WorldWideScience

Sample records for logging detection systems

  1. LIDAR-INCORPORATED TRAFFIC SIGN DETECTION FROM VIDEO LOG IMAGES OF MOBILE MAPPING SYSTEM

    Directory of Open Access Journals (Sweden)

    Y. Li

    2016-06-01

    Full Text Available Mobile Mapping System (MMS simultaneously collects the Lidar points and video log images in a scenario with the laser profiler and digital camera. Besides the textural details of video log images, it also captures the 3D geometric shape of point cloud. It is widely used to survey the street view and roadside transportation infrastructure, such as traffic sign, guardrail, etc., in many transportation agencies. Although many literature on traffic sign detection are available, they only focus on either Lidar or imagery data of traffic sign. Based on the well-calibrated extrinsic parameters of MMS, 3D Lidar points are, the first time, incorporated into 2D video log images to enhance the detection of traffic sign both physically and visually. Based on the local elevation, the 3D pavement area is first located. Within a certain distance and height of the pavement, points of the overhead and roadside traffic signs can be obtained according to the setup specification of traffic signs in different transportation agencies. The 3D candidate planes of traffic signs are then fitted using the RANSAC plane-fitting of those points. By projecting the candidate planes onto the image, Regions of Interest (ROIs of traffic signs are found physically with the geometric constraints between laser profiling and camera imaging. The Random forest learning of the visual color and shape features of traffic signs is adopted to validate the sign ROIs from the video log images. The sequential occurrence of a traffic sign among consecutive video log images are defined by the geometric constraint of the imaging geometry and GPS movement. Candidate ROIs are predicted in this temporal context to double-check the salient traffic sign among video log images. The proposed algorithm is tested on a diverse set of scenarios on the interstate highway G-4 near Beijing, China under varying lighting conditions and occlusions. Experimental results show the proposed algorithm enhances the

  2. Focused detection logging technique

    International Nuclear Information System (INIS)

    Turcotte, R.E.

    1977-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for determining a characteristic of the media surrounding a borehole by emitting gamma radiation in at least one tightly collimated beam toward an earth formation adjacent a borehole, by detecting from a plurality of tightly collimated paths that are focused at a zone of intersection with and aligned to intersect with each emitted beam the gamma radiation scattered by the interaction of the emitted gamma radiation and the media at the zones of intersection, by misaligning the emitted beams and the tightly collimated paths to prevent their intersection, by detecting gamma radiation scattered by the interaction of the emitted gamma radiation and the media with the emitted beams and the tightly collimated paths misaligned and by determining from the detected gamma radiation a media characteristic. In one embodiment, the detection collimater used is formed of a material that is essentially opaque to gamma radiation at the energies of interest and includes a plurality of passageways that are spherically focused at a zone of intersection with one of the emitted beams of gamma radiation and that are arranged in a number of surfaces that are curved to be azimuthally symmetrical about the axis of the intersected beam. 14 figures

  3. Digital mineral logging system

    International Nuclear Information System (INIS)

    West, J.B.

    1980-01-01

    A digital mineral logging system acquires data from a mineral logging tool passing through a borehole and transmits the data uphole to an electronic digital signal processor. A predetermined combination of sensors, including a deviometer, is located in a logging tool for the acquisition of the desired data as the logging tool is raised from the borehole. Sensor data in analog format is converted in the logging tool to a digital format and periodically batch transmitted to the surface at a predetermined sampling rate. An identification code is provided for each mineral logging tool, and the code is transmitted to the surface along with the sensor data. The self-identifying tool code is transmitted to the digital signal processor to identify the code against a stored list of the range of numbers assigned to that type of tool. The data is transmitted up the d-c power lines of the tool by a frequency shift key transmission technique. At the surface, a frequency shift key demodulation unit transmits the decoupled data to an asynchronous receiver interfaced to the electronic digital signal processor. During a recording phase, the signals from the logging tool are read by the electronic digital signal processor and stored for later processing. During a calculating phase, the stored data is processed by the digital signal processor and the results are outputted to a printer or plotter, or both

  4. Nova Event Logging System

    International Nuclear Information System (INIS)

    Calliger, R.J.; Suski, G.J.

    1981-01-01

    Nova is a 200 terawatt, 10-beam High Energy Glass Laser currently under construction at LLNL. This facility, designed to demonstrate the feasibility of laser driven inertial confinement fusion, contains over 5000 elements requiring coordinated control, data acquisition, and analysis functions. The large amounts of data that will be generated must be maintained over the life of the facility. Often the most useful but inaccessible data is that related to time dependent events associated with, for example, operator actions or experiment activity. We have developed an Event Logging System to synchronously record, maintain, and analyze, in part, this data. We see the system as being particularly useful to the physics and engineering staffs of medium and large facilities in that it is entirely separate from experimental apparatus and control devices. The design criteria, implementation, use, and benefits of such a system will be discussed

  5. A quench detection/logging system for the SSCL Magnet Test Laboratory

    International Nuclear Information System (INIS)

    Kim, K.; Coles, M.; Dryer, J.; Lambert, D.

    1994-01-01

    The quench in a magnet describes a process which occurs while the superconductivity state goes to the normal resistive state. The consequence of a quench is the conversion of the stored electromagnetic energy into heat. During this process the initiating point will reach a high temperature, which will char the insulation or melt the conductor and thereby destroy the magnet. To prevent the magnet from being lost, it is standard practice to observe several resistance and/or inductance voltages across the magnet as quench signatures - Detection. When a quench symptom is detected, protection operations are initiated: proper shutdown of the magnet excitation systems and treatment to dilute the heat energy at a spot - Protection. The temperature rise is diluted by firing heaters along the length of the magnet to ensure that the dissipated energy is spread. It is interesting that there is not a significant amount of published research on detection. To afford a more reliable quench detection system, two distinct approaches have been tried in the past: (i) Understanding of the Noise Mechanism and Sub-system Optimization, and (ii) Escaping from the Known Electromagnetic Noises by Observing Optical Waves or Acoustic Waves. The MTL of SSCL confronts a mass-measurement of about 10,000 production magnets. To meet the testing schedule, the false quench detection rate needs to be further optimized while the true quench detection rate remains secure for the magnet measurement safety. To meet these requirements, the authors followed an iterative top-down approach. First they defend the signal and noise characteristics of the quench phenomena by using existing software tools to build a rapid prototype system incorporating all proven functionality of the existing system. Then they further optimize the system through iterative upgrading based on their signal and noise character findings

  6. A quench detection/logging system for the SSCL Magnet Test Laboratory

    International Nuclear Information System (INIS)

    Kim, K.; Coles, M.; Dryer, J.; Lambert, D.

    1993-05-01

    The quench in a magnet describes a process which occurs while the superconductivity state goes to the normal resistive state. The consequence of a quench is the conversion of the stored electromagnetic energy into heat. During this process the initiating point will reach a high temperature, which will char the insulation or melt the conductor and thereby destroy the magnet. To prevent the magnet from being lost, it is standard practice to observe several resistance and/or inductance voltages across the magnet as quench signatures -- detection. When a quench symptom is detected, protection operations are initiated: proper shutdown of the magnet excitation systems and treatment to dilute the heat energy at a spot -- protection. The temperature rise is diluted by firing heaters along the length of the magnet to insure that the dissipated energy is spread. To develop a reliable quench detection system, two distinct approaches have been tried in the past: (i) Understanding of the Noise Mechanism and Sub-system Optimization, and (ii) Escaping from the Known Electromagnetic Noises by Observing Optical Waves or Acoustic Waves. The MTL of SSCL confronts a mass-measurement of about 10,000 production magnets. To meet the testing schedule, the false quench detection rate needs to be further optimized while the true quench detection rate remains secure for the magnet measurement safety. To meet these requirements, we followed an iterative top-down approach. First we defined the signal and noise characteristics of the quench phenomena by using existing software tools to build a rapid prototype system incorporating all proven functionality of the existing system. Then we further optimize the system through iterative upgrading based on our signal and noise character findings

  7. A graphical automated detection system to locate hardwood log surface defects using high-resolution three-dimensional laser scan data

    Science.gov (United States)

    Liya Thomas; R. Edward. Thomas

    2011-01-01

    We have developed an automated defect detection system and a state-of-the-art Graphic User Interface (GUI) for hardwood logs. The algorithm identifies defects at least 0.5 inch high and at least 3 inches in diameter on barked hardwood log and stem surfaces. To summarize defect features and to build a knowledge base, hundreds of defects were measured, photographed, and...

  8. Borehole logging system

    International Nuclear Information System (INIS)

    Allen, L.S.

    1988-01-01

    A radioactive borehole logging tool employs an epithermal neutron detector having a neutron counter surrounded by an inner thermal neutron filter and an outer thermal neutron filter. Located between the inner and outer filters is a neutron moderating material for extending the lifetime of epithermal neutrons to enhance the counting rate of such epithermal neutrons by the neutron counter

  9. Defect core detection in radiata pine logs

    International Nuclear Information System (INIS)

    Wallace, G.

    1993-01-01

    Internal defect cores in Pinus radiata logs arise primarily from the practice in New Zealand of pruning trees to increase the amount of clear wood. Realising the benefits of this practice when milling the logs is hampered by the lack of a practical method for detecting the defect cores. This report attempts to establish industry requirements for detections and examine techniques which may be suitable. Some trials of a novel technique are described. (author) 19 refs.; 11 figs

  10. Pulsed neutron porosity logging system

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations and, during the bursts, the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  11. New radio meteor detecting and logging software

    Science.gov (United States)

    Kaufmann, Wolfgang

    2017-08-01

    A new piece of software ``Meteor Logger'' for the radio observation of meteors is described. It analyses an incoming audio stream in the frequency domain to detect a radio meteor signal on the basis of its signature, instead of applying an amplitude threshold. For that reason the distribution of the three frequencies with the highest spectral power are considered over the time (3f method). An auto notch algorithm is developed to prevent the radio meteor signal detection from being jammed by a present interference line. The results of an exemplary logging session are discussed.

  12. A neutron well logging system

    International Nuclear Information System (INIS)

    1980-01-01

    A pulsed neutron well logging system using a sealed off neutron generator tube is provided with a programmable digital neutron output control system. The control system monitors the target beam current and compares a function of this current with a pre-programmed control function to develop a control signal for the neutron generator. The control signal is used in a series regulator to control the average replenisher current of the neutron generator tube. The programmable digital control system of the invention also provides digital control signals as a function of time to provide ion source voltages. This arrangement may be utilized to control neutron pulses durations and repetition rates or to produce other modulated wave forms for intensity modulating the output of the neutron generator as a function of time. (Auth.)

  13. A Universal Logging System for LHCb Online

    International Nuclear Information System (INIS)

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko

    2011-01-01

    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  14. Applicability estimation of flowmeter logging for detecting hydraulic pass

    International Nuclear Information System (INIS)

    Miyakawa, Kimio; Tanaka, Yasuji; Tanaka, Kazuhiro

    1997-01-01

    Estimation of the hydraulic pass governing hydrogeological structure contributes significantly to the siting HLW repository. Flowmeter logging can detect hydraulic passes by measuring vertical flow velocity of groundwater in the borehole. We reviewed application of this logging in situ. The hydraulic pass was detected with combination of ambient flow logging, with pumping and/or injecting induced flow logging. This application showed that the flowmeter logging detected hydraulic passes conveniently and accurately compared with other hydraulic tests. Hydraulic conductivity by using flowmeter logging was assessed above 10 -6 m/sec and within one order from comparison with injection packer tests. We suggest that appropriate application of the flowmeter logging for the siting is conducted before hydraulic tests because test sections and monitoring sections are decided rationally for procurement of quantitative hydraulic data. (author)

  15. Acoustic--nuclear permeability logging system

    International Nuclear Information System (INIS)

    Dowling, D.J.; Arnold, D.M.

    1978-01-01

    A down hole logging tool featuring a neutron generator, an acoustic disturbance generator, and a radiation detection system is described. An array of acoustic magnetostriction transducers is arranged about the target of a neutron accelerator. Two gamma ray sensors are separated from the accelerator target by shielding. According to the method of the invention, the underground fluid at the level of a formation is bombarded by neutrons which react with oxygen in the fluid to produce unstable nitrogen 16 particles according to the reaction 16 O(n,p) 16 N. Acoustic pulses are communicated to the fluid, and are incident on the boundary of the borehole at the formation. The resulting net flow of fluid across the boundary is determined from radiation detection measurements of the decaying 16 N particles in the fluid. A measure of the permeability of the formation is obtained from the determination of net fluid flow across the boundary

  16. Data logging system upgrade for Indus accelerator

    International Nuclear Information System (INIS)

    Mishra, R.; Merh, B.N.; Agrawal, R.K.; Fatnani, P.; Navathe, C.P.; Pal, S.

    2012-01-01

    An accelerator has various subsystems like Magnet Power Supply, Beam Diagnostics and Vacuum etc. which are required to work in a stable manner to ensure required machine performance. Logging of system parameters at a faster rate plays a crucial role in analysing and understanding machine behaviour. Logging all the machine parameters consistently at the rate of typically more than 1 Hz has been the aim of a recent data logging system upgrade. Nearly ten thousand parameters are being logged at varying intervals of one second to one minute in Indus accelerator complex. The present logging scheme is augmented to log all these parameters at a rate equal to or more than 1 Hz. The database schema is designed according to the data type of the parameter. The data is distributed into historical table and intermediate table which comprises of recent data. Machine control applications read the parameter values from the control system and store them into the text files of finite time duration for each sub-system. The logging application of each sub-system passes these text files to database for bulk insertion. The detail design of database, logging scheme and its architecture is presented in the paper. (author)

  17. Detection of unexploded ordnance by PGNAA based borehole-logging

    International Nuclear Information System (INIS)

    John Kettler; RWTH-Aachen University, Aachen; Eric Mauerhofer; Marco Steinbusch

    2013-01-01

    The performance of a borehole-logging system, based on prompt-gamma-neutron-activation-analysis (PGNAA), for explosive detection was studied by Monte-Carlo simulations. The prompt gamma of nitrogen, which is a constituent of common explosive, was used to identify the unexploded ordnance (UXO). Our results show that the minimum counting time depends on the soil moisture, the cladding thickness and the explosive composition. In conjunction with the standard detection by magnetometry, the PGNAA is a promising analytical technique for definitive identification of deep buried UXOs. (author)

  18. LHCb Online Log Analysis and Maintenance System

    CERN Document Server

    Garnier, J-C

    2011-01-01

    History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. This clearly demonstrates the need for an automatic system for long-term maintenance and real time analysis of the logs. We have constructed a low cost, fault tolerant centralized logging system which is able to do in-depth analysis and cross-correlation of every log. This system is capable of handling O(10000) different log sources and numerous formats, while trying to keep the overhead as low as possible. It provides log gathering and management, Offline analysis and online analysis. We call Offline analysis the procedure of analyzing old logs for critical information, while Online analysis refer to the procedure of early alerting and reacting. ...

  19. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  20. Well logging system with linearity control

    International Nuclear Information System (INIS)

    Jones, J.M.

    1973-01-01

    Apparatus is described for controlling the gain of a nuclear well logging system comprising: (1) means for measuring the energy spectrum of gamma rays produced by earth formation materials surrounding a well borehole; (2) means for measuring the number of counts of a gamma rays having an energy falling within each of at least two predetermined energy band portions of the gamma ray energy spectrum; (3) means for generating a signal proportional to the ratio of the gamma ray counts and for comparing the ratio signal with at least one constant ratio calibration signal; (4) means for generating an error signal representative of the difference of the ratio signal and the constant ratio calibration signal; and (5) means for using the error signal to control the linearity of the well logging system. (author)

  1. Zope based electronic operation log system - Zlog

    International Nuclear Information System (INIS)

    Yoshii, K.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    Since January 2004, the Zope based electronic operation logging system, named Zlog, has been running at the KEKB and AR accelerator facilities. Since Zope is the python based open source web application server software and python language is familiar for the members in the KEKB accelerator control group, we have developed the Zlog system rapidly. In this paper, we report the development history and the present status of Zlog system. Also we show some general plug-in components, called Zope products, have been useful for our Zlog development. (author)

  2. High resolution gamma spectroscopy well logging system

    International Nuclear Information System (INIS)

    Giles, J.R.; Dooley, K.J.

    1997-01-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. The absolute counting efficiencies of the GSLS detectors were determined using cylindrical reference sources. More complex borehole geometries were modeled using commercially available shielding software and correction factors were developed based on relative gamma-ray fluence rates. Examination of varying porosity and moisture content showed that as porosity increases, and as the formation saturation ratio decreases, relative gamma-ray fluence rates increase linearly for all energies. Correction factors for iron and water cylindrical shields were found to agree well with correction factors determined during previous studies allowing for the development of correction factors for type-304 stainless steel and low-carbon steel casings. Regression analyses of correction factor data produced equations for determining correction factors applicable to spectral gamma-ray well logs acquired under non-standard borehole conditions

  3. Automatic Data Logging and Quality Analysis System for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yong-Yi Fanjiang

    2017-01-01

    Full Text Available The testing phase of mobile device products includes two important test projects that must be completed before shipment: the field trial and the beta user trial. During the field trial, the product is certified based on its integration and stability with the local operator’s system, and, during the beta user trial, the product is certified by multiple users regarding its daily use, where the goal is to detect and solve early problems. In the traditional approach used to issue returns, testers must log into a web site, fill out a problem form, and then go through a browser or FTP to upload logs; however, this is inconvenient, and problems are reported slowly. Therefore, we propose an “automatic logging analysis system” (ALAS to construct a convenient test environment and, using a record analysis (log parser program, automate the parsing of log files and have questions automatically sent to the database by the system. Finally, the mean time between failures (MTBF is used to establish measurement indicators for the beta user trial.

  4. System for gamma-gamma formation density logging while drilling

    International Nuclear Information System (INIS)

    Paske, W.C.

    1991-01-01

    The patent relates to a system for logging subterranean formations for the determination of formation density by using gamma radiation. Gamma ray source and detection means are disposed within a housing adapted for positioning within a borehole for the emission and detection of gamma rays propagating through earth formations and borehole drilling fluid. The gamma ray detection means comprises first and second gamma radiation sensors geometrically disposed within the housing, the same longitudinal distance from the gamma ray source and diametrically opposed in a common plane. A formation matrix density output signal is produced in proportion to the output signal from each of the gamma ray sensors and in conjunction with certain constants established by the geometrical configuration of the sensors relative to the gamma ray source and the borehole diameter. Formation density is determined without regard to the radial position of the logging probe within the borehole in a measuring while drilling mode. 6 figs

  5. Process variant comparison: using event logs to detect differences in behavior and business rules

    NARCIS (Netherlands)

    Bolt, A.; de Leoni, M.; van der Aalst, W.M.P.

    2018-01-01

    This paper addresses the problem of comparing different variants of the same process. We aim to detect relevant differences between processes based on what was recorded in event logs. We use transition systems to model behavior and to highlight differences. Transition systems are annotated with

  6. LongLine: Visual Analytics System for Large-scale Audit Logs

    Directory of Open Access Journals (Sweden)

    Seunghoon Yoo

    2018-03-01

    Full Text Available Audit logs are different from other software logs in that they record the most primitive events (i.e., system calls in modern operating systems. Audit logs contain a detailed trace of an operating system, and thus have received great attention from security experts and system administrators. However, the complexity and size of audit logs, which increase in real time, have hindered analysts from understanding and analyzing them. In this paper, we present a novel visual analytics system, LongLine, which enables interactive visual analyses of large-scale audit logs. LongLine lowers the interpretation barrier of audit logs by employing human-understandable representations (e.g., file paths and commands instead of abstract indicators of operating systems (e.g., file descriptors as well as revealing the temporal patterns of the logs in a multi-scale fashion with meaningful granularity of time in mind (e.g., hourly, daily, and weekly. LongLine also streamlines comparative analysis between interesting subsets of logs, which is essential in detecting anomalous behaviors of systems. In addition, LongLine allows analysts to monitor the system state in a streaming fashion, keeping the latency between log creation and visualization less than one minute. Finally, we evaluate our system through a case study and a scenario analysis with security experts.

  7. An interactive machine-learning approach for defect detection in computed tomogaraphy (CT) images of hardwood logs

    Science.gov (United States)

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt; Philip A. Araman

    2005-01-01

    This paper describes recent progress in the analysis of computed tomography (CT) images of hardwood logs. The long-term goal of the work is to develop a system that is capable of autonomous (or semiautonomous) detection of internal defects, so that log breakdown decisions can be optimized based on defect locations. The problem is difficult because wood exhibits large...

  8. Development of an Intelligent System to Synthesize Petrophysical Well Logs

    Directory of Open Access Journals (Sweden)

    Morteza Nouri Taleghani

    2013-07-01

    Full Text Available Porosity is one of the fundamental petrophysical properties that should be evaluated for hydrocarbon bearing reservoirs. It is a vital factor in precise understanding of reservoir quality in a hydrocarbon field. Log data are exceedingly crucial information in petroleum industries, for many of hydrocarbon parameters are obtained by virtue of petrophysical data. There are three main petrophysical logging tools for the determination of porosity, namely neutron, density, and sonic well logs. Porosity can be determined by the use of each of these tools; however, a precise analysis requires a complete set of these tools. Log sets are commonly either incomplete or unreliable for many reasons (i.e. incomplete logging, measurement errors, and loss of data owing to unsuitable data storage. To overcome this drawback, in this study several intelligent systems such as fuzzy logic (FL, neural network (NN, and support vector machine are used to predict synthesized petrophysical logs including neutron, density, and sonic. To accomplish this, the petrophysical well logs data were collected from a real reservoir in one of Iran southwest oil fields. The corresponding correlation was obtained through the comparison of synthesized log values with real log values. The results showed that all intelligent systems were capable of synthesizing petrophysical well logs, but SVM had better accuracy and could be used as the most reliable method compared to the other techniques.

  9. Log-Log Convexity of Type-Token Growth in Zipf's Systems

    Science.gov (United States)

    Font-Clos, Francesc; Corral, Álvaro

    2015-06-01

    It is traditionally assumed that Zipf's law implies the power-law growth of the number of different elements with the total number of elements in a system—the so-called Heaps' law. We show that a careful definition of Zipf's law leads to the violation of Heaps' law in random systems, with growth curves that have a convex shape in log-log scale. These curves fulfill universal data collapse that only depends on the value of Zipf's exponent. We observe that real books behave very much in the same way as random systems, despite the presence of burstiness in word occurrence. We advance an explanation for this unexpected correspondence.

  10. Pulsed neutron source well logging system

    International Nuclear Information System (INIS)

    Dillingham, M.E.

    1975-01-01

    A pulsed neutron source arrangement is provided in which a sealed cylindrical chamber encloses a rotatable rotor member carrying a plurality of elongated target strips of material which emits neutrons when bombarded with alpha particles emitted by the plurality of source material strips. The rotor may be locked in a so-called ON position by an electromagnetic clutch drive mechanism controllable from the earth's surface so as to permit the making of various types of logs utilizing a continuously emitting neutron source. (Patent Office Record)

  11. A selective logging mechanism for hardware transactional memory systems

    OpenAIRE

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María

    2011-01-01

    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  12. A cement channel-detection technique using the pulsed-neutron log

    International Nuclear Information System (INIS)

    Myers, G.D.

    1991-01-01

    A channel-detection technique has been developed using boron solutions and pulsed-neutron logging (PNL) tools. This technique relies on the extremely high-neutron-absorption cross section that boron exhibits relative to other common elements, including chlorine. The PNL tool is used to detect movement of a boron solution in a log-inject-log procedure. The technique has identified channels in such difficult applications as logging through two strings of pipe and in highly deviated wellbores. Logging procedures are simple and cement channels can be readily identified. The boron solutions are relatively inexpensive, safe to handle, and nonradioactive. Additional PNL information for reservoir performance evaluation is collected simultaneously during channel-detection logging. This paper describes the theory, development, field application, and limitations of this channel-detection logging technique

  13. Detection of defects in logs using computer assisted tomography (CAT) scanning

    International Nuclear Information System (INIS)

    Tonner, P.D.; Lupton, L.R.

    1985-01-01

    The Chalk River Nuclear Laboratories of AECL have performed a preliminary feasibility study on the applicability of computer assisted tomographic techniques to detect the internal structure of logs. Cross sections of three logs have been obtained using a medical CAT scanner. The results show that knots, rot and growth rings are easily recognized in both dry and wet logs

  14. Cross-system log file analysis for hypothesis testing

    NARCIS (Netherlands)

    Glahn, Christian

    2008-01-01

    Glahn, C. (2008). Cross-system log file analysis for hypothesis testing. Presented at Empowering Learners for Lifelong Competence Development: pedagogical, organisational and technological issues. 4th TENCompetence Open Workshop. April, 10, 2008, Madrid, Spain.

  15. Assessment of procurement systems for unutilized logging residues ...

    African Journals Online (AJOL)

    ... in the forest after clear-cutting operation with cutto- length harvesting method. ... as system-2 can be preferable for the initial supply chain configuration in Turkey. ... Key words: logging residue, forest biomass, chipping, supply cost, biomass ...

  16. Digital-to-analog device for continuous detection of neutron damping decrement in logging

    International Nuclear Information System (INIS)

    Sokolov, Yu.I.; Zinchenko, A.I.; Rudenko, Eh.L.

    1976-01-01

    Algorithms are analyzed for a continuous detection of the damping decrement (DD) of the thermal neutron density in time, characterizing absorptive and diffusion properties of a bed; an an automated measuring device has been developed. The design of a digital calculator involving reguired mathematical and logical operations in the DD measurement by the specified algorithms necessitated the use of a system of elements with a diode-transistor RC logic. Following laboratory tests the mock-up of the calculator was subjected to borehole tests as part of the pulsed neutron logging apparatus of the IGN-4 type. A continuous detection of the DD reciprocal with a parallel recording of the differential and integral curves of pulsed neutron-neutron logging has been performed. The borehole tests revealed the efficiency of the new device and the possibility of its use together with the apparatus of the IGN-4 type

  17. Development of slimline logging systems for coal and mineral exploration

    International Nuclear Information System (INIS)

    Reeves, D.R.

    1976-01-01

    Recently, interest shown by multinational oil companies in mining prospecting has led to the requirement for more sophisticated slimline logging units, capable of given comparable results to conventional systems. Aspects of operating conditions and logging requirements are discussed, with particular reference to the effect on equipment design. Special consideration is given to the design and calibration of gamma ray, density, neutron, caliper and resistivity tools. Methods of handling data are discussed and the general application of these techniques to mineral work is considered

  18. Freedom of Information Act Request Log System -

    Data.gov (United States)

    Department of Transportation — This system manages FHWA FOIA requests and is used to better meet the extensive annual reporting requirements imposed by statute (5 USC § 552). The FOIA Management...

  19. Detection of attack-targeted scans from the Apache HTTP Server access logs

    Directory of Open Access Journals (Sweden)

    Merve Baş Seyyar

    2018-01-01

    Full Text Available A web application could be visited for different purposes. It is possible for a web site to be visited by a regular user as a normal (natural visit, to be viewed by crawlers, bots, spiders, etc. for indexing purposes, lastly to be exploratory scanned by malicious users prior to an attack. An attack targeted web scan can be viewed as a phase of a potential attack and can lead to more attack detection as compared to traditional detection methods. In this work, we propose a method to detect attack-oriented scans and to distinguish them from other types of visits. In this context, we use access log files of Apache (or ISS web servers and try to determine attack situations through examination of the past data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been applied on sample data sets and results have been analyzed in terms of performance measures to compare our method and other commonly used detection techniques. Furthermore, various tests have been made on log samples from real systems. Lastly, several suggestions about further development have been also discussed.

  20. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  1. Comparison between moving and stationary transmitter systems in induction logging

    Science.gov (United States)

    Poddar, M.; Caleb Dhanasekaran, P.; Prabhakar Rao, K.

    1985-09-01

    In a general treatment of the theory of induction logging, an exact integral representation has been obtained for the mutual impedance between a vertical dipole transmitter and a coaxial dipole receiver in a three layered earth. Based on this representation, a computer model has been devised using the traditional Slingram system of induction logging and the comparatively new Turam system, ignoring borehole effects. The model results indicate that due to its much larger response, the Turam system is in general preferable to the Slingram in mineral and groundwater investigations where formation conductivity much less than 1 S/m is generally encountered. However, if the surrounding media are conductive (more than 0.1 S/m), the Turam system suffers from large amplitude attenuation and phase rotation of the primary field caused by the conductive surrounding, and is less useful than the Slingram system which does not so suffer, unless the target bed is shallow. Because it is a more complex function of system parameters than the corresponding Slingram log, a Turam log can be conveniently interpreted only by the modern inverse method using a fast algorithm for the forward solution and a high speed digital computer.

  2. Computer method to detect and correct cycle skipping on sonic logs

    International Nuclear Information System (INIS)

    Muller, D.C.

    1985-01-01

    A simple but effective computer method has been developed to detect cycle skipping on sonic logs and to replace cycle skips with estimates of correct traveltimes. The method can be used to correct observed traveltime pairs from the transmitter to both receivers. The basis of the method is the linearity of a plot of theoretical traveltime from the transmitter to the first receiver versus theoretical traveltime from the transmitter to the second receiver. Theoretical traveltime pairs are calculated assuming that the sonic logging tool is centered in the borehole, that the borehole diameter is constant, that the borehole fluid velocity is constant, and that the formation is homogeneous. The plot is linear for the full range of possible formation-rock velocity. Plots of observed traveltime pairs from a sonic logging tool are also linear but have a large degree of scatter due to borehole rugosity, sharp boundaries exhibiting large velocity contrasts, and system measurement uncertainties. However, this scatter can be reduced to a level that is less than scatter due to cycle skipping, so that cycle skips may be detected and discarded or replaced with estimated values of traveltime. Advantages of the method are that it can be applied in real time, that it can be used with data collected by existing tools, that it only affects data that exhibit cycle skipping and leaves other data unchanged, and that a correction trace can be generated which shows where cycle skipping occurs and the amount of correction applied. The method has been successfully tested on sonic log data taken in two holes drilled at the Nevada Test Site, Nye County, Nevada

  3. Parametric Roll Resonance Detection using Phase Correlation and Log-likelihood Testing Techniques

    DEFF Research Database (Denmark)

    Galeazzi, Roberto; Blanke, Mogens; Poulsen, Niels Kjølstad

    2009-01-01

    generation warning system the purpose of which is to provide the master with an onboard system able to trigger an alarm when parametric roll is likely to happen within the immediate future. A detection scheme is introduced, which is able to issue a warning within five roll periods after a resonant motion......Real-time detection of parametric roll is still an open issue that is gathering an increasing attention. A first generation warning systems, based on guidelines and polar diagrams, showed their potential to face issues like long-term prediction and risk assessment. This paper presents a second...... started. After having determined statistical properties of the signals at hand, a detector based on the generalised log-likelihood ratio test (GLRT) is designed to look for variation in signal power. The ability of the detector to trigger alarms when parametric roll is going to onset is evaluated on two...

  4. Simultaneous thermal neutron decay time and porosity logging system

    International Nuclear Information System (INIS)

    Schultz, W.E.; Smith, H.D.; Smith, M.P.

    1980-01-01

    An improved method and apparatus are described for simultaneously measuring the porosity and thermal neutron capture cross section of earth formations in situ in the vicinity of a well borehole using pulsed neutron well logging techniques. The logging tool which is moved through the borehole consists of a 14 MeV pulsed neutron source, an epithermal neutron detector and a combination gamma ray and fast neutron detector. The associated gating systems, counters and combined digital computer are sited above ground. (U.K.)

  5. Simultaneous thermal neutron decay time and porosity logging system

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1979-01-01

    A simultaneous pulsed neutron porosity and thermal neutron capture cross section logging system is provided for radiological well logging of subsurface earth formations. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a combination gamma ray and fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations; and, during the bursts, the fast neutron and epithermal neutron populations are sampled. During the interval between bursts the thermal neutron capture gamma ray population is sampled in two or more time intervals. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity phi. The capture gamma ray measurements are combined to provide a simultaneous determination of the thermal neutron capture cross section Σ

  6. Cross-system log file analysis for hypothesis testing

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus; Schoonenboom, Judith; Sligte, Henk; Moghnieh, Ayman; Hernández-Leo, Davinia; Stefanov, Krassen; Lemmers, Ruud; Koper, Rob

    2008-01-01

    Glahn, C., Specht, M., Schoonenboom, J., Sligte, H., Moghnieh, A., Hernández-Leo, D. Stefanov, K., Lemmers, R., & Koper, R. (2008). Cross-system log file analysis for hypothesis testing. In H. Sligte & R. Koper (Eds.), Proceedings of the 4th TENCompetence Open Workshop. Empowering Learners for

  7. Plant inspection tours with mobile data logging system

    International Nuclear Information System (INIS)

    Roesser, U.

