WorldWideScience

Sample records for logging detection systems

  1. LIDAR-INCORPORATED TRAFFIC SIGN DETECTION FROM VIDEO LOG IMAGES OF MOBILE MAPPING SYSTEM

    Directory of Open Access Journals (Sweden)

    Y. Li

    2016-06-01

    Full Text Available Mobile Mapping System (MMS simultaneously collects the Lidar points and video log images in a scenario with the laser profiler and digital camera. Besides the textural details of video log images, it also captures the 3D geometric shape of point cloud. It is widely used to survey the street view and roadside transportation infrastructure, such as traffic sign, guardrail, etc., in many transportation agencies. Although many literature on traffic sign detection are available, they only focus on either Lidar or imagery data of traffic sign. Based on the well-calibrated extrinsic parameters of MMS, 3D Lidar points are, the first time, incorporated into 2D video log images to enhance the detection of traffic sign both physically and visually. Based on the local elevation, the 3D pavement area is first located. Within a certain distance and height of the pavement, points of the overhead and roadside traffic signs can be obtained according to the setup specification of traffic signs in different transportation agencies. The 3D candidate planes of traffic signs are then fitted using the RANSAC plane-fitting of those points. By projecting the candidate planes onto the image, Regions of Interest (ROIs of traffic signs are found physically with the geometric constraints between laser profiling and camera imaging. The Random forest learning of the visual color and shape features of traffic signs is adopted to validate the sign ROIs from the video log images. The sequential occurrence of a traffic sign among consecutive video log images are defined by the geometric constraint of the imaging geometry and GPS movement. Candidate ROIs are predicted in this temporal context to double-check the salient traffic sign among video log images. The proposed algorithm is tested on a diverse set of scenarios on the interstate highway G-4 near Beijing, China under varying lighting conditions and occlusions. Experimental results show the proposed algorithm enhances the

  2. Applicability estimation of flowmeter logging for detecting hydraulic pass

    International Nuclear Information System (INIS)

    Miyakawa, Kimio; Tanaka, Yasuji; Tanaka, Kazuhiro

    1997-01-01

    Estimation of the hydraulic pass governing hydrogeological structure contributes significantly to the siting HLW repository. Flowmeter logging can detect hydraulic passes by measuring vertical flow velocity of groundwater in the borehole. We reviewed application of this logging in situ. The hydraulic pass was detected with combination of ambient flow logging, with pumping and/or injecting induced flow logging. This application showed that the flowmeter logging detected hydraulic passes conveniently and accurately compared with other hydraulic tests. Hydraulic conductivity by using flowmeter logging was assessed above 10 -6 m/sec and within one order from comparison with injection packer tests. We suggest that appropriate application of the flowmeter logging for the siting is conducted before hydraulic tests because test sections and monitoring sections are decided rationally for procurement of quantitative hydraulic data. (author)

  3. A cement channel-detection technique using the pulsed-neutron log

    International Nuclear Information System (INIS)

    Myers, G.D.

    1991-01-01

    A channel-detection technique has been developed using boron solutions and pulsed-neutron logging (PNL) tools. This technique relies on the extremely high-neutron-absorption cross section that boron exhibits relative to other common elements, including chlorine. The PNL tool is used to detect movement of a boron solution in a log-inject-log procedure. The technique has identified channels in such difficult applications as logging through two strings of pipe and in highly deviated wellbores. Logging procedures are simple and cement channels can be readily identified. The boron solutions are relatively inexpensive, safe to handle, and nonradioactive. Additional PNL information for reservoir performance evaluation is collected simultaneously during channel-detection logging. This paper describes the theory, development, field application, and limitations of this channel-detection logging technique

  4. A graphical automated detection system to locate hardwood log surface defects using high-resolution three-dimensional laser scan data

    Science.gov (United States)

    Liya Thomas; R. Edward. Thomas

    2011-01-01

    We have developed an automated defect detection system and a state-of-the-art Graphic User Interface (GUI) for hardwood logs. The algorithm identifies defects at least 0.5 inch high and at least 3 inches in diameter on barked hardwood log and stem surfaces. To summarize defect features and to build a knowledge base, hundreds of defects were measured, photographed, and...

  5. Defect core detection in radiata pine logs

    International Nuclear Information System (INIS)

    Wallace, G.

    1993-01-01

    Internal defect cores in Pinus radiata logs arise primarily from the practice in New Zealand of pruning trees to increase the amount of clear wood. Realising the benefits of this practice when milling the logs is hampered by the lack of a practical method for detecting the defect cores. This report attempts to establish industry requirements for detections and examine techniques which may be suitable. Some trials of a novel technique are described. (author) 19 refs.; 11 figs

  6. LongLine: Visual Analytics System for Large-scale Audit Logs

    Directory of Open Access Journals (Sweden)

    Seunghoon Yoo

    2018-03-01

    Full Text Available Audit logs are different from other software logs in that they record the most primitive events (i.e., system calls in modern operating systems. Audit logs contain a detailed trace of an operating system, and thus have received great attention from security experts and system administrators. However, the complexity and size of audit logs, which increase in real time, have hindered analysts from understanding and analyzing them. In this paper, we present a novel visual analytics system, LongLine, which enables interactive visual analyses of large-scale audit logs. LongLine lowers the interpretation barrier of audit logs by employing human-understandable representations (e.g., file paths and commands instead of abstract indicators of operating systems (e.g., file descriptors as well as revealing the temporal patterns of the logs in a multi-scale fashion with meaningful granularity of time in mind (e.g., hourly, daily, and weekly. LongLine also streamlines comparative analysis between interesting subsets of logs, which is essential in detecting anomalous behaviors of systems. In addition, LongLine allows analysts to monitor the system state in a streaming fashion, keeping the latency between log creation and visualization less than one minute. Finally, we evaluate our system through a case study and a scenario analysis with security experts.

  7. Detection of unexploded ordnance by PGNAA based borehole-logging

    International Nuclear Information System (INIS)

    John Kettler; RWTH-Aachen University, Aachen; Eric Mauerhofer; Marco Steinbusch

    2013-01-01

    The performance of a borehole-logging system, based on prompt-gamma-neutron-activation-analysis (PGNAA), for explosive detection was studied by Monte-Carlo simulations. The prompt gamma of nitrogen, which is a constituent of common explosive, was used to identify the unexploded ordnance (UXO). Our results show that the minimum counting time depends on the soil moisture, the cladding thickness and the explosive composition. In conjunction with the standard detection by magnetometry, the PGNAA is a promising analytical technique for definitive identification of deep buried UXOs. (author)

  8. A novel approach proposed for fractured zone detection using petrophysical logs

    International Nuclear Information System (INIS)

    Tokhmechi, B; Memarian, H; Noubari, H A; Moshiri, B

    2009-01-01

    Fracture detection is a key step in wellbore stability and fractured reservoir fluid flow simulation. While different methods have been proposed for fractured zones detection, each of them is associated with certain shortcomings that prevent their full use in different related engineering applications. In this paper, a novel combined method is proposed for fractured zone detection, using processing of petrophysical logs with wavelet, classification and data fusion techniques. Image and petrophysical logs from Asmari reservoir in eight wells of an oilfield in southwestern Iran were used to investigate the accuracy and applicability of the proposed method. Initially, an energy matching strategy was utilized to select the optimum mother wavelets for de-noising and decomposition of petrophysical logs. Parzen and Bayesian classifiers were applied to raw, de-noised and various frequency bands of logs after decomposition in order to detect fractured zones. Results show that the low-frequency bands (approximation 2, a 2 ) of de-noised logs are the best data for fractured zones detection. These classifiers considered one well as test well and the other seven wells as train wells. Majority voting, optimistic OWA (ordered weighted averaging) and pessimistic OWA methods were used to fuse the results obtained from seven train wells. Results confirmed that Parzen and optimistic OWA are the best combined methods to detect fractured zones. The generalization of method is confirmed with an average accuracy of about 72%

  9. A Universal Logging System for LHCb Online

    International Nuclear Information System (INIS)

    Nikolaidis, Fotis; Brarda, Loic; Garnier, Jean-Christophe; Neufeld, Niko

    2011-01-01

    A log is recording of system's activity, aimed to help system administrator to traceback an attack, find the causes of a malfunction and generally with troubleshooting. The fact that logs are the only information an administrator may have for an incident, makes logging system a crucial part of an IT infrastructure. In large scale infrastructures, such as LHCb Online, where quite a few GB of logs are produced daily, it is impossible for a human to review all of these logs. Moreover, a great percentage of them as just n oise . That makes clear that a more automated and sophisticated approach is needed. In this paper, we present a low-cost centralized logging system which allow us to do in-depth analysis of every log.

  10. Detection of attack-targeted scans from the Apache HTTP Server access logs

    Directory of Open Access Journals (Sweden)

    Merve Baş Seyyar

    2018-01-01

    Full Text Available A web application could be visited for different purposes. It is possible for a web site to be visited by a regular user as a normal (natural visit, to be viewed by crawlers, bots, spiders, etc. for indexing purposes, lastly to be exploratory scanned by malicious users prior to an attack. An attack targeted web scan can be viewed as a phase of a potential attack and can lead to more attack detection as compared to traditional detection methods. In this work, we propose a method to detect attack-oriented scans and to distinguish them from other types of visits. In this context, we use access log files of Apache (or ISS web servers and try to determine attack situations through examination of the past data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been applied on sample data sets and results have been analyzed in terms of performance measures to compare our method and other commonly used detection techniques. Furthermore, various tests have been made on log samples from real systems. Lastly, several suggestions about further development have been also discussed.

  11. Automatic Data Logging and Quality Analysis System for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yong-Yi Fanjiang

    2017-01-01

    Full Text Available The testing phase of mobile device products includes two important test projects that must be completed before shipment: the field trial and the beta user trial. During the field trial, the product is certified based on its integration and stability with the local operator’s system, and, during the beta user trial, the product is certified by multiple users regarding its daily use, where the goal is to detect and solve early problems. In the traditional approach used to issue returns, testers must log into a web site, fill out a problem form, and then go through a browser or FTP to upload logs; however, this is inconvenient, and problems are reported slowly. Therefore, we propose an “automatic logging analysis system” (ALAS to construct a convenient test environment and, using a record analysis (log parser program, automate the parsing of log files and have questions automatically sent to the database by the system. Finally, the mean time between failures (MTBF is used to establish measurement indicators for the beta user trial.

  12. Process variant comparison: using event logs to detect differences in behavior and business rules

    NARCIS (Netherlands)

    Bolt, A.; de Leoni, M.; van der Aalst, W.M.P.

    2018-01-01

    This paper addresses the problem of comparing different variants of the same process. We aim to detect relevant differences between processes based on what was recorded in event logs. We use transition systems to model behavior and to highlight differences. Transition systems are annotated with

  13. Detection of defects in logs using computer assisted tomography (CAT) scanning

    International Nuclear Information System (INIS)

    Tonner, P.D.; Lupton, L.R.

    1985-01-01

    The Chalk River Nuclear Laboratories of AECL have performed a preliminary feasibility study on the applicability of computer assisted tomographic techniques to detect the internal structure of logs. Cross sections of three logs have been obtained using a medical CAT scanner. The results show that knots, rot and growth rings are easily recognized in both dry and wet logs

  14. An interactive machine-learning approach for defect detection in computed tomogaraphy (CT) images of hardwood logs

    Science.gov (United States)

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt; Philip A. Araman

    2005-01-01

    This paper describes recent progress in the analysis of computed tomography (CT) images of hardwood logs. The long-term goal of the work is to develop a system that is capable of autonomous (or semiautonomous) detection of internal defects, so that log breakdown decisions can be optimized based on defect locations. The problem is difficult because wood exhibits large...

  15. Data logging system upgrade for Indus accelerator

    International Nuclear Information System (INIS)

    Mishra, R.; Merh, B.N.; Agrawal, R.K.; Fatnani, P.; Navathe, C.P.; Pal, S.

    2012-01-01

    An accelerator has various subsystems like Magnet Power Supply, Beam Diagnostics and Vacuum etc. which are required to work in a stable manner to ensure required machine performance. Logging of system parameters at a faster rate plays a crucial role in analysing and understanding machine behaviour. Logging all the machine parameters consistently at the rate of typically more than 1 Hz has been the aim of a recent data logging system upgrade. Nearly ten thousand parameters are being logged at varying intervals of one second to one minute in Indus accelerator complex. The present logging scheme is augmented to log all these parameters at a rate equal to or more than 1 Hz. The database schema is designed according to the data type of the parameter. The data is distributed into historical table and intermediate table which comprises of recent data. Machine control applications read the parameter values from the control system and store them into the text files of finite time duration for each sub-system. The logging application of each sub-system passes these text files to database for bulk insertion. The detail design of database, logging scheme and its architecture is presented in the paper. (author)

  16. System for gamma-gamma formation density logging while drilling

    International Nuclear Information System (INIS)

    Paske, W.C.

    1991-01-01

    The patent relates to a system for logging subterranean formations for the determination of formation density by using gamma radiation. Gamma ray source and detection means are disposed within a housing adapted for positioning within a borehole for the emission and detection of gamma rays propagating through earth formations and borehole drilling fluid. The gamma ray detection means comprises first and second gamma radiation sensors geometrically disposed within the housing, the same longitudinal distance from the gamma ray source and diametrically opposed in a common plane. A formation matrix density output signal is produced in proportion to the output signal from each of the gamma ray sensors and in conjunction with certain constants established by the geometrical configuration of the sensors relative to the gamma ray source and the borehole diameter. Formation density is determined without regard to the radial position of the logging probe within the borehole in a measuring while drilling mode. 6 figs

  17. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  18. Epileptic Seizure Detection with Log-Euclidean Gaussian Kernel-Based Sparse Representation.

    Science.gov (United States)

    Yuan, Shasha; Zhou, Weidong; Wu, Qi; Zhang, Yanli

    2016-05-01

    Epileptic seizure detection plays an important role in the diagnosis of epilepsy and reducing the massive workload of reviewing electroencephalography (EEG) recordings. In this work, a novel algorithm is developed to detect seizures employing log-Euclidean Gaussian kernel-based sparse representation (SR) in long-term EEG recordings. Unlike the traditional SR for vector data in Euclidean space, the log-Euclidean Gaussian kernel-based SR framework is proposed for seizure detection in the space of the symmetric positive definite (SPD) matrices, which form a Riemannian manifold. Since the Riemannian manifold is nonlinear, the log-Euclidean Gaussian kernel function is applied to embed it into a reproducing kernel Hilbert space (RKHS) for performing SR. The EEG signals of all channels are divided into epochs and the SPD matrices representing EEG epochs are generated by covariance descriptors. Then, the testing samples are sparsely coded over the dictionary composed by training samples utilizing log-Euclidean Gaussian kernel-based SR. The classification of testing samples is achieved by computing the minimal reconstructed residuals. The proposed method is evaluated on the Freiburg EEG dataset of 21 patients and shows its notable performance on both epoch-based and event-based assessments. Moreover, this method handles multiple channels of EEG recordings synchronously which is more speedy and efficient than traditional seizure detection methods.

  19. Digital mineral logging system

    International Nuclear Information System (INIS)

    West, J.B.

    1980-01-01

    A digital mineral logging system acquires data from a mineral logging tool passing through a borehole and transmits the data uphole to an electronic digital signal processor. A predetermined combination of sensors, including a deviometer, is located in a logging tool for the acquisition of the desired data as the logging tool is raised from the borehole. Sensor data in analog format is converted in the logging tool to a digital format and periodically batch transmitted to the surface at a predetermined sampling rate. An identification code is provided for each mineral logging tool, and the code is transmitted to the surface along with the sensor data. The self-identifying tool code is transmitted to the digital signal processor to identify the code against a stored list of the range of numbers assigned to that type of tool. The data is transmitted up the d-c power lines of the tool by a frequency shift key transmission technique. At the surface, a frequency shift key demodulation unit transmits the decoupled data to an asynchronous receiver interfaced to the electronic digital signal processor. During a recording phase, the signals from the logging tool are read by the electronic digital signal processor and stored for later processing. During a calculating phase, the stored data is processed by the digital signal processor and the results are outputted to a printer or plotter, or both

  20. LHCb Online Log Analysis and Maintenance System

    CERN Document Server

    Garnier, J-C

    2011-01-01

    History has shown, many times computer logs are the only information an administrator may have for an incident, which could be caused either by a malfunction or an attack. Due to the huge amount of logs that are produced from large-scale IT infrastructures, such as LHCb Online, critical information may be overlooked or simply be drowned in a sea of other messages. This clearly demonstrates the need for an automatic system for long-term maintenance and real time analysis of the logs. We have constructed a low cost, fault tolerant centralized logging system which is able to do in-depth analysis and cross-correlation of every log. This system is capable of handling O(10000) different log sources and numerous formats, while trying to keep the overhead as low as possible. It provides log gathering and management, Offline analysis and online analysis. We call Offline analysis the procedure of analyzing old logs for critical information, while Online analysis refer to the procedure of early alerting and reacting. ...

  1. New radio meteor detecting and logging software

    Science.gov (United States)

    Kaufmann, Wolfgang

    2017-08-01

    A new piece of software ``Meteor Logger'' for the radio observation of meteors is described. It analyses an incoming audio stream in the frequency domain to detect a radio meteor signal on the basis of its signature, instead of applying an amplitude threshold. For that reason the distribution of the three frequencies with the highest spectral power are considered over the time (3f method). An auto notch algorithm is developed to prevent the radio meteor signal detection from being jammed by a present interference line. The results of an exemplary logging session are discussed.

  2. Computer method to detect and correct cycle skipping on sonic logs

    International Nuclear Information System (INIS)

    Muller, D.C.

    1985-01-01

    A simple but effective computer method has been developed to detect cycle skipping on sonic logs and to replace cycle skips with estimates of correct traveltimes. The method can be used to correct observed traveltime pairs from the transmitter to both receivers. The basis of the method is the linearity of a plot of theoretical traveltime from the transmitter to the first receiver versus theoretical traveltime from the transmitter to the second receiver. Theoretical traveltime pairs are calculated assuming that the sonic logging tool is centered in the borehole, that the borehole diameter is constant, that the borehole fluid velocity is constant, and that the formation is homogeneous. The plot is linear for the full range of possible formation-rock velocity. Plots of observed traveltime pairs from a sonic logging tool are also linear but have a large degree of scatter due to borehole rugosity, sharp boundaries exhibiting large velocity contrasts, and system measurement uncertainties. However, this scatter can be reduced to a level that is less than scatter due to cycle skipping, so that cycle skips may be detected and discarded or replaced with estimated values of traveltime. Advantages of the method are that it can be applied in real time, that it can be used with data collected by existing tools, that it only affects data that exhibit cycle skipping and leaves other data unchanged, and that a correction trace can be generated which shows where cycle skipping occurs and the amount of correction applied. The method has been successfully tested on sonic log data taken in two holes drilled at the Nevada Test Site, Nye County, Nevada

  3. Acoustic--nuclear permeability logging system

    International Nuclear Information System (INIS)

    Dowling, D.J.; Arnold, D.M.

    1978-01-01

    A down hole logging tool featuring a neutron generator, an acoustic disturbance generator, and a radiation detection system is described. An array of acoustic magnetostriction transducers is arranged about the target of a neutron accelerator. Two gamma ray sensors are separated from the accelerator target by shielding. According to the method of the invention, the underground fluid at the level of a formation is bombarded by neutrons which react with oxygen in the fluid to produce unstable nitrogen 16 particles according to the reaction 16 O(n,p) 16 N. Acoustic pulses are communicated to the fluid, and are incident on the boundary of the borehole at the formation. The resulting net flow of fluid across the boundary is determined from radiation detection measurements of the decaying 16 N particles in the fluid. A measure of the permeability of the formation is obtained from the determination of net fluid flow across the boundary

  4. Pulsed radiation decay logging

    International Nuclear Information System (INIS)

    Mills, W.R. Jr.

    1983-01-01

    There are provided new and improved well logging processes and systems wherein the detection of secondary radiation is accomplished during a plurality of time windows in a manner to accurately characterize the decay rate of the secondary radiation. The system comprises a well logging tool having a primary pulsed radiation source which emits repetitive time-spaced bursts of primary radiation and detector means for detecting secondary radiation resulting from the primary radiation and producing output signals in response to the detected radiation. A plurality of measuring channels are provided, each of which produces a count rate function representative of signals received from the detector means during successive time windows occurring between the primary radiation bursts. The logging system further comprises means responsive to the measuring channels for producing a plurality of functions representative of the ratios of the radiation count rates measured during adjacent pairs of the time windows. Comparator means function to compare the ratio functions and select at least one of the ratio functions to generate a signal representative of the decay rate of the secondary radiation

  5. Digital-to-analog device for continuous detection of neutron damping decrement in logging

    International Nuclear Information System (INIS)

    Sokolov, Yu.I.; Zinchenko, A.I.; Rudenko, Eh.L.

    1976-01-01

    Algorithms are analyzed for a continuous detection of the damping decrement (DD) of the thermal neutron density in time, characterizing absorptive and diffusion properties of a bed; an an automated measuring device has been developed. The design of a digital calculator involving reguired mathematical and logical operations in the DD measurement by the specified algorithms necessitated the use of a system of elements with a diode-transistor RC logic. Following laboratory tests the mock-up of the calculator was subjected to borehole tests as part of the pulsed neutron logging apparatus of the IGN-4 type. A continuous detection of the DD reciprocal with a parallel recording of the differential and integral curves of pulsed neutron-neutron logging has been performed. The borehole tests revealed the efficiency of the new device and the possibility of its use together with the apparatus of the IGN-4 type

  6. Log-Log Convexity of Type-Token Growth in Zipf's Systems

    Science.gov (United States)

    Font-Clos, Francesc; Corral, Álvaro

    2015-06-01

    It is traditionally assumed that Zipf's law implies the power-law growth of the number of different elements with the total number of elements in a system—the so-called Heaps' law. We show that a careful definition of Zipf's law leads to the violation of Heaps' law in random systems, with growth curves that have a convex shape in log-log scale. These curves fulfill universal data collapse that only depends on the value of Zipf's exponent. We observe that real books behave very much in the same way as random systems, despite the presence of burstiness in word occurrence. We advance an explanation for this unexpected correspondence.

  7. Parametric Roll Resonance Detection using Phase Correlation and Log-likelihood Testing Techniques

    DEFF Research Database (Denmark)

    Galeazzi, Roberto; Blanke, Mogens; Poulsen, Niels Kjølstad

    2009-01-01

    generation warning system the purpose of which is to provide the master with an onboard system able to trigger an alarm when parametric roll is likely to happen within the immediate future. A detection scheme is introduced, which is able to issue a warning within five roll periods after a resonant motion......Real-time detection of parametric roll is still an open issue that is gathering an increasing attention. A first generation warning systems, based on guidelines and polar diagrams, showed their potential to face issues like long-term prediction and risk assessment. This paper presents a second...... started. After having determined statistical properties of the signals at hand, a detector based on the generalised log-likelihood ratio test (GLRT) is designed to look for variation in signal power. The ability of the detector to trigger alarms when parametric roll is going to onset is evaluated on two...

  8. Pulsed neutron porosity logging system

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations and, during the bursts, the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  9. Event storm detection and identification in communication systems

    International Nuclear Information System (INIS)

    Albaghdadi, Mouayad; Briley, Bruce; Evens, Martha

    2006-01-01

    Event storms are the manifestation of an important class of abnormal behaviors in communication systems. They occur when a large number of nodes throughout the system generate a set of events within a small period of time. It is essential for network management systems to detect every event storm and identify its cause, in order to prevent and repair potential system faults. This paper presents a set of techniques for the effective detection and identification of event storms in communication systems. First, we introduce a new algorithm to synchronize events to a single node in the system. Second, the system's event log is modeled as a normally distributed random process. This is achieved by using data analysis techniques to explore and then model the statistical behavior of the event log. Third, event storm detection is proposed using a simple test statistic combined with an exponential smoothing technique to overcome the non-stationary behavior of event logs. Fourth, the system is divided into non-overlapping regions to locate the main contributing regions of a storm. We show that this technique provides us with a method for event storm identification. Finally, experimental results from a commercially deployed multimedia communication system that uses these techniques demonstrate their effectiveness

  10. A quench detection/logging system for the SSCL Magnet Test Laboratory

    International Nuclear Information System (INIS)

    Kim, K.; Coles, M.; Dryer, J.; Lambert, D.

    1994-01-01

    The quench in a magnet describes a process which occurs while the superconductivity state goes to the normal resistive state. The consequence of a quench is the conversion of the stored electromagnetic energy into heat. During this process the initiating point will reach a high temperature, which will char the insulation or melt the conductor and thereby destroy the magnet. To prevent the magnet from being lost, it is standard practice to observe several resistance and/or inductance voltages across the magnet as quench signatures - Detection. When a quench symptom is detected, protection operations are initiated: proper shutdown of the magnet excitation systems and treatment to dilute the heat energy at a spot - Protection. The temperature rise is diluted by firing heaters along the length of the magnet to ensure that the dissipated energy is spread. It is interesting that there is not a significant amount of published research on detection. To afford a more reliable quench detection system, two distinct approaches have been tried in the past: (i) Understanding of the Noise Mechanism and Sub-system Optimization, and (ii) Escaping from the Known Electromagnetic Noises by Observing Optical Waves or Acoustic Waves. The MTL of SSCL confronts a mass-measurement of about 10,000 production magnets. To meet the testing schedule, the false quench detection rate needs to be further optimized while the true quench detection rate remains secure for the magnet measurement safety. To meet these requirements, the authors followed an iterative top-down approach. First they defend the signal and noise characteristics of the quench phenomena by using existing software tools to build a rapid prototype system incorporating all proven functionality of the existing system. Then they further optimize the system through iterative upgrading based on their signal and noise character findings

  11. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  12. A Bayesian model for anomaly detection in SQL databases for security systems

    NARCIS (Netherlands)

    Drugan, M.M.

    2017-01-01

    We focus on automatic anomaly detection in SQL databases for security systems. Many logs of database systems, here the Townhall database, contain detailed information about users, like the SQL queries and the response of the database. A database is a list of log instances, where each log instance is

  13. A quench detection/logging system for the SSCL Magnet Test Laboratory

    International Nuclear Information System (INIS)

    Kim, K.; Coles, M.; Dryer, J.; Lambert, D.

    1993-05-01

    The quench in a magnet describes a process which occurs while the superconductivity state goes to the normal resistive state. The consequence of a quench is the conversion of the stored electromagnetic energy into heat. During this process the initiating point will reach a high temperature, which will char the insulation or melt the conductor and thereby destroy the magnet. To prevent the magnet from being lost, it is standard practice to observe several resistance and/or inductance voltages across the magnet as quench signatures -- detection. When a quench symptom is detected, protection operations are initiated: proper shutdown of the magnet excitation systems and treatment to dilute the heat energy at a spot -- protection. The temperature rise is diluted by firing heaters along the length of the magnet to insure that the dissipated energy is spread. To develop a reliable quench detection system, two distinct approaches have been tried in the past: (i) Understanding of the Noise Mechanism and Sub-system Optimization, and (ii) Escaping from the Known Electromagnetic Noises by Observing Optical Waves or Acoustic Waves. The MTL of SSCL confronts a mass-measurement of about 10,000 production magnets. To meet the testing schedule, the false quench detection rate needs to be further optimized while the true quench detection rate remains secure for the magnet measurement safety. To meet these requirements, we followed an iterative top-down approach. First we defined the signal and noise characteristics of the quench phenomena by using existing software tools to build a rapid prototype system incorporating all proven functionality of the existing system. Then we further optimize the system through iterative upgrading based on our signal and noise character findings

  14. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography

    International Nuclear Information System (INIS)

    Longuetaud, F.

    2005-10-01

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  15. Noninvasive detection of inhomogeneities in turbid media with time-resolved log-slope analysis

    International Nuclear Information System (INIS)

    Wan, S.K.; Guo Zhixiong; Kumar, Sunil; Aber, Janice; Garetz, B.A.

    2004-01-01

    Detecting foreign objects embedded in turbid media using noninvasive optical tomography techniques is of great importance in many practical applications, such as in biomedical imaging and diagnosis, safety inspection on aircrafts and submarines, and LIDAR techniques. In this paper we develop a novel optical tomography approach based on slope analysis of time-resolved back-scattered signals collected at the medium boundaries where the light source is an ultrafast, short-pulse laser. As the optical field induced by the laser-pulse propagates, the detected temporal signals are influenced by the optical properties of the medium traversed. The detected temporal signatures therefore contain information that can indicate the presence of an inhomogeneity as well as its size and location relative to the laser source and detection systems. The log-slope analysis of the time-resolved back-scattered intensity is shown to be an effective method for extracting the information contained in the signal. The technique is validated by experimental results and by Monte Carlo simulations

  16. Computer-based system for acquisition of nuclear well log data

    International Nuclear Information System (INIS)

    Meisner, J.E.

    1983-01-01

    There is described a computer-based well logging system, for acquiring nuclear well log data, including gamma ray energy spectrum and neutron population decay rate data, and providing a real-time presentation of the data on an operator's display based on a traversal by a downhole instrument of a prescribed borehole depth interval. The system has a multichannel analyzer including a pulse height analyzer and a memory. After a spectral gamma ray pulse signal coming from a downhole instrument over a logging cable is amplified and conditioned, the pulse height analyzer converts the pulse height into a digital code by peak detection, sample-and-hold action, and analog-to-digital conversion. The digital code defines the address of a memory location or channel, corresponding to a particular gamma ray energy and having a count value to be incremented. The spectrum data is then accessed by the system central processing unit (CPU) for analysis, and routed to the operator's display for presentation as a plot of relative gamma ray emissions activity versus energy level. For acquiring neutron decay rate data, the system has a multichannel scaling unit including a memory and a memory address generator. After a burst of neutrons downhole, thermal and epithermal neutron detector pulses build up and die away. Using the neutron source trigger as an initializing reference, the address generator produces a sequence of memory address codes, each code addressing the memory for a prescribed period of time, so as to define a series of time slots. A detector pulse signal produced during a time slot results in the incrementing of the count value in an address memory location. (author)

  17. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  18. When Workflow Management Systems and Logging Systems Meet: Analyzing Large-Scale Execution Traces

    Energy Technology Data Exchange (ETDEWEB)

    Gunter, Daniel

    2008-07-31

    This poster shows the benefits of integrating a workflow management system with logging and log mining capabilities. By combing two existing, mature technologies: Pegasus-WMS and Netlogger, we are able to efficiently process execution logs of earthquake science workflows consisting of hundreds of thousands to one million tasks. In particular we show results of processing logs of CyberShake, a workflow application running on the TeraGrid. Client-side tools allow scientists to quickly gather statistics about a workflow run and find out which tasks executed, where they were executed, what was their runtime, etc. These statistics can be used to understand the performance characteristics of a workflow and help tune the execution parameters of the workflow management system. This poster shows the scalability of the system presenting results of uploading task execution records into the system and by showing results of querying the system for overall workflow performance information.

  19. Well logging system with linearity control

    International Nuclear Information System (INIS)

    Jones, J.M.

    1973-01-01

    Apparatus is described for controlling the gain of a nuclear well logging system comprising: (1) means for measuring the energy spectrum of gamma rays produced by earth formation materials surrounding a well borehole; (2) means for measuring the number of counts of a gamma rays having an energy falling within each of at least two predetermined energy band portions of the gamma ray energy spectrum; (3) means for generating a signal proportional to the ratio of the gamma ray counts and for comparing the ratio signal with at least one constant ratio calibration signal; (4) means for generating an error signal representative of the difference of the ratio signal and the constant ratio calibration signal; and (5) means for using the error signal to control the linearity of the well logging system. (author)

  20. Development of an Intelligent System to Synthesize Petrophysical Well Logs

    Directory of Open Access Journals (Sweden)

    Morteza Nouri Taleghani

    2013-07-01

    Full Text Available Porosity is one of the fundamental petrophysical properties that should be evaluated for hydrocarbon bearing reservoirs. It is a vital factor in precise understanding of reservoir quality in a hydrocarbon field. Log data are exceedingly crucial information in petroleum industries, for many of hydrocarbon parameters are obtained by virtue of petrophysical data. There are three main petrophysical logging tools for the determination of porosity, namely neutron, density, and sonic well logs. Porosity can be determined by the use of each of these tools; however, a precise analysis requires a complete set of these tools. Log sets are commonly either incomplete or unreliable for many reasons (i.e. incomplete logging, measurement errors, and loss of data owing to unsuitable data storage. To overcome this drawback, in this study several intelligent systems such as fuzzy logic (FL, neural network (NN, and support vector machine are used to predict synthesized petrophysical logs including neutron, density, and sonic. To accomplish this, the petrophysical well logs data were collected from a real reservoir in one of Iran southwest oil fields. The corresponding correlation was obtained through the comparison of synthesized log values with real log values. The results showed that all intelligent systems were capable of synthesizing petrophysical well logs, but SVM had better accuracy and could be used as the most reliable method compared to the other techniques.

  1. SU-E-T-392: Evaluation of Ion Chamber/film and Log File Based QA to Detect Delivery Errors

    International Nuclear Information System (INIS)

    Nelson, C; Mason, B; Kirsner, S; Ohrt, J

    2015-01-01

    Purpose: Ion chamber and film (ICAF) is a method used to verify patient dose prior to treatment. More recently, log file based QA has been shown as an alternative for measurement based QA. In this study, we delivered VMAT plans with and without errors to determine if ICAF and/or log file based QA was able to detect the errors. Methods: Using two VMAT patients, the original treatment plan plus 7 additional plans with delivery errors introduced were generated and delivered. The erroneous plans had gantry, collimator, MLC, gantry and collimator, collimator and MLC, MLC and gantry, and gantry, collimator, and MLC errors. The gantry and collimator errors were off by 4 0 for one of the two arcs. The MLC error introduced was one in which the opening aperture didn’t move throughout the delivery of the field. For each delivery, an ICAF measurement was made as well as a dose comparison based upon log files. Passing criteria to evaluate the plans were ion chamber less and 5% and film 90% of pixels pass the 3mm/3% gamma analysis(GA). For log file analysis 90% of voxels pass the 3mm/3% 3D GA and beam parameters match what was in the plan. Results: Two original plans were delivered and passed both ICAF and log file base QA. Both ICAF and log file QA met the dosimetry criteria on 4 of the 12 erroneous cases analyzed (2 cases were not analyzed). For the log file analysis, all 12 erroneous plans alerted a mismatch in delivery versus what was planned. The 8 plans that didn’t meet criteria all had MLC errors. Conclusion: Our study demonstrates that log file based pre-treatment QA was able to detect small errors that may not be detected using an ICAF and both methods of were able to detect larger delivery errors

  2. Copy-move forgery detection utilizing Fourier-Mellin transform log-polar features

    Science.gov (United States)

    Dixit, Rahul; Naskar, Ruchira

    2018-03-01

    In this work, we address the problem of region duplication or copy-move forgery detection in digital images, along with detection of geometric transforms (rotation and rescale) and postprocessing-based attacks (noise, blur, and brightness adjustment). Detection of region duplication, following conventional techniques, becomes more challenging when an intelligent adversary brings about such additional transforms on the duplicated regions. In this work, we utilize Fourier-Mellin transform with log-polar mapping and a color-based segmentation technique using K-means clustering, which help us to achieve invariance to all the above forms of attacks in copy-move forgery detection of digital images. Our experimental results prove the efficiency of the proposed method and its superiority to the current state of the art.

  3. Comparison between moving and stationary transmitter systems in induction logging

    Science.gov (United States)

    Poddar, M.; Caleb Dhanasekaran, P.; Prabhakar Rao, K.

    1985-09-01

    In a general treatment of the theory of induction logging, an exact integral representation has been obtained for the mutual impedance between a vertical dipole transmitter and a coaxial dipole receiver in a three layered earth. Based on this representation, a computer model has been devised using the traditional Slingram system of induction logging and the comparatively new Turam system, ignoring borehole effects. The model results indicate that due to its much larger response, the Turam system is in general preferable to the Slingram in mineral and groundwater investigations where formation conductivity much less than 1 S/m is generally encountered. However, if the surrounding media are conductive (more than 0.1 S/m), the Turam system suffers from large amplitude attenuation and phase rotation of the primary field caused by the conductive surrounding, and is less useful than the Slingram system which does not so suffer, unless the target bed is shallow. Because it is a more complex function of system parameters than the corresponding Slingram log, a Turam log can be conveniently interpreted only by the modern inverse method using a fast algorithm for the forward solution and a high speed digital computer.

  4. Plant inspection tours with mobile data logging system

    International Nuclear Information System (INIS)

    Roesser, U.

    2006-01-01

    The MDE Mobile Data Logging System has been introduced in a number of German power plants for efficient logging, evaluation, and quality-assured documentation of data recorded on plant inspection tours by means of pocket PCs instead of slips of paper. It will be installed in other nuclear power plants in the near future. The MDE system is composed of the pocket PCs for logging data during plant inspection tours, the associated docking stations installed in the respective areas of application, one PC or, if necessary, several PCs with the appropriate user software, and the associated network links. To install the software in the power plant, lists of rooms and measurement stations as well as other positions on an inspection course are transmitted to the MDE system. When the system has been commissioned, inspection tours are planned in accordance with past experience and optimized in the computer. User experience is taken into account in program updates. New functions improve user comfort and ease of evaluation. Additions to the MDE software, and applications in other areas, are tentatively planned and will be implemented as the need arises. (orig.)

  5. LogScope

    Science.gov (United States)

    Havelund, Klaus; Smith, Margaret H.; Barringer, Howard; Groce, Alex

    2012-01-01

    LogScope is a software package for analyzing log files. The intended use is for offline post-processing of such logs, after the execution of the system under test. LogScope can, however, in principle, also be used to monitor systems online during their execution. Logs are checked against requirements formulated as monitors expressed in a rule-based specification language. This language has similarities to a state machine language, but is more expressive, for example, in its handling of data parameters. The specification language is user friendly, simple, and yet expressive enough for many practical scenarios. The LogScope software was initially developed to specifically assist in testing JPL s Mars Science Laboratory (MSL) flight software, but it is very generic in nature and can be applied to any application that produces some form of logging information (which almost any software does).

  6. E-log system in monitoring of residency program: trainees perspective

    International Nuclear Information System (INIS)

    Iqbal, U.; Gondal, K.M.

    2015-01-01

    To record residents perspective about the utility of newly introduced E-Log system at the College of Physicians and Surgeons Pakistan (CPSP). Study Design: Sequential mixed method design using survey questionnaire and in-depth interviews. Place and Duration of Study: CPSP, Regional Center, Lahore, from March to June 2014. Methodology: Data was collected from registered trainees through a web-based survey questionnaire on a scale of 1 to 7 about the utility of E-log system. In-depth interviews were conducted with 7 students using non-probability purposive sampling. The interviews were tape recorded and subsequently transcribed. Quantitative data was analyzed using SPSS version 20 and qualitative data was analyzed using content analysis by identifying themes and patterns. Results: A total of 4399 responses were received. Motivation was 4.61± 1.98; 4.33 ± 2.00 remained acknowledgment of control of one's training by the new system. Ease of use got a mean score of 4.56 ± 2.15. Conclusion: The overall acceptance of the students regarding E-Log system was high. Scheduling IT workshop at the start of training will add to the student satisfaction regarding utility of E-Log system. (author)

  7. Application of the electric discharge logging system; Hodenshiki jiban tansa system no tekiyo

    Energy Technology Data Exchange (ETDEWEB)

    Kudo, K; Yasuda, N [Tokyo Electric Power Co. Inc., Tokyo (Japan); Kuniyasu, T; Kanda, K; Naito, Y; Tanaka, T

    1997-10-22

    In the process of developing an electric discharge logging system, the advantage over other methods has become clear of P-wave initial amplitude damping coefficient analysis which is accomplished by measuring P-wave velocity in a hard rockbed and examining oscillation receiver bone sensitivity on the spot. In the hope of furthering the advantage, attention is paid to cracks in the rockbed that are deemed to influence damping, and the measurements by the subject system are compared with BSS measurements recorded at a K underground power station. The results of the analysis of P-wave initial amplitude damping coefficients, determined by the electric discharge logging system operated in a measuring hole provided in the cavity accommodating the station main equipment, disclose that there exists a high-coefficient region deeper in the ground where a part of the rockbed is weak. That is, it is inferred that the wide-range variation in damping coefficient detected at levels deeper than the 20.5m-deep hole dug in the arch enlargement corresponds to looseness in the rockbed. Cracks in the BSS records are grouped by aperture width, inclination angle, and strike. The rate of contribution to P-wave initial amplitude damping of each class of cracks is accepted as what shows the geological conditions surrounding the station for the formulation of schematic diagrams exhibiting cracks along the W-E axis and N-S axis. 4 refs., 15 figs.

  8. A selective logging mechanism for hardware transactional memory systems

    OpenAIRE

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María

    2011-01-01

    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  9. Pulsed neutron uranium borehole logging with prompt fission neutrons

    International Nuclear Information System (INIS)

    Bivens, H.M.; Smith, G.W.; Jensen, D.H.

    1976-01-01

    The gross count natural gamma log normally used for uranium borehole logging is seriously affected by disequilibrium. Methods for the direct measurement of uranium, such as neutron logging, which are not affected by disequilibrium have been the object of considerable effort in recent years. This paper describes a logging system for uranium which uses a small accelerator to generate pulses of 14 MeV neutrons to detect and assay uranium by the measurement of prompt fission neutrons in the epithermal energy range. After an initial feasibility study, a prototype logging probe was built for field evaluation which began in January 1976. Physical and operational characteristics of the prototype probe, the neutron tube-transformer assembly, and the neutron tube are described. In logging operations, only the epithermal prompt fission neutrons detected between 250 microseconds to 2500 microseconds following the excitation neutron pulse are counted. Comparison of corrected neutron logs with the conventional gross count natural gamma logs and the chemical assays of cores from boreholes are shown. The results obtained with this neutron probe clearly demonstrate its advantages over the gross count natural gamma log, although at this time the accuracy of the neutron log assay is not satisfactory under some conditions. The necessary correction factors for various borehole and formation parameters are being determined and, when applied, should improve the assay accuracy

  10. Features of the electric discharge logging system; Hoden hoshiki jiban tansa system no tokucho

    Energy Technology Data Exchange (ETDEWEB)

    Kudo, K; Yasuda, N [Tokyo Electric Power Co. Inc., Tokyo (Japan); Kuniyasu, T; Kanda, K; Tanaka, T

    1997-10-22

    Logging system has been developed, which performs discharge in the water in a bore hole relatively small in diameter. The part of this system to operate in the hole consists of an oscillator that triggers off discharge in the water and an oscillation receiving set that utilizes electrostriction proper to ceramics. The groundborne part of the system is comprised of a probe lift control and logging control. The logging process is carried out by causing discharge in the water in a bore hole filled with water. The energy generated by the oscillator is far greater than that produced in the sonic logging or suspension type logging method, and the wave generated and propagated in the hole is received by the receiving set in the same hole. The result indicates that the P-wave velocity in a hard rockbed is rather high and that values obtained on the spot by this system is quite similar to those obtained from the core sample from the hole. In the case of a rock bed abundant in cracks, thanks to the high S/N ratio such a bed presents and the merits of digital recording, investigations can be minutely conducted. The merit of this system is found in that it can damp the amplitude in dealing with the data collected on the spot. 3 refs., 7 figs.

  11. Nova Event Logging System

    International Nuclear Information System (INIS)

    Calliger, R.J.; Suski, G.J.

    1981-01-01

    Nova is a 200 terawatt, 10-beam High Energy Glass Laser currently under construction at LLNL. This facility, designed to demonstrate the feasibility of laser driven inertial confinement fusion, contains over 5000 elements requiring coordinated control, data acquisition, and analysis functions. The large amounts of data that will be generated must be maintained over the life of the facility. Often the most useful but inaccessible data is that related to time dependent events associated with, for example, operator actions or experiment activity. We have developed an Event Logging System to synchronously record, maintain, and analyze, in part, this data. We see the system as being particularly useful to the physics and engineering staffs of medium and large facilities in that it is entirely separate from experimental apparatus and control devices. The design criteria, implementation, use, and benefits of such a system will be discussed

  12. Geothermal well log interpretation midterm report

    Energy Technology Data Exchange (ETDEWEB)

    Sanyal, S.K.; Wells, L.E.; Bickham, R.E.

    1979-02-01

    Reservoir types are defined according to fluid phase and temperature, lithology, geologic province, pore geometry, and salinity and fluid chemistry. Improvements are needed in lithology and porosity definition, fracture detection, and thermal evaluation for more accurate interpretation. Further efforts are directed toward improving diagnostic techniques for relating rock characteristics and log response, developing petrophysical models for geothermal systems, and developing thermal evaluation techniques. The Geothermal Well Log Interpretation study and report has concentrated only on hydrothermal geothermal reservoirs. Other geothermal reservoirs (hot dry rock, geopressured, etc.) are not considered.

  13. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  14. Parental perceptions of the learner driver log book system in two Australian states.

    Science.gov (United States)

    Bates, Lyndel; Watson, Barry; King, Mark Johann

    2014-01-01

    Though many jurisdictions internationally now require learner drivers to complete a specified number of hours of supervised driving practice before being able to drive unaccompanied, very few require learner drivers to complete a log book to record this practice and then present it to the licensing authority. Learner drivers in most Australian jurisdictions must complete a log book that records their practice, thereby confirming to the licensing authority that they have met the mandated hours of practice requirement. These log books facilitate the management and enforcement of minimum supervised hours of driving requirements. Parents of learner drivers in 2 Australian states, Queensland and New South Wales, completed an online survey assessing a range of factors, including their perceptions of the accuracy of their child's learner log book and the effectiveness of the log book system. The study indicates that the large majority of parents believe that their child's learner log book is accurate. However, they generally report that the log book system is only moderately effective as a system to measure the number of hours of supervised practice a learner driver has completed. The results of this study suggest the presence of a paradox, with many parents possibly believing that others are not as diligent in the use of log books as they are or that the system is too open to misuse. Given that many parents report that their child's log book is accurate, this study has important implications for the development and ongoing monitoring of hours of practice requirements in graduated driver licensing systems.

  15. A neutron well logging system

    International Nuclear Information System (INIS)

    1980-01-01

    A pulsed neutron well logging system using a sealed off neutron generator tube is provided with a programmable digital neutron output control system. The control system monitors the target beam current and compares a function of this current with a pre-programmed control function to develop a control signal for the neutron generator. The control signal is used in a series regulator to control the average replenisher current of the neutron generator tube. The programmable digital control system of the invention also provides digital control signals as a function of time to provide ion source voltages. This arrangement may be utilized to control neutron pulses durations and repetition rates or to produce other modulated wave forms for intensity modulating the output of the neutron generator as a function of time. (Auth.)

  16. Development of a crosshole sonic logging system for the integrity test of cast-in-situ piles

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Tai-Sup; Sung, Nak-Hoon; Hwang, Hak-Soo [Korea Institute of Geoscience and Mineral Resources, Taejeon(Korea)

    2001-09-01

    To evaluate the integrity of cast-in-situ concrete piles, a notebook PC-based crosshole sonic logging system which can be handled by one operator was developed using PCMCIA-type analog to digital converter card. User-interactive software for operation of the system were also developed using Labview. The system was tested with the field model pile to confirm the performance of the developed system. The test result shows that the system is very stable and efficient for detecting defects of the pile. (author). 3 refs., 9 figs.

  17. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    OpenAIRE

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-01-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US?Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3%...

  18. Reducing the risk of cyber threats in utilities through log management

    Energy Technology Data Exchange (ETDEWEB)

    Patnaik, A. [ArcSight, Cupertino, CA (United States)

    2010-01-15

    Electrical blackouts caused by terrorists hacking into targeted control systems have already occurred in Brazil. A patchwork of security tools is needed to reduce potential threats. The continuous collection and analysis of data is also needed to detect cyber threats. The real time correlation of logs across all systems, applications and users is needed to ensure the reliability and security of the power grid. Solutions must also integrate well with identity management sources in order to prevent remote access account hijacking. Effective log management can be used to detect threats and reduce the risk of power outages. 1 fig.

  19. A simulation-based approach for evaluating logging residue handling systems.

    Science.gov (United States)

    B. Bruce Bare; Benjamin A. Jayne; Brian F. Anholt

    1976-01-01

    Describes a computer simulation model for evaluating logging residue handling systems. The flow of resources is traced through a prespecified combination of operations including yarding, chipping, sorting, loading, transporting, and unloading. The model was used to evaluate the feasibility of converting logging residues to chips that could be used, for example, to...

  20. Generalized localization for the double trigonometric Fourier series and the Walsh-Fourier series of functions in L log +L log + log +L

    International Nuclear Information System (INIS)

    Bloshanskaya, S K; Bloshanskii, I L; Roslova, T Y

    1998-01-01

    For an arbitrary open set Ω subset of I 2 =[0,1) 2 and an arbitrary function f element of L log + L log + log + L(I 2 ) such that f=0 on Ω the double Fourier series of f with respect to the trigonometric system Ψ=E and the Walsh-Paley system Ψ=W is shown to converge to zero (over rectangles) almost everywhere on Ω. Thus, it is proved that generalized localization almost everywhere holds on arbitrary open subsets of the square I 2 for the double trigonometric Fourier series and the Walsh-Fourier series of functions in the class L log + L log + log + L (in the case of summation over rectangles). It is also established that such localization breaks down on arbitrary sets that are not dense in I 2 , in the classes Φ Ψ (L)(I 2 ) for the orthonormal system Ψ=E and an arbitrary function such that Φ E (u)=o(u log + log + u) as u→∞ or for Φ W (u)=u( log + log + u) 1-ε , 0<ε<1

  1. A risk index for multicriterial selection of a logging system with low environmental impact

    Energy Technology Data Exchange (ETDEWEB)

    Horodnic, Sergiu Andrei, E-mail: horodnic@usv.ro

    2015-02-15

    Setting up the working stages in forest operations is conditioned by environmental protection and forest health requirements. This paper exposes a method for improving the decision-making process by choosing the most environmentally effective logging systems according to terrain configuration and stand characteristics. Such a methodology for selecting machines or logging systems accounting for environment, safety as well as economics, becomes mandatory in the context of sustainable management of forest with multiple functions. Based on analytic hierarchy process analysis the following classification of the environmental performance for four considered alternatives was obtained: skyline system (42.43%), forwarder system (20.22%), skidder system (19.92%) and horse logging system (17.43%). Further, an environmental risk matrix for the most important 28 risk factors specific to any work equipment used in forest operations was produced. In the end, a multicriterial analysis generated a risk index RI ranging between 1.0 and 3.5, which could help choosing the optimal combination of logging system and logging equipment with low environmental impact. In order to demonstrate the usefulness of the proposed approach, a simple application in specific conditions of a harvesting site is presented. - Highlights: • We propose a decision-making algorithm to select eco-friendly logging systems. • Analytic hierarchy process was applied for ranking 4 types of logging systems. • An environmental risk matrix with 28 risk factors in forest operations was made up.

