hopkins University School of Medicine, Baltimore, Maryland (United States); Santanam, Lakshmi; Mutic, Sasa; Gay, Hiram [Department of Radiation Oncology, Washington University School of Medicine, St. Louis, Missouri (United States)

    2013-03-15

    Purpose: Systems to ensure patient safety are of critical importance. The electronic incident reporting systems (IRS) of 2 large academic radiation oncology departments were evaluated for events that may be suitable for submission to a national reporting system (NRS). Methods and Materials: All events recorded in the combined IRS were evaluated from 2007 through 2010. Incidents were graded for potential severity using the validated French Nuclear Safety Authority (ASN) 5-point scale. These incidents were categorized into 7 groups: (1) human error, (2) software error, (3) hardware error, (4) error in communication between 2 humans, (5) error at the human-software interface, (6) error at the software-hardware interface, and (7) error at the human-hardware interface. Results: Between the 2 systems, 4407 incidents were reported. Of these events, 1507 (34%) were considered to have the potential for clinical consequences. Of these 1507 events, 149 (10%) were rated as having a potential severity of ≥2. Of these 149 events, the committee determined that 79 (53%) of these events would be submittable to a NRS of which the majority was related to human error or to the human-software interface. Conclusions: A significant number of incidents were identified in this analysis. The majority of events in this study were related to human error and to the human-software interface, further supporting the need for a NRS to facilitate field-wide learning and system improvement.

  7. Sci-Fri AM: Quality, Safety, and Professional Issues 06: An Evaluation of Incident Reporting and Learning using the Canadian National System for Incident Reporting – Radiation Treatment

    Energy Technology Data Exchange (ETDEWEB)

    Montgomery, Logan; Kildea, John [McGill University Health Centre (Canada)

    2016-08-15

    We report on the development and clinical deployment of an in-house incident reporting and learning system that implements the taxonomy of the Canadian National System for Incident Reporting – Radiation Treatment (NSIR-RT). In producing our new system, we aimed to: Analyze actual incidents, as well as potentially dangerous latent conditions. Produce recommendations on the NSIR-RT taxonomy. Incorporate features to divide reporting responsibility among clinical staff and expedite incident categorization within the NSIR-RT framework. Share anonymized incident data with the national database. Our multistep incident reporting workflow is focused around an initial report and a detailed follow-up investigation. An investigator, chosen at the time of reporting, is tasked with performing the investigation. The investigation feature is connected to our electronic medical records database to allow automatic field population and quick reference of patient and treatment information. Additional features include a robust visualization suite, as well as the ability to flag incidents for discussion at monthly Risk Management meetings and task ameliorating actions to staff. Our system was deployed into clinical use in January 2016. Over the first three months of use, 45 valid incidents were reported; 31 of which were reported as actual incidents as opposed to near-misses or reportable circumstances. However, we suspect there is ambiguity within our centre in determining the appropriate event type, which may be arising from the taxonomy itself. Preliminary trending analysis aided in revealing workflow issues pertaining to storage of treatment accessories and treatment planning delays. Extensive analysis will be undertaken as more data are accrued.

  8. Sci-Fri AM: Quality, Safety, and Professional Issues 06: An Evaluation of Incident Reporting and Learning using the Canadian National System for Incident Reporting – Radiation Treatment

    International Nuclear Information System (INIS)

    Montgomery, Logan; Kildea, John

    2016-01-01

    We report on the development and clinical deployment of an in-house incident reporting and learning system that implements the taxonomy of the Canadian National System for Incident Reporting – Radiation Treatment (NSIR-RT). In producing our new system, we aimed to: Analyze actual incidents, as well as potentially dangerous latent conditions. Produce recommendations on the NSIR-RT taxonomy. Incorporate features to divide reporting responsibility among clinical staff and expedite incident categorization within the NSIR-RT framework. Share anonymized incident data with the national database. Our multistep incident reporting workflow is focused around an initial report and a detailed follow-up investigation. An investigator, chosen at the time of reporting, is tasked with performing the investigation. The investigation feature is connected to our electronic medical records database to allow automatic field population and quick reference of patient and treatment information. Additional features include a robust visualization suite, as well as the ability to flag incidents for discussion at monthly Risk Management meetings and task ameliorating actions to staff. Our system was deployed into clinical use in January 2016. Over the first three months of use, 45 valid incidents were reported; 31 of which were reported as actual incidents as opposed to near-misses or reportable circumstances. However, we suspect there is ambiguity within our centre in determining the appropriate event type, which may be arising from the taxonomy itself. Preliminary trending analysis aided in revealing workflow issues pertaining to storage of treatment accessories and treatment planning delays. Extensive analysis will be undertaken as more data are accrued.

  9. Critical Incident Stress Management (CISM) in complex systems: cultural adaptation and safety impacts in healthcare.

    Science.gov (United States)

    Müller-Leonhardt, Alice; Mitchell, Shannon G; Vogt, Joachim; Schürmann, Tim

    2014-07-01

    In complex systems, such as hospitals or air traffic control operations, critical incidents (CIs) are unavoidable. These incidents can not only become critical for victims but also for professionals working at the "sharp end" who may have to deal with critical incident stress (CIS) reactions that may be severe and impede emotional, physical, cognitive and social functioning. These CIS reactions may occur not only under exceptional conditions but also during every-day work and become an important safety issue. In contrast to air traffic management (ATM) operations in Europe, which have readily adopted critical incident stress management (CISM), most hospitals have not yet implemented comprehensive peer support programs. This survey was conducted in 2010 at the only European general hospital setting which implemented CISM program since 2004. The aim of the article is to describe possible contribution of CISM in hospital settings framed from the perspective of organizational safety and individual health for healthcare professionals. Findings affirm that daily work related incidents also can become critical for healthcare professionals. Program efficiency appears to be influenced by the professional culture, as well as organizational structure and policies. Overall, findings demonstrate that the adaptation of the CISM program in general hospitals takes time but, once established, it may serve as a mechanism for changing professional culture, thereby permitting the framing of even small incidents or near misses as an opportunity to provide valuable feedback to the system. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Design of Weft Detection System in The Stenter Machine

    Science.gov (United States)

    Gu, Minming; Xu, Xianju; Dai, Wenzhan

    2017-12-01

    In order to build an effective automatic weft-straightening system, it is important for the sensing device to detect most the possible fabric styles, designs, colours and structures, an optical sensing system that detects the angular orientation of weft threads in a moving web of a textile has been built. It contains an adjustable light source, two lens systems and photodiode sensor array. The sensor array includes 13 radial pattern of photosensitive areas that each generate an electrical signal proportional to the total intensity of the light incident on the area. The moving shadow of a weft thread passing over the area will modulate the output signal. A signal processed circuit was built to do the I/V conversion, amplifying, hardware filtering. An embed micro control system then deals with the information of these signals, calculates the angle of the weft drew. Finally, the experiments were done, the results showed that the weft detection system can deal with the fabric weft skew up to 30° and has achieved good results in the application.

  11. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  12. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  13. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  14. Multisignal detecting system of pile integrity testing

    Science.gov (United States)

    Liu, Zuting; Luo, Ying; Yu, Shihai

    2002-05-01

    The low strain reflection wave method plays a principal rule in the integrating detection of base piles. However, there are some deficiencies with this method. For example, there is a blind area of detection on top of the tested pile; it is difficult to recognize the defects at deep-seated parts of the pile; there is still the planar of 3D domino effect, etc. It is very difficult to solve these problems only with the single-transducer pile integrity testing system. A new multi-signal piles integrity testing system is proposed in this paper, which is able to impulse and collect signals on multiple points on top of the pile. By using the multiple superposition data processing method, the detecting system can effectively restrain the interference and elevate the precision and SNR of pile integrity testing. The system can also be applied to the evaluation of engineering structure health.

  15. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  16. Obstacle detection system for underground mining vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, P.; Polotski, V.; Piotte, M.; Melamed, F. [Ecole Polytechnique de Montreal, Montreal, PQ (Canada)

    1998-01-01

    A device for detecting obstacles by autonomous vehicles navigating in mine drifts is described. The device is based upon structured lighting and the extraction of relevant features from images of obstacles. The system uses image profile changes, ground and wall irregularities, disturbances of the vehicle`s trajectory, and impaired visibility to detect obstacles, rather than explicit three-dimensional scene reconstruction. 7 refs., 5 figs.

  17. Device for detecting failure of reactor system

    International Nuclear Information System (INIS)

    Miyazawa, Tatsuo.

    1979-01-01

    Purpose: To make it possible to rapidly detect any failure in a reactor system prior to the leakage of coolants. Constitution: The dose of beta line is computed from the difference between the power of a detector for reacting with both beta and gamma lines and a detector for reacting only with gamma line to detect the failure of a reactor system, thereby to raise the detection speed and improve the detection accuracy. More specifically, a radiation detector A detects gamma and beta lines by means of piezoelectric elements. A radiation detector B caused the opening of the detector A to be covered with a metal, and detects only gamma line. The detected values of detectors A and B are amplified by an amplifier and applied to a rate meter and a counter, the values being converted into DC and introduced into a comparison circuit, where the outputs of the rate meter are compared with each other. When the difference is more than the predetermined range, it is supplied as output to an alarm circuit where an alarm signal is produced. (Nakamura, S.)

  18. Edge detection techniques for iris recognition system

    International Nuclear Information System (INIS)

    Tania, U T; Motakabber, S M A; Ibrahimy, M I

    2013-01-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate

  19. HASCAL -- A system for estimating contamination and doses from incidents at worldwide nuclear facilities

    International Nuclear Information System (INIS)

    Sjoreen, A.L.

    1995-01-01

    The Hazard Assessment System for Consequence Analysis (HASCAL) is being developed to support the analysis of radiological incidents anywhere in the world for the Defense Nuclear Agency (DNA). HASCAL is a component of the Hazard Prediction and Assessment Capability (HPAC), which is a comprehensive nuclear, biological, and chemical hazard effects planning and forecasting modeling system that is being developed by DNA. HASCAL computes best-guess estimates of the consequences of radiological incidents. HASCAL estimates the amount of radioactivity released, its atmospheric transport and deposition, and the resulting radiological doses

  20. Radiological incidents in radiotherapy

    International Nuclear Information System (INIS)

    Hobzova, L.; Novotny, J.

    2008-01-01

    In many countries a reporting system of radiological incidents to national regulatory body exists and providers of radiotherapy treatment are obliged to report all major and/or in some countries all incidents occurring in institution. State Office for Nuclear Safety (SONS) is providing a systematic guidance for radiotherapy departments from 1997 by requiring inclusion of radiation safety problems into Quality assurance manual, which is the basic document for obtaining a license of SONS for handling with sources of ionizing radiation. For that purpose SONS also issued the recommendation 'Introduction of QA system for important sources in radiotherapy-radiological incidents' in which the radiological incidents are defined and the basic guidance for their classification (category A, B, C, D), investigation and reporting are given. At regular periods the SONS in co-operation with radiotherapy centers is making a survey of all radiological incidents occurring in institutions and it is presenting obtained information in synoptic communication (2003 Motolske dny, 2005 Novy Jicin). This presentation is another summary report of radiological incidents that occurred in our radiotherapy institutions during last 3 years. Emphasis is given not only to survey and statistics, but also to analysis of reasons of the radiological incidents and to their detection and prevention. Analyses of incidents in radiotherapy have led to a much broader understanding of incident causation. Information about the error should be shared as early as possible during or after investigation by all radiotherapy centers. Learning from incidents, errors and near misses should be a part of improvement of the QA system in institutions. Generally, it is recommended that all radiotherapy facilities should participate in the reporting, analyzing and learning system to facilitate the dissemination of knowledge throughout the whole country to prevent errors in radiotherapy.(authors)

  1. High incidence of microbleeds in hemodialysis patients detected by T2*-weighted gradient-echo magnetic resonance imaging

    International Nuclear Information System (INIS)

    Yokoyama, Shunichi; Uomizu, Kenji; Kajiya, Yoriko; Tajitsu, Kenichiro; Kusumoto, Kazuhiro; Hirano, Hirofumi

    2005-01-01

    The incidence and characteristics of microbleeds in hemodialysis (HD) patients were investigated to elucidate the clinical significance with T 2 * -weighted gradient-echo magnetic resonance (MR) imaging. The 57 patients with chronic renal failure maintained by HD had no previous history of stroke. The control group consisted of 53 patients without previous history of stroke or chronic renal failure. The incidence and the number of microbleeds were assessed in the HD and control groups. The findings of microbleeds with T 2 * -weighted gradient-echo MR imaging were compared with those of T 1 - and T 2 -weighted MR imaging in HD patients. The incidence of microbleeds was significantly greater in the HD patients compared with the control patients. T 2 * -weighted gradient-echo imaging revealed a total of 44 microbleeds in 11 HD patients. T 2 -weighted imaging demonstrated 13 of 44 microbleeds as hyperintensity, whereas T 1 -weighted imaging demonstrated 12 lesions as hypointensity. T 2 - and T 1 -weighted imagings did not demonstrate any findings in 31 and 32 lesions, respectively. T 2 * -weighted gradient-echo MR imaging is effective to detect microbleeds which may be a predictor of intracerebral hemorrhage in HD patients and should be included in the protocol for the study of cerebrovascular disease, because T 2 - and T 1 -weighted MR imaging recognizes microbleeds as lacunar infarction. (author)

  2. Maximum Temperature Detection System for Integrated Circuits

    Science.gov (United States)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  3. Sunglass detection method for automation of video surveillance system

    Science.gov (United States)

    Sikandar, Tasriva; Samsudin, Wan Nur Azhani W.; Hawari Ghazali, Kamarul; Mohd, Izzeldin I.; Fazle Rabbi, Mohammad

    2018-04-01

    Wearing sunglass to hide face from surveillance camera is a common activity in criminal incidences. Therefore, sunglass detection from surveillance video has become a demanding issue in automation of security systems. In this paper we propose an image processing method to detect sunglass from surveillance images. Specifically, a unique feature using facial height and width has been employed to identify the covered region of the face. The presence of covered area by sunglass is evaluated using facial height-width ratio. Threshold value of covered area percentage is used to classify the glass wearing face. Two different types of glasses have been considered i.e. eye glass and sunglass. The results of this study demonstrate that the proposed method is able to detect sunglasses in two different illumination conditions such as, room illumination as well as in the presence of sunlight. In addition, due to the multi-level checking in facial region, this method has 100% accuracy of detecting sunglass. However, in an exceptional case where fabric surrounding the face has similar color as skin, the correct detection rate was found 93.33% for eye glass.

  4. The non-technical skills used by anaesthetic technicians in critical incidents reported to the Australian Incident Monitoring System between 2002 and 2008.

    Science.gov (United States)

    Rutherford, J S; Flin, R; Irwin, A

    2015-07-01

    The outcome of critical incidents in the operating theatre has been shown to be influenced by the behaviour of anaesthetic technicians (ATs) assisting anaesthetists, but the specific non-technical skills involved have not been described. We performed a review of critical incidents (n=1433) reported to the Australian Incident Monitoring System between 2002 and 2008 to identify which non-technical skills were used by ATs. The reports were assessed if they mentioned anaesthetic assistance or had the boxes ticked to identify "inadequate assistance" or "absent supervision or assistance". A total of 90 critical incidents involving ATs were retrieved, 69 of which described their use of non-technical skills. In 20 reports, the ATs ameliorated the critical incident, whilst in 46 they exacerbated the critical incident, and three cases had both positive and negative non-technical skills described. Situation awareness was identified in 39 reports, task management in 23, teamwork in 21 and decision-making in two, but there were no descriptions of issues related to leadership, stress or fatigue management. Situation awareness, task management and teamwork appear to be important non-technical skills for ATs in the development or management of critical incidents in the operating theatre. This analysis has been used to support the development of a non-technical skills taxonomy for anaesthetic assistants.

  5. Near-infrared laser, time domain, breast tumour detection system

    International Nuclear Information System (INIS)

    Joblin, A.J.

    1996-01-01

    Full text: The use of near-infrared laser, time domain techniques have been proposed for some time now as an alternative to X-ray mammography, as a means of mass screening for breast disease. The great driving force behind this research has been that near-infrared photons are a non-ionising radiation, which affords a greater degree of patient safety than when using X-rays. This would mean that women at risk of breast disease could be screened with a near-infrared laser imaging system, much more regularly than with an X-ray mammography system, which should allow for the earlier detection and treatment of breast disease. This paper presents a theoretical investigation of the performance of a near-infrared, time domain breast imaging system. The performance of the imaging system is characterised by the resolution and contrast parameters, which were studied using a numerical finite difference calculation method. The finite difference method is used to solve the diffusion equation for the photon transport through the inhomogeneous breast tissue medium. Optimal performance was found to be obtained with short photon times of flight. However the signal to noise ratio decreases rapidly as the photon time of flight is decreased. The system performance will therefore be limited by the noise equivalent power of the time resolved detection system, which is the signal incident on the time resolved detection system which gives a signal to noise ratio of 1:1. Photon times of flight shorter than 500 ps are not practical with current technology, which places limits on the resolution and contrast. The photon signal throughput can be increased by increasing the size of the laser beam width, by increasing the size of the aperture stop of the detector, by increasing the laser pulse duration or decreasing the detector time resolution. Best system performance is found by optimising these parameters for a given time gating and detector system characteristic (NEP). It was found that the

  6. Nuclear power plant operating experiences from the IAEA / Nea incident reporting system 2002-2005

    International Nuclear Information System (INIS)

    2006-01-01

    The Incident Reporting System (IRS) is an essential element of the international operating experience feedback system for nuclear power plants. The IRS is jointly operated and managed by the Nuclear Energy Agency (NEA), a semi-autonomous body within the Organisation for Economic Co-operation and Development (OECD), and the International Atomic Energy Agency (IAEA), a specialized agency within the United Nations System. (author)

  7. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    International Nuclear Information System (INIS)

    Dimitrovski, D.; Kittley, S.

    2015-01-01

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  8. Early detection of the incidence of malignancy in mammograms using digital image correlation

    International Nuclear Information System (INIS)

    Espitia, J.; Jacome, J.; Torres, C.

    2016-01-01

    The digital image correlation has proved an effective way for Pattern Recognition, this research to identify the using Findings digitally extracted from a mammographic image, which is the means used by more specialists to determine if a person is a candidate or not, a Suffer Breast Cancer. This shown that early detection of symptom logy 'carcinogenic' is the key . (Author)

  9. Cardiovascular risk factors and incident albuminuria in screen-detected type 2 diabetes

    NARCIS (Netherlands)

    Webb, D. R.; Zaccardi, F.; Davies, M. J.; Griffin, S. J.; Wareham, N. J.; Simmons, R. K.; Rutten, G. E.; Sandbaek, A.; Lauritzen, T.; Borch-Johnsen, K.; Khunti, K.

    2017-01-01

    Background: It is unclear whether cardiovascular risk factor modification influences the development of renal disease in people with type 2 diabetes identified through screening. We determined predictors of albuminuria 5 years after a diagnosis of screen-detected diabetes within the ADDITION-Europe

  10. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  11. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a coaxial direct-detection LIDAR system for measuring velocity, temperature and/or particulate density. The system comprises a laser source for emitting a laser light beam having a lasing center frequency along an emission path. The system further comprises an optical....... Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  12. Energy systems evaluation of potential for incidents having health or safety impact

    International Nuclear Information System (INIS)

    Speas, I.G.

    1986-01-01

    The paper discusses the results of safety surveys of Martin Marietta Energy Systems - operated nuclear facilities. The purpose was to identify potential incidents that could cause large numbers of casualties, evaluate existing prevention/response actions, and identify possible improvements. The survey findings indicate the potential for an accident with consequences similar to those at Bhopal, India, is essentially non-existent

  13. Methods and systems for detection of radionuclides

    Science.gov (United States)

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  14. Digital detection systems for projection radiography

    International Nuclear Information System (INIS)

    Schulz, R.F.

    2001-01-01

    This article gives a survey of digital X-ray detection systems for projection radiography. The different principles are compared and some general characteristics are derived. The basic conversion mechanisms in the absorption layers are described. The basic principles of solid state X-ray detectors and their general characteristics are elucidated as well as some similarities with detectors for computed tomography. Some important application and system aspects are considered. An outlook on further possible developments in this field is given. (orig.) [de

  15. Analysis of Aviation Safety Reporting System Incident Data Associated With the Technical Challenges of the Vehicle Systems Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This analysis was conducted to support the Vehicle Systems Safety Technology (VSST) Project of the Aviation Safety Program (AVsP) milestone VSST4.2.1.01, "Identification of VSST-Related Trends." In particular, this is a review of incident data from the NASA Aviation Safety Reporting System (ASRS). The following three VSST-related technical challenges (TCs) were the focus of the incidents searched in the ASRS database: (1) Vechicle health assurance, (2) Effective crew-system interactions and decisions in all conditions; and (3) Aircraft loss of control prevention, mitigation, and recovery.

  16. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  17. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  18. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  19. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  20. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  1. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  2. Linux malware incident response an excerpt from malware forensic field guide for Linux systems

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2013-01-01

    Linux Malware Incident Response is a ""first look"" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to suppleme

  3. Chemical detection, identification, and analysis system

    International Nuclear Information System (INIS)

    Morel, R.S.; Gonzales, D.; Mniszewski, S.

    1990-01-01

    The chemical detection, identification, and analysis system (CDIAS) has three major goals. The first is to display safety information regarding chemical environment before personnel entry. The second is to archive personnel exposure to the environment. Third, the system assists users in identifying the stage of a chemical process in progress and suggests safety precautions associated with that process. In addition to these major goals, the system must be sufficiently compact to provide transportability, and it must be extremely simple to use in order to keep user interaction at a minimum. The system created to meet these goals includes several pieces of hardware and the integration of four software packages. The hardware consists of a low-oxygen, carbon monoxide, explosives, and hydrogen sulfide detector; an ion mobility spectrometer for airborne vapor detection; and a COMPAQ 386/20 portable computer. The software modules are a graphics kernel, an expert system shell, a data-base management system, and an interface management system. A supervisory module developed using the interface management system coordinates the interaction of the other software components. The system determines the safety of the environment using conventional data acquisition and analysis techniques. The low-oxygen, carbon monoxide, hydrogen sulfide, explosives, and vapor detectors are monitored for hazardous levels, and warnings are issued accordingly

  4. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  5. National critical incident reporting systems relevant to anaesthesia: a European survey.

    Science.gov (United States)

    Reed, S; Arnal, D; Frank, O; Gomez-Arnau, J I; Hansen, J; Lester, O; Mikkelsen, K L; Rhaiem, T; Rosenberg, P H; St Pierre, M; Schleppers, A; Staender, S; Smith, A F

    2014-03-01

    Critical incident reporting is a key tool in the promotion of patient safety in anaesthesia. We surveyed representatives of national incident reporting systems in six European countries, inviting information on scope and organization, and intelligence on factors determining success and failure. Some systems are government-run and nationally conceived; others started out as small, specialty-focused initiatives, which have since acquired a national reach. However, both national co-ordination and specialty enthusiasts seem to be necessary for an optimally functioning system. The role of reporting culture, definitional issues, and dissemination is discussed. We make recommendations for others intending to start new systems and speculate on the prospects for sharing patient safety lessons relevant to anaesthesia at European level.

  6. Incidence of clinically silent malrotation detected on barium swallow examination in children

    International Nuclear Information System (INIS)

    Atkin, Karen L.; Chowdhury, Moti M.; Bartlett, Murray

    2014-01-01

    Duodenojejunal flexure (DJF) orientation is often examined routinely during contrast swallow studies, including those performed for purely oesophageal queries. We examine the radiation burden and the incidence of malrotation in patients undergoing contrast swallow, without clinical suspicion for malrotation. Two hundred eighteen consecutive contrast swallow studies were reviewed. Patients whose history may potentially suggest malrotation were identified (n = 90), and remaining children were grouped based on whether DJF was examined (Group 1; n = 88) or not (Group 2; n = 40). Data extracted include demographics, radiographic parameters (dosage, screening time, number of images obtained) and examination findings. Outcome measures comprised: (i) prevalence of clinically incidental malrotation; and (ii) influence of additional evaluation of DJF on patient dosage (mean ± SEM). Malrotation was identified in 2 of 90 patients (2.2%) examined with clinical indications for possible malrotation, but none in Group 1 (13% already had normal DJF confirmed on previous examinations). Groups 1 and 2 were comparable with respect to age and gender (P = ns). Additional evaluation of DJF (Group 1) meant that 54% more images were acquired (48.5 ± 2.9 vs. 31.4 ± 3.4 images in group 2; P = 0.0002) and 24.9% increased screening time (130.8 ± 9.3 vs. 104.7 ± 13.0 seconds in group 2; P = 0.089), resulting in 32.6% increased patient dosage (1.36 ± 0.21 vs. 1.02 ± 0.16 microGym 2 /kg in group 2; P = 0.19). This study highlights the increased radiation exposures involved with routine screening for DJF position in those patients without clinical suspicion of malrotation, and raises questions about the validity of this practice; however, further research is needed.

  7. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  8. Incidence and prevalence of systemic sclerosis in Campo Grande, State of Mato Grosso do Sul, Brazil.

