WorldWideScience

Sample records for wedge-shaped nephrograms detected

  1. Large scale test of wedge shaped micro strip gas counters

    Energy Technology Data Exchange (ETDEWEB)

    Ackermann, M.; Atz, S.; Aulchenko, V.; Bachmann, S.; Baiboussinov, B.; Barthe, S.; Beaumont, W.; Beckers, T.; Beissel, F.; Benhammou, Y.; Bergdolt, A.M.; Bernier, K.; Bluem, P.; Bondar, A.; Bouhali, O.; Boulogne, I.; Bozzo, M.; Brom, J.M.; Camps, C.; Chorowicz, V.; Coffin, J.; Commichau, V.; Contardo, D.; Croix, J.; Troy, J. de; Drouhin, F.; Eberle, H.; Fluegge, G.; Fontaine, J.-C.; Geist, W.; Goerlach, U.; Gundlfinger, K.; Hangarter, K.; Haroutunian, R.; Helleboid, J.M.; Henkes, Th.; Hoffer, M.; Hoffman, C.; Huss, D.; Ischebeck, R.; Jeanneau, F.; Juillot, P.; Junghans, S.; Kapp, M.R.; Kaercher, K.; Knoblauch, D.; Kraeber, M.; Krauth, M.; Kremp, J.; Lounis, A.; Luebelsmeyer, K.; Maazouzi, C.; Macke, D.; Metri, R.; Mirabito, L.; Mueller, Th.; Nagaslaev, V.; Neuberger, D.; Nowack, A.; Pallares, A.; Pandoulas, D.; Petertill, M.; Pooth, O.; Racca, C.; Ripp, I.; Ruoff, E.; Sauer, A.; Schmitz, P.; Schulte, R.; Schultz von Dratzig, A.; Schunk, J.P.; Schuster, G.; Schwaller, B.; Shektman, L.; Siedling, R.; Sigward, M.H.; Simonis, H.J.; Smadja, G.; Stefanescu, J.; Szczesny, H.; Tatarinov, A.; Thuemmel, W.H.; Tissot, S.; Titov, V.; Todorov, T.; Tonutti, M.; Udo, F.; Velde, C. Vander. E-mail: vandervelde@hep.iihe.ac.be; Doninck, W. van; Dyck, Ch. van; Vanlaer, P.; Lancker, L. van; Verdini, P.G.; Weseler, S.; Wittmer, B.; Wortmann, R.; Zghiche, A.; Zhukov, V

    1999-11-01

    In order to check the system aspects of the forward-backward MSGC tracker designed for the future CMS experiment at LHC, 38 trapezoidal MSGC counters assembled in six multi-substrates detector modules were built and exposed to a muon beam at the CERN SPS. Results on the gain uniformity along the wedge-shaped strip pattern and across the detector modules are shown together with measurements of the detection efficiency and the spatial resolution.

  2. Large scale test of wedge shaped micro strip gas counters

    CERN Document Server

    Ackermann, M; Aulchenko, V M; Bachmann, S; Baibusinov, B O; Barthe, S; Beaumont, W; Beckers, T; Beissel, F; Benhammou, Ya; Bergdolt, A M; Bernier, K; Blüm, H P; Bondar, A E; Bouhali, O; Boulogne, I; Bozzo, M; Brom, J M; Camps, C; Chorowicz, V; Coffin, J P; Commichau, V; Contardo, D; Croix, J; De Troy, J G; Drouhin, F; Eberle, H; Flügge, G; Fontaine, J C; Geist, Walter M; Goerlach, U; Gundlfinger, K; Hangarter, K; Haroutunian, R; Helleboid, J M; Henkes, T; Hoffer, M; Hoffmann, C; Huss, D; Ischebeck, R; Jeanneau, F; Juillot, P; Junghans, S; Kapp, M R; Kärcher, K; Knoblauch, D; Kräber, M H; Krauth, M; Kremp, J; Lounis, A; Lübelsmeyer, K; Maazouzi, C; Macke, D; Metri, R; Mirabito, L; Müller, T; Nagaslaev, V; Neuberger, D; Nowak, A; Pallarès, A; Pandoulas, D; Petertill, M; Pooth, O; Racca, C; Ripp, I; Ruoff, E; Sauer, A; Schmitz, P; Schulte, R; Schultz von Dratzig, A; Schunk, J P; Schuster, G; Schwaller, B; Shekhtman, L I; Siedling, R; Sigward, M H; Simonis, H J; Smadja, G; Stefanescu, J; Szczesny, H; Tatarinov, A A; Thümmel, W H; Tissot, S; Titov, V; Todorov, T; Tonutti, M; Udo, Fred; Van der Velde, C; Van Doninck, W K; Van Dyck, C; Vanlaer, P; Van Lancker, L; Verdini, P G; Weseler, S; Wittmer, B; Wortmann, R; Zghiche, A; Zhukov, V

    1999-01-01

    In order to check the system aspects of the forward-backward MSGC tracker designed for the future CMS experiment at LHC, 38 trapezoidal MSGC counters assembled in six multi-substrates detector modules were built and exposed to a muon beam at the CERN SPS. Results on the gain uniformity along the wedge-shaped strip pattern and across the detector modules are shown together with measurements of the detection efficiency and the spatial resolution. (8 refs).

  3. Large negative Goos-H(a)nchen shift from a wedge-shaped thin film

    Institute of Scientific and Technical Information of China (English)

    Jianping Bai; Yaoju Zhang

    2009-01-01

    The analytical expression for the complex amplitude of light reflected from a wedge-shaped thin film is derived.For plane wave incidence,a simple ray tracing approach is used to calculate Goos-H(a)nchen(GH)shifts;and for non-plane wave incidence,for example,a Gaussian beam,the angular spectrum approach of plane wave is used in simulation.The two approaches predict that a wedge-shaped thin film can produce large negative longitudinal GH shifts.Although the reflectivity is small near the condition of resonance,the large negative GH shifts can be more easily detected in comparison with the shift from a plane-paxallel film in vacuum.

  4. The striated MR nephrogram, not a reflection of pathology

    Energy Technology Data Exchange (ETDEWEB)

    Trout, Andrew T.; Care, Marguerite M.; Towbin, Alexander J. [Cincinnati Children' s Hospital Medical Center, Department of Radiology - MLC 5031, Cincinnati, OH (United States); Zhang, Bin [Cincinnati Children' s Hospital Medical Center, Division of Biostatistics and Epidemiology, Cincinnati, OH (United States)

    2015-10-15

    We have intermittently observed low signal striations in the kidneys on delayed post-contrast MR exams of the spine. While we suspected these striations were due to concentrated gadolinium, the clinical importance of this finding was uncertain. To describe the striated MR nephrogram (low signal striations in the kidney) and assess its clinical relevance. Retrospective review of delayed post-contrast MRIs of the spine (mean: 45 min after contrast administration). The presence of the striated MR nephrogram was correlated with imaging parameters (field strength, time since contrast), and findings (gadolinium in the bladder, inferior vena cava and aorta diameters) and with clinical factors (history of renal disease, laboratory values). Seven hundred seventy-three exams performed on 229 patients, 8.3 ± 5.3 years of age, were reviewed. The striated MR nephrogram was observed in 102/773 examinations (13.2%) and was present on at least one study in 54/229 patients (23.6%). The presence of striations was associated with the specific magnet on which the exam was performed (P < 0.01) but not with magnet field strength. Serum creatinine was minimally lower in patients with striations (0.43 ± 0.12 vs. 0.49 ± 0.18 mg/dL, P = 0.002), but no other clinical or historical data, including time from contrast administration (P = 0.54), fluid status (P = 0.17) and clinical history of renal disease (P = 0.14), were predictive of the presence of striations. The striated MR nephrogram was observed in 13% of delayed post-contrast MR exams of the spine. Precipitating factors are unclear, but the striated nephrogram does not appear to be a marker of clinically apparent renal dysfunction. (orig.)

  5. Enhancement of linear and second-order hyperpolarizabilities in wedge-shaped nanostructures

    Science.gov (United States)

    Jayabalan, J.; Singh, Manoranjan P.; Rustagi, K. C.

    2003-08-01

    Analytical solutions for the wave functions for free electrons inside a wedge-shaped quantum dot are reported. For silver wedge-shaped quantum dots, linear and second-order hyperpolarizabilities are calculated for various apex angles. It is found that linear and nonlinear hyperpolarizabilities both increase with decreasing apex angle.

  6. Allergic Interstitial Nephritis Manifesting as a Striated Nephrogram

    Directory of Open Access Journals (Sweden)

    Irfan Moinuddin

    2015-01-01

    Full Text Available Allergic interstitial nephritis (AIN is an underdiagnosed cause of acute kidney injury (AKI. Guidelines suggest that AIN should be suspected in a patient who presents with an elevated serum creatinine and a urinalysis that shows white cells, white cell casts, or eosinophiluria. Drug-induced AIN is suspected if AKI is temporally related to the initiation of a new drug. However, patients with bland sediment and normal urinalysis can also have AIN. Currently, a definitive diagnosis of AIN is made by renal biopsy which is invasive and fraught with risks such as bleeding, infection, and hematoma. Additionally, it is frequently unclear when a kidney biopsy should be undertaken. We describe a biopsy proven case of allergic interstitial nephritis which manifested on contrast enhanced Magnetic Resonance Imaging (MRI as a striated nephrogram. Newer and more stable macrocyclic gadolinium contrast agents have a well-demonstrated safety profile. Additionally, in the presentation of AKI, gadolinium contrast agents are safe to administer in patients who demonstrate good urine output and a downtrending creatinine. We propose that the differential for a striated nephrogram may include AIN. In cases in which the suspicion for AIN is high, this diagnostic consideration may be further characterized by contrast enhanced MRI.

  7. Modal Analysis in Lined Wedge-Shaped Ducts

    Science.gov (United States)

    Mechel, F. P.

    1998-10-01

    It has been suggested to describe the sound field in a wedge-shaped duct in a cylindrical co-ordinate system in which the boundaries of the wedge lie in a co-ordinate surface. This suggestion was developed in a companion paper [1]. The wave equation can be separated only if the boundaries are ideally reflecting (rigid or soft). Two solutions were proposed in reference [1] for absorbing boundaries. In the first solution the sound field is composed of “ideal modes” (modes in a wedge with ideally reflecting boundaries); the boundary condition at the absorbing boundary then leads to a system of equations for the mode amplitudes. The problem with this method lies in the fact that there is no radial orthogonality of the ideal modes so that the precision of the field synthesis by ideal modes is doubtful. In the second method in reference [1] one defines “fictitious modes” which satisfy the boundary conditions at the flanks exactly and which are based on hypergeometric functions as radial functions, but which produce a “rest” in the wave equation. It was described how this rest can be minimized; this procedure leads to slow numerical integrations. In the present paper, the wedge is subdivided into duct sections with parallel walls (the boundary is stepped); the fields in the sections are composed of duct modes (modes in a straight lined duct); the mode amplitudes are determined from the boundary conditions at the section limits. The advantages of the present method are (analytically) the duct modes are orthogonal across the sections, so the mode amplitudes can be determined with the usual precision of a modal analysis, and (numerically) no numerical integrations are needed.

  8. Statics of Magnetic Fluid Drop with Compound Magnetic Core in a Wedge-Shaped Channel

    Directory of Open Access Journals (Sweden)

    V. Bashtovoi

    2013-12-01

    Full Text Available A behavior of magnetic fluid drop with compound magnetic core in a wedge-shaped channel was studied experimentally. The study examines influence of magnetic fluid properties, its volume and magnetic field on statics of the system compound magnet – magnetic fluid drop in wedge-shaped channel. The possibility to change the static conditions of such system by altering magnetic field of the core was observed

  9. Groundwater response to tidal fluctuations in wedge-shaped confined aquifers

    Science.gov (United States)

    Cuello, Julián E.; Guarracino, Luis; Monachesi, Leonardo B.

    2017-08-01

    Most of the analytical solutions to describe tide-induced head fluctuations assume that the coastal aquifer has a constant thickness. These solutions have been applied in many practical problems ignoring possible changes in aquifer thickness, which may lead to wrong estimates of the hydraulic parameters. In this study, a new analytical solution to describe tide-induced head fluctuations in a wedge-shaped coastal aquifer is presented. The proposed model assumes that the aquifer thickness decreases with the distance from the coastline. A closed-form analytical solution is obtained by solving a boundary-value problem with both a separation of variables method and a change of variables method. The analytical solution indicates that wedging significantly enhances the amplitude of the induced heads in the aquifer. However, the effect on time lag is almost negligible, particularly near the coast. The slope factor, which quantifies the degree of heterogeneity of the aquifer, is obtained and analyzed for a number of hypothetical scenarios. The slope factor provides a simple criterion to detect a possible wedging of the coastal aquifer.

  10. RESEARCH ON THE MOTION CHARACTERISTICS OF FIBER SUSPENSIONS IN A WEDGE-SHAPED FLOW

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper the motion of cylindrical particles in a wedge-shaped flow was studied. The velocity distribution of wedge-shaped flow was simulated first, then the Euler-Lagrange model used to calculate the motion of cylindrical particles. The evolution of particle location, velocity and orientation with time was examined. The trajectories of the particles with different particle Stokes number, rate of flow and initial particle orientation were drawn. The results indicate that the Stokes number and initial orientation are important parameters which affect the particle motion. The conclusions are helpful to the engineering applications.

  11. A Novel Continuous Extrusion Process to Fabricate Wedge-Shaped Light Guide Plates

    Directory of Open Access Journals (Sweden)

    Wen-Tse Hsiao

    2013-01-01

    Full Text Available Backlight modules are key components in thin-film transistor liquid crystal displays (TFT-LCD. Among the components of a backlight module, the light guide plate (LGP plays the most important role controlling the light projected to the eyes of users. A wedge-shaped LGP, with its asymmetrical structure, is usually fabricated by an injection proces, but the fabrication time of this process is long. This study proposes a continuous extrusion process to fabricate wedge-shaped LGPs. This continuous process has advantages for mass production. Besides a T-die and rollers, this system also has an in situ monitor of the melt-bank that forms during the extrusion process, helping control the plate thickness. Results show that the melt bank has a close relationship with the plate thickness. The temperature of the bottom heater and roller was adjusted to reduce the surface deformation of the wedge-shaped plate. This continuous extrusion system can successfully manufacture wedge-shaped LGPs for mass production.