  2. A risk index for multicriterial selection of a logging system with low environmental impact

    International Nuclear Information System (INIS)

    Horodnic, Sergiu Andrei

    2015-01-01

    Setting up the working stages in forest operations is conditioned by environmental protection and forest health requirements. This paper exposes a method for improving the decision-making process by choosing the most environmentally effective logging systems according to terrain configuration and stand characteristics. Such a methodology for selecting machines or logging systems accounting for environment, safety as well as economics, becomes mandatory in the context of sustainable management of forest with multiple functions. Based on analytic hierarchy process analysis the following classification of the environmental performance for four considered alternatives was obtained: skyline system (42.43%), forwarder system (20.22%), skidder system (19.92%) and horse logging system (17.43%). Further, an environmental risk matrix for the most important 28 risk factors specific to any work equipment used in forest operations was produced. In the end, a multicriterial analysis generated a risk index RI ranging between 1.0 and 3.5, which could help choosing the optimal combination of logging system and logging equipment with low environmental impact. In order to demonstrate the usefulness of the proposed approach, a simple application in specific conditions of a harvesting site is presented. - Highlights: • We propose a decision-making algorithm to select eco-friendly logging systems. • Analytic hierarchy process was applied for ranking 4 types of logging systems. • An environmental risk matrix with 28 risk factors in forest operations was made up

  3. Cross-system log file analysis for hypothesis testing

    NARCIS (Netherlands)

    Glahn, Christian

    2008-01-01

    Glahn, C. (2008). Cross-system log file analysis for hypothesis testing. Presented at Empowering Learners for Lifelong Competence Development: pedagogical, organisational and technological issues. 4th TENCompetence Open Workshop. April, 10, 2008, Madrid, Spain.

  4. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom

    2007-01-01

    While logging events is becoming increasingly common in computing, in communication and in collaborative work, log systems need to satisfy increasingly challenging (if not conflicting) requirements.Despite the growing pervasiveness of log systems, to date there is no high-level framework which

  5. The Meaning of Logs

    NARCIS (Netherlands)

    Etalle, Sandro; Massacci, Fabio; Yautsiukhin, Artsiom; Lambrinoudakis, Costas; Pernul, Günther; Tjoa, A Min

    While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not conflicting) requirements. In this paper we propose a high-level framework for modeling log systems, and reasoning about

  6. Assessment of procurement systems for unutilized logging residues ...

    African Journals Online (AJOL)

    ... in the forest after clear-cutting operation with cutto- length harvesting method. ... as system-2 can be preferable for the initial supply chain configuration in Turkey. ... Key words: logging residue, forest biomass, chipping, supply cost, biomass ...

  7. Application of nuclear logging to porosity studies in Itaborai basin

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Milena F.S.; Lima, Inaya; Lopes, Ricardo Tadeu, E-mail: milena@lin.ufrj.br, E-mail: inaya@lin.ufrj.br, E-mail: ricardo@lin.ufrj.br [Coordenacao dos Programas de Pos-Graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Lab. de Instrumentacao Nuclear; Ferrucio, Paula Lucia; Borghi, Leonardo, E-mail: ferrucio@acd.ufrj.br, E-mail: borghi@ufrj.br [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Inst. de Geociencias. Dept. de Geologia; Abreu, Carlos Jorge, E-mail: jo_abreu@unb.br [Universidade de Brasilia (UnB), DF (Brazil). Inst. de Geociencias

    2011-07-01

    Nuclear logging provides information on bulk density and porosity variations by measuring the intensity of the scattered radiation induced on the formation by radioactive sources. In this study, nuclear logging was employed to analyze the pore-space system of the 2-ITAB-1-RJ well placed on the Itaborai limestone basin, in the state of Rio de Janeiro. This is one of the smallest sedimentary basin in Brazil and it is formed by clastic deposits and travertine limestone rocks which are fractured. Understanding the pore-space system of carbonate rocks has become important subject for the oil industry, specially in Brazil. A Density Gamma Probe (LSD) and a Neutron Probe (NEUT) were used for data acquisition, which nuclear logging was carried out in part of the well, with continuous detection for about 50 m of deep. The detection speed was 4 m/min for the LSD and 5 m/min for the NEUT. The results obtained by nuclear logging showed that the 2-ITAB-1-RJ well consists of three different intervals with rocks ranging from low to moderate porosity present in travertine, marls and gneisses. (author)

  8. Response transforms from comparative study of commercial pulsed-neutron-capture logging systems

    International Nuclear Information System (INIS)

    Salaita, G.N.

    1992-01-01

    This paper reports that three generations of Schlumberger's Thermal Decay Time (TDT SM ) logging devices - viz., TDT-K, TDT-M, and TDT-P - along with an Atlas Wireline PDK-100 SM system were run in a Saudi Aramco well. The wellbore (8 1/2 in. with 7-in. casing) penetrated a sequence of clean sand, shaly sand, and shale streaks as exhibited by the openhole natural gamma ray log. The initial wellbore fluid was diesel. The fluid was then changed to brines of 42,000 and 176,000 ppm NaCl, respectively. Three repeat passes at a logging speed of 900 ft/hr were obtained by each device for each borehole liquid. As a result of this extensive comparative study, a set of departure curves and mathematical transforms was developed primarily for standardizing the various Schlumberger tools to a common reference logging system and/or borehole environment. The transforms were used beneficially to determine residual oil saturation (ROS) from time-lapse logs in a Saudi Aramco reservoir

  9. Simultaneous thermal neutron decay time and porosity logging system

    International Nuclear Information System (INIS)

    Schultz, W.E.; Smith, H.D.; Smith, M.P.

    1980-01-01

    An improved method and apparatus are described for simultaneously measuring the porosity and thermal neutron capture cross section of earth formations in situ in the vicinity of a well borehole using pulsed neutron well logging techniques. The logging tool which is moved through the borehole consists of a 14 MeV pulsed neutron source, an epithermal neutron detector and a combination gamma ray and fast neutron detector. The associated gating systems, counters and combined digital computer are sited above ground. (U.K.)

  10. Fiber-optic data-transmission system for borehole logging. Final report. National Uranium Resource Evaluation

    International Nuclear Information System (INIS)

    Gould, G.

    1981-01-01

    The purpose of the system is to provide signal transmission media for transmission of digital data from a borehole logging probe (and associated processor-electronics) to a borehole logging truck at the surface. This fiber optic transmission system is specifically designed for use on the Bendix Field Engineering Corp. (BFEC) R and D logging truck

  11. Log-Less Metadata Management on Metadata Server for Parallel File Systems

    Directory of Open Access Journals (Sweden)

    Jianwei Liao

    2014-01-01

    Full Text Available This paper presents a novel metadata management mechanism on the metadata server (MDS for parallel and distributed file systems. In this technique, the client file system backs up the sent metadata requests, which have been handled by the metadata server, so that the MDS does not need to log metadata changes to nonvolatile storage for achieving highly available metadata service, as well as better performance improvement in metadata processing. As the client file system backs up certain sent metadata requests in its memory, the overhead for handling these backup requests is much smaller than that brought by the metadata server, while it adopts logging or journaling to yield highly available metadata service. The experimental results show that this newly proposed mechanism can significantly improve the speed of metadata processing and render a better I/O data throughput, in contrast to conventional metadata management schemes, that is, logging or journaling on MDS. Besides, a complete metadata recovery can be achieved by replaying the backup logs cached by all involved clients, when the metadata server has crashed or gone into nonoperational state exceptionally.

  12. Simultaneous thermal neutron decay time and porosity logging system

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1979-01-01

    A simultaneous pulsed neutron porosity and thermal neutron capture cross section logging system is provided for radiological well logging of subsurface earth formations. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector, and a combination gamma ray and fast neutron detector is moved through a borehole. Repetitive bursts of neutrons irradiate the earth formations; and, during the bursts, the fast neutron and epithermal neutron populations are sampled. During the interval between bursts the thermal neutron capture gamma ray population is sampled in two or more time intervals. The fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity phi. The capture gamma ray measurements are combined to provide a simultaneous determination of the thermal neutron capture cross section Σ

  13. Earth formation pulsed neutron porosity logging system utilizing epithermal neutron and inelastic scattering gamma ray detectors

    International Nuclear Information System (INIS)

    Smith, H.D. Jr.; Smith, M.P.; Schultz, W.E.

    1978-01-01

    An improved pulsed neutron porosity logging system is provided in the present invention. A logging tool provided with a 14 MeV pulsed neutron source, an epithermal neutron detector and an inelastic scattering gamma ray detector is moved through a borehole. The detection of inelastic gamma rays provides a measure of the fast neutron population in the vicinity of the detector. repetitive bursts of neutrons irradiate the earth formation and, during the busts, inelastic gamma rays representative of the fast neutron population is sampled. During the interval between bursts the epithermal neutron population is sampled along with background gamma radiation due to lingering thermal neutrons. the fast and epithermal neutron population measurements are combined to provide a measurement of formation porosity

  14. Zope based electronic operation log system - Zlog

    International Nuclear Information System (INIS)

    Yoshii, K.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    Since January 2004, the Zope based electronic operation logging system, named Zlog, has been running at the KEKB and AR accelerator facilities. Since Zope is the python based open source web application server software and python language is familiar for the members in the KEKB accelerator control group, we have developed the Zlog system rapidly. In this paper, we report the development history and the present status of Zlog system. Also we show some general plug-in components, called Zope products, have been useful for our Zlog development. (author)

  15. Method for detecting fractures in formations surroundingearth boreholes

    International Nuclear Information System (INIS)

    Fertl, W.H.

    1979-01-01

    A well is first logged with gamma ray detection system to provide a base log. Fluid containing salt of potassium, uranium or thorium is then injected into the well opposite the interval of interest. When the well head pressure is increased, some of the injected fluid will move into the fracture or other highly permeable localized zones. The gamma ray detection system is then run again one or more times through the well to provide a log which is compared with the base log. The fracture is detected by localized drastically higher readings observed on the repeat run of the gamma ray detection logging system

  16. Development of response transforms from comparative study of commercial pulsed neutron capture logging systems

    International Nuclear Information System (INIS)

    Salaita, G.N.; Youngblood, W.E.

    1991-01-01

    This paper reports that the absence of a common calibration facility to ascertain the accuracy of commercial pulsed neutron capture logging systems, coupled with the desire for more accurate saturation determination from time-lapse logs, prompted Saudi Aramco to carry out this comparative study. Three generations of Schlumberger's Thermal Decay Time (TDT) logging devices, viz., TDT-K, TDT-M, and TDT-P along with Atlas Wireline PDK-100 system were run in an Aramco well. The wellbore 8-1/2 inch with 7-inch casing-penetrated clean sand, shaly sand, and shale streaks sequence as exhibited by the open hole natural gamma ray log. initially, the wellbore fluid was diesel. The fluid was then changed to brines of 42-kppm and 176-kppm NACl, respectively. Three repeat passes at a logging speed of 900 ft/hr were obtained by each device for each of the three borehole liquids. In the case of PDK-100, a second set of log runs was obtained at 1800 ft/hr. The results of this extensive comparative study have increased the author's understanding of the borehole liquid and the diffusion effects on the response of pulsed neutron capture logging systems and also on the relative accuracy and precision of measured formation thermal neutron capture cross section by each system

  17. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  18. Progress in analysis of computed tomography (CT) images of hardwood logs for defect detection

    Science.gov (United States)

    Erol Sarigul; A. Lynn Abbott; Daniel L. Schmoldt

    2003-01-01

    This paper addresses the problem of automatically detecting internal defects in logs using computed tomography (CT) images. The overall purpose is to assist in breakdown optimization. Several studies have shown that the commercial value of resulting boards can be increased substantially if defect locations are known in advance, and if this information is used to make...

  19. Designing efficient logging systems for northern hardwoods using equipment production capabilities and costs.

    Science.gov (United States)

    R.B. Gardner

    1966-01-01

    Describes a typical logging system used in the Lake and Northeastern States, discusses each step in the operation, and presents a simple method for designing and efficient logging system for such an operation. Points out that a system should always be built around the key piece of equipment, which is usually the skidder. Specific equipment types and their production...

  20. High resolution gamma spectroscopy well logging system

    International Nuclear Information System (INIS)

    Giles, J.R.; Dooley, K.J.

    1997-01-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. The absolute counting efficiencies of the GSLS detectors were determined using cylindrical reference sources. More complex borehole geometries were modeled using commercially available shielding software and correction factors were developed based on relative gamma-ray fluence rates. Examination of varying porosity and moisture content showed that as porosity increases, and as the formation saturation ratio decreases, relative gamma-ray fluence rates increase linearly for all energies. Correction factors for iron and water cylindrical shields were found to agree well with correction factors determined during previous studies allowing for the development of correction factors for type-304 stainless steel and low-carbon steel casings. Regression analyses of correction factor data produced equations for determining correction factors applicable to spectral gamma-ray well logs acquired under non-standard borehole conditions

  1. A simple low cost speed log interface for oceanographic data acquisition system

    Digital Repository Service at National Institute of Oceanography (India)

    Khedekar, V.D.; Phadte, G.M.

    A speed log interface is designed with parallel Binary Coded Decimal output. This design was mainly required for the oceanographic data acquisition system as an interface between the speed log and the computer. However, this can also be used as a...

  2. Borehole logging system

    International Nuclear Information System (INIS)

    Allen, L.S.

    1988-01-01

    A radioactive borehole logging tool employs an epithermal neutron detector having a neutron counter surrounded by an inner thermal neutron filter and an outer thermal neutron filter. Located between the inner and outer filters is a neutron moderating material for extending the lifetime of epithermal neutrons to enhance the counting rate of such epithermal neutrons by the neutron counter

  3. Edge Detection from High Resolution Remote Sensing Images using Two-Dimensional log Gabor Filter in Frequency Domain

    International Nuclear Information System (INIS)

    Wang, K; Yu, T; Meng, Q Y; Wang, G K; Li, S P; Liu, S H

    2014-01-01

    Edges are vital features to describe the structural information of images, especially high spatial resolution remote sensing images. Edge features can be used to define the boundaries between different ground objects in high spatial resolution remote sensing images. Thus edge detection is important in the remote sensing image processing. Even though many different edge detection algorithms have been proposed, it is difficult to extract the edge features from high spatial resolution remote sensing image including complex ground objects. This paper introduces a novel method to detect edges from the high spatial resolution remote sensing image based on frequency domain. Firstly, the high spatial resolution remote sensing images are Fourier transformed to obtain the magnitude spectrum image (frequency image) by FFT. Then, the frequency spectrum is analyzed by using the radius and angle sampling. Finally, two-dimensional log Gabor filter with optimal parameters is designed according to the result of spectrum analysis. Finally, dot product between the result of Fourier transform and the log Gabor filter is inverse Fourier transformed to obtain the detections. The experimental result shows that the proposed algorithm can detect edge features from the high resolution remote sensing image commendably

  4. http Log Analysis

    DEFF Research Database (Denmark)

    Bøving, Kristian Billeskov; Simonsen, Jesper

    2004-01-01

    This article documents how log analysis can inform qualitative studies concerning the usage of web-based information systems (WIS). No prior research has used http log files as data to study collaboration between multiple users in organisational settings. We investigate how to perform http log...... analysis; what http log analysis says about the nature of collaborative WIS use; and how results from http log analysis may support other data collection methods such as surveys, interviews, and observation. The analysis of log files initially lends itself to research designs, which serve to test...... hypotheses using a quantitative methodology. We show that http log analysis can also be valuable in qualitative research such as case studies. The results from http log analysis can be triangulated with other data sources and for example serve as a means of supporting the interpretation of interview data...

  5. Cross-system log file analysis for hypothesis testing

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus; Schoonenboom, Judith; Sligte, Henk; Moghnieh, Ayman; Hernández-Leo, Davinia; Stefanov, Krassen; Lemmers, Ruud; Koper, Rob

    2008-01-01

    Glahn, C., Specht, M., Schoonenboom, J., Sligte, H., Moghnieh, A., Hernández-Leo, D. Stefanov, K., Lemmers, R., & Koper, R. (2008). Cross-system log file analysis for hypothesis testing. In H. Sligte & R. Koper (Eds.), Proceedings of the 4th TENCompetence Open Workshop. Empowering Learners for

  6. Examples of detection of water flow by oxygen activation on pulsed neutron logs

    International Nuclear Information System (INIS)

    de Rosset, W.H.M.

    1986-01-01

    Upward flow of water in cased wellbores may be detected with pulsed neutron capture (PNC) and gamma ray (GR) tools. Water entering tubing, casing and flowing behind pipe may similarly be evaluated qualitatively. Gamma ray background anomalies in PNC data and elevation of GR tool response occur when water is flowing above threshold velocities and volumes. The technique requires logging the well under static and flow conditions or logging at different tools speeds in a flowing well. Oxygen activation results in increased gamma ray count rates at each detector. PNC far detector and GR well log curves from each log run (flowing well, static well) are overlain. The increases for each curve are offset from the point of water entry by a distance similar to tool source-detector spacing. These offsets in gamma increase are 15-20 ft. higher for the GR than for the PNC far detector and distinguish oxygen activation due to flowing water from common hot spots. The amount of gamma ray increase is controlled by the velocity of upward flow of water past the tool, the amount of water flowing, and the distance of the flow from the tool. Prior planning is important to gain usable information in flowing wells. The upward relative velocity imposes maximal and minimal tool speeds to produce significant gamma increases, and tool speed must be adjusted to optimize gamma changes. Use of the technique to answer actual production problems is illustrated with examples. Insight was gained which led to the correction of the problem in each case

  7. Theoretical and Numerical Study of Seismoelectric Logs for Logging While Drilling (LWD

    Directory of Open Access Journals (Sweden)

    Sun Xiang-Yang

    2017-01-01

    Full Text Available When the acoustic field propagates in the porous medium, the electromagnetic wave can be induced by the seismoelectric effects which can be used in the logging. This paper studies the seismoelectric wave field and deduces the formulations of the acoustic and electromagnetic field of the liquid in the well, and gives the acoustic and electromagnetic boundary conditions between the driller collar and the log liquid, when the driller collar is added. We also do the numerical simulation of the seismoelectric wave field excited by monopole source, study the velocity dispersion characteristics of the acoustic and electromagnetic field, and investigate the detective depth of the seismoelectric logs. Through the simulation we know the seismoelectric logs can avoid the interference of drill collar wave. This paper also provides theoretical guidance for the design of receiving antenna.

  8. Development of slimline logging systems for coal and mineral exploration

    International Nuclear Information System (INIS)

    Reeves, D.R.

    1976-01-01

    Recently, interest shown by multinational oil companies in mining prospecting has led to the requirement for more sophisticated slimline logging units, capable of given comparable results to conventional systems. Aspects of operating conditions and logging requirements are discussed, with particular reference to the effect on equipment design. Special consideration is given to the design and calibration of gamma ray, density, neutron, caliper and resistivity tools. Methods of handling data are discussed and the general application of these techniques to mineral work is considered

  9. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  10. The log S -log N distribution of gamma ray brust

    International Nuclear Information System (INIS)

    Yamagami, Takamasa; Nishimura, Jun; Fujii, Masami

    1982-01-01

    The relation between the size S and the frequency N of gamma ray burst has been studied. This relation may be determined from the celestial distribution of gamma ray burst sources. The present analysis gives that the log S - log N relation for any direction is determined by the celestial distribution of gamma ray burst sources. The observed bursts were analyzed. The celestial distribution of gamma ray burst sources was observed by the satellites of USSR. The results showed that the distribution seemed to be isotropic. However, the calculated log S - log N relation based on the isotropic distribution wasF in disagreement with the observed ones. As the result of analysis, it was found that the observed bursts missed low energy part because of the threshold of detectors. The levels of discrimination of detection were not clear. When a proper threshold level is set for each type of burst, and the size of bursts is determined, the above mentioned discrepancy will be deleted regardless of luminosity and the spatial distribution of bursts. (Kato, T.)

  11. Design of a transport calculation system for logging sondes simulation

    International Nuclear Information System (INIS)

    Marquez Damian, Jose Ignacio

    2005-01-01

    Analysis of available resources in earth crust is performed by different techniques, one of them is neutron logging. Design of sondes that are used to make such logging is supported by laboratory experiments as well as by numerical calculations.This work presents several calculation schemes, designed to simplify the task of whom has to planify such experiments or optimize parameters of this kind of sondes.These schemes use transport calculation codes, especially DaRT, TORT and MCNP, and cross section processing modules from SCALE system.Additionally a system for DaRT and TORT data postprocessing using OpenDX is presented.It allows scalar flux spatial distribution analysis, as wells as cross section condensation and reaction rates calculation

  12. Controlled sliding of logs downhill by chute system integrated with portable winch and synthetic rope

    Directory of Open Access Journals (Sweden)

    Neşe Gülci

    2016-01-01

    Full Text Available Over 80% of wood extraction operations have been performed by conventional methods in Turkey. Conventional methods include skidding or sliding of logs mainly by man and animal power, which poses problems in terms of technical, economical, environmental, and ergonomic aspects. Skidding wood on plastic chutes has been implemented in limited numbers of logging applications in recent years, and provides important advantages such as reducing environmental damages and minimizing the value and volume loss of transported wood products. In this study, a chute system integrated with a mobile winch was developed for controlled sliding of large diameter logs downhill. In addition, synthetic ropes rather than steel cables were used to pull log products, resulting in a lower weight and more efficient extraction system. The system was tested on a sample wood production operation in Çınarpınar Forest Enterprise Chief of Kahramanmaraş Forest Enterprise Directorate. In the study, productivity analysis of chute system was performed and its ecological impacts were evaluated. During controlled sliding of logs downhill, the highest productivity (10.01 m3/hour was reached in the fourth chute system characterized as 36 m in length and 70% ground slope. One of the main factors that affected the productivity of chute system was the controlled sliding time of the logs. It was found that residual stand damage was very limited during controlled sliding operations.

  13. Catching errors with patient-specific pretreatment machine log file analysis.

    Science.gov (United States)

    Rangaraj, Dharanipathy; Zhu, Mingyao; Yang, Deshan; Palaniswaamy, Geethpriya; Yaddanapudi, Sridhar; Wooten, Omar H; Brame, Scott; Mutic, Sasa

    2013-01-01

    A robust, efficient, and reliable quality assurance (QA) process is highly desired for modern external beam radiation therapy treatments. Here, we report the results of a semiautomatic, pretreatment, patient-specific QA process based on dynamic machine log file analysis clinically implemented for intensity modulated radiation therapy (IMRT) treatments delivered by high energy linear accelerators (Varian 2100/2300 EX, Trilogy, iX-D, Varian Medical Systems Inc, Palo Alto, CA). The multileaf collimator machine (MLC) log files are called Dynalog by Varian. Using an in-house developed computer program called "Dynalog QA," we automatically compare the beam delivery parameters in the log files that are generated during pretreatment point dose verification measurements, with the treatment plan to determine any discrepancies in IMRT deliveries. Fluence maps are constructed and compared between the delivered and planned beams. Since clinical introduction in June 2009, 912 machine log file analyses QA were performed by the end of 2010. Among these, 14 errors causing dosimetric deviation were detected and required further investigation and intervention. These errors were the result of human operating mistakes, flawed treatment planning, and data modification during plan file transfer. Minor errors were also reported in 174 other log file analyses, some of which stemmed from false positives and unreliable results; the origins of these are discussed herein. It has been demonstrated that the machine log file analysis is a robust, efficient, and reliable QA process capable of detecting errors originating from human mistakes, flawed planning, and data transfer problems. The possibility of detecting these errors is low using point and planar dosimetric measurements. Copyright © 2013 American Society for Radiation Oncology. Published by Elsevier Inc. All rights reserved.

  14. Storage of sparse files using parallel log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-11-07

    A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.

  15. Comparison of soft-input-soft-output detection methods for dual-polarized quadrature duobinary system

    Science.gov (United States)

    Chang, Chun; Huang, Benxiong; Xu, Zhengguang; Li, Bin; Zhao, Nan

    2018-02-01

    Three soft-input-soft-output (SISO) detection methods for dual-polarized quadrature duobinary (DP-QDB), including maximum-logarithmic-maximum-a-posteriori-probability-algorithm (Max-log-MAP)-based detection, soft-output-Viterbi-algorithm (SOVA)-based detection, and a proposed SISO detection, which can all be combined with SISO decoding, are presented. The three detection methods are investigated at 128 Gb/s in five-channel wavelength-division-multiplexing uncoded and low-density-parity-check (LDPC) coded DP-QDB systems by simulations. Max-log-MAP-based detection needs the returning-to-initial-states (RTIS) process despite having the best performance. When the LDPC code with a code rate of 0.83 is used, the detecting-and-decoding scheme with the SISO detection does not need RTIS and has better bit error rate (BER) performance than the scheme with SOVA-based detection. The former can reduce the optical signal-to-noise ratio (OSNR) requirement (at BER=10-5) by 2.56 dB relative to the latter. The application of the SISO iterative detection in LDPC-coded DP-QDB systems makes a good trade-off between requirements on transmission efficiency, OSNR requirement, and transmission distance, compared with the other two SISO methods.

  16. Computing level-impulse responses of log-specified VAR systems

    NARCIS (Netherlands)

    Wieringa, J.E.; Horvath, C.

    2005-01-01

    Impulse response functions (IRFs) are often used to analyze the dynamic behavior of a vector autoregressive (VAR) system. In many applications of VAR modelling, the variables are log-transformed before the model is estimated. If this is the case, the results of the IRFs do not have a direct

  17. Analyzing Decision Logs to Understand Decision Making in Serious Crime Investigations.

    Science.gov (United States)

    Dando, Coral J; Ormerod, Thomas C

    2017-12-01

    Objective To study decision making by detectives when investigating serious crime through the examination of decision logs to explore hypothesis generation and evidence selection. Background Decision logs are used to record and justify decisions made during serious crime investigations. The complexity of investigative decision making is well documented, as are the errors associated with miscarriages of justice and inquests. The use of decision logs has not been the subject of an empirical investigation, yet they offer an important window into the nature of investigative decision making in dynamic, time-critical environments. Method A sample of decision logs from British police forces was analyzed qualitatively and quantitatively to explore hypothesis generation and evidence selection by police detectives. Results Analyses revealed diversity in documentation of decisions that did not correlate with case type and identified significant limitations of the decision log approach to supporting investigative decision making. Differences emerged between experienced and less experienced officers' decision log records in exploration of alternative hypotheses, generation of hypotheses, and sources of evidential inquiry opened over phase of investigation. Conclusion The practical use of decision logs is highly constrained by their format and context of use. Despite this, decision log records suggest that experienced detectives display strategic decision making to avoid confirmation and satisficing, which affect less experienced detectives. Application Potential applications of this research include both training in case documentation and the development of new decision log media that encourage detectives, irrespective of experience, to generate multiple hypotheses and optimize the timely selection of evidence to test them.

  18. Automated Detection of Selective Logging in Amazon Forests Using Airborne Lidar Data and Pattern Recognition Algorithms

    Science.gov (United States)

    Keller, M. M.; d'Oliveira, M. N.; Takemura, C. M.; Vitoria, D.; Araujo, L. S.; Morton, D. C.

    2012-12-01

    Selective logging, the removal of several valuable timber trees per hectare, is an important land use in the Brazilian Amazon and may degrade forests through long term changes in structure, loss of forest carbon and species diversity. Similar to deforestation, the annual area affected by selected logging has declined significantly in the past decade. Nonetheless, this land use affects several thousand km2 per year in Brazil. We studied a 1000 ha area of the Antimary State Forest (FEA) in the State of Acre, Brazil (9.304 ○S, 68.281 ○W) that has a basal area of 22.5 m2 ha-1 and an above-ground biomass of 231 Mg ha-1. Logging intensity was low, approximately 10 to 15 m3 ha-1. We collected small-footprint airborne lidar data using an Optech ALTM 3100EA over the study area once each in 2010 and 2011. The study area contained both recent and older logging that used both conventional and technologically advanced logging techniques. Lidar return density averaged over 20 m-2 for both collection periods with estimated horizontal and vertical precision of 0.30 and 0.15 m. A relative density model comparing returns from 0 to 1 m elevation to returns in 1-5 m elevation range revealed the pattern of roads and skid trails. These patterns were confirmed by ground-based GPS survey. A GIS model of the road and skid network was built using lidar and ground data. We tested and compared two pattern recognition approaches used to automate logging detection. Both segmentation using commercial eCognition segmentation and a Frangi filter algorithm identified the road and skid trail network compared to the GIS model. We report on the effectiveness of these two techniques.

  19. Logging Concessions Enable Illegal Logging Crisis in the Peruvian Amazon

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N.; Sky, Melissa A. Blue; Pine, Justin

    2014-04-01

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  20. Logging concessions enable illegal logging crisis in the Peruvian Amazon.

    Science.gov (United States)

    Finer, Matt; Jenkins, Clinton N; Sky, Melissa A Blue; Pine, Justin

    2014-04-17

    The Peruvian Amazon is an important arena in global efforts to promote sustainable logging in the tropics. Despite recent efforts to achieve sustainability, such as provisions in the US-Peru Trade Promotion Agreement, illegal logging continues to plague the region. We present evidence that Peru's legal logging concession system is enabling the widespread illegal logging via the regulatory documents designed to ensure sustainable logging. Analyzing official government data, we found that 68.3% of all concessions supervised by authorities were suspected of major violations. Of the 609 total concessions, nearly 30% have been cancelled for violations and we expect this percentage to increase as investigations continue. Moreover, the nature of the violations indicate that the permits associated with legal concessions are used to harvest trees in unauthorized areas, thus threatening all forested areas. Many of the violations pertain to the illegal extraction of CITES-listed timber species outside authorized areas. These findings highlight the need for additional reforms.

  1. Linearity improvement on wide-range log signal of neutron measurement system for HANARO

    International Nuclear Information System (INIS)

    Kim, Young-Ki; Tuetken, Jeffrey S.

    1998-01-01

    This paper discusses engineering activities for improving the linearity characteristics of the Log Power signal from the neutron measurement system for HANARO. This neutron measurement system uses a fission chamber based detector which covers 10.3 decade-wide range from 10 -8 % full power(FP) up to 200%FP, The Log Power signal is designed to control the reactor at low power levels where most of the reactor physics tests are carried out. Therefore, the linearity characteristics of the Log Power signal is the major factor for accurate reactor power control. During the commissioning of the neutron measurement system, it was found that the linearity characteristics of the Log Power signal, especially near 10 -2 %FP, were not accurate enough for controlling the reactor during physics testing. Analysis of the system linearity data directly measured with reactor operating determined that the system was not operating per the design characteristics established from previous installations. The linearity data, which were taken as the reactor was increased in power, were sent to manufacturer's engineering group and a follow-up measures based on the analysis were then fed back to the field. Through step by step trouble-shooting activities, which included minor circuit modifications and alignment procedure changes, the linearity characteristics have been successfully improved and now exceed minimum performance requirements. This paper discusses the trouble-shooting techniques applied, the changes in the linearity characteristics, special circumstances in the HANARO application and the final resolution. (author)

  2. Analysis of RIA standard curve by log-logistic and cubic log-logit models

    International Nuclear Information System (INIS)

    Yamada, Hideo; Kuroda, Akira; Yatabe, Tami; Inaba, Taeko; Chiba, Kazuo

    1981-01-01

    In order to improve goodness-of-fit in RIA standard analysis, programs for computing log-logistic and cubic log-logit were written in BASIC using personal computer P-6060 (Olivetti). Iterative least square method of Taylor series was applied for non-linear estimation of logistic and log-logistic. Hear ''log-logistic'' represents Y = (a - d)/(1 + (log(X)/c)sup(b)) + d As weights either 1, 1/var(Y) or 1/σ 2 were used in logistic or log-logistic and either Y 2 (1 - Y) 2 , Y 2 (1 - Y) 2 /var(Y), or Y 2 (1 - Y) 2 /σ 2 were used in quadratic or cubic log-logit. The term var(Y) represents squares of pure error and σ 2 represents estimated variance calculated using a following equation log(σ 2 + 1) = log(A) + J log(y). As indicators for goodness-of-fit, MSL/S sub(e)sup(2), CMD% and WRV (see text) were used. Better regression was obtained in case of alpha-fetoprotein by log-logistic than by logistic. Cortisol standard curve was much better fitted with cubic log-logit than quadratic log-logit. Predicted precision of AFP standard curve was below 5% in log-logistic in stead of 8% in logistic analysis. Predicted precision obtained using cubic log-logit was about five times lower than that with quadratic log-logit. Importance of selecting good models in RIA data processing was stressed in conjunction with intrinsic precision of radioimmunoassay system indicated by predicted precision. (author)

  3. Comparison of planted soil infiltration systems for treatment of log yard runoff.

    Science.gov (United States)

    Hedmark, Asa; Scholz, Miklas; Aronsson, Par; Elowson, Torbjorn

    2010-07-01

    Treatment of log yard runoff is required to avoid contamination of receiving watercourses. The research aim was to assess if infiltration of log yard runoff through planted soil systems is successful and if different plant species affect the treatment performance at a field-scale experimental site in Sweden (2005 to 2007). Contaminated runoff from the log yard of a sawmill was infiltrated through soil planted with Alnus glutinosa (L.) Gärtner (common alder), Salix schwerinii X viminalis (willow variety "Gudrun"), Lolium perenne (L.) (rye grass), and Phalaris arundinacea (L.) (reed canary grass). The study concluded that there were no treatment differences when comparing the four different plants with each other, and there also were no differences between the tree and the grass species. Furthermore, the infiltration treatment was effective in reducing total organic carbon (55%) and total phosphorus (45%) concentrations in the runoff, even when the loads on the infiltration system increased from year to year.

  4. Secure Audit Logging with Tamper-Resistant Hardware

    NARCIS (Netherlands)

    Chong, C.N.; Peng, Z.; Peng, Z.; Hartel, Pieter H.; Gritzalis, D.; De Capitani di Vimercati, S.; Katsikas, S.K.; Samarati, P.

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with

  5. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  6. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  7. Experimental approaches for the development of gamma spectroscopy well logging system

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jehyun; Hwang, Seho; Kim, Jongman [Korea Institute of Geoscience and Mineral Resources (124 Gwahang-no, Yuseong-gu, Daejeon, Korea) (Korea, Republic of); Won, Byeongho [Heesong Geotek Co., Ltd (146-8 Sangdaewon-dong, Jungwon-gu, Seongnam-si, Gyeonggi-do, Korea) (Korea, Republic of)

    2015-03-10

    This article discusses experimental approaches for the development of gamma spectroscopy well logging system. Considering the size of borehole sonde, we customize 2 x 2 inches inorganic scintillators and the system including high voltage, preamplifier, amplifier and multichannel analyzer (MCA). The calibration chart is made by test using standard radioactive sources so that the measured count rates are expressed by energy spectrum. Optimum high-voltage supplies and the measurement parameters of each detector are set up by experimental investigation. Also, the responses of scintillation detectors have been examined by analysis according to the distance between source and detector. Because gamma spectroscopy well logging needs broad spectrum, high sensitivity and resolution, the energy resolution and sensitivity as a function of gamma ray energy are investigated by analyzing the gamma ray activities of the radioactive sources.

  8. The design and implementation of an automated system for logging clinical experiences using an anesthesia information management system.

    Science.gov (United States)

    Simpao, Allan; Heitz, James W; McNulty, Stephen E; Chekemian, Beth; Brenn, B Randall; Epstein, Richard H

    2011-02-01

    Residents in anesthesia training programs throughout the world are required to document their clinical cases to help ensure that they receive adequate training. Current systems involve self-reporting, are subject to delayed updates and misreported data, and do not provide a practicable method of validation. Anesthesia information management systems (AIMS) are being used increasingly in training programs and are a logical source for verifiable documentation. We hypothesized that case logs generated automatically from an AIMS would be sufficiently accurate to replace the current manual process. We based our analysis on the data reporting requirements of the American College of Graduate Medical Education (ACGME). We conducted a systematic review of ACGME requirements and our AIMS record, and made modifications after identifying data element and attribution issues. We studied 2 methods (parsing of free text procedure descriptions and CPT4 procedure code mapping) to automatically determine ACGME case categories and generated AIMS-based case logs and compared these to assignments made by manual inspection of the anesthesia records. We also assessed under- and overreporting of cases entered manually by our residents into the ACGME website. The parsing and mapping methods assigned cases to a majority of the ACGME categories with accuracies of 95% and 97%, respectively, as compared with determinations made by 2 residents and 1 attending who manually reviewed all procedure descriptions. Comparison of AIMS-based case logs with reports from the ACGME Resident Case Log System website showed that >50% of residents either underreported or overreported their total case counts by at least 5%. The AIMS database is a source of contemporaneous documentation of resident experience that can be queried to generate valid, verifiable case logs. The extent of AIMS adoption by academic anesthesia departments should encourage accreditation organizations to support uploading of AIMS-based case

  9. Continuous Tamper-proof Logging using TPM2.0

    Science.gov (United States)

    2014-06-16

    process each log entry. Additional hardware support could mitigate this problem. Tradeoffs between performance and security guarantees Disk write...becomes weaker as the block size increases. This problem is mitigated in protocol B by allowing offline recovery from a power failure and detection of...M.K., Isozaki, H.: Flicker : An execution infrastructure for TCB minimization. ACM SIGOPS Operating Systems Review 42(4) (2008) 315–328 24. Parno, B

  10. Integration of QR codes into an anesthesia information management system for resident case log management.

    Science.gov (United States)

    Avidan, Alexander; Weissman, Charles; Levin, Phillip D

    2015-04-01

    Quick response (QR) codes containing anesthesia syllabus data were introduced into an anesthesia information management system. The code was generated automatically at the conclusion of each case and available for resident case logging using a smartphone or tablet. The goal of this study was to evaluate the use and usability/user-friendliness of such system. Resident case logging practices were assessed prior to introducing the QR codes. QR code use and satisfactions amongst residents was reassessed at three and six months. Before QR code introduction only 12/23 (52.2%) residents maintained a case log. Most of the remaining residents (9/23, 39.1%) expected to receive a case list from the anesthesia information management system database at the end of their residency. At three months and six months 17/26 (65.4%) and 15/25 (60.0%) residents, respectively, were using the QR codes. Satisfaction was rated as very good or good. QR codes for residents' case logging with smartphones or tablets were successfully introduced in an anesthesia information management system and used by most residents. QR codes can be successfully implemented into medical practice to support data transfer. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  11. PLAT: An Automated Fault and Behavioural Anomaly Detection Tool for PLC Controlled Manufacturing Systems.

    Science.gov (United States)

    Ghosh, Arup; Qin, Shiming; Lee, Jooyeoun; Wang, Gi-Nam

    2016-01-01

    Operational faults and behavioural anomalies associated with PLC control processes take place often in a manufacturing system. Real time identification of these operational faults and behavioural anomalies is necessary in the manufacturing industry. In this paper, we present an automated tool, called PLC Log-Data Analysis Tool (PLAT) that can detect them by using log-data records of the PLC signals. PLAT automatically creates a nominal model of the PLC control process and employs a novel hash table based indexing and searching scheme to satisfy those purposes. Our experiments show that PLAT is significantly fast, provides real time identification of operational faults and behavioural anomalies, and can execute within a small memory footprint. In addition, PLAT can easily handle a large manufacturing system with a reasonable computing configuration and can be installed in parallel to the data logging system to identify operational faults and behavioural anomalies effectively.

  12. PLAT: An Automated Fault and Behavioural Anomaly Detection Tool for PLC Controlled Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Arup Ghosh

    2016-01-01

    Full Text Available Operational faults and behavioural anomalies associated with PLC control processes take place often in a manufacturing system. Real time identification of these operational faults and behavioural anomalies is necessary in the manufacturing industry. In this paper, we present an automated tool, called PLC Log-Data Analysis Tool (PLAT that can detect them by using log-data records of the PLC signals. PLAT automatically creates a nominal model of the PLC control process and employs a novel hash table based indexing and searching scheme to satisfy those purposes. Our experiments show that PLAT is significantly fast, provides real time identification of operational faults and behavioural anomalies, and can execute within a small memory footprint. In addition, PLAT can easily handle a large manufacturing system with a reasonable computing configuration and can be installed in parallel to the data logging system to identify operational faults and behavioural anomalies effectively.

  13. Engineering aspects of radiometric logging

    International Nuclear Information System (INIS)

    Huppert, P.

    1982-01-01

    Engineering problems encountered in the development of nuclear borehole logging techniques are discussed. Spectrometric techniques require electronic stability of the equipment. In addition the electronics must be capable of handling high count rates of randomly distributed pulses of fast rise time from the detector and the systems must be designed so that precise calibration is possible under field operating conditions. Components of a logging system are discussed in detail. They include the logging probe (electronics, detector, high voltage supply, preamplifier), electronic instrumentation for data collection and processing and auxiliary equipment

  14. Well logging with natural gamma radiation

    International Nuclear Information System (INIS)

    Ellis, D.V.

    1983-01-01

    An invention is described for use in natural gamma radiation well logging in which measurements taken in a borehole are used in the search for valuable underground resources such as oil or gas. The invention comprises deriving a log of natural gamma radiation detected in selected energy windows for a selected borehole depth interval and converting it into a log of the selected subsurface materials, e.g. Th, U, K. This log is corrected for the effects of 1) either a gamma ray emitter in the borehole fluid, e.g. potassium salts and/or 2) a gamma ray attenuator in the borehole fluid, e.g. a strong attenuator such as barite and/or hematite. The Th, U, K log is particularly useful in the exploration of oil and gas resources since the Th, U, K concentrations are a good indication as to the presence, type and volume of shale and clay in the formations surrounding the borehole. (U.K.)

  15. Detection of criticality accidents. The Intertechnique EDAC II system

    International Nuclear Information System (INIS)

    Prigent, R.

    1991-01-01

    The chief aim of the new generation of EDAC II criticality accidents detection system is to reduce the risks associated to the handling of fissile material by providing a swift and safe warning of the development of any criticality accident. To this function already devolving on the EDAC system of the previous generation, the EDAC II adds the possibility of storing in memory the characteristics of the accident, providing a daily follow-up of the striking events in the system through the print-out of a log book and providing assistance to the operators during the periodical tests. (Author)

  16. Method and apparatus for logging inclined earth boreholes

    International Nuclear Information System (INIS)

    Youmans, A.H.

    1981-01-01

    An improved technique is provided for comparing the velocity of an elongated well logging instrument traversing an inclined earth borehole with the playout velocity of the well logging cable at the earth's surface to control both the cable hoist drum rotation and the rate of movement of the subsurface instrument and thus insure cable playout is in equilibrium with the logging instrument movement. Method and apparatus are described for detecting any reduction in movement of the logging instrument through the borehole and for reducing the velocity of the logging cable playout in response thereto by reducing drum rotation. Further, when the velocity of cable playout slows to a preselected value, a monitoring circuit generates control signals which actuate a means of power attached to or integral with the logging instrument which, upon initiation, apply a force to move the logging instrument upward or downward within the borehole

  17. Method and equipment for fast transmission of a signal consisting of many data pulses by a normal well-logging cable

    International Nuclear Information System (INIS)

    Pitts, R.W. Jr.; Whatley, H.A. Jr.

    1975-01-01

    Well logging methods and equipment in general and a nuclear well logging process and apparatus in particular are presented. They increase the number of pulses which can be transmitted to the top of the well from a well logging instrument placed at the bottom, during a given time interval, by means of a processing giving two pulses for each pulse corresponding to a detection. The equipment is a double-spectrum well logging system, with near and far detectors [fr

  18. Focused detection logging technique

    International Nuclear Information System (INIS)

    Turcotte, R.E.

    1977-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for determining a characteristic of the media surrounding a borehole by emitting gamma radiation in at least one tightly collimated beam toward an earth formation adjacent a borehole, by detecting from a plurality of tightly collimated paths that are focused at a zone of intersection with and aligned to intersect with each emitted beam the gamma radiation scattered by the interaction of the emitted gamma radiation and the media at the zones of intersection, by misaligning the emitted beams and the tightly collimated paths to prevent their intersection, by detecting gamma radiation scattered by the interaction of the emitted gamma radiation and the media with the emitted beams and the tightly collimated paths misaligned and by determining from the detected gamma radiation a media characteristic. In one embodiment, the detection collimater used is formed of a material that is essentially opaque to gamma radiation at the energies of interest and includes a plurality of passageways that are spherically focused at a zone of intersection with one of the emitted beams of gamma radiation and that are arranged in a number of surfaces that are curved to be azimuthally symmetrical about the axis of the intersected beam. 14 figures

  19. Calibration facilities at Hanford for gamma-ray and fission-neutron well logging

    International Nuclear Information System (INIS)

    Stromswold, D.C.

    1994-07-01

    Well-logging tools that detect gamma rays emitted from earth formations need to be calibrated in appropriate facilities to provide quantitative assessments of concentrations o radionuclides based on detected gamma rays. These facilities are typically special models having a hole to insert tools and having sufficient physical size to simulate actual earth formations containing known amounts of radionuclides. The size, generally 3 to 5 feet in diameter and 4 to 6 feet tall, is such that the source of radiation appears infinite in extent to a tool detecting the radiation inside the model. Such models exist at Hanford as concrete cylinders having a central borehole and containing known, enhanced amounts of K, U, and Th. Data collected in these models allow calibration of the logging system to measure radionuclide concentrations in formations around boreholes in the field. The accuracy of the calculated field concentrations depends on the correctness of the original calibration, the statistical precision of the data, and the similarity of the logging conditions to the calibration conditions. Possible methods for analyzing the data collected in the calibration facilities are presented for both spectral and total-count gamma-ray systems. Corrections are typically needed for the effects of steel casing in boreholes and the presence of water rather than air in the holes. Data collected in the calibration models with various steel casings and borehole fluids allow such correction factors to be determined

  20. On Representing, Purging, and Utilizing Change Logs in Process Management Systems

    NARCIS (Netherlands)

    Rinderle, S.B.; Reichert, M.U.; Jurisch, M.; Kreher, U

    In recent years adaptive process management technolgy has emerged in order to increase the flexibility of business process implementations and to support process changes at different levels. Usually, respective systems log comprehensive information about changes, which can then be used for different

  1. Graphic Interface for the Gearhart-Owen 3500 Uranium Logging System

    International Nuclear Information System (INIS)

    Haller, I; Mendieta, C; Tenzi, A

    2000-01-01

    This work presents the design and development of a computing graphic interface in order to modernize the data acquisition of an old Gearhart-Owen uranium logging system.The paper describes the different items involved in the project: the system hardware developed to carry out the signal conditioning and data digitization the system software, which performs the monitoring and storing of the updated information.Finally, we compare the results of de recent field measurements with the previous one obtained with the original equipment and show the feasibility of the project

  2. Real-Time Vehicle Data Logging System Using GPS And GSM

    OpenAIRE

    Win Minn Thet; MyoMaung Maung; Hla Myo Tun

    2015-01-01

    Abstract This paper proposes and implements a low cost Vehicle Data Logging System using GPS and GSM. This system allows a user to trace the present and past positions recorded in SD card. This system also reads the current position of the vehicle using GPS the data is sent via GSM service from the GSM network. The vehicles position including the driving speed the UTC time and data are stored in the SD card for live and past tracking. All of that GPS data is sent to PIC 18F4520 by the Uni...

  3. Adaptively detecting changes in Autonomic Grid Computing

    KAUST Repository

    Zhang, Xiangliang

    2010-10-01

    Detecting the changes is the common issue in many application fields due to the non-stationary distribution of the applicative data, e.g., sensor network signals, web logs and gridrunning logs. Toward Autonomic Grid Computing, adaptively detecting the changes in a grid system can help to alarm the anomalies, clean the noises, and report the new patterns. In this paper, we proposed an approach of self-adaptive change detection based on the Page-Hinkley statistic test. It handles the non-stationary distribution without the assumption of data distribution and the empirical setting of parameters. We validate the approach on the EGEE streaming jobs, and report its better performance on achieving higher accuracy comparing to the other change detection methods. Meanwhile this change detection process could help to discover the device fault which was not claimed in the system logs. © 2010 IEEE.

  4. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  5. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography; Detection et analyse non destructive de caracteristiques internes de billons d'epicea commun (PICEA ABIES (L.) KARST) par tomographie a rayons X

    Energy Technology Data Exchange (ETDEWEB)

    Longuetaud, F

    2005-10-15

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  6. Analyzing Grid Log Data with Affinity Propagation

    NARCIS (Netherlands)

    Modena, G.; van Someren, M.W.; Ali, M; Bosse, T.; Hindriks, K.V.; Hoogendoorn, M.; Jonker, C.M; Treur, J.