    2006-01-01

    The MDE Mobile Data Logging System has been introduced in a number of German power plants for efficient logging, evaluation, and quality-assured documentation of data recorded on plant inspection tours by means of pocket PCs instead of slips of paper. It will be installed in other nuclear power plants in the near future. The MDE system is composed of the pocket PCs for logging data during plant inspection tours, the associated docking stations installed in the respective areas of application, one PC or, if necessary, several PCs with the appropriate user software, and the associated network links. To install the software in the power plant, lists of rooms and measurement stations as well as other positions on an inspection course are transmitted to the MDE system. When the system has been commissioned, inspection tours are planned in accordance with past experience and optimized in the computer. User experience is taken into account in program updates. New functions improve user comfort and ease of evaluation. Additions to the MDE software, and applications in other areas, are tentatively planned and will be implemented as the need arises. (orig.)

  8. Design of a transport calculation system for logging sondes simulation

    International Nuclear Information System (INIS)

    Marquez Damian, Jose Ignacio

    2005-01-01

    Analysis of available resources in earth crust is performed by different techniques, one of them is neutron logging. Design of sondes that are used to make such logging is supported by laboratory experiments as well as by numerical calculations.This work presents several calculation schemes, designed to simplify the task of whom has to planify such experiments or optimize parameters of this kind of sondes.These schemes use transport calculation codes, especially DaRT, TORT and MCNP, and cross section processing modules from SCALE system.Additionally a system for DaRT and TORT data postprocessing using OpenDX is presented.It allows scalar flux spatial distribution analysis, as wells as cross section condensation and reaction rates calculation

  9. A novel approach proposed for fractured zone detection using petrophysical logs

    International Nuclear Information System (INIS)

    Tokhmechi, B; Memarian, H; Noubari, H A; Moshiri, B

    2009-01-01

    Fracture detection is a key step in wellbore stability and fractured reservoir fluid flow simulation. While different methods have been proposed for fractured zones detection, each of them is associated with certain shortcomings that prevent their full use in different related engineering applications. In this paper, a novel combined method is proposed for fractured zone detection, using processing of petrophysical logs with wavelet, classification and data fusion techniques. Image and petrophysical logs from Asmari reservoir in eight wells of an oilfield in southwestern Iran were used to investigate the accuracy and applicability of the proposed method. Initially, an energy matching strategy was utilized to select the optimum mother wavelets for de-noising and decomposition of petrophysical logs. Parzen and Bayesian classifiers were applied to raw, de-noised and various frequency bands of logs after decomposition in order to detect fractured zones. Results show that the low-frequency bands (approximation 2, a 2 ) of de-noised logs are the best data for fractured zones detection. These classifiers considered one well as test well and the other seven wells as train wells. Majority voting, optimistic OWA (ordered weighted averaging) and pessimistic OWA methods were used to fuse the results obtained from seven train wells. Results confirmed that Parzen and optimistic OWA are the best combined methods to detect fractured zones. The generalization of method is confirmed with an average accuracy of about 72%

  10. Noninvasive detection of inhomogeneities in turbid media with time-resolved log-slope analysis

    International Nuclear Information System (INIS)

    Wan, S.K.; Guo Zhixiong; Kumar, Sunil; Aber, Janice; Garetz, B.A.

    2004-01-01

    Detecting foreign objects embedded in turbid media using noninvasive optical tomography techniques is of great importance in many practical applications, such as in biomedical imaging and diagnosis, safety inspection on aircrafts and submarines, and LIDAR techniques. In this paper we develop a novel optical tomography approach based on slope analysis of time-resolved back-scattered signals collected at the medium boundaries where the light source is an ultrafast, short-pulse laser. As the optical field induced by the laser-pulse propagates, the detected temporal signals are influenced by the optical properties of the medium traversed. The detected temporal signatures therefore contain information that can indicate the presence of an inhomogeneity as well as its size and location relative to the laser source and detection systems. The log-slope analysis of the time-resolved back-scattered intensity is shown to be an effective method for extracting the information contained in the signal. The technique is validated by experimental results and by Monte Carlo simulations

  11. Progress in analysis of computed tomography (CT) images of hardwood logs for defect detection

    Science.gov (United States)

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt

    2003-01-01

    This paper addresses the problem of automatically detecting internal defects in logs using computed tomography (CT) images. The overall purpose is to assist in breakdown optimization. Several studies have shown that the commercial value of resulting boards can be increased substantially if defect locations are known in advance, and if this information is used to make...

  12. Epileptic Seizure Detection with Log-Euclidean Gaussian Kernel-Based Sparse Representation.

    Science.gov (United States)

    Yuan, Shasha; Zhou, Weidong; Wu, Qi; Zhang, Yanli

    2016-05-01

    Epileptic seizure detection plays an important role in the diagnosis of epilepsy and reducing the massive workload of reviewing electroencephalography (EEG) recordings. In this work, a novel algorithm is developed to detect seizures employing log-Euclidean Gaussian kernel-based sparse representation (SR) in long-term EEG recordings. Unlike the traditional SR for vector data in Euclidean space, the log-Euclidean Gaussian kernel-based SR framework is proposed for seizure detection in the space of the symmetric positive definite (SPD) matrices, which form a Riemannian manifold. Since the Riemannian manifold is nonlinear, the log-Euclidean Gaussian kernel function is applied to embed it into a reproducing kernel Hilbert space (RKHS) for performing SR. The EEG signals of all channels are divided into epochs and the SPD matrices representing EEG epochs are generated by covariance descriptors. Then, the testing samples are sparsely coded over the dictionary composed by training samples utilizing log-Euclidean Gaussian kernel-based SR. The classification of testing samples is achieved by computing the minimal reconstructed residuals. The proposed method is evaluated on the Freiburg EEG dataset of 21 patients and shows its notable performance on both epoch-based and event-based assessments. Moreover, this method handles multiple channels of EEG recordings synchronously which is more speedy and efficient than traditional seizure detection methods.

  13. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography

    International Nuclear Information System (INIS)

    Longuetaud, F.

    2005-10-01

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  14. Application of the electric discharge logging system; Hodenshiki jiban tansa system no tekiyo

    Energy Technology Data Exchange (ETDEWEB)

    Kudo, K; Yasuda, N [Tokyo Electric Power Co. Inc., Tokyo (Japan); Kuniyasu, T; Kanda, K; Naito, Y; Tanaka, T

    1997-10-22

    In the process of developing an electric discharge logging system, the advantage over other methods has become clear of P-wave initial amplitude damping coefficient analysis which is accomplished by measuring P-wave velocity in a hard rockbed and examining oscillation receiver bone sensitivity on the spot. In the hope of furthering the advantage, attention is paid to cracks in the rockbed that are deemed to influence damping, and the measurements by the subject system are compared with BSS measurements recorded at a K underground power station. The results of the analysis of P-wave initial amplitude damping coefficients, determined by the electric discharge logging system operated in a measuring hole provided in the cavity accommodating the station main equipment, disclose that there exists a high-coefficient region deeper in the ground where a part of the rockbed is weak. That is, it is inferred that the wide-range variation in damping coefficient detected at levels deeper than the 20.5m-deep hole dug in the arch enlargement corresponds to looseness in the rockbed. Cracks in the BSS records are grouped by aperture width, inclination angle, and strike. The rate of contribution to P-wave initial amplitude damping of each class of cracks is accepted as what shows the geological conditions surrounding the station for the formulation of schematic diagrams exhibiting cracks along the W-E axis and N-S axis. 4 refs., 15 figs.

  15. Fiber-optic data-transmission system for borehole logging. Final report. National Uranium Resource Evaluation

    International Nuclear Information System (INIS)

    Gould, G.

    1981-01-01

    The purpose of the system is to provide signal transmission media for transmission of digital data from a borehole logging probe (and associated processor-electronics) to a borehole logging truck at the surface. This fiber optic transmission system is specifically designed for use on the Bendix Field Engineering Corp. (BFEC) R and D logging truck

  16. System em um operador logístico (3PL

    Directory of Open Access Journals (Sweden)

    Douglas Ribeiro Novaes

    2016-11-01

    Full Text Available With the constant technological advancement, the companies started to invest in new systems to support competitiveness in the market in which they operate. This article aims to describe the process of deployment of the technology Warehouse Management System. The tool known as WMS is a system that facilitates the handling operations and storage materials through defined parameters, but the deployment of this system need to go through steps that impact positively and negatively the company's various sectors. This study was developed because of the existence of questions related to the development of the implementation of project presenting departments and professionals involved in the process and due to the need to clarify doubts about the usefulness of system. This document was based on specific literature and complemented by a case study on the company Julio Simoes Logística S / A through an interview with the organization's representative. In order to logistics operator perform their daily activities as receipt, storage and dispatch efficiently it is necessary  a technology that provides accurate and reliable data,  and that make available information that allows the company, to improve its operations.

  17. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  18. When Workflow Management Systems and Logging Systems Meet: Analyzing Large-Scale Execution Traces

    Energy Technology Data Exchange (ETDEWEB)

    Gunter, Daniel

    2008-07-31

    This poster shows the benefits of integrating a workflow management system with logging and log mining capabilities. By combing two existing, mature technologies: Pegasus-WMS and Netlogger, we are able to efficiently process execution logs of earthquake science workflows consisting of hundreds of thousands to one million tasks. In particular we show results of processing logs of CyberShake, a workflow application running on the TeraGrid. Client-side tools allow scientists to quickly gather statistics about a workflow run and find out which tasks executed, where they were executed, what was their runtime, etc. These statistics can be used to understand the performance characteristics of a workflow and help tune the execution parameters of the workflow management system. This poster shows the scalability of the system presenting results of uploading task execution records into the system and by showing results of querying the system for overall workflow performance information.

  19. Automated Detection of Selective Logging in Amazon Forests Using Airborne Lidar Data and Pattern Recognition Algorithms

    Science.gov (United States)

    Keller, M. M.; d'Oliveira, M. N.; Takemura, C. M.; Vitoria, D.; Araujo, L. S.; Morton, D. C.

    2012-12-01

    Selective logging, the removal of several valuable timber trees per hectare, is an important land use in the Brazilian Amazon and may degrade forests through long term changes in structure, loss of forest carbon and species diversity. Similar to deforestation, the annual area affected by selected logging has declined significantly in the past decade. Nonetheless, this land use affects several thousand km2 per year in Brazil. We studied a 1000 ha area of the Antimary State Forest (FEA) in the State of Acre, Brazil (9.304 ○S, 68.281 ○W) that has a basal area of 22.5 m2 ha-1 and an above-ground biomass of 231 Mg ha-1. Logging intensity was low, approximately 10 to 15 m3 ha-1. We collected small-footprint airborne lidar data using an Optech ALTM 3100EA over the study area once each in 2010 and 2011. The study area contained both recent and older logging that used both conventional and technologically advanced logging techniques. Lidar return density averaged over 20 m-2 for both collection periods with estimated horizontal and vertical precision of 0.30 and 0.15 m. A relative density model comparing returns from 0 to 1 m elevation to returns in 1-5 m elevation range revealed the pattern of roads and skid trails. These patterns were confirmed by ground-based GPS survey. A GIS model of the road and skid network was built using lidar and ground data. We tested and compared two pattern recognition approaches used to automate logging detection. Both segmentation using commercial eCognition segmentation and a Frangi filter algorithm identified the road and skid trail network compared to the GIS model. We report on the effectiveness of these two techniques.

  20. Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats

    OpenAIRE

    Schindler, Timo

    2018-01-01

    Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16].With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and an abstracted graph approach, it is possible to create flexible attack profiles. Using this approach...

  1. Earth formation pulsed neutron porosity logging system utilizing epithermal neutron and inelastic scattering gamma ray detectors

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector and an inelastic scattering gamma ray detector is moved through a borehole. The detection of inelastic gamma rays provides a measure of the fast neutron population in the vicinity of the detector. repetitive bursts of neutrons irradiate the earth formation and, during the busts, inelastic gamma rays representative of the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. the fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  2. Copy-move forgery detection utilizing Fourier-Mellin transform log-polar features

    Science.gov (United States)

    Dixit, Rahul; Naskar, Ruchira

    2018-03-01

    In this work, we address the problem of region duplication or copy-move forgery detection in digital images, along with detection of geometric transforms (rotation and rescale) and postprocessing-based attacks (noise, blur, and brightness adjustment). Detection of region duplication, following conventional techniques, becomes more challenging when an intelligent adversary brings about such additional transforms on the duplicated regions. In this work, we utilize Fourier-Mellin transform with log-polar mapping and a color-based segmentation technique using K-means clustering, which help us to achieve invariance to all the above forms of attacks in copy-move forgery detection of digital images. Our experimental results prove the efficiency of the proposed method and its superiority to the current state of the art.

  3. Designing efficient logging systems for northern hardwoods using equipment production capabilities and costs.

    Science.gov (United States)

    R.B. Gardner

    1966-01-01

    Describes a typical logging system used in the Lake and Northeastern States, discusses each step in the operation, and presents a simple method for designing and efficient logging system for such an operation. Points out that a system should always be built around the key piece of equipment, which is usually the skidder. Specific equipment types and their production...

  4. Features of the electric discharge logging system; Hoden hoshiki jiban tansa system no tokucho

    Energy Technology Data Exchange (ETDEWEB)

    Kudo, K; Yasuda, N [Tokyo Electric Power Co. Inc., Tokyo (Japan); Kuniyasu, T; Kanda, K; Tanaka, T

    1997-10-22

    Logging system has been developed, which performs discharge in the water in a bore hole relatively small in diameter. The part of this system to operate in the hole consists of an oscillator that triggers off discharge in the water and an oscillation receiving set that utilizes electrostriction proper to ceramics. The groundborne part of the system is comprised of a probe lift control and logging control. The logging process is carried out by causing discharge in the water in a bore hole filled with water. The energy generated by the oscillator is far greater than that produced in the sonic logging or suspension type logging method, and the wave generated and propagated in the hole is received by the receiving set in the same hole. The result indicates that the P-wave velocity in a hard rockbed is rather high and that values obtained on the spot by this system is quite similar to those obtained from the core sample from the hole. In the case of a rock bed abundant in cracks, thanks to the high S/N ratio such a bed presents and the merits of digital recording, investigations can be minutely conducted. The merit of this system is found in that it can damp the amplitude in dealing with the data collected on the spot. 3 refs., 7 figs.

  5. Examples of detection of water flow by oxygen activation on pulsed neutron logs

    International Nuclear Information System (INIS)

    de Rosset, W.H.M.

    1986-01-01

    Upward flow of water in cased wellbores may be detected with pulsed neutron capture (PNC) and gamma ray (GR) tools. Water entering tubing, casing and flowing behind pipe may similarly be evaluated qualitatively. Gamma ray background anomalies in PNC data and elevation of GR tool response occur when water is flowing above threshold velocities and volumes. The technique requires logging the well under static and flow conditions or logging at different tools speeds in a flowing well. Oxygen activation results in increased gamma ray count rates at each detector. PNC far detector and GR well log curves from each log run (flowing well, static well) are overlain. The increases for each curve are offset from the point of water entry by a distance similar to tool source-detector spacing. These offsets in gamma increase are 15-20 ft. higher for the GR than for the PNC far detector and distinguish oxygen activation due to flowing water from common hot spots. The amount of gamma ray increase is controlled by the velocity of upward flow of water past the tool, the amount of water flowing, and the distance of the flow from the tool. Prior planning is important to gain usable information in flowing wells. The upward relative velocity imposes maximal and minimal tool speeds to produce significant gamma increases, and tool speed must be adjusted to optimize gamma changes. Use of the technique to answer actual production problems is illustrated with examples. Insight was gained which led to the correction of the problem in each case

  6. Parental perceptions of the learner driver log book system in two Australian states.

    Science.gov (United States)

    Bates, Lyndel; Watson, Barry; King, Mark Johann

    2014-01-01

    Though many jurisdictions internationally now require learner drivers to complete a specified number of hours of supervised driving practice before being able to drive unaccompanied, very few require learner drivers to complete a log book to record this practice and then present it to the licensing authority. Learner drivers in most Australian jurisdictions must complete a log book that records their practice, thereby confirming to the licensing authority that they have met the mandated hours of practice requirement. These log books facilitate the management and enforcement of minimum supervised hours of driving requirements. Parents of learner drivers in 2 Australian states, Queensland and New South Wales, completed an online survey assessing a range of factors, including their perceptions of the accuracy of their child's learner log book and the effectiveness of the log book system. The study indicates that the large majority of parents believe that their child's learner log book is accurate. However, they generally report that the log book system is only moderately effective as a system to measure the number of hours of supervised practice a learner driver has completed. The results of this study suggest the presence of a paradox, with many parents possibly believing that others are not as diligent in the use of log books as they are or that the system is too open to misuse. Given that many parents report that their child's log book is accurate, this study has important implications for the development and ongoing monitoring of hours of practice requirements in graduated driver licensing systems.

  7. Computer-based system for acquisition of nuclear well log data

    International Nuclear Information System (INIS)

    Meisner, J.E.

    1983-01-01

    There is described a computer-based well logging system, for acquiring nuclear well log data, including gamma ray energy spectrum and neutron population decay rate data, and providing a real-time presentation of the data on an operator's display based on a traversal by a downhole instrument of a prescribed borehole depth interval. The system has a multichannel analyzer including a pulse height analyzer and a memory. After a spectral gamma ray pulse signal coming from a downhole instrument over a logging cable is amplified and conditioned, the pulse height analyzer converts the pulse height into a digital code by peak detection, sample-and-hold action, and analog-to-digital conversion. The digital code defines the address of a memory location or channel, corresponding to a particular gamma ray energy and having a count value to be incremented. The spectrum data is then accessed by the system central processing unit (CPU) for analysis, and routed to the operator's display for presentation as a plot of relative gamma ray emissions activity versus energy level. For acquiring neutron decay rate data, the system has a multichannel scaling unit including a memory and a memory address generator. After a burst of neutrons downhole, thermal and epithermal neutron detector pulses build up and die away. Using the neutron source trigger as an initializing reference, the address generator produces a sequence of memory address codes, each code addressing the memory for a prescribed period of time, so as to define a series of time slots. A detector pulse signal produced during a time slot results in the incrementing of the count value in an address memory location. (author)

  8. A risk index for multicriterial selection of a logging system with low environmental impact

    Energy Technology Data Exchange (ETDEWEB)

    Horodnic, Sergiu Andrei, E-mail: horodnic@usv.ro

    2015-02-15

    Setting up the working stages in forest operations is conditioned by environmental protection and forest health requirements. This paper exposes a method for improving the decision-making process by choosing the most environmentally effective logging systems according to terrain configuration and stand characteristics. Such a methodology for selecting machines or logging systems accounting for environment, safety as well as economics, becomes mandatory in the context of sustainable management of forest with multiple functions. Based on analytic hierarchy process analysis the following classification of the environmental performance for four considered alternatives was obtained: skyline system (42.43%), forwarder system (20.22%), skidder system (19.92%) and horse logging system (17.43%). Further, an environmental risk matrix for the most important 28 risk factors specific to any work equipment used in forest operations was produced. In the end, a multicriterial analysis generated a risk index RI ranging between 1.0 and 3.5, which could help choosing the optimal combination of logging system and logging equipment with low environmental impact. In order to demonstrate the usefulness of the proposed approach, a simple application in specific conditions of a harvesting site is presented. - Highlights: • We propose a decision-making algorithm to select eco-friendly logging systems. • Analytic hierarchy process was applied for ranking 4 types of logging systems. • An environmental risk matrix with 28 risk factors in forest operations was made up.

  9. A risk index for multicriterial selection of a logging system with low environmental impact

    International Nuclear Information System (INIS)

    Horodnic, Sergiu Andrei

    2015-01-01

    Setting up the working stages in forest operations is conditioned by environmental protection and forest health requirements. This paper exposes a method for improving the decision-making process by choosing the most environmentally effective logging systems according to terrain configuration and stand characteristics. Such a methodology for selecting machines or logging systems accounting for environment, safety as well as economics, becomes mandatory in the context of sustainable management of forest with multiple functions. Based on analytic hierarchy process analysis the following classification of the environmental performance for four considered alternatives was obtained: skyline system (42.43%), forwarder system (20.22%), skidder system (19.92%) and horse logging system (17.43%). Further, an environmental risk matrix for the most important 28 risk factors specific to any work equipment used in forest operations was produced. In the end, a multicriterial analysis generated a risk index RI ranging between 1.0 and 3.5, which could help choosing the optimal combination of logging system and logging equipment with low environmental impact. In order to demonstrate the usefulness of the proposed approach, a simple application in specific conditions of a harvesting site is presented. - Highlights: • We propose a decision-making algorithm to select eco-friendly logging systems. • Analytic hierarchy process was applied for ranking 4 types of logging systems. • An environmental risk matrix with 28 risk factors in forest operations was made up

  10. A simple low cost speed log interface for oceanographic data acquisition system

    Digital Repository Service at National Institute of Oceanography (India)

    Khedekar, V.D.; Phadte, G.M.

    A speed log interface is designed with parallel Binary Coded Decimal output. This design was mainly required for the oceanographic data acquisition system as an interface between the speed log and the computer. However, this can also be used as a...

  11. A simulation-based approach for evaluating logging residue handling systems.

    Science.gov (United States)

    B. Bruce Bare; Benjamin A. Jayne; Brian F. Anholt

    1976-01-01

    Describes a computer simulation model for evaluating logging residue handling systems. The flow of resources is traced through a prespecified combination of operations including yarding, chipping, sorting, loading, transporting, and unloading. The model was used to evaluate the feasibility of converting logging residues to chips that could be used, for example, to...

  12. Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency.

    Science.gov (United States)

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-05-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Background subtraction system for pulsed neutron logging of earth boreholes

    International Nuclear Information System (INIS)

    Hopkinson, E.C.

    1977-01-01

    A neutron generator in well logging instrument is pulsed 100 times having a time between pulses of 1400 microseconds. This is followed by an off period of four cycles wherein 2800 microseconds is allowed for capture radiation to decay to an insignificant level and the remaining 2800 microseconds is used to measure background radiation. This results in the neutron source being disabled four pulses after every hundred pulses of operation, or approximately a 4 percent loss of neutron output. A first detector gate is open from 400 to 680 microseconds and a second detector gate is open from 700 to 980 microseconds. During the 100 cycles, each of the gates is thus open for 280 microseconds times 100 for a total of 28,000 microseconds. By scaling the gate count rate by a factor of 10, the background is subtracted directly

  14. An automated locating and data logging system for geophysical surveys

    International Nuclear Information System (INIS)

    Nyquist, J.E.; Blair, M.S.

    1990-01-01

    Oak Ridge National Laboratory has developed an Ultrasonic Ranging and Data System (USRADS) and interfaced the system with a Geonics EM31 terrain conductivity meter. USRADS keeps track of a surveyor's position by measuring the time-of-flight of ultrasonic pulses from an transducer carried by the surveyor in a backpack to stationary receivers arrayed over the survey area. Also built into the backpack is a radio transmitter that sends the EM31 data to a base station (van or truck) where the surveyor's position and the EM31 quadrature and inphase data are automatically recorded once a second on a portable computer. We surveyed a 13-acre landfill at Idaho National Engineering Laboratory with three people, in three days, collecting over 25,000 EM31 quadrature and inphase readings. At a normal walking pace the average distance between measurement points along the surveyor's path was about 2 ft, with an overall positioning precision of about 0.5 ft for each point. USRADS offers several advantages over conventional EM31 surveys: (1) time and money are saved because it does not require a civil survey to lay a grid before the geophysical survey begins, (2) data are directly recorded by a portable computer and are available for analysis in the field, and (3) refining or expanding the grid about an anomaly does not require civil surveying to add extra grid points. USRADS can also be used with a gamma scintillometer for radiation surveys. Currently, we are working to interface USRADS with a portable X-ray fluorescence spectrometer for detecting heavy metals in soil

  15. SU-E-T-392: Evaluation of Ion Chamber/film and Log File Based QA to Detect Delivery Errors

    International Nuclear Information System (INIS)

    Nelson, C; Mason, B; Kirsner, S; Ohrt, J

    2015-01-01

    Purpose: Ion chamber and film (ICAF) is a method used to verify patient dose prior to treatment. More recently, log file based QA has been shown as an alternative for measurement based QA. In this study, we delivered VMAT plans with and without errors to determine if ICAF and/or log file based QA was able to detect the errors. Methods: Using two VMAT patients, the original treatment plan plus 7 additional plans with delivery errors introduced were generated and delivered. The erroneous plans had gantry, collimator, MLC, gantry and collimator, collimator and MLC, MLC and gantry, and gantry, collimator, and MLC errors. The gantry and collimator errors were off by 4 0 for one of the two arcs. The MLC error introduced was one in which the opening aperture didn’t move throughout the delivery of the field. For each delivery, an ICAF measurement was made as well as a dose comparison based upon log files. Passing criteria to evaluate the plans were ion chamber less and 5% and film 90% of pixels pass the 3mm/3% gamma analysis(GA). For log file analysis 90% of voxels pass the 3mm/3% 3D GA and beam parameters match what was in the plan. Results: Two original plans were delivered and passed both ICAF and log file base QA. Both ICAF and log file QA met the dosimetry criteria on 4 of the 12 erroneous cases analyzed (2 cases were not analyzed). For the log file analysis, all 12 erroneous plans alerted a mismatch in delivery versus what was planned. The 8 plans that didn’t meet criteria all had MLC errors. Conclusion: Our study demonstrates that log file based pre-treatment QA was able to detect small errors that may not be detected using an ICAF and both methods of were able to detect larger delivery errors

  16. Development of response transforms from comparative study of commercial pulsed neutron capture logging systems

    International Nuclear Information System (INIS)

    Salaita, G.N.; Youngblood, W.E.

    1991-01-01

    This paper reports that the absence of a common calibration facility to ascertain the accuracy of commercial pulsed neutron capture logging systems, coupled with the desire for more accurate saturation determination from time-lapse logs, prompted Saudi Aramco to carry out this comparative study. Three generations of Schlumberger's Thermal Decay Time (TDT) logging devices, viz., TDT-K, TDT-M, and TDT-P along with Atlas Wireline PDK-100 system were run in an Aramco well. The wellbore 8-1/2 inch with 7-inch casing-penetrated clean sand, shaly sand, and shale streaks sequence as exhibited by the open hole natural gamma ray log. initially, the wellbore fluid was diesel. The fluid was then changed to brines of 42-kppm and 176-kppm NACl, respectively. Three repeat passes at a logging speed of 900 ft/hr were obtained by each device for each of the three borehole liquids. In the case of PDK-100, a second set of log runs was obtained at 1800 ft/hr. The results of this extensive comparative study have increased the author's understanding of the borehole liquid and the diffusion effects on the response of pulsed neutron capture logging systems and also on the relative accuracy and precision of measured formation thermal neutron capture cross section by each system

  17. Pulsed power supply system for neutron well logging

    International Nuclear Information System (INIS)

    Hopkinson, E.C.

    1975-01-01

    A variable D. C. power supply and a variable A. C. power supply are coupled onto the upper end of a single conductor cable at the earth's surface and from the lower end of said cable to a well logging instrument. The A. C. voltage is used to provide filament power for the ion source accelerator tube. The D. C. voltage is used to provide power to fixed D. C. loads maintained constant by regulators once a threshold is reached. The D. C. voltage is raised above the threshold to control the pulsed acceleration voltage and hence neutron output by first feeding into a unijunction relaxation oscillator in combination with an SCR output which output is transformer coupled into a voltage multiplier circuit. An antilatch feature is provided for the SCR by transformer coupling the pulses on the SCR anode back to the base of a transistor in series with the cathode of the SCR. Two outputs of the voltage multiplier circuit are connected to the cathode and anode, respectively, of an ion source accelerator tube, the cathode being connected through a resistor to retard the ripple pulsing of the cathode to allow ionization of the accelerator tube

  18. Water quality management in shrimp aquaculture ponds using remote water quality logging system

    Digital Repository Service at National Institute of Oceanography (India)

    Sreepada, R.A.; Kulkarni, S.; Suryavanshi, U.; Ingole, B.S.; Drensgstig, A.; Braaten, B.

    Currently an institutional co-operation project funded by NORAD is evaluating different environmental management strategies for sustainable aquaculture in India. A brief description of a remote water quality logging system installed in shrimp ponds...

  19. Storage of sparse files using parallel log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-11-07

    A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.

  20. Controlled sliding of logs downhill by chute system integrated with portable winch and synthetic rope

    Directory of Open Access Journals (Sweden)

    Neşe Gülci

    2016-01-01

    Full Text Available Over 80% of wood extraction operations have been performed by conventional methods in Turkey. Conventional methods include skidding or sliding of logs mainly by man and animal power, which poses problems in terms of technical, economical, environmental, and ergonomic aspects. Skidding wood on plastic chutes has been implemented in limited numbers of logging applications in recent years, and provides important advantages such as reducing environmental damages and minimizing the value and volume loss of transported wood products. In this study, a chute system integrated with a mobile winch was developed for controlled sliding of large diameter logs downhill. In addition, synthetic ropes rather than steel cables were used to pull log products, resulting in a lower weight and more efficient extraction system. The system was tested on a sample wood production operation in Çınarpınar Forest Enterprise Chief of Kahramanmaraş Forest Enterprise Directorate. In the study, productivity analysis of chute system was performed and its ecological impacts were evaluated. During controlled sliding of logs downhill, the highest productivity (10.01 m3/hour was reached in the fourth chute system characterized as 36 m in length and 70% ground slope. One of the main factors that affected the productivity of chute system was the controlled sliding time of the logs. It was found that residual stand damage was very limited during controlled sliding operations.

  1. Background subtraction system for pulsed neutron logging of earth boreholes

    International Nuclear Information System (INIS)

    Hertzog, R.C.

    1983-01-01

    The invention provides a method for determining the characteristics of earth formations surrounding a well borehole comprising the steps of: repetitively irradiating the earth formations surrounding the well bore with relatively short duration pulses of high energy neutrons; detecting during each pulse of high energy neutrons, gamma radiation due to the inelastic scattering of neutrons by materials comprising the earth formations surrounding the borehole and providing information representative thereof; detecting immediately following each such pulse of high energy neutrons, background gamma radiation due to thermal neutron capture and providing information representative thereof; and correcting the inelastic gamma representative information to compensate for said background representative information

  2. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  3. Development of a crosshole sonic logging system for the integrity test of cast-in-situ piles

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Tai-Sup; Sung, Nak-Hoon; Hwang, Hak-Soo [Korea Institute of Geoscience and Mineral Resources, Taejeon(Korea)

    2001-09-01

    To evaluate the integrity of cast-in-situ concrete piles, a notebook PC-based crosshole sonic logging system which can be handled by one operator was developed using PCMCIA-type analog to digital converter card. User-interactive software for operation of the system were also developed using Labview. The system was tested with the field model pile to confirm the performance of the developed system. The test result shows that the system is very stable and efficient for detecting defects of the pile. (author). 3 refs., 9 figs.

  4. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  5. Machine Vision Systems for Processing Hardwood Lumber and Logs

    Science.gov (United States)

    Philip A. Araman; Daniel L. Schmoldt; Tai-Hoon Cho; Dongping Zhu; Richard W. Conners; D. Earl Kline

    1992-01-01

    Machine vision and automated processing systems are under development at Virginia Tech University with support and cooperation from the USDA Forest Service. Our goals are to help U.S. hardwood producers automate, reduce costs, increase product volume and value recovery, and market higher value, more accurately graded and described products. Any vision system is...

  6. Microcontroller-based data logging instrumentation system for wind ...

    African Journals Online (AJOL)

    In this study, a microcontroller based data logger for measuring wind speed and wind direction has been designed. The designed system uses the Atmel microcontroller family which consists of sensor inputs, a microcontroller and a data storage device. The system was designed and developed to measure the wind speed ...