  12. Direct Preparation of Nano-Quasicrystals via a Water-Cooled Wedge-Shaped Copper Mould

    Directory of Open Access Journals (Sweden)

    Zhifeng Wang

    2012-01-01

    Full Text Available We have successfully synthesized multicomponent Mg-based nano-quasicrystals (nano-QCs through a simple route by using a water-cooled wedge-shaped copper mould. Nanoscale QCs are prepared directly on tip of wedge-shaped castings. The further study shows that nano-QCs in the Mg71Zn26Y2Cu1 alloy show well microhardness of greater than HV450. Electrochemical properties of three kinds of quasicrystal alloys are investigated in simulated seawater. The Mg71Zn26Y2Cu1 nano-QC alloy presents the best corrosion resistance in this study for the formation of well-distributed nano-QC phases (1~5 nm and polygonal Mg2(Cu,Y nanophases (40~50 nm.

  13. Study on effect of segments erection tolerance and wedge-shaped segment on segment ring in shield tunnel

    Institute of Scientific and Technical Information of China (English)

    CHEN Jun-sheng; MO Hai-hong

    2006-01-01

    Deformation and dislocations of segments of shield tunnel in construction stage have apparent effect on tunnel structure stress and even cause local cracks and breakage in tunnel. 3D finite element method was used to analyze two segment ring models under uniform injected pressure: (1) segment ring without wedge-shaped segment, which has 16 types of preinstall erection tolerance; (2) segment ring with wedge-shaped segment, which has no preinstall erection tolerance. The analysis results indicate that different erection tolerances can cause irregular deformation in segment ring under uniform injected pressure, and that the tolerance values are enlarged further. Wedge-shaped segment apparently affects the overall deformation of segment ring without erection tolerances. The uniform injected pressure can cause deformation of ring with wedge-shaped segment irregular,and dislocations also appear in this situation. The stress of segment with erection tolerances is much larger than that of segment without erection tolerances. Enlarging the central angle of wedge-shaped segment can make the irregular deformation and dislocations of segments smaller. The analysis results also provide basis for erection tolerance control and improvement of segment constitution.

  14. Rainfall induced groundwater mound in wedge-shaped promontories: The Strack-Chernyshov model revisited

    Science.gov (United States)

    Kacimov, A. R.; Kayumov, I. R.; Al-Maktoumi, A.

    2016-11-01

    An analytical solution to the Poisson equation governing Strack's discharge potential (squared thickness of a saturated zone in an unconfined aquifer) is obtained in a wedge-shaped domain with given head boundary conditions on the wedge sides (specified water level in an open water body around a porous promontory). The discharge vector components, maximum elevation of the water table in promontory vertical cross-sections, quantity of groundwater seeping through segments of the wedge sides, the volume of fresh groundwater in the mound are found. For acute angles, the solution to the problem is non-unique and specification of the behaviour at infinity is needed. A "basic" solution is distinguished, which minimizes the water table height above a horizontal bedrock. MODFLOW simulations are carried out in a finite triangular island and compare solutions with a constant-head, no-flow and "basic" boundary condition on one side of the triangle. Far from the tip of an infinite-size promontory one has to be cautious with truncation of the simulated flow domains and imposing corresponding boundary conditions. For a right and obtuse wedge angles, there are no positive solutions for the case of constant accretion on the water table. In a particular case of a confined rigid wedge-shaped aquifer and incompressible fluid, from an explicit solution to the Laplace equation for the hydraulic head with arbitrary time-space varying boundary conditions along the promontory rays, essentially 2-D transient Darcian flows within the wedge are computed. They illustrate that surface water waves on the promontory boundaries can generate strong Darcian waves inside the porous wedge. Evaporation from the water table and sea-water intruded interface (rather than a horizontal bed) are straightforward generalizations for the Poissonian Strack potential.

  15. CALCULATION OF DISPLACEMENT FIELD AND DEFORMATIONS OF WEDGE SHAPED TWIN WITH THE HELP OF MESOSCOPIC DISLOCATIONAL MODEL

    Directory of Open Access Journals (Sweden)

    Y. V. Vasilevich

    2011-01-01

    Full Text Available Displacements and deformations of a wedge-shaped twin have been calculated with the help of mesoscopic dislocational model. It has been shown that deformations are localized at twin boundaries and twin top and also at some limited areas which are rather far from the twin. 

  16. Stationary bubble formation and cavity collapse in wedge-shaped hoppers

    CERN Document Server

    Yagisawa, Yui; Okumura, Ko

    2016-01-01

    The hourglass is one of the apparatuses familiar to everyone, but reveals intriguing behaviors peculiar to granular materials, and many issues are remained to be explored. In this study, we examined the dynamics of falling sand in a special form of hourglass, i.e., a wedge-shaped hopper, when a suspended granular layer is stabilized to a certain degree. As a result, we found remarkably different dynamics, bubbling and cavity regimes. In the bubbling regime, bubbles of nearly equal size are created in the sand at a regular time interval. In the cavity regime, a cavity grows as sand beads fall before a sudden collapse of the cavity. Bubbling found here is quite visible to a level never discussed in the physics literature and the cavity regime is a novel phase, which is neither continuous, intermittent nor completely blocked phase. We elucidate the physical conditions necessary for the bubbling and cavity regimes and develop simple theories for the regimes to successfully explain the observed phenomena by consid...

  17. A computational study of supersonic combustion behind a wedge-shaped flameholder

    Science.gov (United States)

    Fureby, C.; Fedina, E.; Tegnér, J.

    2014-01-01

    In this study, large eddy simulation (LES) has been used to examine supersonic flow, mixing, self-ignition and combustion in a model scramjet combustor and has been compared against the experimental data. The LES model is based on an unstructured finite-volume discretization, using monotonicity-preserving flux reconstruction of the filtered mass, momentum, species and energy equations. Both a two-step and a seven-step hydrogen-air mechanism are used to describe the chemical reactions. Additional comparisons are made with results from a previously presented flamelet model. The subgrid flow terms are modeled using a mixed model, whereas the subgrid turbulence-chemistry interaction terms are modeled using the partially stirred reactor model. Simulations are carried out on a scramjet model experimentally studied at Deutsches Zentrum für Luft- und Raumfahrt consisting of a one-sided divergent channel with a wedge-shaped flame holder at the base of which hydrogen is injected. The LES predictions are compared with experimental data for velocity, temperature, wall pressure at different cross sections as well as schlieren images, showing good agreement for both first- and second-order statistics. In addition, the LES results are used to illustrate and explain the intrinsic flow, and mixing and combustion features of this combustor.

  18. Analytical expression for the sheath edge around wedge-shaped cathodes

    Science.gov (United States)

    Sheridan, T. E.

    2008-03-01

    The sheath is the boundary layer separating a quasi-neutral plasma from a material electrode. Understanding the sheath is important for numerous applications, including plasma-based ion implantation, plasma etching of semiconductors, plasma assisted electrostatic cleaning, and Langmuir probes. In a 1D planar geometry, the Child-Langmuir (CL) law describes the sheath when the bias on a negative electrode, i.e., a cathode, is much greater than the electron temperature. In this case, the sheath width s is an eigenvalue of the problem. In 2D, the sheath edge is an unknown line (an ``eigen-boundary") which is determined by a set of coupled, nonlinear, partial differential equations. I have found an expression for the sheath edge around a 2D wedge-shaped cathode with included angle θw. In polar coordinates (r,θ), the sheath edge is a solution of r(aθ)=as where s is the planar sheath width far from the corner and θw=2π- π/a, so that a=1/2 gives a knife edge, while a=2/3 gives a square corner. This result is verified by comparison with the numerical solutions of Watterson [P. A. Watterson, J. Phys. D 22, 1300 (1989)].

  19. Experimental study of slot jet impingement heat transfer on a wedge-shaped surface

    Science.gov (United States)

    Rahimi, Mostafa; Irani, Mohammad

    2012-12-01

    An experimental investigation was conducted to study the convective heat transfer rate from a wedge-shaped surface to a rectangular subsonic air jet impinging onto the apex of the wedge. The jet Reynolds number, nozzle-to-surface distance and the wedge angle were considered as the main parameters. Jet Reynolds number was ranged from 5,000 to 20,000 and two dimensionless nozzle-to-surface distances h/w = 4 and 10 were examined. The apex angle of the wedge ranged from 30° to 180° where the latter case corresponds with that of a flat surface. Velocity profile and turbulence intensity were provided for free jet flow using hot wire anemometer. Local and average Nusselt numbers on the impinged surface are presented for all the configurations. Based on the results presented, the local Nusselt number at the stagnation region increases as the wedge angle is decreased but, it then decreases over the remaining area of the impinged surface. Average Nusselt number over the whole surface is maximum when the wedge angle is 180° (i.e. plane surface) for any jet and nozzle-to-surface configuration.

  20. Experimental Investigation on Cross Flow of Wedge-shaped Gap in the core of Prismatic VHTR

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Hun; Park, Goon Cherl; Cho, Hyoung Kyu [Seoul National University, Seoul (Korea, Republic of); Yoon, Su Jong [Idaho National Laboratory, Idaho Falls (United States)

    2014-10-15

    The core of the PMR type reactor consists of assemblies of hexagonal graphite blocks. The graphite blocks have lots of advantages for neutron economy and high temperature structural integrity. The height and flat-to-flat width of fuel bock are 793 mm and 360 mm, respectively. Each block has 108 coolant channels of which the diameter is 16 mm. And there are gaps between blocks not only vertically but also horizontally for reloading of the fuel elements. The vertical gap induces the bypass flow and through the horizontal gap the cross flow is formed. Since the complicated flow distribution occurs by the bypass flow and cross flow, flow characteristics in the core of the PMR reactor cannot be treated as a simple pipe flow. The fuel zone of the PMR core consists of multiple layers of fuel blocks. The shape change of the fuel blocks could be caused by the thermal expansion and fast-neutron induced shrinkage. It could make different axial shrinkage of fuel block and this leads to wedge-shaped gaps between two stacked fuel blocks. The cross flow is often considered as a leakage flow through the horizontal gap between stacked fuel blocks and it complicates the flow distribution in the reactor core by connecting the coolant channel and the bypass gap. Moreover, the cross flow could lead to uneven coolant distribution and consequently cause superheating of individual fuel element zones with increased fission product release. Since the core cross flow has a negative impact on safety and efficiency of VHTR, core cross flow phenomena have to be investigated to improve the core thermal margin of VHTR. To develop the cross flow loss coefficient model for determination of the flow distribution for PMR core analysis codes, study on cross flow for PMR200 core is essential. In particular, to predict the amount of flow through the cross flow gap, obtaining accurate flow loss coefficient is important. In this study, the full-scale cross flow experimental facility was constructed to

  1. Computational analysis of responses of a wedge-shaped-tip optical fiber probe in bubble measurement.

    Science.gov (United States)

    Sakamoto, A; Saito, T

    2012-07-01

    Optical-fiber probing is widely employed in bubble/droplet measurement in gas-liquid two-phase flows. Several types of optical fiber probes with a very high S/N ratio and high performance have been developed, but further improvement in the probes' measurement accuracy and reliability for industrial applications is desired. We tried to eliminate optical noise in the probe measurements, and we found that the signals include some peak signs that have potential for advanced measurement with optical-fiber probing. We developed a ray-tracing numerical simulator and identified the mechanisms underlying the generation of the signals. In order to numerically simulate the optical probing signals, the simulator must use 3D frameworks composed of incident beams, the reflection and refraction on the surfaces of the optical elements (i.e., an optical fiber, a sensing tip, an air phase, and a water phase), and beams returning from the sensing tip to the other tip through the fiber. We used all of these in a simple rendering framework based on a ray-tracing algorithm with Fresnel's law, and we observed the mechanism of some promising signals that may be useful for extracting the hidden potential of optical-fiber probing. To verify the simulator's performance, we carried out three comparative experiments with fundamental setups using a wedge-shaped single-tip optical fiber probe, examining: (1) the beam trajectories and energy leaking out from the sensing tip into the surrounding air phase or water phase, (2) the probing signals throughout penetration of the sensing tip at the air-water free interface in light of the three-dimensional deformation, and (3) the probing signals throughout penetration of the sensing tip into a bubble in light of the three-dimensional bubble shape. As a result, (a) we found that an optical fiber probe with a wedge-shaped tip has particular characteristics of beam emissions from the tip, and the emitting angles switched depending on the phases covering

  2. 楔状缺损临床研究进展%Clinical research progress of wedge shaped defects

    Institute of Scientific and Technical Information of China (English)

    韦界飞

    2012-01-01

    Wedge shaped defects is common non-caries dental disease, which caused by chronic consumption of hard tissue close to lips, huccal and neck. The defects formed by the intersection of two planes, with neatly edge, hard and smooth surface; the defects general had the same color of dental hard tissue, but sometimes could also be with other different colors; the defects were commonly found in the premolars, especially in the first premolar; wedge-shaped defect increase with age growth. In recent years, there were more and more studies focusing on the etiology and clinical progress. Here, we summarized the risk factors, prevalence and clinical treatment for wedge shaped defects.%楔状缺损是非龋性疾病中的常见病,是牙齿唇、颊面牙颈部硬组织发生慢性消耗所致的缺损.其缺损由两个平面相交而成,边缘整齐,表面坚硬光滑,一般均为牙体硬组织本色,有时可有不同程度的着色,好发生于前磨牙,尤其是第一前磨牙,随着年龄增长,楔状缺损有增加的趋势,年龄愈大,楔状缺损愈严重.近年来国内外学者对于楔状缺损的病因学研究更加深入、临床治疗进展的报道也越来越多,本文对楔状缺损的病因、流行情况及治疗进展进行综述.

  3. Deterministic Spin-Orbit Torque Switching of a Perpendicularly Polarized Magnet Using Wedge Shape of the Magnet

    Science.gov (United States)

    Bhowmik, Debanjan; Salahuddin, Sayeef

    2016-10-01

    Spin-orbit torque provides an efficient way to switch magnets for low power memory applications by reducing the current density needed to switch the magnetization. Perpendicularly polarized magnets are preferred for high density data storage applications because of their high thermal stability in scaled dimensions. However, spin-orbit torque cannot switch a perpendicularly polarized magnet deterministically from up to down and down to up in the absence of an external magnetic field because spin-orbit torque alone cannot break the symmetry of the system. This poses a severe challenge to the applicability of spin-orbit torque for memory devices. In this paper, we show through micromagnetic simulations that when spin-orbit torque is applied on a magnet with a wedge shape, the moments of the magnet are aligned in-plane. On removal of the spin-orbit torque the moments deterministically evolve to vertically upward or downward direction because the anisotropy axis of the magnet is tilted away from the vertical direction owing to the wedge shape of the magnet. Thus, spin-orbit torque driven deterministic switching of the magnet in the absence of an external magnetic field is possible.