    Science.gov (United States)

    Horimoto, Alex Magno Coelho; Matos, Erica Naomi Naka; Costa, Márcio Reis da; Takahashi, Fernanda; Rezende, Marcelo Cruz; Kanomata, Letícia Barrios; Locatelli, Elisangela Possebon Pradebon; Finotti, Leandro Tavares; Maegawa, Flávia Kamy Maciel; Rondon, Rosa Maria Ribeiro; Machado, Natália Pereira; Couto, Flávia Midori Arakaki Ayres Tavares do; Figueiredo, Túlia Peixoto Alves de; Ovidio, Raphael Antonio; Costa, Izaias Pereira da

    Systemic sclerosis is an autoimmune disease which shows extreme heterogeneity in its clinical presentation and that follows a variable and unpredictable course. Although some discrepancies in the incidence and prevalence rates between geographical regions may reflect methodological differences in the definition and verification of cases, they may also reflect true local differences. To determine the prevalence and incidence of systemic sclerosis in the city of Campo Grande, state capital of Mato Grosso do Sul (MS), Brazil, during the period from January to December 2014. All health care services of the city of Campo Grande - MS with attending in the specialty of Rheumatology were invited to participate in the study through a standardized form of clinical and socio-demographic assessment. Physicians of any specialty could report a suspected case of systemic sclerosis, but necessarily the definitive diagnosis should be established by a rheumatologist, in order to warrant the standardization of diagnostic criteria and exclusion of other diseases resembling systemic sclerosis. At the end of the study, 15 rheumatologists reported that they attended patients with systemic sclerosis and sent the completed forms containing epidemiological data of patients. The incidence rate of systemic sclerosis in Campo Grande for the year 2014 was 11.9 per million inhabitants and the prevalence rate was 105.6 per million inhabitants. Systemic sclerosis patients were mostly women, white, with a mean age of 50.58 years, showing the limited form of the disease with a mean duration of the disease of 8.19 years. Regarding laboratory tests, 94.4% were positive for antinuclear antibody, 41.6% for anti-centromere antibody and 19.1% for anti-Scl70; anti-RNA Polymerase III was performed in 37 patients, with 16.2% positive. The city of Campo Grande, the state capital of MS, presented a lower incidence/prevalence of systemic sclerosis in comparison with those numbers found in US studies and close

  9. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  10. Evaluation of pipeline leak detection systems

    International Nuclear Information System (INIS)

    Glauz, W.D.; Flora, J.D.; Hennon, G.J.

    1993-01-01

    Leaking underground storage tank system presents an environmental concern and a potential health hazard. It is well known that leaks in the piping associated with these systems account for a sizeable fraction of the leaks. EPA has established performance standards for pipeline leak detection systems, and published a document presenting test protocols for evaluating these systems against the standards. This paper discusses a number of facets and important features of evaluating such systems, and presents results from tests of several systems. The importance of temperature differences between the ground and the product in the line is shown both in theory and with test data. The impact of the amount of soil moisture present is addressed, along with the effect of frozen soil. These features are addressed both for line tightness test systems, which must detect leaks of 0.10 gal/h (0.38 L/h) at 150% of normal line pressure, or 0.20 gal/h (0.76 L/h) at normal line pressure, and for automatic line leak detectors that must detect leaks of 3 gal/h (11 L/h) at 10 psi (69 kPa) within an hour of the occurrence of the leak. This paper also addresses some statistical aspects of the evaluation of these systems. Reasons for keeping the evaluation process ''blind'' to the evaluated company are given, along with methods for assuring that the tests are blind. Most importantly, a test procedure is presented for evaluating systems that report a flow rate (not just a pass/fail decision) that is much more efficient than the procedure presented in the EPA protocol, and is just as stringent

  11. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1983-10-01

    A research program is under way to evaluate and develop improve leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  12. Subsea leak detection systems - recommended practice

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Kristin Nergaard

    2010-07-01

    It is known in the industry that occasional leakages occur in subsea production systems. In spite of efforts to apply subsea leak detectors, the experience is that most leakages are either detected by ROV during routine inspections or interventions or as oil slicks on the surface . Operators and authority awareness towards the environmental impact of oil and gas production is increasing. The regulatory bodies in Norway, EU and USA specify requirements for detection of acute pollution. This paper presents the development of a Recommended Practice (RP) sponsored by OLF (The Norwegian Oil Industry Association). The JIP includes several major oil and gas operators. The objective of the RP is to serve as a technical and practical reference in the field of subsea leak detection. (Author)

  13. Detecting free-mass common-mode motion induced by incident gravitational waves

    Science.gov (United States)

    Tobar, Michael Edmund; Suzuki, Toshikazu; Kuroda, Kazuaki

    1999-05-01

    In this paper we show that information on both the differential and common mode free-mass response to a gravitational wave can provide important information on discriminating the direction of the gravitational wave source and between different theories of gravitation. The conventional Michelson interferometer scheme only measures the differential free-mass response. By changing the orientation of the beam splitter, it is possible to configure the detector so it is sensitive to the common-mode of the free-mass motion. The proposed interferometer is an adaptation of the Fox-Smith interferometer. A major limitation to the new scheme is its enhanced sensitivity to laser frequency fluctuations over the conventional, and we propose a method of cancelling these fluctuations. The configuration could be used in parallel to the conventional differential detection scheme with a significant sensitivity and bandwidth.

  14. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    International Nuclear Information System (INIS)

    Kapoor, R; Palta, J; Hagan, M; Grover, S; Malik, G

    2014-01-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  15. SU-E-T-524: Web-Based Radiation Oncology Incident Reporting and Learning System (ROIRLS)

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [Virginia Commonwealth University, Richmond, VA (United States); National Radiation Oncology Program (10P4H), Richmond, VA (United States); Grover, S; Malik, G [TSG Innovations Inc., Richmond, VA (United States)

    2014-06-01

    Purpose: Describe a Web-based Radiation Oncology Incident Reporting and Learning system that has the potential to improve quality of care for radiation therapy patients. This system is an important facet of continuing effort by our community to maintain and improve safety of radiotherapy.Material and Methods: The VA National Radiation Oncology Program office has embarked on a program to electronically collect adverse events and near miss data of radiation treatment of over 25,000 veterans treated with radiotherapy annually. Software used for this program is deployed on the VAs intranet as a Website. All data entry forms (adverse event or near miss reports, work product reports) utilize standard causal, RT process step taxonomies and data dictionaries defined in AAPM and ASTRO reports on error reporting (AAPM Work Group Report on Prevention of Errors and ASTROs safety is no accident report). All reported incidents are investigated by the radiation oncology domain experts. This system encompasses the entire feedback loop of reporting an incident, analyzing it for salient details, and developing interventions to prevent it from happening again. The operational workflow is similar to that of the Aviation Safety Reporting System. This system is also synergistic with ROSIS and SAFRON. Results: The ROIRLS facilitates the collection of data that help in tracking adverse events and near misses and develop new interventions to prevent such incidents. The ROIRLS electronic infrastructure is fully integrated with each registered facility profile data thus minimizing key strokes and multiple entries by the event reporters. Conclusions: OIRLS is expected to improve the quality and safety of a broad spectrum of radiation therapy patients treated in the VA and fulfills our goal of Effecting Quality While Treating Safely The Radiation Oncology Incident Reporting and Learning System software used for this program has been developed, conceptualized and maintained by TSG Innovations

  16. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  17. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  18. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  19. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  20. A novel mobile system for radiation detection and monitoring

    Science.gov (United States)

    Biafore, Mauro

    2014-05-01

    evolving needs and budget constraints. On 24th September 2013, REWARD project received a prize as the best Innovative project related to the Not Conventional Threat (NCT) Chemical Biological Radiological Nuclear explosives (CBRNe) products. A highly distinguished jury stated that "the developed detection and surveillance system offers a perfect solution for end-users to enhance crucial capabilities in RN analysis, risk communication and surveillance in case of a radiation incident". A demonstration of the REWARD system is planned in Naples on September 2014. More information about the REWARD project can be found at www.reward-project.eu.

  1. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  2. [Detection of a higher incidence of pathologic somatic findings in globus sensation by use of high frequency cinematography].

    Science.gov (United States)

    Hannig, C; Wuttge-Hannig, A; Bockmeyer, M

    1987-07-01

    Since December 1984 303 patients have undergone examination in our Multidisciplinary Consultation Service for Swallowing Disorders; 117 of them were suffering from typical globus symptoms. We were able to increase the yield of detection of organic lesions by use of the technique of 35 mm film cineradiography with a rate of 50 frames/s. Frame-by-frame analysis and computer-assisted evaluation showed that 80% of the patients with globus symptoms suffered from one or more underlying organic diseases, which could often be treated later with success. We found an increased incidence of early hypopharyngeal diverticula, webs, and motility disorders of the upper esophageal sphincter often associated with gastro-esophageal reflux or weakness of the pharyngeal wall. Cineradiography proved to be a very important tool in the analysis of the pharyngeal swallow in globus pharyngis.

  3. 29 CFR 1910.164 - Fire detection systems.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... detection systems. (a) Scope and application. This section applies to all automatic fire detection systems... detection systems and components to normal operating condition as promptly as possible after each test or...

  4. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  5. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  6. Control systems, personnel policies and management initiatives to limit pollution incidents

    International Nuclear Information System (INIS)

    Martin, B.F.

    1991-01-01

    After the regulatory requirements are met, an important collateral step in the continuing Hazardous Waste/Environmental Management cycle of activities is to minimize the possibility of a pollution incident, spill, contamination, mislabeling, mishandling or exposure, since this minimizes a major contingent liability of the company. Human failure accounts for 88% of accidents, 10% occur from mechanical failure and only 2% are unpreventable force majeure. This implies that fully 98% of all accidents can be prevented or minimized. Good engineering, production, management and educational practices can be formulated to minimize the occurrence and effects of accidental pollution incidents. Hazardous Material/Environmental Management tends to focus on technical and regulatory objectives, a reactionary mode caused in part by the rapidly changing regulatory environment and the need to continually adapt to these changes. Management functions such as personnel management and situational management get shortchanged in research and in practice. What is needed is a system that incorporates change readily, adapts personnel to change easily and mobilizes all the human resources of a company in meeting environmental and regulatory goals in the same way other goals of the company are met. Feedback Loop/Control System concepts have been applied to management practice in the popular Management By Objectives School as well as other schools of management practice. An Environmental Management program is proposed which incorporates feedback loop/ control systems to facilitate operations and training objectives and requirements. By incorporating Environmental and Hazardous Waste goals with other management goals in a system involving all levels of management and workers on the same team, the proposed system will reduce the probability of accidental pollution incidents and thus the contingent liability of a spill or other incident

  7. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  8. The remote atmospheric and ionospheric detection system

    International Nuclear Information System (INIS)

    McCoy, R.P.; Wolfram, K.D.; Meier, R.R.

    1986-01-01

    The Remote Atmospheric and Ionospheric Detection System (RAIDS) experiment, to fly on a TIROS spacecraft in the late 1980's, consists of a comprehensive set of one limb imaging and seven limb scanning optical sensors. These eight instruments span the spectral range from the extreme ultraviolet to the near infrared, allowing simultaneous observations of the neutral and ion composition on the day and night side as well as in the auroral region. The primary objective of RAIDS is to demonstrate a system for remote sensing of the ionosphere to produce global maps of the electron density, peak altitude and critical frequency

  9. Survey to identify depth of penetration of critical incident reporting systems in Austrian healthcare facilities.

    Science.gov (United States)

    Sendlhofer, Gerald; Eder, Harald; Leitgeb, Karina; Gorges, Roland; Jakse, Heidelinde; Raiger, Marianne; Türk, Silvia; Petschnig, Walter; Pregartner, Gudrun; Kamolz, Lars-Peter; Brunner, Gernot

    2018-01-01

    Incident reporting systems or so-called critical incident reporting systems (CIRS) were first recommended for use in health care more than 15 years ago. The uses of these CIRS are highly variable among countries, ranging from being used to report critical incidents, falls, or sentinel events resulting in death. In Austria, CIRS have only been introduced to the health care sector relatively recently. The goal of this work, therefore, was to determine whether and specifically how CIRS are used in Austria. A working group from the Austrian Society for Quality and Safety in Healthcare (ASQS) developed a survey on the topic of CIRS to collect information on penetration of CIRS in general and on how CIRS reports are used to increase patient safety. Three hundred seventy-one health care professionals from 274 health care facilities were contacted via e-mail. Seventy-eight respondents (21.0%) completed the online survey, thereof 66 from hospitals and 12 from other facilities (outpatient clinics, nursing homes). In all, 64.1% of the respondents indicated that CIRS were used in the entire health care facility; 20.6% had not yet introduced CIRS and 15.4% used CIRS only in particular areas. Most often, critical incidents without any harm to patients were reported (76.9%); however, some health care facilities also use their CIRS to report patient falls (16.7%), needle stick injuries (17.9%), technical problems (51.3%), or critical incidents involving health care professionals. CIRS are not yet extensively or homogeneously used in Austria. Inconsistencies exist with respect to which events are reported as well as how they are followed up and reported to health care professionals. Further recommendations for general use are needed to support the dissemination in Austrian health care environments.

  10. Medical students' perceptions of a novel institutional incident reporting system : A thematic analysis.

    Science.gov (United States)

    Gordon, Morris; Parakh, Dillan

    2017-10-01

    Errors in healthcare are a major patient safety issue, with incident reporting a key solution. The incident reporting system has been integrated within a new medical curriculum, encouraging medical students to take part in this key safety process. The aim of this study was to describe the system and assess how students perceived the reporting system with regards to its role in enhancing safety. Employing a thematic analysis, this study used interviews with medical students at the end of the first year. Thematic indices were developed according to the information emerging from the data. Through open, axial and then selective stages of coding, an understanding of how the system was perceived was established. Analysis of the interview specified five core themes: (1) Aims of the incident reporting system; (2) internalized cognition of the system; (3) the impact of the reporting system; (4) threshold for reporting; (5) feedback on the systems operation. Selective analysis revealed three overriding findings: lack of error awareness and error wisdom as underpinned by key theoretical constructs, student support of the principle of safety, and perceptions of a blame culture. Students did not interpret reporting as a manner to support institutional learning and safety, rather many perceived it as a tool for a blame culture. The impact reporting had on students was unexpected and may give insight into how other undergraduates and early graduates interpret such a system. Future studies should aim to produce interventions that can support a reporting culture.

  11. Study for the development of a standardized system of incidents in radiotherapy

    International Nuclear Information System (INIS)

    Ribeiro, A.LC.; Silva, A.L. da; Moreira, J.G.R.; Silva, K.R.R. da

    2017-01-01

    Radiotherapy is a modality that, along with surgery, has become essential for the success of cancer treatment. Over the years, radiotherapy has been improved to increase the effectiveness of the chances of cure. The objective of this study was to capture data from on-site visits in two clinics that offer the radiotherapy service in the state of Rio de Janeiro. After observing that each clinic had similar procedures, however, with some different methods and in view of these data obtained, a model was developed for an institutional system of incident record with the purpose of sharing results to assist in the improvement of safety protocols to mitigate possible accidents in one or more units. We conclude that this system has everything to fulfill the proposal of assisting in learning incidents. However, it is primary and updates will be of utmost importance for your improvement

  12. A new low-cost procedure for detecting nucleic acids in low-incidence samples: a case study of detecting spores of Paenibacillus larvae from bee debris.

    Science.gov (United States)

    Ryba, Stepan; Kindlmann, Pavel; Titera, Dalibor; Haklova, Marcela; Stopka, Pavel

    2012-10-01

    American foulbrood, because of its virulence and worldwide spread, is currently one of the most dangerous diseases of honey bees. Quick diagnosis of this disease is therefore vitally important. For its successful eradication, however, all the hives in the region must be tested. This is time consuming and costly. Therefore, a fast and sensitive method of detecting American foulbrood is needed. Here we present a method that significantly reduces the number of tests needed by combining batches of samples from different hives. The results of this method were verified by testing each sample. A simulation study was used to compare the efficiency of the new method with testing all the samples and to develop a decision tool for determining when best to use the new method. The method is suitable for testing large numbers of samples (over 100) when the incidence of the disease is low (10% or less).

  13. Advantages and disadvantages of the Belgian not-only-fault system for medical incidents.

    Science.gov (United States)

    Vandersteegen, Tom; Marneffe, Wim; Vandijck, Dominique

    2017-02-01

    In 2010, the Belgian compensation system for medical incidents was reformed, in order to overcome some important deficiencies of court procedures. This resulted in a not-only-fault compensation system, following the establishment of the Fund for Medical Accidents (FMA). This paper seeks to clarify the main advantages and disadvantages of this reform. After all, the legislator paid little attention to the impact on physicians, who also seem to be insufficiently informed. However, currently the FMA experiences a significant delay in processing compensation requests. The true effects of the not-only-fault system for patients and physicians as well as for health care quality therefore still remain unclear today.

  14. Incidence of childhood linear scleroderma and systemic sclerosis in the UK and Ireland.

    Science.gov (United States)

    Herrick, Ariane L; Ennis, Holly; Bhushan, Monica; Silman, Alan J; Baildam, Eileen M

    2010-02-01

    Childhood scleroderma encompasses a rare, poorly understood spectrum of conditions. Our aim was to ascertain the incidence of childhood scleroderma in its different forms in the UK and Ireland, and to describe the age, sex, and ethnicity of the cases. The members of 5 specialist medical associations including pediatricians, dermatologists, and rheumatologists were asked to report all cases of abnormal skin thickening suspected to be localized (including linear) scleroderma or systemic sclerosis (SSc) in children scleroderma and 7 (7%) with SSc. This gave an incidence rate per million children per year of 3.4 (95% confidence interval [95% CI] 2.7-4.1) for localized scleroderma, including an incidence rate of 2.5 (95% CI 1.8-3.1) for linear scleroderma, and 0.27 (95% CI 0.1-0.5) for SSc. Of the 87 localized cases, 62 (71%) had linear disease. Of localized disease cases, 55 (63%) were female, 71 (82%) were classified as white British, and the patients' mean age when first seen in secondary care was 10.4 years. Of the 7 SSc cases, all were female, 6 (86%) were white British, and the mean age when first seen was 12.1 years. The median delay between onset and being first seen was 13.1 months for localized scleroderma and 7.2 months for SSc. These data provide additional estimates of the incidence of this rare disorder and its subforms.

  15. Theory and analysis of a large field polarization imaging system with obliquely incident light.

    Science.gov (United States)

    Lu, Xiaotian; Jin, Weiqi; Li, Li; Wang, Xia; Qiu, Su; Liu, Jing

    2018-02-05

    Polarization imaging technology provides information about not only the irradiance of a target but also the polarization degree and angle of polarization, which indicates extensive application potential. However, polarization imaging theory is based on paraxial optics. When a beam of obliquely incident light passes an analyser, the direction of light propagation is not perpendicular to the surface of the analyser and the applicability of the traditional paraxial optical polarization imaging theory is challenged. This paper investigates a theoretical model of a polarization imaging system with obliquely incident light and establishes a polarization imaging transmission model with a large field of obliquely incident light. In an imaging experiment with an integrating sphere light source and rotatable polarizer, the polarization imaging transmission model is verified and analysed for two cases of natural light and linearly polarized light incidence. Although the results indicate that the theoretical model is consistent with the experimental results, the theoretical model distinctly differs from the traditional paraxial approximation model. The results prove the accuracy and necessity of the theoretical model and the theoretical guiding significance for theoretical and systematic research of large field polarization imaging.

  16. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  17. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  18. Properties of incident reporting systems in relation to statistical trend and pattern analysis

    International Nuclear Information System (INIS)

    Kalfsbeek, H.W.; Arsenis, S.P.

    1990-01-01

    This paper describes the properties deemed desirable for an incident reporting system in order to render it useful for extracting valid statistical trend and pattern information. The perspective under which a data collection system is seen in this paper is the following: data are essentially gathered on a set of variables describing an event or incident (the items featuring on a reporting format) in order to learn about (multiple) dependencies (called interactions) between these variables. Hence, the necessary features of the data source are highlighted and potential problem sources limiting the validity of the results to be obtained are identified. In this frame, important issues are the reporting completeness, related to the reporting criteria and reporting frequency, and of course the reporting contents and quality. The choice of the report items (the variables) and their categorization (code dictionary) may influence (bias) the insights gained from trend and pattern analyses, as may the presence or absence of a structure for correlating the reported issues within an incident. The issues addressed in this paper are brought in relation to some real world reporting systems on safety related events in Nuclear Power Plants, so that their possibilities and limitations with regard to statistical trend and pattern analysis become manifest

  19. Surface Movement Incidents Reported to the NASA Aviation Safety Reporting System

    Science.gov (United States)

    Connell, Linda J.; Hubener, Simone

    1997-01-01

    Increasing numbers of aircraft are operating on the surface of airports throughout the world. Airport operations are forecast to grow by more that 50%, by the year 2005. Airport surface movement traffic would therefore be expected to become increasingly congested. Safety of these surface operations will become a focus as airport capacity planning efforts proceed toward the future. Several past events highlight the prevailing risks experienced while moving aircraft during ground operations on runways, taxiways, and other areas at terminal, gates, and ramps. The 1994 St. Louis accident between a taxiing Cessna crossing an active runway and colliding with a landing MD-80 emphasizes the importance of a fail-safe system for airport operations. The following study explores reports of incidents occurring on an airport surface that did not escalate to an accident event. The Aviation Safety Reporting System has collected data on surface movement incidents since 1976. This study sampled the reporting data from June, 1993 through June, 1994. The coding of the data was accomplished in several categories. The categories include location of airport, phase of ground operation, weather /lighting conditions, ground conflicts, flight crew characteristics, human factor considerations, and airport environment. These comparisons and distributions of variables contributing to surface movement incidents can be invaluable to future airport planning, accident prevention efforts, and system-wide improvements.

  20. Exploring human error in military aviation flight safety events using post-incident classification systems.

    Science.gov (United States)

    Hooper, Brionny J; O'Hare, David P A

    2013-08-01

    Human error classification systems theoretically allow researchers to analyze postaccident data in an objective and consistent manner. The Human Factors Analysis and Classification System (HFACS) framework is one such practical analysis tool that has been widely used to classify human error in aviation. The Cognitive Error Taxonomy (CET) is another. It has been postulated that the focus on interrelationships within HFACS can facilitate the identification of the underlying causes of pilot error. The CET provides increased granularity at the level of unsafe acts. The aim was to analyze the influence of factors at higher organizational levels on the unsafe acts of front-line operators and to compare the errors of fixed-wing and rotary-wing operations. This study analyzed 288 aircraft incidents involving human error from an Australasian military organization occurring between 2001 and 2008. Action errors accounted for almost twice (44%) the proportion of rotary wing compared to fixed wing (23%) incidents. Both classificatory systems showed significant relationships between precursor factors such as the physical environment, mental and physiological states, crew resource management, training and personal readiness, and skill-based, but not decision-based, acts. The CET analysis showed different predisposing factors for different aspects of skill-based behaviors. Skill-based errors in military operations are more prevalent in rotary wing incidents and are related to higher level supervisory processes in the organization. The Cognitive Error Taxonomy provides increased granularity to HFACS analyses of unsafe acts.

  1. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  2. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  3. High sensitivity neutron bursts detecting system

    International Nuclear Information System (INIS)

    Shyam, A.; Kaushik, T.C.; Srinivasan, M.; Kulkarni, L.V.

    1993-01-01

    Technique and instrumentation to detect multiplicity of fast neutrons, emitted in sharp bursts, has been developed. A bank of 16 BF 3 detectors, in an appropriate thermalising assembly, efficiency ∼ 16%, is used to detect neutron bursts. The output from this setup, through appropriate electronics, is divided into two paths. The first is directly connected to a computer controlled scalar. The second is connected to another similar scalar through a delay time unit (DTU). The DTU design is such that once it is triggered by a count pulse than it does not allow any counts to be recorded for a fixed dead time set at ∼ 100 μs. The difference in counts recorded directly and through DTU gives the total number of neutrons produced in bursts. This setup is being used to study lattice cracking, anomalous effects in solid deuterium systems and various reactor physics experiments. (author). 3 refs., 1 fig

  4. System and method for anomaly detection

    Science.gov (United States)

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  5. Collision Detection for Underwater ROV Manipulator Systems

    Directory of Open Access Journals (Sweden)

    Satja Sivčev

    2018-04-01

    Full Text Available Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  6. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  7. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  8. Integrating an incident management system within a continuity of operations programme: case study of the Bank of Canada.

    Science.gov (United States)

    Loop, Carole

    2013-01-01

    Carrying out critical business functions without interruption requires a resilient and robust business continuity framework. By embedding an industry-standard incident management system within its business continuity structure, the Bank of Canada strengthened its response plan by enabling timely response to incidents while maintaining a strong focus on business continuity. A total programme approach, integrating the two disciplines, provided for enhanced recovery capabilities. While the value of an effective and efficient response organisation is clear, as demonstrated by emergency events around the world, incident response structures based on normal operating hierarchy can experience unique challenges. The internationally-recognised Incident Command System (ICS) model addresses these issues and reflects the five primary incident management functions, each contributing to the overall strength and effectiveness of the response organisation. The paper focuses on the Bank of Canada's successful implementation of the ICS model as its incident management and continuity of operations programmes evolved to reflect current best practices.

  9. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  10. The effect of changing from one to two views at incident (subsequent) screens in the NHS breast screening programme in England: impact on cancer detection and recall rates

    International Nuclear Information System (INIS)

    Blanks, R.G.; Bennett, R.L.; Patnick, J.; Cush, S.; Davison, C.; Moss, S.M.