  7. Simultaneous thermal neutron decay time and porosity logging system

    International Nuclear Information System (INIS)

    Shultz, W.E.

    1980-01-01

    A method for simultaneously determining the porosity and thermal neutron capture cross-section of earth formations in the vicinity of a well borehole is claimed. It comprises the following steps: passing a well tool into a cased well borehole. The tool has a pulsed source of fast neutrons, a combination fast neutron and gamma ray detector and an epithermal neutron detector; repetitively irradiating the earth formations in the vicinity of the borehole with bursts of fast neutrons; detecting the fast neutron and epithermal neutron populations in the borehole (during the neutron bursts) and generating first and second measurement signals; detecting for second and third time intervals during the time between the neutron bursts, the gamma radiation present in the borehole due to the capture of thermalized neutrons by the nuclei of elements comprising the earth formations and generating third and fourth measurement signals; and combining the first and second measurement signals according to a predetermined relationship to derive an indication of the porosity of the earth formations and combining the third and fourth measurement signals to derive an indication of the thermal neutron capture cross-section of the earth formations

  8. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  9. Computer Vision Systems for Hardwood Logs and Lumber

    Science.gov (United States)

    Philip A. Araman; Tai-Hoon Cho; D. Zhu; R. Conners

    1991-01-01

    Computer vision systems being developed at Virginia Tech University with the support and cooperation from the U.S. Forest Service are presented. Researchers at Michigan State University, West Virginia University, and Mississippi State University are also members of the research team working on various parts of this research. Our goals are to help U.S. hardwood...

  10. A positioning and data logging system for surface geophysical surveys

    International Nuclear Information System (INIS)

    Nyquist, J.E.; Blair, M.S.

    1988-01-01

    The Ultrasonic Ranging and Data System (USRADS) developed at ORNL is being adapted to work with two commercially available geophysical instruments: a magnetometer and an EM31 terrain conductivity meter. Geophysical surveys have proven an important preliminary step in investigating hazardous waste sites. Magnetometers and terrain conductivity meters are used to locate buried drums, trenches, conductive contaminant plumes and map regional changes in geology. About half the field time of a typical geophysical investigation is spent surveying the position of the grid points at which the measurements will be made. Additional time is lost and errors may be made recording instrument values in field notebooks and transcribing the data to a computer. Developed for gamma radiation surveys, the USRAD system keeps track of the surveyor's position automatically by triangulating on an ultrasonic transmitter carried in a backpack. The backpack also contains a radio transmitter that sends the instrument's reading coincident with the ultrasonic pulse. The surveyor's position and the instrument's reading are recorded by a portable computer which can plot the data to check the survey's progress. Electronic files are stored in a form compatible with AutoCAD to speed report writing. 7 refs., 3 figs

  11. Singular and interactive effects of blowdown, salvage logging, and wildfire in sub-boreal pine systems

    Science.gov (United States)

    D'Amato, A.W.; Fraver, S.; Palik, B.J.; Bradford, J.B.; Patty, L.

    2011-01-01

    The role of disturbance in structuring vegetation is widely recognized; however, we are only beginning to understand the effects of multiple interacting disturbances on ecosystem recovery and development. Of particular interest is the impact of post-disturbance management interventions, particularly in light of the global controversy surrounding the effects of salvage logging on forest ecosystem recovery. Studies of salvage logging impacts have focused on the effects of post-disturbance salvage logging within the context of a single natural disturbance event. There have been no formal evaluations of how these effects may differ when followed in short sequence by a second, high severity natural disturbance. To evaluate the impact of this management practice within the context of multiple disturbances, we examined the structural and woody plant community responses of sub-boreal Pinus banksiana systems to a rapid sequence of disturbances. Specifically, we compared responses to Blowdown (B), Fire (F), Blowdown-Fire, and Blowdown-Salvage-Fire (BSF) and compared these to undisturbed control (C) stands. Comparisons between BF and BSF indicated that the primary effect of salvage logging was a decrease in the abundance of structural legacies, such as downed woody debris and snags. Both of these compound disturbance sequences (BF and BSF), resulted in similar woody plant communities, largely dominated by Populus tremuloides; however, there was greater homogeneity in community composition in salvage logged areas. Areas experiencing solely fire (F stands) were dominated by P. banksiana regeneration, and blowdown areas (B stands) were largely characterized by regeneration from shade tolerant conifer species. Our results suggest that salvage logging impacts on woody plant communities are diminished when followed by a second high severity disturbance; however, impacts on structural legacies persist. Provisions for the retention of snags, downed logs, and surviving trees as part

  12. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  13. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  14. A Bayesian model for anomaly detection in SQL databases for security systems

    NARCIS (Netherlands)

    Drugan, M.M.

    2017-01-01

    We focus on automatic anomaly detection in SQL databases for security systems. Many logs of database systems, here the Townhall database, contain detailed information about users, like the SQL queries and the response of the database. A database is a list of log instances, where each log instance is

  15. Comparison of planted soil infiltration systems for treatment of log yard runoff.

    Science.gov (United States)

    Hedmark, Asa; Scholz, Miklas; Aronsson, Par; Elowson, Torbjorn

    2010-07-01

    Treatment of log yard runoff is required to avoid contamination of receiving watercourses. The research aim was to assess if infiltration of log yard runoff through planted soil systems is successful and if different plant species affect the treatment performance at a field-scale experimental site in Sweden (2005 to 2007). Contaminated runoff from the log yard of a sawmill was infiltrated through soil planted with Alnus glutinosa (L.) Gärtner (common alder), Salix schwerinii X viminalis (willow variety "Gudrun"), Lolium perenne (L.) (rye grass), and Phalaris arundinacea (L.) (reed canary grass). The study concluded that there were no treatment differences when comparing the four different plants with each other, and there also were no differences between the tree and the grass species. Furthermore, the infiltration treatment was effective in reducing total organic carbon (55%) and total phosphorus (45%) concentrations in the runoff, even when the loads on the infiltration system increased from year to year.

  16. Response transforms from comparative study of commercial pulsed-neutron-capture logging systems

    International Nuclear Information System (INIS)

    Salaita, G.N.

    1992-01-01

    This paper reports that three generations of Schlumberger's Thermal Decay Time (TDT SM ) logging devices - viz., TDT-K, TDT-M, and TDT-P - along with an Atlas Wireline PDK-100 SM system were run in a Saudi Aramco well. The wellbore (8 1/2 in. with 7-in. casing) penetrated a sequence of clean sand, shaly sand, and shale streaks as exhibited by the openhole natural gamma ray log. The initial wellbore fluid was diesel. The fluid was then changed to brines of 42,000 and 176,000 ppm NaCl, respectively. Three repeat passes at a logging speed of 900 ft/hr were obtained by each device for each borehole liquid. As a result of this extensive comparative study, a set of departure curves and mathematical transforms was developed primarily for standardizing the various Schlumberger tools to a common reference logging system and/or borehole environment. The transforms were used beneficially to determine residual oil saturation (ROS) from time-lapse logs in a Saudi Aramco reservoir

  17. E-log system in monitoring of residency program: trainees perspective

    International Nuclear Information System (INIS)

    Iqbal, U.; Gondal, K.M.

    2015-01-01

    To record residents perspective about the utility of newly introduced E-Log system at the College of Physicians and Surgeons Pakistan (CPSP). Study Design: Sequential mixed method design using survey questionnaire and in-depth interviews. Place and Duration of Study: CPSP, Regional Center, Lahore, from March to June 2014. Methodology: Data was collected from registered trainees through a web-based survey questionnaire on a scale of 1 to 7 about the utility of E-log system. In-depth interviews were conducted with 7 students using non-probability purposive sampling. The interviews were tape recorded and subsequently transcribed. Quantitative data was analyzed using SPSS version 20 and qualitative data was analyzed using content analysis by identifying themes and patterns. Results: A total of 4399 responses were received. Motivation was 4.61± 1.98; 4.33 ± 2.00 remained acknowledgment of control of one's training by the new system. Ease of use got a mean score of 4.56 ± 2.15. Conclusion: The overall acceptance of the students regarding E-Log system was high. Scheduling IT workshop at the start of training will add to the student satisfaction regarding utility of E-Log system. (author)

  18. Linearity improvement on wide-range log signal of neutron measurement system for HANARO

    International Nuclear Information System (INIS)

    Kim, Young-Ki; Tuetken, Jeffrey S.

    1998-01-01

    This paper discusses engineering activities for improving the linearity characteristics of the Log Power signal from the neutron measurement system for HANARO. This neutron measurement system uses a fission chamber based detector which covers 10.3 decade-wide range from 10 -8 % full power(FP) up to 200%FP, The Log Power signal is designed to control the reactor at low power levels where most of the reactor physics tests are carried out. Therefore, the linearity characteristics of the Log Power signal is the major factor for accurate reactor power control. During the commissioning of the neutron measurement system, it was found that the linearity characteristics of the Log Power signal, especially near 10 -2 %FP, were not accurate enough for controlling the reactor during physics testing. Analysis of the system linearity data directly measured with reactor operating determined that the system was not operating per the design characteristics established from previous installations. The linearity data, which were taken as the reactor was increased in power, were sent to manufacturer's engineering group and a follow-up measures based on the analysis were then fed back to the field. Through step by step trouble-shooting activities, which included minor circuit modifications and alignment procedure changes, the linearity characteristics have been successfully improved and now exceed minimum performance requirements. This paper discusses the trouble-shooting techniques applied, the changes in the linearity characteristics, special circumstances in the HANARO application and the final resolution. (author)

  19. Analyzing Web Server Logs to Improve a Site's Usage. The Systems Librarian

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    This column describes ways to streamline and optimize how a Web site works in order to improve both its usability and its visibility. The author explains how to analyze logs and other system data to measure the effectiveness of the Web site design and search engine.

  20. A Clustering Methodology of Web Log Data for Learning Management Systems

    Science.gov (United States)

    Valsamidis, Stavros; Kontogiannis, Sotirios; Kazanidis, Ioannis; Theodosiou, Theodosios; Karakos, Alexandros

    2012-01-01

    Learning Management Systems (LMS) collect large amounts of data. Data mining techniques can be applied to analyse their web data log files. The instructors may use this data for assessing and measuring their courses. In this respect, we have proposed a methodology for analysing LMS courses and students' activity. This methodology uses a Markov…

  1. Testing of a uranium downhole logging system to measure in-situ plutonium concentrations in sediments

    International Nuclear Information System (INIS)

    Kasper, R.B.; Kay, M.A.; Bruns, L.E.; Stokes, J.A.; Steinman, D.K.; Adams, J.

    1980-11-01

    A prototype urainium borehole logging system, developed for uranium exploration, was modified for Pu assay and testing at the site. It uses the delayed fission neutron (DFN) method. It was tested in a retired Pu facility, the 216-Z-1A Crib. General agreement between laboratory determined Pu concentrations in sediment samples and neutron flux measurements was found for the relative distribution with depth

  2. On Representing, Purging, and Utilizing Change Logs in Process Management Systems

    NARCIS (Netherlands)

    Rinderle, S.B.; Reichert, M.U.; Jurisch, M.; Kreher, U

    In recent years adaptive process management technolgy has emerged in order to increase the flexibility of business process implementations and to support process changes at different levels. Usually, respective systems log comprehensive information about changes, which can then be used for different

  3. Computing level-impulse responses of log-specified VAR systems

    NARCIS (Netherlands)

    Wieringa, J.E.; Horvath, C.

    2005-01-01

    Impulse response functions (IRFs) are often used to analyze the dynamic behavior of a vector autoregressive (VAR) system. In many applications of VAR modelling, the variables are log-transformed before the model is estimated. If this is the case, the results of the IRFs do not have a direct

  4. Integration of QR codes into an anesthesia information management system for resident case log management.

    Science.gov (United States)

    Avidan, Alexander; Weissman, Charles; Levin, Phillip D

    2015-04-01

    Quick response (QR) codes containing anesthesia syllabus data were introduced into an anesthesia information management system. The code was generated automatically at the conclusion of each case and available for resident case logging using a smartphone or tablet. The goal of this study was to evaluate the use and usability/user-friendliness of such system. Resident case logging practices were assessed prior to introducing the QR codes. QR code use and satisfactions amongst residents was reassessed at three and six months. Before QR code introduction only 12/23 (52.2%) residents maintained a case log. Most of the remaining residents (9/23, 39.1%) expected to receive a case list from the anesthesia information management system database at the end of their residency. At three months and six months 17/26 (65.4%) and 15/25 (60.0%) residents, respectively, were using the QR codes. Satisfaction was rated as very good or good. QR codes for residents' case logging with smartphones or tablets were successfully introduced in an anesthesia information management system and used by most residents. QR codes can be successfully implemented into medical practice to support data transfer. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  5. Log-Less Metadata Management on Metadata Server for Parallel File Systems

    Directory of Open Access Journals (Sweden)

    Jianwei Liao

    2014-01-01

    Full Text Available This paper presents a novel metadata management mechanism on the metadata server (MDS for parallel and distributed file systems. In this technique, the client file system backs up the sent metadata requests, which have been handled by the metadata server, so that the MDS does not need to log metadata changes to nonvolatile storage for achieving highly available metadata service, as well as better performance improvement in metadata processing. As the client file system backs up certain sent metadata requests in its memory, the overhead for handling these backup requests is much smaller than that brought by the metadata server, while it adopts logging or journaling to yield highly available metadata service. The experimental results show that this newly proposed mechanism can significantly improve the speed of metadata processing and render a better I/O data throughput, in contrast to conventional metadata management schemes, that is, logging or journaling on MDS. Besides, a complete metadata recovery can be achieved by replaying the backup logs cached by all involved clients, when the metadata server has crashed or gone into nonoperational state exceptionally.

  6. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  7. Edge Detection from High Resolution Remote Sensing Images using Two-Dimensional log Gabor Filter in Frequency Domain

    International Nuclear Information System (INIS)

    Wang, K; Yu, T; Meng, Q Y; Wang, G K; Li, S P; Liu, S H

    2014-01-01

    Edges are vital features to describe the structural information of images, especially high spatial resolution remote sensing images. Edge features can be used to define the boundaries between different ground objects in high spatial resolution remote sensing images. Thus edge detection is important in the remote sensing image processing. Even though many different edge detection algorithms have been proposed, it is difficult to extract the edge features from high spatial resolution remote sensing image including complex ground objects. This paper introduces a novel method to detect edges from the high spatial resolution remote sensing image based on frequency domain. Firstly, the high spatial resolution remote sensing images are Fourier transformed to obtain the magnitude spectrum image (frequency image) by FFT. Then, the frequency spectrum is analyzed by using the radius and angle sampling. Finally, two-dimensional log Gabor filter with optimal parameters is designed according to the result of spectrum analysis. Finally, dot product between the result of Fourier transform and the log Gabor filter is inverse Fourier transformed to obtain the detections. The experimental result shows that the proposed algorithm can detect edge features from the high resolution remote sensing image commendably

  8. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  9. Detection of gas hydrate with downhole logs and assessment of gas hydrate concentrations (saturations) and gas volumes on the Blake Ridge with electrical resistivity log data

    Science.gov (United States)

    Collett, T.S.; Ladd, J.

    2000-01-01

    Let 164 of the Ocean Drilling Program was designed to investigate the occurrence of gas hydrate in the sedimentary section beneath the Blake Ridge on the southeastern continental margin of North America. Site 994, and 997 were drilled on the Blake Ridge to refine our understanding of the in situ characteristics of natural gas hydrate. Because gas hydrate is unstable at surface pressure and temperature conditions, a major emphasis was placed on the downhole logging program to determine the in situ physical properties of the gas hydrate-bearing sediments. Downhole logging tool strings deployed on Leg 164 included the Schlumberger quad-combination tool (NGT, LSS/SDT, DIT, CNT-G, HLDT), the Formation MicroScanner (FMS), and the Geochemical Combination Tool (GST). Electrical resistivity (DIT) and acoustic transit-time (LSS/SDT) downhole logs from Sites 994, 995, and 997 indicate the presence of gas hydrate in the depth interval between 185 and 450 mbsf on the Blake Ridge. Electrical resistivity log calculations suggest that the gas hydrate-bearing sedimentary section on the Blake Ridge may contain between 2 and 11 percent bulk volume (vol%) gas hydrate. We have determined that the log-inferred gas hydrates and underlying free-gas accumulations on the Blake Ridge may contain as much as 57 trillion m3 of gas.

  10. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  11. Pulsed radiation decay logging

    International Nuclear Information System (INIS)

    Mills, W.R. Jr.

    1983-01-01

    There are provided new and improved well logging processes and systems wherein the detection of secondary radiation is accomplished during a plurality of time windows in a manner to accurately characterize the decay rate of the secondary radiation. The system comprises a well logging tool having a primary pulsed radiation source which emits repetitive time-spaced bursts of primary radiation and detector means for detecting secondary radiation resulting from the primary radiation and producing output signals in response to the detected radiation. A plurality of measuring channels are provided, each of which produces a count rate function representative of signals received from the detector means during successive time windows occurring between the primary radiation bursts. The logging system further comprises means responsive to the measuring channels for producing a plurality of functions representative of the ratios of the radiation count rates measured during adjacent pairs of the time windows. Comparator means function to compare the ratio functions and select at least one of the ratio functions to generate a signal representative of the decay rate of the secondary radiation

  12. Experimental approaches for the development of gamma spectroscopy well logging system

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jehyun; Hwang, Seho; Kim, Jongman [Korea Institute of Geoscience and Mineral Resources (124 Gwahang-no, Yuseong-gu, Daejeon, Korea) (Korea, Republic of); Won, Byeongho [Heesong Geotek Co., Ltd (146-8 Sangdaewon-dong, Jungwon-gu, Seongnam-si, Gyeonggi-do, Korea) (Korea, Republic of)

    2015-03-10

    This article discusses experimental approaches for the development of gamma spectroscopy well logging system. Considering the size of borehole sonde, we customize 2 x 2 inches inorganic scintillators and the system including high voltage, preamplifier, amplifier and multichannel analyzer (MCA). The calibration chart is made by test using standard radioactive sources so that the measured count rates are expressed by energy spectrum. Optimum high-voltage supplies and the measurement parameters of each detector are set up by experimental investigation. Also, the responses of scintillation detectors have been examined by analysis according to the distance between source and detector. Because gamma spectroscopy well logging needs broad spectrum, high sensitivity and resolution, the energy resolution and sensitivity as a function of gamma ray energy are investigated by analyzing the gamma ray activities of the radioactive sources.

  13. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  14. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  15. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  16. Real-Time Vehicle Data Logging System Using GPS And GSM

    OpenAIRE

    Win Minn Thet; MyoMaung Maung; Hla Myo Tun

    2015-01-01

    Abstract This paper proposes and implements a low cost Vehicle Data Logging System using GPS and GSM. This system allows a user to trace the present and past positions recorded in SD card. This system also reads the current position of the vehicle using GPS the data is sent via GSM service from the GSM network. The vehicles position including the driving speed the UTC time and data are stored in the SD card for live and past tracking. All of that GPS data is sent to PIC 18F4520 by the Uni...

  17. Log-Normal Distribution in a Growing System with Weighted and Multiplicatively Interacting Particles

    Science.gov (United States)

    Fujihara, Akihiro; Tanimoto, Satoshi; Yamamoto, Hiroshi; Ohtsuki, Toshiya

    2018-03-01

    A growing system with weighted and multiplicatively interacting particles is investigated. Each particle has a quantity that changes multiplicatively after a binary interaction, with its growth rate controlled by a weight parameter in a homogeneous symmetric kernel. We consider the system using moment inequalities and analytically derive the log-normal-type tail in the probability distribution function of quantities when the parameter is negative, which is different from the result for single-body multiplicative processes. We also find that the system approaches a winner-take-all state when the parameter is positive.

  18. Graphic Interface for the Gearhart-Owen 3500 Uranium Logging System

    International Nuclear Information System (INIS)

    Haller, I; Mendieta, C; Tenzi, A

    2000-01-01

    This work presents the design and development of a computing graphic interface in order to modernize the data acquisition of an old Gearhart-Owen uranium logging system.The paper describes the different items involved in the project: the system hardware developed to carry out the signal conditioning and data digitization the system software, which performs the monitoring and storing of the updated information.Finally, we compare the results of de recent field measurements with the previous one obtained with the original equipment and show the feasibility of the project

  19. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom

    2007-01-01

    While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements.Despite the growing pervasiveness of log systems, to date there is no high-level framework which

  20. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom; Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min

    While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about

  1. A Dynamically Configurable Log-based Distributed Security Event Detection Methodology using Simple Event Correlator

    Science.gov (United States)

    2010-06-01

    Figures Figure Page 2.1. Verizon Data Breach Report: Detective Controls by percent of breach victims. [11...immature, operationally speaking. Figure 2.1: Verizon Data Breach Report: Detective Controls by percent of breach victims. [11] 7 The 2008 CSI Computer...Christopher Novak, Christopher Porter, Bryan Sartin, Peter Tippett, and J. Andrew Valentine. Data Breach Investigations Report. Technical report

  2. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  3. Imaging Fracture Networks Using Angled Crosshole Seismic Logging and Change Detection Techniques

    Science.gov (United States)

    Knox, H. A.; Grubelich, M. C.; Preston, L. A.; Knox, J. M.; King, D. K.

    2015-12-01

    We present results from a SubTER funded series of cross borehole geophysical imaging efforts designed to characterize fracture zones generated with an alternative stimulation method, which is being developed for Enhanced Geothermal Systems (EGS). One important characteristic of this stimulation method is that each detonation will produce multiple fractures without damaging the wellbore. To date, we have collected six full data sets with ~30k source-receiver pairs each for the purposes of high-resolution cross borehole seismic tomographic imaging. The first set of data serves as the baseline measurement (i.e. un-stimulated), three sets evaluate material changes after fracture emplacement and/or enhancement, and two sets are used for evaluation of pick error and seismic velocity changes attributable to changing environmental factors (i.e. saturation due to rain/snowfall in the shallow subsurface). Each of the six datasets has been evaluated for data quality and first arrivals have been picked on nearly 200k waveforms in the target area. Each set of data is then inverted using a Vidale-Hole finite-difference 3-D eikonal solver in two ways: 1) allowing for iterative ray tracing and 2) with fixed ray paths determined from the test performed before the fracture stimulation of interest. Utilizing these two methods allows us to compare and contrast the results from two commonly used change detection techniques. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

  4. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  5. Remote Voice Detection System

    National Research Council Canada - National Science Library

    Blackmon, Fletcher A

    2007-01-01

    A device and system to remotely detect vocalizations of speech. The skin located on the throat region of a speaking person or a reflective layer on the skin on the throat region vibrates in response to vocalizations of speech by the person...

  6. Liquidity crisis detection: An application of log-periodic power law structures to default prediction

    Science.gov (United States)

    Wosnitza, Jan Henrik; Denz, Cornelia

    2013-09-01

    We employ the log-periodic power law (LPPL) to analyze the late-2000 financial crisis from the perspective of critical phenomena. The main purpose of this study is to examine whether LPPL structures in the development of credit default swap (CDS) spreads can be used for default classification. Based on the different triggers of Bear Stearns’ near bankruptcy during the late-2000 financial crisis and Ford’s insolvency in 2009, this study provides a quantitative description of the mechanism behind bank runs. We apply the Johansen-Ledoit-Sornette (JLS) positive feedback model to explain the rise of financial institutions’ CDS spreads during the global financial crisis 2007-2009. This investigation is based on CDS spreads of 40 major banks over the period from June 2007 to April 2009 which includes a significant CDS spread increase. The qualitative data analysis indicates that the CDS spread variations have followed LPPL patterns during the global financial crisis. Furthermore, the univariate classification performances of seven LPPL parameters as default indicators are measured by Mann-Whitney U tests. The present study supports the hypothesis that discrete scale-invariance governs the dynamics of financial markets and suggests the application of new and fast updateable default indicators to capture the buildup of long-range correlations between creditors.

  7. Construction of the monitoring, processing and logging systems supporting for management, operation and maintenance of the Dalat reactor control system

    International Nuclear Information System (INIS)

    Trinh Dinh Hai; Nguyen Thanh Cuong; Huynh Ton Nghiem; Phan Quoc Minh; Nguyen Duc Tuan; Nguyen Nhi Dien

    2004-01-01

    From 1/2002 to 12/2003, we implemented successfully a project, entitled 'Construction of the monitoring, processing and logging systems supporting for management, operation and maintenance of the Dalat reactor control system' under the assistance of the Ministry of Science and Technology. Its main results such as Testing Apparatus based on microcontroller for all functional boards of the Control Logic System of the Reactor Control System (RCS). Technical support CD - ROM for Process Instrumentation System, software for logging automatically information from important systems of the RCS through LAN, program for failure management of Process Instrumentation System have been playing an important role for observation, operation support, maintenance of the RCS. Through this project, the implementation group has grown up rapidly. The control and instrumentation group has been provided with some modern equipment, electronic components, and materials for maintenance work and research development in the years to come. This paper presents typical results and discussions. (author)

  8. The design and implementation of an automated system for logging clinical experiences using an anesthesia information management system.

    Science.gov (United States)

    Simpao, Allan; Heitz, James W; McNulty, Stephen E; Chekemian, Beth; Brenn, B Randall; Epstein, Richard H

    2011-02-01

    Residents in anesthesia training programs throughout the world are required to document their clinical cases to help ensure that they receive adequate training. Current systems involve self-reporting, are subject to delayed updates and misreported data, and do not provide a practicable method of validation. Anesthesia information management systems (AIMS) are being used increasingly in training programs and are a logical source for verifiable documentation. We hypothesized that case logs generated automatically from an AIMS would be sufficiently accurate to replace the current manual process. We based our analysis on the data reporting requirements of the American College of Graduate Medical Education (ACGME). We conducted a systematic review of ACGME requirements and our AIMS record, and made modifications after identifying data element and attribution issues. We studied 2 methods (parsing of free text procedure descriptions and CPT4 procedure code mapping) to automatically determine ACGME case categories and generated AIMS-based case logs and compared these to assignments made by manual inspection of the anesthesia records. We also assessed under- and overreporting of cases entered manually by our residents into the ACGME website. The parsing and mapping methods assigned cases to a majority of the ACGME categories with accuracies of 95% and 97%, respectively, as compared with determinations made by 2 residents and 1 attending who manually reviewed all procedure descriptions. Comparison of AIMS-based case logs with reports from the ACGME Resident Case Log System website showed that >50% of residents either underreported or overreported their total case counts by at least 5%. The AIMS database is a source of contemporaneous documentation of resident experience that can be queried to generate valid, verifiable case logs. The extent of AIMS adoption by academic anesthesia departments should encourage accreditation organizations to support uploading of AIMS-based case

  9. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  10. Selected emissions and efficiencies of energy systems based on logging and sawmill residues

    International Nuclear Information System (INIS)

    Maelkki, Helena; Virtanen, Yrjoe

    2003-01-01

    Bioenergy has an important role in the implementation of the Kyoto agreement in Finland. The main sources of wood residues for energy production are logging areas and sawmills. The use of forest chips can be of great significance in reducing carbon dioxide emissions by replacing fossil fuels. Increasing the use of forest chips has environmental benefits, but it also includes possible environmental disadvantages. Therefore, system research is needed to assess the forest chip utilisation prospects for their environmental quality to secure sustainable forest management. Life-cycle methodology was developed and applied to assess environmental burdens and impacts of the logging and sawmill residues throughout the whole fuel chain from the forest to energy production. According to the study, the energy efficiencies of the forest chip systems are quite high. Net CO 2 emissions of the systems are low owing to the low input of external primary energy required to operate the systems. Although wood energy is renewable, it has many similarities with fossil fuels, e.g. as the emissions of the conversion phase are significant

  11. Borehole logging

    International Nuclear Information System (INIS)

    Olsen, H.

    1995-01-01

    Numerous ground water investigations have been accomplished by means of borehole logging. Borehole logging can be applied to establish new water recovery wells, to control the existing water producing wells and source areas and to estimate ground water quality. (EG)

  12. Reprint of "Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency".

    Science.gov (United States)

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-08-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. http Log Analysis

    DEFF Research Database (Denmark)

    Bøving, Kristian Billeskov; Simonsen, Jesper

    2004-01-01

    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  14. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  15. Performance analysis of MIMO wireless optical communication system with Q-ary PPM over correlated log-normal fading channel

    Science.gov (United States)

    Wang, Huiqin; Wang, Xue; Lynette, Kibe; Cao, Minghua

    2018-06-01

    The performance of multiple-input multiple-output wireless optical communication systems that adopt Q-ary pulse position modulation over spatial correlated log-normal fading channel is analyzed in terms of its un-coded bit error rate and ergodic channel capacity. The analysis is based on the Wilkinson's method which approximates the distribution of a sum of correlated log-normal random variables to a log-normal random variable. The analytical and simulation results corroborate the increment of correlation coefficients among sub-channels lead to system performance degradation. Moreover, the receiver diversity has better performance in resistance of spatial correlation caused channel fading.

  16. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  17. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  18. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  19. Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)

    Science.gov (United States)

    Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson

    2006-03-01

    The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.

  20. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  1. Arc fault detection system

    Science.gov (United States)

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  2. LogScope

    Science.gov (United States)

    Havelund, Klaus; Smith, Margaret H.; Barringer, Howard; Groce, Alex

    2012-01-01

    LogScope is a software package for analyzing log files. The intended use is for offline post-processing of such logs, after the execution of the system under test. LogScope can, however, in principle, also be used to monitor systems online during their execution. Logs are checked against requirements formulated as monitors expressed in a rule-based specification language. This language has similarities to a state machine language, but is more expressive, for example, in its handling of data parameters. The specification language is user friendly, simple, and yet expressive enough for many practical scenarios. The LogScope software was initially developed to specifically assist in testing JPL s Mars Science Laboratory (MSL) flight software, but it is very generic in nature and can be applied to any application that produces some form of logging information (which almost any software does).

  3. Counterbalanced radiation detection system

    International Nuclear Information System (INIS)

    Platz, W.

    1987-01-01

    A counterbalanced radiation detection system is described comprising: (a) a stand; (b) a first radiation detector; (c) a first radiation detector arm means for tiltably connecting the first radiation detector with the stand; (d) a second radiation detector; (e) a second radiation detector arm means for tiltably connecting the second radiation detector with the stand, whereby the tilting angles of the radiation detector arm means define a distance between the radiation detectors; and (f) a torque transforming means connected between the first and second radiation detector arm means for transforming the torque created by one of the radiation detectors in a sense opposed to the torque created by the other radiation detector

  4. Log-Based Recovery in Asynchronous Distributed Systems. Ph.D. Thesis

    Science.gov (United States)

    Kane, Kenneth Paul

    1989-01-01

    A log-based mechanism is described for restoring consistent states to replicated data objects after failures. Preserving a causal form of consistency based on the notion of virtual time is focused upon in this report. Causal consistency has been shown to apply to a variety of applications, including distributed simulation, task decomposition, and mail delivery systems. Several mechanisms have been proposed for implementing causally consistent recovery, most notably those of Strom and Yemini, and Johnson and Zwaenepoel. The mechanism proposed here differs from these in two major respects. First, a roll-forward style of recovery is implemented. A functioning process is never required to roll-back its state in order to achieve consistency with a recovering process. Second, the mechanism does not require any explicit information about the causal dependencies between updates. Instead, all necessary dependency information is inferred from the orders in which updates are logged by the object servers. This basic recovery technique appears to be applicable to forms of consistency other than causal consistency. In particular, it is shown how the recovery technique can be modified to support an atomic form of consistency (grouping consistency). By combining grouping consistency with casual consistency, it may even be possible to implement serializable consistency within this mechanism.

  5. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  6. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  7. A Measuring System for Well Logging Attitude and a Method of Sensor Calibration

    Directory of Open Access Journals (Sweden)

    Yong Ren

    2014-05-01

    Full Text Available This paper proposes an approach for measuring the azimuth angle and tilt angle of underground drilling tools with a MEMS three-axis accelerometer and a three-axis fluxgate sensor. A mathematical model of well logging attitude angle is deduced based on combining space coordinate transformations and algebraic equations. In addition, a system implementation plan of the inclinometer is given in this paper, which features low cost, small volume and integration. Aiming at the sensor and assembly errors, this paper analyses the sources of errors, and establishes two mathematical models of errors and calculates related parameters to achieve sensor calibration. The results show that this scheme can obtain a stable and high precision azimuth angle and tilt angle of drilling tools, with the deviation of the former less than ±1.4° and the deviation of the latter less than ±0.1°.