  4. The New Wedge-Shaped Hubble Diagram of 398 SCP Supernovae According to the Expansion Center Model

    CERN Document Server

    Lorenzi, Luciano

    2010-01-01

    Following the successful dipole test on 53 SCP SNe Ia presented at SAIt2004 in Milan, this 9th contribution to the ECM series beginning in 1999 in Naples (43th SAIt meeting: "Revolutions in Astronomy") deals with the construction of the new wedge-shaped Hubble diagram obtained with 398 supernovae of the SCP Union Compilation (Kowalski et al. 2008) by applying a calculated correlation between SNe Ia absolute blue magnitude MB and central redshift z0, according to the expansion center model. The ECM distance D of the Hubble diagram (cz versus D) is computed as the ratio between the luminosity distance DL and 1 + z. Mathematically D results to be a power series of the light-space r run inside the expanding cosmic medium or Hubble flow; thus its expression is independent of the corresponding z. In addition one can have D = D(z, h) from the ECM Hubble law by using the h convention with an anisotropic HX. It is proposed to the meeting that the wedge-shape of this new Hubble diagram be confirmed independently as mai...

  5. Energy constancy checking for electron beams using a wedge-shaped solid phantom combined with a beam profile scanner

    Energy Technology Data Exchange (ETDEWEB)

    Rosenow, U.F.; Islam, M.K.; Gaballa, H.; Rashid, H. (Univ. of Goettingen (Germany, F.R.))

    1991-01-01

    An energy constancy checking method is presented which involves a specially designed wedge-shaped solid phantom in combination with a multiple channel ionization chamber array known as the Thebes device. Once the phantom/beam scanner combination is set up, measurements for all electron energies can be made and evaluated without re-entering the treatment room. This is also valid for the readjustment of beam energies which are found to deviate from required settings. The immediate presentation of the measurements is in the form of crossplots which resemble depth dose profiles. The evaluation of the measured data can be performed using a hand-held calculator, but processing of the measured signals through a PC-type computer is advisable. The method is insensitive to usual fluctuations in beam flatness. The sensitivity and reproducibility of the method are more than adequate. The method may also be used in modified form for photon beams.

  6. Energy constancy checking for electron beams using a wedge-shaped solid phantom combined with a beam profile scanner.

    Science.gov (United States)

    Rosenow, U F; Islam, M K; Gaballa, H; Rashid, H

    1991-01-01

    An energy constancy checking method is presented which involves a specially designed wedge-shaped solid phantom in combination with a multiple channel ionization chamber array known as the Thebes device. Once the phantom/beam scanner combination is set up, measurements for all electron energies can be made and evaluated without re-entering the treatment room. This is also valid for the readjustment of beam energies which are found to deviate from required settings. The immediate presentation of the measurements is in the form of crossplots which resemble depth dose profiles. The evaluation of the measured data can be performed using a hand-held calculator, but processing of the measured signals through a PC-type computer is advisable. The method is insensitive to usual fluctuations in beam flatness. The sensitivity and reproducibility of the method are more than adequate. The method may also be used in modified form for photon beams.

  7. Anti-plane deformations around arbitrary-shaped canyons on a wedge-shape half-space: moment method solutions

    Institute of Scientific and Technical Information of China (English)

    Nazaret Dermendjian; Vincent W. Lee; Jianwen Liang(梁建文)

    2003-01-01

    The wave propagation behavior in an elastic wedge-shaped medium with an arbitrary shaped cylindrical canyon at its vertex has been studied. Nunerical computation of the wave displacement field is carried out on and near the canyon surfaces using weighted-residuals (moment method). The wave displacement fields are computed by the residual mcthod for the cases of elliptic, circular, rounded-rectangular and flat-elliptic canyons. The analysis demonstrates that thc resulting surface displacemcnt depends, as in similar previous analyses, on several factors including, but not limited, to the angle of thc wedge, thc geometry of thc vertex, the frcquencies of thc incident waves, the angles of incidence, and the material properties of the media. The analysis provides intriguing results that help to explain geophysical observations regarding the amplification of seismic energy as a function of site conditions.

  8. Evaluation of Four Different Restorative Materials for Restoration of the Periodontal Condition of Wedge-Shaped Defect: A Comparative Study.

    Science.gov (United States)

    Ruan, Jian-Yong; Gong, Zheng-Lin; Zhang, Rui-Zhi; Zhang, Zhe; Xu, Ran; Li, Da-Xu; Ren, Le; Tao, Hong

    2017-09-16

    BACKGROUND This study aimed to conduct a clinical evaluation of four restorative materials for restoration of dental wedge-shaped defect (WSD) and their impacts on periodontal tissues. MATERIAL AND METHODS A total of 280 maxillary premolars with dental WSD were selected from 106 patients; the patient cases were divided into eight groups according to different combinations of restorative materials (flowable resin composites, Dyract compomers, glass ionomer cement (GIC), light-curing composite resin), and WSD positions (approaching gingival and subgingival positions). Gingival crevicular fluid (GCF) volume, levels of aspartate aminotransferase (AST), alkaline phosphatase (ALP), and interleukin-1β (IL-1β) in GCF were analyzed, while probing depth (PD), plaque index (PLI), and sulcus bleeding index (SBI) were also measured. The periodontal conditions of all patients were followed prior to restoration, as well as six months and 12 months after restoration. RESULTS After six months of restoration, the overall clinical success rates of flowable resin composites, Dyract compomers, and light-curing composite resin were greater than those of GIC. GCF volume, GCF-AST, IL-1β levels, PD, PLI, and SBI of cases restored by GIC were higher than those restored by the other three materials. After 12 months of restoration, the overall clinical success rates of flowable resin composites and Dyract compomers were greater than those of light-curing composite resin and GIC. GCF volume, GCF-AST, GCF-ALP, IL-1β levels, PD, PLI, and SBI of cases restored by GIC were higher than those restored by the other three materials. CONCLUSIONS Our study provided evidence that the clinical efficacy of flowable resin composites, Dyract compomers, and light-curing composite resin was greater than that of GIC for restoration of dental WSD.

  9. Comparison of Three Different Materials for Wedge-shaped Defects%3种材料修复楔状缺损的疗效观察

    Institute of Scientific and Technical Information of China (English)

    邱自力

    2011-01-01

    目的 观察采用不同材料充填修复楔状缺损的临床疗效.方法 将500颗需要进行楔状缺损修复的患牙随机分成3组,分别用3M玻璃离子水门汀(1组172颗),Z350复合树脂(2组195颗),Dyract复合体(3组133颗)充填修复楔状缺损,随访1年.结果 随访1年,1组成功率87.8%,2组成功率94.9%,3组成功率为98.5%.2组和3组之间差异无统计学意义(P>0.05),1组与2组、3组之间差异有统计学意义(P<0.05).结论 Dyract复合体和Z350复合树脂的临床疗效优于玻璃离子,是较为理想的修复楔状缺损的材料.%Objective To observe the efficacy of three different materials in the restoration of wedge-shaped defects. Methods Five hundred teeth with wedge-shaped defects were randomly divided into three groups. Wedge-shaped defects were repaired with 3M glass-ionomer cement, Z350 light-cured composite resins and Dyract complex in group 1 (172 teeth), group 2 (195 teeth) and group 3(133 teeth) .respectively. All patients were followed up for 1 year. Results The success rate in group 1 (87. 8%) was significantly lower than that in group 2 (94. 9%) and group 3 (98. 5 %) (P<0. 05). Conclusion Dyract complex and Z350 light-cured composite resins are superior to 3M glass-ionomer and can be considered as the ideal choices for restoring wedge-shaped defects.

  10. Striated nephrogram as an incidental finding in MRI examination of children; Streifiges Nephrogramm als Zufallsbefund nach Kontrastmittelgabe bei Kindern in der MRT

    Energy Technology Data Exchange (ETDEWEB)

    Strocka, S.; Sorge, I.; Ritter, L.; Hirsch, F.W. [Leipzig Univ. (Germany). Dept. of Pediatric Radiology

    2016-01-15

    A highly striated contrast pattern of the kidneys occasionally appears in abdominal MRI examinations of children following the administration of gadolinium. As this phenomenon is well known but has not yet been explicitly described in literature, we investigated how frequently and in which clinical context this occurred. 855 abdominal MRI examinations with contrast media of 362 children between 2006 and 2014 were analysed retrospectively. A striated renal parenchyma was found in a total of nine children and eleven examinations (1.3 % of examinations) and did only occur at a field strength of 3 Tesla. Of these children, seven had previously had tumors and chemotherapy. In two children there was no evidence of a previously serious condition with medications or a kidney disease. All of them had a normal renal function. A noticeably striated nephrogram in the later phase of an MRI examination following administration of gadolinium may appear as an incidental finding in examinations at 3 Tesla without pathological relevance.

  11. 老年牙齿楔状缺损患者165例临床分析及预防措施研究%Clinical Analysis and Preventive Measures of 165 Elderly Patients with Wedge-shaped Defects

    Institute of Scientific and Technical Information of China (English)

    杨士杰

    2011-01-01

    目的 分析老年牙齿楔状缺损患者的发病特点,探讨有效的临床预防措施.方法 选择2007年11月-2010年10月清苑县妇幼保健院就诊的老年牙齿楔状缺损患者165例,记录患者的患病情况并采用提间的方式对与发病可能有关的情况进行调查.结果 老年牙齿楔状缺损好发于第一双尖牙,且楔缺损害以盘型,2度更为常见;横刷法刷牙、刷牙次数≥3次/d、喜食酸性食物以及牙周退缩者更容易发生楔状缺损.结论 临床医生应该掌握老年牙齿楔状缺损的发病特点,针对性进行宣传教育工作,以减少牙齿楔状缺损的发病率.%Objective To analyze the onset characteristics of elderly patients with wedge - shaped defects, and to explore the effective clinical preventive measures. Methods One hundred and sixty - five elderly patients with wedgeshaped defects hospitalized in the Maternal and Child Health Hospital of Qingyuan County from November 2007 to October 2010 were enrolled in this study. Their sickness status was recorded and the related situations of the disease were surveyed by questionnaires. Results Wedge- shaped defects in the first premolar were commonly seen in elderly patients, moreover, the disc wedge and type 2 degrees were more common in the lack of damage. The patients with cross - brushing method, brushing frequency≥3 times/day, eating acidic foods and back by periodontal wedge- shaped defect were more likely to occur wedge - shaped defects. Conclusions Dentists should grasp the onset characteristics of elderly patients with wedge - shaped defects and develop targeted publicity and education so as to reduce the incidence of wedge- shaped defects.

  12. Two Kinds of Repair Methods for Teeth Depth of the Wedge-shaped Defect%深度楔状缺损两种修复方法的临床疗效观察

    Institute of Scientific and Technical Information of China (English)

    李慧良; 杨令云

    2011-01-01

    To compare the observed light-cured calcium hydroxide bottom composite Dyract after repair and the direct use of Fuji II glass ionomer cement neck deep wedge-shaped defects in dental clinical efficacy. 178 cases of tooth neck deep wedge-shaped defect in patients with 412 teeth were randomly divided into two groups. Group 1 Fuji II glass ionomer direct repair. Group 2 using light-cured calcium hydroxide bottom composite Dyract after repair. 6 -24 months follow-up after, the results were significantly different after two years (P0. 05). 2 years after the first set of edge adaptation, secondary caries and periodontal dental pulp are superior to group 2 (P<0. 05). Repair of glass ionomer cement direct treatment of wedge-shaped defects over the depth of light curing calcium hydroxide to bottom with Dyract complex repair, Fujill direct filling of glass ionomer cement is an ideal depth of wedge-shaped defect repair technology.%通过光固化氢氧化钙垫底后Dyract复合体修复和直接用Fuji Ⅱ玻璃离子水门汀分别修复牙颈部深度楔状缺损,临床观察6个月~24个月.对二者的治疗效果进行研究分析,认为玻璃离子水门汀直接修复深度楔状缺损治疗效果优于以光固化氢氧化钙垫底用Dyract复合体修复,FujiⅡ玻璃离子水门汀直接充填是一种较理想的修复深度楔状缺损技术.

  13. Comparison of the clinical effects of two kinds of materials for restoration of the wedge-shaped defect%两种楔状缺损修复材料的临床效果比较

    Institute of Scientific and Technical Information of China (English)

    霍志强

    2013-01-01

    目的 探讨两种修复楔状缺损材料的应用效果.方法 将294例患者共1242颗患牙随机分为两组.实验组:149例患者648颗患牙,采用Dyract AP复合体修复.对照组:145例患者594颗患牙,采用3M-Vitemer新一代光固化玻璃离子水门汀修复.修复后1~2年进行复查,观察两组的临床效果.结果 两种修复材料均显示出优良的固位性能和边缘密合性,对牙髓和牙周组织均无刺激;实验组和对照组的成功率分别为92.59%和88.38%,两组差异具有统计学意义(P<0.05).结论 两种材料修复楔状缺损均可获得较好的临床效果,其中复合体修复的成功率高于光固化水门汀.%Objective To evaluate the application effect of two kinds of materials for restoration of the wedge-shaped defect.Methods 294 patients with a total of 1242 teeth with wedge-shaped defect enrolled and randomly divided into two groups.648 teeth with wedge-shaped defect of 149 patients in the experimental group were repaired with the Dyract AP complex.While 594 teeth with wedge-shaped defect of 145 patients in the control group were repaired with a new generation of 3M-Vitemer light-cured glass ionomer cement.The patients were recalled 1-2 years after restoration to evaluate the clinical effects of two kinds of materials.Results Both of the two kinds of repairing materials showed excellent retention and edge sealing,and no irritation to pulp and periodontal tissue.The success rate of the experimental group and the control group were 92.59% and 88.38% respectively,and there was statistical difference between the success rates of the two groups (P<0.05).Conclusion Both of the two kinds of materials for restoration of dental wedge-shaped defects in the present manuscript can obtain good clinical effect,but the success rate in reparing the wedge-shaped defect with the complex is higher than that with light-cured cement material.