    2005-01-01

    AIM: To assess the effect on cancer detection and recall rates of changing from one to two views for incident (subsequent) screens. METHODS: Controlled, comparative, observational study of programmes in NHS breast screening programme in England. Subjects: women aged 50-64 years were screened by the NHSBSP between 1 April 2001 and 31 March 2003. RESULTS: The effect of changing to two-view mammography was a 20% increase in overall incident screen cancer detection rate, with the biggest effect seen for small (<15 mm) invasive cancers. This increased detection rate was achieved with an 11% drop-in recall rate. CONCLUSION: The introduction of two-view mammography for incident screens has resulted in considerable improvements in overall NHS breast screening performance

  11. Contributory factors in surgical incidents as delineated by a confidential reporting system.

    Science.gov (United States)

    Mushtaq, F; O'Driscoll, C; Smith, Fct; Wilkins, D; Kapur, N; Lawton, R

    2018-05-01

    Background Confidential reporting systems play a key role in capturing information about adverse surgical events. However, the value of these systems is limited if the reports that are generated are not subjected to systematic analysis. The aim of this study was to provide the first systematic analysis of data from a novel surgical confidential reporting system to delineate contributory factors in surgical incidents and document lessons that can be learned. Methods One-hundred and forty-five patient safety incidents submitted to the UK Confidential Reporting System for Surgery over a 10-year period were analysed using an adapted version of the empirically-grounded Yorkshire Contributory Factors Framework. Results The most common factors identified as contributing to reported surgical incidents were cognitive limitations (30.09%), communication failures (16.11%) and a lack of adherence to established policies and procedures (8.81%). The analysis also revealed that adverse events were only rarely related to an isolated, single factor (20.71%) - with the majority of cases involving multiple contributory factors (79.29% of all cases had more than one contributory factor). Examination of active failures - those closest in time and space to the adverse event - pointed to frequent coupling with latent, systems-related contributory factors. Conclusions Specific patterns of errors often underlie surgical adverse events and may therefore be amenable to targeted intervention, including particular forms of training. The findings in this paper confirm the view that surgical errors tend to be multi-factorial in nature, which also necessitates a multi-disciplinary and system-wide approach to bringing about improvements.

  12. Linear systems formulation of scattering theory for rough surfaces with arbitrary incident and scattering angles.

    Science.gov (United States)

    Krywonos, Andrey; Harvey, James E; Choi, Narak

    2011-06-01

    Scattering effects from microtopographic surface roughness are merely nonparaxial diffraction phenomena resulting from random phase variations in the reflected or transmitted wavefront. Rayleigh-Rice, Beckmann-Kirchhoff. or Harvey-Shack surface scatter theories are commonly used to predict surface scatter effects. Smooth-surface and/or paraxial approximations have severely limited the range of applicability of each of the above theoretical treatments. A recent linear systems formulation of nonparaxial scalar diffraction theory applied to surface scatter phenomena resulted first in an empirically modified Beckmann-Kirchhoff surface scatter model, then a generalized Harvey-Shack theory that produces accurate results for rougher surfaces than the Rayleigh-Rice theory and for larger incident and scattered angles than the classical Beckmann-Kirchhoff and the original Harvey-Shack theories. These new developments simplify the analysis and understanding of nonintuitive scattering behavior from rough surfaces illuminated at arbitrary incident angles.

  13. Radon detection system, design, test and performance

    International Nuclear Information System (INIS)

    Balcazar, M.; Chavez, A.; Pina-Villalpando, G.; Navarrete, M.

    1999-01-01

    A portable radon detection system (α-Inin) has been designed and constructed for using it in adverse environmental conditions where humidity, temperature and chemical vaporous are present. The minimum integration time is in periods of 15 min during 41 days. A 12 V battery and a photovoltaic module allow the α-Inin autonomy in field measurements. Data is collected by means of a laptop computer where data processing and α-Inin programming are carried out. α-Inin performance was simultaneously tested in a controlled radon chamber, together with a commercial α-Meter

  14. Autonomous system for pathogen detection and identification

    International Nuclear Information System (INIS)

    Belgrader, P.; Benett, W.; Langlois, R.; Long, G.; Mariella, R.; Milanovich, F.; Miles, R.; Nelson, W.; Venkateswaran, K.

    1998-01-01

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify stimulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air

  15. Decision-support information system to manage mass casualty incidents at a level 1 trauma center.

    Science.gov (United States)

    Bar-El, Yaron; Tzafrir, Sara; Tzipori, Idan; Utitz, Liora; Halberthal, Michael; Beyar, Rafael; Reisner, Shimon

    2013-12-01

    Mass casualty incidents are probably the greatest challenge to a hospital. When such an event occurs, hospitals are required to instantly switch from their routine activity to conditions of great uncertainty and confront needs that exceed resources. We describe an information system that was uniquely designed for managing mass casualty events. The web-based system is activated when a mass casualty event is declared; it displays relevant operating procedures, checklists, and a log book. The system automatically or semiautomatically initiates phone calls and public address announcements. It collects real-time data from computerized clinical and administrative systems in the hospital, and presents them to the managing team in a clear graphic display. It also generates periodic reports and summaries of available or scarce resources that are sent to predefined recipients. When the system was tested in a nationwide exercise, it proved to be an invaluable tool for informed decision making in demanding and overwhelming situations such as mass casualty events.

  16. Multiple-beam LDV system for buried landmine detection

    Science.gov (United States)

    Lal, Amit K.; Zhang, Hansheng; Aranchuk, Vyacheslav; Hurtado, Ernesto; Hess, Cecil F.; Burgett, Richard D.; Sabatier, James M.

    2003-09-01

    This paper discusses the performance and experimental results of a multiple beam laser Doppler vibrometer designed to locate buried landmines with the laser-acoustic technique. The device increases the speed of landmine detection by simultaneously probing 16 positions on the ground over a span of 1 meter, and measuring the ground velocity at each of these positions. Experimental results are presented from controlled laboratory experiments as well as from landmine test lanes at the University of Mississippi. In the mine lanes, the multiple beam system is raised to a height of 2.5 meters with a forklift, with the 16 beams spread over a 1 meter line along the mine lane. A motor system then allows the 16 beams to be translated across the mine lane, enabling the system to scan a 1 x 1 meter area in a much shorter time than with previous scanning techniques. The effects of experimental parameters such as platform motion, angle of incidence, speckle dropout, and system depth-of-field will be presented and discussed.

  17. Highway Incident Detection Timeline

    Science.gov (United States)

    2017-10-16

    The ITS JPO is the U.S. Department of Transportations primary advocate and national leader for ITS research, development, and future deployment of connected vehicle technologies, focusing on intelligent vehicles, intelligent infrastructure, and th...

  18. A polarization system for persistent chemical detection

    Science.gov (United States)

    Craven-Jones, Julia; Appelhans, Leah; Couphos, Eric; Embree, Todd; Finnegan, Patrick; Goldstein, Dennis; Karelitz, David; LaCasse, Charles; Luk, Ting S.; Mahamat, Adoum; Massey, Lee; Tanbakuchi, Anthony; Washburn, Cody; Vigil, Steven

    2015-09-01

    We report on the development of a prototype polarization tag based system for detecting chemical vapors. The system primarily consists of two components, a chemically sensitive tag that experiences a change in its optical polarization properties when exposed to a specific chemical of interest, and an optical imaging polarimeter that is used to measure the polarization properties of the tags. Although the system concept could be extended to other chemicals, for the initial system prototype presented here the tags were developed to be sensitive to hydrogen fluoride (HF) vapors. HF is used in many industrial processes but is highly toxic and thus monitoring for its presence and concentration is often of interest for personnel and environmental safety. The tags are periodic multilayer structures that are produced using standard photolithographic processes. The polarimetric imager has been designed to measure the degree of linear polarization reflected from the tags in the short wave infrared. By monitoring the change in the reflected polarization signature from the tags, the polarimeter can be used to determine if the tag was exposed to HF gas. In this paper, a review of the system development effort and preliminary test results are presented and discussed, as well as our plan for future work.

  19. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  20. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the 13 N content in the containment atmosphere. 13 N is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/ 13 N+ 4 He. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium 13 N concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  1. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/Nl3+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  2. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1979-08-01

    The present paper deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process H1+016 → N13+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m -3 and 7 kBq m -3 for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge (Li) flow detector assembly operated at elevated pressure. (Auth.)

  3. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  4. Simulation Model of Mobile Detection Systems

    International Nuclear Information System (INIS)

    Edmunds, T.; Faissol, D.; Yao, Y.

    2009-01-01

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  5. Simulation Model of Mobile Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Edmunds, T; Faissol, D; Yao, Y

    2009-01-27

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  6. Maximum Credible Incidents

    CERN Document Server

    Strait, J

    2009-01-01

    Following the incident in sector 34, considerable effort has been made to improve the systems for detecting similar faults and to improve the safety systems to limit the damage if a similar incident should occur. Nevertheless, even after the consolidation and repairs are completed, other faults may still occur in the superconducting magnet systems, which could result in damage to the LHC. Such faults include both direct failures of a particular component or system, or an incorrect response to a “normal” upset condition, for example a quench. I will review a range of faults which could be reasonably expected to occur in the superconducting magnet systems, and which could result in substantial damage and down-time to the LHC. I will evaluate the probability and the consequences of such faults, and suggest what mitigations, if any, are possible to protect against each.

  7. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a... space. (b) The fire detection system must be designed to minimize false alarms. ...

  8. Incidence Rate of Concomitant Systemic Diseases in the Aging Population with Postmenopausal Osteoporosis

    Directory of Open Access Journals (Sweden)

    Selçuk Sayılır

    2016-08-01

    Full Text Available Objective: To evaluate the concomitant systemic diseases with postmenopausal osteoporosis and to investigate the points to be considered in treatment approach of patients with osteoporosis. Materials and Methods: The study included 110 female patients admitted to our clinic and followed up after postmenopausal osteoporosis diagnosis. Besides the demographic data; the concomitant diseases of the patients such as hypertension, hypo-hyperthyroidism, diabetes mellitus, Alzheimer’s disease, malignancy, osteoarthritis, gastrointestinal system diseases, chronic obstructive pulmonary disease (COPD- asthma and depression were also recorded. Results: The mean age of the patients included in our study was 65.9±9.8 years. When the concomitant systemic diseases were examined; 40 patients had hypertension, 32 patients had osteoarthritis, 24 patients had gastrointestinal tract problems, 22 patients had thyroid disease, 21 patients had depression, 15 patients had hyperlipidemia, 12 patients had diabetes mellitus, 10 patients had COPD - asthma, 7 patients had cardiac diseases, 5 patients had malignancy and 2 patients had Alzheimer disease. Conclusion: Osteoporosis is a common disease in the geriatric population. As a chronic disease with an increasing incidence with aging; it can cause many health problems, prevalently pathological bone fractures, in our country and all over the world. Constitutively, prophylaxis of osteoporosis should be the first step. Because systemic diseases with increasing incidence with aging may affect the severity of osteoporosis and impair the treatment; it is important for both clinicians and the society to have sufficient information about osteoporosis.

  9. IAEA/NEA Fuel Incident Notification and Analysis System (FINAS) guidelines

    International Nuclear Information System (INIS)

    2006-01-01

    The Fuel Incident Notification and Analysis System (FINAS) is an international system jointly operated by the International Atomic Energy Agency (IAEA) and the Nuclear Energy Agency of the Organisation for Economic Cooperation and Development (OECD/NEA). The fundamental objective of FINAS is to contribute to improving the safety of fuel cycle facilities, which are operated worldwide. This objective can be achieved by providing timely and detailed information on both technical and human factors related to events of safety significance, which occur at these facilities. The purpose of these guidelines, which supersede the previous NEA FINAS guidelines is to describe the system and to give users the necessary background and guidance to enable them to produce FINAS reports meeting a high standard of quality while retaining the high efficiency of the system expected by all Member States operating FCFs. These guidelines have been jointly developed and approved by the NEA/IAEA

  10. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  11. SU-F-T-223: Radiotherapy Incident Reporting and Analysis System (RIRAS):Early Experience

    International Nuclear Information System (INIS)

    Kapoor, R; Palta, J; Hagan, M; Burkett, D; Leidholdt, E

    2016-01-01

    Background & Purpose: RIRAS is a web-based information system deployed on the Veterans Health Administration intranet in early 2014 to collect adverse events and good catch data; analyze the causes and contributing factors; and find ways to prevent future occurrences. Material and Methods: Incident learning consists of a feedback loop which starts with reporting an event, followed by analysis of contributing factors, and culminates in the development of a patient safety work product (PSWP) to prevent recurrence. RIRAS permits both anonymous and non-anonymous reporting. Each report is analyzed by a team of medical physicists who are independent of the reporting facility. The analysts usually contact the reporting facilities for additional information. We analyzed all reports and held telephonic interviews (when necessary) with the reporters. We then generated PSWPs with corrective/preventive and learning actions. Anonymous reporting is handled in the same manner, except without the ability to further interview the reporter. Results: In a significant number of reports, the causes and recommended preventive actions were considerably altered by the independent analysis and additional information from the facility. 130 reports have been entered in RIRAS; 9 misadministrations, 83 good catches, 3 anonymous good catches, and 35 earlier reported incidents from FY2005-14. 45% of the reported incidents occurred in the treatment delivery stages, 19% in on-treatment management, and 16% in pre-treatment verification. 80% of the good catches were found in the treatment delivery workflow. Majority of these incidents were due to inconsistent patient setup instructions or documentation, nonadherence to policies and procedures, lax time-out policy, distracted RTTs, and inadequate RTT staffing. Conclusion: RIRAS has identified many areas for improvement and elevated the quality and safety of radiation treatments in the VHA. We found that the ability to learn is significantly

  12. SU-F-T-223: Radiotherapy Incident Reporting and Analysis System (RIRAS):Early Experience

    Energy Technology Data Exchange (ETDEWEB)

    Kapoor, R; Palta, J; Hagan, M [National Radiation Oncology Program (10P4H), Dept. of Veterans Affairs, Richmond, VA (United States); Burkett, D; Leidholdt, E [National Health Physics Program (10P4X), Dept. of Veterans Affairs, Little Rock, AR (United States)

    2016-06-15

    Background & Purpose: RIRAS is a web-based information system deployed on the Veterans Health Administration intranet in early 2014 to collect adverse events and good catch data; analyze the causes and contributing factors; and find ways to prevent future occurrences. Material and Methods: Incident learning consists of a feedback loop which starts with reporting an event, followed by analysis of contributing factors, and culminates in the development of a patient safety work product (PSWP) to prevent recurrence. RIRAS permits both anonymous and non-anonymous reporting. Each report is analyzed by a team of medical physicists who are independent of the reporting facility. The analysts usually contact the reporting facilities for additional information. We analyzed all reports and held telephonic interviews (when necessary) with the reporters. We then generated PSWPs with corrective/preventive and learning actions. Anonymous reporting is handled in the same manner, except without the ability to further interview the reporter. Results: In a significant number of reports, the causes and recommended preventive actions were considerably altered by the independent analysis and additional information from the facility. 130 reports have been entered in RIRAS; 9 misadministrations, 83 good catches, 3 anonymous good catches, and 35 earlier reported incidents from FY2005-14. 45% of the reported incidents occurred in the treatment delivery stages, 19% in on-treatment management, and 16% in pre-treatment verification. 80% of the good catches were found in the treatment delivery workflow. Majority of these incidents were due to inconsistent patient setup instructions or documentation, nonadherence to policies and procedures, lax time-out policy, distracted RTTs, and inadequate RTT staffing. Conclusion: RIRAS has identified many areas for improvement and elevated the quality and safety of radiation treatments in the VHA. We found that the ability to learn is significantly

  13. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  14. International recommendations for national patient safety incident reporting systems: an expert Delphi consensus-building process.

    Science.gov (United States)

    Howell, Ann-Marie; Burns, Elaine M; Hull, Louise; Mayer, Erik; Sevdalis, Nick; Darzi, Ara

    2017-02-01

    Patient safety incident reporting systems (PSRS) have been established for over a decade, but uncertainty remains regarding the role that they can and ought to play in quantifying healthcare-related harm and improving care. To establish international, expert consensus on the purpose of PSRS regarding monitoring and learning from incidents and developing recommendations for their future role. After a scoping review of the literature, semi-structured interviews with experts in PSRS were conducted. Based on these findings, a survey-based questionnaire was developed and subsequently completed by a larger expert panel. Using a Delphi approach, consensus was reached regarding the ideal role of PSRSs. Recommendations for best practice were devised. Forty recommendations emerged from the Delphi procedure on the role and use of PSRS. Experts agreed reporting system should not be used as an epidemiological tool to monitor the rate of harm over time or to appraise the relative safety of hospitals. They agreed reporting is a valuable mechanism for identifying organisational safety needs. The benefit of a national system was clear with respect to medication error, device failures, hospital-acquired infections and never events as these problems often require solutions at a national level. Experts recommended training for senior healthcare professionals in incident investigation. Consensus recommendation was for hospitals to take responsibility for creating safety solutions locally that could be shared nationally. We obtained reasonable consensus among experts on aims and specifications of PSRS. This information can be used to reflect on existing and future PSRS, and their role within the wider patient safety landscape. The role of PSRS as instruments for learning needs to be elaborated and developed further internationally. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  15. Application examples of the reports of the NEA Incident Reporting System of the OECD and evolution of the system

    International Nuclear Information System (INIS)

    Libmann, J.

    1989-06-01

    Some reports of the work group no. 1 of the Nuclear Installations Security Committee of NEA, are summarized. An example of the report coding system concerning human factors, is given. The aim of the study is to improve the report contents as well as the coding system. In this case, a fast data selection is possible, and allows an efficient analysis of a particular situation. Moreover, the corrective procedures of the nuclear installation conception or operation can be easily modified, by the national organisations. Due to the improvements in quality, the opinion of the member countries on the incident reporting systems efficiency was enhanced [fr

  16. MO-G-BRE-06: Metrics of Success: Measuring Participation and Attitudes Related to Near-Miss Incident Learning Systems

    International Nuclear Information System (INIS)

    Nyflot, MJ; Kusano, AS; Zeng, J; Carlson, JC; Novak, A; Sponseller, P; Jordan, L; Kane, G; Ford, EC

    2014-01-01

    Purpose: Interest in incident learning systems (ILS) for improving safety and quality in radiation oncology is growing, as evidenced by the upcoming release of the national ILS. However, an institution implementing such a system would benefit from quantitative metrics to evaluate performance and impact. We developed metrics to measure volume of reporting, severity of reported incidents, and changes in staff attitudes over time from implementation of our institutional ILS. Methods: We analyzed 2023 incidents from our departmental ILS from 2/2012–2/2014. Incidents were prospectively assigned a near-miss severity index (NMSI) at multidisciplinary review to evaluate the potential for error ranging from 0 to 4 (no harm to critical). Total incidents reported, unique users reporting, and average NMSI were evaluated over time. Additionally, departmental safety attitudes were assessed through a 26 point survey adapted from the AHRQ Hospital Survey on Patient Safety Culture before, 12 months, and 24 months after implementation of the incident learning system. Results: Participation in the ILS increased as demonstrated by total reports (approximately 2.12 additional reports/month) and unique users reporting (0.51 additional users reporting/month). Also, the average NMSI of reports trended lower over time, significantly decreasing after 12 months of reporting (p<0.001) but with no significant change at months 18 or 24. In survey data significant improvements were noted in many dimensions, including perceived barriers to reporting incidents such as concern of embarrassment (37% to 18%; p=0.02) as well as knowledge of what incidents to report, how to report them, and confidence that these reports were used to improve safety processes. Conclusion: Over a two-year period, our departmental ILS was used more frequently, incidents became less severe, and staff confidence in the system improved. The metrics used here may be useful for other institutions seeking to create or evaluate

  17. MO-G-BRE-06: Metrics of Success: Measuring Participation and Attitudes Related to Near-Miss Incident Learning Systems

    Energy Technology Data Exchange (ETDEWEB)

    Nyflot, MJ; Kusano, AS; Zeng, J; Carlson, JC; Novak, A; Sponseller, P; Jordan, L; Kane, G; Ford, EC [University of Washington, Seattle, WA (United States)

    2014-06-15

    Purpose: Interest in incident learning systems (ILS) for improving safety and quality in radiation oncology is growing, as evidenced by the upcoming release of the national ILS. However, an institution implementing such a system would benefit from quantitative metrics to evaluate performance and impact. We developed metrics to measure volume of reporting, severity of reported incidents, and changes in staff attitudes over time from implementation of our institutional ILS. Methods: We analyzed 2023 incidents from our departmental ILS from 2/2012–2/2014. Incidents were prospectively assigned a near-miss severity index (NMSI) at multidisciplinary review to evaluate the potential for error ranging from 0 to 4 (no harm to critical). Total incidents reported, unique users reporting, and average NMSI were evaluated over time. Additionally, departmental safety attitudes were assessed through a 26 point survey adapted from the AHRQ Hospital Survey on Patient Safety Culture before, 12 months, and 24 months after implementation of the incident learning system. Results: Participation in the ILS increased as demonstrated by total reports (approximately 2.12 additional reports/month) and unique users reporting (0.51 additional users reporting/month). Also, the average NMSI of reports trended lower over time, significantly decreasing after 12 months of reporting (p<0.001) but with no significant change at months 18 or 24. In survey data significant improvements were noted in many dimensions, including perceived barriers to reporting incidents such as concern of embarrassment (37% to 18%; p=0.02) as well as knowledge of what incidents to report, how to report them, and confidence that these reports were used to improve safety processes. Conclusion: Over a two-year period, our departmental ILS was used more frequently, incidents became less severe, and staff confidence in the system improved. The metrics used here may be useful for other institutions seeking to create or evaluate

  18. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  19. Risk analysis update of the LHC cryogenic system following the 19th September 2008 incident

    CERN Document Server

    Chorowski, M; Modlinski, Z; Polinski, J; Tavian, L; Wach, J

    2011-01-01

    On 19th September 2008, during powering tests of the main dipole circuit of the Large Hadron Collider, an electrical fault occurred producing an electrical arc and resulting in mechanical and electrical damage, release of helium from the magnet cold mass to the insulation vacuum enclosure and consequently to the tunnel, via the spring-loaded relief discs on the vacuum enclosure. The pressurization of the vacuum space exceeded significantly the allowed design value. Mathematical modeling based on a thermodynamic approach has enabled the revision of the helium discharge system protecting the vacuum enclosure against the over-pressurization in case of a redefined maximum credible incident (MCI) occurrence.

  20. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi; Sun, Ying; Saidi, Ahmed

    2018-01-01

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a

  1. The role of the NEA incident reporting system in trend and pattern studies

    International Nuclear Information System (INIS)

    Ishack, G.; Iwabuchi, H.

    1990-01-01

    When the Incident Reporting System of the OECD Nuclear Energy Agency (NEA-IRS) was first instituted in 1980, Members recognized the fact that since the data thus collected only pertains to significant safety-related incidents, the system cannot be used for in-depth statistical analyses. Rather, the NEA-IRS is best suited, in addition to single event assessments, to studies that provide indications related to system, component or human performance; these indications could also initiate trend analyses on more complete data bases. Examples are the generic studies on the Loss of Containment Functions (completed last year) and the Loss of Residual Heat Removal (due for completion this year), and the studies related to the human factor. Another type of use of the IRS data was started last year by the NEA Principal Working Group 1 on Operating Experience and Human Factors (PWG 1) in response to the encouragement of the OECD/NEA Committee on the Safety of Nuclear Installations (CSNI), to make the best use of Operating Experience, notably of information disseminated through the NEA-IRS. These applications consisted of scanning the IRS data base for events that could be of interest to specialized domains such as radiation protection, fracture mechanics and fire protection. In the paragraphs which follow, some highlights of the results of these scans are presented (reference is made at the end of this paper to the reports detailing the results of these applications)

  2. A scoring system for ascertainment of incident stroke; the Risk Index Score (RISc).

    Science.gov (United States)

    Kass-Hout, T A; Moyé, L A; Smith, M A; Morgenstern, L B

    2006-01-01

    The main objective of this study was to develop and validate a computer-based statistical algorithm that could be translated into a simple scoring system in order to ascertain incident stroke cases using hospital admission medical records data. The Risk Index Score (RISc) algorithm was developed using data collected prospectively by the Brain Attack Surveillance in Corpus Christi (BASIC) project, 2000. The validity of RISc was evaluated by estimating the concordance of scoring system stroke ascertainment to stroke ascertainment by physician and/or abstractor review of hospital admission records. RISc was developed on 1718 randomly selected patients (training set) and then statistically validated on an independent sample of 858 patients (validation set). A multivariable logistic model was used to develop RISc and subsequently evaluated by goodness-of-fit and receiver operating characteristic (ROC) analyses. The higher the value of RISc, the higher the patient's risk of potential stroke. The study showed RISc was well calibrated and discriminated those who had potential stroke from those that did not on initial screening. In this study we developed and validated a rapid, easy, efficient, and accurate method to ascertain incident stroke cases from routine hospital admission records for epidemiologic investigations. Validation of this scoring system was achieved statistically; however, clinical validation in a community hospital setting is warranted.

  3. Wireless Falling Detection System Based on Community.

    Science.gov (United States)

    Xia, Yun; Wu, Yanqi; Zhang, Bobo; Li, Zhiyang; He, Nongyue; Li, Song

    2015-06-01

    The elderly are more likely to suffer the aches or pains from the accidental falls, and both the physiology and psychology of patients would subject to a long-term disturbance, especially when the emergency treatment was not given timely and properly. Although many methods and devices have been developed creatively and shown their efficiency in experiments, few of them are suitable for commercial applications routinely. Here, we design a wearable falling detector as a mobile terminal, and utilize the wireless technology to transfer and monitor the activity data of the host in a relatively small community. With the help of the accelerometer sensor and the Google Mapping service, information of the location and the activity data will be send to the remote server for the downstream processing. The experimental result has shown that SA (Sum-vector of all axes) value of 2.5 g is the threshold value to distinguish the falling from other activities. A three-stage detection algorithm was adopted to increase the accuracy of the real alarm, and the accuracy rate of our system was more than 95%. With the further improvement, the falling detecting device which is low-cost, accurate and user-friendly would become more and more common in everyday life.