    2013-01-01

    In this paper we present an unsupervised learning approach to detect meaningful job traffic patterns in Grid log data. Manual anomaly detection on modern Grid environments is troublesome given their increasing complexity, the distributed, dynamic topology of the network and heterogeneity of the jobs

  7. Novel Desorber for Online Drilling Mud Gas Logging.

    Science.gov (United States)

    Lackowski, Marcin; Tobiszewski, Marek; Namieśnik, Jacek

    2016-01-01

    This work presents the construction solution and experimental results of a novel desorber for online drilling mud gas logging. The traditional desorbers use mechanical mixing of the liquid to stimulate transfer of hydrocarbons to the gaseous phase that is further analyzed. The presented approach is based on transfer of hydrocarbons from the liquid to the gas bubbles flowing through it and further gas analysis. The desorber was checked for gas logging from four different drilling muds collected from Polish boreholes. The results of optimization studies are also presented in this study. The comparison of the novel desorber with a commercial one reveals strong advantages of the novel one. It is characterized by much better hydrocarbons recovery efficiency and allows reaching lower limits of detection of the whole analytical system. The presented desorber seems to be very attractive alternative over widely used mechanical desorbers.

  8. Anomaly Detection in Log Data using Graph Databases and Machine Learning to Defend Advanced Persistent Threats

    OpenAIRE

    Schindler, Timo

    2018-01-01

    Advanced Persistent Threats (APTs) are a main impendence in cyber security of computer networks. In 2015, a successful breach remains undetected 146 days on average, reported by [Fi16].With our work we demonstrate a feasible and fast way to analyse real world log data to detect breaches or breach attempts. By adapting well-known kill chain mechanisms and a combine of a time series database and an abstracted graph approach, it is possible to create flexible attack profiles. Using this approach...

  9. Ultrafast CT scanning of an oak log for internal defects

    Science.gov (United States)

    Francis G. Wagner; Fred W. Taylor; Douglas S. Ladd; Charles W. McMillin; Fredrick L. Roder

    1989-01-01

    Detecting internal defects in sawlogs and veneer logs with computerized tomographic (CT) scanning is possible, but has been impractical due to the long scanning time required. This research investigated a new scanner able to acquire 34 cross-sectional log scans per second. This scanning rate translates to a linear log feed rate of 85 feet (25.91 m) per minute at one...

  10. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  11. A Depth Video Sensor-Based Life-Logging Human Activity Recognition System for Elderly Care in Smart Indoor Environments

    Directory of Open Access Journals (Sweden)

    Ahmad Jalal

    2014-07-01

    Full Text Available Recent advancements in depth video sensors technologies have made human activity recognition (HAR realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  12. A depth video sensor-based life-logging human activity recognition system for elderly care in smart indoor environments.

    Science.gov (United States)

    Jalal, Ahmad; Kamal, Shaharyar; Kim, Daijin

    2014-07-02

    Recent advancements in depth video sensors technologies have made human activity recognition (HAR) realizable for elderly monitoring applications. Although conventional HAR utilizes RGB video sensors, HAR could be greatly improved with depth video sensors which produce depth or distance information. In this paper, a depth-based life logging HAR system is designed to recognize the daily activities of elderly people and turn these environments into an intelligent living space. Initially, a depth imaging sensor is used to capture depth silhouettes. Based on these silhouettes, human skeletons with joint information are produced which are further used for activity recognition and generating their life logs. The life-logging system is divided into two processes. Firstly, the training system includes data collection using a depth camera, feature extraction and training for each activity via Hidden Markov Models. Secondly, after training, the recognition engine starts to recognize the learned activities and produces life logs. The system was evaluated using life logging features against principal component and independent component features and achieved satisfactory recognition rates against the conventional approaches. Experiments conducted on the smart indoor activity datasets and the MSRDailyActivity3D dataset show promising results. The proposed system is directly applicable to any elderly monitoring system, such as monitoring healthcare problems for elderly people, or examining the indoor activities of people at home, office or hospital.

  13. Non-destructive analysis and detection of internal characteristics of spruce logs through X computerized tomography; Detection et analyse non destructive de caracteristiques internes de billons d'epicea commun (PICEA ABIES (L.) KARST) par tomographie a rayons X

    Energy Technology Data Exchange (ETDEWEB)

    Longuetaud, F

    2005-10-15

    Computerized tomography allows a direct access to internal features of scanned logs on the basis of density and moisture content variations. The objective of this work is to assess the feasibility of an automatic detection of internal characteristics with the final aim of conducting scientific analyses. The database is constituted by CT images of 24 spruces obtained with a medical CT scanner. Studied trees are representative of several social status and are coming from four stands located in North-Eastern France, themselves are representative of several age, density and fertility classes. The automatic processing developed are the following. First, pith detection in logs dealing with the problem of knot presence and ring eccentricity. The accuracy of the localisation was less than one mm. Secondly, the detection of the sapwood/heart-wood limit in logs dealing with the problem of knot presence (main source of difficulty). The error on the diameter was 1.8 mm which corresponds to a relative error of 1.3 per cent. Thirdly, the detection of the whorls location and comparison with an optical method. Fourthly the detection of individualized knots. This process allows to count knots and to locate them in a log (longitudinal position and azimuth); however, the validation of the method and extraction of branch diameter and inclination are still to be developed. An application of this work was a variability analysis of the sapwood content in the trunk: at the within-tree level, the sapwood width was found to be constant under the living crown; at the between-tree level, a strong correlation was found with the amount of living branches. A great number of analyses are possible from our work results, among others: architectural analysis with the pith tracking and the apex death occurrence; analysis of radial variations of the heart-wood shape; analysis of the knot distribution in logs. (author)

  14. Novel Desorber for Online Drilling Mud Gas Logging

    Directory of Open Access Journals (Sweden)

    Marcin Lackowski

    2016-01-01

    Full Text Available This work presents the construction solution and experimental results of a novel desorber for online drilling mud gas logging. The traditional desorbers use mechanical mixing of the liquid to stimulate transfer of hydrocarbons to the gaseous phase that is further analyzed. The presented approach is based on transfer of hydrocarbons from the liquid to the gas bubbles flowing through it and further gas analysis. The desorber was checked for gas logging from four different drilling muds collected from Polish boreholes. The results of optimization studies are also presented in this study. The comparison of the novel desorber with a commercial one reveals strong advantages of the novel one. It is characterized by much better hydrocarbons recovery efficiency and allows reaching lower limits of detection of the whole analytical system. The presented desorber seems to be very attractive alternative over widely used mechanical desorbers.

  15. A Clustering Methodology of Web Log Data for Learning Management Systems

    Science.gov (United States)

    Valsamidis, Stavros; Kontogiannis, Sotirios; Kazanidis, Ioannis; Theodosiou, Theodosios; Karakos, Alexandros

    2012-01-01

    Learning Management Systems (LMS) collect large amounts of data. Data mining techniques can be applied to analyse their web data log files. The instructors may use this data for assessing and measuring their courses. In this respect, we have proposed a methodology for analysing LMS courses and students' activity. This methodology uses a Markov…

  16. Limitations and developing directions of pulsed neutron logging

    International Nuclear Information System (INIS)

    Wu Wensheng; Xiao Lizhi

    2007-01-01

    The paper explains briefly the principle of pulsed neutron logging method, summarizes the system and uses of the method in petroleum logging. The paper points out the limitations of pulsed neutron logging such as low precise measurements, low logging speed, plenty of influence factors, low vertical resolution, bad adaptability, difficult logging interpretation and so on, and expounds its developing directions in hardware, software, method and principle. (authors)

  17. Extracting the Textual and Temporal Structure of Supercomputing Logs

    Energy Technology Data Exchange (ETDEWEB)

    Jain, S; Singh, I; Chandra, A; Zhang, Z; Bronevetsky, G

    2009-05-26

    Supercomputers are prone to frequent faults that adversely affect their performance, reliability and functionality. System logs collected on these systems are a valuable resource of information about their operational status and health. However, their massive size, complexity, and lack of standard format makes it difficult to automatically extract information that can be used to improve system management. In this work we propose a novel method to succinctly represent the contents of supercomputing logs, by using textual clustering to automatically find the syntactic structures of log messages. This information is used to automatically classify messages into semantic groups via an online clustering algorithm. Further, we describe a methodology for using the temporal proximity between groups of log messages to identify correlated events in the system. We apply our proposed methods to two large, publicly available supercomputing logs and show that our technique features nearly perfect accuracy for online log-classification and extracts meaningful structural and temporal message patterns that can be used to improve the accuracy of other log analysis techniques.

  18. Water quality management in shrimp aquaculture ponds using remote water quality logging system

    Digital Repository Service at National Institute of Oceanography (India)

    Sreepada, R.A.; Kulkarni, S.; Suryavanshi, U.; Ingole, B.S.; Drensgstig, A.; Braaten, B.

    Currently an institutional co-operation project funded by NORAD is evaluating different environmental management strategies for sustainable aquaculture in India. A brief description of a remote water quality logging system installed in shrimp ponds...

  19. Log Analysis Using Splunk Hadoop Connect

    Science.gov (United States)

    2017-06-01

    23 A. INPUT SELECTION ...Conversion Resource Consumption .............................................. 28 Figure 8. Distribution of Events in Years...running a logging service puts a performance tax on the system and may cause the degradation of performance. More thorough 8 logging will cause a

  20. Real Time Face Quality Assessment for Face Log Generation

    DEFF Research Database (Denmark)

    Kamal, Nasrollahi; Moeslund, Thomas B.

    2009-01-01

    Summarizing a long surveillance video to just a few best quality face images of each subject, a face-log, is of great importance in surveillance systems. Face quality assessment is the back-bone for face log generation and improving the quality assessment makes the face logs more reliable....... Developing a real time face quality assessment system using the most important facial features and employing it for face logs generation are the concerns of this paper. Extensive tests using four databases are carried out to validate the usability of the system....

  1. RHIC beam permit and quench detection communications system

    International Nuclear Information System (INIS)

    Conkling, C.R. Jr.

    1997-01-01

    A beam permit module has been developed to concentrate RHIC, subsystem sensor outputs, permit beam, and initiate emergency shutdowns. The modules accept inputs from the vacuum, cryogenic, power supply, beam loss, and superconducting magnet quench detection systems. Modules are located at equipment locations around the RHIC ring. The modules are connected by three fiberoptic communications links; a beam permit link, and two magnet power supply interlock links. During operation, carrier presence allows beam. If a RHIC subsystem detects a fault, the beam permit carrier terminates - initiating a beam dump. If the fault was a superconducting magnet quench, a power supply interlock carrier terminates - initiating an emergency magnet power dump. In addition, the master module triggers an event to cause remote sensors to log and hold data at the time-of-failure

  2. Analyzing Web Server Logs to Improve a Site's Usage. The Systems Librarian

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    This column describes ways to streamline and optimize how a Web site works in order to improve both its usability and its visibility. The author explains how to analyze logs and other system data to measure the effectiveness of the Web site design and search engine.

  3. Performance analysis of MIMO wireless optical communication system with Q-ary PPM over correlated log-normal fading channel

    Science.gov (United States)

    Wang, Huiqin; Wang, Xue; Lynette, Kibe; Cao, Minghua

    2018-06-01

    The performance of multiple-input multiple-output wireless optical communication systems that adopt Q-ary pulse position modulation over spatial correlated log-normal fading channel is analyzed in terms of its un-coded bit error rate and ergodic channel capacity. The analysis is based on the Wilkinson's method which approximates the distribution of a sum of correlated log-normal random variables to a log-normal random variable. The analytical and simulation results corroborate the increment of correlation coefficients among sub-channels lead to system performance degradation. Moreover, the receiver diversity has better performance in resistance of spatial correlation caused channel fading.

  4. Mechanics of log calibration

    International Nuclear Information System (INIS)

    Waller, W.C.; Cram, M.E.; Hall, J.E.

    1975-01-01

    For any measurement to have meaning, it must be related to generally accepted standard units by a valid and specified system of comparison. To calibrate well-logging tools, sensing systems are designed which produce consistent and repeatable indications over the range for which the tool was intended. The basics of calibration theory, procedures, and calibration record presentations are reviewed. Calibrations for induction, electrical, radioactivity, and sonic logging tools will be discussed. The authors' intent is to provide an understanding of the sources of errors, of the way errors are minimized in the calibration process, and of the significance of changes in recorded calibration data

  5. Pulsed neutron generator for logging

    International Nuclear Information System (INIS)

    Thibideau, F.D.

    1977-01-01

    A pulsed neutron generator for uranium logging is described. This generator is one component of a prototype uranium logging probe which is being developed by SLA to detect, and assay, uranium by borehole logging. The logging method is based on the measurement of epithermal neutrons resulting from the prompt fissioning of uranium from a pulsed source of 17.6 MeV neutrons. An objective of the prototype probe was that its diameter not exceed 2.75 inches, which would allow its use in conventional rotary drill holes of 4.75-inch diameter. This restriction limited the generator to a maximum 2.375-inch diameter. The performance requirements for the neutron generator specified that it operate with a nominal output of 5 x 10 6 neutrons/pulse at up to 100 pulses/second for a one-hour period. The development of a neutron generator meeting the preliminary design goals was completed and two prototype models were delivered to SLA. These two generators have been used by SLA to log a number of boreholes in field evaluation of the probe. The results of the field evaluations have led to the recommendation of several changes to improve the probe's operation. Some of these changes will require additional development effort on the neutron generator. It is expected that this work will be performed during 1977. The design and operation of the first prototype neutron generators is described

  6. Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency.

    Science.gov (United States)

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-05-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Selected emissions and efficiencies of energy systems based on logging and sawmill residues

    International Nuclear Information System (INIS)

    Maelkki, Helena; Virtanen, Yrjoe

    2003-01-01

    Bioenergy has an important role in the implementation of the Kyoto agreement in Finland. The main sources of wood residues for energy production are logging areas and sawmills. The use of forest chips can be of great significance in reducing carbon dioxide emissions by replacing fossil fuels. Increasing the use of forest chips has environmental benefits, but it also includes possible environmental disadvantages. Therefore, system research is needed to assess the forest chip utilisation prospects for their environmental quality to secure sustainable forest management. Life-cycle methodology was developed and applied to assess environmental burdens and impacts of the logging and sawmill residues throughout the whole fuel chain from the forest to energy production. According to the study, the energy efficiencies of the forest chip systems are quite high. Net CO 2 emissions of the systems are low owing to the low input of external primary energy required to operate the systems. Although wood energy is renewable, it has many similarities with fossil fuels, e.g. as the emissions of the conversion phase are significant

  8. Dynamic Planar Convex Hull with Optimal Query Time and O(log n · log log n ) Update Time

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Jakob, Riko

    2000-01-01

    The dynamic maintenance of the convex hull of a set of points in the plane is one of the most important problems in computational geometry. We present a data structure supporting point insertions in amortized O(log n · log log log n) time, point deletions in amortized O(log n · log log n) time......, and various queries about the convex hull in optimal O(log n) worst-case time. The data structure requires O(n) space. Applications of the new dynamic convex hull data structure are improved deterministic algorithms for the k-level problem and the red-blue segment intersection problem where all red and all...

  9. Analyzing Log Files using Data-Mining

    Directory of Open Access Journals (Sweden)

    Marius Mihut

    2008-01-01

    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  10. Dual detector neutron lifetime log: theory and practical applications

    International Nuclear Information System (INIS)

    Serpas, C.J.; Wichmann, P.A.; Fertl, W.H.; DeVries, M.R.; Rndall, R.R.

    1977-01-01

    The Neutron Lifetime Log instrumentation has continued to evolve and now is equipped with dual detectors for increased ease in gas detection and also a ratio response for a simultaneous porosity determination. A good deal of experimentation was involved to minimize both lithology and salinity effects on the porosity indication. This paper contains a discussion of the theory and concepts related to the application of the Dual Detector Neutron Lifetime Log (DNLL). It is important to note that with these advances the recording of thermal neutron capture cross section (Σ) remains consistent with the past measurements of earlier generations of instruments as the most accurate determination of this parameter. A number of field examples of the newly logged results are shown. These field cases include Dual Detector NLL's run thru the drill strings of highly deviated holes when difficulties were encountered in getting conventional open hole logs to bottom, logs thru open perforations and hot radioactive zones, comparisons of the large and small diameter instruments, logs with anomalous fluids in the annulus, logs thru multiple casing strings, and a number of other examples

  11. Photovoltaic system at Nagaoka College of Technology. Fabrication of photovoltaic system and development of data logging system; Nagaoka kosen ni okeru taiyoko hatsuden. Setsubi no kochiku to data shuroku system no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Arimoto, M; Shirai, I; Togawa, K; Koshoji, H; Otaki, S [Nagaoka College of Technology, Niigata (Japan); Murata, M; Murata, K; Nomura, M [New Energy Corp., Tokyo (Japan)

    1997-11-25

    Reported in this paper is a photovoltaic power generation facility built in the yard of Nagaoka College of Technology. The purpose of this study is to find out if such a facility operates effectively in a heavy-snow region. A data logging system is also constructed. In a preliminary experiment, a 50W panel was installed, facing southwest at an inclination of 30degC, on the roof of the schoolhouse. A voltmeter, ammeter, and slide rheostat were used to perform necessary measurement. The panel temperature was approximately 50degC, and insolation was estimated at 70mW/cm{sup 2}. The data logging system is comprised of a personal computer, display, printer, etc. Using this system, voltage and current are measured with the load automatically adjusted, and the maximum power point is sought out and logged. In addition, insolation, ambient temperature, and panel temperature are logged. Data is logged every 10th minute and, when a day`s measurement is over, mean values are obtained for every hour and data is built for a power generation profile, all automatically. There is a plan for a wintertime power generation experiment. 3 refs., 5 figs.

  12. Status report on the development of a prompt fission neutron uranium borehole logging technique

    International Nuclear Information System (INIS)

    Smith, G.W.

    1977-05-01

    The prompt fission neutron (PFN) method of direct uranium measurement was studied. The PFN uranium logging technique measures the enhanced epithermal neutron population created by the prompt thermal fission of 235 U to assay uranium mineralization around a borehole. This neutron population exists for several hundred microseconds after a pulsed neutron source produces a burst of high energy (14 MeV) neutrons. A feasibility study established the basic relationship between the uranium concentration and the enhanced epithermal neutron count, and defined the major measurement perturbing factors. Following the feasibility study, development of a PFN prototype field probe was undertaken. A laboratory type neutron generator, the Controlatron, was modified for use in the probe. Field evaluation of the prototype system began in January 1976. Comparisons of neutron logs and natural gamma logs taken during this evaluation period clearly define many disequilibrium conditions as verified by ore grade estimates from core samples. The feasibility of the PFN logging technique to detect uranium in-situ has now been demonstrated

  13. Hardwood log grades and lumber grade yields for factory lumber logs

    Science.gov (United States)

    Leland F. Hanks; Glenn L. Gammon; Robert L. Brisbin; Everette D. Rast

    1980-01-01

    The USDA Forest Service Standard Grades for Hardwood Factory Lumber Logs are described, and lumber grade yields for 16 species and 2 species groups are presented by log grade and log diameter. The grades enable foresters, log buyers, and log sellers to select and grade those log suitable for conversion into standard factory grade lumber. By using the apropriate lumber...

  14. Neutron borehole logging correction technique

    International Nuclear Information System (INIS)

    Goldman, L.H.

    1978-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for logging earth formations traversed by a borehole in which an earth formation is irradiated with neutrons and gamma radiation produced thereby in the formation and in the borehole is detected. A sleeve or shield for capturing neutrons from the borehole and producing gamma radiation characteristic of that capture is provided to give an indication of the contribution of borehole capture events to the total detected gamma radiation. It is then possible to correct from those borehole effects the total detected gamma radiation and any earth formation parameters determined therefrom

  15. Construction of the monitoring, processing and logging systems supporting for management, operation and maintenance of the Dalat reactor control system

    International Nuclear Information System (INIS)

    Trinh Dinh Hai; Nguyen Thanh Cuong; Huynh Ton Nghiem; Phan Quoc Minh; Nguyen Duc Tuan; Nguyen Nhi Dien

    2004-01-01

    From 1/2002 to 12/2003, we implemented successfully a project, entitled 'Construction of the monitoring, processing and logging systems supporting for management, operation and maintenance of the Dalat reactor control system' under the assistance of the Ministry of Science and Technology. Its main results such as Testing Apparatus based on microcontroller for all functional boards of the Control Logic System of the Reactor Control System (RCS). Technical support CD - ROM for Process Instrumentation System, software for logging automatically information from important systems of the RCS through LAN, program for failure management of Process Instrumentation System have been playing an important role for observation, operation support, maintenance of the RCS. Through this project, the implementation group has grown up rapidly. The control and instrumentation group has been provided with some modern equipment, electronic components, and materials for maintenance work and research development in the years to come. This paper presents typical results and discussions. (author)

  16. Well log characterization of natural gas-hydrates

    Science.gov (United States)

    Collett, Timothy S.; Lee, Myung W.

    2012-01-01

    In the last 25 years there have been significant advancements in the use of well-logging tools to acquire detailed information on the occurrence of gas hydrates in nature: whereas wireline electrical resistivity and acoustic logs were formerly used to identify gas-hydrate occurrences in wells drilled in Arctic permafrost environments, more advanced wireline and logging-while-drilling (LWD) tools are now routinely used to examine the petrophysical nature of gas-hydrate reservoirs and the distribution and concentration of gas hydrates within various complex reservoir systems. Resistivity- and acoustic-logging tools are the most widely used for estimating the gas-hydrate content (i.e., reservoir saturations) in various sediment types and geologic settings. Recent integrated sediment coring and well-log studies have confirmed that electrical-resistivity and acoustic-velocity data can yield accurate gas-hydrate saturations in sediment grain-supported (isotropic) systems such as sand reservoirs, but more advanced log-analysis models are required to characterize gas hydrate in fractured (anisotropic) reservoir systems. New well-logging tools designed to make directionally oriented acoustic and propagation-resistivity log measurements provide the data needed to analyze the acoustic and electrical anisotropic properties of both highly interbedded and fracture-dominated gas-hydrate reservoirs. Advancements in nuclear magnetic resonance (NMR) logging and wireline formation testing (WFT) also allow for the characterization of gas hydrate at the pore scale. Integrated NMR and formation testing studies from northern Canada and Alaska have yielded valuable insight into how gas hydrates are physically distributed in sediments and the occurrence and nature of pore fluids(i.e., free water along with clay- and capillary-bound water) in gas-hydrate-bearing reservoirs. Information on the distribution of gas hydrate at the pore scale has provided invaluable insight on the mechanisms

  17. The application in detection the position accuracy of the multi-leaf collimator of Varian linear accelerator with dynamic therapy log files

    International Nuclear Information System (INIS)

    Li Changhu; Xu Liming; Teng Jianjian; Ge Wei; Zhang Jun; Ma Guangdong

    2010-01-01

    Objective: To explorer the application in detection the position accuracy of the multileaf collimator of Varian accelerator with dynamic therapy log files. Methods: A pre-designed MLC format files named PMLC for two Varian accelerators, the dynamic treatment log files were recorded 10 times on a different date, and be converted into the MLC format files named DMLC, compared with the original plan PMLC, so we can analysis two files for each leaf position deviation. In addition, we analysis the repeatability of MLC leaves position accuracy between 10 dynalog files of two accelerators. Results: No statistically significant difference between the average position of the 10 times leaf position of the two accelerators,their were 0.29 -0.29 and 0.29 -0.30 (z = -0.77, P=0.442). About 40%, 30%, 20% and 10% of the leaf position deviation was at ≤0.2 mm, 0.3 mm, 0.5 mm and 0.4 mm, respectively. the maximum value was 0.5 mm. More than 86% of the leaf position are completely coincident between 10 dynamic treatment files of two accelerators. The rate of position deviation no more 0. 05 mm was 96. 6% and 97.3%, respectively. And the maximum value was 0.09 mm. Conclusions: Dynamic treatment log file is a splendid tool in testing the actual position of multi-leaf collimator. The multi-leaf collimator of two accelerators be detected are precise and stabilized. (authors)

  18. Financial and Economic Analysis of Reduced Impact Logging

    Science.gov (United States)

    Tom Holmes

    2016-01-01

    Concern regarding extensive damage to tropical forests resulting from logging increased dramatically after World War II when mechanized logging systems developed in industrialized countries were deployed in the tropics. As a consequence, tropical foresters began developing logging procedures that were more environmentally benign, and by the 1990s, these practices began...

  19. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  20. Application of intrinsic germanium spectral gamma-ray logging for characterization of high-level nuclear waste tank leaks

    International Nuclear Information System (INIS)

    Brodeur, J.R.; Kiesler, J.P.; Kos, S.E.; Koizumi, C.J.; Nicaise, W.F.; Price, R.K.

    1993-11-01

    Spectral gamma-ray logging with a high-resolution, intrinsic germanium logging system was completed in boreholes surrounding two high-level nuclear waste tanks at the US Department of Energy's Hanford Site. The purpose was to characterize the concentrations of man-made radionuclides in the unsaturated zone sediments and identify any new leaks from the tanks. An intrinsic germanium detection system was used for this work because it was important to positively identify the specific radionuclides and to precisely assay those radionuclides. The spectral gamma log data were processed and displayed as log plots for each individual borehole and as three-dimensional plots of 137 Cs radionuclide concentrations. These data were reviewed to identify the sources of the contamination. The investigation did not uncover a new or active leak from either of the tanks. Most of the contamination found could be related to known pipeline leaks, to surface contamination from aboveground liquid spills, or to leaks from other tanks. The current spectral gamma ray data now provide a new baseline from which to compare future log data and identify any changes in the radioelement concentration

  1. Logging technique for assaying for uranium in rocks

    International Nuclear Information System (INIS)

    Givens, W.W.

    1973-01-01

    A uranium exploration technique is described for determining the uranium content of a formation traversed by borehole. A delayed fission neutron assay log is obtained by irradiating the formation with repetitive bursts of fast neutrons and detecting delayed neutrons resulting from neutron fission of uranium at time intervals between the fast neutron bursts and after dissipation of the neutrons originating in the bursts. In addition, a response log is obtained by irradiating the formation with a source of fast neutrons whereby the neutrons from this source are moderated in the formation to lower energy levels and are subject to absorption. Secondary radiation attendant to these lower energy neutrons is recorded in order to obtain a log representative of the response of the formation to moderation and absorption of the neutrons. The two logs thus obtained are correlated in order to determine a corrected value of uranium content of the formation. (author)

  2. Method and apparatus for neutron induced gamma ray logging for lithology identificaion

    International Nuclear Information System (INIS)

    Oliver, D.W.; Culver, R.B.

    1979-01-01

    A pulsed neutron generator in a well logging instrument is pulsed at a clock frequency of 20 KHz. Inelastic scatter gamma rays are detected during a first time interval coinciding with the neutron source being on and capture gamma rays are measured during a second interval subsequent to the end of each neutron burst. Only a single detected pulse, assuming detection occurs, is transmitted during each of the two detection intervals. Sync pulses are generated in the well logging instrument scaled down to a frequency of 200 Hz for transmission to the earth's surface. At the earth's surface, the scaled-down sync pulses are applied to a phase-locked loop system for regenerating the sync pulses to the same frequency as that of the clock frequency used to pulse the neutron source and to open the detection gates in the borehole instrument. The regenerated sync pulses are used in the surface instrumentation to route the pulses occurring in the inelastic interval into one section of a multichannel analyzer memory and the pulses occurring in the capture interval into another section of the multichannel analyzer. The use of memory address decoders, subtractors and ratio circuits enables both a carbon/oxygen ratio and a silicon/calcium ratio to be struck, substantially independent of the chlorine content of the borehole and formation

  3. Electrical and gamma-ray logging in Gondwana and Tertiary coal fields of India

    International Nuclear Information System (INIS)

    Kayal, J.R.

    1979-01-01

    Electrical and gamma-ray logging have been very useful for identification and accurate determination of depth and thickness of coal seams in Gondwana and Tertiary coal fields of India. The characteristic resistance/resistivity peaks of coal seams in a particular area have been correlated, thus providing a picture of the subsurface structure. Physico-chemical properties of layers or sections of coal seams are responsive to electrical logs. Gamma-ray logs are found to be very useful for correlation and have sometimes been the only logs used in cased and dry boreholes for detection of coal seams. Under favourable conditions a single-point resistance log reveals a detailed picture of the formations and picks up thin coal seams as well as thin shale bands within the coal seam. But in some cases it fails to differentiate between coal and sandstone beds in spite of high contrast in true resistivities. Multi-electrode long-normal and lateral logs are found to be more useful in differentiating such formations because of higher penetration in this system. Long-normal and lateral curves can also be used to determine true resisvity of the formation. But long normal logs cannot pick up thin coal bands and/or thin shale partings within the coal seam because of the 'adjacent bed effect'. Gamma-ray logging can be done in both cased and uncased bore-holes or even in a dry borehole but its resolution for shaly coal or thin coal is not sufficient. Combined study has been found to yield the best results. (Auth.)

  4. Investigated conductive fracture in the granitic rocks by flow-meter logging

    International Nuclear Information System (INIS)

    Ogata, Nobuhisa; Koide, Kaoru; Takeichi, Atsushi

    1997-01-01

    Test of the use of a measurement technique for the hydraulic conductivity of geological structures which act as flow paths or are impermeable to groundwater flow. In order to prove the value of flow-meter logging as an in-situ technique for detecting conductive fractures in granitic rocks, the method has been applied to a borehole near the Tono uranium mine, Gifu, Japan. This study in involved with detecting a conductive fracture and calculating the hydraulic conductivities. The results were as follows: (1) In a zone of groundwater inflow into the borehole, the hydraulic conductivity was calculated to be of the order of the 10 -3 - 10 -4 (cm/sec) from flow-meter logging. This value agreed with the results of a in-situ borehole permeability test carried out with a similar depth interval. (2) The study showed that flow-meter logging is effective for detecting the distribution of high conductivity fractures and calculating the hydraulic conductivity. (author)

  5. VT Route Log Points 2017

    Data.gov (United States)

    Vermont Center for Geographic Information — This data layer is used with VTrans' Integrated Route Log System (IRA). It is also used to calibrate the linear referencing systems, including the End-to-End and...

  6. Log quality enhancement: A systematic assessment of logging company wellsite performance and log quality

    International Nuclear Information System (INIS)

    Farnan, R.A.; Mc Hattie, C.M.

    1984-01-01

    To improve the monitoring of logging company performance, computer programs were developed to assess information en masse from log quality check lists completed on wellsite by the service company engineer and Phillips representative. A study of all logging jobs performed by different service companies for Phillips in Oklahoma (panhandle excepted) during 1982 enabled several pertinent and beneficial interpretations to be made. Company A provided the best tool and crew service. Company B incurred an excessive amount of lost time related to tool failure, in particular the neutron-density tool combination. Company C, although used only three times, incurred no lost time. With a reasonable data base valid conclusions were made pertaining, for example, to repeated tool malfunctions. The actual logs were then assessed for quality

  7. Research on Test-bench for Sonic Logging Tool

    Directory of Open Access Journals (Sweden)

    Xianping Liu

    2016-01-01

    Full Text Available In this paper, the test-bench for sonic logging tool is proposed and designed to realize automatic calibration and testing of the sonic logging tool. The test-bench System consists of Host Computer, Embedded Controlling Board, and functional boards. The Host Computer serves as the Human Machine Interface (HMI and processes uploaded data. The software running on Host Computer is designed on VC++, which is developed based on multithreading, Dynamic Linkable Library (DLL and Multiple Document Interface (MDI techniques. The Embedded Controlling Board uses ARM7 as the microcontroller and communicates with Host Computer via Ethernet. The Embedded Controlling Board software is realized based on embedded uclinux operating system with a layered architecture. The functional boards are designed based on Field Programmable Gate Array (FPGA and provide test interfaces for the logging tool. The functional board software is divided into independent sub-modules that can repeatedly be used by various functional boards and then integrated those sub-modules in the top layer. With the layered architecture and modularized design, the software system is highly reliable and extensible. With the help of designed system, a test has been conducted quickly and successfully on the electronic receiving cabin of the sonic logging tool. It demonstrated that the system could greatly improve the production efficiency of the sonic logging tool.

  8. Singular and interactive effects of blowdown, salvage logging, and wildfire in sub-boreal pine systems

    Science.gov (United States)

    D'Amato, A.W.; Fraver, S.; Palik, B.J.; Bradford, J.B.; Patty, L.

    2011-01-01

    The role of disturbance in structuring vegetation is widely recognized; however, we are only beginning to understand the effects of multiple interacting disturbances on ecosystem recovery and development. Of particular interest is the impact of post-disturbance management interventions, particularly in light of the global controversy surrounding the effects of salvage logging on forest ecosystem recovery. Studies of salvage logging impacts have focused on the effects of post-disturbance salvage logging within the context of a single natural disturbance event. There have been no formal evaluations of how these effects may differ when followed in short sequence by a second, high severity natural disturbance. To evaluate the impact of this management practice within the context of multiple disturbances, we examined the structural and woody plant community responses of sub-boreal Pinus banksiana systems to a rapid sequence of disturbances. Specifically, we compared responses to Blowdown (B), Fire (F), Blowdown-Fire, and Blowdown-Salvage-Fire (BSF) and compared these to undisturbed control (C) stands. Comparisons between BF and BSF indicated that the primary effect of salvage logging was a decrease in the abundance of structural legacies, such as downed woody debris and snags. Both of these compound disturbance sequences (BF and BSF), resulted in similar woody plant communities, largely dominated by Populus tremuloides; however, there was greater homogeneity in community composition in salvage logged areas. Areas experiencing solely fire (F stands) were dominated by P. banksiana regeneration, and blowdown areas (B stands) were largely characterized by regeneration from shade tolerant conifer species. Our results suggest that salvage logging impacts on woody plant communities are diminished when followed by a second high severity disturbance; however, impacts on structural legacies persist. Provisions for the retention of snags, downed logs, and surviving trees as part

  9. Log N-log S in inconclusive

    Science.gov (United States)

    Klebesadel, R. W.; Fenimore, E. E.; Laros, J.

    1983-01-01

    The log N-log S data acquired by the Pioneer Venus Orbiter Gamma Burst Detector (PVO) are presented and compared to similar data from the Soviet KONUS experiment. Although the PVO data are consistent with and suggestive of a -3/2 power law distribution, the results are not adequate at this state of observations to differentiate between a -3/2 and a -1 power law slope.

  10. Encyclopedia of well logging

    International Nuclear Information System (INIS)

    Desbrandes, R.

    1985-01-01

    The 16 chapters of this book aim to provide students, trainees and engineers with a manual covering all well-logging measurements ranging from drilling to productions, from oil to minerals going by way of geothermal energy. Each chapter is a summary but a bibliography is given at the end of each chapter. Well-logging during drilling, wireline logging equipment and techniques, petroleum logging, data processing of borehole data, interpretation of well-logging, sampling tools, completion and production logging, logging in relief wells to kill off uncontrolled blowouts, techniques for high temperature geothermal energy, small-scale mining and hydrology, logging with oil-base mud and finally recommended logging programs are all topics covered. There is one chapter on nuclear well-logging which is indexed separately. (UK)

  11. Interpretation of horizontal well production logs: influence of logging tool

    Energy Technology Data Exchange (ETDEWEB)

    Ozkan, E. [Colorado School of Mines, Boulder, CO (United States); Sarica, C. [Pennsylvania State Univ., College Park, PA (United States); Haci, M. [Drilling Measurements, Inc (United States)

    1998-12-31

    The influence of a production-logging tool on wellbore flow rate and pressure measurements was investigated, focusing on the disturbence caused by the production-logging tool and the coiled tubing on the original flow conditions in the wellbore. The investigation was carried out using an analytical model and single-phase liquid flow was assumed. Results showed that the production-logging tool influenced the measurements as shown by the deviation of the original flow-rate, pressure profiles and low-conductivity wellbores. High production rates increase the effect of the production-logging tool. Recovering or inferring the original flow conditions in the wellbore from the production-logging data is a very complex process which cannot be solved easily. For this reason, the conditions under which the information obtained by production-logging is meaningful is of considerable practical interest. 7 refs., 2 tabs., 15 figs.

  12. System em um operador logístico (3PL

    Directory of Open Access Journals (Sweden)

    Douglas Ribeiro Novaes

    2016-11-01

    Full Text Available With the constant technological advancement, the companies started to invest in new systems to support competitiveness in the market in which they operate. This article aims to describe the process of deployment of the technology Warehouse Management System. The tool known as WMS is a system that facilitates the handling operations and storage materials through defined parameters, but the deployment of this system need to go through steps that impact positively and negatively the company's various sectors. This study was developed because of the existence of questions related to the development of the implementation of project presenting departments and professionals involved in the process and due to the need to clarify doubts about the usefulness of system. This document was based on specific literature and complemented by a case study on the company Julio Simoes Logística S / A through an interview with the organization's representative. In order to logistics operator perform their daily activities as receipt, storage and dispatch efficiently it is necessary  a technology that provides accurate and reliable data,  and that make available information that allows the company, to improve its operations.

  13. The analog CTS communication interface in nuclear logging

    International Nuclear Information System (INIS)

    Li Min

    2000-01-01

    The author introduced a micro-controller-based CTS communication interface in nuclear logging, which provided convenience for the overhaul and regulation of the logging tool in CTS communication system. The use of micro-controller simplified the hardware structure of the interface, made the soft structure more rational and the whole system more flexible to control

  14. A transdisciplinary approach to developing a web-based nursing experiential log system for advanced practice nursing clinical experiences.

    Science.gov (United States)

    Olson, Brandon D; Fauchald, Sally K

    2011-11-01

    This article describes a transdisciplinary project between the computer information systems department and the graduate nursing department of a higher education institution. The project is the planning, development, and implementation of a Web-based nursing experiential log system for advanced practice nursing clinical experiences, which was funded by a Nursing Education Practice and Retention grant from the Health Resources and Services Administration. The article explains the concept and benefits of the transdisciplinary nature of the project. The design team, project leadership, and roles within the team are reviewed, including the role of end-user faculty in the design process. The article describes the focus and scope of the Web-based experiential log system database that is used to document and track advanced practice nursing student clinical experiences, as well as a summary of the design process used to develop the log system and the specific functionality of the database system. The implementation process, including end-user training, pilot implementation, and modifications, lessons learned, and future directions of the project are addressed. The article concludes with the benefits to the clinical experience and graduate nursing program that have been noted since the implementation of the system.

  15. SU-F-T-469: A Clinically Observed Discrepancy Between Image-Based and Log- Based MLC Position

    Energy Technology Data Exchange (ETDEWEB)

    Neal, B; Ahmed, M; Siebers, J [University of Virginia Health System, Charlottesville, VA (United States)

    2016-06-15

    Purpose: To present a clinical case which challenges the base assumption of log-file based QA, by showing that the actual position of a MLC leaf can suddenly deviate from its programmed and logged position by >1 mm as observed with real-time imaging. Methods: An EPID-based exit-fluence dosimetry system designed to prevent gross delivery errors was used in cine mode to capture portal images during treatment. Visual monitoring identified an anomalous MLC leaf pair gap not otherwise detected by the automatic position verification. The position of the erred leaf was measured on EPID images and log files were analyzed for the treatment in question, the prior day’s treatment, and for daily MLC test patterns acquired on those treatment days. Additional standard test patterns were used to quantify the leaf position. Results: Whereas the log file reported no difference between planned and recorded positions, image-based measurements showed the leaf to be 1.3±0.1 mm medial from the planned position. This offset was confirmed with the test pattern irradiations. Conclusion: It has been clinically observed that log-file derived leaf positions can differ from their actual positions by >1 mm, and therefore cannot be considered to be the actual leaf positions. This cautions the use of log-based methods for MLC or patient quality assurance without independent confirmation of log integrity. Frequent verification of MLC positions through independent means is a necessary precondition to trusting log file records. Intra-treatment EPID imaging provides a method to capture departures from MLC planned positions. Work was supported in part by Varian Medical Systems.

  16. The pdk-100 enhances interpretation capabilities for pulsed neutron capture logs

    International Nuclear Information System (INIS)

    Randall, R.R.; Oliver, D.W.; Ferti, W.H.

    1986-01-01

    The PDK-100 is a new pulsed neutron logging system designed to measure Sigma (Σ), the macroscopic thermal neutron capture cross section. In addition to determining Σ, the system provides logging curves which are a measure of formation porosity and which furnish information concerning borehole conditions. This paper reviews the principles of operation of the PDK-100, and presents examples which illustrate the utility of the logging system. In addition, the progress of investigations into new parameters which can be derived with pulsed neutron logging data will be reported

  17. The Development Of Windows Service Based Data Log System Using Light Dependent Resistor And Thingspeak IOT Cloud Platform

    Directory of Open Access Journals (Sweden)

    Tristan Jay P. Calaguas

    2017-03-01

    Full Text Available Microcontrollers are using in control and information processing it can be used in wide application such as agriculture health care commercial facilities robotics and education. These micro controllers are computers in chip that comprises of input and output ports central processing unit registers and main memory as well as communication interface such as Ethernet interface serial interface High Definition Multimedia Interface power source and many existing interface that can be found in this type of computer. In this study the researcher decided to conceptualize an innovative application of this type of computer where it has a potential to use as tracking system in specific individuals activities. Since some of office people are complaining in CCTV camera about their privacy this innovative concept of technology is in similar purpose but if we will compare the application concept in closed circuit camera the researcher decided to use visual graph instead video data that is in high exposure In the first phase the researcher made a concept on how the simple Light Dependent Resistor will apply in Schools Office Environment Application domain using microcontroller that was used as data log system and how this can be optimized without forcing the Dean or any designated person in office to operate it in hand due to their busy working hours. In the second phase the researcher develop the proposed data log system that are acquiring data through light luminance from fluorescent light of deans office and sending it in the IOT cloud platform. The researcher used fuzzy logic theory to model the operation of the proposed data log system. This study used experimental type of research when the prototype was developed during second phase the researcher simulated the operation. As the result the proposed data log system is sending data to Thingspeak IOT Cloud platform it displays the correct output which based from the rules and it is in column graph content

  18. Unified electronic unit for miniature radioactivity logging equipment

    International Nuclear Information System (INIS)

    Bragin, A.A.; Goldshtejn, L.M.; Fedorov, R.F.; Shikhman, A.S.

    1981-01-01

    Appropriateness and urgency of the unification of components of radioactivity logging equipment used for the investigation of wells at solid mineral deposits is substantiated. A two-channel electronic unit for miniature equipment for radioactivity logging is described and its basic specifications and performance are given. All functional assemblies of the unit are structurally made in the form of printed circuit boards placed in a pan-shaped chassis 28 mm in diameter. The unit's general design provides for the possibility to attach two probes with detection devices to the unit. The unit is used in the two-channel radioactivity logging instrument ''Kura-2'' and in the two-channel radiometer ''RUR-2''. The outer diameter of these instruments is 48 mm and they ensure the investigation of ore and coal wells with a combination radioactivity methods [ru

  19. Chemical logging of geothermal wells

    Science.gov (United States)

    Allen, C.A.; McAtee, R.E.

    The presence of geothermal aquifers can be detected while drilling in geothermal formations by maintaining a chemical log of the ratio of the concentrations of calcium to carbonate and bicarbonate ions in the return drilling fluid. A continuous increase in the ratio of the concentrations of calcium to carbonate and bicarbonate ions is indicative of the existence of a warm or hot geothermal aquifer at some increased depth.

  20. Neutron capture in borehole logging

    International Nuclear Information System (INIS)

    Randall, R.R.

    1981-01-01

    The use is described of a pulsed source of fast neutrons and a radiation detector to measure the thermal neutron population decay rate in a well logging instrument. The macroscopic neutron absorption cross-section is calculated by taking the natural logarithm of the ratio of the detected radiation counts occurring within two measurement intervals of fixed duration and starting at a fixed time after a neutron burst. (U.K.)

  1. Computer model for calculating gamma-ray pulse-height spectra for logging applications

    International Nuclear Information System (INIS)

    Evans, M.L.

    1981-01-01

    A generalized computer model has been devised to simulate the emission, transport, and detection of natural gamma radiation from various logging environments. The model yields high-resolution gamma-ray pulse-height spectra that can be used to correct both gross gamma and spectral gamma-ray logs. The technique can help provide corrections to airborne and surface radiometric survey logs for the effects of varying altitude, formation composition, and overburden. Applied to borehole logging, the model can yield estimates of the effects of varying borehole fluid and casing attenuations, as well as varying formation porosity and saturation

  2. Specializing network analysis to detect anomalous insider actions

    Science.gov (United States)

    Chen, You; Nyemba, Steve; Zhang, Wen; Malin, Bradley

    2012-01-01

    Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as a side-effect, leave such systems vulnerable to various attacks. Some of the more damaging malicious activities stem from internal misuse, where users are authorized to access system resources. A promising class of insider threat detection models for CIS focuses on mining access patterns from audit logs, however, current models are limited in that they assume organizations have significant resources to generate label cases for training classifiers or assume the user has committed a large number of actions that deviate from “normal” behavior. In lieu of the previous assumptions, we introduce an approach that detects when specific actions of an insider deviate from expectation in the context of collaborative behavior. Specifically, in this paper, we introduce a specialized network anomaly detection model, or SNAD, to detect such events. This approach assesses the extent to which a user influences the similarity of the group of users that access a particular record in the CIS. From a theoretical perspective, we show that the proposed model is appropriate for detecting insider actions in dynamic collaborative systems. From an empirical perspective, we perform an extensive evaluation of SNAD with the access logs of two distinct environments: the patient record access logs a large electronic health record system (6,015 users, 130,457 patients and 1,327,500 accesses) and the editing logs of Wikipedia (2,394,385 revisors, 55,200 articles and 6,482,780 revisions). We compare our model with several competing methods and demonstrate SNAD is significantly more effective: on average it achieves 20–30% greater area under an ROC curve. PMID:23399988

  3. Parallel checksumming of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-09-06

    Checksum values are generated and used to verify the data integrity. A client executing in a parallel computing system stores a data chunk to a shared data object on a storage node in the parallel computing system. The client determines a checksum value for the data chunk; and provides the checksum value with the data chunk to the storage node that stores the shared object. The data chunk can be stored on the storage node with the corresponding checksum value as part of the shared object. The storage node may be part of a Parallel Log-Structured File System (PLFS), and the client may comprise, for example, a Log-Structured File System client on a compute node or burst buffer. The checksum value can be evaluated when the data chunk is read from the storage node to verify the integrity of the data that is read.

  4. Log-Based Recovery in Asynchronous Distributed Systems. Ph.D. Thesis

    Science.gov (United States)

    Kane, Kenneth Paul

    1989-01-01

    A log-based mechanism is described for restoring consistent states to replicated data objects after failures. Preserving a causal form of consistency based on the notion of virtual time is focused upon in this report. Causal consistency has been shown to apply to a variety of applications, including distributed simulation, task decomposition, and mail delivery systems. Several mechanisms have been proposed for implementing causally consistent recovery, most notably those of Strom and Yemini, and Johnson and Zwaenepoel. The mechanism proposed here differs from these in two major respects. First, a roll-forward style of recovery is implemented. A functioning process is never required to roll-back its state in order to achieve consistency with a recovering process. Second, the mechanism does not require any explicit information about the causal dependencies between updates. Instead, all necessary dependency information is inferred from the orders in which updates are logged by the object servers. This basic recovery technique appears to be applicable to forms of consistency other than causal consistency. In particular, it is shown how the recovery technique can be modified to support an atomic form of consistency (grouping consistency). By combining grouping consistency with casual consistency, it may even be possible to implement serializable consistency within this mechanism.

  5. Log-Normal Distribution in a Growing System with Weighted and Multiplicatively Interacting Particles

    Science.gov (United States)

    Fujihara, Akihiro; Tanimoto, Satoshi; Yamamoto, Hiroshi; Ohtsuki, Toshiya

    2018-03-01

    A growing system with weighted and multiplicatively interacting particles is investigated. Each particle has a quantity that changes multiplicatively after a binary interaction, with its growth rate controlled by a weight parameter in a homogeneous symmetric kernel. We consider the system using moment inequalities and analytically derive the log-normal-type tail in the probability distribution function of quantities when the parameter is negative, which is different from the result for single-body multiplicative processes. We also find that the system approaches a winner-take-all state when the parameter is positive.

  6. On the Ergodic Capacity of Dual-Branch Correlated Log-Normal Fading Channels with Applications

    KAUST Repository

    Al-Quwaiee, Hessa

    2015-05-01

    Closed-form expressions of the ergodic capacity of independent or correlated diversity branches over Log-Normal fading channels are not available in the literature. Thus, it is become of an interest to investigate the behavior of such metric at high signal-to-noise (SNR). In this work, we propose simple closed-form asymptotic expressions of the ergodic capacity of dual-branch correlated Log- Normal corresponding to selection combining, and switch-and-stay combining. Furthermore, we capitalize on these new results to find new asymptotic ergodic capacity of correlated dual- branch free-space optical communication system under the impact of pointing error with both heterodyne and intensity modulation/direct detection. © 2015 IEEE.