  14. THE RELATION OF SALIVARY FLOW RATE,PH AND BUTTER CAPACITY TO WEDGE-SHAPE DEFECTS OF TOOTH NECK%老年人唾液与牙颈部楔状缺损的关系

    Institute of Scientific and Technical Information of China (English)

    林南雁; 姜毅; 东智安

    2001-01-01

    Objective:The aim of the study was to inestigate the relation of some saliva factors to wedge-shape defects of tooth in the elderly.Methods:The material comprised 84 subjects,whose wedge-shape defects of tooth were evaluated with Smith' tooth wear index.According to the TWI,the subjects were divided into mild and severe group.Saliva samples in stimuli wax from subjects were measured.Results:No different was found between groups in salivary flow rate,pH and buffer capacity.Conclusion:The salivary pH and buffer capacity has no significant relation to wedge-shape defects of tooth.%目的:调查老年人唾液流速、pH值及缓冲力的变化与牙齿颈部楔状缺损的关系.方法:选84名老年人,采用Smith牙齿磨损指数分度检查全口牙齿颈楔状缺损,并据缺损程度分组;检测新鲜刺激唾液的流速、pH值及缓冲力.结果:牙齿颈部楔状缺损程度不同组间与唾液流速、pH值及缓冲无差异.结论:牙颈部楔状缺损与唾液流速、pH及缓冲力无明显关系.

  15. 可摘局部义齿基牙楔状缺损充填修复的临床疗效分析%Removable Partial Denture Restoration of Wedge-shaped Defect Clinical Analysis

    Institute of Scientific and Technical Information of China (English)

    田云霞

    2013-01-01

      目的:分析研究临床采用三种材料对可摘局部义齿基牙颈部楔状缺损的临床修复疗效.方法:选取我院口腔门诊2009年3月~2010年3月收治的62例患者174颗楔状缺损可摘局部义齿基牙,随机分为为A组、B组及C组.分别采用三种材料对其缺损部位进行修复,修复2年后采用改良的USPHS系统评价修复体的疗效.结果:A组、B组与C组比较有显著性差异(P<0.05)有统计学意义.结论:可摘局部义齿基牙楔状缺损应及早黏结修复以改善该处的集中应力状况,以提高楔状缺损患者的生活质量.%Objective:To study three glass ionomer cements materials for removable partial denture abutments cervical wedge-shaped defects of clinical therapeutic effect of repair.Methods:In our hospital in 2009 March~2010 March dental clinic in 62 patients 174 wedge-shaped defect with removable partial denture abutments,respectively,using three kinds of materials on the defect repair,restoration after 2 years by using the improved USPHS system restoration effect evaluation.Results:The amalgam group,Dyract group and GC Fuji IX composite GP glass ionomer cement group had significant difference (P<0.05) was statistically significant.Conclusion:Removable partial denture abutment teeth wedge-shaped defects should be early restorations to improve the concentrated stress condition,in order to improve the quality of life in patients with wedge shaped defect.

  16. 冰箱门内壳楔形冲孔模设计%Design of the Wedge-Shaped Piercing Die for the Inner Shell of the Refrigerator Door

    Institute of Scientific and Technical Information of China (English)

    秦建保

    2001-01-01

    分析了冰箱门内壳的冲孔工艺性,介绍了楔形冲孔模的结构及工作过程,还介绍了设计与工作中的注意事项。%The hole-piercing processing property of an inner shell of the refrigerator door was analyzed. The structure and the working process of the wedge-shaped piercing die were introduced.And the attention points in the design and manufacture of the die were stated.

  17. A Study of Rock Mechanical Properties under the Effect of the Wedge-shaped Blade Head%楔形刃压头作用下岩石力学性能研究

    Institute of Scientific and Technical Information of China (English)

    张照煌; 叶定海; 袁昕

    2011-01-01

    楔形刃压头与岩石作用规律的研究是全断面岩石掘进机研制的基础理论.通过对楔形刃压头贯入岩石产生的现象及其与岩石相互作用规律的研究,发现在楔形刃作用下,岩石破坏的宏观表现是“跃进破碎”.岩石在跃进破碎前经历弹性变形和塑性变形,弹性变形较小,塑性变形在跃进破碎前及两相邻跃进破碎间是岩石变形的主要形式,并且作用在楔形刃上的力与楔形刃贯入岩石的深度保持着线性关系,因此,将楔形刃作用下岩石塑性变形的物理方程表示为广义胡克定律形式;提出了楔形刃作用下,岩石变形几何方程建立的单点双角度变量理论;通过楔形刃与岩石相互作用平衡方程的建立,研究了楔形刃压头作用下广义胡克定律中杨氏模量的取值.从而提出了此领域研究的新方法和新理论.%The research on the interaction between the Wedge-shaped blade head and the rock is not only the theoretical basis for developing TBM, but also the research focus of scholars at home and abroad. The study of the phenomenon of the Wedge-shaped blade head's piercing the rock and the interaction between them reveal that under the effect of the Wedge-shaped blade Head, the macro form of rock-breaking is " jump crushing. " Before that, the rock undergoes elastic deformation and plastic deformation. The rock deformation is mainly in the form of plastic deformation with minor elastic deformation plastic. The force exerted on the Wedge-shaped blade head and the cutting depth maintain linear relationship. Thus, the physical equation for rock's plastic deformation in such a case is expressed as the generalized Hooke's Law. The theory of single-point and double-angle variables is put forward. With the balance equations for the interaction between the Wedge-shaped blade head and the rock established, the value of Young modulus in terms of the generalized Hooke's Law is analyzed. Hence, a new

  18. Clinical observation of deep dental wedge-shaped defects with three different methods%3种方法修复深度楔状缺损的临床观察

    Institute of Scientific and Technical Information of China (English)

    陈平

    2012-01-01

    Objective To explore better materials and methods for restoring deep dental wedge-shaped defects. Methods 486 teeth in 189 cases with wedge-shaped defects were randomly divided into three groups which were restored with glass inomer cement restoration, light-cured composite resin restoration and the sandwich technique respectively. Evaluation was made after restoration for 1 to 2 years respectively. Results The successful rates of glass inomer cement restoration, light-cured composite resin restoration and the sandwich technique after 1 to 2 years were 89.66%, 84.72%, 93.46% and 69.17%, 82.22%, 90.28% respectively. The successful rate of the sandwich technique group was higher than that of the other two groups. Conclusion The clinical curative effect of the sandwich technique for restoring deep dental wedge-shaped defects was better.%目的 探讨疗效较理想的修复深度楔状缺损的材料和方法.方法 189名患者的486颗患牙随机分为3组,分别用玻璃离子黏固剂修复法、光固化复合树脂修复法和夹层技术修复深度楔状缺损.修复后1~2年复查,观察其临床疗效.结果 修复1年和2年后玻璃离子黏固剂修复法、光固化复合树脂修复法和夹层技术修复的成功率分别为89.66%、84.72%、93.46%和69.17%、82.22%、90.28%.夹层技术组成功率明显高于其他2组.结论夹层技术用于修复深度楔状缺损的临床疗效较好.

  19. Fast connection of large-diameter PE pipes. A new generation of heating coil welding technologies. A technical comparison between the new wedge-shaped joint and the conventional cylindrical foint for PE pipes d 1000 and larger; PE-Grossrohre im Handumdrehen verbinden. Eine neue Generation der Heizwendelschweisstechnik. Ein technischer Vergleich zwischen der neuen Keilmuffe und der herkoemmlichen zylindrischen Muffe fuer PE-Rohre d 1000 und groesser

    Energy Technology Data Exchange (ETDEWEB)

    Eckert, Robert [FRIATEC AG, Mannheim (Germany)

    2011-07-01

    Wedge-shape joints are a revolution in large-diameter pipe connection. Fitting is simplified considerably as compared to conventional cylindrical joints. Reproducible high-quality connections are achieved at only a fraction of the time formerly required. Assembly follows clear and simple rules. Anybody who can assemble a flange will be able to cope with the tightening system of the wedge-shaped joint.

  20. 四种材料治疗牙体楔状缺损的临床疗效观察%Clinical effect on the evaluation of restorations for wedge-shaped defect with four different materials

    Institute of Scientific and Technical Information of China (English)

    倪成励

    2015-01-01

    Objective:To observe and compare late stage clinical effect of fluid resin,light cured composite resin,glass ionomer cement,common glass ionomer on restoration of dental wedge-shaped defects. Methods:Eighty patients with 198 wedge-shaped defect teeth were selected and randomly divided into four groups,with use of Z350 fluid resin( A group ), Z350 light curing resin( B group),Fuji II composite glass ionomer( C group)and FX II glass ionomer( D group)respec-tively for restoration. All the patients were recalled to evaluate the restoration efficacy six months and 12 months later. USA public health service evaluation system modified was used to evaluate the clinical effects of teeth. Results:The success rate of FX II glass ionomer was lower than that in the other three groups at 6 months(P<0. 05). At 12 months,the efficacy of Z350 fluid resin,Fuji II glass ionomer was significantly better than that of the other two groups(P<0. 05). Conclusion:Z350 fluid resin and Fuji II reinforced glass ionomer are ideal materials for the restoration of dental wedge-shaped defects.%目的:观察比较流体树脂、光固化复合树脂、加强型玻璃离子水门汀、普通玻璃离子修复楔状缺损的后期临床效果。方法选择80例病人198颗楔状缺损,随机分为四组,分别使用Z350流体树脂( A组)、Z350光固化树脂( B组)、FujiⅡ复合玻璃离子( C组)和FXⅡ玻璃离子( D组)行充填修复,修复后于6个月、12个月门诊随访,采用改良的美国公共卫生署评价系统对治疗后的患牙进行临床效果评价。结果6个月时FXⅡ玻璃离子的成功率低于其他三组(P<0.05),12个月时,Z350流体树脂、FujiⅡ玻璃离子的疗效均明显优于另外两组(P<0.05)。结论Z350流体树脂和FujiⅡ加强型玻璃离子是修复楔状缺损的理想材料。

  1. 两种斜面修复术治疗楔状缺损临床脱落率疗效观察%Investigation on the expulsion rate of two types of cavities for repairing wedged-shaped defects

    Institute of Scientific and Technical Information of China (English)

    巩蕾; 邱勋定; 郝春波

    2016-01-01

    目的:比较制备短斜面、凹斜面两种洞缘斜配合FiltekA350流体树脂修复楔状缺损后一年内的脱落率。方法收集2011年7月至2012年7月来我科门诊就诊的楔状缺损患者58例,患牙106颗,采用随机数字表将患者随机分为短斜面组和凹斜面组,每组53颗,分别在釉质合面制备短斜面、凹斜面后流体树脂进行充填,观察充填治疗一年内的脱落率。结果凹斜面组与短斜面组患者修复1年内充填体的脱落率分别为4.3%(2/46)和8.0%(4/50),凹斜面组的脱落率低于短斜面组,但差异无统计学意义(P>0.05)。结论凹斜面组配合流体树脂修复楔状缺损,相比短斜面组,修复一年内充填体的脱落率更低。%Objective To investigate the expulsion rate of two restoring methods, the short bevel and the hol-low-ground bevel, using the flowable composite to repair the wedged-shaped defects, within one year after restoring. Methods A total of 58 cases of patients with 106 teeth of wedge-shaped defects, who admitted to Department of Stoma-tology of our hospital from July 2011 to July 2012, were randomly divided into two groups with 53 teeth in each group. After preparing two types of cavities, the short bevel and the hollow-ground bevel, and using the flowable composite to repair the wedged-shaped defects, expulsion rates of two restoring methods during one year after restoring were investi-gated. Results The expulsion rates of the hollow-ground and the short bevel are respectively 8.0% and 4.3%. There was no significant difference between two bevels by using the flowable composite to restore the defect in the expulsion rate. Conclusion Compared with the short bevel, the hollow-ground by using the flowable composite to restore the de-fect has the lower expulsion rate within one year after restoring.

  2. Clinical evaluation of flowable composites in treatment of wedge-shaped defects as a liner%流动复合树脂衬洞在楔状缺损修复中的疗效评价

    Institute of Scientific and Technical Information of China (English)

    李相如; 王静; 李红文

    2011-01-01

    PURPOSE: To evaluate the clinical effects of flowable composite as a liner in treatment of wedge-shaped defects. METHODS: Three hundred and sixty teeth from 85 patients with wedge-shaped defects were studied. The self control design was used in this study. Teelh were randomly divided into experimental group which were restored with composite resin after using flowable composite as a liner in one side, and the control group which were filled with composite resin directly in the other side. The modified USPHS / Ryge criteria were used to evaluate the treatment effects after 1 year and 3 years. SPSS 12.0 software package was used for statistical analysis. RESULTS: There was significant difference between the 2 groups in postoperative sensitivity. The experimental group had higher successful rate than the control group. In marginal integrity, the successful rate of the experimental group was 100% after 1 year, higher than 95.65% in the control group (P<0.01). The successful rate of the experimental group was 98.56% after 3 year, higher than 92.42% in the control group (P<0.01). In postoperative sensitivity: the experimental group had no sensitive cases after 1 year, while the control group had 6 teeth with moderate sensitivity which needed to change the restoration. The experimental group was better than the control group, the difference was statistically significant (P <0.05). CONCLUSION: It can be concluded that flowable composites as a liner in restoration of wedge-shaped defects may improve the marginal integrity and reduce the postoperative sensitivity.%目的:评价流动复合树脂作为洞衬材料在楔状缺损修复中的价值.方法:选择85例患者的360颗楔状缺损患牙为研究对象,采用自身对照设计,随机选择每例患者一侧患牙为实验组,采用流动树脂衬洞后再以复合树脂充填;对侧同名牙为对照组,直接采用复合树脂充填.以改良的USPHS/Ryge临床修复体质量评估系统评价修复后1年和3

  3. Application of gingival retraction cord to the restoration of subgingival wedge-shaped defect%排龈术在龈下楔状缺损修复中的应用研究

    Institute of Scientific and Technical Information of China (English)