  4. Optical fiber-applied radiation detection system

    International Nuclear Information System (INIS)

    Nishiura, Ryuichi; Uranaka, Yasuo; Izumi, Nobuyuki

    2001-01-01

    A technique to measure radiation by using plastic scintillation fibers doped radiation fluorescent (scintillator) to plastic optical fiber for a radiation sensor, was developed. The technique contains some superiority such as high flexibility due to using fibers, relatively easy large area due to detecting portion of whole of fibers, and no electromagnetic noise effect due to optical radiation detection and signal transmission. Measurable to wide range of and continuous radiation distribution along optical fiber cable at a testing portion using scintillation fiber and flight time method, the optical fiber-applied radiation sensing system can effectively monitor space radiation dose or apparatus operation condition monitoring. And, a portable type scintillation optical fiber body surface pollution monitor can measure pollution concentration of radioactive materials attached onto body surface by arranging scintillation fiber processed to a plate with small size and flexibility around a man to be tested. Here were described on outline and fundamental properties of various application products using these plastic scintillation fiber. (G.K.)

  5. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  6. Decision algorithms in fire detection systems

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2011-01-01

    Full Text Available Analogue (and addressable fire detection systems enables a new quality in improving sensitivity to real fires and reducing susceptibility to nuisance alarm sources. Different decision algorithms types were developed with intention to improve sensitivity and reduce false alarm occurrence. At the beginning, it was free alarm level adjustment based on preset level. Majority of multi-criteria decision work was based on multi-sensor (multi-signature decision algorithms - using different type of sensors on the same location or, rather, using different aspects (level and rise of one sensor measured value. Our idea is to improve sensitivity and reduce false alarm occurrence by forming groups of sensors that work in similar conditions (same world side in the building, same or similar technology or working time. Original multi-criteria decision algorithms based on level, rise and difference of level and rise from group average are discussed in this paper.

  7. Distributed gas detection system and method

    Science.gov (United States)

    Challener, William Albert; Palit, Sabarni; Karp, Jason Harris; Kasten, Ansas Matthias; Choudhury, Niloy

    2017-11-21

    A distributed gas detection system includes one or more hollow core fibers disposed in different locations, one or more solid core fibers optically coupled with the one or more hollow core fibers and configured to receive light of one or more wavelengths from a light source, and an interrogator device configured to receive at least some of the light propagating through the one or more solid core fibers and the one or more hollow core fibers. The interrogator device is configured to identify a location of a presence of a gas-of-interest by examining absorption of at least one of the wavelengths of the light at least one of the hollow core fibers.

  8. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  9. Understanding transport pathways in a river system - Monitoring sediments contaminated by an incident

    Science.gov (United States)

    Dietrich, S.; Kleisinger, C.; Hillebrand, G.; Claus, E.; Schwartz, R.; Carls, I.; Winterscheid, A.; Schubert, B.

    2016-12-01

    Experiments to trace transport of sediments and suspended particulate matter on a river scale are an expensive and difficult venture, since it causes a lot of official requirements. In spring 2015, polychlorinated biphenyls (PCB) were released during restoration works at a bridge in the upper part of the Elbe River, near the Czech-German border. In this study, the particle-bound PCB-transport is applied as a tracer for monitoring transport pathways of suspended solids (SS) along a whole river stretch over 700 km length. The incident was monitored by concentration measurements of seven indicator PCB congeners along the inland part of the Elbe River as well as in the Elbe estuary. Data from 15 monitoring stations (settling tanks) as well as from two longitudinal campaigns (grab samples) along the river in July and August 2015 are considered. The total PCB load is calculated for all stations on the basis of monthly contaminant concentrations and daily suspended sediment concentrations. Monte-Carlo simulations assess the uncertainties of the calculated load. 1D water levels and GIS analysis were used to locate temporal storage areas for the SS. It is shown that the ratio of high versus low chlorinated PCB congeners is a suitable tracer to distinguish the PCB load of the incident from the long-term background signal. Furthermore, the reduction of total PCB load within the upper Elbe indicates that roughly 24% of the SS were transported with the water by wash load. Approximately 600 km downstream of the incident site, the PCB-marked wash load was first identified in July 2015. PCB load transported intermittently in suspension was detected roughly 400 km downstream of the incident site by August 2015. In the Elbe Estuary, PCB-marked SS were only found upstream of the steep slope of water depth (approx. 4 to 15 m) within Hamburg harbor that acts as a major sediment sink. Here, SS from the inland Elbe are mixed with lowly contaminated marine material, which may mask the

  10. A remotely piloted aircraft system in major incident management: concept and pilot, feasibility study.

    Science.gov (United States)

    Abrahamsen, Håkon B

    2015-06-10

    Major incidents are complex, dynamic and bewildering task environments characterised by simultaneous, rapidly changing events, uncertainty and ill-structured problems. Efficient management, communication, decision-making and allocation of scarce medical resources at the chaotic scene of a major incident is challenging and often relies on sparse information and data. Communication and information sharing is primarily voice-to-voice through phone or radio on specified radio frequencies. Visual cues are abundant and difficult to communicate between teams and team members that are not co-located. The aim was to assess the concept and feasibility of using a remotely piloted aircraft (RPA) system to support remote sensing in simulated major incident exercises. We carried out an experimental, pilot feasibility study. A custom-made, remotely controlled, multirotor unmanned aerial vehicle with vertical take-off and landing was equipped with digital colour- and thermal imaging cameras, a laser beam, a mechanical gripper arm and an avalanche transceiver. We collected data in five simulated exercises: 1) mass casualty traffic accident, 2) mountain rescue, 3) avalanche with buried victims, 4) fisherman through thin ice and 5) search for casualties in the dark. The unmanned aerial vehicle was remotely controlled, with high precision, in close proximity to air space obstacles at very low levels without compromising work on the ground. Payload capacity and tolerance to wind and turbulence were limited. Aerial video, shot from different altitudes, and remote aerial avalanche beacon search were streamed wirelessly in real time to a monitor at a ground base. Electromagnetic interference disturbed signal reception in the ground monitor. A small remotely piloted aircraft can be used as an effective tool carrier, although limited by its payload capacity, wind speed and flight endurance. Remote sensing using already existing remotely piloted aircraft technology in pre

  11. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the Atmospheric Environment Safety Technology Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2014-01-01

    This study analyzed aircraft incidents in the NASA Aviation Safety Reporting System (ASRS) that apply to two of the three technical challenges (TCs) in NASA's Aviation Safety Program's Atmospheric Environment Safety Technology Project. The aircraft incidents are related to airframe icing and atmospheric hazards TCs. The study reviewed incidents that listed their primary problem as weather or environment-nonweather between 1994 and 2011 for aircraft defined by Federal Aviation Regulations (FAR) Parts 121, 135, and 91. The study investigated the phases of flight, a variety of anomalies, flight conditions, and incidents by FAR part, along with other categories. The first part of the analysis focused on airframe-icing-related incidents and found 275 incidents out of 3526 weather-related incidents over the 18-yr period. The second portion of the study focused on atmospheric hazards and found 4647 incidents over the same time period. Atmospheric hazards-related incidents included a range of conditions from clear air turbulence and wake vortex, to controlled flight toward terrain, ground encounters, and incursions.

  12. 49 CFR 1544.213 - Use of explosives detection systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a... explosives detection system approved by TSA to screen checked baggage on international flights. (b) Signs and...

  13. 46 CFR 154.1350 - Flammable gas detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a fixed flammable gas detection system that has sampling points in: (1) Each cargo pump room; (2) Each cargo...

  14. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  15. Results of the implementation of a learning system with incidents in an radiotherapy department; Resultados da implementacao de um sistema de aprendizagem com incidentes em um Departamento de Radioterapia

    Energy Technology Data Exchange (ETDEWEB)

    Radicchi, Lucas Augusto; Vilela, Ellen Pedroso Severino; Faustino, Fabio de Lima C.; Rodrigues, Fernanda Arantes C.; Gomes, Franciele N.; Souza, Guilherme Vicente de; Silva, Rose Marta S. [Hospital de Cancer de Barretos, SP (Brazil); Toledo, Jose Carlos de [Universidade Federal de Sao Carlos (UFSCar), SP (Brazil)

    2016-07-01

    An incident learning system (ILS) is an important tool for improving aspects of patient and staff safety. In radiation oncology, ILS has been implemented both at the institutional level as at the national level, allowing to share lessons learned from incidents that have already occurred. The objective of this study is to present the preliminary results of the ILS implemented in a radiation oncology department. In total, 128 incidents were reviewed by a multidisciplinary committee, and the professional groups that registered more were medical physicists, radiation oncologists and radiation therapists. In addition, incidents have occurred and have been detected mainly in the treatment step. The incident learning system proved to be an important process improvement tool, according to the results shown,the improvement actions proposed and the perception of the people involved. (author)

  16. Creating European guidelines for Chiropractic Incident Reporting and Learning Systems (CIRLS: relevance and structure

    Directory of Open Access Journals (Sweden)

    Wangler Martin

    2011-04-01

    Full Text Available Abstract Background In 2009, the heads of the Executive Council of the European Chiropractors' Union (ECU and the European Academy of Chiropractic (EAC involved in the European Committee for Standardization (CEN process for the chiropractic profession, set out to establish European guidelines for the reporting of adverse reactions to chiropractic treatment. There were a number of reasons for this: first, to improve the overall quality of patient care by aiming to reduce the application of potentially harmful interventions and to facilitate the treatment of patients within the context of achieving maximum benefit with a minimum risk of harm; second, to inform the training objectives for the Graduate Education and Continuing Professional Development programmes of all 19 ECU member nations, regarding knowledge and skills to be acquired for maximising patient safety; and third, to develop a guideline on patient safety incident reporting as it is likely to be part of future CEN standards for ECU member nations. Objective To introduce patient safety incident reporting within the context of chiropractic practice in Europe and to help individual countries and their national professional associations to develop or improve reporting and learning systems. Discussion Providing health care of any kind, including the provision of chiropractic treatment, can be a complex and, at times, a risky activity. Safety in healthcare cannot be guaranteed, it can only be improved. One of the most important aspects of any learning and reporting system lies in the appropriate use of the data and information it gathers. Reporting should not just be seen as a vehicle for obtaining information on patient safety issues, but also be utilised as a tool to facilitate learning, advance quality improvement and to ultimately minimise the rate of the occurrence of errors linked to patient care. Conclusions Before a reporting and learning system can be established it has to be clear

  17. The Development of Power Detection System Using One-Chip Microcontroller

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Sa Hyun; Choi, Nkak II; Lee, Sung Kil; Lim, Yang Su; Cho Geum Bae; Baek, Hyung Lae [Chosun University, Kwangju(Korea)

    2002-04-01

    This paper describes on the development of power detection system with one-chop microcontroller. The designed system is composed of power detection circuits and analyzing software. The system detects 3-phases voltage, 3-phases current, external temperature, leakage current and stores in flash memory AT89C52 was used as CPU and AM29F040 was used as memory to store the data. The analysis software was developed to detect the cause of the electrical fire incidents. With a data-compression technology, the data can be stored for the 43.5 days in a normal state, four hours and fifteen minutes in emergency state. (author). 7 refs., 22 figs., 2 tabs.

  18. On the Appropriateness of Incident Management Systems in Developing Countries: A Case from the UAE

    Directory of Open Access Journals (Sweden)

    Faouzi Kamoun

    2010-12-01

    Full Text Available Road traffic incidents are eliciting growing public concerns due to their devastating social, economical, and environmental impacts. The severity of these random events is particularly alarming in developing countries, where the situation is just worsening. Recently, Incident Management Systems (IMSs have been proposed as powerful tools to enhance the coordination and management of rescue operations during traffic accidents. However, most of the available commercial IMS solutions are designed for large metropolitan cities and within the contexts of developed nations. This paper explores the issues of appropriateness and customization of IMS solutions in developing countries through an exploratory inquiry consisting of a case study from the United Arab Emirates (UAE. The paper also explores the important issues related to managing the organizational changes that an IMS introduces to the operations of the command and control room. This contribution calls for the development of more comprehensive theoretical frameworks that can guide towards the implementation of appropriate IMS solutions in developing countries. Our research highlights the need for developing countries to acquire appropriate IMS solutions that are tailored to the local organizational work context in which these systems will be used. The experience reported herein can also inspire other public safety agencies in developing countries to consider the option of developing customized IMS solutions that best suit their needs.

  19. RETRAN code analysis of Tsuruga-2 plant chemical volume control system (CVCS) reactor coolant leakage incident

    International Nuclear Information System (INIS)

    Kawai, Hiroshi

    2002-01-01

    In the Chemical Volume Control System (CVCS) reactor primary coolant leakage incident, which occurred in Tsuruga-2 (4-loop PWR, 3,423 MWt, 1,160 MWe) on July 12, 1999, it took about 14 hours before the leakage isolation. The delayed leakage isolation and a large amount of leakage have become a social concern. Effective procedure modification was studied. Three betterments were proposed based on a qualitative analysis to reduce the pressure and temperature of the primary loop as fast as possible by the current plant facilities while maintaining enough subcooling of the primary loop. I analyzed the incident with RETRAN code in order to quantitatively evaluate the leakage reduction when these betterments are adopted. This paper is very new because it created a typical analysis method for PWR plant behavior during plant shutdown procedure which conventional RETRAN transient analyses rarely dealt with. Also the event time is very long. To carry out this analysis successfully, I devised new models such as an Residual Heat Removal System (RHR) model etc. and simplified parts of the conventional model. Based on the analysis results, I confirmed that leakage can be reduced by about 30% by adopting these betterments. Then the Japan Atomic Power Company (JAPC) modified the operational procedure for reactor primary coolant leakage events adopting these betterments. (author)

  20. Design of detection module for smart ligthting system

    OpenAIRE

    Matveev, I. G.; Goponenko, A. S.

    2015-01-01

    The paper considers a smart lighting system based on Beaglebone microcomputer. The analysis of existing motion and presence sensors was carried out and then used as a basis for design of a detection system. The detection system and the corresponding connection solution for a smart lighting system were developed. Using the designed smart lighting system, experimental studies were carried out.

  1. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  2. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  3. Measuring the Impact of Online Evidence Retrieval Systems using Critical Incidents & Journey Mapping.

    Science.gov (United States)

    Westbrook, Johanna I; Coiera, Enrico W; Braithwaite, Jeffrey

    2005-01-01

    Online evidence retrieval systems are one potential tool in supporting evidence-based practice. We have undertaken a program of research to investigate how hospital-based clinicians (doctors, nurses and allied health professionals) use these systems, factors influencing use and their impact on decision-making and health care delivery. A central component of this work has been the development and testing of a broad range of evaluation techniques. This paper provides an overview of the results obtained from three stages of this evaluation and details the results derived from the final stage which sought to test two methods for assessing the integration of an online evidence system and its impact on decision making and patient care. The critical incident and journey mapping techniques were applied. Semi-structured interviews were conducted with 29 clinicians who were experienced users of the online evidence system. Clinicians were asked to described recent instances in which the information obtained using the online evidence system was especially helpful with their work. A grounded approach to data analysis was taken producing three categories of impact. The journey mapping technique was adapted as a method to describe and quantify clinicians' integration of CIAP into their practice and the impact of this on patient care. The analogy of a journey is used to capture the many stages in this integration process, from introduction to the system to full integration into everyday clinical practice with measurable outcomes. Transcribed interview accounts of system use were mapped against the journey stages and scored. Clinicians generated 85 critical incidents and one quarter of these provided specific examples of system use leading to improvements in patient care. The journey mapping technique proved to be a useful method for providing a quantification of the ways and extent to which clincians had integrated system use into practice, and insights into how information

  4. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  5. Mathematical model as means of optimization of the automation system of the process of incidents of information security management

    Directory of Open Access Journals (Sweden)

    Yulia G. Krasnozhon

    2018-03-01

    Full Text Available Modern information technologies have an increasing importance for development dynamics and management structure of an enterprise. The management efficiency of implementation of modern information technologies directly related to the quality of information security incident management. However, issues of assessment of the impact of information security incidents management on quality and efficiency of the enterprise management system are not sufficiently highlighted neither in Russian nor in foreign literature. The main direction to approach these problems is the optimization of the process automation system of the information security incident management. Today a special attention is paid to IT-technologies while dealing with information security incidents at mission-critical facilities in Russian Federation such as the Federal Tax Service of Russia (FTS. It is proposed to use the mathematical apparatus of queueing theory in order to build a mathematical model of the system optimization. The developed model allows to estimate quality of the management taking into account the rules and restrictions imposed on the system by the effects of information security incidents. Here an example is given in order to demonstrate the system in work. The obtained statistical data are shown. An implementation of the system discussed here will improve the quality of the Russian FTS services and make responses to information security incidents faster.

  6. Planet Detectability in the Alpha Centauri System

    Science.gov (United States)

    Zhao, Lily; Fischer, Debra A.; Brewer, John; Giguere, Matt; Rojas-Ayala, Bárbara

    2018-01-01

    We use more than a decade of radial-velocity measurements for α {Cen} A, B, and Proxima Centauri from the High Accuracy Radial Velocity Planet Searcher, CTIO High Resolution Spectrograph, and the Ultraviolet and Visual Echelle Spectrograph to identify the M\\sin i and orbital periods of planets that could have been detected if they existed. At each point in a mass–period grid, we sample a simulated, Keplerian signal with the precision and cadence of existing data and assess the probability that the signal could have been produced by noise alone. Existing data places detection thresholds in the classically defined habitable zones at about M\\sin i of 53 {M}\\oplus for α {Cen} A, 8.4 {M}\\oplus for α {Cen} B, and 0.47 {M}\\oplus for Proxima Centauri. Additionally, we examine the impact of systematic errors, or “red noise” in the data. A comparison of white- and red-noise simulations highlights quasi-periodic variability in the radial velocities that may be caused by systematic errors, photospheric velocity signals, or planetary signals. For example, the red-noise simulations show a peak above white-noise simulations at the period of Proxima Centauri b. We also carry out a spectroscopic analysis of the chemical composition of the α {Centauri} stars. The stars have super-solar metallicity with ratios of C/O and Mg/Si that are similar to the Sun, suggesting that any small planets in the α {Cen} system may be compositionally similar to our terrestrial planets. Although the small projected separation of α {Cen} A and B currently hampers extreme-precision radial-velocity measurements, the angular separation is now increasing. By 2019, α {Cen} A and B will be ideal targets for renewed Doppler planet surveys.

  7. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  8. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  9. SU-F-T-462: Lessons Learned From a Machine Incident Reporting System

    International Nuclear Information System (INIS)

    Sutlief, S; Hoisak, J

    2016-01-01

    Purpose: Linear accelerators must operate with minimal downtime. Machine incident logs are a crucial tool to meet this requirement. They providing a history of service and demonstrate whether a fix is working. This study investigates the information content of a large department linear accelerator incident log. Methods: Our department uses an electronic reporting system to provide immediate information to both key department staff and the field service department. This study examines reports for five linac logs during 2015. The report attributes for analysis include frequency, level of documentation, who solved the problem, and type of fix used. Results: Of the reports, 36% were documented as resolved. In another 25% the resolution allowed treatment to proceed although the reported problem recurred within days. In 5% only intermediate troubleshooting was documented. The remainder lacked documentation. In 60% of the reports, radiation therapists resolved the problem, often by clearing the appropriate faults or reinitializing a software or hardware service. 22% were resolved by physics and 10% by field service engineers. The remaining 8% were resolved by IT, Facilities, or resolved spontaneously. Typical fixes, in order of scope, included clearing the fault and moving on, closing and re-opening the patient session or software, cycling power to a sub-unit, recalibrating a device (e.g., optical surface imaging), and calling in Field Service (usually resolving the problem through maintenance or component replacement). Conclusion: The reports with undocumented resolution represent a missed opportunity for learning. Frequency of who resolves a problem scales with the proximity of the person’s role (therapist, physicist, or service engineer), which is inversely related to the permanence of the resolution. Review of lessons learned from machine incident logs can form the basis for guidance to radiation therapists and medical physicists to minimize equipment downtime and

  10. SU-F-T-462: Lessons Learned From a Machine Incident Reporting System

    Energy Technology Data Exchange (ETDEWEB)

    Sutlief, S; Hoisak, J [University of California, San Diego, La Jolla, CA (United States)

    2016-06-15

    Purpose: Linear accelerators must operate with minimal downtime. Machine incident logs are a crucial tool to meet this requirement. They providing a history of service and demonstrate whether a fix is working. This study investigates the information content of a large department linear accelerator incident log. Methods: Our department uses an electronic reporting system to provide immediate information to both key department staff and the field service department. This study examines reports for five linac logs during 2015. The report attributes for analysis include frequency, level of documentation, who solved the problem, and type of fix used. Results: Of the reports, 36% were documented as resolved. In another 25% the resolution allowed treatment to proceed although the reported problem recurred within days. In 5% only intermediate troubleshooting was documented. The remainder lacked documentation. In 60% of the reports, radiation therapists resolved the problem, often by clearing the appropriate faults or reinitializing a software or hardware service. 22% were resolved by physics and 10% by field service engineers. The remaining 8% were resolved by IT, Facilities, or resolved spontaneously. Typical fixes, in order of scope, included clearing the fault and moving on, closing and re-opening the patient session or software, cycling power to a sub-unit, recalibrating a device (e.g., optical surface imaging), and calling in Field Service (usually resolving the problem through maintenance or component replacement). Conclusion: The reports with undocumented resolution represent a missed opportunity for learning. Frequency of who resolves a problem scales with the proximity of the person’s role (therapist, physicist, or service engineer), which is inversely related to the permanence of the resolution. Review of lessons learned from machine incident logs can form the basis for guidance to radiation therapists and medical physicists to minimize equipment downtime and

  11. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  12. Using real-time syndromic surveillance systems to help explore the acute impact of the air pollution incident of March/April 2014 in England.

    Science.gov (United States)

    Smith, Gillian E; Bawa, Zharain; Macklin, Yolande; Morbey, Roger; Dobney, Alec; Vardoulakis, Sotiris; Elliot, Alex J

    2015-01-01

    During March and early April 2014 there was widespread poor air quality across the United Kingdom. Public Health England used existing syndromic surveillance systems to monitor community health during the period. Short lived statistically significant rises in a variety of respiratory conditions, including asthma and wheeze, were detected. This incident has demonstrated the value of real-time syndromic surveillance systems, during an air pollution episode, for helping to explore the impact of poor air quality on community health in real-time. Crown Copyright © 2014. Published by Elsevier Inc. All rights reserved.

  13. Nervous System and Intracranial Tumour Incidence by Ethnicity in England, 2001–2007: A Descriptive Epidemiological Study

    Science.gov (United States)

    Maile, Edward J.; Barnes, Isobel; Finlayson, Alexander E.; Sayeed, Shameq; Ali, Raghib

    2016-01-01

    Background There is substantial variation in nervous system and intracranial tumour incidence worldwide. UK incidence data have limited utility because they group these diverse tumours together and do not provide data for individual ethnic groups within Blacks and South Asians. Our objective was to determine the incidence of individual tumour types for seven individual ethnic groups. Methods We used data from the National Cancer Intelligence Network on tumour site, age, sex and deprivation to identify 42,207 tumour cases. Self-reported ethnicity was obtained from the Hospital Episode Statistics database. We used mid-year population estimates from the Office for National Statistics. We analysed tumours by site using Poisson regression to estimate incidence rate ratios comparing non-White ethnicities to Whites after adjustment for sex, age and deprivation. Results Our study showed differences in tumour incidence by ethnicity for gliomas, meningiomas, pituitary tumours and cranial and paraspinal nerve tumours. Relative to Whites; South Asians, Blacks and Chinese have a lower incidence of gliomas (pethnicities. Blacks have a higher incidence of pituitary tumours relative to Whites (pethnicities. Conclusions We present incidence data of individual tumour types for seven ethnic groups. Current understanding of the aetiology of these tumours cannot explain our results. These findings suggest avenues for further work. PMID:27135830

  14. Distributed Fault Detection for a Class of Nonlinear Stochastic Systems

    Directory of Open Access Journals (Sweden)

    Bingyong Yan

    2014-01-01

    Full Text Available A novel distributed fault detection strategy for a class of nonlinear stochastic systems is presented. Different from the existing design procedures for fault detection, a novel fault detection observer, which consists of a nonlinear fault detection filter and a consensus filter, is proposed to detect the nonlinear stochastic systems faults. Firstly, the outputs of the nonlinear stochastic systems act as inputs of a consensus filter. Secondly, a nonlinear fault detection filter is constructed to provide estimation of unmeasurable system states and residual signals using outputs of the consensus filter. Stability analysis of the consensus filter is rigorously investigated. Meanwhile, the design procedures of the nonlinear fault detection filter are given in terms of linear matrix inequalities (LMIs. Taking the influence of the system stochastic noises into consideration, an outstanding feature of the proposed scheme is that false alarms can be reduced dramatically. Finally, simulation results are provided to show the feasibility and effectiveness of the proposed fault detection approach.

  15. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso; Alshareef, Husam N.

    2015-01-01

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  16. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  17. Epidemiology of systemic sclerosis: incidence, prevalence, survival, risk factors, malignancy, and environmental triggers.