  8. A measuring system for well logging attitude and a method of sensor calibration.

    Science.gov (United States)

    Ren, Yong; Wang, Yangdong; Wang, Mijian; Wu, Sheng; Wei, Biao

    2014-05-23

    This paper proposes an approach for measuring the azimuth angle and tilt angle of underground drilling tools with a MEMS three-axis accelerometer and a three-axis fluxgate sensor. A mathematical model of well logging attitude angle is deduced based on combining space coordinate transformations and algebraic equations. In addition, a system implementation plan of the inclinometer is given in this paper, which features low cost, small volume and integration. Aiming at the sensor and assembly errors, this paper analyses the sources of errors, and establishes two mathematical models of errors and calculates related parameters to achieve sensor calibration. The results show that this scheme can obtain a stable and high precision azimuth angle and tilt angle of drilling tools, with the deviation of the former less than ±1.4° and the deviation of the latter less than ±0.1°.

  9. A portable borehole temperature logging system using the four-wire resistance method

    Science.gov (United States)

    Erkan, Kamil; Akkoyunlu, Bülent; Balkan, Elif; Tayanç, Mete

    2017-12-01

    High-quality temperature-depth information from boreholes with a depth of 100 m or more is used in geothermal studies and in studies of climate change. Electrical wireline tools with thermistor sensors are capable of measuring borehole temperatures with millikelvin resolution. The use of a surface readout mode allows analysis of the thermally conductive state of a borehole, which is especially important for climatic and regional heat flow studies. In this study we describe the design of a portable temperature logging tool that uses the four-wire resistance measurement method. The four-wire method enables the elimination of cable resistance effects, thus allowing millikelvin resolution of temperature data at depth. A preliminary two-wire model of the system is also described. The portability of the tool enables one to collect data from boreholes down to 300 m, even in locations with limited accessibility.

  10. A Depth Video Sensor-Based Life-Logging Human Activity Recognition System for Elderly Care in Smart Indoor Environments

    Directory of Open Access Journals (Sweden)

    Ahmad Jalal

    2014-07-01

    Full Text Available Recent advancements in depth video sensors technologies have made human activity recognition (HAR realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  11. A depth video sensor-based life-logging human activity recognition system for elderly care in smart indoor environments.

    Science.gov (United States)

    Jalal, Ahmad; Kamal, Shaharyar; Kim, Daijin

    2014-07-02

    Recent advancements in depth video sensors technologies have made human activity recognition (HAR) realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  12. Real-Time Vehicle Data Logging System Using GPS And GSM

    Directory of Open Access Journals (Sweden)

    Win Minn Thet

    2015-07-01

    Full Text Available Abstract This paper proposes and implements a low cost Vehicle Data Logging System using GPS and GSM. This system allows a user to trace the present and past positions recorded in SD card. This system also reads the current position of the vehicle using GPS the data is sent via GSM service from the GSM network. The vehicles position including the driving speed the UTC time and data are stored in the SD card for live and past tracking. All of that GPS data is sent to PIC 18F4520 by the Universal Asynchronous ReceiverTransmitter UART and also store in SD card. GSM also uses UART to transmit. To know the position of the vehicle the owner sends a request through a SMS. The SMS sends to the authorized person through the GSM network. The travel history of the vehicle are stored in a file on an SD card in FAT format.This system is very useful for car tracking for adolescent driver being checked by parent speed limit exceeding leaving a specific area. V The developed system is easy to use requires no additional hardware and permits the selection of the amount of data and the time intervals between the data recordings. In addition the collected data can easily be transferred to a computer via a connected serial port.

  13. Multi-Threaded Evolution of the Data-Logging System of the ATLAS Experiment at CERN

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2011-01-01

    The ATLAS experiment is currently observing proton-proton collisions delivered by the LHC accelerator at a centre of mass energy of 7 TeV with a peak luminosity of ~1033 cm-2 s-1. The ATLAS Trigger and Data Acquisition (TDAQ) system selects interesting events on-line in a three-level trigger system in order to store them at a budgeted rate of ~200 Hz for an event size of ~1.5 MB. This paper focuses on the TDAQ data-logging system. Its purpose is to receive events from the third level trigger, process them and stream the results into different raw data files according to the trigger decision. The data files are subsequently moved to the central mass storage facility at CERN. The system currently in production has been commissioned in 2007 and has been working smoothly since then. It is however based on an essentially single-threaded design that is anticipated not to cope with the increase in event rate and event size that is foreseen as part of the ATLAS and LHC upgrade programs. This design also severely limi...

  14. Multi-Threaded Evolution of the Data-Logging System of the ATLAS Experiment at CERN

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2011-01-01

    The ATLAS experiment observes proton-proton collisions delivered by the LHC accelerator at a centre of mass energy of 7 TeV with a peak luminosity of ~ 10^33 cm^-2 s^-1 in 2011. The ATLAS Trigger and Data Acquisition (TDAQ) system selects interesting events on-line in a three-level trigger system in order to store them at a budgeted average rate of ~ 400 Hz for an event size of ~1.2 MB. This paper focuses on the TDAQ data-logging system. Its purpose is to receive events from the third level trigger, process them and stream the data into different raw files according to the trigger decision. The system currently in production is based on an essentially single-threaded design that is anticipated not to cope with the increase in event rate and event size foreseen as part of the ATLAS and LHC upgrade programs. This design also severely limits the possibility of performing additional CPU-intensive tasks. Therefore, a novel design able to exploit the full power of multi-core architecture is needed. The main challen...

  15. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  16. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    OpenAIRE

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-01-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  17. Inertial Navigation System/Doppler Velocity Log (INS/DVL Fusion with Partial DVL Measurements

    Directory of Open Access Journals (Sweden)

    Asaf Tal

    2017-02-01

    Full Text Available The Technion autonomous underwater vehicle (TAUV is an ongoing project aiming to develop and produce a small AUV to carry on research missions, including payload dropping, and to demonstrate acoustic communication. Its navigation system is based on an inertial navigation system (INS aided by a Doppler velocity log (DVL, magnetometer, and pressure sensor (PS. In many INSs, such as the one used in TAUV, only the velocity vector (provided by the DVL can be used for aiding the INS, i.e., enabling only a loosely coupled integration approach. In cases of partial DVL measurements, such as failure to maintain bottom lock, the DVL cannot estimate the vehicle velocity. Thus, in partial DVL situations no velocity data can be integrated into the TAUV INS, and as a result its navigation solution will drift in time. To circumvent that problem, we propose a DVL-based vehicle velocity solution using the measured partial raw data of the DVL and additional information, thereby deriving an extended loosely coupled (ELC approach. The implementation of the ELC approach requires only software modification. In addition, we present the TAUV six degrees of freedom (6DOF simulation that includes all functional subsystems. Using this simulation, the proposed approach is evaluated and the benefit of using it is shown.

  18. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  19. Event storm detection and identification in communication systems

    International Nuclear Information System (INIS)

    Albaghdadi, Mouayad; Briley, Bruce; Evens, Martha

    2006-01-01

    Event storms are the manifestation of an important class of abnormal behaviors in communication systems. They occur when a large number of nodes throughout the system generate a set of events within a small period of time. It is essential for network management systems to detect every event storm and identify its cause, in order to prevent and repair potential system faults. This paper presents a set of techniques for the effective detection and identification of event storms in communication systems. First, we introduce a new algorithm to synchronize events to a single node in the system. Second, the system's event log is modeled as a normally distributed random process. This is achieved by using data analysis techniques to explore and then model the statistical behavior of the event log. Third, event storm detection is proposed using a simple test statistic combined with an exponential smoothing technique to overcome the non-stationary behavior of event logs. Fourth, the system is divided into non-overlapping regions to locate the main contributing regions of a storm. We show that this technique provides us with a method for event storm identification. Finally, experimental results from a commercially deployed multimedia communication system that uses these techniques demonstrate their effectiveness

  20. The calibration facilities of gamma-ray spectrometer oil logging system

    International Nuclear Information System (INIS)

    Zhao Yunlong; Liu Yuzhang; Duan Wenxian

    1993-08-01

    The construction technology for the calibration facilities of gamma-ray spectrometer oil logging system is introduced. It is referenced to the experience from similar calibration facilities at home and abroad. Facilities consist of 9 models. The effective diameter of each model is 1.5 m and the height is 6 m. Each borehole has U ore zone, Th ore zone, K ore zone, high mixed zone, high mixed thin zone, low mixed zone and barren zone. There are 45 zones in total. Each element model has 6 in, 8.5 in and 12 in of different diameters. The preventing radon migration and complete sealing technology are used for each zone to prevent radon from escaping. The density of models, homogeneity and moisture of radio elements have been measured that gives a complete data for calibration adjusting of the instrument. The sizes of facilities and the concentration of radioactivity are reasonable designed and conformed to the recommendation of IAEA. Parameters are consistent with the parameters of calibration facilities built by Houston University in America. The emanation coefficient of the facilities is lees than 1%. The dry density of filling is 2.12 g/cm 3 and the relative standard deviation is +- 1.9%

  1. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  2. The Development Of Windows Service Based Data Log System Using Light Dependent Resistor And Thingspeak IOT Cloud Platform

    Directory of Open Access Journals (Sweden)

    Tristan Jay P. Calaguas

    2017-03-01

    Full Text Available Microcontrollers are using in control and information processing it can be used in wide application such as agriculture health care commercial facilities robotics and education. These micro controllers are computers in chip that comprises of input and output ports central processing unit registers and main memory as well as communication interface such as Ethernet interface serial interface High Definition Multimedia Interface power source and many existing interface that can be found in this type of computer. In this study the researcher decided to conceptualize an innovative application of this type of computer where it has a potential to use as tracking system in specific individuals activities. Since some of office people are complaining in CCTV camera about their privacy this innovative concept of technology is in similar purpose but if we will compare the application concept in closed circuit camera the researcher decided to use visual graph instead video data that is in high exposure In the first phase the researcher made a concept on how the simple Light Dependent Resistor will apply in Schools Office Environment Application domain using microcontroller that was used as data log system and how this can be optimized without forcing the Dean or any designated person in office to operate it in hand due to their busy working hours. In the second phase the researcher develop the proposed data log system that are acquiring data through light luminance from fluorescent light of deans office and sending it in the IOT cloud platform. The researcher used fuzzy logic theory to model the operation of the proposed data log system. This study used experimental type of research when the prototype was developed during second phase the researcher simulated the operation. As the result the proposed data log system is sending data to Thingspeak IOT Cloud platform it displays the correct output which based from the rules and it is in column graph content

  3. Antigen detection systems

    Science.gov (United States)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  4. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  5. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  6. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  7. Parallel checksumming of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-09-06

    Checksum values are generated and used to verify the data integrity. A client executing in a parallel computing system stores a data chunk to a shared data object on a storage node in the parallel computing system. The client determines a checksum value for the data chunk; and provides the checksum value with the data chunk to the storage node that stores the shared object. The data chunk can be stored on the storage node with the corresponding checksum value as part of the shared object. The storage node may be part of a Parallel Log-Structured File System (PLFS), and the client may comprise, for example, a Log-Structured File System client on a compute node or burst buffer. The checksum value can be evaluated when the data chunk is read from the storage node to verify the integrity of the data that is read.

  8. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  9. REST: a computer system for estimating logging residue by using the line-intersect method

    Science.gov (United States)

    A. Jeff Martin

    1975-01-01

    A computer program was designed to accept logging-residue measurements obtained by line-intersect sampling and transform them into summaries useful for the land manager. The features of the program, along with inputs and outputs, are briefly described, with a note on machine compatibility.

  10. A transdisciplinary approach to developing a web-based nursing experiential log system for advanced practice nursing clinical experiences.

    Science.gov (United States)

    Olson, Brandon D; Fauchald, Sally K

    2011-11-01

    This article describes a transdisciplinary project between the computer information systems department and the graduate nursing department of a higher education institution. The project is the planning, development, and implementation of a Web-based nursing experiential log system for advanced practice nursing clinical experiences, which was funded by a Nursing Education Practice and Retention grant from the Health Resources and Services Administration. The article explains the concept and benefits of the transdisciplinary nature of the project. The design team, project leadership, and roles within the team are reviewed, including the role of end-user faculty in the design process. The article describes the focus and scope of the Web-based experiential log system database that is used to document and track advanced practice nursing student clinical experiences, as well as a summary of the design process used to develop the log system and the specific functionality of the database system. The implementation process, including end-user training, pilot implementation, and modifications, lessons learned, and future directions of the project are addressed. The article concludes with the benefits to the clinical experience and graduate nursing program that have been noted since the implementation of the system.

  11. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  12. Prediction of Compressional, Shear, and Stoneley Wave Velocities from Conventional Well Log Data Using a Committee Machine with Intelligent Systems

    Science.gov (United States)

    Asoodeh, Mojtaba; Bagheripour, Parisa

    2012-01-01

    Measurement of compressional, shear, and Stoneley wave velocities, carried out by dipole sonic imager (DSI) logs, provides invaluable data in geophysical interpretation, geomechanical studies and hydrocarbon reservoir characterization. The presented study proposes an improved methodology for making a quantitative formulation between conventional well logs and sonic wave velocities. First, sonic wave velocities were predicted from conventional well logs using artificial neural network, fuzzy logic, and neuro-fuzzy algorithms. Subsequently, a committee machine with intelligent systems was constructed by virtue of hybrid genetic algorithm-pattern search technique while outputs of artificial neural network, fuzzy logic and neuro-fuzzy models were used as inputs of the committee machine. It is capable of improving the accuracy of final prediction through integrating the outputs of aforementioned intelligent systems. The hybrid genetic algorithm-pattern search tool, embodied in the structure of committee machine, assigns a weight factor to each individual intelligent system, indicating its involvement in overall prediction of DSI parameters. This methodology was implemented in Asmari formation, which is the major carbonate reservoir rock of Iranian oil field. A group of 1,640 data points was used to construct the intelligent model, and a group of 800 data points was employed to assess the reliability of the proposed model. The results showed that the committee machine with intelligent systems performed more effectively compared with individual intelligent systems performing alone.

  13. Radiation detecting system

    International Nuclear Information System (INIS)

    1975-01-01

    In spectrophotometry systems, a usual arrangement for modulating the radiation is a rotating disc having one or more sectors removed. A beam of radiation may be blocked by the disc except when a cut-away sector is in the path of the beam. With a double-beam system, a cut-away sector of 180 0 may be used so that when the first path is blocked, the second is allowed through, and vice versa. One or both sides of the disc may be formed as mirrors to facilitate beam switching and to allow use of more than two beams for background compensation purposes or for analysis of more than one substance within a sample. (G.T.H.)

  14. Radiation detection system

    Science.gov (United States)

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  15. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  16. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  17. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  18. Study on Improvement of Data Logging System for the Ulsan T/P and Samarangjin P/P

    Energy Technology Data Exchange (ETDEWEB)

    Kim, E.G.; Shin, Y.O.; Woo, J.H. [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    1997-12-31

    A power plant should be monitored for the stable operations. It is difficult to maintain out-dated computer systems of the power plant due to the obsolescence of the system. A new data logging system needs to be developed to provide the various convenient functions. Power plant operators are then easily able to obtain more information on the status of plant operations by using this new system developed in this research. The results of research are summarized at this report. (author). 151 figs., 24 tabs.

  19. The application in detection the position accuracy of the multi-leaf collimator of Varian linear accelerator with dynamic therapy log files

    International Nuclear Information System (INIS)

    Li Changhu; Xu Liming; Teng Jianjian; Ge Wei; Zhang Jun; Ma Guangdong

    2010-01-01

    Objective: To explorer the application in detection the position accuracy of the multileaf collimator of Varian accelerator with dynamic therapy log files. Methods: A pre-designed MLC format files named PMLC for two Varian accelerators, the dynamic treatment log files were recorded 10 times on a different date, and be converted into the MLC format files named DMLC, compared with the original plan PMLC, so we can analysis two files for each leaf position deviation. In addition, we analysis the repeatability of MLC leaves position accuracy between 10 dynalog files of two accelerators. Results: No statistically significant difference between the average position of the 10 times leaf position of the two accelerators,their were 0.29 -0.29 and 0.29 -0.30 (z = -0.77, P=0.442). About 40%, 30%, 20% and 10% of the leaf position deviation was at ≤0.2 mm, 0.3 mm, 0.5 mm and 0.4 mm, respectively. the maximum value was 0.5 mm. More than 86% of the leaf position are completely coincident between 10 dynamic treatment files of two accelerators. The rate of position deviation no more 0. 05 mm was 96. 6% and 97.3%, respectively. And the maximum value was 0.09 mm. Conclusions: Dynamic treatment log file is a splendid tool in testing the actual position of multi-leaf collimator. The multi-leaf collimator of two accelerators be detected are precise and stabilized. (authors)

  20. Pulsed neutron uranium borehole logging with prompt fission neutrons

    International Nuclear Information System (INIS)

    Bivens, H.M.; Smith, G.W.; Jensen, D.H.

    1976-01-01

    The gross count natural gamma log normally used for uranium borehole logging is seriously affected by disequilibrium. Methods for the direct measurement of uranium, such as neutron logging, which are not affected by disequilibrium have been the object of considerable effort in recent years. This paper describes a logging system for uranium which uses a small accelerator to generate pulses of 14 MeV neutrons to detect and assay uranium by the measurement of prompt fission neutrons in the epithermal energy range. After an initial feasibility study, a prototype logging probe was built for field evaluation which began in January 1976. Physical and operational characteristics of the prototype probe, the neutron tube-transformer assembly, and the neutron tube are described. In logging operations, only the epithermal prompt fission neutrons detected between 250 microseconds to 2500 microseconds following the excitation neutron pulse are counted. Comparison of corrected neutron logs with the conventional gross count natural gamma logs and the chemical assays of cores from boreholes are shown. The results obtained with this neutron probe clearly demonstrate its advantages over the gross count natural gamma log, although at this time the accuracy of the neutron log assay is not satisfactory under some conditions. The necessary correction factors for various borehole and formation parameters are being determined and, when applied, should improve the assay accuracy

  1. Effect of selective logging on genetic diversity and gene flow in Cariniana legalis sampled from a cacao agroforestry system.

    Science.gov (United States)

    Leal, J B; Santos, R P; Gaiotto, F A

    2014-01-28

    The fragments of the Atlantic Forest of southern Bahia have a long history of intense logging and selective cutting. Some tree species, such as jequitibá rosa (Cariniana legalis), have experienced a reduction in their populations with respect to both area and density. To evaluate the possible effects of selective logging on genetic diversity, gene flow, and spatial genetic structure, 51 C. legalis individuals were sampled, representing the total remaining population from the cacao agroforestry system. A total of 120 alleles were observed from the 11 microsatellite loci analyzed. The average observed heterozygosity (0.486) was less than the expected heterozygosity (0.721), indicating a loss of genetic diversity in this population. A high fixation index (FIS = 0.325) was found, which is possibly due to a reduction in population size, resulting in increased mating among relatives. The maximum (1055 m) and minimum (0.095 m) distances traveled by pollen or seeds were inferred based on paternity tests. We found 36.84% of unique parents among all sampled seedlings. The progenitors of the remaining seedlings (63.16%) were most likely out of the sampled area. Positive and significant spatial genetic structure was identified in this population among classes 10 to 30 m away with an average coancestry coefficient between pairs of individuals of 0.12. These results suggest that the agroforestry system of cacao cultivation is contributing to maintaining levels of diversity and gene flow in the studied population, thus minimizing the effects of selective logging.

  2. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  3. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography; Detection et analyse non destructive de caracteristiques internes de billons d'epicea commun (PICEA ABIES (L.) KARST) par tomographie a rayons X

    Energy Technology Data Exchange (ETDEWEB)

    Longuetaud, F

    2005-10-15

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  4. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography; Detection et analyse non destructive de caracteristiques internes de billons d'epicea commun (PICEA ABIES (L.) KARST) par tomographie a rayons X

    Energy Technology Data Exchange (ETDEWEB)

    Longuetaud, F

    2005-10-15

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  5. Detection of criticality accidents. The Intertechnique EDAC II system

    International Nuclear Information System (INIS)

    Prigent, R.

    1991-01-01

    The chief aim of the new generation of EDAC II criticality accidents detection system is to reduce the risks associated to the handling of fissile material by providing a swift and safe warning of the development of any criticality accident. To this function already devolving on the EDAC system of the previous generation, the EDAC II adds the possibility of storing in memory the characteristics of the accident, providing a daily follow-up of the striking events in the system through the print-out of a log book and providing assistance to the operators during the periodical tests. (Author)

  6. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  7. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  8. Mechanics of log calibration

    International Nuclear Information System (INIS)

    Waller, W.C.; Cram, M.E.; Hall, J.E.

    1975-01-01

    For any measurement to have meaning, it must be related to generally accepted standard units by a valid and specified system of comparison. To calibrate well-logging tools, sensing systems are designed which produce consistent and repeatable indications over the range for which the tool was intended. The basics of calibration theory, procedures, and calibration record presentations are reviewed. Calibrations for induction, electrical, radioactivity, and sonic logging tools will be discussed. The authors' intent is to provide an understanding of the sources of errors, of the way errors are minimized in the calibration process, and of the significance of changes in recorded calibration data

  9. Road Anomalies Detection System Evaluation.

    Science.gov (United States)

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  10. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  11. Closing the loops between plant design and operator-An automatic logging system

    International Nuclear Information System (INIS)

    Tally, C.

    1985-01-01

    The close relationship between plant owner and NSSS designer frequently ceases after the plant is through startup testing. Thus, there is no continuous feedback between the operations staff and the designer. As a result, there is no assurance that the plant is being operated within the design envelope defined by the NSSS component stress reports. The link between plant operation and the plant design basis is vital to ensure that the plant can be safely operated for its full licensed life. This link is also a key to extending the life of the plant since the fatigue history of critical components is an important element of any justification for extended component life. An allowable Operating Transient Cycles Program established by Duke Power and Babcock and Wilcox successfully closed the operator-designer loop at the Oconee Nuclear Station. This paper describes that program, some of its conclusions, and also describes the next logical step in its development...automation of the transient logging process. A transient monitoring program must satisfy many requirements ranging from sensing the onset of a transient or slow power maneuver to recording sufficient data to provide for human checking of all computerized conclusions and results. Although not yet available to the industry, this type of program will ultimately be a virtual necessity for all nuclear stations

  12. Radioactive well logging system with shale (boron) compensation by gamma ray build-up

    International Nuclear Information System (INIS)

    Peelman, H.E.; Arnold, D.M.; Pitts, R.W. Jr.

    1976-01-01

    Earth formations in the vicinity of a well borehole are repetitively bombarded with bursts of high energy neutrons. A radiation detector in a sonde in the borehole senses the gamma rays induced by the capture of thermal neutrons and sends signals representative thereof to the surface. At the surface, two single channel energy analyzers, such as from 1.30 to 2.92 MeV and from 3.43 to 10.0 MeV, sense the formation thermal neutron capture gamma ray response after each neutron burst. The counts of thermal neutron capture gamma rays in these analyzers are used to distinguish between the presence of salt water and hydrocarbons, which is logged. By controlling the repetition rate of the neutron source, measured counting rates in formations with relatively large thermal neutron lifetimes are emphasized, compensating for borehole effects which could otherwise give rise to erroneous results in shale formations, which have a high boron content. 11 claims, 5 figures

  13. Geothermal well log interpretation midterm report

    Energy Technology Data Exchange (ETDEWEB)

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.

    1979-02-01

    Reservoir types are defined according to fluid phase and temperature, lithology, geologic province, pore geometry, and salinity and fluid chemistry. Improvements are needed in lithology and porosity definition, fracture detection, and thermal evaluation for more accurate interpretation. Further efforts are directed toward improving diagnostic techniques for relating rock characteristics and log response, developing petrophysical models for geothermal systems, and developing thermal evaluation techniques. The Geothermal Well Log Interpretation study and report has concentrated only on hydrothermal geothermal reservoirs. Other geothermal reservoirs (hot dry rock, geopressured, etc.) are not considered.

  14. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  15. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  16. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  17. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  18. Parallel compression of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-10-25

    Techniques are provided for parallel compression of data chunks being written to a shared object. A client executing on a compute node or a burst buffer node in a parallel computing system stores a data chunk generated by the parallel computing system to a shared data object on a storage node by compressing the data chunk; and providing the data compressed data chunk to the storage node that stores the shared object. The client and storage node may employ Log-Structured File techniques. The compressed data chunk can be de-compressed by the client when the data chunk is read. A storage node stores a data chunk as part of a shared object by receiving a compressed version of the data chunk from a compute node; and storing the compressed version of the data chunk to the shared data object on the storage node.

  19. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  20. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  1. pLog enterprise-enterprise GIS-based geotechnical data management system enhancements.

    Science.gov (United States)

    2015-12-01

    Recent eorts by the Louisiana Department of Transportation and Development (DOTD) and the : Louisiana Transportation Research Center (LTRC) have developed a Geotechnical Information : Database, with a Geographic Information System (GIS) interface....

  2. Method and apparatus for reducing background in inelastic gamma ray logging systems

    International Nuclear Information System (INIS)

    Culver, R.B.

    1975-01-01

    The amplified pulses from a radioactivity detector are coupled through a delay line to a linear gate. The amplified pulses from the detector are also connected to a discriminator. The output of the discriminator is AND gated in a logical gate with a clock pulse which is synchronized with a high energy neutron source. The AND gate triggers a first single shot multivibrator which in turn triggers the linear gate. The delay line allows for the time required for the detector pulse to rise to the discriminator threshold and for the propagation delay in the logic circuitry. The linear gate opens before the arrival of the detector pulse and closes after it passes through. A J-K flip-flop circuit is triggered by the trailing edge of the output of the first single shot multivibrator to disable the AND gate, thus causing the linear gate to pass only the first detected pulse having the necessary discriminator level. The output of the AND gate is OR gated with the output of a second single shot multivibrator which is triggered off the trailing edge of the clock pulse. The output of the OR gate drives a negative high voltage pulser which is connected to a negative pulsing ring in a neutron generator. The leading edge of the clock pulse drives a positive high voltage pulser which is connected to a positive pulsing ring in the neutron generator. The neutron generator is thus extinguished upon the detection of the first detector pulse occurring within the clock pulse interval having the necessary discriminator threshold. In an alternative embodiment, a second AND gate is used to gate a source control clock pulse and the output from the J-K flip-flop to provide a driving pulse for the ion source pulser. (U.S.)

  3. Clinical Accuracy of the Respiratory Tumor Tracking System of the CyberKnife: Assessment by Analysis of Log Files

    International Nuclear Information System (INIS)

    Hoogeman, Mischa; Prevost, Jean-Briac; Nuyttens, Joost; Poell, Johan; Levendag, Peter; Heijmen, Ben

    2009-01-01

    Purpose: To quantify the clinical accuracy of the respiratory motion tracking system of the CyberKnife treatment device. Methods and Materials: Data in log files of 44 lung cancer patients treated with tumor tracking were analyzed. Errors in the correlation model, which relates the internal target motion with the external breathing motion, were quantified. The correlation model error was compared with the geometric error obtained when no respiratory tracking was used. Errors in the prediction method were calculated by subtracting the predicted position from the actual measured position after 192.5 ms (the time lag to prediction in our current system). The prediction error was also measured for a time lag of 115 ms and a new prediction method. Results: The mean correlation model errors were less than 0.3 mm. Standard deviations describing intrafraction variations around the whole-fraction mean error were 0.2 to 1.9 mm for cranio-caudal, 0.1 to 1.9 mm for left-right, and 0.2 to 2.5 mm for anterior-posterior directions. Without the use of respiratory tracking, these variations would have been 0.2 to 8.1 mm, 0.2 to 5.5 mm, and 0.2 to 4.4 mm. The overall mean prediction error was small (0.0 ± 0.0 mm) for all directions. The intrafraction standard deviation ranged from 0.0 to 2.9 mm for a time delay of 192.5 ms but was halved by using the new prediction method. Conclusions: Analyses of the log files of real clinical cases have shown that the geometric error caused by respiratory motion is substantially reduced by the application of respiratory motion tracking.

  4. VT Route Log Points 2017

    Data.gov (United States)

    Vermont Center for Geographic Information — This data layer is used with VTrans' Integrated Route Log System (IRA). It is also used to calibrate the linear referencing systems, including the End-to-End and...

  5. Pulsed neutron logging system for inelastic scattering gamma rays with gain compensation

    International Nuclear Information System (INIS)

    Schultz, W.E.; Smith, H.D. Jr.

    1976-01-01

    An illustrative embodiment of the invention includes methods for linearizing the gain of borehole gamma ray energy measurement apparatus. A known energy peak (or peaks) which is prominent in the gamma ray energy spectra of borehole measurements is monitored and any drift in its apparent location in the energy spectrum is used to generate an error voltage. The error voltage is applied in an inverse feedback manner to control the gain of system amplifiers to cancel the drift

  6. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    Directory of Open Access Journals (Sweden)

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  7. Nuclear detection systems in traffic

    International Nuclear Information System (INIS)

    Farkas, T.; Pernicka, L.; Svec, A.

    2005-01-01

    Illicit trafficking in nuclear materials (nuclear criminality) has become a problem, due to the circulation of a high number of radioactive sources caused by the changes of the organisational infrastructures to supervise these material within the successor states of the former Soviet Union. Aim of this paper is to point out the technical requirements and the practicability of an useful monitoring system at preselected traffic check points (railway and highway border crossings, industrial sites entry gates, international airports). The ITRAP lab test was designed to work as strict benchmark to qualify border monitoring systems 67 with very low false alarm rates, in addition the minimum sensitivity to give an alarm has been defined for fix-installed systems, pocket type and hand held instruments. For the neutron tests a special prepared Californium source ( 252 Cf) was used to simulate the weapons plutonium. The source is shielded against gamma radiation, use a moderator and provides the required neutron rate of 20000 n/s at 2 rn distance. To test the false alarm rate (rate of false positive ) the same test facility , under the same background conditions, was used but without a radioactive test source. The ITRAP lab tests for the fix-installed systems started at May 1998 and first results were given in September 1998. Only 2 of 14 fix-installed monitoring systems could fulfil the minimum requirement for neutron detection. 7 of 14 fix-installed monitoring systems (50%) passed the ITRAP lab test. The analytical method developed and used for certification of installed radiation monitors in the Slovak Institute of Metrology consists in measurement of radiation activity of selected radionuclide in defined conditions. (authors)

  8. Satellite Validation: A Project to Create a Data-Logging System to Monitor Lake Tahoe

    Science.gov (United States)

    Roy, Rudy A.

    2005-01-01

    Flying aboard the satellite Terra, the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) is an imaging instrument used to acquire detailed maps of Earth's surface temperature, elevation, emissivity, and reflectance. An automated site consisting of four buoys was established 6 years ago at Lake Tahoe for the validation of ASTERS thermal infrared data. Using Campbell CR23X Dataloggers, a replacement system to be deployed on a buoy was designed and constructed for the measurement of the lake's temperature profile, surrounding air temperature, humidity, wind direction and speed, net radiation, and surface skin temperature. Each Campbell Datalogger has been programmed to control, power, and monitor 14 different temperature sensors, a JPL-built radiometer, and an RM Young 32500 meteorological station. The logger communicates with the radiometer and meteorological station through a Campbell SDM-SIO4 RS232 serial interface, sending polling commands, and receiving filtered data back from the sensors. This data is then cataloged and sent back across a cellular modem network every hour to JPL. Each instrument is wired via a panel constructed with 18 individual plugs that allow for simple installation and expansion. Data sent back from the system are analyzed at JPL, where they are used to calibrate ASTER data.

  9. Development of sub-surface drainage data base system for use in water logging and salinity managements issues

    International Nuclear Information System (INIS)

    Azhar, A.H.; Alam, M.M; Rafiq, M.