    赵静; 葛久禹

    2013-01-01

    Objective To study the clinical performance of gingival retraction cord in repairing subgingival wedge-shaped defects. Methods Totally 40 patients with wedge-shaped defect on both side premolars were selected, one side treated by gingival retraction and filled with composite resin and the other side filled directly with Z350 compos-ite resin. The marginal adaptation,retention and the presence of secondary carries after one year and two years were eval-uated. Results One week after restoration,the incidence of overhanging for dental restoration by using retraction cord to retract gingival was significantly lower than those of the control group(P<0.05). After 1 year and 2 years,the reten-tion of restorations in the control group was significantly lower than that of using retraction cord(P<0.05). Conclusion Gingival retraction cord has high success rate for restoration of subgingival wedge-shaped defect.%目的:评估排龈术对龈下楔状缺损修复效果的影响。方法选择2008年2月至2009年7月来南京大学医学院附属口腔医院牙体牙髓科就诊的双侧上颌前磨牙颈部楔状缺损患者40例,将同一患者的两侧患牙随机分为排龈组与对照组(各40颗牙),排龈组在排龈线排龈后用Z350复合树脂充填,对照组直接用Z350复合树脂充填。随访2年,观察其临床疗效,评价修复体保存、边缘密合性以及继发龋发生情况。结果充填1周后首次复查,排龈组悬突发生率低于对照组,差异有统计学意义(P<0.05)。充填1年和2年后复查,排龈组修复体的脱落率均明显低于对照组,差异有统计学意义(P<0.05)。结论排龈术可提高龈下楔状缺损修复的治疗效果。

  4. 不同方式修复牙齿楔状缺损的疗效对照%Comparison of Therapeutic Effect of Different Ways of Repairing the Wedge-shaped Teeth Defect

    Institute of Scientific and Technical Information of China (English)

    姜蕾

    2013-01-01

      Objective:To observe and compare the clinical curative effect of three kinds of restorations of using glass ionomer cement materials, light curing calcium hydroxide under light cured composite resin materials and light curing calcium hydroxide under light curing resin flow materials. Method:180 cases of patients with canines and 64 cases of patients with premolars tooth wedge-shaped defects who were in need repair were selected and divided into A,B,C 3 groups,each group of 64 teeth,the patients were received the treatment of three kinds of restorations of using glass ionomer cement materials,light curing calcium hydroxide under light cured composite resin materials and light curing calcium hydroxide under light curing resin flow materials respectively. The patients were followed up 6 months after operation and the clinical efficacy were observed.Result:The success rates in A, B,C group of 3 methods for restoring wedge-shaped defect were 81.67%,93.33%and 95.00%after 6 months,of where B,C two group was higher than that in A group and the differences were statistically significant(P0.05). Conclusion:Light curing calcium hydroxide under light cured composite resin materials in treatment of patients with the wedge-shaped teeth dentin exposure has higher repair effect.%  目的:通过应用玻璃离子水门汀材料、光固化氢氧化钙垫底后光固化复合树脂材料及光固化氢氧化钙垫底后光固化流动树脂材料三种不同的楔状缺损修复方式,比较对照这三种修复方式的临床疗效。方法:临床选择180颗尖牙或是前磨牙牙齿楔状缺损需要修复的患者64例,分为A、B、C三组,每组60颗牙齿,分别采用玻璃离子水门汀材料、光固化氢氧化钙垫底后光固化复合树脂材料、光固化氢氧化钙垫底后光固化流动树脂材料三种方法修复楔状缺损,并于术后6个月随访观察疗效。结果:充填后6个月A、B、C组三种方法修复楔状

  5. 不同排龈方法修复龈下楔状缺损的远期疗效观察%The long-term theraputic effect of different gingival retraction techniques on subgingival wedge-shaped defect

    Institute of Scientific and Technical Information of China (English)

    林萤; 杨春丽

    2013-01-01

    [ABSTRACT] Objective: To evaluate the long-term theraputic effect of different gingival retraction techniques on subgingival wedge-shaped defect. Methods: 78 patients(297 teeth) with wedge-shaped defects were selected and divided into two groups: 43 patients(155 teeth) in gingival retraction code group were restored with the aid of gingival retraction code, 35 patients(142 teeth) in gingival retractor group were restored with the aid of LM gingival retractor. Al the defects were filed with Clearfil SE Bond system and 3M Z250 composite resin. Al cases were folowed up for 1 year. The results were evaluated by modified USPHS criteria including retention, marginal adaptation, recurrent caries, marginal discolor, new defect, gingival response and pulp response. Retention rate and successful rate were compared between the two groups. Results: 100% retention rate was recorded in the two groups. The one-year successful rates were 98.06 and 97.89% respectively, without significant difference between the two groups(p > 0.05). Conclusions: Subgingival defects can be satisfactorily restored with the aid of effective gingival retraction techniques, without difference between gingival retraction code and LM gingival retractor.%  目的对比观察排龈线和推龈器两种排龈方法修复龈下楔状缺损的远期疗效。方法纳入2011年4月至2011年12月间本院口腔科收治的龈下楔状缺损患者78例,共297颗缺损位于龈下0~2mm 内的患牙。根据修复前不同排龈方法将所有患者分为两组:排龈线组43例155颗患牙填充前使用排龈线排龈,推龈器组35例142颗患牙填充前使用推龈器排龈。两组均使用可乐丽菲露自酸蚀粘接剂粘接,3M Z250树脂进行充填。随访1年,以改良的美国公共健康署制定的 USPHS 直接临床评估系统评估远期疗效。结果楔状缺损修复1年后复查,两组患牙充填体均无脱落。通过对患牙修复体脱落情况、边缘密合度、

  6. Er:YAG 激光治疗楔形缺损的临床观察%Clinical evaluation of the effects of Er:YAG laser in the treatment of cervical wedge -shaped defects

    Institute of Scientific and Technical Information of China (English)

    杨文东; 赵继志; 王鑫; 马林; 李倩; 李珍; 张洁; 郭春岚; 吴宣; 蔡文

    2016-01-01

    目的:比较传统旋转器械和 Er:YAG 激光治疗楔形缺损过程中患者的主观感受及树脂充填后的远期临床疗效。方法:选择35~68岁口内同颌对称性且程度相似的楔形缺损患者26例共104个患牙,采用自身对照法,随机选取一侧作为对照组,机械预备窝洞;另一侧实验组用 Er:YAG 激光预备窝洞。采用自酸蚀粘结技术,3M复合树脂充填。术后即刻填写调查问卷,对两种方法的疼痛、气味、噪音、恐惧程度及患者的接受程度进行评估,术后1年采用改良的评定系统 USPHS 对充填体进行临床评价。结果:治疗后即刻问卷调查结果显示:22/26位患者(85%)认为激光备洞较机械备洞疼痛和不适感轻,在下次治疗时更愿意优先选择激光;4/26的患者认为两种治疗方法差别不大。术后1年 26例患者中失访2例,其余24例共98个牙复查结果显示:实验组和对照组总有效率分别为86%和88%(P >0.05)。结论:Er:YAG 激光在窝洞预备过程中患者感觉更舒适,修复体粘结效果与机械预备相当。%AIM:To compare the effects of traditional rotary instrument and Er:YAG laser in the treatment of cervical wedge -shaped defects.METHODS:1 04 teeh of 26 patients with similar degree of cervical wedge -shaped lesions symmetrically in the same jaw were included.The teeth on one side were randomly selected for cavity preparation by Er:YAG laser as experiment group.Those in other side prepared by traditional rotary bur as the con-trol.Cavities were filled with 3Mcomposite resin by self etching adhesive technique.The patients were investigated by a questionnaire about pain,smell,noise,fear and preferred method for next cavity preparation.All restorations were followed up for 1 year after treatment by USPHS criteria.RESULTS:24 patients with 98 teeth finished the follow up. The questionnaire survey showed that 22 /26 patients(85%)preferred Er

  7. 数字化口腔修复(12)--CAD/CAM全瓷嵌体修复楔状缺损(附病例报告)%Digital restorative dentistry and prosthodontics (12)--Restoration of wedge-shaped defect by CAD/CAM all ceramic inlay (case report)

    Institute of Scientific and Technical Information of China (English)

    金地; 姚江武

    2016-01-01

    Objective:The clinical effects were observed on the restoration of wedge-shaped defect teeth by using two lithium silicate inlay by (computer aided design/computer aided manufacturing,CAD/CAM). Method:The clinical case was a patient who had a wedge-shaped defect teeth reached deep below free gingival margin, which was going to restore with all ceramic inlay by CAD/CAM. The clinical effect assessment was made after 6 and 12 months respectively, according to modified USPHS standard. Result:The results in each review stage showed that there were no undesirable effects such as fall off, fracture and cleav-age occurred on inlay. The clinical indexes had up to A class. Conclusion:Better clinical effect can be achieved in treating teeth with wedge-shaped defect using two lithium silicate inlay by CAD/CAM, but the long-term follow-up result still had to be fur-ther observed.%目的:观察计算机辅助设计和制作(CAD/CAM)二矽酸锂全瓷嵌体修复牙颈部缺损的临床疗效。方法:临床病例为1颗牙颈部继发龋坏深达龈下的患牙,采用CAD/CAM全瓷嵌体修复,按照改良的USPHS标准分别进行6个月和1年的临床疗效评价。结果:各个复查阶段:嵌体无脱落,折断、劈裂等不良现象,临床指标均达到A级指标。结论:CAD/CAM嵌体修复牙颈部楔状缺损是一种效果良好的修复方法。

  8. Observation of Clinical Therapeutic Effect of Combination of Glass Gonomer Gement and Light Cured Composite Resin on Restoring Wedge Shaped Defect%两种材料联合修复牙齿楔状缺损的临床疗效观察

    Institute of Scientific and Technical Information of China (English)

    戴晓枫

    2012-01-01

    Objective To evaluate clinical therapeutic effect of combination of glass ionomer cement and light cured composite resin on restoring wedge shaped defect. Methods 110 teeth with wedge shaped defects in treatment group were filled and repaired with glass ionomer cement. The light cured composite resin was used to repair the teeth permanently after 24 hours. The other two control groups were treated with glass ionomer cement and light cured composite resin respectively. The treatment results and cure rates were compared between the three groups after one year follow-up. Results The cure rates of treatment group and two control groups were 98.61%, 77.85%, 77.46% respectively. The difference between treatment group and control groups was significant (p<0.01). Conclusion The combination of glass ionomer cement and light cured composite resin is a better method to restore the wedge shaped defect.%目的探讨玻璃离子水门汀联合光固化复合树脂充填修复牙齿楔状缺损的临床疗效.方法对110例楔状缺损患牙采用玻璃离子水门汀常规充填雕刻成形,然后行光固化复合树脂永久修复.对照组分别用玻璃离子、光固化复合树脂.随访一年后比较3组修复楔状缺损治愈率.结果两种材料联合修复牙齿楔状缺损的治愈率98.61%,对照组的治愈率77.85%和77.46%;两组有显著差异(P<0.01).结论两种材料联合修复牙齿楔状缺损技术是理想方法之一.

  9. Influence of Nano Composite Resin Repairing Gingival Wedge-shaped Defects on Periodontal Tissue%纳米复合树脂修复龈下楔状缺损后对患牙牙周组织的影响观察

    Institute of Scientific and Technical Information of China (English)

    杨玉慧

    2016-01-01

    Objective:To observe the influence of nano composite resin repairing gingival wedge-shaped defects on periodontal tissue.Methods:50 cases (50 teeth)of patients with wedge-shaped defects received nano-composite resin restoration in a hospital from May 2013 to April 2014 were selected.Observed the dental plaque index,gingival sulcus bleeding index,GCF,and aspartate aminotransferase (AST)level and alkaline phosphatase (ALP)level in gingival crevicular fluid before and after treatment in six months and 1 2 months. Results:After 6 months of restoration,the GCF level and gingival sulcus fluid AST level were significantly higher than those of before the restoration (P<0.05).After 12 months of restoration,the gingival sulcus bleeding index,GCF and gingival sulcus fluid AST levels were significantly higher than those of after 6 months of restoration (P<0.05).Conclusion:The influence of nano-composite resin restoration for gingival wedge-shaped defects on gingival periodontal tissue is small,and this effect did not cause the change of perio-dontal tissue,so the long-term effect is better,which is worthy of promotion and application.%目的::观察纳米复合树脂修复龈下楔状缺损对患牙牙周组织的影响。方法:选择2013年5月~2014年4月来某院行纳米复合树脂修复的楔状缺损的患者50例,患牙50颗。观察患牙修复前、修复后6个月及12个月的菌斑指数、龈沟出血指数、龈沟液量以及龈沟液中天冬氨酸转氨酶(AST)和碱性磷酸酶水平(ALP)。结果:修复后6个月患牙的龈沟液量和龈沟液中AST的水平显著高于修复前(P<0.05)。修复后12个月患牙龈沟出血指数、龈沟液量和龈沟液中 AST的水平显著高于修复后6个月(P<0.05)。结论:纳米复合树脂修复龈下缺损时对患牙牙周组织有影响,但是很小,而且这种影响未造成牙周骨组织的变化,因此远期效果比较好,值得推广应用。

  10. The effect of “bulk-fill”flowable resin in filling deep wedge-shaped defects:A randomized controlled clini-cal evaluation%整层充填流动树脂充填深楔状缺损的随机对照临床研究

    Institute of Scientific and Technical Information of China (English)

    李智; 许永伟; 高承志

    2015-01-01

    Objective:To observe the effect of “bulk-fill”flowable resin in filling deep wedge-shaped defects.Methods:50 pa-tients with totally 85 pairs of premolars with deep wedge-shaped defects(depth >2 mm)were included.Each pair of the defects was randomly divided into the test group and the control group,the defects were treated by “bulk-fill”flowable resin with single cure tech-nique and conventional flowable resin with incremental layering technique respectively,the tooth sensitive rate 1 week after filling,the filling failure rate,the edge coloring and secondary caries rate 2 years after filling of the 2 groups were compared.Results:There was no significant difference between the 2 groups in the sensitive rate 1 week after filling,the failure rate and the edge coloring and sec-ondary caries rate 2 years after filling(P >0.05).Conclusion:The “bulk-filled”flowable resin using single cure technique can ac-quire the same clinical effect as conventional flowable resin using incremental layering technique in filling deep wedge-shaped defects.%目的:观察新型整层充填流动树脂一次固化充填深楔状缺损的2年临床效果。方法:纳入左右成对深楔状缺损(深度>2 mm)前磨牙的患者50名,共85对前磨牙,随机分为试验组和对照组,试验组使用整层充填流动树脂一次充填固化,对照组使用传统树脂分层充填固化,比较2组患牙充填后1周牙齿敏感发生率及充填后2年充填体脱落率及边缘染色/继发龋发生率。结果:2组患牙在充填后1周牙齿敏感发生率、充填后2年充填体脱落率、边缘染色/继发龋发生率差异均无显著性(P>0.05)。结论:使用整层充填流动树脂一次固化充填深楔状缺损可达到与传统树脂分层充填相媲美的临床效果。