    Science.gov (United States)

    Barnes, Jammie; Mayes, Maureen D

    2012-03-01

    To identify the recent data regarding prevalence, incidence, survival, and risk factors for systemic sclerosis (SSc) and to compare these data to previously published findings. SSc disease occurrence data are now available for Argentina, Taiwan, and India and continue to show wide variation across geographic regions. The survival rate is negatively impacted by older age of onset, male sex, scleroderma renal crisis, pulmonary fibrosis, pulmonary arterial hypertension, cancer, and antitopoisomerase and anti-U1 antibodies. It appears that silica exposure confers an increased risk for developing scleroderma, but this exposure accounts for a very small proportion of male patients. Smoking is not associated with increased SSc susceptibility. Malignancies are reported in scleroderma at an increased rate, but the magnitude of this risk and the type of cancer vary among reports. Prevalence and incidence of SSc appears to be greater in populations of European ancestry and lower in Asian groups. Exposure to silica dust appears to be an environmental trigger, but this only accounts for a small proportion of male cases. Evidence for increased risk of neoplasia is suggestive, but the magnitude of the risk and the types of malignancies vary among reports.

  18. Pilot Study for the Creation of a European Union Radiation Accident and Incident Data Exchange System (EURAIDE)

    International Nuclear Information System (INIS)

    Stewart, J.E.; Lefaure, C; Czarwinski, R.

    2004-01-01

    This study has had the objective of evaluating the feasibility of: (i) facilitating the establishment of national radiation accident and incident databases where there are none and to encourage the compatibility of such databases, (ii) establishing a European network to exchange radiological protection feedback from accidents and incidents, (iii) establishing summary reports of relevant accidents and incidents with the aim of identifying lessons to be learned, so that they can be used in radiation protection training programs, and (iv) upgrading the radiological safety in the countries applying to join the EU, by integrating them into the above efficient feedback exchange system. This report details the first stage of the project, which was to review the status of existing (or proposed) national mechanisms for collating data on radiation incidents. The objectives of this initial review were to: i) obtain detailed information regarding the means of capturing and collating data, the format of established or proposed data systems and accessibility of the final data, ii) to use this information to consider how a European platform to gather relevant data/accident reports might be established., and iii) to consider how the various elements of national data systems might be harmonised in order to facilitate the presentation and distribution of lessons learned. It was considered that the key aspects that would need to be addressed in order to determine the feasibility of a European wide data exchange mechanism were: - the criteria used for the classification and categorisation of incidents, - criteria for the selection of incidents from national data systems for inclusion in a European-wide system, - the implication of possible language problems. In order to illicit the required information a detailed questionnaire was sent to a total of 31 countries, being existing European Member States, applicant or associated countries. A full list of the countries and institutions

  19. Overview and Evaluation of a Smoke Modeling System and other Tools used during Wildfire Incident Deployments

    Science.gov (United States)

    ONeill, S. M.; Larkin, N. K.; Martinez, M.; Rorig, M.; Solomon, R. C.; Dubowy, J.; Lahm, P. W.

    2017-12-01

    Specialists operationally deployed to wildfires to forecast expected smoke conditions for the public use many tools and information. These Air Resource Advisors (ARAs) are deployed as part of the Wildland Fire Air Quality Response Program (WFAQRP) and rely on smoke models, monitoring data, meteorological information, and satellite information to produce daily Smoke Outlooks for a region impacted by smoke from wildfires. These Smoke Outlooks are distributed to air quality and health agencies, published online via smoke blogs and other social media, and distributed by the Incident Public Information Officer (PIO), and ultimately to the public. Fundamental to these operations are smoke modeling systems such as the BlueSky Smoke Modeling Framework, which combines fire activity information, mapped fuel loadings, consumption and emissions models, and air quality/dispersion models such as HYSPLIT to produce predictions of PM2.5 concentrations downwind of wildland fires. Performance of this system at a variety of meteorological resolutions, fire initialization information, and vertical allocation of emissions is evaluated for the Summer of 2015 when over 400,000 hectares burned in the northwestern US state of Washington and 1-hr average fine particulate matter (PM2.5) concentrations exceeded 700 μg/m3. The performance of the system at the 12-km, 4-km, and 1.33-km resolutions is evaluated using 1-hr average PM2.5 measurements from permanent monitors and temporary monitors deployed specifically for wildfires by ARAs on wildfire incident command teams. At the higher meteorological resolution (1.33-km) the terrain features are more detailed, showing better valley structures and in general, PM2.5 concentrations were greater in the valleys with the 1.33-km meteorological domain than with the 4-km domain.

  20. Nuclear power plant operating experiences from the IAEA/NEA Incident Reporting System 1999-2002

    International Nuclear Information System (INIS)

    2003-01-01

    Incident reporting has become an increasingly important aspect of the operation and regulation of all public health and safety-related industries. Diverse industries such as aeronautics, chemicals, pharmaceuticals and explosives all depend on operating experience feedback to provide lessons learned about safety. The Incident Reporting System (IRS) is an essential element of the system for feeding back international operating experience for nuclear power plants. IRS reports contain information on events of Safety significance with important lessons learned. These experiences assist in reducing or eliminating recurrence of events at other plants. The IRS is jointly operated and managed by the Nuclear Energy Agency (NEA), a semi-autonomous body within the Organisation for Economic Co-operation and Development (OECD), and the International Atomic Energy Agency (IAEA). It is important that sufficient national resources be allocated to enable timely and high quality reporting of events important to safety, and to share these events in the IRS database. The first report, which covered the period July 1996 - June 1999, was widely acclaimed and encouraged both agencies to prepare this second report in order to highlight important lessons learned from around 300 events reported to the IRS for the period July 1999 - December 2002. Several areas were selected in this report to show the range of important topics available in the IRS. These include different types of failure in a variety of plant systems, as well as human performance considerations. This report is primarily aimed at senior officials in industry and government who have decision-making roles in the nuclear power industry

  1. ACPR upgrade fuel motion detection system

    International Nuclear Information System (INIS)

    Kelly, J.G.; Stalker, K.T.

    1976-01-01

    Coded aperture imaging techniques are being applied to the problem of fuel motion detection in core disruptive safety experiments in the LMFBR. The upgraded Sandia Annular Core Pulse Reactor will be used for fuel motion studies, and a system is now being developed to image fuel motion through a slot in the core in l- and 7-pin experiments. The γ-rays emitted by the fuel will be modulated by a coded aperture and will form a pseudohologram on a scintillator. This shadowgram will be lens coupled first to an optical image intensifier, and then to a rotating prism framing camera. The goal is to obtain quality images of fuel with approximately 1 mm spatial resolution at about 10 4 frames/sec. Some of the feasibility milestones which have been reached thus far are the following: (1) A fuel pin shaped 252 Cf fission gamma ray source has been imaged through 1.27 cm of steel (simulating reactor containment). (2) A 252 Cf source has been imaged through 1.27 cm of steel with x-ray image intensifier amplification. (3) Collimation and shielding tests indicate that at ACPR it should be possible to obtain adequate signal to noise at the detector when the fuel is observed through a slot in the core

  2. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  3. EMIR: a configurable hierarchical system for event monitoring and incident response

    Science.gov (United States)

    Deich, William T. S.

    2014-07-01

    The Event Monitor and Incident Response system (emir) is a flexible, general-purpose system for monitoring and responding to all aspects of instrument, telescope, and general facility operations, and has been in use at the Automated Planet Finder telescope for two years. Responses to problems can include both passive actions (e.g. generating alerts) and active actions (e.g. modifying system settings). Emir includes a monitor-and-response daemon, plus graphical user interfaces and text-based clients that automatically configure themselves from data supplied at runtime by the daemon. The daemon is driven by a configuration file that describes each condition to be monitored, the actions to take when the condition is triggered, and how the conditions are aggregated into hierarchical groups of conditions. Emir has been implemented for the Keck Task Library (KTL) keyword-based systems used at Keck and Lick Observatories, but can be readily adapted to many event-driven architectures. This paper discusses the design and implementation of Emir , and the challenges in balancing the competing demands for simplicity, flexibility, power, and extensibility. Emir 's design lends itself well to multiple purposes, and in addition to its core monitor and response functions, it provides an effective framework for computing running statistics, aggregate values, and summary state values from the primitive state data generated by other subsystems, and even for creating quick-and-dirty control loops for simple systems.

  4. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  5. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  6. RETRAN code analysis of Tsuruga-2 plant chemical volume control system (CVCS) reactor coolant leakage incident

    International Nuclear Information System (INIS)

    Kawai, H.

    2001-01-01

    JAPC purchased RETRAN, a program for transient thermal hydraulic analysis of complex fluid flow system, from the U.S. Electric Power Research Institute in 1992. Since then, JAPC has been utilizing RETRAN to evaluate safety margins of actual plant operation, in coping with troubles (investigating trouble causes and establishing countermeasures), and supporting reactor operation (reviewing operational procedures etc.). In this paper, a result of plant analysis performed on a CVCS reactor primary coolant leakage incident which occurred at JAPC's Tsuruga-2 plant (4-loop PWR, 3423 MWt, 1160 MW) on July 12 of 1999 and, based on the result, we made a plan to modify our operational procedure for reactor primary coolant leakage events in order to make earlier plant shutdown and this reduced primary coolant leakage. (author)

  7. Reporter Concerns in 300 Mode-Related Incident Reports from NASA's Aviation Safety Reporting System

    Science.gov (United States)

    McGreevy, Michael W.

    1996-01-01

    A model has been developed which represents prominent reporter concerns expressed in the narratives of 300 mode-related incident reports from NASA's Aviation Safety Reporting System (ASRS). The model objectively quantifies the structure of concerns which persist across situations and reporters. These concerns are described and illustrated using verbatim sentences from the original narratives. Report accession numbers are included with each sentence so that concerns can be traced back to the original reports. The results also include an inventory of mode names mentioned in the narratives, and a comparison of individual and joint concerns. The method is based on a proximity-weighted co-occurrence metric and object-oriented complexity reduction.

  8. TU-D-201-04: Veracity of Data Elements in Radiation Oncology Incident Learning Systems

    International Nuclear Information System (INIS)

    Kapur, A; Evans, S; Brown, D; Ezzell, G; Hoopes, D; Dieterich, S; Kapetanovic, K; Tomlinson, C

    2016-01-01

    Purpose: Incident learning systems encompass volumes, varieties, values, and velocities of underlying data elements consistent with the V’s of big data. Veracity, the 5th V however exists only if there is high inter-rater reliability (IRR) within the data elements. The purpose of this work was to assess IRR in the nationally deployed RO-ILS: Radiation Oncology-Incident Learning System (R) sponsored by the American Society for Radiation Oncology (ASTRO) and the American Association of Physicists in Medicine (AAPM). Methods: Ten incident reports covering a wide range of scenarios were created in standardized narrative and video formats and disseminated to 67 volunteers of multiple disciplines from 26 institutions along with two published narratives from the International Commission of Radiological Protection to assess IRR on a nationally representative level. The volunteers were instructed to independently enter the associated data elements in a test version of RO-ILS over a 3-week period. All responses were aggregated into a spreadsheet to assess IRR using free-marginal kappa metrics. Results: 48 volunteers from 21 institutions completed all reports in the study period. The average kappa score for all raters across all critical data elements was 0.659 [range 0.326–1.000]. Statistically significant differences (p <0.05) were noted between reporters of different disciplines and raters with varying levels of experience. Kappa scores were high for event classification (0.781) and contributory factors (0.777) and low for likelihood-of-harm (0.326). IRR was highest among AAPM-ASTRO members (0.672) and lowest among trainees (0.463). Conclusion: A moderate-to-substantial level of IRR in RO-ILS was noted in this study. Although the number of events reviewed in this study was small, opportunities for improving the taxonomy for the lower scoring data elements as well as specific educational targets for training were identified by assessing data veracity quantitatively

  9. TU-D-201-04: Veracity of Data Elements in Radiation Oncology Incident Learning Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kapur, A [Northwell Health System, New Hyde Park, NY (United States); Evans, S [Yale University New Haven, CT (United States); Brown, D [University of California, San Diego, La Jolla, CA (United States); Ezzell, G [Mayo Clinic Arizona, Phoenix, AZ (United States); Hoopes, D [The University of California San Diego, San Diego, CA (United States); Dieterich, S [UC Davis Medical Center, Sacramento, CA (United States); Kapetanovic, K; Tomlinson, C [American Society for Radiation Oncology, Fairfax, VA (United States)

    2016-06-15

    Purpose: Incident learning systems encompass volumes, varieties, values, and velocities of underlying data elements consistent with the V’s of big data. Veracity, the 5th V however exists only if there is high inter-rater reliability (IRR) within the data elements. The purpose of this work was to assess IRR in the nationally deployed RO-ILS: Radiation Oncology-Incident Learning System (R) sponsored by the American Society for Radiation Oncology (ASTRO) and the American Association of Physicists in Medicine (AAPM). Methods: Ten incident reports covering a wide range of scenarios were created in standardized narrative and video formats and disseminated to 67 volunteers of multiple disciplines from 26 institutions along with two published narratives from the International Commission of Radiological Protection to assess IRR on a nationally representative level. The volunteers were instructed to independently enter the associated data elements in a test version of RO-ILS over a 3-week period. All responses were aggregated into a spreadsheet to assess IRR using free-marginal kappa metrics. Results: 48 volunteers from 21 institutions completed all reports in the study period. The average kappa score for all raters across all critical data elements was 0.659 [range 0.326–1.000]. Statistically significant differences (p <0.05) were noted between reporters of different disciplines and raters with varying levels of experience. Kappa scores were high for event classification (0.781) and contributory factors (0.777) and low for likelihood-of-harm (0.326). IRR was highest among AAPM-ASTRO members (0.672) and lowest among trainees (0.463). Conclusion: A moderate-to-substantial level of IRR in RO-ILS was noted in this study. Although the number of events reviewed in this study was small, opportunities for improving the taxonomy for the lower scoring data elements as well as specific educational targets for training were identified by assessing data veracity quantitatively

  10. Test and assessment method of Automotive Safety Systems (SSB) particularly to monitor traffic incidents

    Science.gov (United States)

    Pijanowski, B.; Łukjanow, S.; Burliński, R.

    2016-09-01

    The rapid development of telematics, particularly mobile telephony (GSM), wireless data transmission (GPRS) and satellite positioning (GPS) noticeable in the last decade, resulted in an almost unlimited growth of the possibilities for monitoring of mobile objects. These solutions are already widely used in the so-called “Intelligent Transport Systems” - ITS and affect a significant increase for road safety. The article describes a method of testing and evaluation of Car Safety Systems (Polish abbreviation - SSB) especially for monitoring traffic incidents, such as collisions and accidents. The algorithm of SSB testing process is also presented. Tests are performed on the dynamic test bench, part of which is movable platform with car security system mounted on it. Crash tests with a rigid obstacle are carried out instead of destructive attempts to crash test of the entire vehicle which is expensive. The tested system, depending on the simulated traffic conditions, is mounted in such a position and with the use of components, indicated by the manufacturer for the automotive safety system installation in a vehicle, for which it is intended. Then, the tests and assessments are carried out.

  11. Tracking Polychlorinated Biphenyls (PCB) after an incident along a river system - Case study Elbe River

    Science.gov (United States)

    Kleisinger, Carmen; Dietrich, Stephan; Kehl, Nora; Claus, Evelyn; Schubert, Birgit

    2017-04-01

    In spring 2015, extremely high concentrations of Polychlorinated Biphenyls (PCB) well above the long-term average were detected in suspended particulate matter (SPM) within the River Elbe. They were released due to abrasive blasting of the old coating from a bridge in the upper part of the River, approximately 50 km upstream of the first measurement site. PCBs are persistent organic pollutants, preferentially bound to fine-grained fractions of the SPM. Results from monitoring of contaminants in SPM along the Elbe indicate the further dispersal of the PCB-contaminated sediments. These measurements include yearly investigations on PCB concentrations in sediments in the inner reaches of the Elbe, an additional longitudinal survey in 2015 and monthly monitoring of PCBs in SPM at stations along the river including the Elbe estuary (Germany). The Elbe estuary is of major economic importance since Hamburg harbour, one of the largest harbours in Europe, is located there. Maintaining the harbour includes dredging and, i.a., relocating large amounts of the dredged material within the water body. High PCB concentrations in sediments could lead to restrictions on the relocation of these sediments. This study aims at tracking the fate of PCB contaminated material released from the point source of the incident site along the whole river stretch and at estimating its impact on the quality of sediments and consequently on dredging activities in the estuary. The ratio of high (PCB 138, 152 and 180) versus low (PCB 28, 52, 101) chlorinated PCB congeners proved to be a suitable tracer to distinguish the PCB load released by the incident from the long-term background signals. As Delor 106/Clophen A60, which contains approx. 90% hexa- to decachloric congeners, was an additive in the coating of the bridge, the pattern of PCBs released by the incident is dominated by the highly chlorinated PCB-congeners PCB 138, 153 and 180. At the tidal weir Geesthacht, the entrance to the estuary, an

  12. Holographic elements and curved slit used to enlarge field of view in rocket detection system

    Science.gov (United States)

    Breton, Mélanie; Fortin, Jean; Lessard, Roger A.; Châteauneuf, Marc

    2006-09-01

    Rocket detection over a wide field of view is an important issue in the protection of light armored vehicle. Traditionally, the detection occurs in UV band, but recent studies have shown the existence of significant emission peaks in the visible and near infrared at rocket launch time. The use of the visible region is interesting in order to reduce the weight and cost of systems. Current methods to detect those specific peaks involve use of interferometric filters. However, they fail to combine wide angle with wavelength selectivity. A linear array of volume holographic elements combined with a curved exit slit is proposed for the development of a wide field of view sensor for the detection of solid propellant motor launch flash. The sensor is envisaged to trigger an active protection system. On the basis of geometric theory, a system has been designed. It consists of a collector, a linear array of holographic elements, a curved slit and a detector. The collector is an off-axis parabolic mirror. Holographic elements are recorded subdividing a hologram film in regions, each individually exposed with a different incidence angle. All regions have a common diffraction angle. The incident angle determines the instantaneous field of view of the elements. The volume hologram performs the function of separating and focusing the diffracted beam on an image plane to achieve wavelength filtering. Conical diffraction property is used to enlarge the field of view in elevation. A curved slit was designed to correspond to oblique incidence of the holographic linear array. It is situated at the image plane and filters the diffracted spectrum toward the sensor. The field of view of the design was calculated to be 34 degrees. This was validated by a prototype tested during a field trial. Results are presented and analyzed. The system succeeded in detecting the rocket launch flash at desired fields of view.

  13. Protection system for minimizing the consequences of a flow blockage incident at a pool-type research reactor

    International Nuclear Information System (INIS)

    de Vries, J.W.; van Dam, H.; Gysler, G.

    1990-01-01

    Safety analysis activities were performed for the HOR, a pool-type research reactor with plate-type fuel elements and a maximum licensed power of 3 MW. Following internationally accepted guidelines, a wide variety of possible process disturbances has been considered. For the HOR the most aggravating accident conditions could result from a sudden flow blockage of cooling channels. If this event occurs in the high power density region of the core, a decrease of the hot channel flow either causes flow reversal or prompts burnout. Unless the reactor is scrammed in time, the fuel plates will heat up rapidly and local melting will occur with possible propagation of voiding and burnout to adjacent channels. In the analysis, melting of the cladding has been considered by using a simplified model approach. The number of voided coolant channels, as well as the propagation rate of fuel plates reaching locally the melting temperature, were calculated for different conditions of operation. In order to reduce the risk of a fuel melt accident occurring at the HOR, the protection system features a special design option. The system recognizes cooling channel voiding by detection of a sudden decrease of neutron flux. In the present work, it has been shown that a flow blockage incident can be detected in the early stages of development. Also, in accordance with the results of experimental tests, it can be concluded that in many cases melting of fuel plates will be effectively prevented. If such an accident occurs on a very fast time scale, at least the radiological consequences are significantly mitigated by preventing propagation, thus limiting the number of molten fuel plates

  14. The photon detection system of the SAPHIR spectrometer

    International Nuclear Information System (INIS)

    Joepen, N.

    1990-09-01

    Worldwide a new generation of Electron Accelerators with energies below 5 GeV and a high duty cycle up to 100% is being built or planned. The first machine of this kind is ELSA, the Electron Stretcher and Accelerator, at the Physics Institute of Bonn University. Due to the high duty cycle of ELSA, experiments with tagged photon beams and a large angular acceptance become possible. At present SAPHIR, a new magnetic detector, especially layed out to detect multi-particle final states with good accuracy, is going into operation. Besides a large arrangement of drift chambers, for a good momentum resolution, and a trigger- and time-of-flight counter system, for particle identification, one of the main features of SAPHIR is a good photon detection capability. This is accomplished by a large electromagnetic calorimeter consisting of 98 modules covering a detection area of about 16 m 2 in forward direction. For the calorimeter a brass-gas-sandwich detector was developed. Its signal wires are strung perpendicular to the converter planes. The chambers are filled with a standard gas mixture Ar/CH 4 (90:10) at atmospheric pressure and operated with a considerably high voltage in the semi-proportional mode. A sample of nine shower counter modules was tested at the electron test beam of the Bonn 2.5 GeV electron synchrotron. An energy resolution of σ(E)/(E*√E(GeV)) = 13.55 ± 0.6% for a single module was achieved. The incident angle of the electrons was varied between 0 and 45 degrees. No significant change of energy resolution and linearity was observed. Combining the information from wire and cathode signals a position resolution (E = 1 GeV:Φ=0deg → σ = 15 mm, Φ=45deg → σ x = 19 mm) was reached. The second part of this paper gives a description of the shower counter arrangement in the SAPHIR detector. It requires a sophisticated control and calibration system, whose details are presented. Further on some aspects of the calorimeter calibration procedure are discussed

  15. Incidence of patient safety events and process-related human failures during intra-hospital transportation of patients: retrospective exploration from the institutional incident reporting system.

    Science.gov (United States)

    Yang, Shu-Hui; Jerng, Jih-Shuin; Chen, Li-Chin; Li, Yu-Tsu; Huang, Hsiao-Fang; Wu, Chao-Ling; Chan, Jing-Yuan; Huang, Szu-Fen; Liang, Huey-Wen; Sun, Jui-Sheng

    2017-11-03

    Intra-hospital transportation (IHT) might compromise patient safety because of different care settings and higher demand on the human operation. Reports regarding the incidence of IHT-related patient safety events and human failures remain limited. To perform a retrospective analysis of IHT-related events, human failures and unsafe acts. A hospital-wide process for the IHT and database from the incident reporting system in a medical centre in Taiwan. All eligible IHT-related patient safety events between January 2010 to December 2015 were included. Incidence rate of IHT-related patient safety events, human failure modes, and types of unsafe acts. There were 206 patient safety events in 2 009 013 IHT sessions (102.5 per 1 000 000 sessions). Most events (n=148, 71.8%) did not involve patient harm, and process events (n=146, 70.9%) were most common. Events at the location of arrival (n=101, 49.0%) were most frequent; this location accounted for 61.0% and 44.2% of events with patient harm and those without harm, respectively (pprocess step was the preparation of the transportation team (n=91, 48.9%). Contributing unsafe acts included perceptual errors (n=14, 7.5%), decision errors (n=56, 30.1%), skill-based errors (n=48, 25.8%), and non-compliance (n=68, 36.6%). Multivariate analysis showed that human failure found in the arrival and hand-off sub-process (OR 4.84, pprocess at the location of arrival and prevent errors other than omissions. Long-term monitoring of IHT-related events is also warranted. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. Operating Experience from Events Reported to the IAEA Incident Reporting System for Research Reactors

    International Nuclear Information System (INIS)

    2015-03-01

    Operating experience feedback is an effective mechanism in providing lessons learned from events and the associated corrective actions to prevent them, helping to improve safety at nuclear installations. The Incident Reporting System for Research Reactors (IRSRR), which is operated by the IAEA, is an important tool for international exchange of operating experience feedback for research reactors. The IRSRR reports contain information on events of safety significance with their root causes and lessons learned which help in reducing the occurrence of similar events at research reactors. To improve the effectiveness of the system, it is essential that national organizations demonstrate an appropriate interest for the timely reporting of events important to safety and share the information in the IRSRR database. At their biennial technical meetings, the IRSRR national coordinators recommended collecting the operating experience from the events reported to the IRSRR and disseminating it in an IAEA publication. This publication highlights the root causes, safety significance, lessons learned, corrective actions and the causal factors for the events reported to the IRSRR up to September 2014. The publication also contains relevant summary information on research reactor events from sources other than the IRSRR, operating experience feedback from the International Reporting System for Operating Experience considered relevant to research reactors, and a description of the elements of an operating experience programme as established by the IAEA safety standards. This publication will be of use to research reactor operating organizations, regulators and designers, and any other organizations or individuals involved in the safety of research reactors

  17. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-01-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched

  18. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  19. Laser Obstacle Detection System Flight Testing

    National Research Council Canada - National Science Library

    Davis, Timothy

    2003-01-01

    ...). The Aviation Applied Technology Directorate (AATD) was contracted to mount the HELLAS sensor on the nose of a UH-60L Blackhawk helicopter and to conduct flight tests to evaluate the HELLAS obstacle detection sensor...

  20. Optimizing Systems of Threshold Detection Sensors

    National Research Council Canada - National Science Library

    Banschbach, David C

    2008-01-01

    .... Below the threshold all signals are ignored. We develop a mathematical model for setting individual sensor thresholds to obtain optimal probability of detecting a significant event, given a limit on the total number of false positives allowed...

  1. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan; Gooneratne, Chinthaka Pasan; Kosel, Jü rgen

    2012-01-01

    magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer

  2. Underwater electric field detection system based on weakly electric fish

    Science.gov (United States)

    Xue, Wei; Wang, Tianyu; Wang, Qi

    2018-04-01

    Weakly electric fish sense their surroundings in complete darkness by their active electric field detection system. However, due to the insufficient detection capacity of the electric field, the detection distance is not enough, and the detection accuracy is not high. In this paper, a method of underwater detection based on rotating current field theory is proposed to improve the performance of underwater electric field detection system. First of all, we built underwater detection system based on the theory of the spin current field mathematical model with the help of the results of previous researchers. Then we completed the principle prototype and finished the metal objects in the water environment detection experiments, laid the foundation for the further experiments.