    2005-01-01

    A simple user-friendly menu-driven database management system pertinent to the Impact of Subsurface Drainage Systems on land and Water Conditions (ISLaW) has been developed for use in water logging and salinity management issues of drainage areas. This database has been developed by integrating four software viz; Microsoft Excel, MS Word, Acrobat and MS Access. The information in the form of tables and figures with respect to various drainage projects has been presented in MS Word files. The major data sets of various subsurface drainage projects included in the ISLaW database are: i) technical aspects, ii) groundwater and soil salinity aspects, iii) socio-technical aspects, iv) agro-economic aspects, and v) operation and maintenance aspects. The various ISLaW files can be accessed just by clicking at the Menu buttons of the database system. This database not only gives feedback on the functioning of different subsurface drainage projects with respect to above mentioned various aspects, but also serves as a resource document for these data for future studies at other drainage projects. The developed database system is useful for planners, designers and Farmers' Organizations for improved operation of existing as well as development of future drainage projects. (author)

  10. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  11. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  12. Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.

    Science.gov (United States)

    Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R

    2017-02-01

    An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  13. Quantitative calculation of GOR of complex oil-gas-water systems with logging data: A case study of the Yingdong Oil/Gas Field in the Qaidam Basin

    Directory of Open Access Journals (Sweden)

    Sima Liqiang

    2014-12-01

    Full Text Available In the Yingdong Oil/Gas Field of the Qaidam Basin, multiple suites of oil-gas-water systems overlie each other vertically, making it difficult to accurately identify oil layers from gas layers and calculate gas-oil ratio (GOR. Therefore, formation testing and production data, together with conventional logging, NMR and mud logging data were integrated to quantitatively calculate GOR. To tell oil layers from gas layers, conventional logging makes use of the excavation effect of compensated neutron log, NMR makes use of the different relaxation mechanisms of light oil and natural gas in large pores, while mud logging makes use of star chart of gas components established based on available charts and mathematical statistics. In terms of the quantitative calculation of GOR, the area ratio of the star chart of gas components was first used in GOR calculation. The study shows that: (1 conventional logging data has a modest performance in distinguishing oil layers from gas layers due to the impacts of formation pressure, hydrogen index (HI, shale content, borehole conditions and invasion of drilling mud; (2 NMR is quite effective in telling oil layers from gas layers, but cannot be widely used due to its high cost; (3 by contrast, the star chart of gas components is the most effective in differentiating oil layers from gas layers; and (4 the GOR calculated by using the area ratio of star chart has been verified by various data such as formation testing data, production data and liquid production profile.

  14. Rotor-System Log-Decrement Identification Using Short-Time Fourier-Transform Filter

    Directory of Open Access Journals (Sweden)

    Qihang Li

    2015-01-01

    Full Text Available With the increase of the centrifugal compressor capability, such as large scale LNG and CO2 reinjection, the stability margin evaluation is crucial to assure the compressor work in the designed operating conditions in field. Improving the precision of parameter identification of stability is essential and necessary as well. Based on the time-varying characteristics of response vibration during the sine-swept process, a short-time Fourier transform (STFT filter was introduced to increase the signal-noise ratio and improve the accuracy of the estimated stability parameters. A finite element model was established to simulate the sine-swept process, and the simulated vibration signals were used to study the filtering effect and demonstrate the feasibility to identify the stability parameters by using Multiple-Input and Multiple-Output system identification method that combines the prediction error method and instrumental variable method. Simulation results show that the identification method with STFT filter improves the estimated accuracy much well and makes the curves of frequency response function clearer. Experiment was carried out on a test rig as well, which indicates the identification method is feasible in stability identification, and the results of experiment indicate that STFT filter works very well.

  15. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  16. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-04-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  17. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin

    2014-04-17

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  18. SU-F-T-172: A Method for Log File QA On An IBA Proteus System for Patient Specific Spot Scanning Quality Assurance

    Energy Technology Data Exchange (ETDEWEB)

    Tang, S; Ho, M; Chen, C; Mah, D [ProCure NJ, Somerset, NJ (United States); Rice, I; Doan, D; Mac Rae, B [IBA, Somerset, NJ (United States)

    2016-06-15

    Purpose: The use of log files to perform patient specific quality assurance for both protons and IMRT has been established. Here, we extend that approach to a proprietary log file format and compare our results to measurements in phantom. Our goal was to generate a system that would permit gross errors to be found within 3 fractions until direct measurements. This approach could eventually replace direct measurements. Methods: Spot scanning protons pass through multi-wire ionization chambers which provide information about the charge, location, and size of each delivered spot. We have generated a program that calculates the dose in phantom from these log files and compares the measurements with the plan. The program has 3 different spot shape models: single Gaussian, double Gaussian and the ASTROID model. The program was benchmarked across different treatment sites for 23 patients and 74 fields. Results: The dose calculated from the log files were compared to those generate by the treatment planning system (Raystation). While the dual Gaussian model often gave better agreement, overall, the ASTROID model gave the most consistent results. Using a 5%–3 mm gamma with a 90% passing criteria and excluding doses below 20% of prescription all patient samples passed. However, the degree of agreement of the log file approach was slightly worse than that of the chamber array measurement approach. Operationally, this implies that if the beam passes the log file model, it should pass direct measurement. Conclusion: We have established and benchmarked a model for log file QA in an IBA proteus plus system. The choice of optimal spot model for a given class of patients may be affected by factors such as site, field size, and range shifter and will be investigated further.

  19. Photovoltaic system at Nagaoka College of Technology. Fabrication of photovoltaic system and development of data logging system; Nagaoka kosen ni okeru taiyoko hatsuden. Setsubi no kochiku to data shuroku system no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Arimoto, M; Shirai, I; Togawa, K; Koshoji, H; Otaki, S [Nagaoka College of Technology, Niigata (Japan); Murata, M; Murata, K; Nomura, M [New Energy Corp., Tokyo (Japan)

    1997-11-25

    Reported in this paper is a photovoltaic power generation facility built in the yard of Nagaoka College of Technology. The purpose of this study is to find out if such a facility operates effectively in a heavy-snow region. A data logging system is also constructed. In a preliminary experiment, a 50W panel was installed, facing southwest at an inclination of 30degC, on the roof of the schoolhouse. A voltmeter, ammeter, and slide rheostat were used to perform necessary measurement. The panel temperature was approximately 50degC, and insolation was estimated at 70mW/cm{sup 2}. The data logging system is comprised of a personal computer, display, printer, etc. Using this system, voltage and current are measured with the load automatically adjusted, and the maximum power point is sought out and logged. In addition, insolation, ambient temperature, and panel temperature are logged. Data is logged every 10th minute and, when a day`s measurement is over, mean values are obtained for every hour and data is built for a power generation profile, all automatically. There is a plan for a wintertime power generation experiment. 3 refs., 5 figs.

  20. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  1. Engineering aspects of radiometric logging

    International Nuclear Information System (INIS)

    Huppert, P.

    1982-01-01

    Engineering problems encountered in the development of nuclear borehole logging techniques are discussed. Spectrometric techniques require electronic stability of the equipment. In addition the electronics must be capable of handling high count rates of randomly distributed pulses of fast rise time from the detector and the systems must be designed so that precise calibration is possible under field operating conditions. Components of a logging system are discussed in detail. They include the logging probe (electronics, detector, high voltage supply, preamplifier), electronic instrumentation for data collection and processing and auxiliary equipment

  2. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  3. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  4. Encyclopedia of well logging

    International Nuclear Information System (INIS)

    Desbrandes, R.

    1985-01-01

    The 16 chapters of this book aim to provide students, trainees and engineers with a manual covering all well-logging measurements ranging from drilling to productions, from oil to minerals going by way of geothermal energy. Each chapter is a summary but a bibliography is given at the end of each chapter. Well-logging during drilling, wireline logging equipment and techniques, petroleum logging, data processing of borehole data, interpretation of well-logging, sampling tools, completion and production logging, logging in relief wells to kill off uncontrolled blowouts, techniques for high temperature geothermal energy, small-scale mining and hydrology, logging with oil-base mud and finally recommended logging programs are all topics covered. There is one chapter on nuclear well-logging which is indexed separately. (UK)

  5. RHIC beam permit and quench detection communications system

    International Nuclear Information System (INIS)

    Conkling, C.R. Jr.

    1997-01-01

    A beam permit module has been developed to concentrate RHIC, subsystem sensor outputs, permit beam, and initiate emergency shutdowns. The modules accept inputs from the vacuum, cryogenic, power supply, beam loss, and superconducting magnet quench detection systems. Modules are located at equipment locations around the RHIC ring. The modules are connected by three fiberoptic communications links; a beam permit link, and two magnet power supply interlock links. During operation, carrier presence allows beam. If a RHIC subsystem detects a fault, the beam permit carrier terminates - initiating a beam dump. If the fault was a superconducting magnet quench, a power supply interlock carrier terminates - initiating an emergency magnet power dump. In addition, the master module triggers an event to cause remote sensors to log and hold data at the time-of-failure

  6. PLAT: An Automated Fault and Behavioural Anomaly Detection Tool for PLC Controlled Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Arup Ghosh

    2016-01-01

    Full Text Available Operational faults and behavioural anomalies associated with PLC control processes take place often in a manufacturing system. Real time identification of these operational faults and behavioural anomalies is necessary in the manufacturing industry. In this paper, we present an automated tool, called PLC Log-Data Analysis Tool (PLAT that can detect them by using log-data records of the PLC signals. PLAT automatically creates a nominal model of the PLC control process and employs a novel hash table based indexing and searching scheme to satisfy those purposes. Our experiments show that PLAT is significantly fast, provides real time identification of operational faults and behavioural anomalies, and can execute within a small memory footprint. In addition, PLAT can easily handle a large manufacturing system with a reasonable computing configuration and can be installed in parallel to the data logging system to identify operational faults and behavioural anomalies effectively.

  7. PLAT: An Automated Fault and Behavioural Anomaly Detection Tool for PLC Controlled Manufacturing Systems.

    Science.gov (United States)

    Ghosh, Arup; Qin, Shiming; Lee, Jooyeoun; Wang, Gi-Nam

    2016-01-01

    Operational faults and behavioural anomalies associated with PLC control processes take place often in a manufacturing system. Real time identification of these operational faults and behavioural anomalies is necessary in the manufacturing industry. In this paper, we present an automated tool, called PLC Log-Data Analysis Tool (PLAT) that can detect them by using log-data records of the PLC signals. PLAT automatically creates a nominal model of the PLC control process and employs a novel hash table based indexing and searching scheme to satisfy those purposes. Our experiments show that PLAT is significantly fast, provides real time identification of operational faults and behavioural anomalies, and can execute within a small memory footprint. In addition, PLAT can easily handle a large manufacturing system with a reasonable computing configuration and can be installed in parallel to the data logging system to identify operational faults and behavioural anomalies effectively.

  8. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  9. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  10. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  11. Testing of a uranium downhole logging system to measure in-situ plutonium concentrations in sediments. [216-Z-1A crib

    Energy Technology Data Exchange (ETDEWEB)

    Kasper, R.B.; Kay, M.A.; Bruns, L.E.; Stokes, J.A.; Steinman, D.K.; Adams, J.

    1980-11-01

    A prototype urainium borehole logging system, developed for uranium exploration, was modified for Pu assay and testing at the site. It uses the delayed fission neutron (DFN) method. It was tested in a retired Pu facility, the 216-Z-1A Crib. General agreement between laboratory determined Pu concentrations in sediment samples and neutron flux measurements was found for the relative distribution with depth.

  12. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  13. Long-term responses of rainforest erosional systems at different spatial scales to selective logging and climatic change

    Science.gov (United States)

    Walsh, R. P. D.; Bidin, K.; Blake, W. H.; Chappell, N. A.; Clarke, M. A.; Douglas, I.; Ghazali, R.; Sayer, A. M.; Suhaimi, J.; Tych, W.; Annammala, K. V.

    2011-01-01

    Long-term (21–30 years) erosional responses of rainforest terrain in the Upper Segama catchment, Sabah, to selective logging are assessed at slope, small and large catchment scales. In the 0.44 km2 Baru catchment, slope erosion measurements over 1990–2010 and sediment fingerprinting indicate that sediment sources 21 years after logging in 1989 are mainly road-linked, including fresh landslips and gullying of scars and toe deposits of 1994–1996 landslides. Analysis and modelling of 5–15 min stream-suspended sediment and discharge data demonstrate a reduction in storm-sediment response between 1996 and 2009, but not yet to pre-logging levels. An unmixing model using bed-sediment geochemical data indicates that 49 per cent of the 216 t km−2 a−1 2009 sediment yield comes from 10 per cent of its area affected by road-linked landslides. Fallout 210Pb and 137Cs values from a lateral bench core indicate that sedimentation rates in the 721 km2 Upper Segama catchment less than doubled with initially highly selective, low-slope logging in the 1980s, but rose 7–13 times when steep terrain was logged in 1992–1993 and 1999–2000. The need to keep steeplands under forest is emphasized if landsliding associated with current and predicted rises in extreme rainstorm magnitude-frequency is to be reduced in scale. PMID:22006973

  14. A new approach for assessing the state of environment using isometric log-ratio transformation and outlier detection for computation of mean PCDD/F patterns in biota.

    Science.gov (United States)

    Lehmann, René

    2015-01-01

    To assess the state of the environment, various compartments are examined as part of monitoring programs. Within monitoring, a special focus is on chemical pollution. One of the most toxic substances ever synthesized is the well-known dioxin 2,3,7,8-TCDD (2,3,7,8-tetra-chlor-dibenzo-dioxin). Other PCDD/F (polychlorinated-dibenzo-dioxin and furan) can act toxic too. They are ubiquitary and persistent in various environmental compartments. Assessing the state of environment requires knowledge of typical local patterns of PCDD/F for as many compartments as possible. For various species of wild animals and plants (so called biota), I present the mean local congenere profiles of ubiquitary PCDD/F contamination reflecting typical patterns and levels of environmental burden for various years. Trends in time series of means can indicate success or failure of a measure of PCDD/F reduction. For short time series of mean patterns, it can be hard to detect trends. A new approach regarding proportions of outliers in the corresponding annual cross-sectional data sets in parallel can help detect decreasing or increasing environmental burden and support analysis of time series. Further, in this article, the true structure of PCDD/F data in biota is revealed, that is, the compositional data structure. It prevents direct application of statistical standard procedures to the data rendering results of statistical analysis meaningless. Results indicate that the compositional data structure of PCDD/F in biota is of great interest and should be taken into account in future studies. Isometric log-ratio (ilr) transformation is used, providing data statistical standard procedures that can be applied too. Focusing on the identification of typical PCDD/F patterns in biota, outliers are removed from annual data since they represent an extraordinary situation in the environment. Identification of outliers yields two advantages. First, typical (mean) profiles and levels of PCDD/F contamination

  15. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  16. US Army Nuclear Burst Detection System (NBDS)

    International Nuclear Information System (INIS)

    Glaser, R.F.

    1980-07-01

    The Nuclear Burst Detection System (NBDS) was developed to meet the Army requirements of an unattended, automatic nuclear burst reporting system. It provides pertinent data for battlefield commanders on a timely basis with high reliability

  17. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  18. Assessment of effectiveness of geologic isolation systems. CIRMIS data system. Volume 4. Driller's logs, stratigraphic cross section and utility routines

    International Nuclear Information System (INIS)

    Friedrichs, D.R.

    1980-01-01

    The Assessment of Effectiveness of Geologic Isolation Systems (AEGIS) Program is developing and applying the methodology for assessing the far-field, long-term post-closure safety of deep geologic nuclear waste repositories. AEGIS is being performed by Pacific Northwest Laboratory (PNL) under contract with the Office of Nuclear Waste Isolation (ONWI) for the Department of Energy (DOE). One task within AEGIS is the development of methodology for analysis of the consequences (water pathway) from loss of repository containment as defined by various release scenarios. Analysis of the long-term, far-field consequences of release scenarios requires the application of numerical codes which simulate the hydrologic systems, model the transport of released radionuclides through the hydrologic systems to the biosphere, and, where applicable, assess the radiological dose to humans. The various input parameters required in the analysis are compiled in data systems. The data are organized and prepared by various input subroutines for use by the hydrologic and transport codes. The hydrologic models simulate the groundwater flow systems and provide water flow directions, rates, and velocities as inputs to the transport models. Outputs from the transport models are basically graphs of radionuclide concentration in the groundwater plotted against time. After dilution in the receiving surface-water body (e.g., lake, river, bay), these data are the input source terms for the dose models, if dose assessments are required. The dose models calculate radiation dose to individuals and populations. CIRMIS (Comprehensive Information Retrieval and Model Input Sequence) Data System is a storage and retrieval system for model input and output data, including graphical interpretation and display. This is the fourth of four volumes of the description of the CIRMIS Data System

  19. Log N-log S in inconclusive

    Science.gov (United States)

    Klebesadel, R. W.; Fenimore, E. E.; Laros, J.

    1983-01-01

    The log N-log S data acquired by the Pioneer Venus Orbiter Gamma Burst Detector (PVO) are presented and compared to similar data from the Soviet KONUS experiment. Although the PVO data are consistent with and suggestive of a -3/2 power law distribution, the results are not adequate at this state of observations to differentiate between a -3/2 and a -1 power law slope.

  20. Comparison of soft-input-soft-output detection methods for dual-polarized quadrature duobinary system

    Science.gov (United States)

    Chang, Chun; Huang, Benxiong; Xu, Zhengguang; Li, Bin; Zhao, Nan

    2018-02-01

    Three soft-input-soft-output (SISO) detection methods for dual-polarized quadrature duobinary (DP-QDB), including maximum-logarithmic-maximum-a-posteriori-probability-algorithm (Max-log-MAP)-based detection, soft-output-Viterbi-algorithm (SOVA)-based detection, and a proposed SISO detection, which can all be combined with SISO decoding, are presented. The three detection methods are investigated at 128 Gb/s in five-channel wavelength-division-multiplexing uncoded and low-density-parity-check (LDPC) coded DP-QDB systems by simulations. Max-log-MAP-based detection needs the returning-to-initial-states (RTIS) process despite having the best performance. When the LDPC code with a code rate of 0.83 is used, the detecting-and-decoding scheme with the SISO detection does not need RTIS and has better bit error rate (BER) performance than the scheme with SOVA-based detection. The former can reduce the optical signal-to-noise ratio (OSNR) requirement (at BER=10-5) by 2.56 dB relative to the latter. The application of the SISO iterative detection in LDPC-coded DP-QDB systems makes a good trade-off between requirements on transmission efficiency, OSNR requirement, and transmission distance, compared with the other two SISO methods.

  1. Method and equipment for fast transmission of a signal consisting of many data pulses by a normal well-logging cable

    International Nuclear Information System (INIS)

    Pitts, R.W. Jr.; Whatley, H.A. Jr.

    1975-01-01

    Well logging methods and equipment in general and a nuclear well logging process and apparatus in particular are presented. They increase the number of pulses which can be transmitted to the top of the well from a well logging instrument placed at the bottom, during a given time interval, by means of a processing giving two pulses for each pulse corresponding to a detection. The equipment is a double-spectrum well logging system, with near and far detectors [fr

  2. Development of the environmental neutron detection system

    International Nuclear Information System (INIS)

    Kume, Kyo

    2002-03-01

    Environmental neutron detection system was proposed and developed. The main goal of this system was set to detect fast and thermal neutrons with the identical detectors setup without degraders. This system consists of a 10 B doped liquid scintillator for n detection and CsI scintillators for simultaneous γ emission from 10 B doped in the liquid scintillator after the n capture reaction. The first setup was optimized for the thermal n detection, while the second setup was for the fast n detection. It was shown that the thermal n flux was obtained in the first setup by using the method of the γ coincidence method with the help of the Monte Carlo calculation. The second setup was designed to improve the detection efficiency for the fast n, and was shown qualitatively that both the pulse shape discrimination and the coincidence methods are efficient. There will be more improvements, particularly for the quantitative discussion. (author)

  3. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  4. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  5. System tuning and measurement error detection testing

    International Nuclear Information System (INIS)

    Krejci, Petr; Machek, Jindrich

    2008-09-01

    The project includes the use of the PEANO (Process Evaluation and Analysis by Neural Operators) system to verify the monitoring of the status of dependent measurements with a view to early measurement fault detection and estimation of selected signal levels. At the present stage, the system's capabilities of detecting measurement errors was assessed and the quality of the estimates was evaluated for various system configurations and the formation of empiric models, and rules were sought for system training at chosen process data recording parameters and operating modes. The aim was to find a suitable system configuration and to document the quality of the tuned system on artificial failures

  6. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    people try to reveal sensitive information of Internet users, also called as phishing. Phishing detection has received great attention but there has...node. Figure 3 describes the result of modified nodes from the original RDR rule tree. Red- coloured ‘X’ sign represents the stopping rule, and the...green- coloured boxes describe the refined rule. However, when human knowledge is applied to those incorrectly classified data, not all of the

  7. Design and Development of a Relative Humidity and Room Temperature Measurement System with On Line Data Logging Feature for Monitoring the Fermentation Room of Tea Factory

    Directory of Open Access Journals (Sweden)

    Utpal SARMA

    2011-12-01

    Full Text Available The design and development of a Relative Humidity (RH and Room Temperature (RT monitoring system with on line data logging feature for monitoring fermentation room of a tea factory is presented in this paper. A capacitive RH sensor with on chip signal conditioner is taken as RH sensor and a temperature to digital converter (TDC is used for ambient temperature monitoring. An 8051 core microcontroller is the heart of the whole system which reads the digital equivalent of RH data with the help of a 12-bit Analog to Digital (A/D converter and synchronize TDC to get the ambient temperature. The online data logging is achieved with the help of RS-232C communication. Field performance is also studied by installing it in the fermentation room of a tea factory.

  8. Method for detecting fractures in formations surroundingearth boreholes

    International Nuclear Information System (INIS)

    Fertl, W.H.

    1979-01-01

    A well is first logged with gamma ray detection system to provide a base log. Fluid containing salt of potassium, uranium or thorium is then injected into the well opposite the interval of interest. When the well head pressure is increased, some of the injected fluid will move into the fracture or other highly permeable localized zones. The gamma ray detection system is then run again one or more times through the well to provide a log which is compared with the base log. The fracture is detected by localized drastically higher readings observed on the repeat run of the gamma ray detection logging system

  9. Pulsed neutron generator for logging

    International Nuclear Information System (INIS)

    Thibideau, F.D.

    1977-01-01

    A pulsed neutron generator for uranium logging is described. This generator is one component of a prototype uranium logging probe which is being developed by SLA to detect, and assay, uranium by borehole logging. The logging method is based on the measurement of epithermal neutrons resulting from the prompt fissioning of uranium from a pulsed source of 17.6 MeV neutrons. An objective of the prototype probe was that its diameter not exceed 2.75 inches, which would allow its use in conventional rotary drill holes of 4.75-inch diameter. This restriction limited the generator to a maximum 2.375-inch diameter. The performance requirements for the neutron generator specified that it operate with a nominal output of 5 x 10 6 neutrons/pulse at up to 100 pulses/second for a one-hour period. The development of a neutron generator meeting the preliminary design goals was completed and two prototype models were delivered to SLA. These two generators have been used by SLA to log a number of boreholes in field evaluation of the probe. The results of the field evaluations have led to the recommendation of several changes to improve the probe's operation. Some of these changes will require additional development effort on the neutron generator. It is expected that this work will be performed during 1977. The design and operation of the first prototype neutron generators is described

  10. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  11. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  12. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes; Harrou, Fouzi; Sun, Ying; Kara, Kamel; Chouder, Aissa; Silvestre, Santiago

    2017-01-01

    and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model

  13. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  14. [Development of operation patient security detection system].

    Science.gov (United States)

    Geng, Shu-Qin; Tao, Ren-Hai; Zhao, Chao; Wei, Qun

    2008-11-01

    This paper describes a patient security detection system developed with two dimensional bar codes, wireless communication and removal storage technique. Based on the system, nurses and correlative personnel check code wait operation patient to prevent the defaults. The tests show the system is effective. Its objectivity and currency are more scientific and sophisticated than current traditional method in domestic hospital.

  15. Verification of respiratory-gated radiotherapy with new real-time tumour-tracking radiotherapy system using cine EPID images and a log file

    Science.gov (United States)

    Shiinoki, Takehiro; Hanazawa, Hideki; Yuasa, Yuki; Fujimoto, Koya; Uehara, Takuya; Shibuya, Keiko

    2017-02-01

    A combined system comprising the TrueBeam linear accelerator and a new real-time tumour-tracking radiotherapy system, SyncTraX, was installed at our institution. The objectives of this study are to develop a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine electronic portal image device (EPID) images and a log file and to verify this treatment in clinical cases. Respiratory-gated radiotherapy was performed using TrueBeam and the SyncTraX system. Cine EPID images and a log file were acquired for a phantom and three patients during the course of the treatment. Digitally reconstructed radiographs (DRRs) were created for each treatment beam using a planning CT set. The cine EPID images, log file, and DRRs were analysed using a developed software. For the phantom case, the accuracy of the proposed method was evaluated to verify the respiratory-gated radiotherapy. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker used as an internal surrogate were calculated to evaluate the gating accuracy and set-up uncertainty in the superior-inferior (SI), anterior-posterior (AP), and left-right (LR) directions. The proposed method achieved high accuracy for the phantom verification. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker were  ⩽3 mm and  ±3 mm in the SI, AP, and LR directions. We proposed a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine EPID images and a log file and showed that this treatment is performed with high accuracy in clinical cases. This work was partly presented at the 58th Annual meeting of American Association of Physicists in Medicine.

  16. Verification of respiratory-gated radiotherapy with new real-time tumour-tracking radiotherapy system using cine EPID images and a log file.

    Science.gov (United States)

    Shiinoki, Takehiro; Hanazawa, Hideki; Yuasa, Yuki; Fujimoto, Koya; Uehara, Takuya; Shibuya, Keiko

    2017-02-21

    A combined system comprising the TrueBeam linear accelerator and a new real-time tumour-tracking radiotherapy system, SyncTraX, was installed at our institution. The objectives of this study are to develop a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine electronic portal image device (EPID) images and a log file and to verify this treatment in clinical cases. Respiratory-gated radiotherapy was performed using TrueBeam and the SyncTraX system. Cine EPID images and a log file were acquired for a phantom and three patients during the course of the treatment. Digitally reconstructed radiographs (DRRs) were created for each treatment beam using a planning CT set. The cine EPID images, log file, and DRRs were analysed using a developed software. For the phantom case, the accuracy of the proposed method was evaluated to verify the respiratory-gated radiotherapy. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker used as an internal surrogate were calculated to evaluate the gating accuracy and set-up uncertainty in the superior-inferior (SI), anterior-posterior (AP), and left-right (LR) directions. The proposed method achieved high accuracy for the phantom verification. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker were  ⩽3 mm and  ±3 mm in the SI, AP, and LR directions. We proposed a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine EPID images and a log file and showed that this treatment is performed with high accuracy in clinical cases.

  17. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  18. Caltrans fog detection and warning system.

    Science.gov (United States)

    2009-01-01

    The California Department of Transportation (Caltrans) has implemented a fog detection and warning system on Highway 99 near Fresno. The entire central valley region is susceptible to Tule fog, which can reduce visibility tremendously, sometimes to n...

  19. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando; Laleg-Kirati, Taous-Meriem

    2012-01-01

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological

  20. Decision support using anesthesia information management system records and accreditation council for graduate medical education case logs for resident operating room assignments.

    Science.gov (United States)

    Wanderer, Jonathan P; Charnin, Jonathan; Driscoll, William D; Bailin, Michael T; Baker, Keith

    2013-08-01

    Our goal in this study was to develop decision support systems for resident operating room (OR) assignments using anesthesia information management system (AIMS) records and Accreditation Council for Graduate Medical Education (ACGME) case logs and evaluate the implementations. We developed 2 Web-based systems: an ACGME case-log visualization tool, and Residents Helping in Navigating OR Scheduling (Rhinos), an interactive system that solicits OR assignment requests from residents and creates resident profiles. Resident profiles are snapshots of the cases and procedures each resident has done and were derived from AIMS records and ACGME case logs. A Rhinos pilot was performed for 6 weeks on 2 clinical services. One hundred sixty-five requests were entered and used in OR assignment decisions by a single attending anesthesiologist. Each request consisted of a rank ordered list of up to 3 ORs. Residents had access to detailed information about these cases including surgeon and patient name, age, procedure type, and admission status. Success rates at matching resident requests were determined by comparing requests with AIMS records. Of the 165 requests, 87 first-choice matches (52.7%), 27 second-choice matches (16.4%), and 8 third-choice matches (4.8%) were made. Forty-three requests were unmatched (26.1%). Thirty-nine first-choice requests overlapped (23.6%). Full implementation followed on 8 clinical services for 8 weeks. Seven hundred fifty-four requests were reviewed by 15 attending anesthesiologists, with 339 first-choice matches (45.0%), 122 second-choice matches (16.2%), 55 third-choice matches (7.3%), and 238 unmatched (31.5%). There were 279 overlapping first-choice requests (37.0%). The overall combined match success rate was 69.4%. Separately, we developed an ACGME case-log visualization tool that allows individual resident experiences to be compared against case minimums as well as resident peer groups. We conclude that it is feasible to use ACGME case-log

  1. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  2. Doubler system quench detection threshold

    International Nuclear Information System (INIS)

    Kuepke, K.; Kuchnir, M.; Martin, P.

    1983-01-01

    The experimental study leading to the determination of the sensitivity needed for protecting the Fermilab Doubler from damage during quenches is presented. The quench voltage thresholds involved were obtained from measurements made on Doubler cable of resistance x temperature and voltage x time during quenches under several currents and from data collected during operation of the Doubler Quench Protection System as implemented in the B-12 string of 20 magnets. At 4kA, a quench voltage threshold in excess of 5.OV will limit the peak Doubler cable temperature to 452K for quenches originating in the magnet coils whereas a threshold of 0.5V is required for quenches originating outside of coils

  3. Neutron borehole logging correction technique

    International Nuclear Information System (INIS)

    Goldman, L.H.

    1978-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for logging earth formations traversed by a borehole in which an earth formation is irradiated with neutrons and gamma radiation produced thereby in the formation and in the borehole is detected. A sleeve or shield for capturing neutrons from the borehole and producing gamma radiation characteristic of that capture is provided to give an indication of the contribution of borehole capture events to the total detected gamma radiation. It is then possible to correct from those borehole effects the total detected gamma radiation and any earth formation parameters determined therefrom

  4. The efficiency calibration and development of environmental correction factors for an in situ high-resolution gamma spectroscopy well logging system

    International Nuclear Information System (INIS)

    Giles, J.R.

    1996-05-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. Absolute efficiency calibration of the GSLS was performed using simple cylindrical borehole geometry. The calibration source incorporated naturally occurring radioactive material (NORM) that emitted photons ranging from 186-keV to 2,614-keV. More complex borehole geometries were modeled using commercially available shielding software. A linear relationship was found between increasing source thickness and relative photon fluence rates at the detector. Examination of varying porosity and moisture content showed that as porosity increases, relative photon fluence rates increase linearly for all energies. Attenuation effects due to iron, water, PVC, and concrete cylindrical shields were found to agree with previous studies. Regression analyses produced energy-dependent equations for efficiency corrections applicable to spectral gamma-ray well logs collected under non-standard borehole conditions

  5. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  6. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  7. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  8. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  9. A new digital correlation flaw detection system

    International Nuclear Information System (INIS)

    Lee, B.B.; Furgason, E.S.

    1981-01-01

    A new portable digital random signal flaw detection system is described which uses a digital delay line to replace the acoustic delay line of the original random signal system. Using this new system, a comparison was made between the two types of transmit signals which have been used in previous systems--m-sequences and random signals. This comparison has not been possible with these previous correlation flaw detection systems. Results indicated that for high-speed short code operation, the m-sequences produced slightly lower range sidelobes than typical samples of a clipped random signal. For normal long code operation, results indicated that system performance is essentially equivalent in resolution and signal-to-noise ratio using either m-sequences or clipped and sampled random signals. Further results also showed that for normal long code operation, the system produces outputs equivalent in resolution to pulse-echo systems, but with the added benefit of signal-to-noise ratio enhancement

  10. The log S -log N distribution of gamma ray brust

    International Nuclear Information System (INIS)

    Yamagami, Takamasa; Nishimura, Jun; Fujii, Masami

    1982-01-01

    The relation between the size S and the frequency N of gamma ray burst has been studied. This relation may be determined from the celestial distribution of gamma ray burst sources. The present analysis gives that the log S - log N relation for any direction is determined by the celestial distribution of gamma ray burst sources. The observed bursts were analyzed. The celestial distribution of gamma ray burst sources was observed by the satellites of USSR. The results showed that the distribution seemed to be isotropic. However, the calculated log S - log N relation based on the isotropic distribution wasF in disagreement with the observed ones. As the result of analysis, it was found that the observed bursts missed low energy part because of the threshold of detectors. The levels of discrimination of detection were not clear. When a proper threshold level is set for each type of burst, and the size of bursts is determined, the above mentioned discrepancy will be deleted regardless of luminosity and the spatial distribution of bursts. (Kato, T.)