  11. Influence of Different Gingival Retraction Methods before Subgingival Wedge-shaped Defect Reparation on Gingival Bleeding after Repair%龈下楔状缺损修复前不同排龈方法对修复后牙龈出血的影响

    Institute of Scientific and Technical Information of China (English)

    张秀荣

    2014-01-01

    目的:观察龈下楔状缺损修复前不同排龈方法对修复后牙龈出血的影响。方法:将165例入选患者随机为三组,A组(n=55)采用不含药排龈线排龈,B组(n=55)采用含药排龈线(每英寸含有0.4±0.2 mg肾上腺素)排龈,C组( n=55)采用排龈膏排龈,记录三组患者治疗后的牙龈出血率与疼痛感以及随访1年后的牙龈指数( GI)。结果:三组患者治疗后的牙龈出血率与疼痛感差异显著( P<0.05);随访1年,三组患者均未见修复体脱落,在临床效果(包括充填体脱落、边缘密合性、继发龋、边缘着色)方面差异不显著( P>0.05)。结论:三种方法修复龈下楔状缺损均有显著疗效,但排龈膏排龈法在控制修复后牙龈出血方面更有优势。%Objective:To observe the influence of different gingival retraction methods before subgingi-val wedge-shaped defect reparation on gingival bleeding after repair .Method:165 cases were selected and divided into 3 groups randomly .Group A ( n=55 ) received gingival retraction without including medicine , Group B(n=55)received gingival retraction with medicine ( each inch has 0.4±0.2mg phenylephrine), and group C( n=55) received gingival retraction with gingival retraction paste .The gingiva bleeding rate and pain after treatment and gingival index after following up for 1 year of three groups were recorded .Result: The difference for gingiva bleeding rate and pain among three groups was not evident (P0. 05).Conclusion:Three methods repairing subgingival wedge-shaped defect has evident efficacy , and gingi-val retraction paste has more evident effect to control gingiva bleeding after repair .

  12. 玻璃离子和流体树脂修复楔状缺损的疗效比较%Comparation of the Clinical Effects of Glass Ionomer Cement and Flowable Composite Resin on the Restoration of Dental Wedge-Shaped Defects

    Institute of Scientific and Technical Information of China (English)

    陆佳萍; 赵守亮; 徐培成

    2013-01-01

    目的:探讨玻璃离子和流体树脂用于楔状缺损的修复的临床效果.方法:选择105例中型楔状缺损患者(376颗患牙),楔状缺损深度大于1 mm且小于2 mm、仅出现牙本质过敏症状、无牙髓炎症状.将患者左右两侧同名牙采用自身对照法随机分为玻璃离子衬垫组(A组)和流体树脂衬垫组(B组),A组以玻璃离子和复合树脂充填;B组以流体树脂和复合树脂充填.采用Ryge和USPHS评价标准,比较术后1周、1个月、1年、3年的敏感发生率及充填体脱落率.结果:失访18例70牙,复查87例306牙,复查率为81.4%.A组楔状缺损充填修复后1周、1个月的术后敏感发生率分别为18.3 %(28/153)、9.2%(14/153),B组分别为35.9 %(55/153)、28.1%(43/153),差异均有统计学意义(P均<0.01);修复后1年和3年2组术后敏感发生率差异无统计学意义.A组患牙术后1年、3年充填体脱落率分别为9.8 %(15/153)、11.8 %(18/153),B组分别为2.6%(4/153)、3.3 %(5/153),差异均有统计学意义(P<0.05和0.01);修复后1周、1个月差异均无统计学意义.结论:采用玻璃离子和流体树脂作为夹层技术中的衬垫材料修复楔状缺损,对于预防术后敏感和降低充填体脱落率均有理想的疗效.但是玻璃离子作为衬垫材料在预防术后敏感方面要优于流体树脂,而流体树脂作为衬垫材料在修复体固位力方面则优于玻璃离子.%Objective:To compare the clinical effects of glass ionomer cement(GIC) and flowable composite resin(FCR) on the restoration of dental wedge-shaped defects as liners.Methods:A total of 376 teeth from 105 patients with wedge-shaped defects were studied and divided into Group A and Group B randomly with self-contrasted method.The depth of wedge-shaped defects was more than 1 mm and less than 2 mm,and the patients were with dentin hypersensitiveness and without pulpitis.Group A was restored with composite resin after applying flowable

  13. 排龈联合流动树脂衬层技术修复楔状缺损临床疗效观察%Clinical effect of gingival retraction combined with lfowable composite resin as a liner for restoring dental wedge-shaped defects

    Institute of Scientific and Technical Information of China (English)

    张瑶; 张司晨; 万领; 曹钰

    2015-01-01

    ObjectiveTo evaluate the clinical effect of gingival retraction combined with flowable composite resin as a liner for restoring dental wedge-shaped defects.MethodsSixty-five patients with four equivalent non-carious cervical lesions on bilateral maxillary premolars were enrolled in this study. Group I was treated only with composite resin, group II was treated with gingival retraction technique and composite resin filling, group III was treated with flowable composite resin as a liner and then composite resin filling, group IV was gingival retraction combined with flowable composite resin as a liner and composite resin filling eventually. The patients were followed up for one year. The results were statistically analyzed. ResultsThere was significant difference in one year success rates between group I and group IV(P 0.05) .ConclusionEffective gingival retraction combined with flowable composite resin as a liner is a good choice for treating dental wedge-shaped defects.%目的:评估采用排龈联合流动树脂衬层技术修复楔状缺损的临床疗效。方法选择65例楔状缺损患者,每个患者的双侧上颌前磨牙均存在齐龈的4个楔状缺损(共260颗牙),将每个患者的4颗楔状缺损牙随机分为Ⅰ、Ⅱ、Ⅲ、Ⅳ4组,分别用光固化复合树脂直接充填,排龈+光固化复合树脂直接充填,光固化流动树脂衬层+复合树脂充填,排龈+光固化流动树脂衬层+复合树脂充填4种方式进行修复,于修复后1年进行观察对比。以改良的美国公共卫生署的直接临床评价系统(USPHS)评估疗效,数据进行卡方检验。结果1年复查结果显示,色泽协调性、边缘着色、边缘密合性、表面形态4个方面,4组间A、B分级间差异均无统计学意义(P>0.05)。成功率方面Ⅰ组和Ⅳ组间差异有统计学意义(P<0.05),Ⅳ组排龈+光固化流动树脂衬层+复合树脂充填临床疗效最好

  14. 塔里木盆地巴楚隆起北缘阿恰基底卷入构造%Basement-Involved wedge-shaped Structure of Aqia Fault in Northern Magin of Bachu Uplift in Northwestern Tarim Basin, Northwest China

    Institute of Scientific and Technical Information of China (English)

    杨庚; 李本亮; 杨海军; 陈竹新; 王晓波; 张朝军; 雷永良

    2012-01-01

    The Tarim Basin records the history of deposition and deformation affected by the Indian-Eurasia collision during the Cenozoic. The seismic data shows that the faulted rigid Bachu uplift, central Tarim, is a paleo-uplift covered by Quaternary deposits. NW-striking Aqia fault, Qiaolaitnaiti fault and Salambulake syncline and anticline between them were developed on the north margin of the Bachu uplift, northward adjacent to Awati depression. Many seismic lines and well data show that the Aqia fault is a deep basement-involved, south-dipping thrust fault, and the shallow structures are both Qiaolaimaiti north-dipping thrust fault and Salambulake fold. The Aqia fault cuts through the Precambrian basement to the Middle Cambrian evaporates and its displacements decrease from west to east. Salambulake anticline is a fault-propagation fold controlled by the Qiaolaimaiti fault which develops from the main decollement layer of the Cambrian evaporates. The south-dipping basement-involved fault, north-dipping cover-detached fault and Salambulake anticline forms a typical wedge-shaped structure in profile and a triangular structural belt in map view. The Aqia fault and the Salambulake fold extend northwestwardly into the Kelpin thrust belt and forms the NW-striking surface structures superimposed by northeastern-striking deformation. The growth strata indicates that NW-striking wedge-shaped structure formed during Eocene to Miocene, which extends northwestwards into the Kelping thrust zone formed in the Quaternary.%塔里木盆地巴楚隆起为第四系不整合覆盖的古隆起,在其西北缘发育NW走向的阿恰断裂、萨拉姆布拉克背斜、向斜和隐伏的乔来麦提断裂.地震剖面和钻井资料显示,阿恰断裂为倾向南的基底卷入逆冲断裂,向北逆冲,错断层位从前寒武系基底一直到中寒武统膏岩,从西向东逆冲断距减少.乔来麦提断裂则以中寒武统膏岩为滑动面,向南逆冲,并在断层端部发育萨拉

  15. 脉冲 Er:YAG 激光与常规涡轮高速车针治疗楔状缺损的效果比较%The Effect Comparasion between the Pulse Er:YAG Laser and the Conventional Turbine High-speed Dental Bur to the Remedy of Teeth Wedge-shaped Defect

    Institute of Scientific and Technical Information of China (English)

    范伟; 贺慧霞

    2015-01-01

    目的:比较Er:YAG激光与常规涡轮机高速车针治疗楔状缺损的效果。方法收集我院口腔科就诊的、双侧多个同名牙楔状缺损患者85例382颗牙,随机分为激光组和涡轮机组各191牙,其中每位患者每侧至少2颗牙采用激光表面预备,对侧高速涡轮机预备,脉冲照射采用激光剂量为300 mJ,20 Hz间歇操作。涡轮机组采用高速车针制备固位型,自体对照,两组均预备后光固化树脂黏充填。比较两组治疗后1周、1个月、6个月、12个月术后充填物保存率、边缘着色、继发龋等指标,评价其临床治疗效果。结果两组术中疼痛牙齿发生率激光组(16.7%)显著少于涡轮机组(74.8%),差异有统计学意义(P<0.05);术后1周、1个月激光组分别有35牙和12牙出现冷热刺激痛,而涡轮机组发生刺激痛分别为83牙和44牙,两者差异有统计学意义( P<0.05);术后6个月和12个月修复体保存率激光组显著高于涡轮机组,差异有统计学意义( P<0.05);但边缘适合性、边缘着色和继发龋发生率两组差异无统计学意义。结论激光组较涡轮机组在楔状缺损治疗中疼痛发生率低、治疗后疼痛反应轻;修复体保存率高。300 mJ,20 Hz的Er:YAG激光治疗楔状缺损具有无痛、安全、高效的优点。%Objective To compare the effects of Er: YAG laser and conventional high-speed burr in treatment of wedge-shaped tooth defects and to evaluate its applicability and reliability .Methods 382 bilateral multiple teeth with wedge-shaped defects in 85 patients were randomly divided into two groups with 191 teeth in each:laser group and the turbine burr group .At least two teeth of one side in all patients were irradiated by pulsed Er:YAG laser with doses of 300 mj, 20 Hz.Meanwhile, the caries cavities on the contralateral were prepared by high-speed burr .Then the prepared caries defects in both

  16. Stark effect in a wedge-shaped quantum box

    CERN Document Server

    Reyes-Esqueda, J A; Castillo-Mussot, M; Vazquez, G J; Reyes-Esqueda, Jorge-Alejandro; Mendoza, Carlos I.; Castillo-Mussot, Marcelo del; Vazquez, Gerardo J.

    2005-01-01

    The effect of an external applied electric field on the electronic ground state energy of a quantum box with a geometry defined by a wedge is studied by carrying out a variational calculation. This geometry could be used as an approximation for a tip of a cantilever of an atomic force microscope. We study theoretically the Stark effect as function of the parameters of the wedge: its diameter, angular aperture and thickness; as well as function of the intensity of the external electric field applied along the axis of the wedge in both directions; pushing the carrier towards the wider or the narrower parts. A confining electronic effect, which is sharper as the wedge dimensions are smaller, is clearly observed for the first case. Besides, the sign of the Stark shift changes when the angular aperture is changed from small angles to angles theta>pi. For the opposite field, the electronic confinement for large diameters is very small and it is also observed that the Stark shift is almost independent with respect t...

  17. Clinical Effect of GC Fuji Ⅱ Glass-Ionomer Cement in Repair of Wedge-Shaped Defects%富士Ⅱ玻璃离子充填材料修复楔状缺损的临床疗效观察

    Institute of Scientific and Technical Information of China (English)

    刘晓蕊; 张慧琴; 员战民; 常缨

    2011-01-01

    目的:比较富士Ⅱ玻璃离子与普通玻璃离子充填材料修复楔状缺损的临床疗效.方法:58例患者324颗楔状缺损患牙随机分为2组,分别用富士Ⅱ玻璃离子(实验组)和普通玻璃离子材(对照组)进行修复,观察修复后半年、一年和两年的充填效果.结果:富士Ⅱ玻璃离子和普通玻璃离子充填材料的成功率0.5年分别为98.15%、87.04%;1年分别为93.83%、71.25%;2年分别为89.38%、58.60%,修复后0.5年、1年、2年相比差异均有有显著性,(P<0.01).结论:富士Ⅱ玻璃离子充填材料修复楔状缺损效果好,是充填楔状缺损较理想的材料.%Objective: To compare the clinical effect of GC Fuji II glass-ionomer cement and ordinary glass-ionomer cement for repairing wedge-shaped defects. Methods: Totally 58 teeth were randomly divided into 2 groups, and filled by GC Fuji Ⅱ glass-ionomer cement (experimental group) and ordinary glass-ionomer cement (control group) respectively, which was to compare the clinical effect after 6 months, 1 year, and 2 years. Results: With 0.5 years, the successful rates for both GC Fuji Ⅱ glass-ionomer cement and ordinary glass-ionomer cement are 98.15%, 87.04 respectively; with 1 year, 93.83%, 71.25; with 2 years, 89.38%, 58.60%, there were significant difference if compared after either 0.5 years, 1 year or 2 years (P< 0.01). Conclusion: It exhibits GC Fuji II supior effects to ordinary glass-ionomer cement, that is a relatively ideal restorative material.