  3. Thermoelectric-Driven Sustainable Sensing and Actuation Systems for Fault-Tolerant Nuclear Incidents

    Energy Technology Data Exchange (ETDEWEB)

    Longtin, Jon [Stony Brook Univ., NY (United States)

    2016-02-08

    The Fukushima Daiichi nuclear incident in March 2011 represented an unprecedented stress test on the safety and backup systems of a nuclear power plant. The lack of reliable information from key components due to station blackout was a serious setback, leaving sensing, actuation, and reporting systems unable to communicate, and safety was compromised. Although there were several independent backup power sources for required safety function on site, ultimately the batteries were drained and the systems stopped working. If, however, key system components were instrumented with self-powered sensing and actuation packages that could report indefinitely on the status of the system, then critical system information could be obtained while providing core actuation and control during off-normal status for as long as needed. This research project focused on the development of such a self-powered sensing and actuation system. The electrical power is derived from intrinsic heat in the reactor components, which is both reliable and plentiful. The key concept was based around using thermoelectric generators that can be integrated directly onto key nuclear components, including pipes, pump housings, heat exchangers, reactor vessels, and shielding structures, as well as secondary-side components. Thermoelectric generators are solid-state devices capable of converting heat directly into electricity. They are commercially available technology. They are compact, have no moving parts, are silent, and have excellent reliability. The key components to the sensor package include a thermoelectric generator (TEG), microcontroller, signal processing, and a wireless radio package, environmental hardening to survive radiation, flooding, vibration, mechanical shock (explosions), corrosion, and excessive temperature. The energy harvested from the intrinsic heat of reactor components can be then made available to power sensors, provide bi-directional communication, recharge batteries for other

  4. Thermoelectric-Driven Sustainable Sensing and Actuation Systems for Fault-Tolerant Nuclear Incidents

    International Nuclear Information System (INIS)

    Longtin, Jon

    2015-09-01

    The Fukushima Daiichi nuclear incident in March 2011 represented an unprecedented stress test on the safety and backup systems of a nuclear power plant. The lack of reliable information from key components due to station blackout was a serious setback, leaving sensing, actuation, and reporting systems unable to communicate, and safety was compromised. Although there were several independent backup power sources for required safety function on site, ultimately the batteries were drained and the systems stopped working. If, however, key system components were instrumented with self-powered sensing and actuation packages that could report indefinitely on the status of the system, then critical system information could be obtained while providing core actuation and control during off-normal status for as long as needed. This research project focused on the development of such a self-powered sensing and actuation system. The electrical power is derived from intrinsic heat in the reactor components, which is both reliable and plentiful. The key concept was based around using thermoelectric generators that can be integrated directly onto key nuclear components, including pipes, pump housings, heat exchangers, reactor vessels, and shielding structures, as well as secondary-side components. Thermoelectric generators are solid-state devices capable of converting heat directly into electricity. They are commercially available technology. They are compact, have no moving parts, are silent, and have excellent reliability. The key components to the sensor package include a thermoelectric generator (TEG), microcontroller, signal processing, and a wireless radio package, environmental hardening to survive radiation, flooding, vibration, mechanical shock (explosions), corrosion, and excessive temperature. The energy harvested from the intrinsic heat of reactor components can be then made available to power sensors, provide bi-directional communication, recharge batteries for other

  5. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  6. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  7. Effect of oblique incidence on silver nanomaterials fabricated in water via ultrafast laser ablation for photonics and explosives detection

    Energy Technology Data Exchange (ETDEWEB)

    Krishna Podagatlapalli, G. [Advanced Center of Research in High Energy Materials (ACRHEM), University of Hyderabad, Prof. C. R. Rao Road, Hyderabad 500046 (India); Hamad, Syed [School of Physics, University of Hyderabad, Prof. C. R. Rao Road, Hyderabad 500046 (India); Ahamad Mohiddon, Md. [Centre for Nanotechnology University of Hyderabad, Prof. C. R. Rao Road, Hyderabad 500046 (India); Venugopal Rao, S., E-mail: svrsp@uohyd.ernet.in [Advanced Center of Research in High Energy Materials (ACRHEM), University of Hyderabad, Prof. C. R. Rao Road, Hyderabad 500046 (India)

    2014-06-01

    Highlights: •Effect of non-zero angle of incidence on ps ablation of Ag investigated. •Ag colloids were evaluated by TEM, UV–vis absorption spectra and fs-DFWM. •30° incident angle provided Ag NPs of small size with higher yields. •FESEM, AFM, Raman data revealed the fabrication of Ag nanostructures. •Utility of Ag nanostructures surfaces for multiple SERS studies demonstrated. -- Abstract: Picosecond (ps) laser ablation of silver (Ag) substrate submerged in double distilled water was performed at 800 nm for different angles of incidence of 5°, 15°, 30° and 45°. Prepared colloidal solutions were characterized through transmission electron microscopy, UV absorption spectroscopy to explore their morphologies and surface plasmon resonance (SPR) properties. Third order nonlinear optical (NLO) characterization of colloids was performed using degenerate four wave mixing (DFWM) technique with ∼40 fs laser pulses at 800 nm and the NLO coefficients were obtained. Detailed analysis of the data obtained from colloidal solutions suggested that superior results in terms of yield, sizes of the NPs, SPR peak position were achieved for ablation performed at 30° incident angle. Surface enhanced Raman spectra (SERS) of Rhodamine 6G from nanostructured substrates were investigated using excitation wavelengths of 532 and 785 nm. In both the cases substrates prepared at 30° incident angle exhibited superior enhancement in the Raman signatures with a best enhancement factor achieved being >10{sup 8}. SERS of an explosive molecule 5-amino, 3-nitro, -1H-1,2,4-nitrozole (ANTA) was also demonstrated from these nanostructured substrates. Multiple usage of Ag nanostructures for SERS studies revealed that structures prepared at 30° incident angle provided superior performance amongst all.

  8. Marshall Grazing Incidence X-ray Spectrometer (MaGIXS) Slit-Jaw Imaging System

    Science.gov (United States)

    Wilkerson, P.; Champey, P. R.; Winebarger, A. R.; Kobayashi, K.; Savage, S. L.

    2017-12-01

    The Marshall Grazing Incidence X-ray Spectrometer is a NASA sounding rocket payload providing a 0.6 - 2.5 nm spectrum with unprecedented spatial and spectral resolution. The instrument is comprised of a novel optical design, featuring a Wolter1 grazing incidence telescope, which produces a focused solar image on a slit plate, an identical pair of stigmatic optics, a planar diffraction grating and a low-noise detector. When MaGIXS flies on a suborbital launch in 2019, a slit-jaw camera system will reimage the focal plane of the telescope providing a reference for pointing the telescope on the solar disk and aligning the data to supporting observations from satellites and other rockets. The telescope focuses the X-ray and EUV image of the sun onto a plate covered with a phosphor coating that absorbs EUV photons, which then fluoresces in visible light. This 10-week REU project was aimed at optimizing an off-axis mounted camera with 600-line resolution NTSC video for extremely low light imaging of the slit plate. Radiometric calculations indicate an intensity of less than 1 lux at the slit jaw plane, which set the requirement for camera sensitivity. We selected a Watec 910DB EIA charge-coupled device (CCD) monochrome camera, which has a manufacturer quoted sensitivity of 0.0001 lux at F1.2. A high magnification and low distortion lens was then identified to image the slit jaw plane from a distance of approximately 10 cm. With the selected CCD camera, tests show that at extreme low-light levels, we achieve a higher resolution than expected, with only a moderate drop in frame rate. Based on sounding rocket flight heritage, the launch vehicle attitude control system is known to stabilize the instrument pointing such that jitter does not degrade video quality for context imaging. Future steps towards implementation of the imaging system will include ruggedizing the flight camera housing and mounting the selected camera and lens combination to the instrument structure.

  9. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  10. Final evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Carlson, R.; Brewer, W.; Lanham, R.

    1989-01-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed

  11. Fuel rod failure detection method and system

    International Nuclear Information System (INIS)

    Assmann, H.; Janson, W.; Stehle, H.; Wahode, P.

    1975-01-01

    The inventor claims a method for the detection of a defective fuel rod cladding tube or of inleaked water in the cladding tube of a fuel rod in the fuel assembly of a pressurized-water reactor. The fuel assembly is not disassembled but examined as a whole. In the examination, the cladding tube is heated near one of its two end plugs, e.g. with an attached high-frequency inductor. The water contained in the cladding tube evaporates, and steam bubbles or a condensate are detected by the ultrasonic impulse-echo method. It is also possible to measure the delay of the temperature rise at the end plug or to determine the cooling energy required to keep the end plug temperature stable and thus to detect water ingression. (DG/AK) [de

  12. Incidence, risk factors and outcome of nosocomial pneumonia in patients with central nervous system infections

    Directory of Open Access Journals (Sweden)

    Gajović Olgica

    2011-01-01

    Full Text Available Introduction. Pneumonia is the most frequent nosocomial infection in intensive care units. The reported frequency varies with definition, the type of hospital or intensive care units and the population of patients. The incidence ranges from 6.8-27%. Objective. The objective of this study was to determine the frequency, risk factors and mortality of nosocomial pneumonia in intensive care patients. Methods. We analyzed retrospectively and prospectively the collected data of 180 patients with central nervous system infections who needed to stay in the intensive care unit for more than 48 hours. This study was conducted from 2003 to 2009 at the Clinical Centre of Kragujevac. Results. During the study period, 54 (30% patients developed nosocomial pneumonia. The time to develop pneumonia was 10±6 days. We found that the following risk factors for the development of nosocomial pneumonia were statistically significant: age, Glasgow Coma Scale (GCS score <9, mechanical ventilation, duration of mechanical ventilation, tracheostomy, presence of nasogastric tube and enteral feeding. The most commonly isolated pathogens were Klebsiella-Enterobacter spp. (33.3%, Pseudomonas aeruginosa (24.1%, Acinetobacter spp. (16.6% and Staphylococcus aureus (25.9%. Conclusion. Nosocomial pneumonia is the major cause of morbidity and mortality of patients with central nervous system infections. Patients on mechanical ventilation are particularly at a high risk. The mortality rate of patients with nosocomial pneumonia was 54.4% and it was five times higher than in patients without pneumonia.

  13. Developing an incident management system to support Ebola response -- Liberia, July-August 2014.

    Science.gov (United States)

    Pillai, Satish K; Nyenswah, Tolbert; Rouse, Edward; Arwady, M Allison; Forrester, Joseph D; Hunter, Jennifer C; Matanock, Almea; Ayscue, Patrick; Monroe, Benjamin; Schafer, Ilana J; Poblano, Luis; Neatherlin, John; Montgomery, Joel M; De Cock, Kevin M

    2014-10-17

    The ongoing Ebola virus disease (Ebola) outbreak in West Africa is the largest and most sustained Ebola epidemic recorded, with 6,574 cases. Among the five affected countries of West Africa (Liberia, Sierra Leone, Guinea, Nigeria, and Senegal), Liberia has had the highest number cases (3,458). This epidemic has severely strained the public health and health care infrastructure of Liberia, has resulted in restrictions in civil liberties, and has disrupted international travel. As part of the initial response, the Liberian Ministry of Health and Social Welfare (MOHSW) developed a national task force and technical expert committee to oversee the management of the Ebola-related activities. During the third week of July 2014, CDC deployed a team of epidemiologists, data management specialists, emergency management specialists, and health communicators to assist MOHSW in its response to the growing Ebola epidemic. One aspect of CDC's response was to work with MOHSW in instituting incident management system (IMS) principles to enhance the organization of the response. This report describes MOHSW's Ebola response structure as of mid-July, the plans made during the initial assessment of the response structure, the implementation of interventions aimed at improving the system, and plans for further development of the response structure for the Ebola epidemic in Liberia.

  14. Intrusion Detection in NEAR System by Anti-denoising Traffic Data Series using Discrete Wavelet Transform

    Directory of Open Access Journals (Sweden)

    VANCEA, F.

    2014-11-01

    Full Text Available The paper presents two methods for detecting anomalies in data series derived from network traffic. Intrusion detection systems based on network traffic analysis are able to respond to incidents never seen before by detecting anomalies in data series extracted from the traffic. Some anomalies manifest themselves as pulses of various sizes and shapes, superimposed on series corresponding to normal traffic. In order to detect those impulses we propose two methods based on discrete wavelet transformation. Their effectiveness expressed in relative thresholds on pulse amplitude for no false negatives and no false positives is then evaluated against pulse duration and Hurst characteristic of original series. Different base functions are also evaluated for efficiency in the context of the proposed methods.

  15. Posterior diaphragmatic defect detected on chest CT: the incidence according to age and the lateral chest radiographic appearances

    International Nuclear Information System (INIS)

    Lee, Son Youl; Choi, Yo Won; Jeon, Seok Chol; Heo, Jeong Nam; Park, Choong Ki

    2007-01-01

    We wanted to investigate the incidence of posterior diaphragmatic defect on chest CT in various age groups and its lateral chest radiographic appearances. The chest CT scans of 78 patients of various ages with posterior diaphragmatic defect were selected among 1,991 patients, and they were analyzed for the incidence of defect in various age groups, the defect location and the herniated contents. Their lateral chest radiographs were analyzed for the shape of the posterior diaphragm and the posterior costophrenic sulcus. The patients' ages ranged from 34 to 87 with the tendency of a higher incidence in the older patients. The defect most frequently involved the medial two thirds (n = 49, 50.4%) and middle one third (n = 36, 37%) of the posterior diaphragm. The retroperitoneal fat was herniated into the thorax through the defect in all patients, and sometimes with the kidney (n = 8). Lateral chest radiography showed a normal diaphragmatic contour (n = 51, 49.5%), blunting of the posterior costophrenic sulcus (n = 41, 39.8%), focal humping of the posterior diaphragm (n = 7, 6.8%), or upward convexity (n = 4, 3.9%) of the posterior costophrenic sulcus on the affected side. The posterior diaphragmatic defect discovered in asymptomatic patients who are without a history of peridiaphragmatic disease is most likely acquired, and this malady increases in incidence according to age. An abnormal contour of the posterior diaphragm or the costophrenic sulcus on a lateral chest radiograph may be a finding of posterior diaphragmatic defect

  16. Incidence and Interrelated Factors in Patients With Congenital Hypothyroidism as Detected by Newborn Screening in Guangxi, China

    Directory of Open Access Journals (Sweden)

    Xin Fan MD

    2015-01-01

    Full Text Available Background. A newborn screening program (NSP for congenital hypothyroidism (CH was carried out in Guangxi in order to understand the incidence of CH and the factors interrelated to major types of CH in this region of China. Methods. During 2009 to 2013, data from 930 612 newborns attending NSP in Guangxi were collected. Patients were classified with either permanent CH (PCH or transient CH (TCH after 2 years of progressive study. Results. A total of 1210 patients were confirmed with CH with an incidence of 1/769, including 68 PCH and 126 TCH cases with incidences of 1/6673 and 1/3385, respectively. The frequency of thyroid stimulating hormone values greater than 5 mIU/L was 7.2%, which, based on WHO guidelines, suggests that the population was mildly iodine deficient. Conclusions. The incidence of CH was high in Guangxi. Approximately two thirds of CH patients were TCH, which may be due to a deficiency in iodine within the population.

  17. Risk Factor Detection as a Metric of STARHS Performance for HIV Incidence Surveillance Among Female Sex Workers in Kigali, Rwanda

    NARCIS (Netherlands)

    Braunstein, Sarah L.; van de Wijgert, Janneke H.; Vyankandondera, Joseph; Kestelyn, Evelyne; Ntirushwa, Justin; Nash, Denis

    2012-01-01

    The epidemiologic utility of STARHS hinges not only on producing accurate estimates of HIV incidence, but also on identifying risk factors for recent HIV infection. As part of an HIV seroincidence study, 800 Rwandan female sex workers (FSW) were HIV tested, with those testing positive further tested

  18. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...... of different tampering events. In order to assess the developed methods we have collected a large data set, which contains sequences from different active cameras at different scenarios. We evaluate our sys- tem on these data and the results are encouraging with a very high detecting rate and relatively few...

  19. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  20. Ventilator-Related Adverse Events: A Taxonomy and Findings From 3 Incident Reporting Systems.

    Science.gov (United States)

    Pham, Julius Cuong; Williams, Tamara L; Sparnon, Erin M; Cillie, Tam K; Scharen, Hilda F; Marella, William M

    2016-05-01

    In 2009, researchers from Johns Hopkins University's Armstrong Institute for Patient Safety and Quality; public agencies, including the FDA; and private partners, including the Emergency Care Research Institute and the University HealthSystem Consortium (UHC) Safety Intelligence Patient Safety Organization, sought to form a public-private partnership for the promotion of patient safety (P5S) to advance patient safety through voluntary partnerships. The study objective was to test the concept of the P5S to advance our understanding of safety issues related to ventilator events, to develop a common classification system for categorizing adverse events related to mechanical ventilators, and to perform a comparison of adverse events across different adverse event reporting systems. We performed a cross-sectional analysis of ventilator-related adverse events reported in 2012 from the following incident reporting systems: the Pennsylvania Patient Safety Authority's Patient Safety Reporting System, UHC's Safety Intelligence Patient Safety Organization database, and the FDA's Manufacturer and User Facility Device Experience database. Once each organization had its dataset of ventilator-related adverse events, reviewers read the narrative descriptions of each event and classified it according to the developed common taxonomy. A Pennsylvania Patient Safety Authority, FDA, and UHC search provided 252, 274, and 700 relevant reports, respectively. The 3 event types most commonly reported to the UHC and the Pennsylvania Patient Safety Authority's Patient Safety Reporting System databases were airway/breathing circuit issue, human factor issues, and ventilator malfunction events. The top 3 event types reported to the FDA were ventilator malfunction, power source issue, and alarm failure. Overall, we found that (1) through the development of a common taxonomy, adverse events from 3 reporting systems can be evaluated, (2) the types of events reported in each database were related

  1. Ventilator-Related Adverse Events: A Taxonomy and Findings From 3 Incident Reporting Systems

    Science.gov (United States)

    Pham, Julius Cuong; Williams, Tamara L; Sparnon, Erin M; Cillie, Tam K; Scharen, Hilda F; Marella, William M

    2016-01-01

    BACKGROUND: In 2009, researchers from Johns Hopkins University's Armstrong Institute for Patient Safety and Quality; public agencies, including the FDA; and private partners, including the Emergency Care Research Institute and the University HealthSystem Consortium (UHC) Safety Intelligence Patient Safety Organization, sought to form a public-private partnership for the promotion of patient safety (P5S) to advance patient safety through voluntary partnerships. The study objective was to test the concept of the P5S to advance our understanding of safety issues related to ventilator events, to develop a common classification system for categorizing adverse events related to mechanical ventilators, and to perform a comparison of adverse events across different adverse event reporting systems. METHODS: We performed a cross-sectional analysis of ventilator-related adverse events reported in 2012 from the following incident reporting systems: the Pennsylvania Patient Safety Authority's Patient Safety Reporting System, UHC's Safety Intelligence Patient Safety Organization database, and the FDA's Manufacturer and User Facility Device Experience database. Once each organization had its dataset of ventilator-related adverse events, reviewers read the narrative descriptions of each event and classified it according to the developed common taxonomy. RESULTS: A Pennsylvania Patient Safety Authority, FDA, and UHC search provided 252, 274, and 700 relevant reports, respectively. The 3 event types most commonly reported to the UHC and the Pennsylvania Patient Safety Authority's Patient Safety Reporting System databases were airway/breathing circuit issue, human factor issues, and ventilator malfunction events. The top 3 event types reported to the FDA were ventilator malfunction, power source issue, and alarm failure. CONCLUSIONS: Overall, we found that (1) through the development of a common taxonomy, adverse events from 3 reporting systems can be evaluated, (2) the types of

  2. Incidences and Risk Factors of Organ Manifestations in the Early Course of Systemic Sclerosis

    DEFF Research Database (Denmark)

    Jaeger, Veronika K; Wirz, Elina G; Allanore, Yannick

    2016-01-01

    risk factors associated with incident renal crisis. CONCLUSION: In SSc patients presenting early after RP onset, approximately half of all incident organ manifestations occur within 2 years and have a simultaneous rather than a sequential onset. These findings have implications for the design of new...

  3. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  4. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  5. Radiation sensitive devices and systems for detection of radioactive materials and related methods

    Science.gov (United States)

    Kotter, Dale K

    2014-12-02

    Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

  6. [Preliminary results of an anonymous internet-based reporting system for critical incidents in ambulatory primary care].

    Science.gov (United States)

    Brun, A

    2005-03-01

    To learn from errors is not always easy, especially if they happened to others! This paper describes the organization and management of a critical incident reporting system for primary care physicians in Switzerland and reports about the difficulties and experiences during the first 18 months since the start of the program. It seems to be particularly difficult to enhance the attentiveness of physicians for apparently harmless daily critical incidents and to motivate them to report it even in an anonymous reporting system. As incentives for more intensive participation there are the hope for comments on reported cases by other participants and the expectation that reported errors will be avoided by the readers.

  7. Research of an emergency medical system for mass casualty incidents in Shanghai, China: a system dynamics model.

    Science.gov (United States)

    Yu, Wenya; Lv, Yipeng; Hu, Chaoqun; Liu, Xu; Chen, Haiping; Xue, Chen; Zhang, Lulu

    2018-01-01

    Emergency medical system for mass casualty incidents (EMS-MCIs) is a global issue. However, China lacks such studies extremely, which cannot meet the requirement of rapid decision-support system. This study aims to realize modeling EMS-MCIs in Shanghai, to improve mass casualty incident (MCI) rescue efficiency in China, and to provide a possible method of making rapid rescue decisions during MCIs. This study established a system dynamics (SD) model of EMS-MCIs using the Vensim DSS program. Intervention scenarios were designed as adjusting scales of MCIs, allocation of ambulances, allocation of emergency medical staff, and efficiency of organization and command. Mortality increased with the increasing scale of MCIs, medical rescue capability of hospitals was relatively good, but the efficiency of organization and command was poor, and the prehospital time was too long. Mortality declined significantly when increasing ambulances and improving the efficiency of organization and command; triage and on-site first-aid time were shortened if increasing the availability of emergency medical staff. The effect was the most evident when 2,000 people were involved in MCIs; however, the influence was very small under the scale of 5,000 people. The keys to decrease the mortality of MCIs were shortening the prehospital time and improving the efficiency of organization and command. For small-scale MCIs, improving the utilization rate of health resources was important in decreasing the mortality. For large-scale MCIs, increasing the number of ambulances and emergency medical professionals was the core to decrease prehospital time and mortality. For super-large-scale MCIs, increasing health resources was the premise.

  8. Advanced Ground Systems Maintenance Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The Inductive Monitoring System (IMS) software utilizes techniques from the fields of model-based reasoning, machine learning, and data mining to build system...

  9. Phase and amplitude detection system for the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Schwarz, H.D.

    1983-01-01

    A computer controlled phase and amplitude detection system to measure and stabilize the rf power sources in the Stanford Linear Accelerator is described. This system measures the instantaneous phase and amplitude of a 1 microsecond 2856 MHz rf pulse and will be used for phase feedback control and for amplitude and phase jitter detection. This paper discusses the measurement system performance requirements for the operation of the Stanford Linear Collider, and the design and implementation of the phase and amplitude detection system. The fundamental software algorithms used in the measurement are described, as is the performance of the prototype phase and amplitude detector system

  10. Are hospitals ready to response to disasters? Challenges, opportunities and strategies of Hospital Emergency Incident Command System (HEICS).

    Science.gov (United States)

    Yarmohammadian, Mohammad Hossein; Atighechian, Golrokh; Shams, Lida; Haghshenas, Abbas

    2011-08-01

    Applying an effective management system in emergency incidents provides maximum efficiency with using minimum facilities and human resources. Hospital Emergency Incident Command System (HEICS) is one of the most reliable emergency incident command systems to make hospitals more efficient and to increase patient safety. This research was to study requirements, barriers, and strategies of HEICS in hospitals affiliated to Isfahan University of Medical Sciences (IUMS). This was a qualitative research carried out in Isfahan Province, Iran during 2008-09. The study population included senior hospital managers of IUMS and key informants in emergency incident management across Isfahan Province. Sampling method was in non-random purposeful form and snowball technique was used. The research instrument for data collection was semi-structured interview; collected data was analyzed by Colaizzi Technique. Findings of study were categorized into three general categories including requirements (organizational and sub-organizational), barriers (internal and external) of HEICS establishment, and providing short, mid and long term strategies. These categories are explained in details in the main text. Regarding the existing barriers in establishment of HEICS, it is recommended that responsible authorities in different levels of health care system prepare necessary conditions for implementing such system as soon as possible via encouraging and supporting systems. This paper may help health policy makers to get reasonable framework and have comprehensive view for establishing HEICS in hospitals. It is necessary to consider requirements and viewpoints of stakeholders before any health policy making or planning.

  11. Noise-tolerant instantaneous heart rate and R-peak detection using short-term autocorrelation for wearable healthcare systems.

    Science.gov (United States)

    Fujii, Takahide; Nakano, Masanao; Yamashita, Ken; Konishi, Toshihiro; Izumi, Shintaro; Kawaguchi, Hiroshi; Yoshimoto, Masahiko

    2013-01-01

    This paper describes a robust method of Instantaneous Heart Rate (IHR) and R-peak detection from noisy electrocardiogram (ECG) signals. Generally, the IHR is calculated from the R-wave interval. Then, the R-waves are extracted from the ECG using a threshold. However, in wearable bio-signal monitoring systems, noise increases the incidence of misdetection and false detection of R-peaks. To prevent incorrect detection, we introduce a short-term autocorrelation (STAC) technique and a small-window autocorrelation (SWAC) technique, which leverages the similarity of QRS complex waveforms. Simulation results show that the proposed method improves the noise tolerance of R-peak detection.