  11. Chemical logging of geothermal wells

    Science.gov (United States)

    Allen, C.A.; McAtee, R.E.

    The presence of geothermal aquifers can be detected while drilling in geothermal formations by maintaining a chemical log of the ratio of the concentrations of calcium to carbonate and bicarbonate ions in the return drilling fluid. A continuous increase in the ratio of the concentrations of calcium to carbonate and bicarbonate ions is indicative of the existence of a warm or hot geothermal aquifer at some increased depth.

  12. Neutron capture in borehole logging

    International Nuclear Information System (INIS)

    Randall, R.R.

    1981-01-01

    The use is described of a pulsed source of fast neutrons and a radiation detector to measure the thermal neutron population decay rate in a well logging instrument. The macroscopic neutron absorption cross-section is calculated by taking the natural logarithm of the ratio of the detected radiation counts occurring within two measurement intervals of fixed duration and starting at a fixed time after a neutron burst. (U.K.)

  13. Radiometric well logging instruments

    International Nuclear Information System (INIS)

    Davydov, A.V.

    1975-01-01

    The technical properties of well instruments for radioactive logging used in the radiometric logging complexes PKS-1000-1 (''Sond-1'') and PRKS-2 (''Vitok-2'') are described. The main features of the electric circuit of the measuring channels are given

  14. Power to the logs!

    CERN Multimedia

    CERN. Geneva; MACMAHON, Joseph

    2015-01-01

    Are you tired of using grep, vi and emacs to read your logs? Do you feel like you’re missing the big picture? Does the word "statistics" put a smile on your face? Then it’s time to give power to the logs!

  15. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  16. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  17. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  18. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  19. Multisignal detecting system of pile integrity testing

    Science.gov (United States)

    Liu, Zuting; Luo, Ying; Yu, Shihai

    2002-05-01

    The low strain reflection wave method plays a principal rule in the integrating detection of base piles. However, there are some deficiencies with this method. For example, there is a blind area of detection on top of the tested pile; it is difficult to recognize the defects at deep-seated parts of the pile; there is still the planar of 3D domino effect, etc. It is very difficult to solve these problems only with the single-transducer pile integrity testing system. A new multi-signal piles integrity testing system is proposed in this paper, which is able to impulse and collect signals on multiple points on top of the pile. By using the multiple superposition data processing method, the detecting system can effectively restrain the interference and elevate the precision and SNR of pile integrity testing. The system can also be applied to the evaluation of engineering structure health.

  20. Geophysical log database for the Floridan aquifer system and southeastern Coastal Plain aquifer system in Florida and parts of Georgia, Alabama, and South Carolina

    Science.gov (United States)

    Williams, Lester J.; Raines, Jessica E.; Lanning, Amanda E.

    2013-04-04

    A database of borehole geophysical logs and other types of data files were compiled as part of ongoing studies of water availability and assessment of brackish- and saline-water resources. The database contains 4,883 logs from 1,248 wells in Florida, Georgia, Alabama, South Carolina, and from a limited number of offshore wells of the eastern Gulf of Mexico and the Atlantic Ocean. The logs can be accessed through a download directory organized by state and county for onshore wells and in a single directory for the offshore wells. A flat file database is provided that lists the wells, their coordinates, and the file listings.

  1. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  2. Obstacle detection system for underground mining vehicles

    Energy Technology Data Exchange (ETDEWEB)

    Cohen, P.; Polotski, V.; Piotte, M.; Melamed, F. [Ecole Polytechnique de Montreal, Montreal, PQ (Canada)

    1998-01-01

    A device for detecting obstacles by autonomous vehicles navigating in mine drifts is described. The device is based upon structured lighting and the extraction of relevant features from images of obstacles. The system uses image profile changes, ground and wall irregularities, disturbances of the vehicle`s trajectory, and impaired visibility to detect obstacles, rather than explicit three-dimensional scene reconstruction. 7 refs., 5 figs.

  3. Device for detecting failure of reactor system

    International Nuclear Information System (INIS)

    Miyazawa, Tatsuo.

    1979-01-01

    Purpose: To make it possible to rapidly detect any failure in a reactor system prior to the leakage of coolants. Constitution: The dose of beta line is computed from the difference between the power of a detector for reacting with both beta and gamma lines and a detector for reacting only with gamma line to detect the failure of a reactor system, thereby to raise the detection speed and improve the detection accuracy. More specifically, a radiation detector A detects gamma and beta lines by means of piezoelectric elements. A radiation detector B caused the opening of the detector A to be covered with a metal, and detects only gamma line. The detected values of detectors A and B are amplified by an amplifier and applied to a rate meter and a counter, the values being converted into DC and introduced into a comparison circuit, where the outputs of the rate meter are compared with each other. When the difference is more than the predetermined range, it is supplied as output to an alarm circuit where an alarm signal is produced. (Nakamura, S.)

  4. Edge detection techniques for iris recognition system

    International Nuclear Information System (INIS)

    Tania, U T; Motakabber, S M A; Ibrahimy, M I

    2013-01-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate

  5. Synchronization of Well Log Data and Geophysical Data with Remote Sensing Technique to Develop the Hydrocarbon System of Bengal Basin

    Science.gov (United States)

    Kesh, S.; Samadder, P. K.

    2012-12-01

    Remote sensing along with more conventional exploration techniques such as geophysics and reconnaissance field mapping can help to establish regional geologic relationships, to extract major structural features and to pinpoint anomalous patterns. Many well have been drilled in Bengal basin still no commercially viable reserves have been discovered. Geophysical well logging is used in virtually every oil well. It is the primary means by which we characterize the subsurface in search of hydrocarbons. Oil and gas exploration activities for large areas require ground gravity surveys to facilitate detailed geological interpretations for subsurface features integrating geological cross-sections with the sub-surface structural trends leads to the identification of prospect areas. Remote sensing, geological and geophysical data integration provide accurate geometric shapes of the basins. Bengal basin has a sedimentary fill of 10-15 km, is the northernmost of the east coast basins of India In the first phase Remote sensing satellite sensors help in identifying surface anomaly which indicates the presence of hydrocarbon reservoirs providing regional geological settings of petroleferous basins. It provides accurate and visual data for directly determining geometric shapes of basin. It assists in the selection of exploration regions by defining the existence of sedimentary basin. Remote sensing methods can generate a wealth of information useful in determining the value of exploratory prospecting. In the second phase Well Log data provide relative subsurface information for oil and gas exploration. Remote sensing data are merged with other available information such as Aeromagnetic, gravity, geochemical surveys and 2D seismic surveys. The result of this phase is to estimate the outcome of oil discovery probabilities for locating oil prospects

  6. Maximum Temperature Detection System for Integrated Circuits

    Science.gov (United States)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  7. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  8. Analysis of RIA standard curve by log-logistic and cubic log-logit models

    International Nuclear Information System (INIS)

    Yamada, Hideo; Kuroda, Akira; Yatabe, Tami; Inaba, Taeko; Chiba, Kazuo

    1981-01-01

    In order to improve goodness-of-fit in RIA standard analysis, programs for computing log-logistic and cubic log-logit were written in BASIC using personal computer P-6060 (Olivetti). Iterative least square method of Taylor series was applied for non-linear estimation of logistic and log-logistic. Hear ''log-logistic'' represents Y = (a - d)/(1 + (log(X)/c)sup(b)) + d As weights either 1, 1/var(Y) or 1/σ 2 were used in logistic or log-logistic and either Y 2 (1 - Y) 2 , Y 2 (1 - Y) 2 /var(Y), or Y 2 (1 - Y) 2 /σ 2 were used in quadratic or cubic log-logit. The term var(Y) represents squares of pure error and σ 2 represents estimated variance calculated using a following equation log(σ 2 + 1) = log(A) + J log(y). As indicators for goodness-of-fit, MSL/S sub(e)sup(2), CMD% and WRV (see text) were used. Better regression was obtained in case of alpha-fetoprotein by log-logistic than by logistic. Cortisol standard curve was much better fitted with cubic log-logit than quadratic log-logit. Predicted precision of AFP standard curve was below 5% in log-logistic in stead of 8% in logistic analysis. Predicted precision obtained using cubic log-logit was about five times lower than that with quadratic log-logit. Importance of selecting good models in RIA data processing was stressed in conjunction with intrinsic precision of radioimmunoassay system indicated by predicted precision. (author)

  9. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    The invention relates to a coaxial direct-detection LIDAR system for measuring velocity, temperature and/or particulate density. The system comprises a laser source for emitting a laser light beam having a lasing center frequency along an emission path. The system further comprises an optical....... Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  10. A dual-sided coded-aperture radiation detection system

    International Nuclear Information System (INIS)

    Penny, R.D.; Hood, W.E.; Polichar, R.M.; Cardone, F.H.; Chavez, L.G.; Grubbs, S.G.; Huntley, B.P.; Kuharski, R.A.; Shyffer, R.T.; Fabris, L.; Ziock, K.P.; Labov, S.E.; Nelson, K.

    2011-01-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5x5x50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  11. Audit Log for Forensic Photography

    Science.gov (United States)

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  12. Methods and systems for detection of radionuclides

    Science.gov (United States)

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  13. Mariners Weather Log

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Mariners Weather Log (MWL) is a publication containing articles, news and information about marine weather events and phenomena, worldwide environmental impact...

  14. Log-inject-log in sand consolidation

    International Nuclear Information System (INIS)

    Murphy, R.P.; Spurlock, J.W.

    1977-01-01

    A method is described for gathering information for the determination of the adequacy of placement of sand consolidating plastic for sand control in oil and gas wells. The method uses a high neutron cross-section tracer which becomes part of the plastic and uses pulsed neutron logging before and after injection of the plastic. Preferably, the method uses lithium, boron, indium, and/or cadmium tracers. Boron oxide is especially useful and can be dissolved in alcohol and mixed with the plastic ingredients

  15. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  16. Digital detection systems for projection radiography

    International Nuclear Information System (INIS)

    Schulz, R.F.

    2001-01-01

    This article gives a survey of digital X-ray detection systems for projection radiography. The different principles are compared and some general characteristics are derived. The basic conversion mechanisms in the absorption layers are described. The basic principles of solid state X-ray detectors and their general characteristics are elucidated as well as some similarities with detectors for computed tomography. Some important application and system aspects are considered. An outlook on further possible developments in this field is given. (orig.) [de

  17. Elephant logging and environment

    International Nuclear Information System (INIS)

    Tin-Aung-Hla

    1995-01-01

    The natural environment comprises non-biological elements such as air, water, light, heat and biological elements of animal and plant life; all interact with each other to create an ecosystem. Human activities like over-exploitation of forest results in deforestation and desertification. This consequently changes ecological balance. Topics on: (1) history of elephants utilization; (2) elephant logging; (3) classification of elephants; (4) dragging gear; (5) elephant power; (6) elephant logging and environment, are discussed

  18. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  19. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  20. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  1. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  2. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  3. Application of nuclear logging to porosity studies in Itaborai basin

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Milena F.S.; Lima, Inaya; Lopes, Ricardo Tadeu, E-mail: milena@lin.ufrj.br, E-mail: inaya@lin.ufrj.br, E-mail: ricardo@lin.ufrj.br [Coordenacao dos Programas de Pos-Graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Lab. de Instrumentacao Nuclear; Ferrucio, Paula Lucia; Borghi, Leonardo, E-mail: ferrucio@acd.ufrj.br, E-mail: borghi@ufrj.br [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Inst. de Geociencias. Dept. de Geologia; Abreu, Carlos Jorge, E-mail: jo_abreu@unb.br [Universidade de Brasilia (UnB), DF (Brazil). Inst. de Geociencias

    2011-07-01

    Nuclear logging provides information on bulk density and porosity variations by measuring the intensity of the scattered radiation induced on the formation by radioactive sources. In this study, nuclear logging was employed to analyze the pore-space system of the 2-ITAB-1-RJ well placed on the Itaborai limestone basin, in the state of Rio de Janeiro. This is one of the smallest sedimentary basin in Brazil and it is formed by clastic deposits and travertine limestone rocks which are fractured. Understanding the pore-space system of carbonate rocks has become important subject for the oil industry, specially in Brazil. A Density Gamma Probe (LSD) and a Neutron Probe (NEUT) were used for data acquisition, which nuclear logging was carried out in part of the well, with continuous detection for about 50 m of deep. The detection speed was 4 m/min for the LSD and 5 m/min for the NEUT. The results obtained by nuclear logging showed that the 2-ITAB-1-RJ well consists of three different intervals with rocks ranging from low to moderate porosity present in travertine, marls and gneisses. (author)

  4. Chemical detection, identification, and analysis system

    International Nuclear Information System (INIS)

    Morel, R.S.; Gonzales, D.; Mniszewski, S.

    1990-01-01

    The chemical detection, identification, and analysis system (CDIAS) has three major goals. The first is to display safety information regarding chemical environment before personnel entry. The second is to archive personnel exposure to the environment. Third, the system assists users in identifying the stage of a chemical process in progress and suggests safety precautions associated with that process. In addition to these major goals, the system must be sufficiently compact to provide transportability, and it must be extremely simple to use in order to keep user interaction at a minimum. The system created to meet these goals includes several pieces of hardware and the integration of four software packages. The hardware consists of a low-oxygen, carbon monoxide, explosives, and hydrogen sulfide detector; an ion mobility spectrometer for airborne vapor detection; and a COMPAQ 386/20 portable computer. The software modules are a graphics kernel, an expert system shell, a data-base management system, and an interface management system. A supervisory module developed using the interface management system coordinates the interaction of the other software components. The system determines the safety of the environment using conventional data acquisition and analysis techniques. The low-oxygen, carbon monoxide, hydrogen sulfide, explosives, and vapor detectors are monitored for hazardous levels, and warnings are issued accordingly

  5. Limitations and developing directions of pulsed neutron logging

    International Nuclear Information System (INIS)

    Wu Wensheng; Xiao Lizhi

    2007-01-01

    The paper explains briefly the principle of pulsed neutron logging method, summarizes the system and uses of the method in petroleum logging. The paper points out the limitations of pulsed neutron logging such as low precise measurements, low logging speed, plenty of influence factors, low vertical resolution, bad adaptability, difficult logging interpretation and so on, and expounds its developing directions in hardware, software, method and principle. (authors)

  6. Log Analysis Using Splunk Hadoop Connect

    Science.gov (United States)

    2017-06-01

    23 A. INPUT SELECTION ...Conversion Resource Consumption .............................................. 28 Figure 8. Distribution of Events in Years...running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a

  7. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  8. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  9. Ultrafast CT scanning of an oak log for internal defects

    Science.gov (United States)

    Francis G. Wagner; Fred W. Taylor; Douglas S. Ladd; Charles W. McMillin; Fredrick L. Roder

    1989-01-01

    Detecting internal defects in sawlogs and veneer logs with computerized tomographic (CT) scanning is possible, but has been impractical due to the long scanning time required. This research investigated a new scanner able to acquire 34 cross-sectional log scans per second. This scanning rate translates to a linear log feed rate of 85 feet (25.91 m) per minute at one...

  10. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  11. Evaluation of pipeline leak detection systems

    International Nuclear Information System (INIS)

    Glauz, W.D.; Flora, J.D.; Hennon, G.J.

    1993-01-01

    Leaking underground storage tank system presents an environmental concern and a potential health hazard. It is well known that leaks in the piping associated with these systems account for a sizeable fraction of the leaks. EPA has established performance standards for pipeline leak detection systems, and published a document presenting test protocols for evaluating these systems against the standards. This paper discusses a number of facets and important features of evaluating such systems, and presents results from tests of several systems. The importance of temperature differences between the ground and the product in the line is shown both in theory and with test data. The impact of the amount of soil moisture present is addressed, along with the effect of frozen soil. These features are addressed both for line tightness test systems, which must detect leaks of 0.10 gal/h (0.38 L/h) at 150% of normal line pressure, or 0.20 gal/h (0.76 L/h) at normal line pressure, and for automatic line leak detectors that must detect leaks of 3 gal/h (11 L/h) at 10 psi (69 kPa) within an hour of the occurrence of the leak. This paper also addresses some statistical aspects of the evaluation of these systems. Reasons for keeping the evaluation process ''blind'' to the evaluated company are given, along with methods for assuring that the tests are blind. Most importantly, a test procedure is presented for evaluating systems that report a flow rate (not just a pass/fail decision) that is much more efficient than the procedure presented in the EPA protocol, and is just as stringent

  12. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1983-10-01

    A research program is under way to evaluate and develop improve leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  13. Continuous Tamper-proof Logging using TPM2.0

    Science.gov (United States)

    2014-06-16

    process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B

  14. Subsea leak detection systems - recommended practice

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Kristin Nergaard

    2010-07-01

    It is known in the industry that occasional leakages occur in subsea production systems. In spite of efforts to apply subsea leak detectors, the experience is that most leakages are either detected by ROV during routine inspections or interventions or as oil slicks on the surface . Operators and authority awareness towards the environmental impact of oil and gas production is increasing. The regulatory bodies in Norway, EU and USA specify requirements for detection of acute pollution. This paper presents the development of a Recommended Practice (RP) sponsored by OLF (The Norwegian Oil Industry Association). The JIP includes several major oil and gas operators. The objective of the RP is to serve as a technical and practical reference in the field of subsea leak detection. (Author)

  15. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  16. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  17. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  18. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  19. 29 CFR 1910.164 - Fire detection systems.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... detection systems. (a) Scope and application. This section applies to all automatic fire detection systems... detection systems and components to normal operating condition as promptly as possible after each test or...

  20. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  1. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  2. Log4J

    CERN Document Server

    Perry, Steven

    2009-01-01

    Log4j has been around for a while now, and it seems like so many applications use it. I've used it in my applications for years now, and I'll bet you have too. But every time I need to do something with log4j I've never done before I find myself searching for examples of how to do whatever that is, and I don't usually have much luck. I believe the reason for this is that there is a not a great deal of useful information about log4j, either in print or on the Internet. The information is too simple to be of real-world use, too complicated to be distilled quickly (which is what most developers

  3. A radioactive particle detection system for the Maralinga rehabilitation project

    International Nuclear Information System (INIS)

    Martin, L.J.; Baylis, S.H.

    1998-01-01

    Following the cessation of British nuclear testing at Maralinga, several sites were left contaminated with plutonium in various forms over areas of many square kilometres. The contamination included 239 Pu and 241 Am together with other isotopes of plutonium, and was in the form of fine dust, discrete particles and contaminated fragments of metals, plastics and ceramics. Following a government decision to rehabilitate the area to a standard suitable for re-occupation by the traditional owners, the Maralinga Tjarutja, an expert committee, MARTAC, was convened to advise the Department of Primary Industries and Energy about suitable methods and standards for the cleanup. Criteria set by MARTAC required the removal of all discrete particles of contamination exceeding 100 kBq of 241 Am and imposed limits on the numbers of particles exceeding 20 kBq. A detection system was required which could detect any radioactive particles exceeding criteria and, following rehabilitation, verify that none remained. The most useful indicator of contamination was the 60 keV gamma-ray from 241 Am. The system was fitted to a four wheel drive utility vehicle, and was based on four thin-crystal, sodium iodide detectors of 12.5 cm diameter held 30 cm above ground level. Electronic components from off-the-shelf hand-held ratemeters were used to provide the high voltage supply, amplifier and single channel analyser in a ruggedised form of proven reliability. The combined use of thin crystal detectors and single channel analyser allowed a significant reduction in background count rates while maintaining the efficiency for detection of the 60 keV gamma-ray. To allow efficient and reliable coverage, the vehicle was fitted with a high-resolution speedometer to allow the proper speed to be maintained, and a mapping display, based on the GPS system, which showed the previous path of the vehicle and boundary of the area to be scanned. Whenever a radioactive particle was detected, its coordinates were

  4. Analyzing Grid Log Data with Affinity Propagation

    NARCIS (Netherlands)

    Modena, G.; van Someren, M.W.; Ali, M; Bosse, T.; Hindriks, K.V.; Hoogendoorn, M.; Jonker, C.M; Treur, J.

    2013-01-01

    In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs

  5. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  6. The remote atmospheric and ionospheric detection system

    International Nuclear Information System (INIS)

    McCoy, R.P.; Wolfram, K.D.; Meier, R.R.

    1986-01-01

    The Remote Atmospheric and Ionospheric Detection System (RAIDS) experiment, to fly on a TIROS spacecraft in the late 1980's, consists of a comprehensive set of one limb imaging and seven limb scanning optical sensors. These eight instruments span the spectral range from the extreme ultraviolet to the near infrared, allowing simultaneous observations of the neutral and ion composition on the day and night side as well as in the auroral region. The primary objective of RAIDS is to demonstrate a system for remote sensing of the ionosphere to produce global maps of the electron density, peak altitude and critical frequency

  7. Perceived Task-Difficulty Recognition from Log-File Information for the Use in Adaptive Intelligent Tutoring Systems

    Science.gov (United States)

    Janning, Ruth; Schatten, Carlotta; Schmidt-Thieme, Lars

    2016-01-01

    Recognising students' emotion, affect or cognition is a relatively young field and still a challenging task in the area of intelligent tutoring systems. There are several ways to use the output of these recognition tasks within the system. The approach most often mentioned in the literature is using it for giving feedback to the students. The…

  8. Reducing the risk of cyber threats in utilities through log management

    Energy Technology Data Exchange (ETDEWEB)

    Patnaik, A. [ArcSight, Cupertino, CA (United States)

    2010-01-15

    Electrical blackouts caused by terrorists hacking into targeted control systems have already occurred in Brazil. A patchwork of security tools is needed to reduce potential threats. The continuous collection and analysis of data is also needed to detect cyber threats. The real time correlation of logs across all systems, applications and users is needed to ensure the reliability and security of the power grid. Solutions must also integrate well with identity management sources in order to prevent remote access account hijacking. Effective log management can be used to detect threats and reduce the risk of power outages. 1 fig.

  9. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  10. A CDC 1700 on-line system for the analysis, data logging and monitoring of big bubble chamber pictures

    International Nuclear Information System (INIS)

    Guyonnet, J.-L.

    1975-01-01

    This work presents the analysis system of large bubble chamber such as Gargamelle, BEBC pictures realized in the heavy liquid bubble chamber group with scanning and measurement stations on-line with a CDC 1700 computer. This work deals with the general characteristics of these stations and of the computer, and puts emphasis on the conception and functions of the analysis programmes: scanning, measurement and data processing. The data acquisition system runs in a context of real time multiprogrammation [fr

  11. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  12. Log of Apollo 11.

    Science.gov (United States)

    National Aeronautics and Space Administration, Washington, DC.

    The major events of the first manned moon landing mission, Apollo 11, are presented in chronological order from launch time until arrival of the astronauts aboard the U.S.S. Hornet. The log is descriptive, non-technical, and includes numerous color photographs of the astronauts on the moon. (PR)

  13. LATTE - Log and Time Tracking for Elections

    Data.gov (United States)

    Office of Personnel Management — LATTE - Log and Time Tracking for Elections is a time tracking and voucher preparation system used to schedule employees to cover elections, to document their time...

  14. High sensitivity neutron bursts detecting system

    International Nuclear Information System (INIS)

    Shyam, A.; Kaushik, T.C.; Srinivasan, M.; Kulkarni, L.V.

    1993-01-01

    Technique and instrumentation to detect multiplicity of fast neutrons, emitted in sharp bursts, has been developed. A bank of 16 BF 3 detectors, in an appropriate thermalising assembly, efficiency ∼ 16%, is used to detect neutron bursts. The output from this setup, through appropriate electronics, is divided into two paths. The first is directly connected to a computer controlled scalar. The second is connected to another similar scalar through a delay time unit (DTU). The DTU design is such that once it is triggered by a count pulse than it does not allow any counts to be recorded for a fixed dead time set at ∼ 100 μs. The difference in counts recorded directly and through DTU gives the total number of neutrons produced in bursts. This setup is being used to study lattice cracking, anomalous effects in solid deuterium systems and various reactor physics experiments. (author). 3 refs., 1 fig

  15. System and method for anomaly detection

    Science.gov (United States)

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  16. Collision Detection for Underwater ROV Manipulator Systems

    Directory of Open Access Journals (Sweden)

    Satja Sivčev

    2018-04-01

    Full Text Available Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  17. You Are Not Logged In: Context and Interpersonal Meaning of Instructions and Links in a typical Learning Management System

    Directory of Open Access Journals (Sweden)

    Hakeem Olafemi Ogunmuyiwa

    2016-11-01

    Full Text Available It is common knowledge that the incorporation of Learning Management Systems (LMS in ESL/EFL instruction has enhanced learners understanding of the language just as it has helped teachers in monitoring students’ progress. However, the use of these eLearning platforms can be quite challenging for EFL learners who are yet to be proficient in the English language. This is because all course information and instructions are offered in the language. Following the notion of context and language metafunctions by Halliday (1985 and his followers, analysis of some linguistic expressions in typical learning management systems is conducted. I show how context and interpersonal meanings are established, and how they can enhance learners’ comprehension of information and instructions. The linguistic expressions used as data are sourced from student-specific pages of the web-based Learning Management System (Blackboard and the Modular Object-Oriented Dynamic Learning Environment (Moodle as adapted in colleges and institutes in Saudi Arabia.

  18. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  19. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  20. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  1. Core-Log-Seismic investigations of the Surveyor Fan and Channel system during the Pleistocene; IODP Exp. 341

    Science.gov (United States)

    Somchat, K.; Reece, R.; Gulick, S. P. S.

    2017-12-01

    The Chugach-St. Elias mountain range is the product of the ongoing subduction and collision of the Yakutat microplate with the North America Plate. The presence of this high topography close to the shoreline creates a unique source-to-sink system in which glacial eroded sediment is transported directly to the sea and preserved offshore in a deep sea fan without intervening storage. Surveyor Fan and Channel system is the product of this system. In this study we will focus on the four tributary channels that form at the head of the Surveyor Channel complex and merge into the main channel trunk 200 km from the shelf edge. We integrated drill core and 2D seismic reflection data to study the evolution of these tributaries in order to decipher glacial history along the southern Alaskan margin since the mid-Pleistocene (1.2 Ma). An age model from Integrated Ocean Drilling Program Expedition 341 Site U1418 provides a higher resolution chronology of sediment delivery to the Surveyor Fan than previous studies. We regionally mapped the seismic subunits previously identified by Exp. 341 scientists starting from Site U1418 and analyzed regional patterns of sediment deposition. Channel migrations are observable between 1.2-0.5 Ma which could be the result of increasing glacial ice volume onshore due to onset of the MPT. Two-way travel time (isopach) maps of the three subunits show that sediment depocenter began to move eastward since 1.2 Ma with a trend of overall sediment flux increase in all tributary channels. Changes in sediment flux in each system represent the changes in volume of glacial ice over successive glacial intervals. Additionally, seismic analysis of channel geomorphology shows that each system contains distinct geomorphological evolutions that respond to the glacially eroded sediment flux at different times. Since glacial erosional processes is the driver of this source-to-sink system, a history of glacial ice onshore since the Pleistocene can be inferred from

  2. Radon detection system, design, test and performance

    International Nuclear Information System (INIS)

    Balcazar, M.; Chavez, A.; Pina-Villalpando, G.; Navarrete, M.

    1999-01-01

    A portable radon detection system (α-Inin) has been designed and constructed for using it in adverse environmental conditions where humidity, temperature and chemical vaporous are present. The minimum integration time is in periods of 15 min during 41 days. A 12 V battery and a photovoltaic module allow the α-Inin autonomy in field measurements. Data is collected by means of a laptop computer where data processing and α-Inin programming are carried out. α-Inin performance was simultaneously tested in a controlled radon chamber, together with a commercial α-Meter

  3. Well logging, atom and geology

    International Nuclear Information System (INIS)

    Serra, O.

    1994-01-01

    Well logging techniques exploit interactions of gamma photons and neutrons with atoms. Interactions of neutrons of different energies with atoms allow the detection and evaluation of the weight percentage of several elements composing the rocks (C, O, Si, Ca, Fe, S); spectrometry of gamma rays produced by thermal neutron absorption allows for the weight percentage determination of Si, Ca, Fe, S, Cl, H, Ti and Gd, etc. High resolution detectors (germanium doped by Li, at liquid nitrogen temperature) allow the recognition of more elements. Other techniques involving neutrons consist in determining the population in epithermal neutrons at a certain distance of the neutron source (measurement of the hydrogen index). By analyzing the intensity of the gamma flux produced by Compton scattering, the electronic and bulk densities of the rocks are measured. All these data lead to the detection and evaluation of ore deposits (uranium and potassium) and coal, and determination of the lithology, the main minerals composing the rocks, petrophysical properties... 1 fig

  4. Autonomous system for pathogen detection and identification

    International Nuclear Information System (INIS)

    Belgrader, P.; Benett, W.; Langlois, R.; Long, G.; Mariella, R.; Milanovich, F.; Miles, R.; Nelson, W.; Venkateswaran, K.

    1998-01-01

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify stimulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air

  5. Parallel O(log n) algorithms for open- and closed-chain rigid multibody systems based on a new mass matrix factorization technique

    Science.gov (United States)

    Fijany, Amir

    1993-01-01

    In this paper, parallel O(log n) algorithms for computation of rigid multibody dynamics are developed. These parallel algorithms are derived by parallelization of new O(n) algorithms for the problem. The underlying feature of these O(n) algorithms is a drastically different strategy for decomposition of interbody force which leads to a new factorization of the mass matrix (M). Specifically, it is shown that a factorization of the inverse of the mass matrix in the form of the Schur Complement is derived as M(exp -1) = C - B(exp *)A(exp -1)B, wherein matrices C, A, and B are block tridiagonal matrices. The new O(n) algorithm is then derived as a recursive implementation of this factorization of M(exp -1). For the closed-chain systems, similar factorizations and O(n) algorithms for computation of Operational Space Mass Matrix lambda and its inverse lambda(exp -1) are also derived. It is shown that these O(n) algorithms are strictly parallel, that is, they are less efficient than other algorithms for serial computation of the problem. But, to our knowledge, they are the only known algorithms that can be parallelized and that lead to both time- and processor-optimal parallel algorithms for the problem, i.e., parallel O(log n) algorithms with O(n) processors. The developed parallel algorithms, in addition to their theoretical significance, are also practical from an implementation point of view due to their simple architectural requirements.

  6. A polarization system for persistent chemical detection

    Science.gov (United States)

    Craven-Jones, Julia; Appelhans, Leah; Couphos, Eric; Embree, Todd; Finnegan, Patrick; Goldstein, Dennis; Karelitz, David; LaCasse, Charles; Luk, Ting S.; Mahamat, Adoum; Massey, Lee; Tanbakuchi, Anthony; Washburn, Cody; Vigil, Steven

    2015-09-01

    We report on the development of a prototype polarization tag based system for detecting chemical vapors. The system primarily consists of two components, a chemically sensitive tag that experiences a change in its optical polarization properties when exposed to a specific chemical of interest, and an optical imaging polarimeter that is used to measure the polarization properties of the tags. Although the system concept could be extended to other chemicals, for the initial system prototype presented here the tags were developed to be sensitive to hydrogen fluoride (HF) vapors. HF is used in many industrial processes but is highly toxic and thus monitoring for its presence and concentration is often of interest for personnel and environmental safety. The tags are periodic multilayer structures that are produced using standard photolithographic processes. The polarimetric imager has been designed to measure the degree of linear polarization reflected from the tags in the short wave infrared. By monitoring the change in the reflected polarization signature from the tags, the polarimeter can be used to determine if the tag was exposed to HF gas. In this paper, a review of the system development effort and preliminary test results are presented and discussed, as well as our plan for future work.