  7. Glass scintillator pair for compensation neutron logging

    International Nuclear Information System (INIS)

    Ji Changsong; Li Xuezhi; Yiu Guangduo

    1985-01-01

    Glass scintillator pair types ST 1604 and ST 1605 for compensation of neutron logging is developed. The neutron sensitive material used is multistick lithium glass scintillators 3 and 4 mm in diameter respectively. Thermoneutron detection efficiencies are 50-60% and 100% respectively. The detection efficiency for 60 Co γ ray is lower than 0.3%. The type ST 1604 and ST 1605 may also be used as high sensitive neutron detectors in an intensive γ ray field

  8. Analysis of log rate noise in Ontario's CANDU reactors

    Energy Technology Data Exchange (ETDEWEB)

    Hinds, H.W. [Dynamic Simulation and Analysis Corp., Deep River, Ontario (Canada); Banica, C.; Arguner, D. [Ontario Power Generation, Ajax, Ontario (Canada); Scharfenberg, R. [Bruce Power, Tiverton, Ontario (Canada)

    2007-07-01

    In the fall of 2003, the operators noticed that in the recently-refurbished Bruce A Shutdown System no. 1 (SDS1) the noise level in Log Rate signals were much larger than before. At the request of the Canadian Nuclear Safety Commission (CNSC), all Canadian CANDU reactors took action to characterize their Log Rate noise. Staff of the Inspection and Maintenance Services division of Ontario Power Generation (OPG) has collected high-speed high-accuracy noise data from nearly all 16 Ontario reactors, either as part of routine measurements before planned outages or as a dedicated noise recording. This paper gives the results of examining a suitable subset of this data, with respect to the characteristics and possible causes of Log Rate noise. The reactor and instrumentation design is different at each station: the locations of the moderator injection nozzles, the location of the ion chambers for each system, and the design of the Log Rate amplifiers. It was found that the Log noise (source of Log Rate noise) was much larger for those ion chambers in the path of the moderator injection nozzles, compared to those which were not in the path. This 'extra' Log noise would then be either attenuated or amplified depending on the transfer function (time constants) of the Log Rate amplifier. It was also observed that most of the Log and Log Rate noise is independent of any other signal measured. Although all CANDU reactors in Ontario have Log and Log Rate noise, the Bruce A SDS1 system has the largest amount of Log Rate noise, because (a) its SDS1 (and RRS) ion chambers are at the top of the reactor in the path of the moderator injection nozzles, and (b) its SDS1 Log Rate amplifiers have the smallest time constants. (author)

  9. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  10. Reprint of "Two-stage sparse coding of region covariance via Log-Euclidean kernels to detect saliency".

    Science.gov (United States)

    Zhang, Ying-Ying; Yang, Cai; Zhang, Ping

    2017-08-01

    In this paper, we present a novel bottom-up saliency detection algorithm from the perspective of covariance matrices on a Riemannian manifold. Each superpixel is described by a region covariance matrix on Riemannian Manifolds. We carry out a two-stage sparse coding scheme via Log-Euclidean kernels to extract salient objects efficiently. In the first stage, given background dictionary on image borders, sparse coding of each region covariance via Log-Euclidean kernels is performed. The reconstruction error on the background dictionary is regarded as the initial saliency of each superpixel. In the second stage, an improvement of the initial result is achieved by calculating reconstruction errors of the superpixels on foreground dictionary, which is extracted from the first stage saliency map. The sparse coding in the second stage is similar to the first stage, but is able to effectively highlight the salient objects uniformly from the background. Finally, three post-processing methods-highlight-inhibition function, context-based saliency weighting, and the graph cut-are adopted to further refine the saliency map. Experiments on four public benchmark datasets show that the proposed algorithm outperforms the state-of-the-art methods in terms of precision, recall and mean absolute error, and demonstrate the robustness and efficiency of the proposed method. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. An artificial intelligence approach to well log correlation

    International Nuclear Information System (INIS)

    Startzman, R.A.; Kuo, T.B.

    1986-01-01

    This paper shows how an expert computer system was developed to correlate two well logs in at least moderately difficult situations. A four step process was devised to process log trace information and apply a set of rules to identify zonal correlations. Some of the advantages and problems with the artificial intelligence approach are shown using field logs. The approach is useful and, if properly and systematically applied, it can result in good correlations

  12. Detection of gas hydrate with downhole logs and assessment of gas hydrate concentrations (saturations) and gas volumes on the Blake Ridge with electrical resistivity log data

    Science.gov (United States)

    Collett, T.S.; Ladd, J.

    2000-01-01

    Let 164 of the Ocean Drilling Program was designed to investigate the occurrence of gas hydrate in the sedimentary section beneath the Blake Ridge on the southeastern continental margin of North America. Site 994, and 997 were drilled on the Blake Ridge to refine our understanding of the in situ characteristics of natural gas hydrate. Because gas hydrate is unstable at surface pressure and temperature conditions, a major emphasis was placed on the downhole logging program to determine the in situ physical properties of the gas hydrate-bearing sediments. Downhole logging tool strings deployed on Leg 164 included the Schlumberger quad-combination tool (NGT, LSS/SDT, DIT, CNT-G, HLDT), the Formation MicroScanner (FMS), and the Geochemical Combination Tool (GST). Electrical resistivity (DIT) and acoustic transit-time (LSS/SDT) downhole logs from Sites 994, 995, and 997 indicate the presence of gas hydrate in the depth interval between 185 and 450 mbsf on the Blake Ridge. Electrical resistivity log calculations suggest that the gas hydrate-bearing sedimentary section on the Blake Ridge may contain between 2 and 11 percent bulk volume (vol%) gas hydrate. We have determined that the log-inferred gas hydrates and underlying free-gas accumulations on the Blake Ridge may contain as much as 57 trillion m3 of gas.

  13. Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS)

    Science.gov (United States)

    Zhou, Zheng; Liu, Brent J.; Huang, H. K.; Guo, Bing; Documet, Jorge; King, Nelson

    2006-03-01

    The deadline of HIPAA (Health Insurance Portability and Accountability Act) Security Rules has passed on February 2005; therefore being HIPAA compliant becomes extremely critical to healthcare providers. HIPAA mandates healthcare providers to protect the privacy and integrity of the health data and have the ability to demonstrate examples of mechanisms that can be used to accomplish this task. It is also required that a healthcare institution must be able to provide audit trails on image data access on demand for a specific patient. For these reasons, we have developed a HIPAA compliant auditing system (HCAS) for image data security in a PACS by auditing every image data access. The HCAS was presented in 2005 SPIE. This year, two new components, LDSE (Lossless Digital Signature Embedding) and LTVS (Patient Location Tracking and Verification System) logs, have been added to the HCAS. The LDSE can assure medical image integrity in a PACS, while the LTVS can provide access control for a PACS by creating a security zone in the clinical environment. By integrating the LDSE and LTVS logs with the HCAS, the privacy and integrity of image data can be audited as well. Thus, a PACS with the HCAS installed can become HIPAA compliant in image data privacy and integrity, access control, and audit control.

  14. Pulsed neutron source well logging system

    International Nuclear Information System (INIS)

    Dillingham, M.E.

    1975-01-01

    A pulsed neutron source arrangement is provided in which a sealed cylindrical chamber encloses a rotatable rotor member carrying a plurality of elongated target strips of material which emits neutrons when bombarded with alpha particles emitted by the plurality of source material strips. The rotor may be locked in a so-called ON position by an electromagnetic clutch drive mechanism controllable from the earth's surface so as to permit the making of various types of logs utilizing a continuously emitting neutron source. (Patent Office Record)

  15. Monte Carlo Numerical Models for Nuclear Logging Applications

    Directory of Open Access Journals (Sweden)

    Fusheng Li

    2012-06-01

    Full Text Available Nuclear logging is one of most important logging services provided by many oil service companies. The main parameters of interest are formation porosity, bulk density, and natural radiation. Other services are also provided from using complex nuclear logging tools, such as formation lithology/mineralogy, etc. Some parameters can be measured by using neutron logging tools and some can only be measured by using a gamma ray tool. To understand the response of nuclear logging tools, the neutron transport/diffusion theory and photon diffusion theory are needed. Unfortunately, for most cases there are no analytical answers if complex tool geometry is involved. For many years, Monte Carlo numerical models have been used by nuclear scientists in the well logging industry to address these challenges. The models have been widely employed in the optimization of nuclear logging tool design, and the development of interpretation methods for nuclear logs. They have also been used to predict the response of nuclear logging systems for forward simulation problems. In this case, the system parameters including geometry, materials and nuclear sources, etc., are pre-defined and the transportation and interactions of nuclear particles (such as neutrons, photons and/or electrons in the regions of interest are simulated according to detailed nuclear physics theory and their nuclear cross-section data (probability of interacting. Then the deposited energies of particles entering the detectors are recorded and tallied and the tool responses to such a scenario are generated. A general-purpose code named Monte Carlo N– Particle (MCNP has been the industry-standard for some time. In this paper, we briefly introduce the fundamental principles of Monte Carlo numerical modeling and review the physics of MCNP. Some of the latest developments of Monte Carlo Models are also reviewed. A variety of examples are presented to illustrate the uses of Monte Carlo numerical models

  16. Borehole logging

    International Nuclear Information System (INIS)

    Olsen, H.

    1995-01-01

    Numerous ground water investigations have been accomplished by means of borehole logging. Borehole logging can be applied to establish new water recovery wells, to control the existing water producing wells and source areas and to estimate ground water quality. (EG)

  17. Numerical simulation of logging-while-drilling density image by Monte-Carlo method

    International Nuclear Information System (INIS)

    Yue Aizhong; He Biao; Zhang Jianmin; Wang Lijuan

    2010-01-01

    Logging-while-drilling system is researched by Monte Carlo Method. Model of Logging-while-drilling system is built, tool response and azimuth density image are acquired, methods dealing with azimuth density data is discussed. This outcome lay foundation for optimizing tool, developing new tool and logging explanation. (authors)

  18. How Intrusion Detection Can Improve Software Decoy Applications

    National Research Council Canada - National Science Library

    Monteiro, Valter

    2003-01-01

    This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack...

  19. A tool for aligning event logs and prescriptive process models through automated planning

    OpenAIRE

    De Leoni, M.; Lanciano, G.; Marrella, A.

    2017-01-01

    In Conformance Checking, alignment is the problem of detecting and repairing nonconformity between the actual execution of a business process, as recorded in an event log, and the model of the same process. Literature proposes solutions for the alignment problem that are implementations of planning algorithms built ad-hoc for the specific problem. Unfortunately, in the era of big data, these ad-hoc implementations do not scale sufficiently compared with wellestablished planning systems. In th...

  20. Ubiquitous Learning Project Using Life-Logging Technology in Japan

    Science.gov (United States)

    Ogata, Hiroaki; Hou, Bin; Li, Mengmeng; Uosaki, Noriko; Mouri, Kosuke; Liu, Songran

    2014-01-01

    A Ubiquitous Learning Log (ULL) is defined as a digital record of what a learner has learned in daily life using ubiquitous computing technologies. In this paper, a project which developed a system called SCROLL (System for Capturing and Reusing Of Learning Log) is presented. The aim of developing SCROLL is to help learners record, organize,…

  1. Time derived sigma for pulsed neutron capture logging

    International Nuclear Information System (INIS)

    Randall, R.R.; Fertl, W.F.; Hopkinson, E.C.

    1981-01-01

    The purpose of this study is to review field applications of the Atlas Neutron Lifetime Log service and to examine recent technical advances in the instrumentation and data analysis system. The major improvement to be discussed is a new method for computing /SIGMA/, the thermal neutron capture cross section of an earth formation. In the new method, the time after the neutron burst is measured for each gamma ray pulse detected by the instrumentation system within a gate of fixed width. This ''average pulse time'' is uniquely related to the thermal neutron decay rate observed in a borehole environment. The technique discussed is applicable for any condition where the neutron or gamma ray flux is time dependent. The advantages of this signal processing method, however, are most apparent for cases of rapid flux change with time, as in an exponential decay. 7 refs

  2. Method and apparatus for nuclear logging making use of lithium detectors and equipment for gamma ray stripping; Fremgangsmaate og apparat til nuklear logging med bruk av litiummontasjer og anordning for gammastraalestripping

    Energy Technology Data Exchange (ETDEWEB)

    Perry, C.A.; Daigle, G.A.; Bruck, W.D. [and others

    1998-05-11

    The patent deals with a borehole logging tool where a pair of spaced-apart lithium detectors is lowered into a borehole traversing a sursurface formation. The formation is irradiated with bursts of neutrons, and the neutrons returning to the borehole are detected by thermal neutron detectors. The dieaway gamma ray spectra provide information on the formation porosity. A MWD system includes a programmable gain amplifier and gamma ray stripping means. 30 figs.

  3. Automated mineralogical logging of coal and coal measure core

    Energy Technology Data Exchange (ETDEWEB)

    Stephen Fraser; Joan Esterle; Colin Ward; Ruth Henwood; Peter Mason; Jon Huntington; Phil Connor; Reneta Sliwa; Dave Coward; Lew Whitbourn [CSIRO Exploration & Mining (Australia)

    2006-06-15

    A mineralogical core logging system based on spectral reflectance (HyLogger{trademark}) has been used to detect and quantify mineralogies in coal and coal measure sediments. The HyLogger{trademark} system, as tested, operates in the visible-to-shortwave infrared spectral region, where iron oxides, sulphates, hydroxyl-bearing and carbonate minerals have characteristic spectral responses. Specialized software assists with mineral identification and data display. Three Phases of activity were undertaken. In Phase I, carbonates (siderite, ankerite, calcite) and clays (halloysite, dickite) were successfully detected and mapped in coal. Repeat measurements taken from one of the cores after three months demonstrated the reproducibility of the spectral approach, with some spectral differences being attributed to variations in moisture content and oxidation. Also, investigated was HyLogger{trademark} ability to create a 'brightness-profile' on coal materials, and these results were encouraging. In Phase II, geotechnically significant smectitic clays (montmorillonite) were detected and mapped in cores of clastic roof and floor materials. Such knowledge would be useful for mine planning and design purposes. In Phase III, our attempts at determining whether phosphorus-bearing minerals such as apatite could be spectrally detected were less than conclusive. A spectral index could only be created for apatite, and the relationships between the spectrally-derived apatite-index, the XRD results and the analytically-derived phosphorus measurements were ambiguous.

  4. Requirements-Driven Log Analysis Extended Abstract

    Science.gov (United States)

    Havelund, Klaus

    2012-01-01

    Imagine that you are tasked to help a project improve their testing effort. In a realistic scenario it will quickly become clear, that having an impact is diffcult. First of all, it will likely be a challenge to suggest an alternative approach which is significantly more automated and/or more effective than current practice. The reality is that an average software system has a complex input/output behavior. An automated testing approach will have to auto-generate test cases, each being a pair (i; o) consisting of a test input i and an oracle o. The test input i has to be somewhat meaningful, and the oracle o can be very complicated to compute. Second, even in case where some testing technology has been developed that might improve current practice, it is then likely difficult to completely change the current behavior of the testing team unless the technique is obviously superior and does everything already done by existing technology. So is there an easier way to incorporate formal methods-based approaches than the full edged test revolution? Fortunately the answer is affirmative. A relatively simple approach is to benefit from possibly already existing logging infrastructure, which after all is part of most systems put in production. A log is a sequence of events, generated by special log recording statements, most often manually inserted in the code by the programmers. An event can be considered as a data record: a mapping from field names to values. We can analyze such a log using formal methods, for example checking it against a formal specification. This separates running the system for analyzing its behavior. It is not meant as an alternative to testing since it does not address the important in- put generation problem. However, it offers a solution which testing teams might accept since it has low impact on the existing process. A single person might be assigned to perform such log analysis, compared to the entire testing team changing behavior.

  5. A new chlorine logging tool: Application in the oilfield development with high salinity formation water

    International Nuclear Information System (INIS)

    Qing-Yuan, He; Xin-Miao, Hu; Geng-Fei, Wu; Wen-DA, J.

    1997-01-01

    Radiating formations with isotopes neutron source (Am-Be), and using chlorine element contained in the formation water as a tracer indicator, the chlorine spectrum well logging tool has been regarded as the important and useful tool in the determination of water flooding intensity of formation intervals, especially in the oilfield development stages with high salinity formation water. However, the accuracy of determination of the oil/water-bearings needs to be improved. A new chlorine spectrum logging tool with two detectors has been developed. The short (near) detector uses a He-3 counter tube to measure formation epithermal neutron intensity, the long (far) detector uses a BGO crystal detector to replace traditional Nal detector for measuring the captured X gamma ray spectrum produced by the thermal neutron capture process in the formation. Although the energy resolution of BGO detector to gamma rays is less effective than that of Nal detector, the efficiency of BGO detector to high energy gamma rays is much better. This advantage helps to detect captured chlorine gamma rays, which increases the ability of chlorine element detection. The effect of statistical errors is also reduced. The spectrum autostabilization function in the downhole tool improves the reliability of the whole system. The new chlorine spectrum logging tool can give three log curves simultaneously, these curves are formation porosity, chlorine content, and the ratio of chlorine content and thermal neutron intensity. When formation porosity is larger than 10 p.u, formation water salinity is greater than 40,000 ppm, the resolution to the oil/water-bearings is increased to about 10% compared with the old version tool. Field tests show that the accuracy of water flooding intensity evaluation has been upgraded considerably with the use of new chlorine spectrum logging tool, which contributes greatly to the oilfield development with high salinity formation water

  6. A new chlorine logging tool: Application in the oilfield development with high salinity formation water

    Energy Technology Data Exchange (ETDEWEB)

    Qing-Yuan, He; Xin-Miao, Hu; Geng-Fei, Wu [China National Petroleum Corp. (China). Jianghan Well Logging Institute; Wen-DA, J. [China National Petroleum Corp. (China). Development Bureau

    1997-10-01

    Radiating formations with isotopes neutron source (Am-Be), and using chlorine element contained in the formation water as a tracer indicator, the chlorine spectrum well logging tool has been regarded as the important and useful tool in the determination of water flooding intensity of formation intervals, especially in the oilfield development stages with high salinity formation water. However, the accuracy of determination of the oil/water-bearings needs to be improved. A new chlorine spectrum logging tool with two detectors has been developed. The short (near) detector uses a He-3 counter tube to measure formation epithermal neutron intensity, the long (far) detector uses a BGO crystal detector to replace traditional Nal detector for measuring the captured X gamma ray spectrum produced by the thermal neutron capture process in the formation. Although the energy resolution of BGO detector to gamma rays is less effective than that of Nal detector, the efficiency of BGO detector to high energy gamma rays is much better. This advantage helps to detect captured chlorine gamma rays, which increases the ability of chlorine element detection. The effect of statistical errors is also reduced. The spectrum autostabilization function in the downhole tool improves the reliability of the whole system. The new chlorine spectrum logging tool can give three log curves simultaneously, these curves are formation porosity, chlorine content, and the ratio of chlorine content and thermal neutron intensity. When formation porosity is larger than 10 p.u, formation water salinity is greater than 40,000 ppm, the resolution to the oil/water-bearings is increased to about 10% compared with the old version tool. Field tests show that the accuracy of water flooding intensity evaluation has been upgraded considerably with the use of new chlorine spectrum logging tool, which contributes greatly to the oilfield development with high salinity formation water 4 refs., 2 tabs., 7 figs.

  7. Utilization and cost of log production from animal loging operations

    Science.gov (United States)

    Suraj P. Shrestha; Bobby L. Lanford; Robert B. Rummer; Mark Dubois

    2006-01-01

    Forest harvesting with animals is a labor-intensive operation. It is expensive to use machines on smaller woodlots, which require frequent moves if mechanically logged. So, small logging systems using animals may be more cost effective. In this study, work sampling was used for five animal logging operations in Alabama to measure productive and non-productive time...

  8. Toward an Automated Labeling of Event Log Attributes

    DEFF Research Database (Denmark)

    Abbad Andaloussi, Amine; Burattin, Andrea; Weber, Barbara

    2018-01-01

    information systems often do not comply with the required maturity level, since they lack the notion of process instance, also referred in process mining as “case id”. Without a proper identification of the case id attribute in log files, the outcome of process mining algorithms is unpredictable. This paper...... proposes a new approach that aims to overcome this challenge by automatically inferring the case id attribute from log files. The approach has been implemented as a ProM plugin and evaluated with several real-world event logs. The results demonstrate a high accuracy in inferring the case id attribute.......Process mining aims at exploring the data produced by executable business processes to mine the underlying control-flow and dataflow. Most of the process mining algorithms assume the existence of an event log with a certain maturity level. Unfortunately, the logs provided by process unaware...

  9. PUMA Internet Task Logging Using the IDAC-1

    Directory of Open Access Journals (Sweden)

    K. N. Tarchanidis

    2014-08-01

    Full Text Available This project uses an IDAC-1 board to sample the joint angle position of the PUMA 76 1 robot and log the results on a computer. The robot is at the task location and the logging computer is located in a different one. The task the robot is performing is based on a Pseudo Stereo Vision System (PSVS. Internet is the transport media. The protocol used in this project is UDP/IP. The actual angle is taken straight from the PUMA controller. High-resolution potentiometers are connected on each robot joint and are buffered and sampled as potential difference on an A/D converter integrated on the IDAC-1. The logging computer through the Internet acting as client asks for the angle set, the IDAC-1 responds as server with the 10-bit resolution sampling of the joint position. The whole task is logged in a file on the logging computer. This application can give the ability to the Internet user to monitor and log the robot tasks anywhere in the Word Wide Web (www.

  10. Observations from borehole dilution logging experiments in fractured crystalline rock under variable hydraulic conditions

    Science.gov (United States)

    Harte, Philip T.; Anderson, Alton; Williams, John H.

    2014-01-01

    Identifying hydraulically active fractures in low permeability, crystalline-bedrock aquifers requires a variety of geophysical and hydrogeophysical borehole tools and approaches. One such approach is Single Borehole Dilution Tests (SBDT), which in some low flow cases have been shown to provide greater resolution of borehole flow than other logging procedures, such as vertical differential Heat Pulse Flowmeter (HPFM) logging. Because the tools used in SBDT collect continuous profiles of water quality or dye changes, they can identify horizontal flow zones and vertical flow. We used SBDT with a food grade blue dye as a tracer and dual photometer-nephelometer measurements to identify low flow zones.SBDT were conducted at seven wells with open boreholes (exceeding 300 ft). At most of the wells HPFM logs were also collected. The seven wells are set in low-permeability, fractured granite and gneiss rocks underlying a former tetrachloroeythylene (PCE) source area at the Savage Municipal Well Superfund site in Milford, NH. Time series SBDT logs were collected at each of the seven wells under three distinct hydraulic conditions: (1) ambient conditions prior to a pump test at an adjacent well, (2) mid test, after 2-3 days of the start of the pump test, and (3) at the end of the test, after 8-9 days of the pump test. None of the SBDT were conducted under pumping conditions in the logged well. For each condition, wells were initially passively spiked with blue dye once and subsequent time series measurements were made.Measurement accuracy and precision of the photometer tool is important in SBDT when attempting to detect low rates of borehole flow. Tests indicate that under ambient conditions, none of the wells had detectable flow as measured with HPFM logging. With SBDT, 4 of the 7 showed the presence of some very low flow. None of 5 (2 of the 7 wells initially logged with HPFM under ambient conditions were not re-logged) wells logged with the HPFM during the pump test had

  11. Value of NMR logging for heavy oil characterization

    Energy Technology Data Exchange (ETDEWEB)

    Chen, S.; Chen, J.; Georgi, D. [Baker Hughes, Calgary, AB (Canada); Sun, B. [Chevron Energy Technology Co., Calgary, AB (Canada)

    2008-07-01

    Non-conventional, heavy oil fields are becoming increasingly important to the security of energy supplies and are becoming economically profitable to produce. Heavy oil reservoirs are difficult to evaluate since they are typically shallow and the connate waters are very fresh. Other heavy oil reservoirs are oil-wet where the resistivities are not indicative of saturation. Nuclear magnetic resonance (NMR) detects molecular level interactions. As such, it responds distinctively to different hydrocarbon molecules, thereby opening a new avenue for constituent analysis. This feature makes NMR a more powerful technique than bulk oil density or viscosity measurements for characterizing oils, and is the basis for detecting gas in heavy oil fields. NMR logging, which measures fluid in pore space directly, is capable of separating oil from water. It is possible to discern movable from bound water by analyzing NMR logs. The oil viscosity can be also quantified from NMR logs, NMR relaxation time and diffusivity estimates. The unique challenges for heavy oil reservoir characterization for the NMR technique were discussed with reference to the extra-fast decay of the NMR signal in response to extra-heavy oil/tars, and the lack of sensitivity in measuring very slow diffusion of heavy oil molecules. This paper presented various methods for analyzing heavy oil reservoirs in different viscosity ranges. Heavy oil fields in Venezuela, Kazakhstan, Canada, Alaska and the Middle East were analyzed using different data interpretation approaches based on the reservoir formation characteristics and the heavy oil type. NMR direct fluid typing was adequate for clean sands and carbonate reservoirs while integrated approaches were used to interpret extra heavy oils and tars. It was concluded that NMR logs can provide quantitative measures for heavy oil saturation, identify sweet spots or tar streaks, and quantify heavy oil viscosity within reasonable accuracy. 14 refs., 16 figs.

  12. 3D VMAT Verification Based on Monte Carlo Log File Simulation with Experimental Feedback from Film Dosimetry.

    Science.gov (United States)

    Barbeiro, A R; Ureba, A; Baeza, J A; Linares, R; Perucha, M; Jiménez-Ortega, E; Velázquez, S; Mateos, J C; Leal, A

    2016-01-01

    A model based on a specific phantom, called QuAArC, has been designed for the evaluation of planning and verification systems of complex radiotherapy treatments, such as volumetric modulated arc therapy (VMAT). This model uses the high accuracy provided by the Monte Carlo (MC) simulation of log files and allows the experimental feedback from the high spatial resolution of films hosted in QuAArC. This cylindrical phantom was specifically designed to host films rolled at different radial distances able to take into account the entrance fluence and the 3D dose distribution. Ionization chamber measurements are also included in the feedback process for absolute dose considerations. In this way, automated MC simulation of treatment log files is implemented to calculate the actual delivery geometries, while the monitor units are experimentally adjusted to reconstruct the dose-volume histogram (DVH) on the patient CT. Prostate and head and neck clinical cases, previously planned with Monaco and Pinnacle treatment planning systems and verified with two different commercial systems (Delta4 and COMPASS), were selected in order to test operational feasibility of the proposed model. The proper operation of the feedback procedure was proved through the achieved high agreement between reconstructed dose distributions and the film measurements (global gamma passing rates > 90% for the 2%/2 mm criteria). The necessary discretization level of the log file for dose calculation and the potential mismatching between calculated control points and detection grid in the verification process were discussed. Besides the effect of dose calculation accuracy of the analytic algorithm implemented in treatment planning systems for a dynamic technique, it was discussed the importance of the detection density level and its location in VMAT specific phantom to obtain a more reliable DVH in the patient CT. The proposed model also showed enough robustness and efficiency to be considered as a pre

  13. Calculating tissue shear modulus and pressure by 2D log-elastographic methods

    International Nuclear Information System (INIS)

    McLaughlin, Joyce R; Zhang, Ning; Manduca, Armando

    2010-01-01

    Shear modulus imaging, often called elastography, enables detection and characterization of tissue abnormalities. In this paper the data are two displacement components obtained from successive MR or ultrasound data sets acquired while the tissue is excited mechanically. A 2D plane strain elastic model is assumed to govern the 2D displacement, u. The shear modulus, μ, is unknown and whether or not the first Lamé parameter, λ, is known the pressure p = λ∇ . u which is present in the plane strain model cannot be measured and is unreliably computed from measured data and can be shown to be an order one quantity in the units kPa. So here we present a 2D log-elastographic inverse algorithm that (1) simultaneously reconstructs the shear modulus, μ, and p, which together satisfy a first-order partial differential equation system, with the goal of imaging μ; (2) controls potential exponential growth in the numerical error and (3) reliably reconstructs the quantity p in the inverse algorithm as compared to the same quantity computed with a forward algorithm. This work generalizes the log-elastographic algorithm in Lin et al (2009 Inverse Problems 25) which uses one displacement component, is derived assuming that the component satisfies the wave equation and is tested on synthetic data computed with the wave equation model. The 2D log-elastographic algorithm is tested on 2D synthetic data and 2D in vivo data from Mayo Clinic. We also exhibit examples to show that the 2D log-elastographic algorithm improves the quality of the recovered images as compared to the log-elastographic and direct inversion algorithms

  14. SU-F-T-172: A Method for Log File QA On An IBA Proteus System for Patient Specific Spot Scanning Quality Assurance

    Energy Technology Data Exchange (ETDEWEB)

    Tang, S; Ho, M; Chen, C; Mah, D [ProCure NJ, Somerset, NJ (United States); Rice, I; Doan, D; Mac Rae, B [IBA, Somerset, NJ (United States)

    2016-06-15

    Purpose: The use of log files to perform patient specific quality assurance for both protons and IMRT has been established. Here, we extend that approach to a proprietary log file format and compare our results to measurements in phantom. Our goal was to generate a system that would permit gross errors to be found within 3 fractions until direct measurements. This approach could eventually replace direct measurements. Methods: Spot scanning protons pass through multi-wire ionization chambers which provide information about the charge, location, and size of each delivered spot. We have generated a program that calculates the dose in phantom from these log files and compares the measurements with the plan. The program has 3 different spot shape models: single Gaussian, double Gaussian and the ASTROID model. The program was benchmarked across different treatment sites for 23 patients and 74 fields. Results: The dose calculated from the log files were compared to those generate by the treatment planning system (Raystation). While the dual Gaussian model often gave better agreement, overall, the ASTROID model gave the most consistent results. Using a 5%–3 mm gamma with a 90% passing criteria and excluding doses below 20% of prescription all patient samples passed. However, the degree of agreement of the log file approach was slightly worse than that of the chamber array measurement approach. Operationally, this implies that if the beam passes the log file model, it should pass direct measurement. Conclusion: We have established and benchmarked a model for log file QA in an IBA proteus plus system. The choice of optimal spot model for a given class of patients may be affected by factors such as site, field size, and range shifter and will be investigated further.

  15. Identifying APT Malware Domain Based on Mobile DNS Logging

    Directory of Open Access Journals (Sweden)

    Weina Niu

    2017-01-01

    Full Text Available Advanced Persistent Threat (APT is a serious threat against sensitive information. Current detection approaches are time-consuming since they detect APT attack by in-depth analysis of massive amounts of data after data breaches. Specifically, APT attackers make use of DNS to locate their command and control (C&C servers and victims’ machines. In this paper, we propose an efficient approach to detect APT malware C&C domain with high accuracy by analyzing DNS logs. We first extract 15 features from DNS logs of mobile devices. According to Alexa ranking and the VirusTotal’s judgement result, we give each domain a score. Then, we select the most normal domains by the score metric. Finally, we utilize our anomaly detection algorithm, called Global Abnormal Forest (GAF, to identify malware C&C domains. We conduct a performance analysis to demonstrate that our approach is more efficient than other existing works in terms of calculation efficiency and recognition accuracy. Compared with Local Outlier Factor (LOF, k-Nearest Neighbor (KNN, and Isolation Forest (iForest, our approach obtains more than 99% F-M and R for the detection of C&C domains. Our approach not only can reduce data volume that needs to be recorded and analyzed but also can be applicable to unsupervised learning.

  16. Study of the reservoirs of Jurassic and Cretaceous periods in the south-cast slope of Central Kara-Kum vault using combination of acoustic logging, neutron-gamma logging, gamma logging, and electrical logging

    International Nuclear Information System (INIS)

    Meredov, T.M.; Baranov, M.I.

    1978-01-01

    Considered is the possibility of application of the combination of neutron-gamma logging, gamma logging al partitioncoustic logging and electrical logging to lithologica of sections, discovery reservoir layers in carbonate and terrigeneous sections as well as quantitative estimation of the porosity coefficients values at prospecting areas in the south-east slope of Central Kara-Kum vault. Neutron-gamma logging mostly makes it possible to partition carbonate rocks into limestones, dolomites and their interstitial variaties and to indicate sand stone layers with different degree of carbonate content

  17. TH-AB-201-12: Using Machine Log-Files for Treatment Planning and Delivery QA

    Energy Technology Data Exchange (ETDEWEB)

    Stanhope, C [Beaumont Health System, Royal Oak MI and Wayne State University, Detroit, MI (United States); Liang, J; Drake, D; Yan, D [Beaumont Health System, Royal Oak, MI (United States)

    2016-06-15

    Purpose: To determine the segment reduction and dose resolution necessary for machine log-files to effectively replace current phantom-based patient-specific quality assurance, while minimizing computational cost. Methods: Elekta’s Log File Convertor R3.2 records linac delivery parameters (dose rate, gantry angle, leaf position) every 40ms. Five VMAT plans [4 H&N, 1 Pulsed Brain] comprised of 2 arcs each were delivered on the ArcCHECK phantom. Log-files were reconstructed in Pinnacle on the phantom geometry using 1/2/3/4° control point spacing and 2/3/4mm dose grid resolution. Reconstruction effectiveness was quantified by comparing 2%/2mm gamma passing rates of the original and log-file plans. Modulation complexity scores (MCS) were calculated for each beam to correlate reconstruction accuracy and beam modulation. Percent error in absolute dose for each plan-pair combination (log-file vs. ArcCHECK, original vs. ArcCHECK, log-file vs. original) was calculated for each arc and every diode greater than 10% of the maximum measured dose (per beam). Comparing standard deviations of the three plan-pair distributions, relative noise of the ArcCHECK and log-file systems was elucidated. Results: The original plans exhibit a mean passing rate of 95.1±1.3%. The eight more modulated H&N arcs [MCS=0.088±0.014] and two less modulated brain arcs [MCS=0.291±0.004] yielded log-file pass rates most similar to the original plan when using 1°/2mm [0.05%±1.3% lower] and 2°/3mm [0.35±0.64% higher] log-file reconstructions respectively. Log-file and original plans displayed percent diode dose errors 4.29±6.27% and 3.61±6.57% higher than measurement. Excluding the phantom eliminates diode miscalibration and setup errors; log-file dose errors were 0.72±3.06% higher than the original plans – significantly less noisy. Conclusion: For log-file reconstructed VMAT arcs, 1° control point spacing and 2mm dose resolution is recommended, however, less modulated arcs may allow less

  18. DNA quantification of basidiomycetous fungi during storage of logging residues

    Directory of Open Access Journals (Sweden)

    Isabella Børja

    2015-04-01

    Full Text Available The demand for bioenergy caused an increased use of logging residues, branches and treetops that were previously left on the ground after harvesting. Residues are stored outdoors in piles and it is unclear to what extent fungi transform this material. Our objective was to quantify the amount of wood degrading fungi during storage using quantitative real-time PCR (qPCR to detect basidiomycetous DNA in logging residues, a novel approach in this field. We found that the qPCR method was accurate in quantifying the fungal DNA during storage. As the moisture content of the piled logging residues decreased during the storage period, the fungal DNA content also decreased. Scots pine residues contained more fungal DNA than residues from Norway spruce. Loose piles had generally more fungal DNA than bundled ones.

  19. One less trip : logging with less tripping, more protection

    Energy Technology Data Exchange (ETDEWEB)

    Byfield, M.

    2005-12-15

    New logging technology by Datalog Technology Inc. was described. Logging-while-tripping (LWT) technology uses a slim petrophysical sensor package that is moved to the targeted geological formation through a drill pipe, which reduces the exposure to vibration and shock involved in logging-while-drilling (LWD). The equipment features standard components in a patented configuration and comes in 2 segments: the receiver sub and the sensor package electronics. A receiver sub is inserted into the bottomhole assembly at the end of the drill string. Drilling progresses with the LWT sub in the bottomhole assembly until the borehole approaches the logging depth. The sensor package and electronics are then lowered into the drill string. If the well is horizontal, rig pumps push the package into the drill string until it lands in the LWT sub. Drill pipes are moved across the zone of interest and logs are recorded on downhole memory contained within the LWT package. As the logging operation progresses, a depth recorder at the surface records depth information along with the downhole recorders. When logging is completed, downhole tools are retrieved, and data downloaded from the LWT onboard memory is merged with the surface depth information to generate well logs. Retrieval via the drill string greatly reduces the risk of losing the logging gear, which contains radioactive material. Federal officials now routinely insist on extensive fishing operations to retrieve lost tools. If a well gets a gas kick while logging is in progress, the operator can still pump down mud or close the blowout preventer rams if necessary, and save time in determining where to perforate shallow gas wells. Compensated neutron logs, gamma rays, spectrum gamma rays, and induction have been tested with the LWT system. It was concluded that Petro-Canada has deployed the logs recently and has achieved results that compared satisfactorily with conventional logs. 2 figs.

  20. Audit Log for Forensic Photography

    Science.gov (United States)

    Neville, Timothy; Sorell, Matthew

    We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.

  1. SDSS Log Viewer: visual exploratory analysis of large-volume SQL log data

    Science.gov (United States)

    Zhang, Jian; Chen, Chaomei; Vogeley, Michael S.; Pan, Danny; Thakar, Ani; Raddick, Jordan

    2012-01-01

    User-generated Structured Query Language (SQL) queries are a rich source of information for database analysts, information scientists, and the end users of databases. In this study a group of scientists in astronomy and computer and information scientists work together to analyze a large volume of SQL log data generated by users of the Sloan Digital Sky Survey (SDSS) data archive in order to better understand users' data seeking behavior. While statistical analysis of such logs is useful at aggregated levels, efficiently exploring specific patterns of queries is often a challenging task due to the typically large volume of the data, multivariate features, and data requirements specified in SQL queries. To enable and facilitate effective and efficient exploration of the SDSS log data, we designed an interactive visualization tool, called the SDSS Log Viewer, which integrates time series visualization, text visualization, and dynamic query techniques. We describe two analysis scenarios of visual exploration of SDSS log data, including understanding unusually high daily query traffic and modeling the types of data seeking behaviors of massive query generators. The two scenarios demonstrate that the SDSS Log Viewer provides a novel and potentially valuable approach to support these targeted tasks.

  2. A hierarchical detection method in external communication for self-driving vehicles based on TDMA

    Science.gov (United States)

    Al-ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302

  3. A hierarchical detection method in external communication for self-driving vehicles based on TDMA.

    Science.gov (United States)

    Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus

    2018-01-01

    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.

  4. Static dictionaries on AC0 RAMs: query time (√log n/log log n) is necessary and sufficient

    DEFF Research Database (Denmark)

    Andersson, Arne; Miltersen, Peter Bro; Riis, Søren

    1996-01-01

    ) on the time for answering membership queries in a set of size n when reasonable space is used for the data structure storing the set; the upper bound can be obtained using O(n) space, and the lower bound holds even if we allow space 2polylog n. Several variations of this result are also obtained. Among others......, we show a tradeoff between time and circuit depth under the unit-cost assumption: any RAM instruction set which permits a linear space, constant query time solution to the static dictionary problem must have an instruction of depth Ω(log w/log log to), where w is the word size of the machine (and log...

  5. Study on Improvement of Data Logging System for the Ulsan T/P and Samarangjin P/P

    Energy Technology Data Exchange (ETDEWEB)

    Kim, E.G.; Shin, Y.O.; Woo, J.H. [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    1997-12-31

    A power plant should be monitored for the stable operations. It is difficult to maintain out-dated computer systems of the power plant due to the obsolescence of the system. A new data logging system needs to be developed to provide the various convenient functions. Power plant operators are then easily able to obtain more information on the status of plant operations by using this new system developed in this research. The results of research are summarized at this report. (author). 151 figs., 24 tabs.

  6. Real-Time Vehicle Data Logging System Using GPS And GSM

    Directory of Open Access Journals (Sweden)

    Win Minn Thet

    2015-07-01

    Full Text Available Abstract This paper proposes and implements a low cost Vehicle Data Logging System using GPS and GSM. This system allows a user to trace the present and past positions recorded in SD card. This system also reads the current position of the vehicle using GPS the data is sent via GSM service from the GSM network. The vehicles position including the driving speed the UTC time and data are stored in the SD card for live and past tracking. All of that GPS data is sent to PIC 18F4520 by the Universal Asynchronous ReceiverTransmitter UART and also store in SD card. GSM also uses UART to transmit. To know the position of the vehicle the owner sends a request through a SMS. The SMS sends to the authorized person through the GSM network. The travel history of the vehicle are stored in a file on an SD card in FAT format.This system is very useful for car tracking for adolescent driver being checked by parent speed limit exceeding leaving a specific area. V The developed system is easy to use requires no additional hardware and permits the selection of the amount of data and the time intervals between the data recordings. In addition the collected data can easily be transferred to a computer via a connected serial port.

  7. Target recognition of log-polar ladar range images using moment invariants

    Science.gov (United States)

    Xia, Wenze; Han, Shaokun; Cao, Jie; Yu, Haoyong

    2017-01-01

    The ladar range image has received considerable attentions in the automatic target recognition field. However, previous research does not cover target recognition using log-polar ladar range images. Therefore, we construct a target recognition system based on log-polar ladar range images in this paper. In this system combined moment invariants and backpropagation neural network are selected as shape descriptor and shape classifier, respectively. In order to fully analyze the effect of log-polar sampling pattern on recognition result, several comparative experiments based on simulated and real range images are carried out. Eventually, several important conclusions are drawn: (i) if combined moments are computed directly by log-polar range images, translation, rotation and scaling invariant properties of combined moments will be invalid (ii) when object is located in the center of field of view, recognition rate of log-polar range images is less sensitive to the changing of field of view (iii) as object position changes from center to edge of field of view, recognition performance of log-polar range images will decline dramatically (iv) log-polar range images has a better noise robustness than Cartesian range images. Finally, we give a suggestion that it is better to divide field of view into recognition area and searching area in the real application.

  8. Processing well logging data, for example for verification and calibration of well logs

    International Nuclear Information System (INIS)

    Suau, J.; Boutemy, Y.

    1981-01-01

    A method is described of machine processing well logging data derived from borehole exploring devices which investigate earth formations traversed by boreholes. The method can be used for verifying and recalibrating logs, reconstructing missing logs and combining the data to form a statistical model of the traversed earth formations. (U.K.)

  9. La logística integral como ventaja competitiva y sistema logístico

    Directory of Open Access Journals (Sweden)

    Mario Anselmo Martínez gallardo

    2013-07-01

    Full Text Available Esta investigación analiza la logística integral como una ventaja competitiva y el sistema logístico. Es opinión de los autores que la logística integral es esencial para el intercambio de mercancías, toda vez que reduce costos y hace más ágil la actividad comercial. La utilización de esta logística representa una ventaja competitiva con respecto de otras empresas por la optimización del capital y ahorro de tiempo.

  10. Development of a low cost unmanned aircraft system for atmospheric carbon dioxide leak detection

    Science.gov (United States)

    Mitchell, Taylor Austin

    Carbon sequestration, the storage of carbon dioxide gas underground, has the potential to reduce global warming by removing a greenhouse gas from the atmosphere. These storage sites, however, must first be monitored to detect if carbon dioxide is leaking back out to the atmosphere. As an alternative to traditional large ground-based sensor networks to monitor CO2 levels for leaks, unmanned aircraft offer the potential to perform in-situ atmospheric leak detection over large areas for a fraction of the cost. This project developed a proof-of-concept sensor system to map relative carbon dioxide levels to detect potential leaks. The sensor system included a Sensair K-30 FR CO2 sensor, GPS, and altimeter connected an Arduino microcontroller which logged data to an onboard SD card. Ground tests were performed to verify and calibrate the system including wind tunnel tests to determine the optimal configuration of the system for the quickest response time (4-8 seconds based upon flowrate). Tests were then conducted over a controlled release of CO 2 in addition to over controlled rangeland fires which released carbon dioxide over a large area as would be expected from a carbon sequestration source. 3D maps of carbon dioxide were developed from the system telemetry that clearly illustrated increased CO2 levels from the fires. These tests demonstrated the system's ability to detect increased carbon dioxide concentrations in the atmosphere.

  11. GammaLog Playback 1.0 - mobile gamma ray spectrometry software

    International Nuclear Information System (INIS)

    Watson, R.J.; Smethurst, M.A.

    2011-01-01

    The Geological Survey of Norway (NGU) operates a mobile gamma ray spectrometer system which can be used in nuclear emergency situations to determine the location and type of orphan sources, or the extent and type of fallout contamination. The system consists of a 20 litre (16 litre downward and 4 litre upward looking) RSX-5 NaI detector and spectrometer, and can be mounted in fixed wing aircraft, helicopters, or vans/cars as appropriate. NGU has developed its own data acquisition and analysis software for this system. GammaLog (Smethurst 2005) controls the acquisition, display, and storage of data from the spectrometer, and performs real-time data analysis including estimation of dose rates and fallout concentrations, and separation of geological and anthropogenic components of the signal. The latter is particularly important where the geological radioisotope signal varies strongly from one place to another, and makes it easier to locate and identify anthropogenic sources which might otherwise be difficult to separate from the geological background signal. A modified version of GammaLog has been developed, GammaLog Playback, which allows the replay of previously acquired GammaLog datasets, while performing similar processing and display as the GammaLog acquisition software. This allows datasets to be reviewed and compared in the field or during post-survey analysis to help plan subsequent measurement strategies.(Au)

  12. Pulsed Neutron log application in accurate fluid contact determination and remedial action planning

    International Nuclear Information System (INIS)

    Kalu, I.; Mukerji, P.

    2002-01-01

    A common application of pulsed neutron logging in the Niger Delta is saturation monitoring when run in carbon-oxygen (CO) mode. Recently, one such log was run across a reservoir to confirm the position of the oil-water contact on a well that was producing at very high water cut on the short string of a dual string producer. Material balance calculations had predicted an oil-water contact about 5ft from the deepest perforations and so a water shut-off operation had been planned. The interpreted log however showed that the OWC was about 30ft from the perforation and it also showed fluid movement in the borehole in front of the perforations. A production log was subsequently run which identified a tubing leak and confirmed the crossflow of water from the long string into the short string detected on the pulsed neutron log. The proposed water shut-off treatment was aborted based on the interpretation and resulted in substantial savings

  13. Prediction of Compressional, Shear, and Stoneley Wave Velocities from Conventional Well Log Data Using a Committee Machine with Intelligent Systems

    Science.gov (United States)

    Asoodeh, Mojtaba; Bagheripour, Parisa

    2012-01-01

    Measurement of compressional, shear, and Stoneley wave velocities, carried out by dipole sonic imager (DSI) logs, provides invaluable data in geophysical interpretation, geomechanical studies and hydrocarbon reservoir characterization. The presented study proposes an improved methodology for making a quantitative formulation between conventional well logs and sonic wave velocities. First, sonic wave velocities were predicted from conventional well logs using artificial neural network, fuzzy logic, and neuro-fuzzy algorithms. Subsequently, a committee machine with intelligent systems was constructed by virtue of hybrid genetic algorithm-pattern search technique while outputs of artificial neural network, fuzzy logic and neuro-fuzzy models were used as inputs of the committee machine. It is capable of improving the accuracy of final prediction through integrating the outputs of aforementioned intelligent systems. The hybrid genetic algorithm-pattern search tool, embodied in the structure of committee machine, assigns a weight factor to each individual intelligent system, indicating its involvement in overall prediction of DSI parameters. This methodology was implemented in Asmari formation, which is the major carbonate reservoir rock of Iranian oil field. A group of 1,640 data points was used to construct the intelligent model, and a group of 800 data points was employed to assess the reliability of the proposed model. The results showed that the committee machine with intelligent systems performed more effectively compared with individual intelligent systems performing alone.

  14. Well logging radioactive detector assembly

    International Nuclear Information System (INIS)

    Osburn, T.D.

    1992-01-01

    This patent describes a well logging instrument of the type having a radioactive logging sub having a sealed chamber and have a radioactive source for emitting radioactive energy into the well formation, the instrument having a radioactive energy detector for detecting gamma rays resulting from the emission of the radioactive energy into the well formation, and means for pressing the sub against the well of the well, an improved Dewar flask for the detector. It comprises: an inner housing formed of titanium and containing the detector; an outer housing formed of titanium, having a cylindrical side wall surrounding the inner housing and separated by a clearance which is evacuated, the outer housing being located within the sealed chamber in the sub of the instrument; a window section formed in the side wall of the outer housing adjacent the detector and on a side of the side wall closest to the wall of the well when the sub is pressed against the wall of the well; and wherein the inner housing has a cylindrical side wall that is of lesser wall thickness than the wall thickness of the side wall of the outer housing other than in the window section

  15. CS model coil experimental log book

    International Nuclear Information System (INIS)

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  16. A dual-sided coded-aperture radiation detection system

    International Nuclear Information System (INIS)

    Penny, R.D.; Hood, W.E.; Polichar, R.M.; Cardone, F.H.; Chavez, L.G.; Grubbs, S.G.; Huntley, B.P.; Kuharski, R.A.; Shyffer, R.T.; Fabris, L.; Ziock, K.P.; Labov, S.E.; Nelson, K.

    2011-01-01

    We report the development of a large-area, mobile, coded-aperture radiation imaging system for localizing compact radioactive sources in three dimensions while rejecting distributed background. The 3D Stand-Off Radiation Detection System (SORDS-3D) has been tested at speeds up to 95 km/h and has detected and located sources in the millicurie range at distances of over 100 m. Radiation data are imaged to a geospatially mapped world grid with a nominal 1.25- to 2.5-m pixel pitch at distances out to 120 m on either side of the platform. Source elevation is also extracted. Imaged radiation alarms are superimposed on a side-facing video log that can be played back for direct localization of sources in buildings in urban environments. The system utilizes a 37-element array of 5x5x50 cm 3 cesium-iodide (sodium) detectors. Scintillation light is collected by a pair of photomultiplier tubes placed at either end of each detector, with the detectors achieving an energy resolution of 6.15% FWHM (662 keV) and a position resolution along their length of 5 cm FWHM. The imaging system generates a dual-sided two-dimensional image allowing users to efficiently survey a large area. Imaged radiation data and raw spectra are forwarded to the RadioNuclide Analysis Kit (RNAK), developed by our collaborators, for isotope ID. An intuitive real-time display aids users in performing searches. Detector calibration is dynamically maintained by monitoring the potassium-40 peak and digitally adjusting individual detector gains. We have recently realized improvements, both in isotope identification and in distinguishing compact sources from background, through the installation of optimal-filter reconstruction kernels.

  17. Decision support using anesthesia information management system records and accreditation council for graduate medical education case logs for resident operating room assignments.