  12. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Science.gov (United States)

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun

    2017-10-03

    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  13. Investigation of photon detection probability dependence of SPADnet-I digital photon counter as a function of angle of incidence, wavelength and polarization

    Energy Technology Data Exchange (ETDEWEB)

    Játékos, Balázs, E-mail: jatekosb@eik.bme.hu; Ujhelyi, Ferenc; Lőrincz, Emőke; Erdei, Gábor

    2015-01-01

    SPADnet-I is a prototype, fully digital, high spatial and temporal resolution silicon photon counter, based on standard CMOS imaging technology, developed by the SPADnet consortium. Being a novel device, the exact dependence of photon detection probability (PDP) of SPADnet-I was not known as a function of angle of incidence, wavelength and polarization of the incident light. Our targeted application area of this sensor is next generation PET detector modules, where they will be used along with LYSO:Ce scintillators. Hence, we performed an extended investigation of PDP in a wide range of angle of incidence (0° to 80°), concentrating onto a 60 nm broad wavelength interval around the characteristic emission peak (λ=420 nm) of the scintillator. In the case where the sensor was optically coupled to a scintillator, our experiments showed a notable dependence of PDP on angle, polarization and wavelength. The sensor has an average PDP of approximately 30% from 0° to 60° angle of incidence, where it starts to drop rapidly. The PDP turned out not to be polarization dependent below 30°. If the sensor is used without a scintillator (i.e. the light source is in air), the polarization dependence is much less expressed, it begins only from 50°.

  14. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  15. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  16. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  17. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  18. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  19. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  20. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  1. Evaluation of the AN/GSS-20 motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the AN/GSS-20 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to environmental factors was also examined

  2. 46 CFR 28.830 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection system. 28.830 Section 28.830 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.830 Fire detection system. (a) Each accommodation space...

  3. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  4. 46 CFR 28.325 - Fire detection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection systems. 28.325 Section 28.325 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING... Operate With More Than 16 Individuals on Board § 28.325 Fire detection systems. (a) Each accommodation...

  5. Automatic patient respiration failure detection system with wireless transmission

    Science.gov (United States)

    Dimeff, J.; Pope, J. M.

    1968-01-01

    Automatic respiration failure detection system detects respiration failure in patients with a surgically implanted tracheostomy tube, and actuates an audible and/or visual alarm. The system incorporates a miniature radio transmitter so that the patient is unencumbered by wires yet can be monitored from a remote location.

  6. Best Practices for Fuel System Contamination Detection and Remediation

    Science.gov (United States)

    2016-01-15

    The University of Dayton Research Institute Best Practices for Fuel System Contamination Detection and Remediation Final Report Marlin D... Remediation Executive Summary: Fuel contamination is a broad term commonly applied to anything that causes a fuel test to fail quality assurance...Statement A: Approved for public release: distribution unlimited. 1 Best Practices for Fuel System Contamination Detection and Remediation Contents

  7. Wireless tamper detection sensor and sensing system

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2011-01-01

    A wireless tamper detection sensor is defined by a perforated electrical conductor. The conductor is shaped to form a geometric pattern between first and second ends thereof such that the conductor defines an open-circuit that can store and transfer electrical and magnetic energy. The conductor resonates in the presence of a time-varying magnetic field to generate a harmonic response. The harmonic response changes when the conductor experiences a change in its geometric pattern due to severing of the conductor along at least a portion of the perforations. A magnetic field response recorder is used to wirelessly transmit the time-varying magnetic field and wirelessly detecting the conductor's harmonic response.

  8. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  9. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  10. Multi-temporal change image inference towards false alarms reduction for an operational photogrammetric rockfall detection system

    Science.gov (United States)

    Partsinevelos, Panagiotis; Kallimani, Christina; Tripolitsiotis, Achilleas

    2015-06-01

    Rockfall incidents affect civil security and hamper the sustainable growth of hard to access mountainous areas due to casualties, injuries and infrastructure loss. Rockfall occurrences cannot be easily prevented, whereas previous studies for rockfall multiple sensor early detection systems have focused on large scale incidents. However, even a single rock may cause the loss of a human life along transportation routes thus, it is highly important to establish methods for the early detection of small-scale rockfall incidents. Terrestrial photogrammetric techniques are prone to a series of errors leading to false alarm incidents, including vegetation, wind, and non relevant change in the scene under consideration. In this study, photogrammetric monitoring of rockfall prone slopes is established and the resulting multi-temporal change imagery is processed in order to minimize false alarm incidents. Integration of remote sensing imagery analysis techniques is hereby applied to enhance early detection of a rockfall. Experimental data demonstrated that an operational system able to identify a 10-cm rock movement within a 10% false alarm rate is technically feasible.

  11. Explosive simulants for testing explosive detection systems

    Science.gov (United States)

    Kury, John W.; Anderson, Brian L.

    1999-09-28

    Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

  12. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  13. Risk Factors for Incident Diabetic Polyneuropathy in a Cohort With Screen-Detected Type 2 Diabetes Followed for 13 Years

    DEFF Research Database (Denmark)

    Andersen, Signe T; Witte, Daniel R; Dalsgaard, Else-Marie

    2018-01-01

    OBJECTIVE: To study incident diabetic polyneuropathy (DPN) prospectively during the first 13 years after a screening-based diagnosis of type 2 diabetes and determine the associated risk factors for the development of DPN. RESEARCH DESIGN AND METHODS: We assessed DPN longitudinally in the Danish arm...... of the Anglo-Danish-Dutch study of Intensive Treatment of Diabetes in Primary Care (ADDITION) using the Michigan Neuropathy Screening Instrument questionnaire (MNSIQ), defining DPN with scores ≥4. Risk factors present at the diabetes diagnosis associated with the risk of incident DPN were estimated using Cox...... DPN. CONCLUSIONS: This study provides further epidemiological evidence for obesity as a risk factor for DPN. Moreover, low HDL cholesterol levels and higher levels of methylglyoxal, a marker of dicarbonyl stress, are identified as risk factors for the development of DPN....

  14. Development of Abnormality Detection System for Bathers using Ultrasonic Sensors

    Science.gov (United States)

    Ohnishi, Yosuke; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko; Ogoshi, Yasuhiro

    This paper proposes an abnormality detection system for bather sitting in bathtub. Increasing number of in-bathtub drowning accidents in Japan draws attention. Behind this large number of bathing accidents, Japan's unique social and cultural background come surface. For majority of people in Japan, bathing serves purpose in deep warming up of body, relax and enjoyable time. Therefore it is the custom for the Japanese to soak in bathtub. However overexposure to hot water may cause dizziness or fainting, which is possible to cause in-bathtub drowning. For drowning prevention, the system detects bather's abnormal state using an ultrasonic sensor array. The array, which has many ultrasonic sensors, is installed on the ceiling of bathroom above bathtub. The abnormality detection system uses the following two methods: posture detection and behavior detection. The function of posture detection is to estimate the risk of drowning by monitoring bather's posture. Meanwhile, the function of behavior detection is to estimate the risk of drowning by monitoring bather's behavior. By using these methods, the system detects bathers' different state from normal. As a result of experiment with a subject in the bathtub, the system was possible to detect abnormal state using subject's posture and behavior. Therefore the system is useful for monitoring bather to prevent drowning in bathtub.

  15. Recent events in NPPs and incident reporting system (IRS) activity. Working material

    International Nuclear Information System (INIS)

    1996-01-01

    The IAEA convened the 1996 Joint Meeting to Exchange Information on Recent Events in Nuclear Power Plants and the Technical Committee-Annual Meeting of the Incident Reporting System (IRS) national co-ordinators, organized jointly with the Nuclear Energy Agency (NEA) of the OECD in Paris, France from 22-26 April 1996. These consecutive meetings took place at the OECD Headquarters, 2 rue Andre Pascal. The main objective of the first meeting (22-24 April 1996) was to exchange and discuss information on recent events which occurred in NPPs. The second meeting (25-26 April 1996) was devoted to the IAEA and NEA activity in the framework of the IRS. The main issues of the programme at the meetings were as follows: in-depth discussion on NPP recent events, presented by the participants; panel discussion on operational safety experience issues identified by the participants; IAEA and NEA activities on IRS subjects in 1995-1996 and plans for the future; issues from the inter-agency's IRS Advisory Committee. Annexes I and II provide more information on the programme at the meetings. A list of participants is given in Annex III (50 participants from 22 countries and 3 international organization). Annexes IV and V provide information on national presentations on recent events. Figs, tabs

  16. Selective tuberculosis incidence estimation by digital computer information technologies in the MS Excel system

    Directory of Open Access Journals (Sweden)

    G. I. Ilnitsky

    2014-01-01

    Full Text Available The incidence of tuberculosis was estimated in different age groups of people, applying the digital computer information technologies of tracking. For this, the author used the annual forms of the reporting materials stipulated by the Ministry of Health of Ukraine, the results of his observations, and the data of bank information accumulation in the MS Excel system. The initial positions were formed in terms of the epidemiological indicators of Ukraine and the Lvov Region during a 10-year period (2000-2009 that was, in relation with different initial characteristics, divided into Step 1 (2000-2004 in which the tuberculosis epidemic situation progressively deteriorated and Step 2 (2005-2009 in which relative morbidity was relatively stabilized. The results were processed using the MS Excel statistical and mathematical functions that were parametric and nonparametric in establishing a correlation when estimating the changes in epidemic parameters. The findings of studies among the general population could lead to the conclusion that the mean tuberculosis morbidity in Ukraine was much greater than that in the Lvov Region irrespective of the age of a population. At the same time, the morbidity rate in the foci of tuberculosis infection suggested that it rose among both the children, adolescents, and adults, which provided a rationale for that therapeutic and preventive measures should be better implemented.

  17. The United States Department of Energy (DOE) Computerized Accident/Incident Reporting System (CAIRS)

    International Nuclear Information System (INIS)

    Briscoe, G.J.

    1993-01-01

    The Department of Energy's (DOE) Computerized Accident/Incident Reporting System (CAIRS) is a comprehensive data base containing more than 50,000 investigation reports of injury/illness, property damage and vehicle accident cases representing safety data from 1975 to the present for more than 150 DOE contractor organizations. A special feature is that the text of each accident report is translated using a controlled dictionary and rigid sentence structure called Factor Relationship and Sequence of Events (FRASE) that enhances the ability to retrieve specific types of information and to perform detailed analyses. DOE summary and individual contractor reports are prepared quarterly and annually. In addition, ''Safety Performance Profile'' reports for individual organizations are prepared to provide advance information to appraisal teams, and special topical reports are prepared for areas of concern such as an increase in the number of security injuries or environmental releases. The data base is open to all DOE and Contractor registered users with no access restrictions other than that required by the Privacy Act

  18. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  19. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  20. Attentional System for Face Detection and Tracking

    Directory of Open Access Journals (Sweden)

    Leonardo Pinto da Silva Panta Leão

    2011-04-01

    Full Text Available The human visual system quickly performs complex decisions due, in part, to attentional system, which positions the most relevant targets in the center of the visual field, region with greatest concentration of photoreceptor cells. The attentional system involves sensory, cognitive and also mechanical elements, because the eye and head muscles must be activated to produce movement. In this paper we present the proposal of a face detector system that, as well as the biological system, produces a coordinated movement with the purpose of positioning the target image in the center of camera's visual field. The developed system has distinct parts, one responsible for video pattern recognition and other for controlling the mechanical part, implemented as processes that communicate with each other by sockets.

  1. Incidence of Artifacts and Deviating Values in Research Data Obtained from an Anesthesia Information Management System in Children.

    Science.gov (United States)

    Hoorweg, Anne-Lee J; Pasma, Wietze; van Wolfswinkel, Leo; de Graaff, Jurgen C

    2018-02-01

    Vital parameter data collected in anesthesia information management systems are often used for clinical research. The validity of this type of research is dependent on the number of artifacts. In this prospective observational cohort study, the incidence of artifacts in anesthesia information management system data was investigated in children undergoing anesthesia for noncardiac procedures. Secondary outcomes included the incidence of artifacts among deviating and nondeviating values, among the anesthesia phases, and among different anesthetic techniques. We included 136 anesthetics representing 10,236 min of anesthesia time. The incidence of artifacts was 0.5% for heart rate (95% CI: 0.4 to 0.7%), 1.3% for oxygen saturation (1.1 to 1.5%), 7.5% for end-tidal carbon dioxide (6.9 to 8.0%), 5.0% for noninvasive blood pressure (4.0 to 6.0%), and 7.3% for invasive blood pressure (5.9 to 8.8%). The incidence of artifacts among deviating values was 3.1% for heart rate (2.1 to 4.4%), 10.8% for oxygen saturation (7.6 to 14.8%), 14.1% for end-tidal carbon dioxide (13.0 to 15.2%), 14.4% for noninvasive blood pressure (10.3 to 19.4%), and 38.4% for invasive blood pressure (30.3 to 47.1%). Not all values in anesthesia information management systems are valid. The incidence of artifacts stored in the present pediatric anesthesia practice was low for heart rate and oxygen saturation, whereas noninvasive and invasive blood pressure and end-tidal carbon dioxide had higher artifact incidences. Deviating values are more often artifacts than values in a normal range, and artifacts are associated with the phase of anesthesia and anesthetic technique. Development of (automatic) data validation systems or solutions to deal with artifacts in data is warranted.

  2. Robust fault detection of wind energy conversion systems based on dynamic neural networks.

    Science.gov (United States)

    Talebi, Nasser; Sadrnia, Mohammad Ali; Darabi, Ahmad

    2014-01-01

    Occurrence of faults in wind energy conversion systems (WECSs) is inevitable. In order to detect the occurred faults at the appropriate time, avoid heavy economic losses, ensure safe system operation, prevent damage to adjacent relevant systems, and facilitate timely repair of failed components; a fault detection system (FDS) is required. Recurrent neural networks (RNNs) have gained a noticeable position in FDSs and they have been widely used for modeling of complex dynamical systems. One method for designing an FDS is to prepare a dynamic neural model emulating the normal system behavior. By comparing the outputs of the real system and neural model, incidence of the faults can be identified. In this paper, by utilizing a comprehensive dynamic model which contains both mechanical and electrical components of the WECS, an FDS is suggested using dynamic RNNs. The presented FDS detects faults of the generator's angular velocity sensor, pitch angle sensors, and pitch actuators. Robustness of the FDS is achieved by employing an adaptive threshold. Simulation results show that the proposed scheme is capable to detect the faults shortly and it has very low false and missed alarms rate.

  3. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  4. Application of Real-Time Automated Traffic Incident Response Plan Management System: A Web Structure for the Regional Highway Network in China

    Directory of Open Access Journals (Sweden)

    Yongfeng Ma

    2014-01-01

    Full Text Available Traffic incidents, caused by various factors, may lead to heavy traffic delay and be harmful to traffic capacity of downstream sections. Traffic incident management (TIM systems have been developed widely to respond to traffic incidents intelligently and reduce the losses. Traffic incident response plans, as an important component of TIM, can effectively guide responders as to what and how to do in traffic incidents. In the paper, a real-time automated traffic incident response plan management system was developed, which could generate and manage traffic incident response plans timely and automatically. A web application structure and a physical structure were designed to implement and show these functions. A standard framework of data storage was also developed to save information about traffic incidents and generated response plans. Furthermore, a conformation survey and case-based reasoning (CBR were introduced to identify traffic incident and generate traffic incident response plans automatically, respectively. Twenty-three traffic crash-related incidents were selected and three indicators were used to measure the system performance. Results showed that 20 of 23 cases could be retrieved effectively and accurately. The system is practicable to generate traffic incident response plans and has been implemented in China.

  5. National Incident Management System (NIMS) Standards Review Panel Workshop Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Stenner, Robert D.; Kirk, Jennifer L.; Stanton, James R.; Shebell, Peter; Schwartz, Deborah S.; Judd, Kathleen S.; Gelston, Gariann M.

    2006-02-07

    The importance and need for full compliant implementation of NIMS nationwide was clearly demonstrated during the Hurricane Katrina event, which was clearly expressed in Secretary Chertoff's October 4, 2005 letter addressed to the State's governors. It states, ''Hurricane Katrina was a stark reminder of how critical it is for our nation to approach incident management in a coordinated, consistent, and efficient manner. We must be able to come together, at all levels of government, to prevent, prepare for, respond to, and recover from any emergency or disaster. Our operations must be seamless and based on common incident management doctrine, because the challenges we face as a nation are far greater than capabilities of any one jurisdiction.'' The NIMS is a system/architecture for organizing response on a ''national'' level. It incorporations ICS as a main component of that structure (i.e., it institutionalizes ICS in NIMS). In a paper published on the NIMS Website, the following statements were made: ''NIMS represents a core set of doctrine, principles, terminology, and organizational processes to enable effective, efficient and collaborative incident management at all levels. To provide the framework for interoperability and compatibility, the NIMS is based on a balance between flexibility and standardization.'' Thus the NIC is challenged with the need to adopt quality SDO generated standards to support NIMS compliance, but in doing so maintain the flexibility necessary so that response operations can be tailored for the specific jurisdictional and geographical needs across the nation. In support of this large and complex challenge facing the NIC, the Pacific Northwest National Laboratory (PNNL) was asked to provide technical support to the NIC, through their DHS Science and Technology ? Standards Portfolio Contract, to help identify, review, and develop key standards for NIMS compliance. Upon

  6. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    Science.gov (United States)

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  7. System and Method for Multi-Wavelength Optical Signal Detection

    Science.gov (United States)

    McGlone, Thomas D. (Inventor)

    2017-01-01

    The system and method for multi-wavelength optical signal detection enables the detection of optical signal levels significantly below those processed at the discrete circuit level by the use of mixed-signal processing methods implemented with integrated circuit technologies. The present invention is configured to detect and process small signals, which enables the reduction of the optical power required to stimulate detection networks, and lowers the required laser power to make specific measurements. The present invention provides an adaptation of active pixel networks combined with mixed-signal processing methods to provide an integer representation of the received signal as an output. The present invention also provides multi-wavelength laser detection circuits for use in various systems, such as a differential absorption light detection and ranging system.

  8. Hospital incident command system (HICS performance in Iran; decision making during disasters

    Directory of Open Access Journals (Sweden)

    Djalali Ahmadreza

    2012-02-01

    Full Text Available Abstract Background Hospitals are cornerstones for health care in a community and must continue to function in the face of a disaster. The Hospital Incident Command System (HICS is a method by which the hospital operates when an emergency is declared. Hospitals are often ill equipped to evaluate the strengths and vulnerabilities of their own management systems before the occurrence of an actual disaster. The main objective of this study was to measure the decision making performance according to HICS job actions sheets using tabletop exercises. Methods This observational study was conducted between May 1st 2008 and August 31st 2009. Twenty three Iranian hospitals were included. A tabletop exercise was developed for each hospital which in turn was based on the highest probable risk. The job action sheets of the HICS were used as measurements of performance. Each indicator was considered as 1, 2 or 3 in accordance with the HICS. Fair performance was determined as Results None of the participating hospitals had a hospital disaster management plan. The performance according to HICS was intermediate for 83% (n = 19 of the participating hospitals. No hospital had a high level of performance. The performance level for the individual sections was intermediate or fair, except for the logistic and finance sections which demonstrated a higher level of performance. The public hospitals had overall higher performances than university hospitals (P = 0.04. Conclusions The decision making performance in the Iranian hospitals, as measured during table top exercises and using the indicators proposed by HICS was intermediate to poor. In addition, this study demonstrates that the HICS job action sheets can be used as a template for measuring the hospital response. Simulations can be used to assess preparedness, but the correlation with outcome remains to be studied.

  9. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  10. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...

  11. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  12. Entanglement detection in hybrid optomechanical systems

    International Nuclear Information System (INIS)

    De Chiara, Gabriele; Paternostro, Mauro; Palma, G. Massimo

    2011-01-01

    We study a device formed by a Bose-Einstein condensate (BEC) coupled to the field of a cavity with a moving end mirror and find a working point such that the mirror-light entanglement is reproduced by the BEC-light quantum correlations. This provides an experimentally viable tool for inferring mirror-light entanglement with only a limited set of assumptions. We prove the existence of tripartite entanglement in the hybrid device, persisting up to temperatures of a few milli-Kelvin, and discuss a scheme to detect it.

  13. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  14. Vision-based fall detection system for improving safety of elderly people

    KAUST Repository

    Harrou, Fouzi; Zerrouki, Nabil; Sun, Ying; Houacine, Amrane

    2017-01-01

    Recognition of human movements is very useful for several applications, such as smart rooms, interactive virtual reality systems, human detection and environment modeling. The objective of this work focuses on the detection and classification of falls based on variations in human silhouette shape, a key challenge in computer vision. Falls are a major health concern, specifically for the elderly. In this study, the detection is achieved with a multivariate exponentially weighted moving average (MEWMA) monitoring scheme, which is effective in detecting falls because it is sensitive to small changes. Unfortunately, an MEWMA statistic fails to differentiate real falls from some fall-like gestures. To remedy this limitation, a classification stage based on a support vector machine (SVM) is applied on detected sequences. To validate this methodology, two fall detection datasets have been tested: the University of Rzeszow fall detection dataset (URFD) and the fall detection dataset (FDD). The results of the MEWMA-based SVM are compared with three other classifiers: neural network (NN), naïve Bayes and K-nearest neighbor (KNN). These results show the capability of the developed strategy to distinguish fall events, suggesting that it can raise an early alert in the fall incidents.

  15. Vision-based fall detection system for improving safety of elderly people

    KAUST Repository

    Harrou, Fouzi

    2017-12-06

    Recognition of human movements is very useful for several applications, such as smart rooms, interactive virtual reality systems, human detection and environment modeling. The objective of this work focuses on the detection and classification of falls based on variations in human silhouette shape, a key challenge in computer vision. Falls are a major health concern, specifically for the elderly. In this study, the detection is achieved with a multivariate exponentially weighted moving average (MEWMA) monitoring scheme, which is effective in detecting falls because it is sensitive to small changes. Unfortunately, an MEWMA statistic fails to differentiate real falls from some fall-like gestures. To remedy this limitation, a classification stage based on a support vector machine (SVM) is applied on detected sequences. To validate this methodology, two fall detection datasets have been tested: the University of Rzeszow fall detection dataset (URFD) and the fall detection dataset (FDD). The results of the MEWMA-based SVM are compared with three other classifiers: neural network (NN), naïve Bayes and K-nearest neighbor (KNN). These results show the capability of the developed strategy to distinguish fall events, suggesting that it can raise an early alert in the fall incidents.

  16. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  17. Chemical Detection Architecture for a Subway System [video

    OpenAIRE

    Ignacio, Joselito; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    This proposed system process aims to improve subway safety through better enabling the rapid detection and response to a chemical release in a subway system. The process is designed to be location-independent and generalized to most subway systems despite each system's unique characteristics.

  18. Optimal Robust Fault Detection for Linear Discrete Time Systems

    Directory of Open Access Journals (Sweden)

    Nike Liu

    2008-01-01

    Full Text Available This paper considers robust fault-detection problems for linear discrete time systems. It is shown that the optimal robust detection filters for several well-recognized robust fault-detection problems, such as ℋ−/ℋ∞, ℋ2/ℋ∞, and ℋ∞/ℋ∞ problems, are the same and can be obtained by solving a standard algebraic Riccati equation. Optimal filters are also derived for many other optimization criteria and it is shown that some well-studied and seeming-sensible optimization criteria for fault-detection filter design could lead to (optimal but useless fault-detection filters.

  19. Design of Moisture Content Detection System

    Science.gov (United States)

    Wang, W. C.; Wang, L.

    In this paper, a method for measuring the moisture content of grain was presented based on single chip microcomputer and capacitive sensor. The working principle of measuring moisture content is introduced and a concentric cylinder type of capacitive sensor is designed, the signal processing circuits of system are described in details. System is tested in practice and discussions are made on the various factors affecting the capacitive measuring of grain moisture based on the practical experiments, experiment results showed that the system has high measuring accuracy and good controlling capacity.

  20. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  1. How to detect trap cluster systems?

    International Nuclear Information System (INIS)

    Mandowski, Arkadiusz

    2008-01-01

    Spatially correlated traps and recombination centres (trap-recombination centre pairs and larger clusters) are responsible for many anomalous phenomena that are difficult to explain in the framework of both classical models, i.e. model of localized transitions (LT) and the simple trap model (STM), even with a number of discrete energy levels. However, these 'anomalous' effects may provide a good platform for identifying trap cluster systems. This paper considers selected cluster-type effects, mainly relating to an anomalous dependence of TL on absorbed dose in the system of isolated clusters (ICs). Some consequences for interacting cluster (IAC) systems, involving both localized and delocalized transitions occurring simultaneously, are also discussed

  2. Leak detection system for RBMK coolant circuit

    Energy Technology Data Exchange (ETDEWEB)

    Cherkashov, Ju M; Strelkov, B P; Korolev, Yu V; Eperin, A P; Kozlov, E P; Belyanin, L A; Vanukov, V N [Leningrad Nuclear Power Plant, Leningrad (Russian Federation). Research and Development Inst. of Power Engineering

    1997-12-31

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab.

  3. Principal Experiences with Crisis Management Professional Development, Collaboration, and Implementation of the National Incident Management System Phases of Emergency Management

    Science.gov (United States)

    Naradko, Anthony M.