  7. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  8. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the 13 N content in the containment atmosphere. 13 N is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/ 13 N+ 4 He. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium 13 N concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  9. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1980-01-01

    This study deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process Hl+016/yields/Nl3+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m/sup -3/ and 7 kBq m/sup -3/ for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge(Li) flow detector assembly operated at elevated pressure. 8 refs

  10. Reactor coolant pressure boundary leakage detection system

    International Nuclear Information System (INIS)

    Dissing, E.; Svansson, L.

    1979-08-01

    The present paper deals with a system for monitoring the leakage of reactor coolant. This system is based primarily on the detection of the N13 content in the containment atmosphere. N13 is produced from the oxygen of the reactor water via the recoil proton nuclear process H1+016 → N13+He4. The generation is therefore independent of fuel element leakage and of the corrosion product content in the water. It is solely related to the neutron flux level in the reactor core. Typical figures for the equilibrium N13 concentration in the containment atmosphere following a 4 kg/minute coolant leakage are 5 kBq m -3 and 7 kBq m -3 for BWR and PWR respectively. These levels are readily measured with a 10 liter Ge (Li) flow detector assembly operated at elevated pressure. (Auth.)

  11. Simulation Model of Mobile Detection Systems

    International Nuclear Information System (INIS)

    Edmunds, T.; Faissol, D.; Yao, Y.

    2009-01-01

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  12. Simulation Model of Mobile Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Edmunds, T; Faissol, D; Yao, Y

    2009-01-27

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  13. Neutron--neutron logging

    International Nuclear Information System (INIS)

    Allen, L.S.

    1977-01-01

    A borehole logging tool includes a steady-state source of fast neutrons, two epithermal neutron detectors, and two thermal neutron detectors. A count rate meter is connected to each neutron detector. A first ratio detector provides an indication of the porosity of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two epithermal neutron detectors. A second ratio detector provides an indication of both porosity and macroscopic absorption cross section of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two thermal neutron detectors. By comparing the signals of the two ratio detectors, oil bearing zones and salt water bearing zones within the formation being logged can be distinguished and the amount of oil saturation can be determined. 6 claims, 2 figures

  14. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a... space. (b) The fire detection system must be designed to minimize false alarms. ...

  15. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  16. Geophysical borehole logging

    International Nuclear Information System (INIS)

    McCann, D.; Barton, K.J.; Hearn, K.

    1981-08-01

    Most of the available literature on geophysical borehole logging refers to studies carried out in sedimentary rocks. It is only in recent years that any great interest has been shown in geophysical logging in boreholes in metamorphic and igneous rocks following the development of research programmes associated with geothermal energy and nuclear waste disposal. This report is concerned with the programme of geophysical logging carried out on the three deep boreholes at Altnabreac, Caithness, to examine the effectiveness of these methods in crystalline rock. Of particular importance is the assessment of the performance of the various geophysical sondes run in the boreholes in relation to the rock mass properties. The geophysical data can be used to provide additional in-situ information on the geological, hydrogeological and engineering properties of the rock mass. Fracturing and weathering in the rock mass have a considerable effect on both the design parameters for an engineering structure and the flow of water through the rock mass; hence, the relation between the geophysical properties and the degree of fracturing and weathering is examined in some detail. (author)

  17. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  18. Hydrologic monitoring using open-source Arduino logging platforms in a socio-hydrological system of the drought-prone tropics, Guanacaste, Costa Rica

    Science.gov (United States)

    Hund, S. V.; Johnson, M. S.; Steyn, D. G.; Keddie, T.; Morillas, L.

    2015-12-01

    Water supply is highly disputed in the tropics of northwestern Costa Rica where rainfall exhibits high seasonal variability and long annual dry seasons. Water shortages are common during the dry season, and water conflicts emerge between domestic water users, intensively irrigated agriculture, the tourism industry, and ecological flows. Climate change may further increase the variability of precipitation and the risk for droughts, and pose challenges for small rural agricultural communities experiencing water stress. To adapt to seasonal droughts and improve resilience of communities to future changes, it is essential to increase understanding of interactions between components of the coupled hydrological-social system. Yet, hydrological monitoring and data on water use within developing countries of the humid tropics is limited. To address these challenges and contribute to extended monitoring networks, low-cost and open-source monitoring platforms were developed based off Arduino microelectronic boards and software and combined with hydrological sensors to monitor river stage and groundwater levels in two watersheds of Guanacaste, Costa Rica. Hydrologic monitoring stations are located in remote locations and powered by solar panels. Monitoring efforts were made possible through collaboration with local rural communities, and complemented with a mix of digitized water extraction data and community water use narratives to increase understanding of water use and challenges. We will present the development of the Arduino logging system, results of water supply in relation to water use for both the wet and dry season, and discuss these results within a socio-hydrological system context.

  19. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  20. Financial and Economic Analysis of Reduced Impact Logging

    Science.gov (United States)

    Tom Holmes

    2016-01-01

    Concern regarding extensive damage to tropical forests resulting from logging increased dramatically after World War II when mechanized logging systems developed in industrialized countries were deployed in the tropics. As a consequence, tropical foresters began developing logging procedures that were more environmentally benign, and by the 1990s, these practices began...

  1. Utilization and cost of log production from animal loging operations

    Science.gov (United States)

    Suraj P. Shrestha; Bobby L. Lanford; Robert B. Rummer; Mark Dubois

    2006-01-01

    Forest harvesting with animals is a labor-intensive operation. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically logged. So, small logging systems using animals may be more cost effective. In this study, work sampling was used for five animal logging operations in Alabama to measure productive and non-productive time...

  2. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  3. Model-based fault detection algorithm for photovoltaic system monitoring

    KAUST Repository

    Harrou, Fouzi; Sun, Ying; Saidi, Ahmed

    2018-01-01

    Reliable detection of faults in PV systems plays an important role in improving their reliability, productivity, and safety. This paper addresses the detection of faults in the direct current (DC) side of photovoltaic (PV) systems using a

  4. Wireless Falling Detection System Based on Community.

    Science.gov (United States)

    Xia, Yun; Wu, Yanqi; Zhang, Bobo; Li, Zhiyang; He, Nongyue; Li, Song

    2015-06-01

    The elderly are more likely to suffer the aches or pains from the accidental falls, and both the physiology and psychology of patients would subject to a long-term disturbance, especially when the emergency treatment was not given timely and properly. Although many methods and devices have been developed creatively and shown their efficiency in experiments, few of them are suitable for commercial applications routinely. Here, we design a wearable falling detector as a mobile terminal, and utilize the wireless technology to transfer and monitor the activity data of the host in a relatively small community. With the help of the accelerometer sensor and the Google Mapping service, information of the location and the activity data will be send to the remote server for the downstream processing. The experimental result has shown that SA (Sum-vector of all axes) value of 2.5 g is the threshold value to distinguish the falling from other activities. A three-stage detection algorithm was adopted to increase the accuracy of the real alarm, and the accuracy rate of our system was more than 95%. With the further improvement, the falling detecting device which is low-cost, accurate and user-friendly would become more and more common in everyday life.

  5. Optical fiber-applied radiation detection system

    International Nuclear Information System (INIS)

    Nishiura, Ryuichi; Uranaka, Yasuo; Izumi, Nobuyuki

    2001-01-01

    A technique to measure radiation by using plastic scintillation fibers doped radiation fluorescent (scintillator) to plastic optical fiber for a radiation sensor, was developed. The technique contains some superiority such as high flexibility due to using fibers, relatively easy large area due to detecting portion of whole of fibers, and no electromagnetic noise effect due to optical radiation detection and signal transmission. Measurable to wide range of and continuous radiation distribution along optical fiber cable at a testing portion using scintillation fiber and flight time method, the optical fiber-applied radiation sensing system can effectively monitor space radiation dose or apparatus operation condition monitoring. And, a portable type scintillation optical fiber body surface pollution monitor can measure pollution concentration of radioactive materials attached onto body surface by arranging scintillation fiber processed to a plate with small size and flexibility around a man to be tested. Here were described on outline and fundamental properties of various application products using these plastic scintillation fiber. (G.K.)

  6. Well logging radioactive detector assembly

    International Nuclear Information System (INIS)

    Osburn, T.D.

    1992-01-01

    This patent describes a well logging instrument of the type having a radioactive logging sub having a sealed chamber and have a radioactive source for emitting radioactive energy into the well formation, the instrument having a radioactive energy detector for detecting gamma rays resulting from the emission of the radioactive energy into the well formation, and means for pressing the sub against the well of the well, an improved Dewar flask for the detector. It comprises: an inner housing formed of titanium and containing the detector; an outer housing formed of titanium, having a cylindrical side wall surrounding the inner housing and separated by a clearance which is evacuated, the outer housing being located within the sealed chamber in the sub of the instrument; a window section formed in the side wall of the outer housing adjacent the detector and on a side of the side wall closest to the wall of the well when the sub is pressed against the wall of the well; and wherein the inner housing has a cylindrical side wall that is of lesser wall thickness than the wall thickness of the side wall of the outer housing other than in the window section

  7. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  8. Decision algorithms in fire detection systems

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2011-01-01

    Full Text Available Analogue (and addressable fire detection systems enables a new quality in improving sensitivity to real fires and reducing susceptibility to nuisance alarm sources. Different decision algorithms types were developed with intention to improve sensitivity and reduce false alarm occurrence. At the beginning, it was free alarm level adjustment based on preset level. Majority of multi-criteria decision work was based on multi-sensor (multi-signature decision algorithms - using different type of sensors on the same location or, rather, using different aspects (level and rise of one sensor measured value. Our idea is to improve sensitivity and reduce false alarm occurrence by forming groups of sensors that work in similar conditions (same world side in the building, same or similar technology or working time. Original multi-criteria decision algorithms based on level, rise and difference of level and rise from group average are discussed in this paper.

  9. Distributed gas detection system and method

    Science.gov (United States)

    Challener, William Albert; Palit, Sabarni; Karp, Jason Harris; Kasten, Ansas Matthias; Choudhury, Niloy

    2017-11-21

    A distributed gas detection system includes one or more hollow core fibers disposed in different locations, one or more solid core fibers optically coupled with the one or more hollow core fibers and configured to receive light of one or more wavelengths from a light source, and an interrogator device configured to receive at least some of the light propagating through the one or more solid core fibers and the one or more hollow core fibers. The interrogator device is configured to identify a location of a presence of a gas-of-interest by examining absorption of at least one of the wavelengths of the light at least one of the hollow core fibers.

  10. Detection system of sodium oxide vapors

    International Nuclear Information System (INIS)

    Hundal, Rolv.

    1976-01-01

    The description is given of a sodium oxide vapor detection system which comprises a containment, a light source located to send a light beam into and through this containment and a photodetector located to intercept the light from the source after it has covered a given path through the containment. In response to the intensity of the incident light, the photodetector produces an output signal representative of it. The feature of this device is a first polarizer located near the light source, along the path of the light coming from it and designed to polarize the light projected through the containment in a given plane, and a second polarizer located near the photodetector, along the path of the polarized light and designed virtually to prevent all the light rays whose orientation differs from the given polarization plane from reaching the photodetector [fr

  11. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  12. 49 CFR 1544.213 - Use of explosives detection systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a... explosives detection system approved by TSA to screen checked baggage on international flights. (b) Signs and...

  13. 46 CFR 154.1350 - Flammable gas detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a fixed flammable gas detection system that has sampling points in: (1) Each cargo pump room; (2) Each cargo...

  14. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  15. Development of a low cost unmanned aircraft system for atmospheric carbon dioxide leak detection

    Science.gov (United States)

    Mitchell, Taylor Austin

    Carbon sequestration, the storage of carbon dioxide gas underground, has the potential to reduce global warming by removing a greenhouse gas from the atmosphere. These storage sites, however, must first be monitored to detect if carbon dioxide is leaking back out to the atmosphere. As an alternative to traditional large ground-based sensor networks to monitor CO2 levels for leaks, unmanned aircraft offer the potential to perform in-situ atmospheric leak detection over large areas for a fraction of the cost. This project developed a proof-of-concept sensor system to map relative carbon dioxide levels to detect potential leaks. The sensor system included a Sensair K-30 FR CO2 sensor, GPS, and altimeter connected an Arduino microcontroller which logged data to an onboard SD card. Ground tests were performed to verify and calibrate the system including wind tunnel tests to determine the optimal configuration of the system for the quickest response time (4-8 seconds based upon flowrate). Tests were then conducted over a controlled release of CO 2 in addition to over controlled rangeland fires which released carbon dioxide over a large area as would be expected from a carbon sequestration source. 3D maps of carbon dioxide were developed from the system telemetry that clearly illustrated increased CO2 levels from the fires. These tests demonstrated the system's ability to detect increased carbon dioxide concentrations in the atmosphere.

  16. Pulse neutron logging technique

    International Nuclear Information System (INIS)

    Bespalov, D.F.; Dylyuk, A.A.

    1975-01-01

    A new method of neutron-burst logging is proposed, residing in irradiating rocks with fast neutron bursts and registering the integrated flux burst of thermal and/or epithermal neutrons, from the moment of its initiation to that of full absorption. The obtaained value is representative of the rock properties (porosity, hydrogen content). The integrated flux in a burst of thermal and epithermal neutrons can be measured both by way of activation of a reference sample of a known chemical composition during the neutron burst and by recording the radiation of induced activity of the sample within an interval between two bursts. The proposed method features high informative value, accuracy and efficiency

  17. Method and apparatus for logging inclined earth boreholes

    International Nuclear Information System (INIS)

    Youmans, A.H.

    1981-01-01

    An improved technique is provided for comparing the velocity of an elongated well logging instrument traversing an inclined earth borehole with the playout velocity of the well logging cable at the earth's surface to control both the cable hoist drum rotation and the rate of movement of the subsurface instrument and thus insure cable playout is in equilibrium with the logging instrument movement. Method and apparatus are described for detecting any reduction in movement of the logging instrument through the borehole and for reducing the velocity of the logging cable playout in response thereto by reducing drum rotation. Further, when the velocity of cable playout slows to a preselected value, a monitoring circuit generates control signals which actuate a means of power attached to or integral with the logging instrument which, upon initiation, apply a force to move the logging instrument upward or downward within the borehole

  18. Design of detection module for smart ligthting system

    OpenAIRE

    Matveev, I. G.; Goponenko, A. S.

    2015-01-01

    The paper considers a smart lighting system based on Beaglebone microcomputer. The analysis of existing motion and presence sensors was carried out and then used as a basis for design of a detection system. The detection system and the corresponding connection solution for a smart lighting system were developed. Using the designed smart lighting system, experimental studies were carried out.

  19. Novel Desorber for Online Drilling Mud Gas Logging.

    Science.gov (United States)

    Lackowski, Marcin; Tobiszewski, Marek; Namieśnik, Jacek

    2016-01-01

    This work presents the construction solution and experimental results of a novel desorber for online drilling mud gas logging. The traditional desorbers use mechanical mixing of the liquid to stimulate transfer of hydrocarbons to the gaseous phase that is further analyzed. The presented approach is based on transfer of hydrocarbons from the liquid to the gas bubbles flowing through it and further gas analysis. The desorber was checked for gas logging from four different drilling muds collected from Polish boreholes. The results of optimization studies are also presented in this study. The comparison of the novel desorber with a commercial one reveals strong advantages of the novel one. It is characterized by much better hydrocarbons recovery efficiency and allows reaching lower limits of detection of the whole analytical system. The presented desorber seems to be very attractive alternative over widely used mechanical desorbers.

  20. Novel Desorber for Online Drilling Mud Gas Logging

    Directory of Open Access Journals (Sweden)

    Marcin Lackowski

    2016-01-01

    Full Text Available This work presents the construction solution and experimental results of a novel desorber for online drilling mud gas logging. The traditional desorbers use mechanical mixing of the liquid to stimulate transfer of hydrocarbons to the gaseous phase that is further analyzed. The presented approach is based on transfer of hydrocarbons from the liquid to the gas bubbles flowing through it and further gas analysis. The desorber was checked for gas logging from four different drilling muds collected from Polish boreholes. The results of optimization studies are also presented in this study. The comparison of the novel desorber with a commercial one reveals strong advantages of the novel one. It is characterized by much better hydrocarbons recovery efficiency and allows reaching lower limits of detection of the whole analytical system. The presented desorber seems to be very attractive alternative over widely used mechanical desorbers.

  1. SU-E-T-644: QuAArC: A 3D VMAT QA System Based On Radiochromic Film and Monte Carlo Simulation of Log Files

    Energy Technology Data Exchange (ETDEWEB)

    Barbeiro, A.R.; Ureba, A.; Baeza, J.A.; Jimenez-Ortega, E.; Plaza, A. Leal [Universidad de Sevilla, Departamento de Fisiologia Medica y Biofisica, Seville (Spain); Linares, R. [Hospital Infanta Luisa, Servicio de Radiofisica, Seville (Spain); Mateos, J.C.; Velazquez, S. [Hospital Universitario Virgen del Rocio, Servicio de Radiofisica, Seville (Spain)

    2015-06-15

    Purpose: VMAT involves two main sources of uncertainty: one related to the dose calculation accuracy, and the other linked to the continuous delivery of a discrete calculation. The purpose of this work is to present QuAArC, an alternative VMAT QA system to control and potentially reduce these uncertainties. Methods: An automated MC simulation of log files, recorded during VMAT treatment plans delivery, was implemented in order to simulate the actual treatment parameters. The linac head models and the phase-space data of each Control Point (CP) were simulated using the EGSnrc/BEAMnrc MC code, and the corresponding dose calculation was carried out by means of BEAMDOSE, a DOSXYZnrc code modification. A cylindrical phantom was specifically designed to host films rolled up at different radial distances from the isocenter, for a 3D and continuous dosimetric verification. It also allows axial and/or coronal films and point measurements with several types of ion chambers at different locations. Specific software was developed in MATLAB in order to process and evaluate the dosimetric measurements, which incorporates the analysis of dose distributions, profiles, dose difference maps, and 2D/3D gamma index. It is also possible to obtain the experimental DVH reconstructed on the patient CT, by an optimization method to find the individual contribution corresponding to each CP on the film, taking into account the total measured dose, and the corresponding CP dose calculated by MC. Results: The QuAArC system showed high reproducibility of measurements, and consistency with the results obtained with the commercial system implemented in the verification of the evaluated treatment plans. Conclusion: A VMAT QA system based on MC simulation and high resolution dosimetry with film has been developed for treatment verification. It shows to be useful for the study of the real VMAT capabilities, and also for linac commissioning and evaluation of other verification devices.

  2. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  3. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  4. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  5. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Information Impact: Journal of Information and Knowledge Management. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 1 (2011) >. Log in or Register to get access to full text downloads.

  6. Planet Detectability in the Alpha Centauri System

    Science.gov (United States)

    Zhao, Lily; Fischer, Debra A.; Brewer, John; Giguere, Matt; Rojas-Ayala, Bárbara

    2018-01-01

    We use more than a decade of radial-velocity measurements for α {Cen} A, B, and Proxima Centauri from the High Accuracy Radial Velocity Planet Searcher, CTIO High Resolution Spectrograph, and the Ultraviolet and Visual Echelle Spectrograph to identify the M\\sin i and orbital periods of planets that could have been detected if they existed. At each point in a mass–period grid, we sample a simulated, Keplerian signal with the precision and cadence of existing data and assess the probability that the signal could have been produced by noise alone. Existing data places detection thresholds in the classically defined habitable zones at about M\\sin i of 53 {M}\\oplus for α {Cen} A, 8.4 {M}\\oplus for α {Cen} B, and 0.47 {M}\\oplus for Proxima Centauri. Additionally, we examine the impact of systematic errors, or “red noise” in the data. A comparison of white- and red-noise simulations highlights quasi-periodic variability in the radial velocities that may be caused by systematic errors, photospheric velocity signals, or planetary signals. For example, the red-noise simulations show a peak above white-noise simulations at the period of Proxima Centauri b. We also carry out a spectroscopic analysis of the chemical composition of the α {Centauri} stars. The stars have super-solar metallicity with ratios of C/O and Mg/Si that are similar to the Sun, suggesting that any small planets in the α {Cen} system may be compositionally similar to our terrestrial planets. Although the small projected separation of α {Cen} A and B currently hampers extreme-precision radial-velocity measurements, the angular separation is now increasing. By 2019, α {Cen} A and B will be ideal targets for renewed Doppler planet surveys.

  7. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  8. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  9. Glass scintillator pair for compensation neutron logging

    International Nuclear Information System (INIS)

    Ji Changsong; Li Xuezhi; Yiu Guangduo

    1985-01-01

    Glass scintillator pair types ST 1604 and ST 1605 for compensation of neutron logging is developed. The neutron sensitive material used is multistick lithium glass scintillators 3 and 4 mm in diameter respectively. Thermoneutron detection efficiencies are 50-60% and 100% respectively. The detection efficiency for 60 Co γ ray is lower than 0.3%. The type ST 1604 and ST 1605 may also be used as high sensitive neutron detectors in an intensive γ ray field

  10. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  11. Generalized localization for the double trigonometric Fourier series and the Walsh-Fourier series of functions in L log +L log + log +L

    International Nuclear Information System (INIS)

    Bloshanskaya, S K; Bloshanskii, I L; Roslova, T Y

    1998-01-01

    For an arbitrary open set Ω subset of I 2 =[0,1) 2 and an arbitrary function f element of L log + L log + log + L(I 2 ) such that f=0 on Ω the double Fourier series of f with respect to the trigonometric system Ψ=E and the Walsh-Paley system Ψ=W is shown to converge to zero (over rectangles) almost everywhere on Ω. Thus, it is proved that generalized localization almost everywhere holds on arbitrary open subsets of the square I 2 for the double trigonometric Fourier series and the Walsh-Fourier series of functions in the class L log + L log + log + L (in the case of summation over rectangles). It is also established that such localization breaks down on arbitrary sets that are not dense in I 2 , in the classes Φ Ψ (L)(I 2 ) for the orthonormal system Ψ=E and an arbitrary function such that Φ E (u)=o(u log + log + u) as u→∞ or for Φ W (u)=u( log + log + u) 1-ε , 0<ε<1

  12. High-Resolution Physical Properties Logging of the AND-1B Sediment Core - Opportunity for Detecting High-Frequency Signals of Paleoenvironmental Changes

    Science.gov (United States)

    Niessen, F.; Magens, D.; Kuhn, G.; Helling, D.

    2008-12-01

    Within the ANDRILL-MIS Project, a more than 1200 m long sediment core, dating back to about 13 Ma, was drilled beneath McMurdo Ice Shelf near Ross Island (Antarctica) in austral summer 2006/07 with the purpose of contributing to a better understanding of the Late Cenozoic history of the Antarctic Ice Sheet. One way to approach past ice dynamics and changes in the paleoenvironment quantitatively, is the analysis of high- resolution physical properties obtained from whole-core multi-sensor core logger measurements in which lithologic changes are expressed numerically. This is especially applicable for the repeating sequences of diatomites and diamictites in the upper half of the core with a prominent cyclicity between 140-300 mbsf. Rather abrupt high-amplitude variations in wet-bulk density (WBD) and magnetic susceptibility (MS) reflect a highly dynamic depositional system, oscillating between two main end-member types: a grounded ice sheet and open marine conditions. For the whole core, the WBD signal, ranging from 1.4 kg/cu.m in the diatomites to 2.3 kg/cu.m in diamictites from the lower part of the core, represents the influence of three variables: (i) the degree of compaction seen as reduction of porosities with depth of about 30 % from top to bottom, (ii) the clast content with clasts being almost absent in diatomite deposits and (iii) the individual grain density (GD). GD itself strongly reflects the variety of lithologies as well as the influence of cement (mainly pyrite and carbonate) on the matrix grain density. The calculation of residual porosities demonstrates the strong imprint of glacial loading for especially diamictites from the upper 150 m, pointing to a significant thickness of the overriding Pleistocene ice sheet. MS on the other hand mainly documents a marine vs. terrestrial source of sediments where the latter can be divided into younger local material from the McMurdo Volcanic Province and basement clasts from the Transantarctic Mountains

  13. Distributed Fault Detection for a Class of Nonlinear Stochastic Systems

    Directory of Open Access Journals (Sweden)

    Bingyong Yan

    2014-01-01

    Full Text Available A novel distributed fault detection strategy for a class of nonlinear stochastic systems is presented. Different from the existing design procedures for fault detection, a novel fault detection observer, which consists of a nonlinear fault detection filter and a consensus filter, is proposed to detect the nonlinear stochastic systems faults. Firstly, the outputs of the nonlinear stochastic systems act as inputs of a consensus filter. Secondly, a nonlinear fault detection filter is constructed to provide estimation of unmeasurable system states and residual signals using outputs of the consensus filter. Stability analysis of the consensus filter is rigorously investigated. Meanwhile, the design procedures of the nonlinear fault detection filter are given in terms of linear matrix inequalities (LMIs. Taking the influence of the system stochastic noises into consideration, an outstanding feature of the proposed scheme is that false alarms can be reduced dramatically. Finally, simulation results are provided to show the feasibility and effectiveness of the proposed fault detection approach.

  14. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso; Alshareef, Husam N.

    2015-01-01

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  15. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  16. Analyzing Log Files using Data-Mining

    Directory of Open Access Journals (Sweden)

    Marius Mihut

    2008-01-01

    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  17. ACPR upgrade fuel motion detection system

    International Nuclear Information System (INIS)

    Kelly, J.G.; Stalker, K.T.

    1976-01-01

    Coded aperture imaging techniques are being applied to the problem of fuel motion detection in core disruptive safety experiments in the LMFBR. The upgraded Sandia Annular Core Pulse Reactor will be used for fuel motion studies, and a system is now being developed to image fuel motion through a slot in the core in l- and 7-pin experiments. The γ-rays emitted by the fuel will be modulated by a coded aperture and will form a pseudohologram on a scintillator. This shadowgram will be lens coupled first to an optical image intensifier, and then to a rotating prism framing camera. The goal is to obtain quality images of fuel with approximately 1 mm spatial resolution at about 10 4 frames/sec. Some of the feasibility milestones which have been reached thus far are the following: (1) A fuel pin shaped 252 Cf fission gamma ray source has been imaged through 1.27 cm of steel (simulating reactor containment). (2) A 252 Cf source has been imaged through 1.27 cm of steel with x-ray image intensifier amplification. (3) Collimation and shielding tests indicate that at ACPR it should be possible to obtain adequate signal to noise at the detector when the fuel is observed through a slot in the core

  18. Detection systems for radioactive ion beams

    International Nuclear Information System (INIS)

    Savajols, H.

    2002-01-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  19. Querying Workflow Logs

    Directory of Open Access Journals (Sweden)

    Yan Tang

    2018-01-01

    Full Text Available A business process or workflow is an assembly of tasks that accomplishes a business goal. Business process management is the study of the design, configuration/implementation, enactment and monitoring, analysis, and re-design of workflows. The traditional methodology for the re-design and improvement of workflows relies on the well-known sequence of extract, transform, and load (ETL, data/process warehousing, and online analytical processing (OLAP tools. In this paper, we study the ad hoc queryiny of process enactments for (data-centric business processes, bypassing the traditional methodology for more flexibility in querying. We develop an algebraic query language based on “incident patterns” with four operators inspired from Business Process Model and Notation (BPMN representation, allowing the user to formulate ad hoc queries directly over workflow logs. A formal semantics of this query language, a preliminary query evaluation algorithm, and a group of elementary properties of the operators are provided.

  20. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  1. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  2. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  3. Native Fluorescence Detection Methods, Devices, and Systems for Organic Compounds

    Science.gov (United States)

    Hug, William F. (Inventor); Bhartia, Rohit (Inventor); Reid, Ray D. (Inventor); Lane, Arthur L. (Inventor)

    2018-01-01

    Naphthalene, benzene, toluene, xylene, and other volatile organic compounds VOCs have been identified as serious health hazards. Embodiments of the invention are directed to methods and apparatus for near-real-time in-situ detection and accumulated dose measurement of exposure to naphthalene vapor and other hazardous gaseous VOCs. The methods and apparatus employ excitation of fluorophors native or endogenous to compounds of interest using light sources emitting in the ultraviolet below 300 nm and measurement of native fluorescence emissions in distinct wavebands above the excitation wavelength. The apparatus of some embodiments are cell-phone-sized sensor/dosimeter "badges" to be worn by personnel potentially exposed to hazardous VOCs. The badge sensor of some embodiments provides both real time detection and data logging of exposure to naphthalene or other VOCs of interest from which both instantaneous and accumulated dose can be determined.

  4. Theoretical and Numerical Study of Seismoelectric Logs for Logging While Drilling (LWD

    Directory of Open Access Journals (Sweden)

    Sun Xiang-Yang

    2017-01-01

    Full Text Available When the acoustic field propagates in the porous medium, the electromagnetic wave can be induced by the seismoelectric effects which can be used in the logging. This paper studies the seismoelectric wave field and deduces the formulations of the acoustic and electromagnetic field of the liquid in the well, and gives the acoustic and electromagnetic boundary conditions between the driller collar and the log liquid, when the driller collar is added. We also do the numerical simulation of the seismoelectric wave field excited by monopole source, study the velocity dispersion characteristics of the acoustic and electromagnetic field, and investigate the detective depth of the seismoelectric logs. Through the simulation we know the seismoelectric logs can avoid the interference of drill collar wave. This paper also provides theoretical guidance for the design of receiving antenna.

  5. Well logging with natural gamma radiation

    International Nuclear Information System (INIS)

    Ellis, D.V.

    1983-01-01

    An invention is described for use in natural gamma radiation well logging in which measurements taken in a borehole are used in the search for valuable underground resources such as oil or gas. The invention comprises deriving a log of natural gamma radiation detected in selected energy windows for a selected borehole depth interval and converting it into a log of the selected subsurface materials, e.g. Th, U, K. This log is corrected for the effects of 1) either a gamma ray emitter in the borehole fluid, e.g. potassium salts and/or 2) a gamma ray attenuator in the borehole fluid, e.g. a strong attenuator such as barite and/or hematite. The Th, U, K log is particularly useful in the exploration of oil and gas resources since the Th, U, K concentrations are a good indication as to the presence, type and volume of shale and clay in the formations surrounding the borehole. (U.K.)

  6. Interpretation of horizontal well production logs: influence of logging tool

    Energy Technology Data Exchange (ETDEWEB)

    Ozkan, E. [Colorado School of Mines, Boulder, CO (United States); Sarica, C. [Pennsylvania State Univ., College Park, PA (United States); Haci, M. [Drilling Measurements, Inc (United States)

    1998-12-31

    The influence of a production-logging tool on wellbore flow rate and pressure measurements was investigated, focusing on the disturbence caused by the production-logging tool and the coiled tubing on the original flow conditions in the wellbore. The investigation was carried out using an analytical model and single-phase liquid flow was assumed. Results showed that the production-logging tool influenced the measurements as shown by the deviation of the original flow-rate, pressure profiles and low-conductivity wellbores. High production rates increase the effect of the production-logging tool. Recovering or inferring the original flow conditions in the wellbore from the production-logging data is a very complex process which cannot be solved easily. For this reason, the conditions under which the information obtained by production-logging is meaningful is of considerable practical interest. 7 refs., 2 tabs., 15 figs.

  7. Secure Audit Logging with Tamper-Resistant Hardware

    NARCIS (Netherlands)

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  8. Sharing Annotated Audio Recordings of Clinic Visits With Patients-Development of the Open Recording Automated Logging System (ORALS): Study Protocol.