    Science.gov (United States)

    Wanderer, Jonathan P; Charnin, Jonathan; Driscoll, William D; Bailin, Michael T; Baker, Keith

    2013-08-01

    Our goal in this study was to develop decision support systems for resident operating room (OR) assignments using anesthesia information management system (AIMS) records and Accreditation Council for Graduate Medical Education (ACGME) case logs and evaluate the implementations. We developed 2 Web-based systems: an ACGME case-log visualization tool, and Residents Helping in Navigating OR Scheduling (Rhinos), an interactive system that solicits OR assignment requests from residents and creates resident profiles. Resident profiles are snapshots of the cases and procedures each resident has done and were derived from AIMS records and ACGME case logs. A Rhinos pilot was performed for 6 weeks on 2 clinical services. One hundred sixty-five requests were entered and used in OR assignment decisions by a single attending anesthesiologist. Each request consisted of a rank ordered list of up to 3 ORs. Residents had access to detailed information about these cases including surgeon and patient name, age, procedure type, and admission status. Success rates at matching resident requests were determined by comparing requests with AIMS records. Of the 165 requests, 87 first-choice matches (52.7%), 27 second-choice matches (16.4%), and 8 third-choice matches (4.8%) were made. Forty-three requests were unmatched (26.1%). Thirty-nine first-choice requests overlapped (23.6%). Full implementation followed on 8 clinical services for 8 weeks. Seven hundred fifty-four requests were reviewed by 15 attending anesthesiologists, with 339 first-choice matches (45.0%), 122 second-choice matches (16.2%), 55 third-choice matches (7.3%), and 238 unmatched (31.5%). There were 279 overlapping first-choice requests (37.0%). The overall combined match success rate was 69.4%. Separately, we developed an ACGME case-log visualization tool that allows individual resident experiences to be compared against case minimums as well as resident peer groups. We conclude that it is feasible to use ACGME case-log

  18. Development of interpretation models for PFN uranium log analysis

    International Nuclear Information System (INIS)

    Barnard, R.W.

    1980-11-01

    This report presents the models for interpretation of borehole logs for the PFN (Prompt Fission Neutron) uranium logging system. Two models have been developed, the counts-ratio model and the counts/dieaway model. Both are empirically developed, but can be related to the theoretical bases for PFN analysis. The models try to correct for the effects of external factors (such as probe or formation parameters) in the calculation of uranium grade. The theoretical bases and calculational techniques for estimating uranium concentration from raw PFN data and other parameters are discussed. Examples and discussions of borehole logs are included

  19. Estimation of the non records logs from existing logs using artificial neural networks

    Directory of Open Access Journals (Sweden)

    Mehdi Mohammad Salehi

    2017-12-01

    Full Text Available Finding the information of the hydrocarbon reservoirs from well logs is one of the main objectives of the engineers. But, missing the log records (due to many reasons such as broken instruments, unsuitable borehole and etc. is a major challenge to achieve it. Prediction of the density and resistivity logs (Rt, DT and LLS from the conventional wire-line logs in one of the Iranian southwest oil fields is the main purpose of this study. Multilayer neural network was applied to develop an intelligent predictive model for prediction of the logs. A total of 3000 data sets from 3 wells (A, B and C of the studied field were used. Among them, the data of A, B and C wells were used to constructing and testing the model, respectively. To evaluate the performance of the model, the mean square error (MSE and correlation coefficient (R2 in the test data were calculated. A comparison between the MSE of the proposed model and recently intelligent models shows that the proposed model is more accurate than others. Acceptable accuracy and using conventional well logging data are the highlight advantages of the proposed intelligent model.

  20. LATTE - Log and Time Tracking for Elections

    Data.gov (United States)

    Office of Personnel Management — LATTE - Log and Time Tracking for Elections is a time tracking and voucher preparation system used to schedule employees to cover elections, to document their time...

  1. In situ analysis of coal from single electrode resistance, self-potential and gamma-ray logs

    International Nuclear Information System (INIS)

    Kayal, J.R.

    1981-01-01

    Single electrode resistance, self-potential and gamma-ray logging have been carried out in North Karanpura, West Bokaro and Jharia coalfields of Gondwana basin in Eastern India. Correlation of these geophysical logs is found to be very useful in locating the coal beds, determining their accurate depths and thickness and approximate quality. Coal seams have been detected as very high resistive formations compared to sandstone/shale which are interbedded in the coal basin. High or low self-potential values are obtained against the coal beds depending on the borehole fluid conditions. Burnt coals (Jhama) are characterised as highly conductive beds. Gamma ray logs have been effectively used alongwith electrical logs for correlation and identification of coal seams. Further analysis of gamma-ray log data determines a linear relationship with ash content of coal. (author)

  2. Testing of a uranium downhole logging system to measure in-situ plutonium concentrations in sediments

    International Nuclear Information System (INIS)

    Kasper, R.B.; Kay, M.A.; Bruns, L.E.; Stokes, J.A.; Steinman, D.K.; Adams, J.

    1980-11-01

    A prototype urainium borehole logging system, developed for uranium exploration, was modified for Pu assay and testing at the site. It uses the delayed fission neutron (DFN) method. It was tested in a retired Pu facility, the 216-Z-1A Crib. General agreement between laboratory determined Pu concentrations in sediment samples and neutron flux measurements was found for the relative distribution with depth

  3. Tree damage from skyline logging in a western larch/Douglas-fir stand

    Science.gov (United States)

    Robert E. Benson; Michael J. Gonsior

    1981-01-01

    Damage to shelterwood leave trees and to understory trees in shelterwood and clearcut logging units logged with skyline yarders was measured, and related to stand conditions, harvesting specifications, and yarding system-terrain interactions. About 23 percent of the marked leave trees in the shelterwood units were killed in logging, and about 10 percent had moderate to...

  4. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  5. Geophysical well logging operations and log analysis in Geothermal Well Desert Peak No. B-23-1

    Energy Technology Data Exchange (ETDEWEB)

    Sethi, D.K.; Fertl, W.H.

    1980-03-01

    Geothermal Well Desert Peak No. B-23-1 was logged by Dresser Atlas during April/May 1979 to a total depth of 2939 m (9642 ft). A temperature of 209/sup 0/C (408/sup 0/F) was observed on the maximum thermometer run with one of the logging tools. Borehole tools rated to a maximum temperature of 204.4/sup 0/C (400/sup 0/F) were utilized for logging except for the Densilog tool, which was from the other set of borehole instruments, rated to a still higher temperature, i.e., 260/sup 0/C (500/sup 0/F). The quality of the logs recorded and the environmental effects on the log response have been considered. The log response in the unusual lithologies of igneous and metamorphic formations encountered in this well could be correlated with the drill cutting data. An empirical, statistical log interpretation approach has made it possible to obtain meaningful information on the rocks penetrated. Various crossplots/histograms of the corrected log data have been generated on the computer. These are found to provide good resolution between the lithological units in the rock sequence. The crossplotting techniques and the statistical approach were combined with the drill cutting descriptions in order to arrive at the lithological characteristics. The results of log analysis and recommendations for logging of future wells have been included.

  6. Lithology identification of aquifers from geophysical well logs and fuzzy logic analysis: Shui-Lin Area, Taiwan

    Science.gov (United States)

    Hsieh, Bieng-Zih; Lewis, Charles; Lin, Zsay-Shing

    2005-04-01

    The purpose of this study is to construct a fuzzy lithology system from well logs to identify formation lithology of a groundwater aquifer system in order to better apply conventional well logging interpretation in hydro-geologic studies because well log responses of aquifers are sometimes different from those of conventional oil and gas reservoirs. The input variables for this system are the gamma-ray log reading, the separation between the spherically focused resistivity and the deep very-enhanced resistivity curves, and the borehole compensated sonic log reading. The output variable is groundwater formation lithology. All linguistic variables are based on five linguistic terms with a trapezoidal membership function. In this study, 50 data sets are clustered into 40 training sets and 10 testing sets for constructing the fuzzy lithology system and validating the ability of system prediction, respectively. The rule-based database containing 12 fuzzy lithology rules is developed from the training data sets, and the rule strength is weighted. A Madani inference system and the bisector of area defuzzification method are used for fuzzy inference and defuzzification. The success of training performance and the prediction ability were both 90%, with the calculated correlation of training and testing equal to 0.925 and 0.928, respectively. Well logs and core data from a clastic aquifer (depths 100-198 m) in the Shui-Lin area of west-central Taiwan are used for testing the system's construction. Comparison of results from core analysis, well logging and the fuzzy lithology system indicates that even though the well logging method can easily define a permeable sand formation, distinguishing between silts and sands and determining grain size variation in sands is more subjective. These shortcomings can be improved by a fuzzy lithology system that is able to yield more objective decisions than some conventional methods of log interpretation.

  7. Face logging in Copenhagen Limestone, Denmark

    DEFF Research Database (Denmark)

    Jakobsen, Lisa; Foged, Niels Nielsen; Erichsen, Lars

    2015-01-01

    tunnel in Copenhagen more than 2.5 km face logs were made in 467 locations at underground stations, shafts, caverns and along bored tunnels. Over 160 geotechnical boreholes, many with geophysical logging were executed prior to construction works. The bedrock consists of Paleogene "Copenhagen limestone......The requirement for excavation support can be assessed from face logging. Face logs can also improve our knowledge of lithological and structural conditions within bedrock and supplement information from boreholes and geophysical logs. During the construction of 8 km metro tunnel and 4 km heating....... The induration degrees recorded in face logs and boreholes are compared and correlated. Distinct geophysical log markers are used to divide the limestone into three units. These marker horizons are correlated between face logs and geotechnical boreholes. A 3D model of the strength variations recorded within...

  8. Mining process performance from event logs

    NARCIS (Netherlands)

    Adriansyah, A.; Buijs, J.C.A.M.; La Rosa, M.; Soffer, P.

    2013-01-01

    In systems where process executions are not strictly enforced by a predefined process model, obtaining reliable performance information is not trivial. In this paper, we analyzed an event log of a real-life process, taken from a Dutch financial institute, using process mining techniques. In

  9. Acoustic Emission and Echo Signal Compensation Techniques Applied to an Ultrasonic Logging-While-Drilling Caliper.

    Science.gov (United States)

    Yao, Yongchao; Ju, Xiaodong; Lu, Junqiang; Men, Baiyong

    2017-06-10

    A logging-while-drilling (LWD) caliper is a tool used for the real-time measurement of a borehole diameter in oil drilling engineering. This study introduces the mechanical structure and working principle of a new LWD caliper based on ultrasonic distance measurement (UDM). The detection range is a major performance index of a UDM system. This index is determined by the blind zone length and remote reflecting interface detection capability of the system. To reduce the blind zone length and detect near the reflecting interface, a full bridge acoustic emission technique based on bootstrap gate driver (BGD) and metal-oxide-semiconductor field effect transistor (MOSFET) is designed by analyzing the working principle and impedance characteristics of a given piezoelectric transducer. To detect the remote reflecting interface and reduce the dynamic range of the received echo signals, the relationships between the echo amplitude and propagation distance of ultrasonic waves are determined. A signal compensation technique based on time-varying amplification theory, which can automatically change the gain according to the echo arrival time is designed. Lastly, the aforementioned techniques and corresponding circuits are experimentally verified. Results show that the blind zone length in the UDM system of the LWD caliper is significantly reduced and the capability to detect the remote reflecting interface is considerably improved.

  10. Method and apparatus for producing a porosity log of a subsurface formation corrected for detector standoff

    International Nuclear Information System (INIS)

    Allen, L.S.; Mills, W.R.; Stromswold, D.C.

    1991-01-01

    This paper describes a method and apparatus for producing a porosity log of a substance formation corrected for detector stand of. It includes: lowering a logging tool having a neutron source and a neutron detector into the borehole, irradiating the subsurface formation with neutrons from the neutron source as the logging tool is traversed along the subsurface formation, recording die-away signals representing the die-away of nuclear radiation in the subsurface formation as detected by the neutron detector, producing intensity signals representing the variations in intensity of the die-away signals, producing a model of the die-away of nuclear radiation in the subsurface formation having terms varying exponentially in response to borehole, formation and background effects on the die-away of nuclear radiation as detected by the detector

  11. CS model coil experimental log book

    Energy Technology Data Exchange (ETDEWEB)

    Nishijima, Gen; Sugimoto, Makoto; Nunoya, Yoshihiko; Wakabayashi, Hiroshi; Tsuji, Hiroshi [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2001-02-01

    Charging test of the ITER CS Model Coil which is the world's largest superconducting pulse coil and the CS Insert Coil had started at April 11, 2000 and had completed at August 18, 2000. In the campaign, total shot numbers were 356 and the size of the data file in the DAS (Data Acquisition System) was over 20 GB. This report is a database that consists of the log list and the log sheets of every shot. One can access the database, make a search, and browse results via Internet (http://1ogwww.naka.jaeri.go.jp). The database will be useful to quick search to choose necessary shots. (author)

  12. Device for X-ray fluorescence logging with PRK-1-36 controlled remote unit

    International Nuclear Information System (INIS)

    Volfshtejn, P.M.; Kireev, V.A.; Peskov, V.N.

    1981-01-01

    To conduct studies in the long-wave energy range, a well logging device with a remote detection unit controlled with the help of DPM-30 electric motor has been developed. A current circuit of signal pick-up from a proportional counter is used. The circuit allows to decrease the length of the outside unit to 180 mm, sag being 130 mm long. It is shown that under conditions intensive cavernity of ore intervals and technically complicated well logs the application of PRK-1-36 units instead of SKR-300 devices permits to obtain more representative results, decrease the accident rate and increase the efficiency of investigations where X-ray fluorescence logging is used [ru

  13. Device for X-ray fluorescence logging with PRK-1-36 controlled remote unit

    Energy Technology Data Exchange (ETDEWEB)

    Volfshtejn, P M; Kireev, V A; Peskov, V N [Vsesoyuznyj Nauchno-Issledovatel' skij i Proektno-Konstruktorskij Inst. Geofizicheskikh Issledovanij Geologorazvedochnykh Skvazhin, Oktyabr' skij (USSR)

    1981-01-01

    To conduct studies in the long-wave energy range, a well logging device with a remote detection unit controlled with the help of DPM-30 electric motor has been developed. A current circuit of signal pick-up from a proportional counter is used. The circuit allows to decrease the length of the outside unit to 180 mm, sag being 130 mm long. It is shown that under conditions intensive cavernity of ore intervals and technically complicated well logs the application of PRK-1-36 units instead of SKR-300 devices permits to obtain more representative results, decrease the accident rate and increase the efficiency of investigations where X-ray fluorescence logging is used.

  14. SU-F-T-288: Impact of Trajectory Log Files for Clarkson-Based Independent Dose Verification of IMRT and VMAT

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, R; Kamima, T [Cancer Institute Hospital of Japanese Foundation for Cancer Research, Koto, Tokyo (Japan); Tachibana, H [National Cancer Center, Kashiwa, Chiba (Japan)

    2016-06-15

    Purpose: To investigate the effect of the trajectory files from linear accelerator for Clarkson-based independent dose verification in IMRT and VMAT plans. Methods: A CT-based independent dose verification software (Simple MU Analysis: SMU, Triangle Products, Japan) with a Clarksonbased algorithm was modified to calculate dose using the trajectory log files. Eclipse with the three techniques of step and shoot (SS), sliding window (SW) and Rapid Arc (RA) was used as treatment planning system (TPS). In this study, clinically approved IMRT and VMAT plans for prostate and head and neck (HN) at two institutions were retrospectively analyzed to assess the dose deviation between DICOM-RT plan (PL) and trajectory log file (TJ). An additional analysis was performed to evaluate MLC error detection capability of SMU when the trajectory log files was modified by adding systematic errors (0.2, 0.5, 1.0 mm) and random errors (5, 10, 30 mm) to actual MLC position. Results: The dose deviations for prostate and HN in the two sites were 0.0% and 0.0% in SS, 0.1±0.0%, 0.1±0.1% in SW and 0.6±0.5%, 0.7±0.9% in RA, respectively. The MLC error detection capability shows the plans for HN IMRT were the most sensitive and 0.2 mm of systematic error affected 0.7% dose deviation on average. Effect of the MLC random error did not affect dose error. Conclusion: The use of trajectory log files including actual information of MLC location, gantry angle, etc should be more effective for an independent verification. The tolerance level for the secondary check using the trajectory file may be similar to that of the verification using DICOM-RT plan file. From the view of the resolution of MLC positional error detection, the secondary check could detect the MLC position error corresponding to the treatment sites and techniques. This research is partially supported by Japan Agency for Medical Research and Development (AMED)

  15. Log4J

    CERN Document Server

    Perry, Steven

    2009-01-01

    Log4j has been around for a while now, and it seems like so many applications use it. I've used it in my applications for years now, and I'll bet you have too. But every time I need to do something with log4j I've never done before I find myself searching for examples of how to do whatever that is, and I don't usually have much luck. I believe the reason for this is that there is a not a great deal of useful information about log4j, either in print or on the Internet. The information is too simple to be of real-world use, too complicated to be distilled quickly (which is what most developers

  16. Characterization of reservoir fractures using conventional geophysical logging

    Directory of Open Access Journals (Sweden)

    Paitoon Laongsakul

    2011-04-01

    Full Text Available In hydrocarbon exploration fractures play an important role as possible pathways for the hydrocarbon flow and bythis enhancing the overall formation’s permeability. Advanced logging methods for fracture analysis, like the boreholeacoustic televiewer and Formation Microscanner (FMS are available, but these are additional and expensive tools. However,open and with water or hydrocarbon filled fractures are also sensitive to electrical and other conventional logging methods.For this study conventional logging data (electric, seismic, etc were available plus additional fracture information from FMS.Taking into account the borehole environment the results show that the micro-spherically focused log indicates fractures byshowing low resistivity spikes opposite open fractures, and high resistivity spikes opposite sealed ones. Compressional andshear wave velocities are reduced when passing trough the fracture zone, which are assumed to be more or less perpendicularto borehole axis. The photoelectric absorption curve exhibit a very sharp peak in front of a fracture filled with bariteloaded mud cake. The density log shows low density spikes that are not seen by the neutron log, usually where fractures,large vugs, or caverns exist. Borehole breakouts can cause a similar effect on the logging response than fractures, but fracturesare often present when this occurs. The fracture index calculation by using threshold and input weight was calculatedand there was in general a good agreement with the fracture data from FMS especially in fracture zones, which mainlycontribute to the hydraulic system of the reservoir. Finally, the overall results from this study using one well are promising,however further research in the combination of different tools for fracture identification is recommended as well as the useof core for further validation.

  17. Unsupervised signature extraction from forensic logs

    NARCIS (Netherlands)

    Thaler, S.M.; Menkovski, V.; Petkovic, M.; Altun, Y.; Das, K.; Mielikäinen, T.; Malerba, D.; Stefanowski, J.; Read, J.; Žitnik, M.; Ceci, M.

    2017-01-01

    Signature extraction is a key part of forensic log analysis. It involves recognizing patterns in log lines such that log lines that originated from the same line of code are grouped together. A log signature consists of immutable parts and mutable parts. The immutable parts define the signature, and

  18. Well logging, atom and geology

    International Nuclear Information System (INIS)

    Serra, O.

    1994-01-01

    Well logging techniques exploit interactions of gamma photons and neutrons with atoms. Interactions of neutrons of different energies with atoms allow the detection and evaluation of the weight percentage of several elements composing the rocks (C, O, Si, Ca, Fe, S); spectrometry of gamma rays produced by thermal neutron absorption allows for the weight percentage determination of Si, Ca, Fe, S, Cl, H, Ti and Gd, etc. High resolution detectors (germanium doped by Li, at liquid nitrogen temperature) allow the recognition of more elements. Other techniques involving neutrons consist in determining the population in epithermal neutrons at a certain distance of the neutron source (measurement of the hydrogen index). By analyzing the intensity of the gamma flux produced by Compton scattering, the electronic and bulk densities of the rocks are measured. All these data lead to the detection and evaluation of ore deposits (uranium and potassium) and coal, and determination of the lithology, the main minerals composing the rocks, petrophysical properties... 1 fig

  19. Log-balanced combinatorial sequences

    Directory of Open Access Journals (Sweden)

    Tomislav Došlic

    2005-01-01

    Full Text Available We consider log-convex sequences that satisfy an additional constraint imposed on their rate of growth. We call such sequences log-balanced. It is shown that all such sequences satisfy a pair of double inequalities. Sufficient conditions for log-balancedness are given for the case when the sequence satisfies a two- (or more- term linear recurrence. It is shown that many combinatorially interesting sequences belong to this class, and, as a consequence, that the above-mentioned double inequalities are valid for all of them.

  20. LOG2MARKUP: State module to transform a Stata text log into a markup document

    DEFF Research Database (Denmark)

    2016-01-01

    log2markup extract parts of the text version from the Stata log command and transform the logfile into a markup based document with the same name, but with extension markup (or otherwise specified in option extension) instead of log. The author usually uses markdown for writing documents. However...

  1. Radiometric well logging instruments

    International Nuclear Information System (INIS)

    Davydov, A.V.

    1975-01-01

    The technical properties of well instruments for radioactive logging used in the radiometric logging complexes PKS-1000-1 (''Sond-1'') and PRKS-2 (''Vitok-2'') are described. The main features of the electric circuit of the measuring channels are given

  2. Hardwood log supply: a broader perspective

    Science.gov (United States)

    Iris Montague; Adri Andersch; Jan Wiedenbeck; Urs. Buehlmann

    2015-01-01

    At regional and state meetings we talk with others in our business about the problems we face: log exports, log quality, log markets, logger shortages, cash flow problems, the weather. These are familiar talking points and real and persistent problems. But what is the relative importance of these problems for log procurement in different regions of...

  3. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  4. Adaptively detecting changes in Autonomic Grid Computing

    KAUST Repository

    Zhang, Xiangliang; Germain, Cé cile; Sebag, Michè le

    2010-01-01

    Detecting the changes is the common issue in many application fields due to the non-stationary distribution of the applicative data, e.g., sensor network signals, web logs and gridrunning logs. Toward Autonomic Grid Computing, adaptively detecting

  5. Semi-automatic logarithmic converter of logs

    International Nuclear Information System (INIS)

    Gol'dman, Z.A.; Bondar's, V.V.

    1974-01-01

    Semi-automatic logarithmic converter of logging charts. An original semi-automatic converter was developed for use in converting BK resistance logging charts and the time interval, ΔT, of acoustic logs from a linear to a logarithmic scale with a specific ratio for subsequent combining of them with neutron-gamma logging charts in operative interpretation of logging materials by a normalization method. The converter can be used to increase productivity by giving curves different from those obtained in manual, pointwise processing. The equipment operates reliably and is simple in use. (author)

  6. Power to the logs!

    CERN Multimedia

    CERN. Geneva; MACMAHON, Joseph

    2015-01-01

    Are you tired of using grep, vi and emacs to read your logs? Do you feel like you’re missing the big picture? Does the word "statistics" put a smile on your face? Then it’s time to give power to the logs!

  7. A log-Weibull spatial scan statistic for time to event data.

    Science.gov (United States)

    Usman, Iram; Rosychuk, Rhonda J

    2018-06-13

    Spatial scan statistics have been used for the identification of geographic clusters of elevated numbers of cases of a condition such as disease outbreaks. These statistics accompanied by the appropriate distribution can also identify geographic areas with either longer or shorter time to events. Other authors have proposed the spatial scan statistics based on the exponential and Weibull distributions. We propose the log-Weibull as an alternative distribution for the spatial scan statistic for time to events data and compare and contrast the log-Weibull and Weibull distributions through simulation studies. The effect of type I differential censoring and power have been investigated through simulated data. Methods are also illustrated on time to specialist visit data for discharged patients presenting to emergency departments for atrial fibrillation and flutter in Alberta during 2010-2011. We found northern regions of Alberta had longer times to specialist visit than other areas. We proposed the spatial scan statistic for the log-Weibull distribution as a new approach for detecting spatial clusters for time to event data. The simulation studies suggest that the test performs well for log-Weibull data.

  8. A method of estimating log weights.

    Science.gov (United States)

    Charles N. Mann; Hilton H. Lysons

    1972-01-01

    This paper presents a practical method of estimating the weights of logs before they are yarded. Knowledge of log weights is required to achieve optimum loading of modern yarding equipment. Truckloads of logs are weighed and measured to obtain a local density index (pounds per cubic foot) for a species of logs. The density index is then used to estimate the weights of...

  9. California-Nevada uranium logging. Final report

    International Nuclear Information System (INIS)

    1981-04-01

    The purpose of this project was to obtain geophysical logs of industry drill holes to assess the uranium resource potential of geologic formations of interest. The work was part of the US Department of Energy's National Uranium Resource Evaluation (NURE) Program. The principal objective of the logging program was to determine radioelement grade of formations through natural gamma ray detectors. Supplementary information was obtained from resistivity (R), self-potential (SP), point resistance (RE), and neutron density (NN) logs for formation interpretation. Additional data for log interpretation was obtained from caliper logs, casing schedules, and downhole temperature. This data was obtained from well operators when available, with new logs obtained where not formerly available. This report contains a summary of the project and data obtained to date

  10. A database for operation logging of the KEK photon factory

    International Nuclear Information System (INIS)

    Pak, C.O.

    1990-01-01

    A prototype database for operation logging of the KEK Photon Factory storage ring has been constructed and tested. This paper describes the basic design of the operation logging system and its performance. Front-end control computers gather various data concerning the operation of the storage ring, and transfer them to a large general-purpose computer through a token-ring network. We have adopted a relational database system so as to save large amounts of data under daily operation. An interactive software tool was developed to retrieve data and to make graphic representations easily. (orig.)

  11. Combined Log Inventory and Process Simulation Models for the Planning and Control of Sawmill Operations

    Science.gov (United States)

    Guillermo A. Mendoza; Roger J. Meimban; Philip A. Araman; William G. Luppold

    1991-01-01

    A log inventory model and a real-time hardwood process simulation model were developed and combined into an integrated production planning and control system for hardwood sawmills. The log inventory model was designed to monitor and periodically update the status of the logs in the log yard. The process simulation model was designed to estimate various sawmill...

  12. Life cycle performances of log wood applied for soil bioengineering constructions

    Science.gov (United States)

    Kalny, Gerda; Strauss-Sieberth, Alexandra; Strauss, Alfred; Rauch, Hans Peter

    2016-04-01

    Nowadays there is a high demand on engineering solutions considering not only technical aspects but also ecological and aesthetic values. Soil bioengineering is a construction technique that uses biological components for hydraulic and civil engineering solutions. Soil bioengineering solutions are based on the application of living plants and other auxiliary materials including among others log wood. This kind of construction material supports the soil bioengineering system as long as the plants as living construction material overtake the stability function. Therefore it is important to know about the durability and the degradation process of the wooden logs to retain the integral performance of a soil bio engineering system. These aspects will be considered within the framework of the interdisciplinary research project „ELWIRA Plants, wood, steel and concrete - life cycle performances as construction materials". Therefore field investigations on soil bioengineering construction material, specifically European Larch wood logs, of different soil bioengineering structures at the river Wien have been conducted. The drilling resistance as a parameter for particular material characteristics of selected logs was measured and analysed. The drilling resistance was measured with a Rinntech Resistograph instrument at different positions of the wooden logs, all surrounded with three different backfills: Fully surrounded with air, with earth contact on one side and near the water surface in wet-dry conditions. The age of the used logs ranges from one year old up to 20 year old. Results show progress of the drilling resistance throughout the whole cross section as an indicator to assess soil bioengineering construction material. Logs surrounded by air showed a higher drilling resistance than logs with earth contact and the ones exposed to wet-dry conditions. Hence the functional capability of wooden logs were analysed and discussed in terms of different levels of degradation

  13. Application of oil-field well log interpretation techniques to the Cerro Prieto Geothermal Field

    Energy Technology Data Exchange (ETDEWEB)

    Ershaghi, I.; Phillips, L.B.; Dougherty, E.L.; Handy, L.L.

    1979-10-01

    An example is presented of the application of oil-field techniques to the Cerro Prieto Field, Mexico. The lithology in this field (sand-shale lithology) is relatively similar to oil-field systems. The study was undertaken as a part of the first series of case studies supported by the Geothermal Log Interpretation Program (GLIP) of the US Department of Energy. The suites of logs for individual wells were far from complete. This was partly because of adverse borehole conditions but mostly because of unavailability of high-temperature tools. The most complete set of logs was a combination of Dual Induction Laterolog, Compensated Formation Density Gamma Ray, Compensated Neutron Log, and Saraband. Temperature data about the wells were sketchy, and the logs had been run under pre-cooled mud condition. A system of interpretation consisting of a combination of graphic and numerical studies was used to study the logs. From graphical studies, evidence of hydrothermal alteration may be established from the trend analysis of SP (self potential) and ILD (deep induction log). Furthermore, the cross plot techniques using data from density and neutron logs may help in establishing compaction as well as rock density profile with depth. In the numerical method, R/sub wa/ values from three different resistivity logs were computed and brought into agreement. From this approach, values of formation temperature and mud filtrate resistivity effective at the time of logging were established.

  14. Acoustic Emission and Echo Signal Compensation Techniques Applied to an Ultrasonic Logging-While-Drilling Caliper

    Directory of Open Access Journals (Sweden)

    Yongchao Yao

    2017-06-01

    Full Text Available A logging-while-drilling (LWD caliper is a tool used for the real-time measurement of a borehole diameter in oil drilling engineering. This study introduces the mechanical structure and working principle of a new LWD caliper based on ultrasonic distance measurement (UDM. The detection range is a major performance index of a UDM system. This index is determined by the blind zone length and remote reflecting interface detection capability of the system. To reduce the blind zone length and detect near the reflecting interface, a full bridge acoustic emission technique based on bootstrap gate driver (BGD and metal-oxide-semiconductor field effect transistor (MOSFET is designed by analyzing the working principle and impedance characteristics of a given piezoelectric transducer. To detect the remote reflecting interface and reduce the dynamic range of the received echo signals, the relationships between the echo amplitude and propagation distance of ultrasonic waves are determined. A signal compensation technique based on time-varying amplification theory, which can automatically change the gain according to the echo arrival time is designed. Lastly, the aforementioned techniques and corresponding circuits are experimentally verified. Results show that the blind zone length in the UDM system of the LWD caliper is significantly reduced and the capability to detect the remote reflecting interface is considerably improved.

  15. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  16. 32 CFR 700.846 - Status of logs.

    Science.gov (United States)

    2010-07-01

    ... Officers Afloat § 700.846 Status of logs. The deck log, the engineering log, the compass record, the bearing hooks, the engineer's bell book, and any records generated by automated data logging equipment...

  17. Verification of respiratory-gated radiotherapy with new real-time tumour-tracking radiotherapy system using cine EPID images and a log file.

    Science.gov (United States)

    Shiinoki, Takehiro; Hanazawa, Hideki; Yuasa, Yuki; Fujimoto, Koya; Uehara, Takuya; Shibuya, Keiko

    2017-02-21

    A combined system comprising the TrueBeam linear accelerator and a new real-time tumour-tracking radiotherapy system, SyncTraX, was installed at our institution. The objectives of this study are to develop a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine electronic portal image device (EPID) images and a log file and to verify this treatment in clinical cases. Respiratory-gated radiotherapy was performed using TrueBeam and the SyncTraX system. Cine EPID images and a log file were acquired for a phantom and three patients during the course of the treatment. Digitally reconstructed radiographs (DRRs) were created for each treatment beam using a planning CT set. The cine EPID images, log file, and DRRs were analysed using a developed software. For the phantom case, the accuracy of the proposed method was evaluated to verify the respiratory-gated radiotherapy. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker used as an internal surrogate were calculated to evaluate the gating accuracy and set-up uncertainty in the superior-inferior (SI), anterior-posterior (AP), and left-right (LR) directions. The proposed method achieved high accuracy for the phantom verification. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker were  ⩽3 mm and  ±3 mm in the SI, AP, and LR directions. We proposed a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine EPID images and a log file and showed that this treatment is performed with high accuracy in clinical cases.

  18. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  19. The STAR ESL, electronic shift and handover log

    Energy Technology Data Exchange (ETDEWEB)

    Hajdu, L; Lauret, J, E-mail: lbhajdu@bnl.gov

    2008-07-01

    Keeping a clear and accurate experiment log is important for any scientific experiment. The concept is certainly not new but keeping accurate while useful records for a Nuclear Physics experiment such as the Solenoidal Tracker at the Relativistic Heavy Ion Collider (STAR at RHIC) is not a priori a simple matter - STAR operates 24 hours a day for six months out of the year with more than 24 shift crews operating 16 different subsystems (some located remotely). To meet the challenge of not only logging the information but passing it in a concise manner from one shift to another, the STAR experiment has designed an Electronic Shift-Log (ESL), a flexible application written in Java and interfacing with the Data Acquisition tools, Quality Assurance reporting, Online shift crews or remote personnel and experts as well as including features such as shift change-over (or handover) forms, tailored to the sub-group of interest. We will present an overview of STAR's Electronic Log, a system that is clear, reliable, safe, consistent, easy to use and globally viewable in real time with secure connections.

  20. Coal log pipeline research at the University of Missouri. 1st Quarterly report for 1995, January 1, 1995--March 31, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Liu, H.

    1995-08-01

    Work continued on the study of coal log pipeline research. Individual projects described include fast compaction of coal logs; effect of cooling on coal log quality; coal log capping; effectiveness of adding fiber to enhance coal log quality; fabrication using hydrophobic binders; cost estimation of different lubricants; automatic control of coal log pipeline system; CLP design; coal log train transport; economics of coal log pipeline; legal aspects; heating, cooling, and drying of logs; vacuum systems to enhance production; design; and effect of piston modification on capping.

  1. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  2. Neutron activation for logging the distribution of gold in bore-hole cores

    International Nuclear Information System (INIS)

    Rahmanian, H.; Watterson, J.I.W.

    1992-01-01

    A new method for the non-destructive determination of gold in bore-hole cores has been developed using instrumental neutron activation analysis with a 252 Cf source. The procedure obtains the distribution and concentration of gold along the longitudinal axis of the core i.e. a log of the gold concentration. The accuracy of the method is comparable to fire assay at a level of 2 ppm and has a detection limit of 1 ppm under the conditions used. The assay of the gold is carried out by employing a novel variation of the conventional comparator method using gold wires as both standard and flux monitor. A method is described for logging gold in bore-hole cores using neutron activation with a 160 μg 252 Cf neutron source. The method has a limit of detection of about 1 ppm under the described conditions. (author)

  3. Palm distributions for log Gaussian Cox processes

    DEFF Research Database (Denmark)

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus Plenge

    2017-01-01

    This paper establishes a remarkable result regarding Palm distributions for a log Gaussian Cox process: the reduced Palm distribution for a log Gaussian Cox process is itself a log Gaussian Cox process that only differs from the original log Gaussian Cox process in the intensity function. This new...... result is used to study functional summaries for log Gaussian Cox processes....

  4. Systematic logging utilizing a log sheet designed for drill core descriptions. An example in uranium exploration activities

    International Nuclear Information System (INIS)

    Sasao, Eiji; Tsuruta, Tadahiko; Iida, Yoshimasa

    2000-01-01

    We describe the log sheets used during uranium exploration activities for unconformity-related uranium deposits by JNC. The purpose of using the logging sheets is to standardize the objects which all geologists must observe and for data quality assurance. The log sheets are a three-part set describing basement lithology, sandstone lithology and geotechnics. We devised our own log sheets to describe both the sandstone and the underlying basement rock when we started exploration in Athabasca Basin, Canada. We modified the sheets to gain a better understanding of the geological features related to uranium mineralization, and made final improvements to satisfy required quality based on the criteria of descriptive objects and accuracy. Use of the log sheets resulted in effective performance of core logging and improvement in the display of data. (author)

  5. Log-binomial models: exploring failed convergence.

    Science.gov (United States)

    Williamson, Tyler; Eliasziw, Misha; Fick, Gordon Hilton

    2013-12-13

    Relative risk is a summary metric that is commonly used in epidemiological investigations. Increasingly, epidemiologists are using log-binomial models to study the impact of a set of predictor variables on a single binary outcome, as they naturally offer relative risks. However, standard statistical software may report failed convergence when attempting to fit log-binomial models in certain settings. The methods that have been proposed in the literature for dealing with failed convergence use approximate solutions to avoid the issue. This research looks directly at the log-likelihood function for the simplest log-binomial model where failed convergence has been observed, a model with a single linear predictor with three levels. The possible causes of failed convergence are explored and potential solutions are presented for some cases. Among the principal causes is a failure of the fitting algorithm to converge despite the log-likelihood function having a single finite maximum. Despite these limitations, log-binomial models are a viable option for epidemiologists wishing to describe the relationship between a set of predictors and a binary outcome where relative risk is the desired summary measure. Epidemiologists are encouraged to continue to use log-binomial models and advocate for improvements to the fitting algorithms to promote the widespread use of log-binomial models.

  6. A Multi-temporal Analysis of Logging Impacts on Tropical Forest Structure Using Airborne Lidar Data

    Science.gov (United States)

    Keller, M. M.; Pinagé, E. R.; Duffy, P.; Longo, M.; dos-Santos, M. N.; Leitold, V.; Morton, D. C.

    2017-12-01

    The long-term impacts of selective logging on carbon cycling and ecosystem function in tropical-forests are still uncertain. Despite improvements in selective logging detection using satellite data, quantifying changes in forest structure from logging and recovery following logging is difficult using orbital data. We analyzed the dynamics of forest structure comparing logged and unlogged forests in the Eastern Brazilian Amazon (Paragominas Municipality, Pará State) using small footprint discrete return airborne lidar data acquired in 2012 and 2014. Logging operations were conducted at the 1200 ha study site from 2006 through 2013 using reduced impact logging techniques—management practices that minimize canopy and ground damage compared to more common conventional logging. Nevertheless, logging still reduced aboveground biomass by 10% to 20% in logged areas compared to intact forests. We aggregated lidar point-cloud data at spatial scales ranging from 50 m to 250 m and developed a binomial classification model based on the height distribution of lidar returns in 2012 and validated the model against the 2014 lidar acquisition. We accurately classified intact and logged forest classes compared with field data. Classification performance improved as spatial resolution increased (AUC = 0.974 at 250 m). We analyzed the differences in canopy gaps, understory damage (based on a relative density model), and biomass (estimated from total canopy height) of intact and logged classes. As expected, logging greatly increased both canopy gap formation and understory damage. However, while the area identified as canopy gap persisted for at least 8 years (from the oldest logging treatments in 2006 to the most recent lidar acquisition in 2014), the effects of ground damage were mostly erased by vigorous understory regrowth after about 5 years. The rate of new gap formation was 6 to 7 times greater in recently logged forests compared to undisturbed forests. New gaps opened at a

  7. Comparative analysis of nuclear magnetic resonance well logging and nuclear magnetic resonance mud logging

    International Nuclear Information System (INIS)

    Yuan Zugui

    2008-01-01

    The hydrogen atoms in oil and water are able to resonate and generate signals in the magnetic field, which is used by the NMR (nuclear magnetic resonance) technology in petroleum engineering to research and evaluate rock characteristics. NMR well logging was used to measure the physical property parameters of the strata in well bore, whereas NMR mud logging was used to analyze (while drilling) the physical property parameters of cores, cuttings and sidewall coring samples on surface (drilling site). Based on the comparative analysis of the porosity and permeability parameters obtained by NMR well logging and those from analysis of the cores, cuttings and sidewall coring samples by NMR mud logging in the same depth of 13 wells, these two methods are of certain difference, but their integral tendency is relatively good. (authors)

  8. Analyzing engagement in a web-based intervention platform through visualizing log-data.

    Science.gov (United States)

    Morrison, Cecily; Doherty, Gavin

    2014-11-13

    Engagement has emerged as a significant cross-cutting concern within the development of Web-based interventions. There have been calls to institute a more rigorous approach to the design of Web-based interventions, to increase both the quantity and quality of engagement. One approach would be to use log-data to better understand the process of engagement and patterns of use. However, an important challenge lies in organizing log-data for productive analysis. Our aim was to conduct an initial exploration of the use of visualizations of log-data to enhance understanding of engagement with Web-based interventions. We applied exploratory sequential data analysis to highlight sequential aspects of the log data, such as time or module number, to provide insights into engagement. After applying a number of processing steps, a range of visualizations were generated from the log-data. We then examined the usefulness of these visualizations for understanding the engagement of individual users and the engagement of cohorts of users. The visualizations created are illustrated with two datasets drawn from studies using the SilverCloud Platform: (1) a small, detailed dataset with interviews (n=19) and (2) a large dataset (n=326) with 44,838 logged events. We present four exploratory visualizations of user engagement with a Web-based intervention, including Navigation Graph, Stripe Graph, Start-Finish Graph, and Next Action Heat Map. The first represents individual usage and the last three, specific aspects of cohort usage. We provide examples of each with a discussion of salient features. Log-data analysis through data visualization is an alternative way of exploring user engagement with Web-based interventions, which can yield different insights than more commonly used summative measures. We describe how understanding the process of engagement through visualizations can support the development and evaluation of Web-based interventions. Specifically, we show how visualizations

  9. DOE-Grand Junction logging model data synopsis

    International Nuclear Information System (INIS)

    Mathews, M.A.; Koizumi, C.J.; Evans, H.B.

    1978-05-01

    This synopsis provides the available data concerning the logging models at the DoE-Grand Junction facility, to date (1976). Because gamma-ray logs are used in uranium exploration to estimate the grade (percent U 3 O 8 ) and the thickness of uranium ore zones in exploration drill holes, logging models are required to calibrate the gamma-ray logging equipment in order to obtain accuracy, uniformity, standardization, and repeatability during logging. This quality control is essential for accurate ore reserve calculations and for estimates of ore potential. The logging models at the DoE-Grand Junction facility are available for use by private industry in calibrating their gamma-ray logging equipment. 21 figures, 26 tables

  10. SNG-logs at Skjern

    DEFF Research Database (Denmark)

    Korsbech, Uffe C C; Petersen, Jesper; Aage, Helle Karina

    1998-01-01

    Spectral Natural Gamma-ray logs have been run in two water supply borings at Skjern. The log data have been examined by a new technique - Noise Adjusted Singular Value Decomposition - in order to get a detailed and reliable picture of the distribution of uranium and thorium gamma-rays from heavy...

  11. Design A Prototype of Temperature Logging Tools for Geothermal Prospecting Areas

    Directory of Open Access Journals (Sweden)

    Supriyanto

    2013-08-01

    Full Text Available The costs of geothermal exploration are very high because technology is still imported from other countries. The local business players in the geothermal sector do not have the ability to compete with global companies. To reduce costs, we need to develop our own equipment with competitive prices. Here in Indonesia, we have started to design a prototype of temperature logging tools for geothermal prospecting areas. This equipment can be used to detect temperature versus depth variations. To measure the thermal gradient, the platinum resistor temperature sensor is moved slowly down along the borehole. The displacement along the borehole is measured by a rotary encoder. This system is controlled by a 16-bit H8/3069F microcontroller. The acquired temperature data is displayed on a PC monitor using a Python Graphical User Interface. The system has been already tested in the Gunung Pancar geothermal prospect area in Bogor.

  12. CHANDRA X-RAY DETECTION OF THE ENIGMATIC FIELD STAR BP Psc

    International Nuclear Information System (INIS)

    Kastner, Joel H.; Montez, Rodolfo; Rodriguez, David; Zuckerman, B.; Perrin, Marshall D.; Grosso, Nicolas; Forveille, Thierry; Graham, James R.

    2010-01-01

    BP Psc is a remarkable emission-line field star that is orbited by a dusty disk and drives a parsec-scale system of jets. We report the detection by the Chandra X-ray Observatory of a weak X-ray point source coincident with the centroids of optical/IR and submillimeter continuum emission at BP Psc. As the star's photosphere is obscured throughout the visible and near-infrared, the Chandra X-ray source likely represents the first detection of BP Psc itself. The X-rays most likely originate with magnetic activity at BP Psc and hence can be attributed either to a stellar corona or to star-disk interactions. The log of the ratio of X-ray to bolometric luminosity, log(L X /L bol ), lies in the range -5.8 to -4.2. This is smaller than log(L X /L bol ) ratios typical of low-mass, pre-main sequence stars, but is well within the log(L X /L bol ) range observed for rapidly rotating (FK Com-type) G giant stars. Hence, the Chandra results favor an exotic model wherein the disk/jet system of BP Psc is the result of its very recently engulfing a companion star or a giant planet, as the primary star ascended the giant branch.

  13. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  14. A method and device for reducing background in well logging devices using inelastic gamma rays

    International Nuclear Information System (INIS)

    Culver, R.B.

    1974-01-01

    The invention relates to a well logging device, of the type comprising a source of pulsed neutrons and means for detecting radioactivity. The device comprises means adapted to interrupt the neutron source emission in response to the detection of a single gamma radiation showing a pre-determined feature [fr

  15. Influence of borehole-eccentred tools on wireline and logging-while-drilling sonic logging measurements

    KAUST Repository

    Pardo, David; Matuszyk, Paweł Jerzy; Torres-Verdí n, Carlos; Mora Cordova, Angel; Muga, Ignacio; Calo, Victor M.

    2013-01-01

    We describe a numerical study to quantify the influence of tool-eccentricity on wireline (WL) and logging-while-drilling (LWD) sonic logging measurements. Simulations are performed with a height-polynomial-adaptive (hp) Fourier finite-element method

  16. Automated method for measuring the extent of selective logging damage with airborne LiDAR data

    Science.gov (United States)

    Melendy, L.; Hagen, S. C.; Sullivan, F. B.; Pearson, T. R. H.; Walker, S. M.; Ellis, P.; Kustiyo; Sambodo, Ari Katmoko; Roswintiarti, O.; Hanson, M. A.; Klassen, A. W.; Palace, M. W.; Braswell, B. H.; Delgado, G. M.

    2018-05-01

    Selective logging has an impact on the global carbon cycle, as well as on the forest micro-climate, and longer-term changes in erosion, soil and nutrient cycling, and fire susceptibility. Our ability to quantify these impacts is dependent on methods and tools that accurately identify the extent and features of logging activity. LiDAR-based measurements of these features offers significant promise. Here, we present a set of algorithms for automated detection and mapping of critical features associated with logging - roads/decks, skid trails, and gaps - using commercial airborne LiDAR data as input. The automated algorithm was applied to commercial LiDAR data collected over two logging concessions in Kalimantan, Indonesia in 2014. The algorithm results were compared to measurements of the logging features collected in the field soon after logging was complete. The automated algorithm-mapped road/deck and skid trail features match closely with features measured in the field, with agreement levels ranging from 69% to 99% when adjusting for GPS location error. The algorithm performed most poorly with gaps, which, by their nature, are variable due to the unpredictable impact of tree fall versus the linear and regular features directly created by mechanical means. Overall, the automated algorithm performs well and offers significant promise as a generalizable tool useful to efficiently and accurately capture the effects of selective logging, including the potential to distinguish reduced impact logging from conventional logging.

  17. Nuclear well logging in hydrology

    International Nuclear Information System (INIS)

    1971-01-01

    The optimum development of regional and local groundwater resources requires a quantitative evaluation of its aquifers and aquicludes, and of the physical and chemical properties relevant to the recharge to and withdrawal of water from them. If an understanding of the groundwater regime is to be obtained, geological observations at outcrop must be augmented by subsurface measurements of the strata and the waters they contain. Measurements of many hydrological and geological parameters can be made in situ by nuclear geophysical well-logging methods. Very simply, well logging consists of lowering a measuring probe into a well and making a continuous record of the variations of a particular parameter with depth. In most circumstances, repetition of the measurements under differing hydrodynamic conditions results in a better definition of the flow regime in the aquifer. Nuclear well-logging techniques have for some years been capable of solving a number of the sub-surface measurement problems faced by hydrogeologists. However, the present usage of these methods varies from country to country and the literature concerning applications is scattered in the professional journals of several disciplines. The objective of this report is to include in a single reference volume descriptions of the physical principles of nuclear logging methods, their applications to hydrogeological problems and their limitations on a level suitable for the practising hydrologists with a limited knowledge of nuclear physics. The Working Group responsible for compiling the report recommended that it should cover a broad spectrum of hydrogeological investigations and problems. For example, it saw no valid reason to distinguish for the purposes of the report between well-logging applications for water-supply purposes and for water-flooding studies in the petroleum industry. Neutron measurements made for soil-moisture determinations in the unsaturated zone have been specifically omitted, however, as

  18. Benefits of obtaining log data in horizontal wells in the WCSB

    Energy Technology Data Exchange (ETDEWEB)

    Spratt, D. [Reeves Wireline Technologies Ltd., Calgary, AB (Canada)

    2001-11-01

    A Compact Memory Logging (CML) system developed by Reeves Wireline Technologies was presented. It can be used to obtain log data from horizontal wells to get a better understanding of how to enhance production or completion techniques. The methods that are commonly used to obtain data from horizontal wells include measurement while drilling (MWD), logging while drilling (LWD), wet connect pipe conveyed wireline logging and CML. Each method has its unique benefits that range from information on lithology, rock parameters and fluid interfaces. Reeves has been using wireless pipe conveyed CML over the past two years. The log data includes array induction, dual spaced neutron and photo density porosity, Pe, gamma ray, compensated sonic and hose size caliper. Reeves CML is smaller, easily conveyed and has an unprecedented capability to bend and is considered to be well suited for both newly and previously drilled horizontal wells that require remedial assessment. The tool can be used to determine reservoir quality and boundaries, establish zone structures, or identify fluid interfaces for strategic planning of completions and stimulations. This paper presented examples of logs on some horizontal wells that indicate the value of obtaining log data. Reeves CML is considered to be economically and operationally ideal, particularly since data from the CML includes depth of investigation. 5 figs.

  19. Model wells for nuclear well logging

    International Nuclear Information System (INIS)

    Tittle, C.W.