  18. Observation of Effect onFilling of 50 CasesWedge Shaped DefectTeeth by Light Cured Composite Resin and Glass Ionomer Cement%光固化复合树脂、玻璃离子水门汀填充牙楔状缺损50例的疗效观察

    Institute of Scientific and Technical Information of China (English)

    马勇

    2016-01-01

    Objective To investigate the clinical efficacyonfilling of 50 caseswedge shaped defectteeth by light cured composite resin and glass ionomer cement.Methods50 cases (186 teeth) with wedge shaped defect in our hospital were selected.They were randomly divided into light cured composite resin and glass ionomer cement joint repair group (observation group),62 teeth, light cured composite resin repair group (control group 1),58 teeth, glass ionomer cement group (control group 2),66 teeth, therapeutic effect of three groups of patients were compared.ResultsAfter 2 years of observation, the success rate of observation group was significantly higher than that of control group 1 and control group 2, the difference was statistically significant (P0.05).ConclusionIt canobtain good therapeutic effect thatwedge shaped defectteeth was repaired by light cured composite resin and glass ionomer cement. This method is worthy to be popularized and applied in clinical practice.%目的:探讨光固化复合树脂联合玻璃离子水门汀填充牙楔状缺损的临床疗效。方法选取本院门诊收治的50例(共186颗)牙楔状缺损患者,随机将其分为光固化复合树脂与玻璃离子水门汀联合修复组(观察组),共62颗,光固化复合树脂修复组(对照1组),共58颗,玻璃离子水门汀修复组(对照2组),共66颗,对三组患者的治疗效果进行比较。结果经2年的修复观察,观察组的修复成功率明显高于对照1组和对照2组,差异具有统计学意义(P0.05)。结论光固化复合树脂联合玻璃离子水门汀填充牙楔状缺损能取得良好的治疗效果,值得在临床推广与应用。

  19. 玻璃离子水门汀、光固化复合树脂、流动树脂修复牙体浅型楔状缺损的疗效性%Curative Effect of Glass Sonomer Cement, Light-Cured Composite Resin and Flowable Resin in the Dental Repair of Wedge-Shaped Defect

    Institute of Scientific and Technical Information of China (English)

    李文进

    2015-01-01

    Objective:To compare the clinical efficacy of glass sonomer cement, light-cured composite resin and flowable resin in the dental repair of wedge-shaped defect.Method:90 patients with wedge-shaped defect in our dental clinic were selected from January 2010 to May 2014 and they were randomly divided into three groups, 30 cases in each group. Group A was given glass sonomer cement, group B adopted light-cured composite resin and group C was given the flowable resin. After 1 year of follow-up visits, the success rate of dental repair, loss rate of materials, incidence rate of irritation symptom of dental pulp and incidence rate of secondary caries of three groups were compared.Result: In 1 year, group A had 6 cases with loss of materials,group B had 4 cases and group C had 1 case,the loss rate of materials of group A was significantly higher than that of group C, the difference was statistically significant(P0.05).The incidence rate of irritation symptom of dental pulp of three groups was respectively 10.0%,40.0% and 3.3%,compared group A and C, the difference was not statistically significant(P>0.05)The rate of Group B was significantly higher than that of Group A and Group B, the difference was statistically significant(P0.05).Compared 3 months and 1 weeks after repair, the periodontal index of group B and group C were significantly reduced, the differences were statistically significant (P0.05).Conclusion:The flowable resin is featured as great adhesion, less irritation, ability of filling in the tooth edge, reduction of permeability and fewer damages for periodontal tissues. It has a high success rate of dental repair. It can be promoted and applied in clinical treatment.%目的:对玻璃离子水门汀、光固化复合树脂、流动树脂三种材料修复牙体浅型楔状缺损的临床疗效进行对比,并做出评价。方法:选取2010年1月-2014年5月本院口腔科门诊收治的牙体浅型楔状缺损患者90例为研究对象,将患者

  20. 纤维桩对穿髓型楔状缺损抗折性修复的临床对比观察%Clinical comparative study on anti-fracture effects of fiber post in severe wedge-shaped defect

    Institute of Scientific and Technical Information of China (English)

    王勤波; 戴荣烽

    2014-01-01

    目的:针对穿髓型楔状缺损牙颈部抗力薄弱易折断的潜在隐患,评价不同修复术式对牙颈部抗折性能的临床效果。方法:临床随机选择穿髓型楔状缺损患者48例,牙合面完整,男性20例,女性28例,年龄45-73岁。其中第一前磨牙28例(上颌19例,下颌9例),第二前磨牙9例(上颌6例,下颌3例);尖牙11例(上颌8例,下颌3例)。在牙合面开髓根管治疗后,将所有患者随机分为A、 B两组各24颗牙,以2种术式分别进行修复。 A组:牙合面及楔状缺损处以Filtek Z350 XT纳米树脂完成修复; B组:根管纤维桩粘固后牙合面及楔状缺损处以Filtek Z350 XT纳米树脂完成修复。结果:临床观察2年, A组出现6例颈部折断, B组未出现颈部折断,经卡方检验连续校正公式计算,χ2=4.68, P<0.05,说明是否使用纤维桩修复与牙颈部折断间有统计学差异,使用纤维桩可增强牙颈部抗折断力。结论:在穿髓型楔状缺损根管内粘固玻璃纤维桩的一端,再以复合树脂将纤维桩的另一端与牙冠粘接,使纤维桩、树脂、整个牙齿(冠与根)三者整合为一体,不但增强了颊颈部修复体的固位,更提高了牙颈部的抗折性能,是一种合理、微创的牙颈部抗折修复形式,较好地体现了整体修复理念。%Objective:Based on the potential risk of the weakness of the severe wedge-shaped defect with exposed pulp, to evaluate the clinical efficacy of cervical anti-fracture resistance using different techniques. Methods: 48 patients, 20 males and 28 females, aged between 45 to 73 years old, with severe wedge-shaped defect, exposed pulp, and intact occlusal surfaces were enrolled to this study. 28 cases were the first premolar (19 cases maxillary and 9 cases mandibular). 9 cases were the second premolar (6 cases maxillary and 3 cases mandibular). 11 cases were the canines (8 cases maxillary and 3 cases mandibular

  1. MATHEMATICAL MODELING OF WORKING PROCESS IN ROLLER-DIE PELLET MILL WITH BUTT RESTRICTION OF WEDGE-SHAPED SPACE Математическое моделирование рабочего процесса в вальцово-матричном пресс-грануляторе с торцевым ограничением клиновидного пространства

    Directory of Open Access Journals (Sweden)

    Kovrikov I. T.

    2012-01-01

    Full Text Available In this article, the direction of an improvement of the working process of roller-die pellet mills with a ring dies by butt restriction of wedge-shaped space by addi-tional contact surfaces is proved. The mathematical model of the process of pressure granulation (pelleting, extrusion agglomeration of plant raw materials in the conditions of the closed wedge-shaped space between a die and each of press rollers is presented. On the ba-sis of the analysis of the mathematical model possi-bility of significant increase of capacity and decrease in energy intensity of pellet mills having additional contact surfaces in the form of restrictive rings is shown

  2. [A method of object detection for remote sensing-imagery based on spectral space transformation].

    Science.gov (United States)

    Wu, Gui-Ping; Xiao, Peng-Feng; Feng, Xue-Zhi; Wang, Ke

    2013-03-01

    Object detection is an intermediate link for remote sensing image processing, which is an important guarantee of remote sensing application and services aspects. In view of the characteristics of remotely sensed imagery in frequency domain, a novel object detection algorithm based on spectral space transformation was proposed in the present paper. Firstly, the Fourier transformation method was applied to transform the image in spatial domain into frequency domain. Secondly, the wedge-shaped sample and overlay analysis methods for frequency energy were used to decompose signal into different frequency spectrum zones, and the center frequency values of object's features were acquired as detection marks in frequency domain. Finally, object information was detected with the matched Gabor filters which have direction and frequency selectivity. The results indicate that the proposed algorithm here performs better and it has good detection capability in specific direction as well.

  3. Spatial Dynamics of Tuned and Mistuned Bladed Disks with Cylindrical and Wedge-Shaped Friction Dampers

    Directory of Open Access Journals (Sweden)

    Lars Panning

    2003-01-01

    Full Text Available One of the main tasks in the design of turbomachines like turbines, compressors, and fans is to increase the reliability and efficiency of the arrangement. Failures due to blade cracks are still a problem and have to be minimized with respect to costs and safety aspects. To reduce the maximum stresses, the blades can be coupled via friction damping devices such as underplatform dampers that are pressed onto the blade platforms by centrifugal forces. In this work, a method will be presented to optimize two different types of underplatform dampers in bladed disk applications with respect to a maximum damping effect.

  4. The first fossil wedge-shaped beetle (Coleoptera, Ripiphoridae from the middle Jurassic of China

    Directory of Open Access Journals (Sweden)

    Yun Hsiao

    2017-02-01

    Full Text Available A new species of Ripiphoridae Gemminger & Harold, 1870, Archaeoripiphorus nuwa gen. et sp. nov., is described and illustrated from a well-preserved impression fossil from the Middle Jurassic Jiulongshan Formation collected at Daohugou Village, Shantou Township, Ningcheng County, Inner Mongolia, China, representing the oldest documented occurrence of the Ripiphoridae described from the Mesozoic era. It shares several characters belonging to two basal ripiphorid subfamilies (Pelecotominae and Ptilophorinae, but it cannot be attributed to either of them and is herein placed as Subfamily incertae sedis. An overall similarity between Archaeoripiphorus gen. nov. and Recent Pelecotominae and the occurrence of wood-boring beetles in the same Formation implies a similar parasitoid host preference in xylophagous beetles for A. nuwa gen. et sp. nov., putting a spotlight on a potential host-parasitoid relationship in the Mesozoic.

  5. Numerical Studies on the Performance of Scramjet Combustor with Alternating Wedge-Shaped Strut Injector

    Science.gov (United States)

    Choubey, Gautam; Pandey, K. M.

    2017-04-01

    Numerical analysis of the supersonic combustion and flow structure through a scramjet engine at Mach 7 with alternating wedge fuel injection and with three angle of attack (α=-3°, α=0°, α=3°) have been studied in the present research article. The configuration used here is slight modification of the Rabadan et al. scramjet model. Steady two dimensional (2D) Reynolds-averaged Navier-Stokes (RANS) simulation and Shear stress transport (SST) based on k-ω turbulent model is used to predict the shock structure and combustion phenomenon inside the scramjet combustor. All the simulations are done by using Ansys 14-Fluent code. The combustion model used here is the combination of eddy dissipation and finite rate chemistry models since this model avoids Arrhenius calculations in which reaction rates are controlled by turbulence. Present results show that the geometry with negative angle of attack (α=-3°) have lowest ignition delay and it improves the performance of scramjet combustor as compared to geometry with α=0°, α=3°. The combustion phenomena and efficiency is also found to be stronger and highest in case of α=-3°.

  6. Computational Fluid Dynamics Verification and Noise Prediction of Ramjet with Wedge-shaped Flame Holder

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2012-04-01

    Full Text Available The Lighthill acoustic analogy equation is adopted to research noise distribution at dissimilarity positions and the variations are conducted based on the numerical verification of flow field under different turbulence models, time step sizes and meshes. The results showed the proposed computation method is reliable and practicable to obtain the complex flow parameters in the ramjet combustion chamber; Most of the noise is higher-frequency, and the differences in the near and far field are proven. In addition, noise laws are identical with the same horizontal position.

  7. INTENSIFICATION OF SEPARATION PROCESS OF BAR MATERIAL ON DIMENSIONAL WORKPIECE OF WEDGE-SHAPED KNIVES

    Directory of Open Access Journals (Sweden)

    L. A. Isaevich

    2017-01-01

    Full Text Available Based on the analysis of known methods of separation of bar mix to length determined that the most effective method of forming an annular groove therein plastic tapered section, with a gradual deformation of the metal disc blades recess which is destroyed in the mix zone. In order to reduce the depth of the groove after its shaping proposed to produce in the same local area flexural bar. Based on experimental data obtained an empirical formula relating the dependence of bending rod axis angle on the depth of the annular groove. It is found that the greatest effect on the angle of local bending rod axis in the annular groove zone occurs when changing its depth from 0.5 to 3.0 mm. And this dependence is exponential in nature. Reducing the local axis of the workpiece bending angle for the specified range of the groove depth will be between 8.83º to 2.23º. A further increase in the depth of the annular groove is not practical, because the angle of bending the rod axis with reduced insignificantly. The dependence is valid for the separation process rods tapered disc blades with a local curvature of its axis is almost independent of the original diameter shared assortment. Therefore, the process can be carried out efficiently when the groove depth is not greater than 3.0 mm.

  8. Storage battery comprising negative plates of a wedge shaped configuration. [for preventing shape change induced malfunctions

    Science.gov (United States)

    Bogner, R. S.; Farris, C. D. (Inventor)

    1974-01-01

    An improved silver-zinc battery particularly suited for use in an environment where battery operation is subjected to multiple charge/discharge cycling over extended periods is described. The battery seperator system, containing a highly absorbent material continguous with the surfaces of the plates and multiple semi-permeable membranes interposed between the plates, is also characterized.

  9. Factors affecting the ability of the spectral domain optical coherence tomograph to detect photographic retinal nerve fiber layer defects.

    Directory of Open Access Journals (Sweden)

    Harsha L Rao

    Full Text Available To evaluate the ability of normative database classification (color-coded maps of spectral domain optical coherence tomograph (SDOCT in detecting wedge shaped retinal nerve fiber layer (RNFL defects identified on photographs and the factors affecting the ability of SDOCT in detecting these RNFL defects.In a cross-sectional study, 238 eyes (476 RNFL quadrants of 172 normal subjects and 85 eyes (103 RNFL quadrants with wedge shaped RNFL defects of 66 glaucoma patients underwent RNFL imaging with SDOCT. Logistic regression models were used to evaluate the factors associated with false positive and false negative RNFL classifications of the color-coded maps of SDOCT.False positive classification at a p value of <5% was seen in 108 of 476 quadrants (22.8%. False negative classification at a p value of <5% was seen in 16 of 103 quadrants (15.5%. Of the 103 quadrants with RNFL defects, 64 showed a corresponding VF defect in the opposite hemisphere and 39 were preperimetric. Higher signal strength index (SSI of the scan was less likely to have a false positive classification (odds ratio: 0.97, p = 0.01. Presence of an associated visual field defect (odds ratio: 0.17, p = 0.01 and inferior quadrant RNFL defects as compared to superior (odds ratio: 0.24, p = 0.04 were less likely to show false negative classifications.Scans with lower signal strengths were more likely to show false positive RNFL classifications, and preperimetric and superior quadrant RNFL defects were more likely to show false negative classifications on color-coded maps of SDOCT.