    Science.gov (United States)

    Barr, Paul J; Dannenberg, Michelle D; Ganoe, Craig H; Haslett, William; Faill, Rebecca; Hassanpour, Saeed; Das, Amar; Arend, Roger; Masel, Meredith C; Piper, Sheryl; Reicher, Haley; Ryan, James; Elwyn, Glyn

    2017-07-06

    Providing patients with recordings of their clinic visits enhances patient and family engagement, yet few organizations routinely offer recordings. Challenges exist for organizations and patients, including data safety and navigating lengthy recordings. A secure system that allows patients to easily navigate recordings may be a solution. The aim of this project is to develop and test an interoperable system to facilitate routine recording, the Open Recording Automated Logging System (ORALS), with the aim of increasing patient and family engagement. ORALS will consist of (1) technically proficient software using automated machine learning technology to enable accurate and automatic tagging of in-clinic audio recordings (tagging involves identifying elements of the clinic visit most important to patients [eg, treatment plan] on the recording) and (2) a secure, easy-to-use Web interface enabling the upload and accurate linkage of recordings to patients, which can be accessed at home. We will use a mixed methods approach to develop and formatively test ORALS in 4 iterative stages: case study of pioneer clinics where recordings are currently offered to patients, ORALS design and user experience testing, ORALS software and user interface development, and rapid cycle testing of ORALS in a primary care clinic, assessing impact on patient and family engagement. Dartmouth's Informatics Collaboratory for Design, Development and Dissemination team, patients, patient partners, caregivers, and clinicians will assist in developing ORALS. We will implement a publication plan that includes a final project report and articles for peer-reviewed journals. In addition to this work, we will regularly report on our progress using popular relevant Tweet chats and online using our website, www.openrecordings.org. We will disseminate our work at relevant conferences (eg, Academy Health, Health Datapalooza, and the Institute for Healthcare Improvement Quality Forums). Finally, Iora Health, a

  9. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-01-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched

  10. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  11. Laser Obstacle Detection System Flight Testing

    National Research Council Canada - National Science Library

    Davis, Timothy

    2003-01-01

    ...). The Aviation Applied Technology Directorate (AATD) was contracted to mount the HELLAS sensor on the nose of a UH-60L Blackhawk helicopter and to conduct flight tests to evaluate the HELLAS obstacle detection sensor...

  12. Optimizing Systems of Threshold Detection Sensors

    National Research Council Canada - National Science Library

    Banschbach, David C

    2008-01-01

    .... Below the threshold all signals are ignored. We develop a mathematical model for setting individual sensor thresholds to obtain optimal probability of detecting a significant event, given a limit on the total number of false positives allowed...

  13. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan; Gooneratne, Chinthaka Pasan; Kosel, Jü rgen

    2012-01-01

    magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer

  14. Underwater electric field detection system based on weakly electric fish

    Science.gov (United States)

    Xue, Wei; Wang, Tianyu; Wang, Qi

    2018-04-01

    Weakly electric fish sense their surroundings in complete darkness by their active electric field detection system. However, due to the insufficient detection capacity of the electric field, the detection distance is not enough, and the detection accuracy is not high. In this paper, a method of underwater detection based on rotating current field theory is proposed to improve the performance of underwater electric field detection system. First of all, we built underwater detection system based on the theory of the spin current field mathematical model with the help of the results of previous researchers. Then we completed the principle prototype and finished the metal objects in the water environment detection experiments, laid the foundation for the further experiments.

  15. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  16. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  17. Real Time Face Quality Assessment for Face Log Generation

    DEFF Research Database (Denmark)

    Kamal, Nasrollahi; Moeslund, Thomas B.

    2009-01-01

    Summarizing a long surveillance video to just a few best quality face images of each subject, a face-log, is of great importance in surveillance systems. Face quality assessment is the back-bone for face log generation and improving the quality assessment makes the face logs more reliable....... Developing a real time face quality assessment system using the most important facial features and employing it for face logs generation are the concerns of this paper. Extensive tests using four databases are carried out to validate the usability of the system....

  18. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  19. Final evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Carlson, R.; Brewer, W.; Lanham, R.

    1989-01-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed

  20. Identification and Management of Pump Thrombus in the HeartWare Left Ventricular Assist Device System: A Novel Approach Using Log File Analysis.

    Science.gov (United States)

    Jorde, Ulrich P; Aaronson, Keith D; Najjar, Samer S; Pagani, Francis D; Hayward, Christopher; Zimpfer, Daniel; Schlöglhofer, Thomas; Pham, Duc T; Goldstein, Daniel J; Leadley, Katrin; Chow, Ming-Jay; Brown, Michael C; Uriel, Nir

    2015-11-01

    The study sought to characterize patterns in the HeartWare (HeartWare Inc., Framingham, Massachusetts) ventricular assist device (HVAD) log files associated with successful medical treatment of device thrombosis. Device thrombosis is a serious adverse event for mechanical circulatory support devices and is often preceded by increased power consumption. Log files of the pump power are easily accessible on the bedside monitor of HVAD patients and may allow early diagnosis of device thrombosis. Furthermore, analysis of the log files may be able to predict the success rate of thrombolysis or the need for pump exchange. The log files of 15 ADVANCE trial patients (algorithm derivation cohort) with 16 pump thrombus events treated with tissue plasminogen activator (tPA) were assessed for changes in the absolute and rate of increase in power consumption. Successful thrombolysis was defined as a clinical resolution of pump thrombus including normalization of power consumption and improvement in biochemical markers of hemolysis. Significant differences in log file patterns between successful and unsuccessful thrombolysis treatments were verified in 43 patients with 53 pump thrombus events implanted outside of clinical trials (validation cohort). The overall success rate of tPA therapy was 57%. Successful treatments had significantly lower measures of percent of expected power (130.9% vs. 196.1%, p = 0.016) and rate of increase in power (0.61 vs. 2.87, p file parameters can potentially predict the likelihood of successful tPA treatments and if validated prospectively, could substantially alter the approach to thrombus management. Copyright © 2015 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  1. Fuel rod failure detection method and system

    International Nuclear Information System (INIS)

    Assmann, H.; Janson, W.; Stehle, H.; Wahode, P.

    1975-01-01

    The inventor claims a method for the detection of a defective fuel rod cladding tube or of inleaked water in the cladding tube of a fuel rod in the fuel assembly of a pressurized-water reactor. The fuel assembly is not disassembled but examined as a whole. In the examination, the cladding tube is heated near one of its two end plugs, e.g. with an attached high-frequency inductor. The water contained in the cladding tube evaporates, and steam bubbles or a condensate are detected by the ultrasonic impulse-echo method. It is also possible to measure the delay of the temperature rise at the end plug or to determine the cooling energy required to keep the end plug temperature stable and thus to detect water ingression. (DG/AK) [de

  2. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...... of different tampering events. In order to assess the developed methods we have collected a large data set, which contains sequences from different active cameras at different scenarios. We evaluate our sys- tem on these data and the results are encouraging with a very high detecting rate and relatively few...

  3. Intrusion Detection System In IoT

    OpenAIRE

    Nygaard, Frederik

    2017-01-01

    Intrusion detection detects misbehaving nodes in a network. In Internet of Things(IoT), IPv6 Routing for Low-Power and Lossy Networks (RPL) is the standard routing protocol. In IoT, devices commonly have low energy, storage and memory, which is why the implemented intrusion algorithm in this thesis will try to minimize the usage of these resources. IDS for RPL-networks have been implemented before, but the use of resources or the number of packets sent was too high to be successful when findi...

  4. Electrical and gamma-ray logging in Gondwana and Tertiary coal fields of India

    International Nuclear Information System (INIS)

    Kayal, J.R.

    1979-01-01

    Electrical and gamma-ray logging have been very useful for identification and accurate determination of depth and thickness of coal seams in Gondwana and Tertiary coal fields of India. The characteristic resistance/resistivity peaks of coal seams in a particular area have been correlated, thus providing a picture of the subsurface structure. Physico-chemical properties of layers or sections of coal seams are responsive to electrical logs. Gamma-ray logs are found to be very useful for correlation and have sometimes been the only logs used in cased and dry boreholes for detection of coal seams. Under favourable conditions a single-point resistance log reveals a detailed picture of the formations and picks up thin coal seams as well as thin shale bands within the coal seam. But in some cases it fails to differentiate between coal and sandstone beds in spite of high contrast in true resistivities. Multi-electrode long-normal and lateral logs are found to be more useful in differentiating such formations because of higher penetration in this system. Long-normal and lateral curves can also be used to determine true resisvity of the formation. But long normal logs cannot pick up thin coal bands and/or thin shale partings within the coal seam because of the 'adjacent bed effect'. Gamma-ray logging can be done in both cased and uncased bore-holes or even in a dry borehole but its resolution for shaly coal or thin coal is not sufficient. Combined study has been found to yield the best results. (Auth.)

  5. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  6. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  7. Advanced Ground Systems Maintenance Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The Inductive Monitoring System (IMS) software utilizes techniques from the fields of model-based reasoning, machine learning, and data mining to build system...

  8. Phase and amplitude detection system for the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Schwarz, H.D.

    1983-01-01

    A computer controlled phase and amplitude detection system to measure and stabilize the rf power sources in the Stanford Linear Accelerator is described. This system measures the instantaneous phase and amplitude of a 1 microsecond 2856 MHz rf pulse and will be used for phase feedback control and for amplitude and phase jitter detection. This paper discusses the measurement system performance requirements for the operation of the Stanford Linear Collider, and the design and implementation of the phase and amplitude detection system. The fundamental software algorithms used in the measurement are described, as is the performance of the prototype phase and amplitude detector system

  9. CS model coil experimental log book

    International Nuclear Information System (INIS)

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  10. Robust Fault Detection for Switched Fuzzy Systems With Unknown Input.

    Science.gov (United States)

    Han, Jian; Zhang, Huaguang; Wang, Yingchun; Sun, Xun

    2017-10-03

    This paper investigates the fault detection problem for a class of switched nonlinear systems in the T-S fuzzy framework. The unknown input is considered in the systems. A novel fault detection unknown input observer design method is proposed. Based on the proposed observer, the unknown input can be removed from the fault detection residual. The weighted H∞ performance level is considered to ensure the robustness. In addition, the weighted H₋ performance level is introduced, which can increase the sensibility of the proposed detection method. To verify the proposed scheme, a numerical simulation example and an electromechanical system simulation example are provided at the end of this paper.

  11. SNG-logs at Skjern

    DEFF Research Database (Denmark)

    Korsbech, Uffe C C; Petersen, Jesper; Aage, Helle Karina

    1998-01-01

    Spectral Natural Gamma-ray logs have been run in two water supply borings at Skjern. The log data have been examined by a new technique - Noise Adjusted Singular Value Decomposition - in order to get a detailed and reliable picture of the distribution of uranium and thorium gamma-rays from heavy...

  12. Information needs for increasing log transport efficiency

    Science.gov (United States)

    Timothy P. McDonald; Steven E. Taylor; Robert B. Rummer; Jorge Valenzuela

    2001-01-01

    Three methods of dispatching trucks to loggers were tested using a log transport simulation model: random allocation, fixed assignment of trucks to loggers, and dispatch based on knowledge of the current status of trucks and loggers within the system. This 'informed' dispatch algorithm attempted to minimize the difference in time between when a logger would...

  13. Mining process performance from event logs

    NARCIS (Netherlands)

    Adriansyah, A.; Buijs, J.C.A.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In

  14. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  15. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Dhanalakshmi Krishnan Sadhasivan; Kannapiran Balasubramanian

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  16. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  17. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  18. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  19. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  20. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  1. Evaluation of the AN/GSS-20 motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the AN/GSS-20 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to environmental factors was also examined

  2. 46 CFR 28.830 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection system. 28.830 Section 28.830 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.830 Fire detection system. (a) Each accommodation space...

  3. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  4. 46 CFR 28.325 - Fire detection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Fire detection systems. 28.325 Section 28.325 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING... Operate With More Than 16 Individuals on Board § 28.325 Fire detection systems. (a) Each accommodation...

  5. Automatic patient respiration failure detection system with wireless transmission

    Science.gov (United States)

    Dimeff, J.; Pope, J. M.

    1968-01-01

    Automatic respiration failure detection system detects respiration failure in patients with a surgically implanted tracheostomy tube, and actuates an audible and/or visual alarm. The system incorporates a miniature radio transmitter so that the patient is unencumbered by wires yet can be monitored from a remote location.

  6. Best Practices for Fuel System Contamination Detection and Remediation

    Science.gov (United States)

    2016-01-15

    The University of Dayton Research Institute Best Practices for Fuel System Contamination Detection and Remediation Final Report Marlin D... Remediation Executive Summary: Fuel contamination is a broad term commonly applied to anything that causes a fuel test to fail quality assurance...Statement A: Approved for public release: distribution unlimited. 1 Best Practices for Fuel System Contamination Detection and Remediation Contents

  7. Wireless tamper detection sensor and sensing system

    Science.gov (United States)

    Woodard, Stanley E. (Inventor); Taylor, Bryant D. (Inventor)

    2011-01-01

    A wireless tamper detection sensor is defined by a perforated electrical conductor. The conductor is shaped to form a geometric pattern between first and second ends thereof such that the conductor defines an open-circuit that can store and transfer electrical and magnetic energy. The conductor resonates in the presence of a time-varying magnetic field to generate a harmonic response. The harmonic response changes when the conductor experiences a change in its geometric pattern due to severing of the conductor along at least a portion of the perforations. A magnetic field response recorder is used to wirelessly transmit the time-varying magnetic field and wirelessly detecting the conductor's harmonic response.

  8. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  9. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  10. Explosive simulants for testing explosive detection systems

    Science.gov (United States)

    Kury, John W.; Anderson, Brian L.

    1999-09-28

    Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

  11. Ubiquitous Learning Project Using Life-Logging Technology in Japan

    Science.gov (United States)

    Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran

    2014-01-01

    A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…

  12. The analog CTS communication interface in nuclear logging

    International Nuclear Information System (INIS)

    Li Min

    2000-01-01

    The author introduced a micro-controller-based CTS communication interface in nuclear logging, which provided convenience for the overhaul and regulation of the logging tool in CTS communication system. The use of micro-controller simplified the hardware structure of the interface, made the soft structure more rational and the whole system more flexible to control

  13. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  14. Development of Abnormality Detection System for Bathers using Ultrasonic Sensors

    Science.gov (United States)

    Ohnishi, Yosuke; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko; Ogoshi, Yasuhiro

    This paper proposes an abnormality detection system for bather sitting in bathtub. Increasing number of in-bathtub drowning accidents in Japan draws attention. Behind this large number of bathing accidents, Japan's unique social and cultural background come surface. For majority of people in Japan, bathing serves purpose in deep warming up of body, relax and enjoyable time. Therefore it is the custom for the Japanese to soak in bathtub. However overexposure to hot water may cause dizziness or fainting, which is possible to cause in-bathtub drowning. For drowning prevention, the system detects bather's abnormal state using an ultrasonic sensor array. The array, which has many ultrasonic sensors, is installed on the ceiling of bathroom above bathtub. The abnormality detection system uses the following two methods: posture detection and behavior detection. The function of posture detection is to estimate the risk of drowning by monitoring bather's posture. Meanwhile, the function of behavior detection is to estimate the risk of drowning by monitoring bather's behavior. By using these methods, the system detects bathers' different state from normal. As a result of experiment with a subject in the bathtub, the system was possible to detect abnormal state using subject's posture and behavior. Therefore the system is useful for monitoring bather to prevent drowning in bathtub.

  15. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  16. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  17. Attentional System for Face Detection and Tracking

    Directory of Open Access Journals (Sweden)

    Leonardo Pinto da Silva Panta Leão

    2011-04-01

    Full Text Available The human visual system quickly performs complex decisions due, in part, to attentional system, which positions the most relevant targets in the center of the visual field, region with greatest concentration of photoreceptor cells. The attentional system involves sensory, cognitive and also mechanical elements, because the eye and head muscles must be activated to produce movement. In this paper we present the proposal of a face detector system that, as well as the biological system, produces a coordinated movement with the purpose of positioning the target image in the center of camera's visual field. The developed system has distinct parts, one responsible for video pattern recognition and other for controlling the mechanical part, implemented as processes that communicate with each other by sockets.

  18. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  19. Geomicrobial Optical Logging Detectors (GOLD)

    Science.gov (United States)

    Bramall, N. E.; Stoker, C. R.; Price, P. B.; Coates, J. D.; Allamandola, L. J.; Mattioda, A. L.

    2008-12-01

    We will present concepts for downhole instrumentation that could be used in the Deep Underground Science and Engineering Laboratory (DUSEL). We envision optical borehole-logging instruments that could monitor bacterial concentration, mineralogy, aromatic organics, temperature and oxygen concentration, allowing for the in situ monitoring of time-dependent microbial and short-scale geologic processes and provide valuable in situ data on stratigraphy to supplement core analyses, especially where instances of missing or damaged core sections make such studies difficult. Incorporated into these instruments will be a sampling/inoculation tool to allow for the recovery and/or manipulation of particularly interesting sections of the borehole wall for further study, enabling a series of microbiological studies. The borehole tools we will develop revolve around key emerging technologies and methods, some of which are briefly described below: 1) Autofluorescence Spectroscopy: Building on past instruments, we will develop a new borehole logger that searches for microbial life and organics using fluorescence spectroscopy. Many important organic compounds (e.g. PAHs) and biomolecules (e.g. aromatic amino acids, proteins, methanogenic coenzymes) fluoresce when excited with ultraviolet and visible light. Through the careful selection of excitation wavelength(s) and temporal gating parameters, a borehole logging instrument can detect and differentiate between these different compounds and the mineral matrix in which they exist. 2) Raman Spectroscopy: Though less sensitive than fluorescence spectroscopy, Raman spectroscopy is more definitive: it can provide important mineral phase distribution/proportions and other chemical data enabling studies of mineralogy and microbe-mineral interactions (when combined with fluorescence). 3) Borehole Camera: Imaging of the borehole wall with extended information in the UV, visible, and NIR for a more informative view can provide a lot of insight

  20. An artificial intelligence approach to well log correlation

    International Nuclear Information System (INIS)

    Startzman, R.A.; Kuo, T.B.

    1986-01-01

    This paper shows how an expert computer system was developed to correlate two well logs in at least moderately difficult situations. A four step process was devised to process log trace information and apply a set of rules to identify zonal correlations. Some of the advantages and problems with the artificial intelligence approach are shown using field logs. The approach is useful and, if properly and systematically applied, it can result in good correlations

  1. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  2. Combined Log Inventory and Process Simulation Models for the Planning and Control of Sawmill Operations

    Science.gov (United States)

    Guillermo A. Mendoza; Roger J. Meimban; Philip A. Araman; William G. Luppold

    1991-01-01

    A log inventory model and a real-time hardwood process simulation model were developed and combined into an integrated production planning and control system for hardwood sawmills. The log inventory model was designed to monitor and periodically update the status of the logs in the log yard. The process simulation model was designed to estimate various sawmill...

  3. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    Science.gov (United States)

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  4. System and Method for Multi-Wavelength Optical Signal Detection

    Science.gov (United States)

    McGlone, Thomas D. (Inventor)

    2017-01-01

    The system and method for multi-wavelength optical signal detection enables the detection of optical signal levels significantly below those processed at the discrete circuit level by the use of mixed-signal processing methods implemented with integrated circuit technologies. The present invention is configured to detect and process small signals, which enables the reduction of the optical power required to stimulate detection networks, and lowers the required laser power to make specific measurements. The present invention provides an adaptation of active pixel networks combined with mixed-signal processing methods to provide an integer representation of the received signal as an output. The present invention also provides multi-wavelength laser detection circuits for use in various systems, such as a differential absorption light detection and ranging system.

  5. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  6. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...

  7. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  8. Entanglement detection in hybrid optomechanical systems

    International Nuclear Information System (INIS)

    De Chiara, Gabriele; Paternostro, Mauro; Palma, G. Massimo

    2011-01-01

    We study a device formed by a Bose-Einstein condensate (BEC) coupled to the field of a cavity with a moving end mirror and find a working point such that the mirror-light entanglement is reproduced by the BEC-light quantum correlations. This provides an experimentally viable tool for inferring mirror-light entanglement with only a limited set of assumptions. We prove the existence of tripartite entanglement in the hybrid device, persisting up to temperatures of a few milli-Kelvin, and discuss a scheme to detect it.

  9. A Survey on Anomaly Based Host Intrusion Detection System

    Science.gov (United States)

    Jose, Shijoe; Malathi, D.; Reddy, Bharath; Jayaseeli, Dorathi

    2018-04-01

    An intrusion detection system (IDS) is hardware, software or a combination of two, for monitoring network or system activities to detect malicious signs. In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems. The primary function of system is detecting intrusion and gives alerts when user tries to intrusion on timely manner. In these techniques when IDS find out intrusion it will send alert massage to the system administrator. Anomaly detection is an important problem that has been researched within diverse research areas and application domains. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. From the existing anomaly detection techniques, each technique has relative strengths and weaknesses. The current state of the experiment practice in the field of anomaly-based intrusion detection is reviewed and survey recent studies in this. This survey provides a study of existing anomaly detection techniques, and how the techniques used in one area can be applied in another application domain.

  10. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  11. Catching errors with patient-specific pretreatment machine log file analysis.

    Science.gov (United States)

    Rangaraj, Dharanipathy; Zhu, Mingyao; Yang, Deshan; Palaniswaamy, Geethpriya; Yaddanapudi, Sridhar; Wooten, Omar H; Brame, Scott; Mutic, Sasa

    2013-01-01

    A robust, efficient, and reliable quality assurance (QA) process is highly desired for modern external beam radiation therapy treatments. Here, we report the results of a semiautomatic, pretreatment, patient-specific QA process based on dynamic machine log file analysis clinically implemented for intensity modulated radiation therapy (IMRT) treatments delivered by high energy linear accelerators (Varian 2100/2300 EX, Trilogy, iX-D, Varian Medical Systems Inc, Palo Alto, CA). The multileaf collimator machine (MLC) log files are called Dynalog by Varian. Using an in-house developed computer program called "Dynalog QA," we automatically compare the beam delivery parameters in the log files that are generated during pretreatment point dose verification measurements, with the treatment plan to determine any discrepancies in IMRT deliveries. Fluence maps are constructed and compared between the delivered and planned beams. Since clinical introduction in June 2009, 912 machine log file analyses QA were performed by the end of 2010. Among these, 14 errors causing dosimetric deviation were detected and required further investigation and intervention. These errors were the result of human operating mistakes, flawed treatment planning, and data modification during plan file transfer. Minor errors were also reported in 174 other log file analyses, some of which stemmed from false positives and unreliable results; the origins of these are discussed herein. It has been demonstrated that the machine log file analysis is a robust, efficient, and reliable QA process capable of detecting errors originating from human mistakes, flawed planning, and data transfer problems. The possibility of detecting these errors is low using point and planar dosimetric measurements. Copyright © 2013 American Society for Radiation Oncology. Published by Elsevier Inc. All rights reserved.

  12. Chemical Detection Architecture for a Subway System [video

    OpenAIRE

    Ignacio, Joselito; Center for Homeland Defense and Security Naval Postgraduate School

    2014-01-01

    This proposed system process aims to improve subway safety through better enabling the rapid detection and response to a chemical release in a subway system. The process is designed to be location-independent and generalized to most subway systems despite each system's unique characteristics.

  13. Optimal Robust Fault Detection for Linear Discrete Time Systems

    Directory of Open Access Journals (Sweden)

    Nike Liu

    2008-01-01

    Full Text Available This paper considers robust fault-detection problems for linear discrete time systems. It is shown that the optimal robust detection filters for several well-recognized robust fault-detection problems, such as ℋ−/ℋ∞, ℋ2/ℋ∞, and ℋ∞/ℋ∞ problems, are the same and can be obtained by solving a standard algebraic Riccati equation. Optimal filters are also derived for many other optimization criteria and it is shown that some well-studied and seeming-sensible optimization criteria for fault-detection filter design could lead to (optimal but useless fault-detection filters.

  14. Design of Moisture Content Detection System

    Science.gov (United States)

    Wang, W. C.; Wang, L.

    In this paper, a method for measuring the moisture content of grain was presented based on single chip microcomputer and capacitive sensor. The working principle of measuring moisture content is introduced and a concentric cylinder type of capacitive sensor is designed, the signal processing circuits of system are described in details. System is tested in practice and discussions are made on the various factors affecting the capacitive measuring of grain moisture based on the practical experiments, experiment results showed that the system has high measuring accuracy and good controlling capacity.

  15. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  16. How to detect trap cluster systems?

    International Nuclear Information System (INIS)

    Mandowski, Arkadiusz

    2008-01-01

    Spatially correlated traps and recombination centres (trap-recombination centre pairs and larger clusters) are responsible for many anomalous phenomena that are difficult to explain in the framework of both classical models, i.e. model of localized transitions (LT) and the simple trap model (STM), even with a number of discrete energy levels. However, these 'anomalous' effects may provide a good platform for identifying trap cluster systems. This paper considers selected cluster-type effects, mainly relating to an anomalous dependence of TL on absorbed dose in the system of isolated clusters (ICs). Some consequences for interacting cluster (IAC) systems, involving both localized and delocalized transitions occurring simultaneously, are also discussed

  17. Leak detection system for RBMK coolant circuit

    Energy Technology Data Exchange (ETDEWEB)

    Cherkashov, Ju M; Strelkov, B P; Korolev, Yu V; Eperin, A P; Kozlov, E P; Belyanin, L A; Vanukov, V N [Leningrad Nuclear Power Plant, Leningrad (Russian Federation). Research and Development Inst. of Power Engineering

    1997-12-31

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab.

  18. Road icing forecasting and detecting system

    Science.gov (United States)

    Xu, Hongke; Zheng, Jinnan; Li, Peiqi; Wang, Qiucai

    2017-05-01

    Regard for the facts that the low accuracy and low real-time of the artificial observation to determine the road icing condition, and it is difficult to forecast icing situation, according to the main factors influencing the road-icing, and the electrical characteristics reflected by the pavement ice layer, this paper presents an innovative system, that is, ice-forecasting of the highway's dangerous section. The system bases on road surface water salinity measurements and pavement temperature measurement to calculate the freezing point of water and temperature change trend, and then predicts the occurrence time of road icing; using capacitance measurements to verdict the road surface is frozen or not; This paper expounds the method of using single chip microcomputer as the core of the control system and described the business process of the system.

  19. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  20. Resilient Control and Intrusion Detection for SCADA Systems

    Science.gov (United States)

    2014-05-01

    Lowe. The myths and facts behind cyber security risks for industrial control systems . VDE Congress, 2004. [45] I. S. C37.1-1994. Ieee standard...Resilient Control and Intrusion Detection for SCADA Systems Bonnie Xia Zhu Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Resilient Control and Intrusion Detection for SCADA Systems 5a. CONTRACT

  1. Log-balanced combinatorial sequences

    Directory of Open Access Journals (Sweden)

    Tomislav Došlic

    2005-01-01

    Full Text Available We consider log-convex sequences that satisfy an additional constraint imposed on their rate of growth. We call such sequences log-balanced. It is shown that all such sequences satisfy a pair of double inequalities. Sufficient conditions for log-balancedness are given for the case when the sequence satisfies a two- (or more- term linear recurrence. It is shown that many combinatorially interesting sequences belong to this class, and, as a consequence, that the above-mentioned double inequalities are valid for all of them.

  2. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  3. One less trip : logging with less tripping, more protection

    Energy Technology Data Exchange (ETDEWEB)

    Byfield, M.

    2005-12-15

    New logging technology by Datalog Technology Inc. was described. Logging-while-tripping (LWT) technology uses a slim petrophysical sensor package that is moved to the targeted geological formation through a drill pipe, which reduces the exposure to vibration and shock involved in logging-while-drilling (LWD). The equipment features standard components in a patented configuration and comes in 2 segments: the receiver sub and the sensor package electronics. A receiver sub is inserted into the bottomhole assembly at the end of the drill string. Drilling progresses with the LWT sub in the bottomhole assembly until the borehole approaches the logging depth. The sensor package and electronics are then lowered into the drill string. If the well is horizontal, rig pumps push the package into the drill string until it lands in the LWT sub. Drill pipes are moved across the zone of interest and logs are recorded on downhole memory contained within the LWT package. As the logging operation progresses, a depth recorder at the surface records depth information along with the downhole recorders. When logging is completed, downhole tools are retrieved, and data downloaded from the LWT onboard memory is merged with the surface depth information to generate well logs. Retrieval via the drill string greatly reduces the risk of losing the logging gear, which contains radioactive material. Federal officials now routinely insist on extensive fishing operations to retrieve lost tools. If a well gets a gas kick while logging is in progress, the operator can still pump down mud or close the blowout preventer rams if necessary, and save time in determining where to perforate shallow gas wells. Compensated neutron logs, gamma rays, spectrum gamma rays, and induction have been tested with the LWT system. It was concluded that Petro-Canada has deployed the logs recently and has achieved results that compared satisfactorily with conventional logs. 2 figs.

  4. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  5. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  6. Development of radiation detection and measurement systems

    International Nuclear Information System (INIS)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated

  7. NELIS-an illicit drug detection system

    International Nuclear Information System (INIS)

    Dokhale, P.A.; Csikai, J.; Womble, P.C.; Vourvopoulos, G.

    2001-01-01

    NELIS (Neutron Elemental Inspection System) is currently being developed to inspect pallets laden with various commodities for contraband (drugs, etc.). NELIS analyzes the characteristic gamma rays from the elements in drugs such as C, O, H, Cl, N, etc. that are produced by nuclear reactions from fast and thermal neutrons (Pulsed Fast/Thermal Neutron Analysis). Hidden drugs are identified through the measurement of the elemental content of the object, and the comparison of expected and measured elemental ratios. NELIS can be coupled with conventional X-ray imaging system to optimize the inspection capabilities at ports of entry

  8. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  9. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  10. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  11. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  12. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    National Research Council Canada - National Science Library

    2001-01-01

    .... and Canadian military personnel. In light of these concerns both defense departments have increased efforts to develop and field biological agent detection systems to help protect their military forces and fixed assets...

  13. Requirements-Driven Log Analysis Extended Abstract

    Science.gov (United States)

    Havelund, Klaus

    2012-01-01

    Imagine that you are tasked to help a project improve their testing effort. In a realistic scenario it will quickly become clear, that having an impact is diffcult. First of all, it will likely be a challenge to suggest an alternative approach which is significantly more automated and/or more effective than current practice. The reality is that an average software system has a complex input/output behavior. An automated testing approach will have to auto-generate test cases, each being a pair (i; o) consisting of a test input i and an oracle o. The test input i has to be somewhat meaningful, and the oracle o can be very complicated to compute. Second, even in case where some testing technology has been developed that might improve current practice, it is then likely difficult to completely change the current behavior of the testing team unless the technique is obviously superior and does everything already done by existing technology. So is there an easier way to incorporate formal methods-based approaches than the full edged test revolution? Fortunately the answer is affirmative. A relatively simple approach is to benefit from possibly already existing logging infrastructure, which after all is part of most systems put in production. A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers. An event can be considered as a data record: a mapping from field names to values. We can analyze such a log using formal methods, for example checking it against a formal specification. This separates running the system for analyzing its behavior. It is not meant as an alternative to testing since it does not address the important in- put generation problem. However, it offers a solution which testing teams might accept since it has low impact on the existing process. A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.

  14. New materials for fireplace logs

    Science.gov (United States)

    Kieselback, D. J.; Smock, A. W.

    1971-01-01

    Fibrous insulation and refractory concrete are used for logs as well as fireproof walls, incinerator bricks, planters, and roof shingles. Insulation is lighter and more shock resistant than fireclay. Lightweight slag bonded with refractory concrete serves as aggregrate.

  15. Suboptimal processor for anomaly detection for system surveillance and diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Ciftcioglu, Oe.; Hoogenboom, J.E.; Dam, H. van

    1989-06-01

    Anomaly detection for nuclear reactor surveillance and diagnosis is described. The residual noise obtained as a result of autoregressive (AR) modelling is essential to obtain high sensitivity for anomaly detection. By means of the method of hypothesis testing a suboptimal anomaly detection processor is devised for system surveillance and diagnosis. Experiments are carried out to investigate the performance of the processor, which is in particular of interest for on-line and real-time applications.

  16. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  17. Beat frequency ultrasonic microsphere contrast agent detection system

    Science.gov (United States)

    Pretlow, III, Robert A. (Inventor); Yost, William T. (Inventor); Cantrell, Jr., John H. (Inventor)

    1997-01-01

    A system for and method of detecting and measuring concentrations of an ultrasonically-reflective microsphere contrast agent involving detecting non-linear sum and difference beat frequencies produced by the microspheres when two impinging signals with non-identical frequencies are combined by mixing. These beat frequencies can be used for a variety of applications such as detecting the presence of and measuring the flow rates of biological fluids and industrial liquids, including determining the concentration level of microspheres in the myocardium.

  18. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  19. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  20. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.