    1989-01-01

    Considerations needed in the design and construction of model wells for nuclear log calibration are covered, with special attention to neutron porosity logging and total γ-ray logging. Pulsed neutron decay-time and spectral γ-ray logging are discussed briefly. The American Petroleum Institute calibration facility for nuclear logs is a good starting point for similar or expanded facilities. A few of its shortcomings are mentioned; they are minor. The problem of fluid saturation is emphasized. Attention is given to models made of consolidated rock and those containing unconsolidated material such as Ottawa sand. Needed precautions are listed. A similarity method is presented for estimating the porosity index of formations that are not fully saturated. (author)

  20. Long term corrosion of iron at the water logged site Nydam in Denmark

    DEFF Research Database (Denmark)

    Matthiesen, Henning; Hilbert, Lisbeth Rischel; Gregory, David

    2005-01-01

    Long term corrosion of iron at the water logged site Nydam in Denmark; studies of enviroment, archaeological artefacts, and modern analogues, Prediction of long term corrosion behaviour in nuclear waste systems.......Long term corrosion of iron at the water logged site Nydam in Denmark; studies of enviroment, archaeological artefacts, and modern analogues, Prediction of long term corrosion behaviour in nuclear waste systems....

  1. A legacy of low-impact logging does not elevate prevalence of potentially pathogenic protozoa in free-ranging gorillas and chimpanzees in the Republic of Congo: logging and parasitism in African apes.

    Science.gov (United States)

    Gillespie, Thomas R; Morgan, David; Deutsch, J Charlie; Kuhlenschmidt, Mark S; Salzer, Johanna S; Cameron, Kenneth; Reed, Trish; Sanz, Crickette

    2009-12-01

    Many studies have examined the long-term effects of selective logging on the abundance and diversity of free-ranging primates. Logging is known to reduce the abundance of some primate species through associated hunting and the loss of food trees for frugivores; however, the potential role of pathogens in such primate population declines is largely unexplored. Selective logging results in a suite of alterations in host ecology and forest structure that may alter pathogen dynamics in resident wildlife populations. In addition, environmental pollution with human fecal material may present a risk for wildlife infections with zoonotic protozoa, such as Cryptosporidium and Giardia. To better understand this interplay, we compared patterns of infection with these potentially pathogenic protozoa in sympatric western lowland gorillas (Gorilla gorilla gorilla) and chimpanzees (Pan troglodytes troglodytes) in the undisturbed Goualougo Triangle of Nouabalé-Ndoki National Park and the adjacent previously logged Kabo Concession in northern Republic of Congo. No Cryptosporidium infections were detected in any of the apes examined and prevalence of infection with Giardia was low (3.73% overall) and did not differ between logged and undisturbed forest for chimpanzees or gorillas. These results provide a baseline for prevalence of these protozoa in forest-dwelling African apes and suggest that low-intensity logging may not result in long-term elevated prevalence of potentially pathogenic protozoa.

  2. Analysis of Web Server Log Files: Website of Information Management Department of Hacettepe University

    Directory of Open Access Journals (Sweden)

    Mandana Mir Moftakhari

    2015-09-01

    Full Text Available Over the last decade, the importance of analysing information management systems logs has grown, because it has proved that results of the analysing log data can help developing in information system design, interface and architecture of websites. Log file analysis is one of the best ways in order to understand information-searching process of online searchers, users’ needs, interests, knowledge, and prejudices. The utilization of data collected in transaction logs of web search engines helps designers, researchers and web site managers to find complex interactions of users’ goals and behaviours to increase efficiency and effectiveness of websites. Before starting any analysis it should be observed that the log file of the web site contain enough information, otherwise analyser wouldn’t be able to create complete report. In this study we evaluate the website of Information Management Department of Hacettepe University by analysing the server log files. Results show that there is not adequate amount of information in log files which are provided by web site server. The reports which we have created have some information about users’ behaviour and need but they are not sufficient for taking ideal decisions about contents & hyperlink structure of website. It also provides that creating an extended log file is essential for the website. Finally we believe that results can be helpful to improve, redesign and create better website.

  3. Predicting the Rate of River Bank Erosion Caused by Large Wood Log

    Science.gov (United States)

    Zhang, N.; Rutherfurd, I.; Ghisalberti, M.

    2016-12-01

    When a single tree falls into a river channel, flow is deflected and accelerated between the tree roots and the bank face, increasing shear stress and scouring the bank. The scallop shaped erosion increases the diversity of the channel morphology, but also causes concern for adjacent landholders. Concern about increased bank erosion is one of the main reasons for large wood to still be removed from channels in SE Australia. Further, the hydraulic effect of many logs in the channel can reduce overall bank erosion rates. Although both phenomena have been described before, this research develops a hydraulic model that estimates their magnitude, and tests and calibrates this model with flume and field measurements, with logs with various configurations and sizes. Specifically, the model estimates the change in excess shear stress on the bank associated . The model addresses the effect of the log angle, distance from bank, and log size and flow condition by solving the mass continuity and energy conservation between the cross section at the approaching flow and contracted flow. Then, we evaluate our model against flume experiment preformed with semi-realistic log models to represent logs in different sizes and decay stages by comparing the measured and simulated velocity increase in the gap between the log and the bank. The log angle, distance from bank, and flow condition are systemically varied for each log model during the experiment. Final, the calibrated model is compared with the field data collected in anabranching channels of Murray River in SE Australia where there are abundant instream logs and regulated and consistent high flow for irrigation. Preliminary results suggest that a log can significantly increase the shear stress on the bank, especially when it positions perpendicular to the flow. The shear stress increases with the log angle in a rising curve (The log angle is the angle between log trunk and flow direction. 0o means log is parallel to flow with

  4. Treatment of log yard run-off by irrigation of grass and willows

    International Nuclear Information System (INIS)

    Jonsson, Maria; Dimitriou, Ioannis; Aronsson, Paer; Elowson, Torbjoern

    2006-01-01

    Log yard run-off is a potential environmental risk, among other things because it creates an oxygen deficiency in receiving watercourses. This study was conducted to investigate the purification efficiency of soil-plant systems with couchgrass (Elymus repens) and willows (Salix sp.) when intensively irrigated with run-off from an open sprinkling system at a Norway spruce (Picea abies) log yard. The purification efficiency was determined both at the field scale (couchgrass) and in 68-L lysimeters (couchgrass and willows). Groundwater in the field and drainage water from the lysimeters were analysed for Total Organic Carbon (TOC), distillable phenols, total P, and total N. Retention of TOC, phenols and P occurred but no difference between couchgrass and willows was observed. The system had better purification capacity at the field scale than in the lysimeters. -- By irrigating willow and couchgrass soil-plant systems with log yard run-off water, TOC, phenols, and phosphorus were reduced with 35% to 96% in the water

  5. Artificial intelligence approach to interwell log correlation

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Jong-Se [Korea Maritime University, Pusan(Korea); Kang, Joo Myung [Seoul National University, Seoul(Korea); Kim, Jung Whan [Korea National Oil Corp., Anyang(Korea)

    2000-04-30

    This paper describes a new approach to automated interwell log correlation using artificial intelligence and principal component analysis. The approach to correlate wire line logging data is on the basis of a large set of subjective rules that are intended to represent human logical processes. The data processed are mainly the qualitative information such as the characteristics of the shapes extracted along log traces. The apparent geologic zones are identified by pattern recognition for the specific characteristics of log trace collected as a set of objects by object oriented programming. The correlation of zones between wells is made by rule-based inference program. The reliable correlation can be established from the first principal component logs derived from both the important information around well bore and the largest common part of variances of all available well log data. Correlation with field log data shows that this approach can make interwell log correlation more reliable and accurate. (author). 6 refs., 7 figs.

  6. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  7. Logging, arboricide treatments and regeneration at Budongo Forest

    African Journals Online (AJOL)

    activity was gradually replaced by the taungya system introduced in ... of this study were to: (i) assess the impact of past logging and arboricide .... effects on Budongo forest. ..... Large size individuals such as Croton, Cordia milenii and.

  8. Verification of respiratory-gated radiotherapy with new real-time tumour-tracking radiotherapy system using cine EPID images and a log file

    Science.gov (United States)

    Shiinoki, Takehiro; Hanazawa, Hideki; Yuasa, Yuki; Fujimoto, Koya; Uehara, Takuya; Shibuya, Keiko

    2017-02-01

    A combined system comprising the TrueBeam linear accelerator and a new real-time tumour-tracking radiotherapy system, SyncTraX, was installed at our institution. The objectives of this study are to develop a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine electronic portal image device (EPID) images and a log file and to verify this treatment in clinical cases. Respiratory-gated radiotherapy was performed using TrueBeam and the SyncTraX system. Cine EPID images and a log file were acquired for a phantom and three patients during the course of the treatment. Digitally reconstructed radiographs (DRRs) were created for each treatment beam using a planning CT set. The cine EPID images, log file, and DRRs were analysed using a developed software. For the phantom case, the accuracy of the proposed method was evaluated to verify the respiratory-gated radiotherapy. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker used as an internal surrogate were calculated to evaluate the gating accuracy and set-up uncertainty in the superior-inferior (SI), anterior-posterior (AP), and left-right (LR) directions. The proposed method achieved high accuracy for the phantom verification. For the clinical cases, the intra- and inter-fractional variations of the fiducial marker were  ⩽3 mm and  ±3 mm in the SI, AP, and LR directions. We proposed a method for the verification of respiratory-gated radiotherapy with SyncTraX using cine EPID images and a log file and showed that this treatment is performed with high accuracy in clinical cases. This work was partly presented at the 58th Annual meeting of American Association of Physicists in Medicine.

  9. A distributed design for monitoring, logging, and replaying device readings at LAMPF

    International Nuclear Information System (INIS)

    Burns, M.

    1991-01-01

    As control of the Los Alamos Meson Physics linear accelerator and Proton Storage Ring moves to a more distributed system, it has been necessary to redesign the software which monitors, logs, and replays device readings throughout the facility. The new design allows devices to be monitored and their readings logged locally on a network of computers. Control of the monitoring and logging process is available throughout the network from user interfaces which communicate via remote procedure calls with server processes running on each node which monitors and records device readings. Similarly, the logged data can be replayed from anywhere on the network. Two major requirements influencing the final design were the need to reduce the load on the CPU of the control machines, and the need for much faster replay of the logged device readings. 1 ref., 2 figs

  10. A distributed design for monitoring, logging, and replaying device readings at LAMPF

    International Nuclear Information System (INIS)

    Burns, M.

    1992-01-01

    As control of the Los Alamos Meson Physics linear accelerator and Proton Storage Ring moves to a more distributed system, it has been necessary to redesign the software which monitors, logs, and replays device readings throughout the facility. The new design allows devices to be monitored and their readings logged locally on a network of computers. Control of the monitoring and logging process is available throughout the network from user interfaces which communicate via remote procedure calls with server processes running on each node which monitors and records device readings. Similarly, the logged data can be replayed from anywhere on the network. Two major requirements influencing the final design were the need to reduce the load on the CPU of the control machines, and the need for much faster replay of the logged device readings. (author)

  11. Processing of gamma-ray spectrometric logs

    International Nuclear Information System (INIS)

    Umiastowski, K.; Dumesnil, P.

    1984-10-01

    CEA (Commissariat a l'Energie Atomique) has developped a gamma-ray spectrometric tool, containing an analog-to-digital converter. This new tool permits to perform very precise uranium logs (natural gamma-ray spectrometry), neutron activation logs and litho-density logs (gamma-gamma spectrometric logs). Specific processing methods were developped to treate the particular problems of down-hole gamma-ray spectrometry. Extraction of the characteristic gamma-ray peak, even if they are superposed on the background radiation of very high intensity, is possible. This processing methode enables also to obtain geological informations contained in the continuous background of the spectrum. Computer programs are written in high level language for SIRIUS (VICTOR) and APOLLO computers. Exemples of uranium and neutron activation logs treatment are presented [fr

  12. Borehole Calibration Facilities to Support Gamma Logging for Hanford Subsurface Investigation and Contaminant Monitoring - 13516

    International Nuclear Information System (INIS)

    McCain, R.G.; Henwood, P.D.; Pope, A.D.; Pearson, A.W.

    2013-01-01

    Repeated gamma logging in cased holes represents a cost-effective means to monitor gamma-emitting contamination in the deep vadose zone over time. Careful calibration and standardization of gamma log results are required to track changes and to compare results over time from different detectors and logging systems. This paper provides a summary description of Hanford facilities currently available for calibration of logging equipment. Ideally, all logging organizations conducting borehole gamma measurements at the Hanford Site will take advantage of these facilities to produce standardized and comparable results. (authors)

  13. Borehole Calibration Facilities to Support Gamma Logging for Hanford Subsurface Investigation and Contaminant Monitoring - 13516

    Energy Technology Data Exchange (ETDEWEB)

    McCain, R.G.; Henwood, P.D.; Pope, A.D.; Pearson, A.W. [S M Stoller Corporation, 2439 Robertson Drive, Richland, WA 99354 (United States)

    2013-07-01

    Repeated gamma logging in cased holes represents a cost-effective means to monitor gamma-emitting contamination in the deep vadose zone over time. Careful calibration and standardization of gamma log results are required to track changes and to compare results over time from different detectors and logging systems. This paper provides a summary description of Hanford facilities currently available for calibration of logging equipment. Ideally, all logging organizations conducting borehole gamma measurements at the Hanford Site will take advantage of these facilities to produce standardized and comparable results. (authors)

  14. Nondestructive evaluation for sorting red maple logs

    Science.gov (United States)

    Xiping Wang; Robert J. Ross; David W. Green; Karl Englund; Michael Wolcott

    2000-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  15. Radiation incident in oil well logging

    International Nuclear Information System (INIS)

    Lozada, J.A.

    1998-01-01

    On June 4th 1997 equipment failure and violation of approved procedures by a crew of workers initiated a series of events that resulted in the unnecessary exposure to neutron and gamma radiation, from a 666 GBq Am 241 Be source, of forty two workers from a well logging company in Venezuela. Due to the presence of dry mud or drilling fluids inside the logging tool, the nosepiece was screwed off the rest of the source holder; this piece was mistaken for the entire source holder thus leaving the source inside the tool. The tool was labelled for maintenance and electronic laboratory personal worked near the source for seven hours before they identify its presence. As soon as the incident was detected a contingency plan was implemented and the source could be retrieved from the tool and placed in its shipping container. The TLD badges indicate doses well below the annual limit of 20 mSv, and none of the workers involved in the incident seem to show serious health consequences from it. After the incident, in order to avoid the occurrence of similar situations, a better source and tool maintenance program was implemented, all the workers were re-trained, and area monitors were installed in all operations bases. (author)

  16. SNG-logs at the Bagsvaerd Lake

    International Nuclear Information System (INIS)

    Korsbech, U.

    1992-11-01

    Spectral Natural Gamma-logs (SNG) were taken in old boreholes around Bagsvaerd Lake (Zealand). The purpose of this investigation was to clarify the geologic/lithologic conditions in this region and the potential risks of waste penetration into ground water. Relationship curves for thorium, uranium and potassium concentrations are given. Some special logs which can be useful for evaluating concentration variations or transition forms among various lithological layers are collected. Appendices contain technical information on the boreholes and discussion of differences between results of SNG-logging and the conventional gamma-logging. (EG)

  17. Using the Logarithmic Concentration Diagram, Log "C", to Teach Acid-Base Equilibrium

    Science.gov (United States)

    Kovac, Jeffrey

    2012-01-01

    Acid-base equilibrium is one of the most important and most challenging topics in a typical general chemistry course. This article introduces an alternative to the algebraic approach generally used in textbooks, the graphical log "C" method. Log "C" diagrams provide conceptual insight into the behavior of aqueous acid-base systems and allow…

  18. Modeling Precipitation Extremes using Log-Histospline

    Science.gov (United States)

    Huang, W. K.; Nychka, D. W.; Zhang, H.

    2017-12-01

    One of the commonly used approaches to modeling univariate extremes is the peaks-overthreshold (POT) method. The POT method models exceedances over a (sufficiently high/low) threshold as a generalized Pareto distribution (GPD). To apply this method, a threshold has to be chosen and the estimates might be sensitive to the chosen threshold. Here we propose an alternative, the "Log-Histospline", to explore modeling the tail behavior and the remainder of the density in one step using the full range of the data. Log-Histospline applies a smoothing spline model on a finely binned histogram of the log transformed data to estimate its log density. By construction, we are able to preserve the polynomial upper tail behavior, a feature commonly observed in geophysical observations. The Log-Histospline can be extended to the spatial setting by treating the marginal (log) density at each location as spatially indexed functional data, and perform a dimension reduction and spatial smoothing. We illustrate the proposed method by analyzing precipitation data from regional climate model output (North American Regional Climate Change and Assessment Program (NARCCAP)).

  19. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  20. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  1. Effect of selective logging on genetic diversity and gene flow in Cariniana legalis sampled from a cacao agroforestry system.

    Science.gov (United States)

    Leal, J B; Santos, R P; Gaiotto, F A

    2014-01-28

    The fragments of the Atlantic Forest of southern Bahia have a long history of intense logging and selective cutting. Some tree species, such as jequitibá rosa (Cariniana legalis), have experienced a reduction in their populations with respect to both area and density. To evaluate the possible effects of selective logging on genetic diversity, gene flow, and spatial genetic structure, 51 C. legalis individuals were sampled, representing the total remaining population from the cacao agroforestry system. A total of 120 alleles were observed from the 11 microsatellite loci analyzed. The average observed heterozygosity (0.486) was less than the expected heterozygosity (0.721), indicating a loss of genetic diversity in this population. A high fixation index (FIS = 0.325) was found, which is possibly due to a reduction in population size, resulting in increased mating among relatives. The maximum (1055 m) and minimum (0.095 m) distances traveled by pollen or seeds were inferred based on paternity tests. We found 36.84% of unique parents among all sampled seedlings. The progenitors of the remaining seedlings (63.16%) were most likely out of the sampled area. Positive and significant spatial genetic structure was identified in this population among classes 10 to 30 m away with an average coancestry coefficient between pairs of individuals of 0.12. These results suggest that the agroforestry system of cacao cultivation is contributing to maintaining levels of diversity and gene flow in the studied population, thus minimizing the effects of selective logging.

  2. Geophysical borehole logging

    International Nuclear Information System (INIS)

    McCann, D.; Barton, K.J.; Hearn, K.

    1981-08-01

    Most of the available literature on geophysical borehole logging refers to studies carried out in sedimentary rocks. It is only in recent years that any great interest has been shown in geophysical logging in boreholes in metamorphic and igneous rocks following the development of research programmes associated with geothermal energy and nuclear waste disposal. This report is concerned with the programme of geophysical logging carried out on the three deep boreholes at Altnabreac, Caithness, to examine the effectiveness of these methods in crystalline rock. Of particular importance is the assessment of the performance of the various geophysical sondes run in the boreholes in relation to the rock mass properties. The geophysical data can be used to provide additional in-situ information on the geological, hydrogeological and engineering properties of the rock mass. Fracturing and weathering in the rock mass have a considerable effect on both the design parameters for an engineering structure and the flow of water through the rock mass; hence, the relation between the geophysical properties and the degree of fracturing and weathering is examined in some detail. (author)

  3. Selective logging in the Brazilian Amazon.

    Science.gov (United States)

    G. P. Asner; D. E. Knapp; E. N. Broadbent; P. J. C. Oliveira; M Keller; J. N. Silva

    2005-01-01

    Amazon deforestation has been measured by remote sensing for three decades. In comparison, selective logging has been mostly invisible to satellites. We developed a large-scale, high-resolution, automated remote-sensing analysis of selective logging in the top five timber-producing states of the Brazilian Amazon. Logged areas ranged from 12,075 to 19,823 square...

  4. Linking log quality with product performance

    Science.gov (United States)

    D. W. Green; Robert Ross

    1997-01-01

    In the United States, log grading procedures use visual assessment of defects, in relation to the log scaling diameter, to estimate the yield of lumber that maybe expected from the log. This procedure was satisfactory when structural grades were based only on defect size and location. In recent years, however, structural products have increasingly been graded using a...

  5. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  6. Logística del transporte

    OpenAIRE

    Robusté Antón, Francesc

    2005-01-01

    La logística se ha conformado como un proceso estratégico para organizar las actividades de producción y de distribución de las empresas. El concepto de sistema logístico ha incluido un amplio espectro de operaciones que condicionan la eficiencia y la competitividad empresarial en el actual contexto de globalización de la economía. En este sentido, este libro afronta y analiza los distintos aspectos que inciden en los procesos de planificación y gestión de los procesos logísticos relacionados...

  7. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  8. A study on directional resistivity logging-while-drilling based on self-adaptive hp-FEM

    Science.gov (United States)

    Liu, Dejun; Li, Hui; Zhang, Yingying; Zhu, Gengxue; Ai, Qinghui

    2014-12-01

    Numerical simulation of resistivity logging-while-drilling (LWD) tool response provides guidance for designing novel logging instruments and interpreting real-time logging data. In this paper, based on self-adaptive hp-finite element method (hp-FEM) algorithm, we analyze LWD tool response against model parameters and briefly illustrate geosteering capabilities of directional resistivity LWD. Numerical simulation results indicate that the change of source spacing is of obvious influence on the investigation depth and detecting precision of resistivity LWD tool; the change of frequency can improve the resolution of low-resistivity formation and high-resistivity formation. The simulation results also indicate that the self-adaptive hp-FEM algorithm has good convergence speed and calculation accuracy to guide the geologic steering drilling and it is suitable to simulate the response of resistivity LWD tools.

  9. A Field Study of NMR Logging to Quantify Petroleum Contamination in Subsurface Sediments

    Science.gov (United States)

    Fay, E. L.; Knight, R. J.; Grunewald, E. D.

    2016-12-01

    Nuclear magnetic resonance (NMR) measurements are directly sensitive to hydrogen-bearing fluids including water and petroleum products. NMR logging tools can be used to detect and quantify petroleum hydrocarbon contamination in the sediments surrounding a well or borehole. An advantage of the NMR method is that data can be collected in both cased and uncased holes. In order to estimate the volume of in-situ hydrocarbon, there must be sufficient contrast between either the relaxation times (T2) or the diffusion coefficients (D) of water and the contaminant. In a field study conducted in Pine Ridge, South Dakota, NMR logging measurements were used to investigate an area of hydrocarbon contamination from leaking underground storage tanks. A contaminant sample recovered from a monitoring well at the site was found to be consistent with a mixture of gasoline and diesel fuel. NMR measurements were collected in two PVC-cased monitoring wells; D and T2 measurements were used together to detect and quantify contaminant in the sediments above and below the water table at both of the wells. While the contrast in D between the fluids was found to be inadequate for fluid typing, the T2 contrast between the contaminant and water in silt enabled the estimation of the water and contaminant volumes. This study shows that NMR logging can be used to detect and quantify in-situ contamination, but also highlights the importance of sediment and contaminant properties that lead to a sufficiently large contrast in T2 or D.

  10. Log-normal distribution from a process that is not multiplicative but is additive.

    Science.gov (United States)

    Mouri, Hideaki

    2013-10-01

    The central limit theorem ensures that a sum of random variables tends to a Gaussian distribution as their total number tends to infinity. However, for a class of positive random variables, we find that the sum tends faster to a log-normal distribution. Although the sum tends eventually to a Gaussian distribution, the distribution of the sum is always close to a log-normal distribution rather than to any Gaussian distribution if the summands are numerous enough. This is in contrast to the current consensus that any log-normal distribution is due to a product of random variables, i.e., a multiplicative process, or equivalently to nonlinearity of the system. In fact, the log-normal distribution is also observable for a sum, i.e., an additive process that is typical of linear systems. We show conditions for such a sum, an analytical example, and an application to random scalar fields such as those of turbulence.

  11. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    Science.gov (United States)

    Wagenbrenner, J. W.; Robichaud, P. R.; Brown, R. E.

    2016-10-01

    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control) forests burned at high severity in northern Montana, eastern Washington, and southern British Columbia to quantify rill overland flow and sediment production rates (fluxes) after ground-based salvage logging. We tested different types of logging equipment-feller-bunchers, tracked and wheeled skidders, and wheeled forwarders-as well as traffic levels and the addition of slash to skid trails as a best management practice. Rill experiments were done at each location in the first year after the fire and repeated in subsequent years. Logging was completed in the first or second post-fire year. We found that ground-based logging using heavy equipment compacted soil, reduced soil water repellency, and reduced vegetation cover. Vegetation recovery rates were slower in most logged areas than the controls. Runoff rates were higher in the skidder and forwarder plots than their respective controls in the Montana and Washington sites in the year that logging occurred, and the difference in runoff between the skidder and control plots at the British Columbia site was nearly significant (p = 0.089). Most of the significant increases in runoff in the logged plots persisted for subsequent years. The type of skidder, the addition of slash, and the amount of forwarder traffic did not significantly affect the runoff rates. Across the three sites, rill sediment fluxes were 5-1900% greater in logged plots than the controls in the year of logging, and the increases were significant for all logging treatments except the low use forwarder trails. There was no difference in the first-year sediment fluxes between the feller

  12. A portable borehole temperature logging system using the four-wire resistance method

    Science.gov (United States)

    Erkan, Kamil; Akkoyunlu, Bülent; Balkan, Elif; Tayanç, Mete

    2017-12-01

    High-quality temperature-depth information from boreholes with a depth of 100 m or more is used in geothermal studies and in studies of climate change. Electrical wireline tools with thermistor sensors are capable of measuring borehole temperatures with millikelvin resolution. The use of a surface readout mode allows analysis of the thermally conductive state of a borehole, which is especially important for climatic and regional heat flow studies. In this study we describe the design of a portable temperature logging tool that uses the four-wire resistance measurement method. The four-wire method enables the elimination of cable resistance effects, thus allowing millikelvin resolution of temperature data at depth. A preliminary two-wire model of the system is also described. The portability of the tool enables one to collect data from boreholes down to 300 m, even in locations with limited accessibility.

  13. Use of activity logs to improve online collaboration

    Directory of Open Access Journals (Sweden)

    César Coll Salvador

    2018-02-01

    Full Text Available This article presents a review of works that center their interest in eLearning platforms and the data mining of participants’ activity. The studies in this research area generate information, through the analysis of such logs and data, that is provided to the students in real time to help them to collaborate and learn through collaboration on the platform. There are studies from different areas of study such as Learning Analytics, Educational Data Mining, Group Awareness Tools or Interaction Analysis Tools. The review takes a double perspective: i to analyze the data extracted from activity logs, their processing, the information generated and the ways to communicate it; and ii to explorer the model and the instruments used to assess how the information provided impact on online collaborative processes and/or the learning. The conclusions emphasize that the models of collaborative learning that justifies the selection of the data extracted from the activity logs, the processing, the information generated and provided to the students and the way of communicating it, are not explicitly stated. In addition, important biases are detected because of not considering the multidimensional nature of the collaborative learning processes. Also, few studies analyze the relations between students' uses of the information provided and the quality of their collaborative processes and learning results. The very few studies that do analyze such relation do not go into depth on the changes in group dynamics caused by information.

  14. Multi-Threaded Evolution of the Data-Logging System of the ATLAS Experiment at CERN

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2011-01-01

    The ATLAS experiment is currently observing proton-proton collisions delivered by the LHC accelerator at a centre of mass energy of 7 TeV with a peak luminosity of ~1033 cm-2 s-1. The ATLAS Trigger and Data Acquisition (TDAQ) system selects interesting events on-line in a three-level trigger system in order to store them at a budgeted rate of ~200 Hz for an event size of ~1.5 MB. This paper focuses on the TDAQ data-logging system. Its purpose is to receive events from the third level trigger, process them and stream the results into different raw data files according to the trigger decision. The data files are subsequently moved to the central mass storage facility at CERN. The system currently in production has been commissioned in 2007 and has been working smoothly since then. It is however based on an essentially single-threaded design that is anticipated not to cope with the increase in event rate and event size that is foreseen as part of the ATLAS and LHC upgrade programs. This design also severely limi...

  15. Multi-Threaded Evolution of the Data-Logging System of the ATLAS Experiment at CERN

    CERN Document Server

    Colombo, T; The ATLAS collaboration

    2011-01-01

    The ATLAS experiment observes proton-proton collisions delivered by the LHC accelerator at a centre of mass energy of 7 TeV with a peak luminosity of ~ 10^33 cm^-2 s^-1 in 2011. The ATLAS Trigger and Data Acquisition (TDAQ) system selects interesting events on-line in a three-level trigger system in order to store them at a budgeted average rate of ~ 400 Hz for an event size of ~1.2 MB. This paper focuses on the TDAQ data-logging system. Its purpose is to receive events from the third level trigger, process them and stream the data into different raw files according to the trigger decision. The system currently in production is based on an essentially single-threaded design that is anticipated not to cope with the increase in event rate and event size foreseen as part of the ATLAS and LHC upgrade programs. This design also severely limits the possibility of performing additional CPU-intensive tasks. Therefore, a novel design able to exploit the full power of multi-core architecture is needed. The main challen...

  16. Correlation and persistence of hunting and logging impacts on tropical rainforest mammals.

    Science.gov (United States)

    Brodie, Jedediah F; Giordano, Anthony J; Zipkin, Elise F; Bernard, Henry; Mohd-Azlan, Jayasilan; Ambu, Laurentius

    2015-02-01

    Humans influence tropical rainforest animals directly via exploitation and indirectly via habitat disturbance. Bushmeat hunting and logging occur extensively in tropical forests and have large effects on particular species. But how they alter animal diversity across landscape scales and whether their impacts are correlated across species remain less known. We used spatially widespread measurements of mammal occurrence across Malaysian Borneo and recently developed multispecies hierarchical models to assess the species richness of medium- to large-bodied terrestrial mammals while accounting for imperfect detection of all species. Hunting was associated with 31% lower species richness. Moreover, hunting remained high even where richness was very low, highlighting that hunting pressure persisted even in chronically overhunted areas. Newly logged sites had 11% lower species richness than unlogged sites, but sites logged >10 years previously had richness levels similar to those in old-growth forest. Hunting was a more serious long-term threat than logging for 91% of primate and ungulate species. Hunting and logging impacts across species were not correlated across taxa. Negative impacts of hunting were the greatest for common mammalian species, but commonness versus rarity was not related to species-specific impacts of logging. Direct human impacts appeared highly persistent and lead to defaunation of certain areas. These impacts were particularly severe for species of ecological importance as seed dispersers and herbivores. Indirect impacts were also strong but appeared to attenuate more rapidly than previously thought. The lack of correlation between direct and indirect impacts across species highlights that multifaceted conservation strategies may be needed for mammal conservation in tropical rainforests, Earth's most biodiverse ecosystems. © 2014 Society for Conservation Biology.

  17. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  18. Information needs for increasing log transport efficiency

    Science.gov (United States)

    Timothy P. McDonald; Steven E. Taylor; Robert B. Rummer; Jorge Valenzuela

    2001-01-01

    Three methods of dispatching trucks to loggers were tested using a log transport simulation model: random allocation, fixed assignment of trucks to loggers, and dispatch based on knowledge of the current status of trucks and loggers within the system. This 'informed' dispatch algorithm attempted to minimize the difference in time between when a logger would...

  19. Displacement length and velocity of tagged logs in the tagliamento river

    Directory of Open Access Journals (Sweden)

    Diego Ravazzolo

    2013-09-01

    Full Text Available Large wood enhance the dynamics of geomorphic processes in river systems, increases the morphological complexity of the channel bed, and provides habitats for fish and invertebrates. On the other side, if transported during high-magnitude events, large wood pieces can increase flood risks in sensitive places such as bridges and narrow cross sections prone to outbank flows. However, the dynamics and mobility of logs in rivers is poorly understood, especially in wide gravel-bed rivers. Recent studies have employed fixed video cameras to assess logs velocity, but little evidence is still available about travel length during flood events of different magnitude. This study was conducted in a valley reach of the Tagliamento river, located in the North East of Italy. The Tagliamento river is approximately 800 m wide in the study area, and is characterized by relatively high natural conditions and complex fluvial dynamics. Log mobility have been studied from June 2010 to October 2011, a period characterized by a relatively high magnitude flood in November 2010. Log mobility and displacement during floods have been measured by implanting active radio transmitters (RFID in 113 logs and GPS track devices in 42 logs. The first devices allow to recover the log after flood events by using a portable antenna, and to derive the displacement length over the monitoring period, whereas the second devices allows to calculate instantaneous (1 sec and average log velocity of moving logs. Recovery rate of logs equipped with RFID and GPS was about 50% and 60%, respectively. A preliminary analysis of the data collected indicates that there is a positive relationship between displacement length and the peak of flood events, as well as a positive relationship between log velocity and the flood magnitude. Also, a critical flow rate over which logs stranded on active bars can be transported has been identified. The ability to predict wood mobility in gravel-bed rivers could

  20. Intelligent approaches for the synthesis of petrophysical logs

    International Nuclear Information System (INIS)

    Rezaee, M Reza; Kadkhodaie-Ilkhchi, Ali; Alizadeh, Pooya Mohammad

    2008-01-01

    Log data are of prime importance in acquiring petrophysical data from hydrocarbon reservoirs. Reliable log analysis in a hydrocarbon reservoir requires a complete set of logs. For many reasons, such as incomplete logging in old wells, destruction of logs due to inappropriate data storage and measurement errors due to problems with logging apparatus or hole conditions, log suites are either incomplete or unreliable. In this study, fuzzy logic and artificial neural networks were used as intelligent tools to synthesize petrophysical logs including neutron, density, sonic and deep resistivity. The petrophysical data from two wells were used for constructing intelligent models in the Fahlian limestone reservoir, Southern Iran. A third well from the field was used to evaluate the reliability of the models. The results showed that fuzzy logic and artificial neural networks were successful in synthesizing wireline logs. The combination of the results obtained from fuzzy logic and neural networks in a simple averaging committee machine (CM) showed a significant improvement in the accuracy of the estimations. This committee machine performed better than fuzzy logic or the neural network model in the problem of estimating petrophysical properties from well logs

  1. A Generally Applicable Computer Algorithm Based on the Group Additivity Method for the Calculation of Seven Molecular Descriptors: Heat of Combustion, LogPO/W, LogS, Refractivity, Polarizability, Toxicity and LogBB of Organic Compounds; Scope and Limits of Applicability

    Directory of Open Access Journals (Sweden)

    Rudolf Naef

    2015-10-01

    Full Text Available A generally applicable computer algorithm for the calculation of the seven molecular descriptors heat of combustion, logPoctanol/water, logS (water solubility, molar refractivity, molecular polarizability, aqueous toxicity (protozoan growth inhibition and logBB (log (cblood/cbrain is presented. The method, an extendable form of the group-additivity method, is based on the complete break-down of the molecules into their constituting atoms and their immediate neighbourhood. The contribution of the resulting atom groups to the descriptor values is calculated using the Gauss-Seidel fitting method, based on experimental data gathered from literature. The plausibility of the method was tested for each descriptor by means of a k-fold cross-validation procedure demonstrating good to excellent predictive power for the former six descriptors and low reliability of logBB predictions. The goodness of fit (Q2 and the standard deviation of the 10-fold cross-validation calculation was >0.9999 and 25.2 kJ/mol, respectively, (based on N = 1965 test compounds for the heat of combustion, 0.9451 and 0.51 (N = 2640 for logP, 0.8838 and 0.74 (N = 1419 for logS, 0.9987 and 0.74 (N = 4045 for the molar refractivity, 0.9897 and 0.77 (N = 308 for the molecular polarizability, 0.8404 and 0.42 (N = 810 for the toxicity and 0.4709 and 0.53 (N = 383 for logBB. The latter descriptor revealing a very low Q2 for the test molecules (R2 was 0.7068 and standard deviation 0.38 for N = 413 training molecules is included as an example to show the limits of the group-additivity method. An eighth molecular descriptor, the heat of formation, was indirectly calculated from the heat of combustion data and correlated with published experimental heat of formation data with a correlation coefficient R2 of 0.9974 (N = 2031.

  2. Testing of dynamic multileaf collimator by dynamic log file

    International Nuclear Information System (INIS)

    Ono, Kaoru; Nakamura, Tetsuji; Yamato, Shinichirou; Miyazawa, Masanori

    2007-01-01

    Intensity-modulated radiation therapy (IMRT) represents one of the most significant technical advances in radiation therapy. In the dynamic multileaf collimator (MLC) method of IMRT delivery, because of the relatively small gaps between opposed leaves and because most regions are shielded by leaves most of the time, the delivered dose is very sensitive to MLC leaf positional accuracy. A variation of ±0.2 mm in the gap width can result in a dose variation of ±3% for each clinical dynamic MLC field. Most often the effects of leaf motion are inferred from dose deviations on film or from variations in ionization measurements. These techniques provide dosimetric information but do not provide detailed information for diagnosing delivery problems. Therefore, a dynamic log file (Dynalog file) was used to verify dynamic MLC leaf positional accuracy. Measuring for narrow gaps using the thickness gauge could detect a log file accuracy of approximately 0.1 mm. The accuracy of dynamic MLC delivery depends on the accuracy with which the velocity of each leaf is controlled. We studied the relationship between leaf positional accuracy and leaf velocity. Leaf velocity of 0.7 cm/sec caused approximately 0.2 mm leaf positional variation. We then analyzed leaf positional accuracy for the clinical dynamic MLC field using Dynalog File Viewer (Varian Medical Systems, Inc., Palo Alto, California (CA)), and developed a new program that can analyze more detailed leaf motions. Using this program, we can obtain more detailed information, and therefore can determine the source of dose uncertainties for the dynamic MLC field. (author)

  3. Log canonical thresholds of smooth Fano threefolds

    International Nuclear Information System (INIS)

    Cheltsov, Ivan A; Shramov, Konstantin A

    2008-01-01

    The complex singularity exponent is a local invariant of a holomorphic function determined by the integrability of fractional powers of the function. The log canonical thresholds of effective Q-divisors on normal algebraic varieties are algebraic counterparts of complex singularity exponents. For a Fano variety, these invariants have global analogues. In the former case, it is the so-called α-invariant of Tian; in the latter case, it is the global log canonical threshold of the Fano variety, which is the infimum of log canonical thresholds of all effective Q-divisors numerically equivalent to the anticanonical divisor. An appendix to this paper contains a proof that the global log canonical threshold of a smooth Fano variety coincides with its α-invariant of Tian. The purpose of the paper is to compute the global log canonical thresholds of smooth Fano threefolds (altogether, there are 105 deformation families of such threefolds). The global log canonical thresholds are computed for every smooth threefold in 64 deformation families, and the global log canonical thresholds are computed for a general threefold in 20 deformation families. Some bounds for the global log canonical thresholds are computed for 14 deformation families. Appendix A is due to J.-P. Demailly.

  4. Application of just-in-time manufacturing techniques in radioactive source in well logging industry

    Directory of Open Access Journals (Sweden)

    Atma Yudha Prawira

    2017-03-01

    Full Text Available Nuclear logging is one of major areas of logging development. This paper presents an empirical investigation to bring the drilling and completion of wells from an ill-defined art to a refined sci-ence by using radioactive source to “look and measure” such as formation type, formation dip, porosity, fluid type and numerous other important factors. The initial nuclear logging tools rec-ords the radiation emitted by formation as they were crossed by boreholes. Gamma radiation is used in well logging as it is powerful enough to penetrate the formation and steel casing. The ra-dioactive source is reusable so that after engineer finished the job the radioactive source is sent back to bunker. In this case inventory level of radioactive source is relatively high compared with monthly movement and the company must spend large amount of cost just for inventory. After calculating and averaging the monthly movement in 2014 and 2015, we detected a big pos-sibility to cut the inventory level to reduce the inventory cost.

  5. Case-Logging Practices in Otolaryngology Residency Training: National Survey of Residents and Program Directors.

    Science.gov (United States)

    Dermody, Sarah M; Gao, William; McGinn, Johnathan D; Malekzadeh, Sonya

    2017-06-01

    Objective (1) Evaluate the consistency and manner in which otolaryngology residents log surgical cases. (2) Assess the extent of instruction and guidance provided by program directors on case-logging practices. Study Design Cross-sectional national survey. Setting Accreditation Council for Graduate Medical Education otolaryngology residency programs in the United States. Subjects and Methods US otolaryngology residents, postgraduate year 2 through graduating chiefs as of July 2016, were recruited to respond to an anonymous questionnaire designed to characterize surgical case-logging practices. Program directors of US otolaryngology residency programs were recruited to respond to an anonymous questionnaire to elucidate how residents are instructed to log cases. Results A total of 272 residents and 53 program directors completed the survey, yielding response rates of 40.6% and 49.5%, respectively. Perceived accuracy of case logs is low among residents and program directors. Nearly 40% of residents purposely choose not to log certain cases, and 65.1% of residents underreport cases performed. More than 80% of program directors advise residents to log procedures performed outside the operating room, yet only 16% of residents consistently log such cases. Conclusion Variability in surgical case-logging behaviors and differences in provided instruction highlight the need for methods to improve consistency of logging practices. It is imperative to standardize practices across otolaryngology residency programs for case logs to serve as an accurate measure of surgical competency. This study provides a foundation for reform efforts within residency programs and for the Resident Case Log System.

  6. Elephant logging and environment

    International Nuclear Information System (INIS)

    Tin-Aung-Hla

    1995-01-01

    The natural environment comprises non-biological elements such as air, water, light, heat and biological elements of animal and plant life; all interact with each other to create an ecosystem. Human activities like over-exploitation of forest results in deforestation and desertification. This consequently changes ecological balance. Topics on: (1) history of elephants utilization; (2) elephant logging; (3) classification of elephants; (4) dragging gear; (5) elephant power; (6) elephant logging and environment, are discussed

  7. Building analytical platform with Big Data solutions for log files of PanDA infrastructure

    Science.gov (United States)

    Alekseev, A. A.; Barreiro Megino, F. G.; Klimentov, A. A.; Korchuganova, T. A.; Maendo, T.; Padolski, S. V.

    2018-05-01

    The paper describes the implementation of a high-performance system for the processing and analysis of log files for the PanDA infrastructure of the ATLAS experiment at the Large Hadron Collider (LHC), responsible for the workload management of order of 2M daily jobs across the Worldwide LHC Computing Grid. The solution is based on the ELK technology stack, which includes several components: Filebeat, Logstash, ElasticSearch (ES), and Kibana. Filebeat is used to collect data from logs. Logstash processes data and export to Elasticsearch. ES are responsible for centralized data storage. Accumulated data in ES can be viewed using a special software Kibana. These components were integrated with the PanDA infrastructure and replaced previous log processing systems for increased scalability and usability. The authors will describe all the components and their configuration tuning for the current tasks, the scale of the actual system and give several real-life examples of how this centralized log processing and storage service is used to showcase the advantages for daily operations.

  8. Development of Cross-Platform Software for Well Logging Data Visualization

    Science.gov (United States)

    Akhmadulin, R. K.; Miraev, A. I.

    2017-07-01

    Well logging data processing is one of the main sources of information in the oil-gas field analysis and is of great importance in the process of its development and operation. Therefore, it is important to have the software which would accurately and clearly provide the user with processed data in the form of well logs. In this work, there have been developed a software product which not only has the basic functionality for this task (loading data from .las files, well log curves display, etc.), but can be run in different operating systems and on different devices. In the article a subject field analysis and task formulation have been performed, and the software design stage has been considered. At the end of the work the resulting software product interface has been described.

  9. Financial feasibility of a log sort yard handling small-diameter logs: A preliminary study

    Science.gov (United States)

    Han-Sup Han; E. M. (Ted) Bilek; John (Rusty) Dramm; Dan Loeffler; Dave Calkin

    2011-01-01

    The value and use of the trees removed in fuel reduction thinning and restoration treatments could be enhanced if the wood were effectively evaluated and sorted for quality and highest value before delivery to the next manufacturing destination. This article summarizes a preliminary financial feasibility analysis of a log sort yard that would serve as a log market to...

  10. Pembangkitan Data dari Distribusi Log-logistik

    Directory of Open Access Journals (Sweden)

    Aceng Komarudin Mutaqin

    2014-11-01

    Full Text Available Distribusi log-logistik merupakan salah satu distribusi yang dapat diaplikasikan untuk data mutu lingkungan. Makalah ini membahas pembangkitan data dari distribusi log-logistik mulai dari pembangunan algoritme sampai pembuatan program komputer pada perangkat lunak MATLAB. Metode pembangkitan datanya menggunakan metode inverse transform. Ada dua jenis data yang dibangkitkan, yaitu data lengkap dan data tersensor kiri. Dalam makalah ini diberikan contoh data yang dibangkitkan dari distribusi log-logistik.

  11. Sediment pathways in a tropical forest: effects of logging roads and skid trails

    Science.gov (United States)

    Sidle, Roy C.; Sasaki, Shozo; Otsuki, Mieko; Noguchi, Shoji; Rahim Nik, Abdul

    2004-03-01

    Significant erosion occurred from recently constructed forest logging roads and skid trails in a small headwater catchment in Peninsular Malaysia. Soil loss was estimated by measuring dimensions of all significant rills and gullies along the road, as well as by measuring height of preserved soil pedestals in sidecast and fill material and on skid trails. Estimates of surface erosion from logging roads and skid trails were 272 +/- 20 t ha-1 year-1 and 275 +/- 20 t ha-1 year-1 respectively. However, owing to lack of connectivity of skid trails to the stream, much of the sediment mobilized on skid trails was stored either on adjacent hillslopes or the trails themselves, rather than being transported to the stream system, as was the case for the road. Steeper skid trails (>20% gradient) had slightly higher erosion rates (320 +/- 24 t ha-1 year-1) than trails with gentler gradients (245-264 t ha-1 year-1). Some 60% of the soil loss on logging roads comes from erosion of the running surface. Disturbed cut and fill material along the road supplied the remaining 40% of the soil loss from roads. Roads and skid trails had no designed drainage systems; runoff discharged onto the hillslope at 25 major discharge nodes from the logging road (690 m total length) and at 34 nodes from skid trails (2300 m). Sediment pathways were either fully or moderately connected to headwater channels at 64% of the logging road nodes, but at only 26% of the nodes emanating from skid trails. A detailed sediment budget revealed that 78% of the soil loss from the road system (including log landings) was delivered to the stream in the first 16 months after logging began. Most (90%) of the deposition from skid trails occurred below just three discharge nodes. Runoff from and onto skid trails often exacerbated the sediment connectivity to channels. Clearly, sediment discharge from logging roads was more highly connected to the stream than discharge from skid trails. Once in the channel, much of this

  12. Pulsed neutron logging - a modern approach to petroleum exploration

    International Nuclear Information System (INIS)

    Navalkar, M.P.

    1978-01-01

    As hydrocarbons have strikingly different properties for neutrons as compared with rocks, neutronic methods are useful to prepare logs of bore holes drilled for petroleum exploration. The earlier neutron logs were based on steady neutron sources, but the superior logs, namely, neutron life time log and neutron induced spectral log are based on pulsed neutron sources. The methods of obtaining these logs, their limitations and the field equipment required are described briefly. As the two logs are complementary, a plea has been made to develop field equipment which can obtain two logs in a single run. (M.G.B.)

  13. Aggregation of log-linear risks

    DEFF Research Database (Denmark)

    Embrechts, Paul; Hashorva, Enkeleijd; Mikosch, Thomas Valentin

    2014-01-01

    In this paper we work in the framework of a k-dimensional vector of log-linear risks. Under weak conditions on the marginal tails and the dependence structure of a vector of positive risks, we derive the asymptotic tail behaviour of the aggregated risk {and present} an application concerning log...

  14. Assessing the feasibility and profitability of cable logging in southern upland hardwood forests

    Science.gov (United States)

    Chris B. LeDoux; Dennis M. May; Tony Johnson; Richard H. Widmann

    1995-01-01

    Procedures developed to assess available timber supplies from upland hardwood forest statistics reported by the USDA Forest Services' Forest Inventory and Analysis unit were modified to assess the feasibility and profitability of cable logging in southern upland hardwood forests. Depending on the harvest system and yarding distance used, cable logging can be...

  15. Method and apparatus for stabilizing signals in radioactive well logging tools

    International Nuclear Information System (INIS)

    Kampfer, J.G.; Ingram, L.A.

    1977-01-01

    A method and apparatus are presented for stabilizing signals in radioactive well logging tools. In the tool a main scintillating crystal and photomultiplier tube for detecting radiation induced in the borehole by a source of radiation are provided and a reference crystal, including a source of mono-energetic radiation, for producing continuous reference signals of a predetermined energy level. The signals are monitored and the spectrum is stabilized to correct for drift of the data signals introduced by the photomultiplier tube and the data transmission system. The preferred mono-energetic reference signals are selected to appear in the energy spectrum at a level which minimizes error. An electronic circuit at the surface provides a correction signal for adjusting the gain of a data signal amplifier responsive to changes in the reference signal, thereby correcting for drift in the data signal

  16. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  17. Log-inject-log in sand consolidation

    International Nuclear Information System (INIS)

    Murphy, R.P.; Spurlock, J.W.

    1977-01-01

    A method is described for gathering information for the determination of the adequacy of placement of sand consolidating plastic for sand control in oil and gas wells. The method uses a high neutron cross-section tracer which becomes part of the plastic and uses pulsed neutron logging before and after injection of the plastic. Preferably, the method uses lithium, boron, indium, and/or cadmium tracers. Boron oxide is especially useful and can be dissolved in alcohol and mixed with the plastic ingredients

  18. Assessment of radiation safety in well logging

    International Nuclear Information System (INIS)

    Alles, A.; Pérez, Y.; Duménigo, C.

    2015-01-01

    Radiation safety assessments required by current regulations are a means to verify compliance with the requirements. Different methods have been used for this purpose. In the paper the results of applying the method of risk matrices, applied for the first time in the practice of well logging are exposed. For each initiating event frequency of occurrence, the severity of its consequences and the probability of failure of the barriers identified were evaluated. Starting from these assumptions, the risk associated is determined for each of the identified accident sequences, using for this the SEVRRA code 'Risk Assessment System', originally designed for use in radiotherapy. As an result sequences increased risk associated with the practice of well logging were identified, which is the starting point for the further implementation of a coherent program of dose optimization in practice. [es

  19. Water injection profiling by nuclear logging

    International Nuclear Information System (INIS)

    Arnold, D.M.