    2017-01-01

    The purpose of this qualitative single-subject case study was to identify the elements critical to crisis management professional development for school principals; the factors influencing the implementation of the National Incident Management System Phases of Emergency Management (2010) for principals; and the necessary elements for fostering…

  4. Incidence of Artifacts and Deviating Values in Research Data Obtained from an Anesthesia Information Management System in Children

    NARCIS (Netherlands)

    Hoorweg, Anne-Lee J; Pasma, Wietze; van Wolfswinkel, Leo; de Graaff, Jurgen C

    BACKGROUND: Vital parameter data collected in anesthesia information management systems are often used for clinical research. The validity of this type of research is dependent on the number of artifacts. METHODS: In this prospective observational cohort study, the incidence of artifacts in

  5. A PDMS-based cylindrical hybrid lens for enhanced fluorescence detection in microfluidic systems.

    Science.gov (United States)

    Lin, Bor-Shyh; Yang, Yu-Ching; Ho, Chong-Yi; Yang, Han-Yu; Wang, Hsiang-Yu

    2014-02-13

    Microfluidic systems based on fluorescence detection have been developed and applied for many biological and chemical applications. Because of the tiny amount of sample in the system; the induced fluorescence can be weak. Therefore, most microfluidic systems deploy multiple optical components or sophisticated equipment to enhance the efficiency of fluorescence detection. However, these strategies encounter common issues of complex manufacturing processes and high costs. In this study; a miniature, cylindrical and hybrid lens made of polydimethylsiloxane (PDMS) to improve the fluorescence detection in microfluidic systems is proposed. The hybrid lens integrates a laser focusing lens and a fluorescence collecting lens to achieve dual functions and simplify optical setup. Moreover, PDMS has advantages of low-cost and straightforward fabrication compared with conventional optical components. The performance of the proposed lens is first examined with two fluorescent dyes and the results show that the lens provides satisfactory enhancement for fluorescence detection of Rhodamine 6G and Nile Red. The overall increments in collected fluorescence signal and detection sensitivity are more than 220% of those without lens, and the detection limits of Rhodamine 6G and Nile red are lowered to 0.01 μg/mL and 0.05 μg/mL, respectively. The hybrid lens is further applied to the detection of Nile red-labeled Chlorella vulgaris cells and it increases both signal intensity and detection sensitivity by more than 520%. The proposed hybrid lens also dramatically reduces the variation in detected signal caused by the deviation in incident angle of excitation light.

  6. Road icing forecasting and detecting system

    Science.gov (United States)

    Xu, Hongke; Zheng, Jinnan; Li, Peiqi; Wang, Qiucai

    2017-05-01

    Regard for the facts that the low accuracy and low real-time of the artificial observation to determine the road icing condition, and it is difficult to forecast icing situation, according to the main factors influencing the road-icing, and the electrical characteristics reflected by the pavement ice layer, this paper presents an innovative system, that is, ice-forecasting of the highway's dangerous section. The system bases on road surface water salinity measurements and pavement temperature measurement to calculate the freezing point of water and temperature change trend, and then predicts the occurrence time of road icing; using capacitance measurements to verdict the road surface is frozen or not; This paper expounds the method of using single chip microcomputer as the core of the control system and described the business process of the system.

  7. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  8. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  9. Incidence of disability pensions among slaughterhouse workers in Denmark. With special regard to diagnosis of the musculo-skeletal system

    DEFF Research Database (Denmark)

    Hansen, N S; Jeune, B

    1982-01-01

    The objective of this study was to examine whether slaughterhouse workers (SW) in Denmark have a higher incidence of disability than expected in comparison with the general population and the sub-group of the population that is gainfully employed, especially with regard to pensions awarded...... are calculated on the basis of age-specific incidence rates among all actively employed people. Problems of the study design and selection bias are discussed to facilitate the interpretation of results. A possible deleterious effect of meatpacking on the musculo-skeletal system calls for further investigation....

  10. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  11. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  12. Analysing malaria incidence at the small area level for developing a spatial decision support system: A case study in Kalaburagi, Karnataka, India.

    Science.gov (United States)

    Shekhar, S; Yoo, E-H; Ahmed, S A; Haining, R; Kadannolly, S

    2017-02-01

    Spatial decision support systems have already proved their value in helping to reduce infectious diseases but to be effective they need to be designed to reflect local circumstances and local data availability. We report the first stage of a project to develop a spatial decision support system for infectious diseases for Karnataka State in India. The focus of this paper is on malaria incidence and we draw on small area data on new cases of malaria analysed in two-monthly time intervals over the period February 2012 to January 2016 for Kalaburagi taluk, a small area in Karnataka. We report the results of data mapping and cluster detection (identifying areas of excess risk) including evaluating the temporal persistence of excess risk and the local conditions with which high counts are statistically associated. We comment on how this work might feed into a practical spatial decision support system. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  14. Development of radiation detection and measurement systems

    International Nuclear Information System (INIS)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated

  15. Biodosimetry: Medicine, Science, and Systems to Support the Medical Decision-Maker Following a Large Scale Nuclear or Radiation Incident

    International Nuclear Information System (INIS)

    Coleman, C. Norman; Koerner, John F.

    2016-01-01

    The public health and medical response to a radiological or nuclear incident requires the capability to sort, assess, treat, triage and to ultimately discharge, refer or transport people to their next step in medical care. The size of the incident and scarcity of resources at the location of each medical decision point will determine how patients are triaged and treated. This will be a rapidly evolving situation impacting medical responders at regional, national and international levels. As capabilities, diagnostics and medical countermeasures improve, a dynamic system-based approach is needed to plan for and manage the incident, and to adapt effectively in real time. In that the concepts and terms can be unfamiliar and possibly confusing, resources and a concept of operations must be considered well in advance. An essential underlying tenet is that medical evaluation and care will be managed by health-care professionals with biodosimetry assays providing critical supporting data. (authors)

  16. NELIS-an illicit drug detection system

    International Nuclear Information System (INIS)

    Dokhale, P.A.; Csikai, J.; Womble, P.C.; Vourvopoulos, G.

    2001-01-01

    NELIS (Neutron Elemental Inspection System) is currently being developed to inspect pallets laden with various commodities for contraband (drugs, etc.). NELIS analyzes the characteristic gamma rays from the elements in drugs such as C, O, H, Cl, N, etc. that are produced by nuclear reactions from fast and thermal neutrons (Pulsed Fast/Thermal Neutron Analysis). Hidden drugs are identified through the measurement of the elemental content of the object, and the comparison of expected and measured elemental ratios. NELIS can be coupled with conventional X-ray imaging system to optimize the inspection capabilities at ports of entry

  17. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  18. A cross-national comparison of incident reporting systems implemented in German and Swiss hospitals.

    Science.gov (United States)

    Manser, Tanja; Imhof, Michael; Lessing, Constanze; Briner, Matthias

    2017-06-01

    This study aimed to empirically compare incident reporting systems (IRS) in two European countries and to explore the relationship of IRS characteristics with context factors such as hospital characteristics and characteristics of clinical risk management (CRM). We performed exploratory, secondary analyses of data on characteristics of IRS from nationwide surveys of CRM practices. The survey was originally sent to 2136 hospitals in Germany and Switzerland. Persons responsible for CRM in 622 hospitals completed the survey (response rate 29%). None. Differences between IRS in German and Swiss hospitals were assessed using Chi2, Fisher's Exact and Freeman-Halton-Tests, as appropriate. To explore interrelations between IRS characteristics and context factors (i.e. hospital and CRM characteristics) we computed Cramer's V. Comparing participating hospitals across countries, Swiss hospitals had implemented IRS earlier, more frequently and more often provided introductory IRS training systematically. German hospitals had more frequently systematically implemented standardized procedures for event analyses. IRS characteristics were significantly associated with hospital characteristics such as hospital type as well as with CRM characteristics such as existence of strategic CRM objectives and of a dedicated position for central CRM coordination. This study contributes to an improved understanding of differences in the way IRS are set up in two European countries and explores related context factors. This opens up new possibilities for empirically informed, strategic interventions to further improve dissemination of IRS and thus support hospitals in their efforts to move patient safety forward. © The Author 2017. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  19. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  20. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  1. Determinants of incident distal sensorimotor polyneuropathy in a cohort with screen-detected type 2 diabetes followed for 13 years, the ADDITION Denmark study

    DEFF Research Database (Denmark)

    Andersen, Signe Toft; Witte, Daniel; Dalsgaard, Else-Marie

    .001 in a Students t-test). Conclusion This study demonstrates a fairly low cumulative incidence of DPN defined by the MNSI in people with screen-detected T2DM. Our study provides evidence that macrovascular disease, obesity and higher levels of methylglyoxal present at the time of diagnosis of T2DM are risk factors......Background and aims Distal sensorimotor polyneuropathy (DPN) is the most common complication of diabetes. Cross-sectional studies indicate that determinants beyond hyperglycemia, such as obesity, dyslipidemia and cardiovascular disease are important, particularly in type 2 diabetes (T2DM...

  2. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  3. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    National Research Council Canada - National Science Library

    2001-01-01

    .... and Canadian military personnel. In light of these concerns both defense departments have increased efforts to develop and field biological agent detection systems to help protect their military forces and fixed assets...

  4. Suboptimal processor for anomaly detection for system surveillance and diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Ciftcioglu, Oe.; Hoogenboom, J.E.; Dam, H. van

    1989-06-01

    Anomaly detection for nuclear reactor surveillance and diagnosis is described. The residual noise obtained as a result of autoregressive (AR) modelling is essential to obtain high sensitivity for anomaly detection. By means of the method of hypothesis testing a suboptimal anomaly detection processor is devised for system surveillance and diagnosis. Experiments are carried out to investigate the performance of the processor, which is in particular of interest for on-line and real-time applications.

  5. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  6. Beat frequency ultrasonic microsphere contrast agent detection system

    Science.gov (United States)

    Pretlow, III, Robert A. (Inventor); Yost, William T. (Inventor); Cantrell, Jr., John H. (Inventor)

    1997-01-01

    A system for and method of detecting and measuring concentrations of an ultrasonically-reflective microsphere contrast agent involving detecting non-linear sum and difference beat frequencies produced by the microspheres when two impinging signals with non-identical frequencies are combined by mixing. These beat frequencies can be used for a variety of applications such as detecting the presence of and measuring the flow rates of biological fluids and industrial liquids, including determining the concentration level of microspheres in the myocardium.

  7. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  8. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  9. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.

  10. Leakage detection system in nuclear reactor container

    International Nuclear Information System (INIS)

    Kurosawa, Masahiko.

    1993-01-01

    The present invention comprises an injection means for adding radioactive materials to coolants in a container cooler, a gamma ray amplitude analyzer connected to coolant pipelines and a means for recording/transferring the data of the result of the measurement, a gamma ray amplitude analyzer connected to a drain water sump and a means for recording/transferring the data of the result of the measurement, a gamma ray amplitude analyzer connected to various kinds of pipelines and a means for recording/transferring the data of the result of the measurement, and a data processing means for comparing and analyzing the measured data of each of the gamma ray amplitude analyzers inputted from each of date recording/transferring means. The gamma ray amplitude analysis for each of the pipelines and drain water sump are conducted at an appropriate frequency, and the measured data are compared and analyzed, to improve the detection accuracy for a trace amount of leakage from each of the pressure pipelines and the container cooler coolant pipelines, thereby enabling to specify the pipeline having leakage. Maintenance efficiency is improved, and severe rupture accident in each of pressure pipelines is prevented previously. (N.H.)

  11. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  12. The quench detection system of Wendelstein 7-X

    International Nuclear Information System (INIS)

    Birus, Dietrich; Schneider, Matthias; Rummel, Thomas; Fricke, Marko

    2011-01-01

    The Quench Detection System of Wendelstein W7-X has been developed, pretested and manufactured during the last four years. This safety subsystem of the superconducting magnet power supply will guarantee the safe operating of the whole magnet system. The main targets of the Quench Detection System are the complete data acquisition of all the voltages along the superconducting components, i.e. non planar and planar coils, and bus bars, the evaluation of this data and the control of the magnet system safety discharges. The Quench Detection System is generating control commands for the magnet power supply control system and the electrical status of the superconducting components of W7-X. The Quench Detection System consists of nearly 580 Quench Detection Units (QDU) located in 10 QD-subsystems, 8 racks in each, one host system and two special interfaces for evaluation of the quench control commands and the failure signals. The operating software suite of the QD System allows the configuration, the operation and the maintenance of the whole system.

  13. Incidence and risk factors for central nervous system relapse in children and adolescents with acute lymphoblastic leukemia

    Science.gov (United States)

    Cancela, Camila Silva Peres; Murao, Mitiko; Viana, Marcos Borato; de Oliveira, Benigna Maria

    2012-01-01

    Background Despite all the advances in the treatment of childhood acute lymphoblastic leukemia, central nervous system relapse remains an important obstacle to curing these patients. This study analyzed the incidence of central nervous system relapse and the risk factors for its occurrence in children and adolescents with acute lymphoblastic leukemia. Methods This study has a retrospective cohort design. The studied population comprised 199 children and adolescents with a diagnosis of acute lymphoblastic leukemia followed up at Hospital das Clinicas, Universidade Federal de Minas Gerais (HC-UFMG) between March 2001 and August 2009 and submitted to the Grupo Brasileiro de Tratamento de Leucemia da Infância - acute lymphoblastic leukemia (GBTLI-LLA-99) treatment protocol. Results The estimated probabilities of overall survival and event free survival at 5 years were 69.5% (± 3.6%) and 58.8% (± 4.0%), respectively. The cumulative incidence of central nervous system (isolated or combined) relapse was 11.0% at 8 years. The estimated rate of isolated central nervous system relapse at 8 years was 6.8%. In patients with a blood leukocyte count at diagnosis ≥ 50 x 109/L, the estimated rate of isolated or combined central nervous system relapse was higher than in the group with a count 50 x 109/L at diagnosis seems to be a significant prognostic factor for a higher incidence of central nervous system relapse in childhood acute lymphoblastic leukemia. PMID:23323068

  14. Methods to detect faulty splices in the superconducting magnet system of the LHC

    International Nuclear Information System (INIS)

    Bailey, R.; Bellesia, B.; Lasheras, N.Catalan; Dahlerup-Petersen, K.; Denz, R.; Robles, C.; Koratzinos, M.; Pojer, M.; Ponce, L.; Saban, R.; Schmidt, R.

    2009-01-01

    The incident of 19 September 2008 at the LHC was caused by a faulty inter-magnet splice of about 200 n(Omega) resistance. Cryogenic and electrical techniques have been developed to detect other abnormal splices, either between or inside the magnets. The existing quench protection system can be used to detect internal splices with R > 20 n(Omega). Since this system does not cover the bus between magnets, the cryogenic system is used to measure the rate of temperature rise due to ohmic heating. Accuracy of a few mK/h, corresponding to a few Watts, has been achieved, allowing detection of excess resistance, if it is more than 40 n(Omega) in a cryogenic subsector (two optical cells). Follow-up electrical measurements are made in regions identified by the cryogenic system. These techniques have detected two abnormal internal magnet splices of 100 n(Omega) and 50 n(Omega) respectively. In 2009, this ad hoc system will be replaced with a permanent one to monitor all splices at the n(Omega) level

  15. Methods to detect faulty splices in the superconducting magnet system of the LHC

    CERN Document Server

    Bailey, R; Catalan Lasheras, N; Dahlerup-Petersen, K; Denz, R; Robles, C; Koratzinos, M; Pojer, M; Ponce, L; Saban, R; Schmidt, R; Siemko, A; Solfaroli Camillocci, M; Thiesen, H; Vergara Fernandez, A; Flora, R H; Charifoulline, Z; Bednarek, M; Górnicki, E; Jurkiewicz, P; Kapusta, P; Strait, J

    2010-01-01

    The incident of 19 September 2008 at the LHC was caused by a faulty inter-magnet splice of about 200 nΩ resistance. Cryogenic and electrical techniques have been developed to detect other abnormal splices, either between or inside the magnets. The existing quench protection system can be used to detect internal splices with R>20 nΩ. Since this system does not cover the bus between magnets, the cryogenic system is used to measure the rate of temperature rise due to ohmic heating. Accuracy of a few mK/h, corresponding to a few Watts, has been achieved, allowing detection of excess resistance, if it is more than 40 nΩ in a cryogenic subsector (two optical cells). Follow-up electrical measurements are made in regions identified by the cryogenic system. These techniques have detected two abnormal internal magnet splices of 100 nΩ and 50 nΩ respectively. In 2009, this ad hoc system will be replaced with a permanent one to monitor all splices at the nΩ level.

  16. Failure detection system risk reduction assessment

    Science.gov (United States)

    Aguilar, Robert B. (Inventor); Huang, Zhaofeng (Inventor)

    2012-01-01

    A process includes determining a probability of a failure mode of a system being analyzed reaching a failure limit as a function of time to failure limit, determining a probability of a mitigation of the failure mode as a function of a time to failure limit, and quantifying a risk reduction based on the probability of the failure mode reaching the failure limit and the probability of the mitigation.

  17. A System View on Iterative MIMO Detection: Dynamic Sphere Detection versus Fixed Effort List Detection

    Directory of Open Access Journals (Sweden)

    Christina Gimmler-Dumont

    2012-01-01

    reliability information is fed back from the channel decoder to the MIMO detector. In this paper, we derive a basic framework to compare different soft-input soft-output MIMO detectors in open- and closed-loop systems. Within this framework, we analyze a depth-first sphere detector and a breadth-first fixed effort detector for different application scenarios and their effects on area and energy efficiency on the whole system. We present all system components under open- and closed-loop system aspects and determine the overall implementation cost for changing an open-loop system in a closed-loop system.

  18. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  19. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  20. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  1. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  2. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  3. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  4. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  5. The current incidence of viral disease in korean sweet potatoes and development of multiplex rt-PCR assays for simultaneous detection of eight sweet potato viruses.

    Science.gov (United States)

    Kwak, Hae-Ryun; Kim, Mi-Kyeong; Shin, Jun-Chul; Lee, Ye-Ji; Seo, Jang-Kyun; Lee, Hyeong-Un; Jung, Mi-Nam; Kim, Sun-Hyung; Choi, Hong-Soo

    2014-12-01

    Sweet potato is grown extensively from tropical to temperate regions and is an important food crop worldwide. In this study, we established detection methods for 17 major sweet potato viruses using single and multiplex RT-PCR assays. To investigate the current incidence of viral diseases, we collected 154 samples of various sweet potato cultivars showing virus-like symptoms from 40 fields in 10 Korean regions, and analyzed them by RT-PCR using specific primers for each of the 17 viruses. Of the 17 possible viruses, we detected eight in our samples. Sweet potato feathery mottle virus (SPFMV) and sweet potato virus C (SPVC) were most commonly detected, infecting approximately 87% and 85% of samples, respectively. Furthermore, Sweet potato symptomless virus 1 (SPSMV-1), Sweet potato virus G (SPVG), Sweet potato leaf curl virus (SPLCV), Sweet potato virus 2 ( SPV2), Sweet potato chlorotic fleck virus (SPCFV), and Sweet potato latent virus (SPLV) were detected in 67%, 58%, 47%, 41%, 31%, and 20% of samples, respectively. This study presents the first documented occurrence of four viruses (SPVC, SPV2, SPCFV, and SPSMV-1) in Korea. Based on the results of our survey, we developed multiplex RT-PCR assays for simple and simultaneous detection of the eight sweet potato viruses we recorded.

  6. The Current Incidence of Viral Disease in Korean Sweet Potatoes and Development of Multiplex RT-PCR Assays for Simultaneous Detection of Eight Sweet Potato Viruses

    Directory of Open Access Journals (Sweden)

    Hae-Ryun Kwak

    2014-12-01

    Full Text Available Sweet potato is grown extensively from tropical to temperate regions and is an important food crop worldwide. In this study, we established detection methods for 17 major sweet potato viruses using single and multiplex RT-PCR assays. To investigate the current incidence of viral diseases, we collected 154 samples of various sweet potato cultivars showing virus-like symptoms from 40 fields in 10 Korean regions, and analyzed them by RT-PCR using specific primers for each of the 17 viruses. Of the 17 possible viruses, we detected eight in our samples. Sweet potato feathery mottle virus (SPFMV and sweet potato virus C (SPVC were most commonly detected, infecting approximately 87% and 85% of samples, respectively. Furthermore, Sweet potato symptomless virus 1 (SPSMV-1, Sweet potato virus G (SPVG, Sweet potato leaf curl virus (SPLCV, Sweet potato virus 2 ( SPV2, Sweet potato chlorotic fleck virus (SPCFV, and Sweet potato latent virus (SPLV were detected in 67%, 58%, 47%, 41%, 31%, and 20% of samples, respectively. This study presents the first documented occurrence of four viruses (SPVC, SPV2, SPCFV, and SPSMV-1 in Korea. Based on the results of our survey, we developed multiplex RT-PCR assays for simple and simultaneous detection of the eight sweet potato viruses we recorded.

  7. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension...

  8. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  9. A TNA explosives-detection system in airline baggage

    Energy Technology Data Exchange (ETDEWEB)

    Shea, P.; Gozani, T. (Science Applications International Corp., Santa Clara, CA (USA)); Bozorgmanesh, H. (Science Applications International Corp., San Diego, CA (USA))

    1990-12-20

    Existing technologies that are applied to explosives-detection in passenger baggage are briefly discussed. A system based on thermal-neutron analysis (TNA) is described. The actual performance of the system in the field on passenger bags is given. The application of the TNA in an integrated airport security system is discussed in view of the intense public debate on this issue. (orig.).

  10. Design of a decentralized detection of interacting LTI systems

    Directory of Open Access Journals (Sweden)

    Shamanth Shankar

    2002-01-01

    Full Text Available In this paper, the problem of designing a decentralized detection filter for a large homogeneous collection of LTI systems is considered. The collection of systems considered here draws inspiration from platoons of vehicles, and the considered interactions amongst systems in the collection are banded and lower triangular, mimicking the typical “look-ahead” nature of interactions in a platoon of vehicles. A fault in a system propagates to other systems in the collection via such interactions.

  11. Analysis of Aviation Safety Reporting System Incident Data Associated with the Technical Challenges of the System-Wide Safety and Assurance Technologies Project

    Science.gov (United States)

    Withrow, Colleen A.; Reveley, Mary S.

    2015-01-01

    The Aviation Safety Program (AvSP) System-Wide Safety and Assurance Technologies (SSAT) Project asked the AvSP Systems and Portfolio Analysis Team to identify SSAT-related trends. SSAT had four technical challenges: advance safety assurance to enable deployment of NextGen systems; automated discovery of precursors to aviation safety incidents; increasing safety of human-automation interaction by incorporating human performance, and prognostic algorithm design for safety assurance. This report reviews incident data from the NASA Aviation Safety Reporting System (ASRS) for system-component-failure- or-malfunction- (SCFM-) related and human-factor-related incidents for commercial or cargo air carriers (Part 121), commuter airlines (Part 135), and general aviation (Part 91). The data was analyzed by Federal Aviation Regulations (FAR) part, phase of flight, SCFM category, human factor category, and a variety of anomalies and results. There were 38 894 SCFM-related incidents and 83 478 human-factorrelated incidents analyzed between January 1993 and April 2011.

  12. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  13. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  14. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  15. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  16. Alternative vehicle detection technologies for traffic signal systems : technical report.

    Science.gov (United States)

    2009-02-01

    Due to the well-documented problems associated with inductive loops, most jurisdictions have : replaced many intersection loops with video image vehicle detection systems (VIVDS). While VIVDS : have overcome some of the problems with loops such as tr...

  17. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  18. Analysis of general aviation single-pilot IFR incident data obtained from the NASA Aviation Safety Reporting System

    Science.gov (United States)

    Bergeron, H. P.

    1983-01-01

    An analysis of incident data obtained from the NASA Aviation Safety Reporting System (ASRS) has been made to determine the problem areas in general aviation single-pilot IFR (SPIFR) operations. The Aviation Safety Reporting System data base is a compilation of voluntary reports of incidents from any person who has observed or been involved in an occurrence which was believed to have posed a threat to flight safety. This paper examines only those reported incidents specifically related to general aviation single-pilot IFR operations. The frequency of occurrence of factors related to the incidents was the criterion used to define significant problem areas and, hence, to suggest where research is needed. The data was cataloged into one of five major problem areas: (1) controller judgment and response problems, (2) pilot judgment and response problems, (3) air traffic control (ATC) intrafacility and interfacility conflicts, (4) ATC and pilot communication problems, and (5) IFR-VFR conflicts. In addition, several points common to all or most of the problems were observed and reported. These included human error, communications, procedures and rules, and work load.

  19. Fully automatic AI-based leak detection system

    Energy Technology Data Exchange (ETDEWEB)

    Tylman, Wojciech; Kolczynski, Jakub [Dept. of Microelectronics and Computer Science, Technical University of Lodz in Poland, ul. Wolczanska 221/223, Lodz (Poland); Anders, George J. [Kinectrics Inc., 800 Kipling Ave., Toronto, Ontario M8Z 6C4 (Canada)

    2010-09-15

    This paper presents a fully automatic system intended to detect leaks of dielectric fluid in underground high-pressure, fluid-filled (HPFF) cables. The system combines a number of artificial intelligence (AI) and data processing techniques to achieve high detection capabilities for various rates of leaks, including leaks as small as 15 l per hour. The system achieves this level of precision mainly thanks to a novel auto-tuning procedure, enabling learning of the Bayesian network - the decision-making component of the system - using simulated leaks of various rates. Significant new developments extending the capabilities of the original leak detection system described in and form the basis of this paper. Tests conducted on the real-life HPFF cable system in New York City are also discussed. (author)

  20. An automated computer misuse detection system for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.