    1980-01-01

    This invention relates to nuclear logging techniques for determining the volume flow rates and flow directions of injected water moving behind a wellbore casing. The apparatus includes a sonde equipped with a neutron source and dual radiation detectors. Oxygen in the neutron irradiated water is transmitted to 16 N and the resultant primary and Compton scattered gamma rays are detected in two energy windows by both detectors. Count rate data is analysed in terms of the windows to obtain linear flow velocities for water flow within and behind the casing. Volume flow rates are determined for upward and downward flow, and horizontal volume flow into the surrounding formation is calculated. A complete injection profile may thus be obtained. (U.K.)

  20. Gulf of Mexico Gas Hydrate Joint Industry Project Leg II logging-while-drilling data acquisition and analysis

    Science.gov (United States)

    Collett, Timothy S.; Lee, Wyung W.; Zyrianova, Margarita V.; Mrozewski, Stefan A.; Guerin, Gilles; Cook, Ann E.; Goldberg, Dave S.

    2012-01-01

    One of the objectives of the Gulf of Mexico Gas Hydrate Joint Industry Project Leg II (GOM JIP Leg II) was the collection of a comprehensive suite of logging-while-drilling (LWD) data within gas-hydrate-bearing sand reservoirs in order to make accurate estimates of the concentration of gas hydrates under various geologic conditions and to understand the geologic controls on the occurrence of gas hydrate at each of the sites drilled during this expedition. The LWD sensors just above the drill bit provided important information on the nature of the sediments and the occurrence of gas hydrate. There has been significant advancements in the use of downhole well-logging tools to acquire detailed information on the occurrence of gas hydrate in nature: From using electrical resistivity and acoustic logs to identify gas hydrate occurrences in wells to where wireline and advanced logging-while-drilling tools are routinely used to examine the petrophysical nature of gas hydrate reservoirs and the distribution and concentration of gas hydrates within various complex reservoir systems. Recent integrated sediment coring and well-log studies have confirmed that electrical resistivity and acoustic velocity data can yield accurate gas hydrate saturations in sediment grain supported (isotropic) systems such as sand reservoirs, but more advanced log analysis models are required to characterize gas hydrate in fractured (anisotropic) reservoir systems. In support of the GOM JIP Leg II effort, well-log data montages have been compiled and presented in this report which includes downhole logs obtained from all seven wells drilled during this expedition with a focus on identifying and characterizing the potential gas-hydrate-bearing sedimentary section in each of the wells. Also presented and reviewed in this report are the gas-hydrate saturation and sediment porosity logs for each of the wells as calculated from available downhole well logs.

  1. Gulf of Mexico Gas Hydrate Joint Industry Project Leg II logging-while-drilling data acquisition and anaylsis

    Science.gov (United States)

    Collett, Timothy S.; Lee, Myung W.; Zyrianova, Margarita V.; Mrozewski, Stefan A.; Guerin, Gilles; Cook, Ann E.; Goldberg, Dave S.

    2012-01-01

    One of the objectives of the Gulf of MexicoGasHydrateJointIndustryProjectLegII (GOM JIP LegII) was the collection of a comprehensive suite of logging-while-drilling (LWD) data within gas-hydrate-bearing sand reservoirs in order to make accurate estimates of the concentration of gashydrates under various geologic conditions and to understand the geologic controls on the occurrence of gashydrate at each of the sites drilled during this expedition. The LWD sensors just above the drill bit provided important information on the nature of the sediments and the occurrence of gashydrate. There has been significant advancements in the use of downhole well-logging tools to acquire detailed information on the occurrence of gashydrate in nature: From using electrical resistivity and acoustic logs to identify gashydrate occurrences in wells to where wireline and advanced logging-while-drilling tools are routinely used to examine the petrophysical nature of gashydrate reservoirs and the distribution and concentration of gashydrates within various complex reservoir systems. Recent integrated sediment coring and well-log studies have confirmed that electrical resistivity and acoustic velocity data can yield accurate gashydrate saturations in sediment grain supported (isotropic) systems such as sand reservoirs, but more advanced log analysis models are required to characterize gashydrate in fractured (anisotropic) reservoir systems. In support of the GOM JIP LegII effort, well-log data montages have been compiled and presented in this report which includes downhole logs obtained from all seven wells drilled during this expedition with a focus on identifying and characterizing the potential gas-hydrate-bearing sedimentary section in each of the wells. Also presented and reviewed in this report are the gas-hydrate saturation and sediment porosity logs for each of the wells as calculated from available downhole well logs.

  2. Software Design and Implementation of a Next Generation GNSS Data Logger for Radio Frequency Interference Detection

    Science.gov (United States)

    Rivera, Sean

    The aim of this thesis is to implement a new GNSS interference detection system that extends the functionality of previous systems. This technology will be evaluated on the effectiveness of data collection in GPS L1, GPS L2C and all software changes required to implement it. Additionally there is discussion about extending the technology to log GLONASS L1 and GLONASS L2 data. This thesis is broken up into three sections. First, it describes the current state of GPS ASIC systems, using the SiGe receiver. It covers the reasons that this ASIC requires modernization as well as what behavior the system seeks to emulate. Next, it describes the new hardware that will make up the base of the new system. It covers what each component has been added for and its differences from the previous version. The focus is on the new ability of the receiver to receiver L2C simultaneously with L1 as well as the increased data rate which allows for better positioning. Finally, the thesis describes new software development effort centered around the new system. The thesis describes three test modes used, continuous logging, triggered logging and periodic logging. Extra attention is paid to the implementation of a real time networked version of the code. The final goal of the thesis is to build a low cost distributed system that is capable of detecting and localizing GPS and GLONASS interference on both the L1 and L2 bands.

  3. A radioactive particle detection system for the Maralinga rehabilitation project

    International Nuclear Information System (INIS)

    Martin, L.J.; Baylis, S.H.

    1998-01-01

    Following the cessation of British nuclear testing at Maralinga, several sites were left contaminated with plutonium in various forms over areas of many square kilometres. The contamination included 239 Pu and 241 Am together with other isotopes of plutonium, and was in the form of fine dust, discrete particles and contaminated fragments of metals, plastics and ceramics. Following a government decision to rehabilitate the area to a standard suitable for re-occupation by the traditional owners, the Maralinga Tjarutja, an expert committee, MARTAC, was convened to advise the Department of Primary Industries and Energy about suitable methods and standards for the cleanup. Criteria set by MARTAC required the removal of all discrete particles of contamination exceeding 100 kBq of 241 Am and imposed limits on the numbers of particles exceeding 20 kBq. A detection system was required which could detect any radioactive particles exceeding criteria and, following rehabilitation, verify that none remained. The most useful indicator of contamination was the 60 keV gamma-ray from 241 Am. The system was fitted to a four wheel drive utility vehicle, and was based on four thin-crystal, sodium iodide detectors of 12.5 cm diameter held 30 cm above ground level. Electronic components from off-the-shelf hand-held ratemeters were used to provide the high voltage supply, amplifier and single channel analyser in a ruggedised form of proven reliability. The combined use of thin crystal detectors and single channel analyser allowed a significant reduction in background count rates while maintaining the efficiency for detection of the 60 keV gamma-ray. To allow efficient and reliable coverage, the vehicle was fitted with a high-resolution speedometer to allow the proper speed to be maintained, and a mapping display, based on the GPS system, which showed the previous path of the vehicle and boundary of the area to be scanned. Whenever a radioactive particle was detected, its coordinates were

  4. 29 CFR 1918.88 - Log operations.

    Science.gov (United States)

    2010-07-01

    ...) SAFETY AND HEALTH REGULATIONS FOR LONGSHORING Handling Cargo § 1918.88 Log operations. (a) Working in..., the employer shall ensure that employees remain clear of areas where logs being dumped could strike...

  5. SU-E-T-158: Catching Errors with Trajectory Log Files

    International Nuclear Information System (INIS)

    Wijesooriya, K; Seitter, K; Desai, V; Dharia, I; Read, P; Larner, J

    2015-01-01

    Purpose: To present our single institution experience on catching errors with trajectory log file analysis. The reported causes of failures, probability of occurrences (O), severity of effects (S), and the probability of the failures to be undetected (D) could be added to guidelines of FMEA analysis. Methods: From March 2013 to March 2014, 19569 patient treatment fields/arcs were analyzed. This work includes checking all 131 treatment delivery parameters for all patients, all treatment sites and all treatment delivery fractions. TrueBeam trajectory log files for all treatment field types as well as all imaging types were accessed, read in every 20ms, and every control point (total of 37 million parameters) compared to the physician approved plan in the planning system. Results: Couch angle outlier occurrence: N= 327, range = −1.7 −1.2 deg; gantry angle outlier occurrence: N =59, range = 0.09 – 5.61 deg, collimator angle outlier occurrence: N = 13, range = −0.2 – 0.2 deg. VMAT cases have slightly larger variations in mechanical parameters. MLC: 3D single control point fields have a maximum deviation of 0.04 mm, 39 step and shoot IMRT cases have MLC −0.3 – 0.5 mm deviations, all (1286) VMAT cases have −0.9 – 0.7 mm deviations. Two possible serious errors were found: 1) A 4 cm isocenter shift for the PA beam of an AP-PA pair, under-dosing a portion of PTV by 25%. 2) Delivery with MLC leaves abutted behind the jaws as opposed to the midline as planned, leading to a under-dosing of a small volume of the PTV by 25%, by just the boost plan. Due to their error origin, neither of these errors could have been detected by pre-treatment verification. Conclusion: Performing Trajectory Log file analysis could catch typically undetected errors to avoid potentially adverse incidents

  6. SU-E-T-158: Catching Errors with Trajectory Log Files

    Energy Technology Data Exchange (ETDEWEB)

    Wijesooriya, K; Seitter, K; Desai, V; Dharia, I; Read, P; Larner, J [University of Virginia Health Systems, Charlottesville, VA (United States)

    2015-06-15

    Purpose: To present our single institution experience on catching errors with trajectory log file analysis. The reported causes of failures, probability of occurrences (O), severity of effects (S), and the probability of the failures to be undetected (D) could be added to guidelines of FMEA analysis. Methods: From March 2013 to March 2014, 19569 patient treatment fields/arcs were analyzed. This work includes checking all 131 treatment delivery parameters for all patients, all treatment sites and all treatment delivery fractions. TrueBeam trajectory log files for all treatment field types as well as all imaging types were accessed, read in every 20ms, and every control point (total of 37 million parameters) compared to the physician approved plan in the planning system. Results: Couch angle outlier occurrence: N= 327, range = −1.7 −1.2 deg; gantry angle outlier occurrence: N =59, range = 0.09 – 5.61 deg, collimator angle outlier occurrence: N = 13, range = −0.2 – 0.2 deg. VMAT cases have slightly larger variations in mechanical parameters. MLC: 3D single control point fields have a maximum deviation of 0.04 mm, 39 step and shoot IMRT cases have MLC −0.3 – 0.5 mm deviations, all (1286) VMAT cases have −0.9 – 0.7 mm deviations. Two possible serious errors were found: 1) A 4 cm isocenter shift for the PA beam of an AP-PA pair, under-dosing a portion of PTV by 25%. 2) Delivery with MLC leaves abutted behind the jaws as opposed to the midline as planned, leading to a under-dosing of a small volume of the PTV by 25%, by just the boost plan. Due to their error origin, neither of these errors could have been detected by pre-treatment verification. Conclusion: Performing Trajectory Log file analysis could catch typically undetected errors to avoid potentially adverse incidents.

  7. Real-Time Pore Pressure Detection: Indicators and Improved Methods

    Directory of Open Access Journals (Sweden)

    Jincai Zhang

    2017-01-01

    Full Text Available High uncertainties may exist in the predrill pore pressure prediction in new prospects and deepwater subsalt wells; therefore, real-time pore pressure detection is highly needed to reduce drilling risks. The methods for pore pressure detection (the resistivity, sonic, and corrected d-exponent methods are improved using the depth-dependent normal compaction equations to adapt to the requirements of the real-time monitoring. A new method is proposed to calculate pore pressure from the connection gas or elevated background gas, which can be used for real-time pore pressure detection. The pore pressure detection using the logging-while-drilling, measurement-while-drilling, and mud logging data is also implemented and evaluated. Abnormal pore pressure indicators from the well logs, mud logs, and wellbore instability events are identified and analyzed to interpret abnormal pore pressures for guiding real-time drilling decisions. The principles for identifying abnormal pressure indicators are proposed to improve real-time pore pressure monitoring.

  8. Logging utilization in Idaho: Current and past trends

    Science.gov (United States)

    Eric A. Simmons; Todd A. Morgan; Erik C. Berg; Stanley J. Zarnoch; Steven W. Hayes; Mike T. Thompson

    2014-01-01

    A study of commercial timber-harvesting activities in Idaho was conducted during 2008 and 2011 to characterize current tree utilization, logging operations, and changes from previous Idaho logging utilization studies. A two-stage simple random sampling design was used to select sites and felled trees for measurement within active logging sites. Thirty-three logging...

  9. Monte Carlo Study on Gas Pressure Response of He-3 Tube in Neutron Porosity Logging

    Directory of Open Access Journals (Sweden)

    TIAN Li-li;ZHANG Feng;WANG Xin-guang;LIU Jun-tao

    2016-10-01

    Full Text Available Thermal neutrons are detected by (n,p reaction of Helium-3 tube in the compensated neutron logging. The helium gas pressure in the counting area influences neutron detection efficiency greatly, and then it is an important parameter for neutron porosity measurement accuracy. The variation law of counting rates of a near detector and a far one with helium gas pressure under different formation condition was simulated by Monte Carlo method. The results showed that with the increasing of helium pressure the counting rate of these detectors increased firstly and then leveled off. In addition, the neutron counting rate ratio and porosity sensitivity increased slightly, the porosity measurement error decreased exponentially, which improved the measurement accuracy. These research results can provide technical support for selecting the type of Helium-3 detector in developing neutron porosity logging.

  10. Neutron characteristic and spectroscopy logging methods and apparatus

    International Nuclear Information System (INIS)

    Antkiw, S.

    1977-01-01

    Earth formations surrounding a well bore are irradiated with pulses of fast neutrons, and gamma rays resulting from the ensuring thermal neutron capture interactions with nuclei of the formations are detected, from which measurements of the thermal neutron decay times characterizing the respective formations are derived. The gamma ray energy spectra of the respective formations are analyzed. Gating of the gamma ray detection periods is automatically controlled, both for the decay time and the spectroscopy functions, in accrdance with the measured values of the decay times. The duration and repetition rate of the neutron pulses are also controlled as a function of the measured decay times to provide an overall optimized decay time-spectroscopy operating cycle. spectroscopy outputs representative of formation lithology, salinity, porosity and shaliness are developed to supplement and improve decay time log interpretation

  11. Estimating two indirect logging costs caused by accelerated erosion.

    Science.gov (United States)

    Glen O. Klock

    1976-01-01

    In forest areas where high soil erosion potential exists, a comparative yarding cost estimate, including the indirect costs determined by methods proposed here, shows that the total cost of using "advanced" logging methods may be less than that of "traditional" systems.

  12. Log-concavity property for some well-known distributions

    Directory of Open Access Journals (Sweden)

    G. R. Mohtashami Borzadaran

    2011-12-01

    Full Text Available Interesting properties and propositions, in many branches of science such as economics have been obtained according to the property of cumulative distribution function of a random variable as a concave function. Caplin and Nalebuff (1988,1989, Bagnoli and Khanna (1989 and Bagnoli and Bergstrom (1989 , 1989, 2005 have discussed the log-concavity property of probability distributions and their applications, especially in economics. Log-concavity concerns twice differentiable real-valued function g whose domain is an interval on extended real line. g as a function is said to be log-concave on the interval (a,b if the function ln(g is a concave function on (a,b. Log-concavity of g on (a,b is equivalent to g'/g being monotone decreasing on (a,b or (ln(g" 6] have obtained log-concavity for distributions such as normal, logistic, extreme-value, exponential, Laplace, Weibull, power function, uniform, gamma, beta, Pareto, log-normal, Student's t, Cauchy and F distributions. We have discussed and introduced the continuous versions of the Pearson family, also found the log-concavity for this family in general cases, and then obtained the log-concavity property for each distribution that is a member of Pearson family. For the Burr family these cases have been calculated, even for each distribution that belongs to Burr family. Also, log-concavity results for distributions such as generalized gamma distributions, Feller-Pareto distributions, generalized Inverse Gaussian distributions and generalized Log-normal distributions have been obtained.

  13. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  14. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  15. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  16. An innovative OSCE clinical log station: a quantitative study of its influence on Log use by medical students

    Directory of Open Access Journals (Sweden)

    Hudson Judith N

    2012-11-01

    Full Text Available Abstract Background A Clinical Log was introduced as part of a medical student learning portfolio, aiming to develop a habit of critical reflection while learning was taking place, and provide feedback to students and the institution on learning progress. It was designed as a longitudinal self-directed structured record of student learning events, with reflection on these for personal and professional development, and actions planned or taken for learning. As incentive was needed to encourage student engagement, an innovative Clinical Log station was introduced in the OSCE, an assessment format with established acceptance at the School. This study questions: How does an OSCE Clinical Log station influence Log use by students? Methods The Log station was introduced into the formative, and subsequent summative, OSCEs with careful attention to student and assessor training, marking rubrics and the standard setting procedure. The scoring process sought evidence of educational use of the log, and an ability to present and reflect on key learning issues in a concise and coherent manner. Results Analysis of the first cohort’s Log use over the four-year course (quantified as number of patient visits entered by all students revealed limited initial use. Usage was stimulated after introduction of the Log station early in third year, with some improvement during the subsequent year-long integrated community-based clerkship. Student reflection, quantified by the mean number of characters in the ‘reflection’ fields per entry, peaked just prior to the final OSCE (mid-Year 4. Following this, very few students continued to enter and reflect on clinical experience using the Log. Conclusion While the current study suggested that we can’t assume students will self-reflect unless such an activity is included in an assessment, ongoing work has focused on building learner and faculty confidence in the value of self-reflection as part of being a competent

  17. Geologic implications of large-scale trends in well-log response, northern Green River Basin, Wyoming

    International Nuclear Information System (INIS)

    Prensky, S.E.

    1986-01-01

    Well-log response in lower Tertiary and Upper Cretaceous rocks in the northern Green River basin, Wyoming, is examined. Digitally recorded well-log data for selected wells located throughout the basin were processed by computer and displayed as highly compressed depth-scale plots for examining large-scale geologic trends. Stratigraphic units, formed under similar depositional conditions, are distinguishable by differing patterns on these plots. In particular, a strong lithologic contrast between Tertiary and underlying Upper Cretaceous non-marine clastic rocks is revealed and correlated through the study area. Laboratory analysis combined with gamma-ray spectrometry log data show that potassium feldspars in the arkosic Tertiary sandstones cause the contrast. The nature and extent of overpressuring has been examined. Data shift on shale conductivity and shale acoustic transit-time plots, previously ascribed to changes in pore pressure, correspond to stratigraphic changes and not necessarily with changes in pore pressure as indicated by drilling-mud weights. Gulf Coast well-log techniques for detecting overpressuring are unreliable and ineffectual in this basin, which has experienced significantly different geologic depositional and tectonic conditions

  18. La competitividad logística en Latinoamérica: índice logístico vs. propuesta metodológica

    Directory of Open Access Journals (Sweden)

    Marco Alberto Valenzo Jiménez

    2016-02-01

    Full Text Available Este artículo muestra la situación actual de la competitividad logística en los países latinoamericanos, tomando como base el informe denominado “Connecting to Compite” (Trade Logistics in the Global Economy, 2007 del Banco Mundial. Este informe muestra el ranking de las posiciones que tienen los países latinoamericanos en materia de logística y en el cual se analizan las variables —aduanas, infraestructura, embarques internacionales, competencia logística, trazabilidad y seguimiento, costos logísticos domésticos y tiempo de entrega— que contiene la metodología utilizada por el Banco Mundial. La plataforma de estudio de este artículo parte del índice de competitividad logística, que, mediante la aplicación de la metodología “Valenzo – Martínez” permite analizar la base de datos de una manera más profunda, y da como resultado una escala de competitividad logística que nos muestra el nivel general de la competitividad logística en Latinoamérica, así como también el nivel de competitividad por variable, para, de esta manera, permitir una fácil interpretación de los resultados.

  19. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  20. The calibration facilities of gamma-ray spectrometer oil logging system

    International Nuclear Information System (INIS)

    Zhao Yunlong; Liu Yuzhang; Duan Wenxian

    1993-08-01

    The construction technology for the calibration facilities of gamma-ray spectrometer oil logging system is introduced. It is referenced to the experience from similar calibration facilities at home and abroad. Facilities consist of 9 models. The effective diameter of each model is 1.5 m and the height is 6 m. Each borehole has U ore zone, Th ore zone, K ore zone, high mixed zone, high mixed thin zone, low mixed zone and barren zone. There are 45 zones in total. Each element model has 6 in, 8.5 in and 12 in of different diameters. The preventing radon migration and complete sealing technology are used for each zone to prevent radon from escaping. The density of models, homogeneity and moisture of radio elements have been measured that gives a complete data for calibration adjusting of the instrument. The sizes of facilities and the concentration of radioactivity are reasonable designed and conformed to the recommendation of IAEA. Parameters are consistent with the parameters of calibration facilities built by Houston University in America. The emanation coefficient of the facilities is lees than 1%. The dry density of filling is 2.12 g/cm 3 and the relative standard deviation is +- 1.9%

  1. Selective logging and its relation to deforestation

    Science.gov (United States)

    Gregory P. Asner; Michael Keller; Marco Lentini; Frank Merry; Souza Jr. Carlos

    2009-01-01

    Selective logging is a major contributor to the social, economic, and ecological dynamics of Brazilian Amazonia. Logging activities have expanded from low-volume floodplain harvests in past centuries to high-volume operations today that take about 25 million m3 of wood from the forest each year. The most common high-impact conventional and often illegal logging...

  2. FLOZ-the computer program for the primary interpretation of nuclear borehole logging

    International Nuclear Information System (INIS)

    Zorski, T.

    1979-01-01

    This work presents the FLOZ program for nuclear well logging data interpretation. Program has been written in FORTRAN 1900 language for ODRA 1300 computers. The description of the program possibilities and the ways of its application are given. Short presentation of the interpretation method used here and the description of the program work with its complete listing, together with the explanatory commentaries are also presented. The type of interpretation performed by the program depends upon the kind of nuclear logging of interest. For neutron-gamma and gamma-gamma logging the program introduces the corrections for the following disturbing factors: the ratemeter time constant, the logging speed, the apparatus dead time, the gamma-ray background. The gamma-ray logging is corrected for the following disturbing factors: ratemeter time constant, the logging speed, the apparatus dead time of tool, borehole radius, gamma-ray absorbtion in the borehole liquid and the finite thickness of the layers. The calibration constant for gamma-ray probe can be introduced for calculations of radioactivity ore grades. The log deflections being the input data for the FLOZ program, are taken from specially prepared magnetic tape. The results of interpretation are written on magnetic tape, according to the X3GY system for the ODRA 1300 computers. The method of interpretation which is applicated in program FLOZ was elaborated by Prof. J.A. Czubek from Institute of Nuclear Physics in Cracow. (author)

  3. Mud Logging; Control geologico en perforaciones petroliferas (Mud Logging)

    Energy Technology Data Exchange (ETDEWEB)

    Pumarega Lafuente, J.C.

    1994-12-31

    Mud Logging is an important activity in the oil field and it is a key job in drilling operations, our duties are the acquisition, collection and interpretation of the geological and engineering data at the wellsite, also inform the client immediately of any significant changes in the well. (Author)

  4. Well logging. Acquisition and applications; Diagraphies. Acquisition et applications

    Energy Technology Data Exchange (ETDEWEB)

    Serra, O.; Serra, L.

    2001-07-01

    This reference book on wire-line and LWD well logging covers all geophysical methods of underground survey in a synthetic, visual and dynamical way. It treats of: the physical principle of well logging measurements, the different types of existing probes, the factors that can influence the measurements, and the applications of these measurements. The following well-logging methods are reviewed: resistivity; electromagnetic wave propagation; magnetic susceptibility and magnetic field; spontaneous potential; nuclear logging: natural gamma radioactivity, density logging, photoelectric index, neutron emission probes, hydrogen index or neutron porosity, neutron induced gamma spectroscopy, neutron relaxation time, NMR; acoustic measurements: sonic logging, seismic profiles; texture, structure and stratigraphy data acquisition; borehole diameter measurement; temperature measurement; wire sampling methods; place and role of well-logging in petroleum exploration; well-logging programs. (J.S.)

  5. Genetic structure and genetic diversity of Swietenia macrophylla in areas subjected to selective logging in Quintana Roo, Mexico

    OpenAIRE

    Alcalá, Raúl Ernesto; Cruz, Silvia De la; Gutiérrez-Granados, Gabriel

    2015-01-01

    The hypothesis that selective logging has a negative effect by altering the genetic parameters of tropical tree species was evaluated. The genetic diversity and genetic structure between adult trees (N = 47) and saplings (N = 50) of Swietenia macrophylla were contrasted within an area subjected to selective logging in the Mayan zone. Although differences in the number of alleles and in their frequencies were detected between both groups, the observed and expected heterozygosity and the coeffi...

  6. Applying Big Data solutions for log analytics in the PanDA infrastructure

    CERN Document Server

    Alekseev, Aleksandr; The ATLAS collaboration

    2017-01-01

    PanDA is the workflow management system of the ATLAS experiment at the LHC and is responsible for generating, brokering and monitoring up to two million jobs per day across 150 computing centers in the Worldwide LHC Computing Grid. The PanDA core consists of several components deployed centrally on around 20 servers. The daily log volume is around 400GB per day. In certain cases, troubleshooting a particular issue on the raw log files can be compared to searching for a needle in a haystack and requires a high level of expertise. Therefore we decided to build on trending Big Data solutions and utilize the ELK infrastructure (Filebeat, Logstash, Elastic Search and Kibana) to process, index and analyze our log files. This allows to overcome troubleshooting complexity, provides a better interface to the operations team and generates advanced analytics to understand our system. This paper will describe the features of the ELK stack, our infrastructure, optimal configuration settings and filters. We will provide ex...

  7. Detecting and classifying method based on similarity matching of Android malware behavior with profile.

    Science.gov (United States)

    Jang, Jae-Wook; Yun, Jaesung; Mohaisen, Aziz; Woo, Jiyoung; Kim, Huy Kang

    2016-01-01

    Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats utilizing static, dynamic, on-device, and off-device techniques. Static techniques are easy to evade, while dynamic techniques are expensive. On-device techniques are evasion, while off-device techniques need being always online. To address some of those shortcomings, we introduce Andro-profiler, a hybrid behavior based analysis and classification system for mobile malware. Andro-profiler main goals are efficiency, scalability, and accuracy. For that, Andro-profiler classifies malware by exploiting the behavior profiling extracted from the integrated system logs including system calls. Andro-profiler executes a malicious application on an emulator in order to generate the integrated system logs, and creates human-readable behavior profiles by analyzing the integrated system logs. By comparing the behavior profile of malicious application with representative behavior profile for each malware family using a weighted similarity matching technique, Andro-profiler detects and classifies it into malware families. The experiment results demonstrate that Andro-profiler is scalable, performs well in detecting and classifying malware with accuracy greater than 98 %, outperforms the existing state-of-the-art work, and is capable of identifying 0-day mobile malware samples.

  8. Mariners Weather Log

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Mariners Weather Log (MWL) is a publication containing articles, news and information about marine weather events and phenomena, worldwide environmental impact...

  9. Automated four-dimensional Monte Carlo workflow using log files and real-time motion monitoring

    DEFF Research Database (Denmark)

    Sibolt, Patrik; Cronholm, R.O.; Heath, E.

    2017-01-01

    been developed in python. The workflow has been tested and verified using an in-house developed dosimetry system comprised of a dynamic thorax phantom constructed for plastic scintillator dosimetry. The workflow is directly compatible with any treatment planning system and can also be triggered...... by the appearance of linac log files. It has minimum user interaction and, with the use of linac log files, it provides a method for verification of the actually delivered dose in the patient geometry....

  10. Pacific Rim log trade: determinants and trends.

    Science.gov (United States)

    Donald F. Flora; Andrea L. Anderson; Wendy J. McGinnls

    1991-01-01

    Pacific Rim trade in softwood logs amounts to about $3 billion annually, of which the U.S. share is about $2 billion. Log exporting is a significant part of the forest economy in the Pacific Northwest. The 10 major Pacific Rim log-trading client and competitor countries differ widely in their roles in trade and in their policies affecting the industry.

  11. SU-C-BRD-03: Analysis of Accelerator Generated Text Logs for Preemptive Maintenance

    International Nuclear Information System (INIS)

    Able, CM; Baydush, AH; Nguyen, C; Munley, MT; Gersh, J; Ndlovu, A; Rebo, I; Booth, J; Perez, M; Sintay, B

    2014-01-01

    Purpose: To develop a model to analyze medical accelerator generated parameter and performance data that will provide an early warning of performance degradation and impending component failure. Methods: A robust 6 MV VMAT quality assurance treatment delivery was used to test the constancy of accelerator performance. The generated text log files were decoded and analyzed using statistical process control (SPC) methodology. The text file data is a single snapshot of energy specific and overall systems parameters. A total of 36 system parameters were monitored which include RF generation, electron gun control, energy control, beam uniformity control, DC voltage generation, and cooling systems. The parameters were analyzed using Individual and Moving Range (I/MR) charts. The chart limits were calculated using a hybrid technique that included the use of the standard 3σ limits and the parameter/system specification. Synthetic errors/changes were introduced to determine the initial effectiveness of I/MR charts in detecting relevant changes in operating parameters. The magnitude of the synthetic errors/changes was based on: the value of 1 standard deviation from the mean operating parameter of 483 TB systems, a small fraction (≤ 5%) of the operating range, or a fraction of the minor fault deviation. Results: There were 34 parameters in which synthetic errors were introduced. There were 2 parameters (radial position steering coil, and positive 24V DC) in which the errors did not exceed the limit of the I/MR chart. The I chart limit was exceeded for all of the remaining parameters (94.2%). The MR chart limit was exceeded in 29 of the 32 parameters (85.3%) in which the I chart limit was exceeded. Conclusion: Statistical process control I/MR evaluation of text log file parameters may be effective in providing an early warning of performance degradation or component failure for digital medical accelerator systems. Research is Supported by Varian Medical Systems, Inc

  12. SU-C-BRD-03: Analysis of Accelerator Generated Text Logs for Preemptive Maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Able, CM; Baydush, AH; Nguyen, C; Munley, MT [Wake Forest School of Medicine, Department of Radiation Oncology, Winston Salem, NC (United States); Gersh, J [Gibbs Cancer Center and Research Institute, Spartenburg Regional Medical Ce, Spartenburg, SC (United States); Ndlovu, A; Rebo, I [John Theuer Cancer Center, Hackensack University Medical Center, Hackensack, NJ (United States); Booth, J; Perez, M [North Sydney Cancer Center, Royal North Shore Hospital, Sydney, St Leonards (Australia); Sintay, B [Cone Health Cancer Center, Greensboro, NC (United States)

    2014-06-15

    Purpose: To develop a model to analyze medical accelerator generated parameter and performance data that will provide an early warning of performance degradation and impending component failure. Methods: A robust 6 MV VMAT quality assurance treatment delivery was used to test the constancy of accelerator performance. The generated text log files were decoded and analyzed using statistical process control (SPC) methodology. The text file data is a single snapshot of energy specific and overall systems parameters. A total of 36 system parameters were monitored which include RF generation, electron gun control, energy control, beam uniformity control, DC voltage generation, and cooling systems. The parameters were analyzed using Individual and Moving Range (I/MR) charts. The chart limits were calculated using a hybrid technique that included the use of the standard 3σ limits and the parameter/system specification. Synthetic errors/changes were introduced to determine the initial effectiveness of I/MR charts in detecting relevant changes in operating parameters. The magnitude of the synthetic errors/changes was based on: the value of 1 standard deviation from the mean operating parameter of 483 TB systems, a small fraction (≤ 5%) of the operating range, or a fraction of the minor fault deviation. Results: There were 34 parameters in which synthetic errors were introduced. There were 2 parameters (radial position steering coil, and positive 24V DC) in which the errors did not exceed the limit of the I/MR chart. The I chart limit was exceeded for all of the remaining parameters (94.2%). The MR chart limit was exceeded in 29 of the 32 parameters (85.3%) in which the I chart limit was exceeded. Conclusion: Statistical process control I/MR evaluation of text log file parameters may be effective in providing an early warning of performance degradation or component failure for digital medical accelerator systems. Research is Supported by Varian Medical Systems, Inc.

  13. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and each smoke detection system on a unit must— (1) Be approved by the Commandant; and (2) Have a visual...

  14. Log and tree sawing times for hardwood mills

    Science.gov (United States)

    Everette D. Rast

    1974-01-01

    Data on 6,850 logs and 1,181 trees were analyzed to predict sawing times. For both logs and trees, regression equations were derived that express (in minutes) sawing time per log or tree and per Mbf. For trees, merchantable height is expressed in number of logs as well as in feet. One of the major uses for the tables of average sawing times is as a bench mark against...

  15. A history of nuclear well logging in the oil industry

    International Nuclear Information System (INIS)

    Tittle, C.W.

    1989-01-01

    Spurred by an interest in logging through steel casing γ-ray logging began in the late 1930s followed soon by neutron logging for porosity. These were the first two nuclear well logs. Gamma-gamma density logging was developed during the 1950s. Pulsed neutron lifetime logging appeared in the 1960s; the slim tools came in the early 1970s. Developments since then have included dual detector devices of several types which offered improved measurements or interpretation, γ-ray spectrometry logging (natural and neutron-induced) which identifies certain chemical elements, induced radioactivity logging, and the photoelectric absorption log, which, combined with the density log in a single tool, is known as litho-density logging. A combination of several γ-ray spectrometers in one tool, designed to determine 10 formation elements, was recently introduced, and a new neutron porosity tool measuring epithermal neutron die-away time has been developed. Digital transmission of logging data was a step forward in about 1975. Also, log interpretation techniques have greatly expanded since the advent of digital computers, and the microcomputer has had a distinct impact. It is now practical and economical to do iterative analysis on a suite of logs to obtain an optimum overall interpretation. (author)

  16. Review of the Czubek--Jonas gamma-log program

    International Nuclear Information System (INIS)

    Matthews, M.

    1978-11-01

    Several gamma-ray logs were computer processed using the Czubek--Jones and DOE's MDDAT gamma-log programs. Both of these programs convert counts per second from the gamma-ray logs to percent eU 3 O 8 . The results of these programs were compared to each other and to the core analysis (percent U 3 O 8 ) of the logged boreholes. The two gamma-log programs produced similar results. The core analysis did not compare favorably with the results of either gamma-log program. This unfavorable comparison is probably due to an incorrect assumption of secular equilibrium for the ore surrounding the boreholes. The Czubek--Jonas program requires a knowledge of the linear attenuation coefficient of the rocks surrounding a borehole. This limits the usefulness of the program because this coefficient is generally not known and varies for different gamma-ray energies. It is recommended that the MDDAT program continue to be used for estimating the grade (percent eU 3 O 8 ) from gamma-log data and not be replaced by the Czubek--Jonas program

  17. Nuclear log interpretation by first principle

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1988-07-01

    A weakness connected to the present interpretation of nuclear borehole logs is that the interdependence of the various logs and physical effects of importance for the tools are not always taken into account in a correct way. Therefore a new approach to the interpretation of nuclear borehole logs is considered. It is based on the logs obtained with the natural gamma, the neutron porosity, the gamma density, and the pulsed neutron tools. For each of these tools a model, taking into account the important physical effects, is established. These models are incorporated into a computer programme which from the tool signals calculates, by use of iteration, a consistent set of the corresponding formation properties. In the paper the models developed for the four tools and the interpretation programme are briefly described. An example of the use of the interpretation programme is given and compared with a conventional interpretation. (author)

  18. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    Directory of Open Access Journals (Sweden)

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  19. 29 CFR 1910.164 - Fire detection systems.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... detection systems. (a) Scope and application. This section applies to all automatic fire detection systems... detection systems and components to normal operating condition as promptly as possible after each test or...

  20. Advanced of X-ray fluorescence logging technique in China

    International Nuclear Information System (INIS)

    Zhou Sichun; Ge Liangquan; Lai Wanchang; Yang Qiang

    2010-01-01

    The paper discuses principle of X-ray fluorescence logging, and introduces advanced of X-ray fluorescence logging technique in China. By 2009, third generation XRF logging instrument has been developed in China, and good logging result has been obtained in Lala copper mine. (authors)

  1. Costs and CO{sub 2} benefits of recovering, refining and transporting logging residues for fossil fuel replacement

    Energy Technology Data Exchange (ETDEWEB)

    Gustavsson, Leif [Ecotechnology, Department of Engineering and Sustainable Development, Mid Sweden University, 83125 Oestersund (Sweden); Linnaeus University, 35195 Vaexjoe (Sweden); Eriksson, Lisa; Sathre, Roger [Ecotechnology, Department of Engineering and Sustainable Development, Mid Sweden University, 83125 Oestersund (Sweden)

    2011-01-15

    There are many possible systems for recovering, refining, and transporting logging residues for use as fuel. Here we analyse costs, primary energy and CO{sub 2} benefits of various systems for using logging residues locally, nationally or internationally. The recovery systems we consider are a bundle system and a traditional chip system in a Nordic context. We also consider various transport modes and distances, refining the residues into pellets, and replacing different fossil fuels. Compressing of bundles entails costs, but the cost of chipping is greatly reduced if chipping is done on a large scale, providing an overall cost-effective system. The bundle system entails greater primary energy use, but its lower dry-matter losses mean that more biomass per hectare can be extracted from the harvest site. Thus, the potential replacement of fossil fuels per hectare of harvest area is greater with the bundle system than with the chip system. The fuel-cycle reduction of CO{sub 2} emissions per harvest area when logging residues replace fossil fuels depends more on the type of fossil fuel replaced, the logging residues recovery system used and the refining of the residues, than on whether the residues are transported to local, national or international end-users. The mode and distance of the transport system has a minor impact on the CO{sub 2} emission balance. (author)

  2. The efficiency calibration and development of environmental correction factors for an in situ high-resolution gamma spectroscopy well logging system

    International Nuclear Information System (INIS)

    Giles, J.R.

    1996-05-01

    A Gamma Spectroscopy Logging System (GSLS) has been developed to study sub-surface radionuclide contamination. Absolute efficiency calibration of the GSLS was performed using simple cylindrical borehole geometry. The calibration source incorporated naturally occurring radioactive material (NORM) that emitted photons ranging from 186-keV to 2,614-keV. More complex borehole geometries were modeled using commercially available shielding software. A linear relationship was found between increasing source thickness and relative photon fluence rates at the detector. Examination of varying porosity and moisture content showed that as porosity increases, relative photon fluence rates increase linearly for all energies. Attenuation effects due to iron, water, PVC, and concrete cylindrical shields were found to agree with previous studies. Regression analyses produced energy-dependent equations for efficiency corrections applicable to spectral gamma-ray well logs collected under non-standard borehole conditions

  3. Rill erosion in burned and salvage logged western montane forests: Effects of logging equipment type, traffic level, and slash treatment

    Science.gov (United States)

    J. W. Wagenbrenner; P. R. Robichaud; R. E. Brown

    2016-01-01

    Following wildfires, forest managers often consider salvage logging burned trees to recover monetary value of timber, reduce fuel loads, or to meet other objectives. Relatively little is known about the cumulative hydrologic effects of wildfire and subsequent timber harvest using logging equipment. We used controlled rill experiments in logged and unlogged (control)...

  4. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  5. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  6. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  7. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  8. The nuclear magnetic resonance well logging

    International Nuclear Information System (INIS)

    Zhang Yumin; Shen Huitang

    2003-01-01

    In this paper, the characteristic of the nuclear magnetic resonance logging is described at first. Then its development and its principle is presented. Compared with the nuclear magnetic resonance spectrometer, the magnet techniques is the first question that we must solve in the manufacture of the NMR well logging

  9. A Measuring System for Well Logging Attitude and a Method of Sensor Calibration

    Directory of Open Access Journals (Sweden)

    Yong Ren

    2014-05-01

    Full Text Available This paper proposes an approach for measuring the azimuth angle and tilt angle of underground drilling tools with a MEMS three-axis accelerometer and a three-axis fluxgate sensor. A mathematical model of well logging attitude angle is deduced based on combining space coordinate transformations and algebraic equations. In addition, a system implementation plan of the inclinometer is given in this paper, which features low cost, small volume and integration. Aiming at the sensor and assembly errors, this paper analyses the sources of errors, and establishes two mathematical models of errors and calculates related parameters to achieve sensor calibration. The results show that this scheme can obtain a stable and high precision azimuth angle and tilt angle of drilling tools, with the deviation of the former less than ±1.4° and the deviation of the latter less than ±0.1°.

  10. A measuring system for well logging attitude and a method of sensor calibration.

    Science.gov (United States)

    Ren, Yong; Wang, Yangdong; Wang, Mijian; Wu, Sheng; Wei, Biao

    2014-05-23

    This paper proposes an approach for measuring the azimuth angle and tilt angle of underground drilling tools with a MEMS three-axis accelerometer and a three-axis fluxgate sensor. A mathematical model of well logging attitude angle is deduced based on combining space coordinate transformations and algebraic equations. In addition, a system implementation plan of the inclinometer is given in this paper, which features low cost, small volume and integration. Aiming at the sensor and assembly errors, this paper analyses the sources of errors, and establishes two mathematical models of errors and calculates related parameters to achieve sensor calibration. The results show that this scheme can obtain a stable and high precision azimuth angle and tilt angle of drilling tools, with the deviation of the former less than ±1.4° and the deviation of the latter less than ±0.1°.

  11. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Latent log-linear models for handwritten digit classification.

    Science.gov (United States)

    Deselaers, Thomas; Gass, Tobias; Heigold, Georg; Ney, Hermann

    2012-06-01

    We present latent log-linear models, an extension of log-linear models incorporating latent variables, and we propose two applications thereof: log-linear mixture models and image deformation-aware log-linear models. The resulting models are fully discriminative, can be trained efficiently, and the model complexity can be controlled. Log-linear mixture models offer additional flexibility within the log-linear modeling framework. Unlike previous approaches, the image deformation-aware model directly considers image deformations and allows for a discriminative training of the deformation parameters. Both are trained using alternating optimization. For certain variants, convergence to a stationary point is guaranteed and, in practice, even variants without this guarantee converge and find models that perform well. We tune the methods on the USPS data set and evaluate on the MNIST data set, demonstrating the generalization capabilities of our proposed models. Our models, although using significantly fewer parameters, are able to obtain competitive results with models proposed in the literature.

  14. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  15. The effect of ultraviolet radiation on water-logging resistance in ...

    African Journals Online (AJOL)

    PRECIOUS

    2009-12-01

    Dec 1, 2009 ... similar defense systems to reduce cellular damages and a phenomenon ... UV-B radiation (280 - 320 nm) was provided by UV-B Lamps. (Beijing Normal .... of the experiment, water-logging led to a decrease of. SOD activity ...

  16. Neutron logging reliability techniques and apparatus

    International Nuclear Information System (INIS)

    Johnstone, C.W.

    1978-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data

  17. Neutron logging reliability techniques and apparatus

    International Nuclear Information System (INIS)

    Johnstone, C.W.

    1974-01-01

    This invention relates in general to neutron logging of earth formations, and in particular, to novel apparatus and procedures for determining the validity, or reliability, of data derived at least in part by logging neutron characteristics of earth formations and, if desired, for affording verifiably accurate indications of such data. (author)

  18. Towards an entropy-based analysis of log variability

    DEFF Research Database (Denmark)

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs

    2017-01-01

    the development of hybrid miners: given a (sub-)log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  19. Towards an Entropy-based Analysis of Log Variability

    DEFF Research Database (Denmark)

    Back, Christoffer Olling; Debois, Søren; Slaats, Tijs

    2018-01-01

    the development of hybrid miners: given a log, can we determine a priori whether the log is best suited for imperative or declarative mining? We propose using the concept of entropy, commonly used in information theory. We consider different measures for entropy that could be applied and show through...... experimentation on both synthetic and real-life logs that these entropy measures do indeed give insights into the complexity of the log and can act as an indicator of which mining paradigm should be used....

  20. Inversion of a lateral log using neural networks

    International Nuclear Information System (INIS)

    Garcia, G.; Whitman, W.W.

    1992-01-01

    In this paper a technique using neural networks is demonstrated for the inversion of a lateral log. The lateral log is simulated by a finite difference method which in turn is used as an input to a backpropagation neural network. An initial guess earth model is generated from the neural network, which is then input to a Marquardt inversion. The neural network reacts to gross and subtle data features in actual logs and produces a response inferred from the knowledge stored in the network during a training process. The neural network inversion of lateral logs is tested on synthetic and field data. Tests using field data resulted in a final earth model whose simulated lateral is in good agreement with the actual log data

  1. Ordinal Log-Linear Models for Contingency Tables

    Directory of Open Access Journals (Sweden)

    Brzezińska Justyna

    2016-12-01

    Full Text Available A log-linear analysis is a method providing a comprehensive scheme to describe the association for categorical variables in a contingency table. The log-linear model specifies how the expected counts depend on the levels of the categorical variables for these cells and provide detailed information on the associations. The aim of this paper is to present theoretical, as well as empirical, aspects of ordinal log-linear models used for contingency tables with ordinal variables. We introduce log-linear models for ordinal variables: linear-by-linear association, row effect model, column effect model and RC Goodman’s model. Algorithm, advantages and disadvantages will be discussed in the paper. An empirical analysis will be conducted with the use of R.

  2. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  3. Long-term responses of rainforest erosional systems at different spatial scales to selective logging and climatic change

    Science.gov (United States)

    Walsh, R. P. D.; Bidin, K.; Blake, W. H.; Chappell, N. A.; Clarke, M. A.; Douglas, I.; Ghazali, R.; Sayer, A. M.; Suhaimi, J.; Tych, W.; Annammala, K. V.

    2011-01-01

    Long-term (21–30 years) erosional responses of rainforest terrain in the Upper Segama catchment, Sabah, to selective logging are assessed at slope, small and large catchment scales. In the 0.44 km2 Baru catchment, slope erosion measurements over 1990–2010 and sediment fingerprinting indicate that sediment sources 21 years after logging in 1989 are mainly road-linked, including fresh landslips and gullying of scars and toe deposits of 1994–1996 landslides. Analysis and modelling of 5–15 min stream-suspended sediment and discharge data demonstrate a reduction in storm-sediment response between 1996 and 2009, but not yet to pre-logging levels. An unmixing model using bed-sediment geochemical data indicates that 49 per cent of the 216 t km−2 a−1 2009 sediment yield comes from 10 per cent of its area affected by road-linked landslides. Fallout 210Pb and 137Cs values from a lateral bench core indicate that sedimentation rates in the 721 km2 Upper Segama catchment less than doubled with initially highly selective, low-slope logging in the 1980s, but rose 7–13 times when steep terrain was logged in 1992–1993 and 1999–2000. The need to keep steeplands under forest is emphasized if landsliding associated with current and predicted rises in extreme rainstorm magnitude-frequency is to be reduced in scale. PMID:22006973

  4. 46 CFR 108.411 - Smoke detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a smoke detection system must be located on the overhead of the compartment protected by the system in a location...

  5. Data Cleaning Methods for Client and Proxy Logs

    NARCIS (Netherlands)

    Weinreich, H.; Obendorf, H.; Herder, E.; Edmonds, A.; Hawkey, K.; Kellar, M.; Turnbull, D.

    2006-01-01

    In this paper we present our experiences with the cleaning of Web client and proxy usage logs, based on a long-term browsing study with 25 participants. A detailed clickstream log, recorded using a Web intermediary, was combined with a second log of user interface actions, which was captured by a

  6. Using Web Server Logs in Evaluating Instructional Web Sites.

    Science.gov (United States)

    Ingram, Albert L.

    2000-01-01

    Web server logs contain a great deal of information about who uses a Web site and how they use it. This article discusses the analysis of Web logs for instructional Web sites; reviews the data stored in most Web server logs; demonstrates what further information can be gleaned from the logs; and discusses analyzing that information for the…

  7. Native Fluorescence Detection Methods, Devices, and Systems for Organic Compounds

    Science.gov (United States)

    Hug, William F. (Inventor); Bhartia, Rohit (Inventor); Reid, Ray D. (Inventor); Lane, Arthur L. (Inventor)

    2018-01-01

    Naphthalene, benzene, toluene, xylene, and other volatile organic compounds VOCs have been identified as serious health hazards. Embodiments of the invention are directed to methods and apparatus for near-real-time in-situ detection and accumulated dose measurement of exposure to naphthalene vapor and other hazardous gaseous VOCs. The methods and apparatus employ excitation of fluorophors native or endogenous to compounds of interest using light sources emitting in the ultraviolet below 300 nm and measurement of native fluorescence emissions in distinct wavebands above the excitation wavelength. The apparatus of some embodiments are cell-phone-sized sensor/dosimeter "badges" to be worn by personnel potentially exposed to hazardous VOCs. The badge sensor of some embodiments provides both real time detection and data logging of exposure to naphthalene or other VOCs of interest from which both instantaneous and accumulated dose can be determined.

  8. Tucker Wireline Open Hole Wireline Logging; FINAL

    International Nuclear Information System (INIS)

    Milliken, M.

    2002-01-01

    The Tucker Wireline unit ran a suite of open hole logs right behind the RMOTC logging contractor for comparison purposes. The tools included Dual Laterolog, Phased Induction, BHC Sonic, and Density-Porosity

  9. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  10. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  11. Testing of a uranium downhole logging system to measure in-situ plutonium concentrations in sediments. [216-Z-1A crib

    Energy Technology Data Exchange (ETDEWEB)

    Kasper, R.B.; Kay, M.A.; Bruns, L.E.; Stokes, J.A.; Steinman, D.K.; Adams, J.

    1980-11-01

    A prototype urainium borehole logging system, developed for uranium exploration, was modified for Pu assay and testing at the site. It uses the delayed fission neutron (DFN) method. It was tested in a retired Pu facility, the 216-Z-1A Crib. General agreement between laboratory determined Pu concentrations in sediment samples and neutron flux measurements was found for the relative distribution with depth.

  12. Experience in well logging study of Eocene deposits at the territory of Central and West Azerbaijan

    International Nuclear Information System (INIS)

    Shilov, G.Ya.; Makhmudova, V.M.; Agabekova, L.A.

    1989-01-01

    Experience of investigation of Eocene deposits in Azerbaijan by well-logging methods (WLM), including gamma-logging (GL), neutron gamma-logging (NGL), gamma-gamma logging (GGL), is generalized. Clay rocks are characterized by the maximal NGL and GL values, tuff sandstones - by the average NGL values. NGL and GGL data are used to determine porosity of strata. Complex interpretation of WLM data enables to obtain reliable evaluations of lithology, porosity and oil saturation of Eocene rocks. Algorithm of quantitative interpretation of WLM materials is suggested. Efficiency of WLM interpretation was equal to 95 %. Since the suggested algorithm is formalized completely, it can be realized in systems of complex WLM interpretation by computer

  13. Neutron--neutron logging

    International Nuclear Information System (INIS)

    Allen, L.S.

    1977-01-01

    A borehole logging tool includes a steady-state source of fast neutrons, two epithermal neutron detectors, and two thermal neutron detectors. A count rate meter is connected to each neutron detector. A first ratio detector provides an indication of the porosity of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two epithermal neutron detectors. A second ratio detector provides an indication of both porosity and macroscopic absorption cross section of the formation surrounding the borehole by determining the ratio of the outputs of the two count rate meters connected to the two thermal neutron detectors. By comparing the signals of the two ratio detectors, oil bearing zones and salt water bearing zones within the formation being logged can be distinguished and the amount of oil saturation can be determined. 6 claims, 2 figures

  14. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  15. Synthetic rope applications in Appalachian logging

    Science.gov (United States)

    Ben D. Spong; Jingxin Wang

    2008-01-01

    New ultra-high molecular weight polyethylene rope has shown good results as a replacement for wire rope in logging applications in the western United States. A single case study trial was performed in Appalachian forest conditions to assess the appropriateness of this technology for hardwood logging applications. The study focused on use of the rope in West Virginia...

  16. A survey of animal-powered logging in Alabama

    Science.gov (United States)

    Christopher W. Toms; Mark R. Dubois; John C. Bliss; John H. Wilhoit; Robert B. Rummer

    2001-01-01

    In a state with a very large, highly mechanized timber harvesting industry, animal-powered logging still occupies a niche in Alabama as a small-scale harvesting alternative. This article summarizes the results from a study that examined the extent of animal logging in Alabama. We investigated this topic by asking who is logging with animals, where are they working,...

  17. Sediment transport and soil disturbance after postfire logging.

    Science.gov (United States)

    James D. McIver

    2003-01-01

    Recently there has been considerable debate on the practice of postfire logging, in which burned forests are entered soon after fire to recover commercially valuable trees. Proponents of the practice argue that postfire logging is part of a 'restoration package' that can be used to control erosion (e.g., contour logging) and can help to mitigate costs of...

  18. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  19. Root layering in a tropical forest after logging (Central Vietnam

    Directory of Open Access Journals (Sweden)

    Zdeněk Čermák

    2012-01-01

    Full Text Available Indigenous stands of tropical rain forests in the region of Kon Ha Nung are one of the most preserved forests in the whole Vietnam. Despite the logging activities mainly in the 1970’s, it was possible to preserve intact forests free from any primary harvesting. In the past, other stands were influenced by the logging to various extent. Some of those stands are managed presently; others were left to natural development. This paper deals with the influence of harvesting activities on the root system in forest stands. In primary stands and in stands with known harvest intensity, samples of root systems were collected. The total weight of dry basis and mainly their layering within the soil profile were assessed. The collected roots were divided into three classes: class I – ≤ 1.0 mm, class II 1.1–5.0 mm, class III – over 5.0 mm in the diameter. In the monitored plots, the total weight of dry basis of fine roots to 1.0 mm ranged from 2.34–3.24 t∙ha−1. The weight of dry basis of roots from 1.0–5.0 mm ranged from 6.57–9.69 t∙ha−1. The majority of roots of class I is presented in the top 10.0 cm of the soil and their share drops with the increasing depth. The roots of class II are distributed more equally. It was impossible to prove the influence of the logging on the root system.

  20. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  1. Use of pulsed neutron-neutron logging, thermal neutron-neutron logging, and gamma logging methods in classification for sand-clay sediments of Lower Cretaceous in Prikumsk oil-and-gas region according to filtration-capacitance characteristics

    International Nuclear Information System (INIS)

    Maksimenko, A.N.; Basin, Ya.N.; Novgorodov, V.A.

    1974-01-01

    To isolate reservoirs, the formation and deformation penetration zone parameters are used. They are estimated according to the false oil saturation factor and the time of the penetration zone deformation which are determined from the complex exploration of cased wells using the pulse neutron logging, thermal neutron-neutron logging and gamma logging techniques

  2. Normalization of test and evaluation of biothreat detection systems: overcoming microbial air content fluctuations by using a standardized reagent bacterial mixture.

    Science.gov (United States)

    Berchebru, Laurent; Rameil, Pascal; Gaudin, Jean-Christophe; Gausson, Sabrina; Larigauderie, Guilhem; Pujol, Céline; Morel, Yannick; Ramisse, Vincent

    2014-10-01

    Test and evaluation of engineered biothreat agent detection systems ("biodetectors") are a challenging task for government agencies and industries involved in biosecurity and biodefense programs. In addition to user friendly features, biodetectors need to perform both highly sensitive and specific detection, and must not produce excessive false alerts. In fact, the atmosphere displays a number of variables such as airborne bacterial content that can interfere with the detection process, thus impeding comparative tests when carried out at different times or places. To overcome these bacterial air content fluctuations, a standardized reagent bacterial mixture (SRBM), consisting in a collection of selected cultivable environmental species that are prevalent in temperate climate bioaerosols, was designed to generate a stable, reproducible, and easy to use surrogate of bioaerosol sample. The rationale, design, and production process are reported. The results showed that 8.59; CI 95%: 8.46-8.72 log cfu distributed into vials underwent a 0.95; CI 95%: 0.65-1.26 log viability decay after dehydration and subsequent reconstitution, thus advantageously mimicking a natural bioaerosol sample which is typically composed of cultivable and uncultivable particles. Dehydrated SRBM was stable for more than 12months at 4°C and allowed the reconstitution of a dead/live cells aqueous suspension that is stable for 96h at +4°C, according to plate counts. Specific detection of a simulating biothreat agent (e.g. Bacillus atrophaeus) by immuno-magnetic or PCR assays did not display any significant loss of sensitivity, false negative or positive results in the presence of SRBM. This work provides guidance on testing and evaluating detection devices, and may contribute to the establishment of suitable standards and normalized procedures. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. Supply of Rubber Wood Log in Malaysia

    OpenAIRE

    Noraida, A. W.; Abdul-Rahim, A. S.

    2014-01-01

    Issue on shortage of raw material for wood processing solved by discovery of rubber wood log as one of the substitutes the natural log. This paper examines the supply of rubber wood log in Malaysia. We employ ARDL Bound Approach Test and time series data from 1980 to 2010 which represented the whole Malaysia are used to achieve the established objectives. The result shown, in the long run harvested area and wages have 1% and 10% significant level respectively. While in the short run, there wa...

  4. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  5. Screening efficacy of a simplified logMAR chart

    Directory of Open Access Journals (Sweden)

    Naganathan Muthuramalingam

    2016-04-01

    Aim: This study evaluates the efficacy of a simplified logMAR chart, designed for VA testing over the conventional Snellen chart, in a school-based vision-screening programme. Methods: We designed a simplified logMAR chart by employing the principles of the Early Treatment Diabetic Retinopathy Study (ETDRS chart in terms of logarithmic letter size progression, inter-letter spacing, and inter-line spacing. Once the simplified logMAR chart was validated by students in the Elite school vision-screening programme, we set out to test the chart in 88 primary and middle schools in the Tiruporur block of Kancheepuram district in Tamil Nadu. One school teacher in each school was trained to screen a cross-sectional population of 10 354 primary and secondary school children (girls: 5488; boys: 4866 for VA deficits using a new, simplified logMAR algorithm. An experienced paediatric optometrist was recruited to validate the screening methods and technique used by the teachers to collect the data. Results: The optometrist screened a subset of 1300 school children from the total sample. The optometrist provided the professional insights needed to validate the clinical efficacy of the simplified logMAR algorithm and verified the reliability of the data collected by the teachers. The mean age of children sampled for validation was 8.6 years (range: 9–14 years. The sensitivity and the specificity of the simplified logMAR chart when compared to the standard logMAR chart were found to be 95% and 98%, respectively. Kappa value was 0.97. Sensitivity of the teachers’ screening was 66.63% (95% confidence interval [CI]: 52.73–77.02 and the specificity was 98.33% (95% CI: 97.49–98.95. Testing of VA was done under substandard illumination levels in 87% of the population. A total of 10 354 children were screened, 425 of whom were found to have some form of visual and/or ocular defect that was identified by the teacher or optometrist. Conclusion: The simplified logMAR testing algorithm

  6. Borehole Logging for Uranium by Gamma-Ray Spectrometry

    DEFF Research Database (Denmark)

    Løvborg, Leif; Nyegaard, P.; Christiansen, E. M.

    1980-01-01

    The resources in a large syngenetic deposit of low-grade uranium (U) ore with thorium at Kvanefjeld, South Greenland, were evaluated by spectrometric gamma-ray logging of 23 boreholes, 46 mm in diameter and 200 m deep. The borehole probe's detector contained 22 cm3 of sodium-iodide, and the photo......The resources in a large syngenetic deposit of low-grade uranium (U) ore with thorium at Kvanefjeld, South Greenland, were evaluated by spectrometric gamma-ray logging of 23 boreholes, 46 mm in diameter and 200 m deep. The borehole probe's detector contained 22 cm3 of sodium...... of the spectrometer system were determined by calculating the average number of U and thorium (Th) counts per meter of borehole and comparing these with the U-Th concentrations in 1-m sections of analyzed drill core. The sensitivity and the background count rate in the uranium window varied appreciably from one hole...

  7. Correlation between rotary drill performance parameters and borehole geophysical logging

    International Nuclear Information System (INIS)

    Scoble, M.J.; Peck, J.; Hendricks, C.

    1989-01-01

    There is a growing interest in developing performance monitoring techniques for both surface and underground mining equipment used in excavating, loading and transport systems. Research into the techniques and applications for monitoring drilling machinery including gamma and neutron logging, is reviewed. 17 refs.; 5 figs

  8. National logging program for the National Uranium Resource Evaluation. Final report

    International Nuclear Information System (INIS)

    The Mineral Engineering Division (MED) of High Life Helicopters, Inc., operated from May, 1979, through August, 1981, as a subcontractor to the Department of Energy (DOE) to acquire downhole geophysical log information in support of the National Uranium Resource Evaluation program (NURE). MED acquired downhole geophysical log information in 26 1 0 x 2 0 NTMS quadrangles in Colorado, Montana, Nebraska, North Dakota, South Dakota, and Wyoming. MED obtained the log information by gaining permission to log oil and gas wells, water wells, and coal exploration holes. Actual geophysical logging was subcontracted to Century Geophysical Corporation. After logging of each well and completed, MED submitted the log information and other pertinent data to Bendix Field Engineering Corporation (BFEC) for evaluation. MED collected over 700,000 feet of geophysical logs. Additionally, MED conducted a search of log libraries for existing log data for twelve of the quadrangles included in the program. It should be noted that ERTEC, Inc. conducted geophysical logging and a log library search to five quadrangles in Wyoming. These areas were later assigned to MED. The location of all wells logged by MED and ERTEC and the location of other log data is shown on the enclosed maps. Detailed information that pertains to each well is provided following each map

  9. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  10. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  11. Data processing and case identification in an agricultural and logging morbidity surveillance study: Trends over time.

    Science.gov (United States)

    Scott, Erika; Bell, Erin; Krupa, Nicole; Hirabayashi, Liane; Jenkins, Paul

    2017-09-01

    Agriculture and logging are dangerous industries, and though data on fatal injury exists, less is known about non-fatal injury. Establishing a non-fatal injury surveillance system is a top priority. Pre-hospital care reports and hospitalization data were explored as a low-cost option for ongoing surveillance of occupational injury. Using pre-hospital care report free-text and location codes, along with hospital ICD-9-CM external cause of injury codes, we created a surveillance system that tracked farm and logging injuries. In Maine and New Hampshire, 1585 injury events were identified (2008-2010). The incidence of injuries was 12.4/1000 for agricultural workers, compared to 10.4/1000 to 12.2/1000 for logging workers. These estimates are consistent with other recent estimates. This system is limited to traumatic injury for which medical treatment is administered, and is limited by the accuracy of coding and spelling. This system has the potential to be both sustainable and low cost. © 2017 Wiley Periodicals, Inc.

  12. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  13. Effects of reduced-impact logging on fish assemblages in central Amazonia.

    Science.gov (United States)

    Dias, Murilo S; Magnusson, William E; Zuanon, Jansen

    2010-02-01

    In Amazonia reduced-impact logging, which is meant to reduce environmental disturbance by controlling stem-fall directions and minimizing construction of access roads, has been applied to large areas containing thousands of streams. We investigated the effects of reduced-impact logging on environmental variables and the composition of fish in forest streams in a commercial logging concession in central Amazonia, Amazonas State, Brazil. To evaluate short-term effects, we sampled 11 streams before and after logging in one harvest area. We evaluated medium-term effects by comparing streams in 11 harvest areas logged 1-8 years before the study with control streams in adjacent areas. Each sampling unit was a 50-m stream section. The tetras Pyrrhulina brevis and Hemigrammus cf. pretoensis had higher abundances in plots logged > or =3 years before compared with plots logged fish composition did not differ two months before and immediately after reduced-impact logging. Temperature and pH varied before and after logging, but those differences were compatible with normal seasonal variation. In the medium term, temperature and cover of logs were lower in logged plots. Differences in ordination scores on the basis of relative fish abundance between streams in control and logged areas changed with time since logging, mainly because some common species increased in abundance after logging. There was no evidence of species loss from the logging concession, but differences in log cover and ordination scores derived from relative abundance of fish species persisted even after 8 years. For Amazonian streams, reduced-impact logging appears to be a viable alternative to clear-cut practices, which severely affect aquatic communities. Nevertheless, detailed studies are necessary to evaluated subtle long-term effects.

  14. Kajian Pendekatan Binary Log dalam Change Data Capture

    Directory of Open Access Journals (Sweden)

    Muhammad Febrian Rachmadhan Amri

    2017-08-01

    Full Text Available The online business era causes the form of transactions to occur so quickly that the information stored in the data warehouse becomes invalid. Companies are required to have a strong system, which is a system that is real time in order to be able to perform data loading into the media repository that resides on different hosts in the near-real time. Data Warehouse is used as a media repository of data that has the nature of subject-oriented, integrated, time-variant, and is fixed. Data Warehouse can be built into real time management with the advantages possessed and utilize Change Data Capture. Change Data Capture (CDC is a technique that can be used as problem solution to build real time data warehousing (RTDW. The binary log approach in change data capture is made to record any data manipulation activity that occurs at the OLTP level and is managed back before being stored into the Data Warehouse (loading process. This can improve the quality of data management so that the creation of the right information, because the information available is always updated. Testing shows that Binary Log approach in Change Data Capture (BinlogCDC is able to generate real time data management, valid current information, dynamic communication between systems, and data management without losing any information from data manipulation.

  15. Logging methods and peeling of Aspen

    Science.gov (United States)

    T. Schantz-Hansen

    1948-01-01

    The logging of forest products is influenced by many factors, including the size of the trees, density of the stand, the soundness of the trees, size of the area logged, topography and soil, weather conditions, the degree of utilization, the skill of the logger and the equipment used, the distance from market, etc. Each of these factors influences not only the method...

  16. Construction and validation of a Tamil logMAR chart.

    Science.gov (United States)

    Varadharajan, Srinivasa; Srinivasan, Krithica; Kumaresan, Brindha

    2009-09-01

    To design, construct and validate a new Tamil logMAR visual acuity chart based on current recommendations. Ten Tamil letters of equal legibility were identified experimentally and were used in the chart. Two charts, one internally illuminated and one externally illuminated, were constructed for testing at 4 m distance. The repeatability of the two charts was tested. For validation, the two charts were compared with a standard English logMAR chart (ETDRS). When compared to the ETDRS chart, a difference of 0.06 +/- 0.07 and 0.07 +/- 0.07 logMAR was found for the internally and externally illuminated charts respectively. Limits of agreement between the internally illuminated Tamil logMAR chart and ETDRS chart were found to be (-0.08, 0.19), and (-0.07, 0.20) for the externally illuminated chart. The test - retest results showed a difference of 0.02 +/- 0.04 and 0.02 +/- 0.06 logMAR for the internally and externally illuminated charts respectively. Limits of agreement for repeated measurements for the internally illuminated Tamil logMAR chart were found to be (-0.06, 0.10), and (-0.10, 0.14) for the externally illuminated chart. The newly constructed Tamil logMAR charts have good repeatability. The difference in visual acuity scores between the newly constructed Tamil logMAR chart and the standard English logMAR chart was within acceptable limits. This new chart can be used for measuring visual acuity in the literate Tamil population.

  17. Fast and objective detection and analysis of structures in downhole images

    Science.gov (United States)

    Wedge, Daniel; Holden, Eun-Jung; Dentith, Mike; Spadaccini, Nick

    2017-09-01

    Downhole acoustic and optical televiewer images, and formation microimager (FMI) logs are important datasets for structural and geotechnical analyses for the mineral and petroleum industries. Within these data, dipping planar structures appear as sinusoids, often in incomplete form and in abundance. Their detection is a labour intensive and hence expensive task and as such is a significant bottleneck in data processing as companies may have hundreds of kilometres of logs to process each year. We present an image analysis system that harnesses the power of automated image analysis and provides an interactive user interface to support the analysis of televiewer images by users with different objectives. Our algorithm rapidly produces repeatable, objective results. We have embedded it in an interactive workflow to complement geologists' intuition and experience in interpreting data to improve efficiency and assist, rather than replace the geologist. The main contributions include a new image quality assessment technique for highlighting image areas most suited to automated structure detection and for detecting boundaries of geological zones, and a novel sinusoid detection algorithm for detecting and selecting sinusoids with given confidence levels. Further tools are provided to perform rapid analysis of and further detection of structures e.g. as limited to specific orientations.

  18. Quantitative calculation of GOR of complex oil-gas-water systems with logging data: A case study of the Yingdong Oil/Gas Field in the Qaidam Basin

    Directory of Open Access Journals (Sweden)

    Sima Liqiang

    2014-12-01

    Full Text Available In the Yingdong Oil/Gas Field of the Qaidam Basin, multiple suites of oil-gas-water systems overlie each other vertically, making it difficult to accurately identify oil layers from gas layers and calculate gas-oil ratio (GOR. Therefore, formation testing and production data, together with conventional logging, NMR and mud logging data were integrated to quantitatively calculate GOR. To tell oil layers from gas layers, conventional logging makes use of the excavation effect of compensated neutron log, NMR makes use of the different relaxation mechanisms of light oil and natural gas in large pores, while mud logging makes use of star chart of gas components established based on available charts and mathematical statistics. In terms of the quantitative calculation of GOR, the area ratio of the star chart of gas components was first used in GOR calculation. The study shows that: (1 conventional logging data has a modest performance in distinguishing oil layers from gas layers due to the impacts of formation pressure, hydrogen index (HI, shale content, borehole conditions and invasion of drilling mud; (2 NMR is quite effective in telling oil layers from gas layers, but cannot be widely used due to its high cost; (3 by contrast, the star chart of gas components is the most effective in differentiating oil layers from gas layers; and (4 the GOR calculated by using the area ratio of star chart has been verified by various data such as formation testing data, production data and liquid production profile.

  19. Cased-hole log analysis and reservoir performance monitoring

    CERN Document Server

    Bateman, Richard M

    2015-01-01

    This book addresses vital issues, such as the evaluation of shale gas reservoirs and their production. Topics include the cased-hole logging environment, reservoir fluid properties; flow regimes; temperature, noise, cement bond, and pulsed neutron logging; and casing inspection. Production logging charts and tables are included in the appendices. The work serves as a comprehensive reference for production engineers with upstream E&P companies, well logging service company employees, university students, and petroleum industry training professionals. This book also: ·       Provides methods of conveying production logging tools along horizontal well segments as well as measurements of formation electrical resistivity through casing ·       Covers new information on fluid flow characteristics in inclined pipe and provides new and improved nuclear tool measurements in cased wells ·       Includes updates on cased-hole wireline formation testing  

  20. Log-concave Probability Distributions: Theory and Statistical Testing

    DEFF Research Database (Denmark)

    An, Mark Yuing

    1996-01-01

    This paper studies the broad class of log-concave probability distributions that arise in economics of uncertainty and information. For univariate, continuous, and log-concave random variables we prove useful properties without imposing the differentiability of density functions. Discrete...... and multivariate distributions are also discussed. We propose simple non-parametric testing procedures for log-concavity. The test statistics are constructed to test one of the two implicati ons of log-concavity: increasing hazard rates and new-is-better-than-used (NBU) property. The test for increasing hazard...... rates are based on normalized spacing of the sample order statistics. The tests for NBU property fall into the category of Hoeffding's U-statistics...

  1. Inertial Navigation System/Doppler Velocity Log (INS/DVL Fusion with Partial DVL Measurements

    Directory of Open Access Journals (Sweden)

    Asaf Tal

    2017-02-01

    Full Text Available The Technion autonomous underwater vehicle (TAUV is an ongoing project aiming to develop and produce a small AUV to carry on research missions, including payload dropping, and to demonstrate acoustic communication. Its navigation system is based on an inertial navigation system (INS aided by a Doppler velocity log (DVL, magnetometer, and pressure sensor (PS. In many INSs, such as the one used in TAUV, only the velocity vector (provided by the DVL can be used for aiding the INS, i.e., enabling only a loosely coupled integration approach. In cases of partial DVL measurements, such as failure to maintain bottom lock, the DVL cannot estimate the vehicle velocity. Thus, in partial DVL situations no velocity data can be integrated into the TAUV INS, and as a result its navigation solution will drift in time. To circumvent that problem, we propose a DVL-based vehicle velocity solution using the measured partial raw data of the DVL and additional information, thereby deriving an extended loosely coupled (ELC approach. The implementation of the ELC approach requires only software modification. In addition, we present the TAUV six degrees of freedom (6DOF simulation that includes all functional subsystems. Using this simulation, the proposed approach is evaluated and the benefit of using it is shown.

  2. Detection of anomalous events

    Science.gov (United States)

    Ferragut, Erik M.; Laska, Jason A.; Bridges, Robert A.

    2016-06-07

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can include a plurality of anomaly detectors that together implement an algorithm to identify low-probability events and detect atypical traffic patterns. The anomaly detector provides for comparability of disparate sources of data (e.g., network flow data and firewall logs.) Additionally, the anomaly detector allows for regulatability, meaning that the algorithm can be user configurable to adjust a number of false alerts. The anomaly detector can be used for a variety of probability density functions, including normal Gaussian distributions, irregular distributions, as well as functions associated with continuous or discrete variables.

  3. Stand structure, composition and illegal logging in selectively logged production forests of Myanmar: Comparison of two compartments subject to different cutting frequency

    Directory of Open Access Journals (Sweden)

    Tual Cin Khai

    2016-07-01

    Full Text Available Appropriate cutting cycles and annual allowable cuts are crucial to ensure sustainability of tropical selective logging, but there have been limited field data to verify long-term effects of different cutting cycles. This study reveals some evidence of forest degradation in selectively logged production forests of Myanmar, which are subject to inappropriate cutting frequency. We compared stand structure, commercial species composition, and incidence of illegal logging between two compartments with low (LCF; 1 time and high (HCF; 5 times cutting frequency over a recent 18 years. Prior to the latest cutting, LCF had 176 trees ha−1 with an inverted-J shape distribution of diameter at breast height (DBH, including a substantial amount of teak (Tectona grandis and other commercially important species in each DBH class. HCF prior to the latest cut had only 41 trees ha−1 without many commercially important species. At HCF, nearly half the standing trees of various species and size were illegally cut following legal operations; this was for charcoal making in nearby kilns. At LCF, two species, teak and Xylia xylocarpa, were cut illegally and sawn for timber on the spot. More extensive and systematic surveys are needed to generalize the findings of forest degradation and illegal logging. However, our study calls for urgent reconsideration of logging practices with high cutting frequency, which can greatly degrade forests with accompanying illegal logging, and for rehabilitating strongly degraded, bamboo-dominated forests. To reduce illegal logging, it would be important to pay more attention on a MSS regulation stating that logging roads should be destroyed after logging operations.

  4. Western tight gas sands advanced logging workshop proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Jennings, J B; Carroll, Jr, H B [eds.

    1982-04-01

    An advanced logging research program is one major aspect of the Western Tight Sands Program. Purpose of this workshop is to help BETC define critical logging needs for tight gas sands and to allow free interchange of ideas on all aspects of the current logging research program. Sixteen papers and abstracts are included together with discussions. Separate abstracts have been prepared for the 12 papers. (DLC)

  5. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  6. Specific features of well logging of boreholes drilled on electrical nonconducting solutions

    International Nuclear Information System (INIS)

    Ruchkin, A.F.; Fomenko, V.G.

    1978-01-01

    Methods for identification of permeable strata and determination of their porosity and oil-gas saturation using standard combination of geophysical investigations in the boreholes drilled with nonaqueous and inert drilling fluids are considered. Geophysical combination consists of the methods indications of which are independent on electrical conductivity of drilling fluids. They are all modifications of radioactivity logging (gamma logging, neutron logging, neutron-gamma logging, gamma-gamma logging, pulsed neutron logging, nuclear-magnetic logging), acoustic logging and thermal logging

  7. Parallel compression of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-10-25

    Techniques are provided for parallel compression of data chunks being written to a shared object. A client executing on a compute node or a burst buffer node in a parallel computing system stores a data chunk generated by the parallel computing system to a shared data object on a storage node by compressing the data chunk; and providing the data compressed data chunk to the storage node that stores the shared object. The client and storage node may employ Log-Structured File techniques. The compressed data chunk can be de-compressed by the client when the data chunk is read. A storage node stores a data chunk as part of a shared object by receiving a compressed version of the data chunk from a compute node; and storing the compressed version of the data chunk to the shared data object on the storage node.

  8. Web application for recording learners’ mouse trajectories and retrieving their study logs for data analysis

    Directory of Open Access Journals (Sweden)

    Yoshinori Miyazaki

    2012-03-01

    Full Text Available With the accelerated implementation of e-learning systems in educational institutions, it has become possible to record learners’ study logs in recent years. It must be admitted that little research has been conducted upon the analysis of the study logs that are obtained. In addition, there is no software that traces the mouse movements of learners during their learning processes, which the authors believe would enable teachers to better understand their students’ behaviors. The objective of this study is to develop a Web application that records students’ study logs, including their mouse trajectories, and to devise an IR tool that can summarize such diversified data. The results of an experiment are also scrutinized to provide an analysis of the relationship between learners’ activities and their study logs.

  9. Water saturation in shaly sands: logging parameters from log-derived values

    International Nuclear Information System (INIS)

    Miyairi, M.; Itoh, T.; Okabe, F.

    1976-01-01

    The methods are presented for determining the relation of porosity to formation factor and that of true resistivity of formation to water saturation, which were investigated through the log interpretation of one of the oil and gas fields of northern Japan Sea. The values of the coefficients ''a'' and ''m'' in porosity-formation factor relation are derived from cross-plot of porosity and resistivity of formation corrected by clay content. The saturation exponent ''n'' is determined from cross-plot of porosity and resistivity index on the assumption that the product of porosity and irreducible water saturation is constant. The relation of porosity to irreducible water saturation is also investigated from core analysis. The new logging parameters determined from the methods, a = 1, m = 2, n = 1.4, improved the values of water saturation by 6 percent in average, and made it easy to distinguish the points which belong to the productive zone and ones belonging to the nonproductive zone

  10. Geophysical log database for the Floridan aquifer system and southeastern Coastal Plain aquifer system in Florida and parts of Georgia, Alabama, and South Carolina

    Science.gov (United States)

    Williams, Lester J.; Raines, Jessica E.; Lanning, Amanda E.

    2013-04-04

    A database of borehole geophysical logs and other types of data files were compiled as part of ongoing studies of water availability and assessment of brackish- and saline-water resources. The database contains 4,883 logs from 1,248 wells in Florida, Georgia, Alabama, South Carolina, and from a limited number of offshore wells of the eastern Gulf of Mexico and the Atlantic Ocean. The logs can be accessed through a download directory organized by state and county for onshore wells and in a single directory for the offshore wells. A flat file database is provided that lists the wells, their coordinates, and the file listings.

  11. Use of pulsed neutron logging to evaluate perforation washing

    International Nuclear Information System (INIS)

    Dimon, C.A.

    1986-01-01

    This invention relates to the use of pulsed neutron logging techniques before and after perforation washing operations are performed to evaluate the degree of success of the perforation washing operations. Well logging operations of a type designed to respond to the difference between a formation immediately behind the well sheath and voids in the formation are performed both before and after the perforation washing operation. differences between the two resulting logs are then indicative of voids created by perforation washing. In a preferred embodiment, pulsed neutron logging is used as the logging technique, while a weighted brine having a high absorption cross section to pulsed neutrons is used as the perforation washing fluid

  12. Using ‘search transitions’ to study searchers investment of effort: experiences with client and server side logging

    OpenAIRE

    Pharo, Nils; Nordlie, Ragnar

    2013-01-01

    We are investigating the value of using the concept ‘search transition’ for studying effort invested in information search processes. In this paper we present findings from a comparative study of data collected from client and server side loggings. The purpose is to see what factors of effort can be captured from the two logging methods. The data stems from studies of searchers interaction with an XML information retrieval system. The searchers interaction was simultaneously logged by a scree...

  13. Nut Production in Bertholletia excelsa across a Logged Forest Mosaic: Implications for Multiple Forest Use

    Science.gov (United States)

    Rockwell, Cara A.; Guariguata, Manuel R.; Menton, Mary; Arroyo Quispe, Eriks; Quaedvlieg, Julia; Warren-Thomas, Eleanor; Fernandez Silva, Harol; Jurado Rojas, Edwin Eduardo; Kohagura Arrunátegui, José Andrés Hideki; Meza Vega, Luis Alberto; Revilla Vera, Olivia; Valera Tito, Jonatan Frank; Villarroel Panduro, Betxy Tabita; Yucra Salas, Juan José

    2015-01-01

    Although many examples of multiple-use forest management may be found in tropical smallholder systems, few studies provide empirical support for the integration of selective timber harvesting with non-timber forest product (NTFP) extraction. Brazil nut (Bertholletia excelsa, Lecythidaceae) is one of the world’s most economically-important NTFP species extracted almost entirely from natural forests across the Amazon Basin. An obligate out-crosser, Brazil nut flowers are pollinated by large-bodied bees, a process resulting in a hard round fruit that takes up to 14 months to mature. As many smallholders turn to the financial security provided by timber, Brazil nut fruits are increasingly being harvested in logged forests. We tested the influence of tree and stand-level covariates (distance to nearest cut stump and local logging intensity) on total nut production at the individual tree level in five recently logged Brazil nut concessions covering about 4000 ha of forest in Madre de Dios, Peru. Our field team accompanied Brazil nut harvesters during the traditional harvest period (January-April 2012 and January-April 2013) in order to collect data on fruit production. Three hundred and ninety-nine (approximately 80%) of the 499 trees included in this study were at least 100 m from the nearest cut stump, suggesting that concessionaires avoid logging near adult Brazil nut trees. Yet even for those trees on the edge of logging gaps, distance to nearest cut stump and local logging intensity did not have a statistically significant influence on Brazil nut production at the applied logging intensities (typically 1–2 timber trees removed per ha). In one concession where at least 4 trees ha-1 were removed, however, the logging intensity covariate resulted in a marginally significant (0.09) P value, highlighting a potential risk for a drop in nut production at higher intensities. While we do not suggest that logging activities should be completely avoided in Brazil nut rich

  14. Nut Production in Bertholletia excelsa across a Logged Forest Mosaic: Implications for Multiple Forest Use.

    Directory of Open Access Journals (Sweden)

    Cara A Rockwell

    Full Text Available Although many examples of multiple-use forest management may be found in tropical smallholder systems, few studies provide empirical support for the integration of selective timber harvesting with non-timber forest product (NTFP extraction. Brazil nut (Bertholletia excelsa, Lecythidaceae is one of the world's most economically-important NTFP species extracted almost entirely from natural forests across the Amazon Basin. An obligate out-crosser, Brazil nut flowers are pollinated by large-bodied bees, a process resulting in a hard round fruit that takes up to 14 months to mature. As many smallholders turn to the financial security provided by timber, Brazil nut fruits are increasingly being harvested in logged forests. We tested the influence of tree and stand-level covariates (distance to nearest cut stump and local logging intensity on total nut production at the individual tree level in five recently logged Brazil nut concessions covering about 4000 ha of forest in Madre de Dios, Peru. Our field team accompanied Brazil nut harvesters during the traditional harvest period (January-April 2012 and January-April 2013 in order to collect data on fruit production. Three hundred and ninety-nine (approximately 80% of the 499 trees included in this study were at least 100 m from the nearest cut stump, suggesting that concessionaires avoid logging near adult Brazil nut trees. Yet even for those trees on the edge of logging gaps, distance to nearest cut stump and local logging intensity did not have a statistically significant influence on Brazil nut production at the applied logging intensities (typically 1-2 timber trees removed per ha. In one concession where at least 4 trees ha-1 were removed, however, the logging intensity covariate resulted in a marginally significant (0.09 P value, highlighting a potential risk for a drop in nut production at higher intensities. While we do not suggest that logging activities should be completely avoided in Brazil

  15. Labeling Defects in CT Images of Hardwood Logs with Species-Dependent and Species-Independent Classifiers

    Science.gov (United States)

    Pei Li; Jing He; A. Lynn Abbott; Daniel L. Schmoldt

    1996-01-01

    This paper analyses computed tomography (CT) images of hardwood logs, with the goal of locating internal defects. The ability to detect and identify defects automatically is a critical component of efficiency improvements for future sawmills and veneer mills. This paper describes an approach in which 1) histogram equalization is used during preprocessing to normalize...

  16. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  17. Stress wave sorting of red maple logs for structural quality

    Science.gov (United States)

    Xiping Wang; Robert J. Ross; David W. Green; Brian Brashaw; Karl Englund; Michael Wolcott

    2004-01-01

    Existing log grading procedures in the United States make only visual assessments of log quality. These procedures do not incorporate estimates of the modulus of elasticity (MOE) of logs. It is questionable whether the visual grading procedures currently used for logs adequately assess the potential quality of structural products manufactured from them, especially...

  18. Performance of sampling methods to estimate log characteristics for wildlife.

    Science.gov (United States)

    Lisa J. Bate; Torolf R. Torgersen; Michael J. Wisdom; Edward O. Garton

    2004-01-01

    Accurate estimation of the characteristics of log resources, or coarse woody debris (CWD), is critical to effective management of wildlife and other forest resources. Despite the importance of logs as wildlife habitat, methods for sampling logs have traditionally focused on silvicultural and fire applications. These applications have emphasized estimates of log volume...

  19. Borehole logging in uranium exploration

    International Nuclear Information System (INIS)

    Kulkarni, N.H.

    1992-01-01

    The ultimate objective of exploration by drilling as far as Atomic Minerals Division is concerned is to locate the ore zone in the subsurface, draw samples and analyze them for their metal content. The presence of the ore zone is also indicated by gamma-ray logging of the borehole. A gamma-ray detector is lowered in the borehole and precise depth and grade of the ore zone is established. This helps the geologist in correlating the ore horizon with the surface outcrop or the ore zone intercepted in adjoining boreholes and in deciding about further drilling and location of boreholes. Most commonly, total gamma measurements are made although some units capable of measuring the gamma-ray spectrum are also in use. It is possible to know if the mineralization is due to uranium without waiting for the laboratory results. The present write up gives a brief account of the principles, equipment and methods of borehole gamma-ray logging including density and self-potential logging. (author). 8 refs., 5 figs

  20. Palm distributions for log Gaussian Cox processes

    DEFF Research Database (Denmark)

    Coeurjolly, Jean-Francois; Møller, Jesper; Waagepetersen, Rasmus

    This paper reviews useful results related to Palm distributions of spatial point processes and provides a new result regarding the characterization of Palm distributions for the class of log Gaussian Cox processes. This result is used to study functional summary statistics for a log Gaussian Cox...

  1. Nuclear borehole logging for oil exploration

    International Nuclear Information System (INIS)

    Oelgaard, P.L.

    1989-01-01

    Reactor physics can be applied to the logging of boreholes for the exploration of oil and gas and the results obtained can be interpreted more correctly by use of reactor physics models, e.g. one-dimensional multi-group diffusion theory adapted for gamma quanta. The standard nuclear logging tools are: natural gamma, gamma density, neutron porosity and the pulsed-neutron tool. The models and interpretation procedures are discussed. 1 fig

  2. Geophysical logging of the Harwell boreholes

    International Nuclear Information System (INIS)

    Brightman, M.A.

    1983-08-01

    A comprehensive geophysical borehole logging survey was carried out on each of three deep boreholes drilled at the Harwell research site. KOALA and PETRA computer programs were used to analyse and interpret the logs to obtain continuous quantitative estimates of the geological and hydrogeological properties of the sequences penetrated at the Harwell site. Quantitative estimates of the mineral composition and porosity of the cores samples were made. (UK)

  3. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  4. Anomalous self potential (sp) log signatures observed in a water ...

    African Journals Online (AJOL)

    Geophysical logging was done after drilling had been completed in a water well at Okwudor, South Eastern Nigeria. Three electric logs were run viz: Self Potential (SP), Resistivity N16″ and N64″ logs. An anomaly was observed in the SP log. The SP results from this well show some deviation from the standard norm.

  5. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  6. A semantic perspective on query log analysis

    NARCIS (Netherlands)

    Hofmann, K.; de Rijke, M.; Huurnink, B.; Meij, E.

    2009-01-01

    We present our views on the CLEF log file analysis task. We argue for a task definition that focuses on the semantic enrichment of query logs. In addition, we discuss how additional information about the context in which queries are being made could further our understanding of users’ information

  7. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  8. Explorations in statistics: the log transformation.

    Science.gov (United States)

    Curran-Everett, Douglas

    2018-06-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This thirteenth installment of Explorations in Statistics explores the log transformation, an established technique that rescales the actual observations from an experiment so that the assumptions of some statistical analysis are better met. A general assumption in statistics is that the variability of some response Y is homogeneous across groups or across some predictor variable X. If the variability-the standard deviation-varies in rough proportion to the mean value of Y, a log transformation can equalize the standard deviations. Moreover, if the actual observations from an experiment conform to a skewed distribution, then a log transformation can make the theoretical distribution of the sample mean more consistent with a normal distribution. This is important: the results of a one-sample t test are meaningful only if the theoretical distribution of the sample mean is roughly normal. If we log-transform our observations, then we want to confirm the transformation was useful. We can do this if we use the Box-Cox method, if we bootstrap the sample mean and the statistic t itself, and if we assess the residual plots from the statistical model of the actual and transformed sample observations.

  9. Why, What, and How to Log? Lessons from LISTEN

    Science.gov (United States)

    Mostow, Jack; Beck, Joseph E.

    2009-01-01

    The ability to log tutorial interactions in comprehensive, longitudinal, fine-grained detail offers great potential for educational data mining--but what data is logged, and how, can facilitate or impede the realization of that potential. We propose guidelines gleaned over 15 years of logging, exploring, and analyzing millions of events from…

  10. An Entry Point for Formal Methods: Specification and Analysis of Event Logs

    Directory of Open Access Journals (Sweden)

    Howard Barringer

    2010-03-01

    Full Text Available Formal specification languages have long languished, due to the grave scalability problems faced by complete verification methods. Runtime verification promises to use formal specifications to automate part of the more scalable art of testing, but has not been widely applied to real systems, and often falters due to the cost and complexity of instrumentation for online monitoring. In this paper we discuss work in progress to apply an event-based specification system to the logging mechanism of the Mars Science Laboratory mission at JPL. By focusing on log analysis, we exploit the "instrumentation" already implemented and required for communicating with the spacecraft. We argue that this work both shows a practical method for using formal specifications in testing and opens interesting research avenues, including a challenging specification learning problem.

  11. Design and Development of a Relative Humidity and Room Temperature Measurement System with On Line Data Logging Feature for Monitoring the Fermentation Room of Tea Factory

    Directory of Open Access Journals (Sweden)

    Utpal SARMA

    2011-12-01

    Full Text Available The design and development of a Relative Humidity (RH and Room Temperature (RT monitoring system with on line data logging feature for monitoring fermentation room of a tea factory is presented in this paper. A capacitive RH sensor with on chip signal conditioner is taken as RH sensor and a temperature to digital converter (TDC is used for ambient temperature monitoring. An 8051 core microcontroller is the heart of the whole system which reads the digital equivalent of RH data with the help of a 12-bit Analog to Digital (A/D converter and synchronize TDC to get the ambient temperature. The online data logging is achieved with the help of RS-232C communication. Field performance is also studied by installing it in the fermentation room of a tea factory.

  12. Biological legacies buffer local species extinction after logging.

    Science.gov (United States)

    Rudolphi, Jörgen; Jönsson, Mari T; Gustafsson, Lena; Bugmann, H

    2014-02-01

    Clearcutting has been identified as a main threat to forest biodiversity. In the last few decades, alternatives to clearcutting have gained much interest. Living and dead trees are often retained after harvest to serve as structural legacies to mitigate negative effects of forestry. However, this practice is widely employed without information from systematic before-after control-impact studies to assess the processes involved in species responses after clearcutting with retention. We performed a large-scale survey of the occurrence of logging-sensitive and red-listed bryophytes and lichens before and after clearcutting with the retention approach. A methodology was adopted that, for the first time in studies on retention approaches, enabled monitoring of location-specific substrates. We used uncut stands as controls to assess the variables affecting the survival of species after a major disturbance. In total, 12 bryophyte species and 27 lichen species were analysed. All were classified as sensitive to logging, and most species are also currently red-listed. We found that living and dead trees retained after final harvest acted as refugia in which logging-sensitive species were able to survive for 3 to 7 years after logging. Depending on type of retention and organism group, between 35% and 92% of the species occurrences persisted on retained structures. Most species observed outside retention trees or patches disappeared. Larger pre-harvest population sizes of bryophytes on dead wood increased the survival probability of the species and hence buffered the negative effects of logging. Synthesis and applications . Careful spatial planning of retention structures is required to fully embrace the habitats of logging-sensitive species. Bryophytes and lichens persisted to a higher degree in retention patches compared to solitary trees or in the clearcut area. Retaining groups of trees in logged areas will help to sustain populations of species over the clearcut phase

  13. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  14. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  15. Tradeoffs and interdependence in the Alaska cant and log markets.

    Science.gov (United States)

    Donald Flora; Una Woller; Michael. Neergaard

    1990-01-01

    During the 1980s, log exports from Alaska have risen while cant (lumber) exports have declined. Eight explanations for the difference between cant and log market behavior are explored. It seems that declining demand for wood products in Japan and a surge of private-sector log harvests in Alaska are enough to account for the apparent substitution of logs for cants. It...

  16. An inexact log-normal distribution-based stochastic chance-constrained model for agricultural water quality management

    Science.gov (United States)

    Wang, Yu; Fan, Jie; Xu, Ye; Sun, Wei; Chen, Dong

    2018-05-01

    In this study, an inexact log-normal-based stochastic chance-constrained programming model was developed for solving the non-point source pollution issues caused by agricultural activities. Compared to the general stochastic chance-constrained programming model, the main advantage of the proposed model is that it allows random variables to be expressed as a log-normal distribution, rather than a general normal distribution. Possible deviations in solutions caused by irrational parameter assumptions were avoided. The agricultural system management in the Erhai Lake watershed was used as a case study, where critical system factors, including rainfall and runoff amounts, show characteristics of a log-normal distribution. Several interval solutions were obtained under different constraint-satisfaction levels, which were useful in evaluating the trade-off between system economy and reliability. The applied results show that the proposed model could help decision makers to design optimal production patterns under complex uncertainties. The successful application of this model is expected to provide a good example for agricultural management in many other watersheds.

  17. Classification of epileptic seizures using wavelet packet log energy and norm entropies with recurrent Elman neural network classifier.

    Science.gov (United States)

    Raghu, S; Sriraam, N; Kumar, G Pradeep

    2017-02-01

    Electroencephalogram shortly termed as EEG is considered as the fundamental segment for the assessment of the neural activities in the brain. In cognitive neuroscience domain, EEG-based assessment method is found to be superior due to its non-invasive ability to detect deep brain structure while exhibiting superior spatial resolutions. Especially for studying the neurodynamic behavior of epileptic seizures, EEG recordings reflect the neuronal activity of the brain and thus provide required clinical diagnostic information for the neurologist. This specific proposed study makes use of wavelet packet based log and norm entropies with a recurrent Elman neural network (REN) for the automated detection of epileptic seizures. Three conditions, normal, pre-ictal and epileptic EEG recordings were considered for the proposed study. An adaptive Weiner filter was initially applied to remove the power line noise of 50 Hz from raw EEG recordings. Raw EEGs were segmented into 1 s patterns to ensure stationarity of the signal. Then wavelet packet using Haar wavelet with a five level decomposition was introduced and two entropies, log and norm were estimated and were applied to REN classifier to perform binary classification. The non-linear Wilcoxon statistical test was applied to observe the variation in the features under these conditions. The effect of log energy entropy (without wavelets) was also studied. It was found from the simulation results that the wavelet packet log entropy with REN classifier yielded a classification accuracy of 99.70 % for normal-pre-ictal, 99.70 % for normal-epileptic and 99.85 % for pre-ictal-epileptic.

  18. Minimum detectable gas concentration performance evaluation method for gas leak infrared imaging detection systems.

    Science.gov (United States)

    Zhang, Xu; Jin, Weiqi; Li, Jiakun; Wang, Xia; Li, Shuo

    2017-04-01

    Thermal imaging technology is an effective means of detecting hazardous gas leaks. Much attention has been paid to evaluation of the performance of gas leak infrared imaging detection systems due to several potential applications. The minimum resolvable temperature difference (MRTD) and the minimum detectable temperature difference (MDTD) are commonly used as the main indicators of thermal imaging system performance. This paper establishes a minimum detectable gas concentration (MDGC) performance evaluation model based on the definition and derivation of MDTD. We proposed the direct calculation and equivalent calculation method of MDGC based on the MDTD measurement system. We build an experimental MDGC measurement system, which indicates the MDGC model can describe the detection performance of a thermal imaging system to typical gases. The direct calculation, equivalent calculation, and direct measurement results are consistent. The MDGC and the minimum resolvable gas concentration (MRGC) model can effectively describe the performance of "detection" and "spatial detail resolution" of thermal imaging systems to gas leak, respectively, and constitute the main performance indicators of gas leak detection systems.

  19. AML (Advanced Mud Logging: First Among Equals

    Directory of Open Access Journals (Sweden)

    T. Loermans

    2017-09-01

    Full Text Available During the past ten years an enormous development in mud logging technology has been made. Traditional mud logging was only qualitative in nature, and mudlogs could not be used for the petrophysical well evaluations which form the basis for all subsequent activities on wells and fields. AML however can provide quantitative information, logs with a reliability, trueness and precision like LWD and WLL. Hence for well evaluation programmes there are now three different logging methods available, each with its own pros and cons on specific aspects: AML, LWD and WLL. The largest improvements have been made in mud gas analysis and elemental analysis of cuttings. Mud gas analysis can yield hydrocarbon fluid composition for some components with a quality like PVT analysis, hence not only revolutionising the sampling programme so far done with only LWD/WLL, but also making it possible to geosteer on fluid properties. Elemental analysis of cuttings, e.g. with XRF, with an ability well beyond the capabilities of the spectroscopy measurements possible earlier with LWD/WLL tools, is opening up improved ways to evaluate formations, especially of course where the traditional methods are falling short of requirements, such as in unconventional reservoirs. An overview and specific examples of these AML logs is given, from which it may be concluded that AML now ought to be considered as “first among its equals”.

  20. Method and apparatus for epithermal neutron porosity well logging

    International Nuclear Information System (INIS)

    Hertzog, R.C.; Loomis, W.A.; Wraight, P.

    1991-01-01

    This patent describes a method for investigating the porosity of a subsurface earth formation surrounding a borehole. It comprises repetitively irradiating the borehole and earth formation with discrete bursts of high energy neutrons from a neutron source, which neutrons interact with nuclei of the materials in the borehole and the formation to produce therein populations of epithermal neutrons; detecting the populations of epithermal neutrons at near and far locations in the borehole spaced apart longitudinally by different distances from the neutron source; generating count signals indicative of the magnitudes of the detected epithermal neutron populations at the respective near and far locations; detecting the decay of the epithermal neutron populations following the neutron bursts at least at one location in the borehole and generating signals representative thereof; deriving from the decay signals a signal indicative of the slowing down time of epithermal neutrons in the formation of the at least one location; and deriving from the near and far count signals and the slowing down time signal a measurement signal representative of the porosity of the formation surrounding the borehole inherently compensated for the effects of tool standoff on the responses of the logging tool