  10. EDGE DETECTION OF THE SCOLIOTIC VERTEBRAE USING X-RAY IMAGES

    Directory of Open Access Journals (Sweden)

    P. MOHANKUMAR

    2016-02-01

    Full Text Available Bones act as a mineral storage reservoir for calcium and phosphorus. Proper well grown bones give a perfect posture to the human body. In other case, if the bone has an improper growth, it might lead to an abnormal posture or an awkward posture. Scoliosis is a condition where the scoliotic vertebrae are wedge shaped and differ with the shape of normal vertebrae. Treatment for scoliosis depends on Cobb angle which can be measured using spine X-rays. Recent development in the medical imaging techniques brought us to a new research area in image processing which includes medical image enhancement, detailed visualization of internal organs & tissues and edge detection. Bone edges are important feature in an X-ray image. The purpose of application of segmentation in medical imaging is to develop a detailed framework on human anatomy, whose primary objective is to outline the anatomical structures. Whereas edge detection is a technique which extracts vital features like corners, lines, angles and curves from an image. In this study, we are going to deal with the edge detection technique on scoliotic vertebrae. The objective of this paper is to compare the performance of edge detectors using filters and operators.

  11. On the optical properties of wedge-shaped thin films of Ag-photodoped As 30S 70 glass

    Science.gov (United States)

    Márquez, E.; Ramirez-Malo, J. B.; Fernández-Peña, J.; Jiménez-Garay, R.; Ewen, P. J. S.; Owen, A. E.

    1993-07-01

    Thin films of a-As 30S 70 prepared by thermal evaporation were photodoped with Ag. The optical transmission was measured over the 0.3 to 2.0 μm spectral region in order to derive the refractive index and absorption coefficient of these Ag-photodoped chalcogenide films. Furthermore, the analytical expressions proposed by Swanepoel, enabling the calculation of the optical constants of a thin film with non-uniform thickness, have successfully been applied. In addition, thickness measurements made by a surface-profiling stylus were also carried out to cross-check the results corresponding to the envelope method. On the other hand, the dispersion of n was discussed in terms of the single-oscillator Wemple and DiDomencio model. Finally, the value of the optical band gap decreased from 2.47 eV in the case of the undoped films down to 1.91 eV in the almost saturated Ag-photodoped films. It is plausible that the decrease in Eoptg by the incorporation of Ag arises from the smaller binding energy of Ag-S and As-As bonds compared to that of As-S bonds.

  12. Interference of wedge-shaped protrusions on the faces of a Griffith crack in biaxial stress. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, J.A.M. [Tennessee Univ., Knoxville, TN (United States)

    1992-04-01

    An initial investigation of the influence of protrusion interference on the fracture toughness required to prevent unstable propagation of a Griffith crack in a brittle material is described. The interference is caused by relative shear displacement of the crack faces when subjected to remote biaxial stress with neither principal stress parallel to the crack. It is shown that for room temperature cracks smaller than about one centimeter in silicon carbide, or about one millimeter in silicon nitride, the presence of interference changes the fracture stress. A mathematical model based on linear elasticity solutions and including multiple interference sites at arbitrarily specified positions on the crack is presented. Computations of the change in required fracture toughness and its dependence on wedge geometry (size and vertex angle), applied stresses (orientation and magnitude), and location of the interference site are discussed. Results indicate that a single interference site has only a slight effect on required toughness. However, the influence of interference increases monotonically with the number of interference sites. The two-dimensional model described herein is not accurate when the interference sites are closely spaced.

  13. The study of the wedge-shaped vibration-driven robot motion in a viscous fluid forced by different oscillation laws of the internal mass

    Science.gov (United States)

    Nuriev, A. N.; Zakharova, O. S.; Zaitseva, O. N.; Yunusova, A. I.

    2016-11-01

    A rectilinear motion of a two-mass system in a viscous incompressible fluid is considered. The system consists of a shell having the form of an equilateral triangular cylinder and a movable internal mass. The motion of the system as a whole is forced by longitudinal oscillations of the internal mass relative to the shell. This mechanical system simulates a vibration-driven robot, i.e. a mobile device capable to move in a resistive medium without external moving parts. Investigation of the system is carried out by a direct numerical simulation. A comparative analysis of the characteristics of the motion and flow regimes around the vibration-driven robot is carried out for different internal mass oscillation laws.

  14. The research advances about etiology of Wedge-shaped defec%楔状缺损病因研究进展

    Institute of Scientific and Technical Information of China (English)

    牛一山; 孟秀英

    2007-01-01

    楔状缺损是发生在牙颈部硬组织的缺损,好发于中老年人.其病因学的研究,自20世纪80年代有了很大的进展.目前普遍的观点认为,楔状缺损是(胎)力、机械磨损及酸蚀和时间等因素共同作用的结果.本文结合国内外学者的研究成果,对此进行回顾和综述.

  15. 检测GIS局部放电的小型准TEM喇叭天线%Minitype Quasi-TEM Horn Antenna for Partial Discharge Detection in GIS

    Institute of Scientific and Technical Information of China (English)

    张晓星; 谌阳; 唐俊忠; 文习山

    2011-01-01

    An outer-positioned small quasi-TEM horn antenna sensor was designed and constructed for detecting the partial discharge in gas insulation substations (GIS), which could expediently receive the electromagnetic wave leaked from the basin type insulator, and effectively suppress low frequency electromagnetic interference from sur- roundings. Certain effective structures such as dielectric filled horn, wedge-shaped substrate and backing cavity were utilized to miniaturize during the antenna design process so as to optimize standing-wave ratio characteristics. The model calculation and experimental data measured in the laboratory shows that the antenna possesses a good radia- ting performance and a multi-band property when working in the ultrahigh frequency (UHF) band. The partial dis- charge was tested in the device of imitation GIS defect, detected by TEM horn antenna and existing microstrip patch antenna concurrently, then, the measurement results were compared.%为克服目前气体绝缘组合电器(GIS)局部放电检测外置传感器的缺点,设计了一种外置小型准TEM喇叭天线传感器,它采用介质填充、楔形立体微带和背腔结构优化等技术手段,既可使喇叭天线小型化,又能得到优良的驻波比特性,可方便地从盆式绝缘子处接收局部放电产生的电磁泄漏信号,并能有效抑制周围空间低频电磁干扰。理论计算和实验室实测特性数据表明,该宽带天线在超高频(UHF)频段内,有较好的检测性能,并具有多频段选择特性。最后,在实验室GIS模拟缺陷装置上,将TEM喇叭天线与已有的微带贴片天线进行了局放测量效果的对比。

  16. 玻璃离子联合光固化树脂修复楔状缺损疗效观察%Treatment of Wedge-shaped Defect with Glass Ionomer Cement and Unset Dental Composites

    Institute of Scientific and Technical Information of China (English)

    刘明卫

    2010-01-01

    目的 观察玻璃离子联合光固化树脂修复楔状缺损的临床疗效.方法 用玻璃离子联合光固化树脂修复楔状缺损180颗患牙.结果 成功率89.46%.结论 玻璃离子联合光固化树脂修复楔状缺损,临床疗效良好.

  17. A Clinical Evaluation of Composite Resin and Amalgam Restoring Wedge-Shaped Defects in Elderly%复合树脂与银汞合金充填老年人楔状缺损的临床效果

    Institute of Scientific and Technical Information of China (English)

    张玉幸; 张廷发; 张卫红

    2009-01-01

    目的 比较光固化复合树脂与银汞合金充填老年人前磨牙楔状缺损的初期临床效果.方法 临床选择65岁以上老年患者72例共190颗楔状缺损患牙,随机分为2组,分别采用光固化复合树脂充填、预备Ⅴ类洞银汞合金充填.充填修复后6个月、12个月评价其临床疗效.用χ2检验对临床评价结果 进行统计学分析.结果 36例患者共98颗楔状缺损患牙采用光固化复合树脂充填者有8颗患牙修复失败,82颗楔状缺损患牙采用银汞合金充填者有6颗患牙修复失败.结论 对于老年人的前磨牙楔状缺损,光固化复合树脂充填与银汞合金充填均能获得良好的临床效果.

  18. CLINICAL EFFICACY OF FLOWABLE COMPOSITE RESIN FILLING SHALLOW AND NARROW WEDGE-SHAPED DEFECTS%流动复合树脂充填浅窄形楔状缺损的临床疗效观察

    Institute of Scientific and Technical Information of China (English)

    冯志萍

    2012-01-01

    目的 观察FiltekTMZ350纳米流动复合树脂充填浅窄形楔状缺损的临床疗效.方法 选择2008年1月至2009年12月来广州市番禺区中心医院就诊的深度和宽度均不超过2 mm的症状敏感且比较接近的左右两侧上颌或下颌前磨牙楔状缺损患者46例(92颗患牙),随机选择一侧作为试验组,采用FiltekTMZ350纳米流动树脂修复;另一侧作为对照组,采用FiltekTMZ350复合树脂充填,两组均使用自酸蚀黏结剂.对治疗后12个月、24个月患牙的效果进行临床评价.结果 试验组治疗后12个月、24个月患牙的成功率分别为95.7%、89.1%,对照组的成功率分别为93.5%、84.8%,两组疗效比较,P值均大于0.05,没有统计学意义.结论 FiltekTMZ350纳米流动树脂充填浅窄形楔状缺损可获得较好的临床疗效.

  19. Clinical Evaluation of Flowable Composite Resin as a Cave Liner Used in Wedge-shaped Defects Restoration%流动树脂洞衬材料治疗楔状缺损的效果观察

    Institute of Scientific and Technical Information of China (English)

    曾颖怀; 江丽; 曾雄群

    2010-01-01

    目的 观察流动树脂洞衬材料对楔状缺损修复效果的影响.方法 选择深度、大小、症状接近的左右两侧下颌第一前磨牙楔状缺损患者40例,随机选择一侧作为A组,采用流动树脂衬洞、复合树脂充填;另一侧作为B组,采用复合树脂直接充填, 2组均使用自酸蚀粘接剂.用视觉模拟标尺法(visual analogue scale,VAS)评价治疗前、治疗后即刻、治疗后6个月、治疗后12个月患牙对冷刺激的敏感度;用改良的美国公共卫生署(United States Public Health Service,USPHS)评价系统对患牙充填后6、 12个月的效果进行临床评价.结果 治疗前A组与B组患牙敏感度差异无统计学意义(P>0.05);治疗后即刻、治疗后6、 12个月,A组对冷刺激的敏感度分别为1.65±0.86、 1.26±0.64、 1.26±0.74;B组对冷刺激的敏感度分别为2.55±1.04、 2.03±0.85、 1.83±0.79;2组治疗前与治疗后差异均有统计学意义(P<0.01); 2组间在治疗后3次检查时敏感度的差异均有统计学意义(P<0.01); A组与B组间成功率差异无统计学意义(P>0.05).结论 采用流动树脂衬洞、复合树脂充填修复楔状缺损,可有效降低患牙术后敏感度.

  20. Observation of efficacy of flowable composite restoring dental wedge-shaped defects%流动复合树脂修复楔状缺损的疗效观察

    Institute of Scientific and Technical Information of China (English)

    姚江江

    2008-01-01

    目的 总结流动复合树脂修复楔状缺损的临床应用效果.方法 收集471例楔状缺损患牙,随机分成3组,分别用玻璃离子水门汀、复合体、流动复合树脂充填修复,观察一年后的疗效.结果 玻璃离子水门汀组成功率为81.53%,复合体组成功率为90.45%,流动复合树脂组成功率为92.36%,后两组疗效无显著性差异,但与玻璃离子组有显著性差异.结论 流动复合树脂是一种较理想的楔状缺损充填材料.

  1. 两种材料修复楔状缺损的临床效果评价%An evaluation of the clinical effect of materials used for restoring dental wedge-shaped ditch

    Institute of Scientific and Technical Information of China (English)

    文萍

    2002-01-01

    目的:采用改良USPHS系统评估光凝单组分复合体(Dyract)和光固化复合树脂(TpHTM)修复楔状缺损的临床疗效.方法:门诊使用修复Dyract楔缺牙328颗,用TPHTM修复楔缺牙278颗.使用改良USPHS系统对1年及3年的随访结果进行评估.结果:Dyract组1年成功率91.15%,3年成功率88.41%;TPHTM组1年成功率60.07%,3年成功率57.19%.两组成功率相比有显著性差异.按USPHS评估系统逐条分析发现两组仅在边缘着色方面无显著性差异,其他各项Dyract均优于TPHTM.结论:本项研究显示Dyract在修复楔缺方面明显优于TPHTM组.楔缺的程度对Dyract的修复成功率有显著影响,对TPHTM无显著影响.改良USPHS系统对临床疗效的评估极具价值.

  2. A clinical study on cavities' preparation of subgingival wedge-shape defects using Er:YAG laser%Er:YAG激光在龈下楔状缺损治疗中的临床应用

    Institute of Scientific and Technical Information of China (English)

    朱文昊; 王世明; 张成飞

    2010-01-01

    目的 评价Er:YAG激光在治疗龈下楔状缺损中的应用.方法 选择有两个洞缘位于龈下1mm~2mm的楔状缺损患牙的患者共20例.对照组以车针预备窝洞,电刀切除牙龈的方法进行牙体预备,实验组以Er:YAG激光预备窝洞并同时切除牙龈的方法完成预备.以VAS评分记录术中不舒适程度,术后随访12个月检查充填体情况.结果 试验组VAS平均值为42.3±12.1,对照组VAS平均值为61.1±17.0,两组间差异有显著性(P<0.01).术后1周,对照组有1例发生龈退缩.12个月,试验组和对照组分别有2例和3例出现边缘不密合和边缘着色(P>0.05).结论 激光行龈下楔状缺损牙体预备的方法可以有效减轻术中不适,对充填体质量无副作用.

  3. True Detective

    OpenAIRE

    Gajhede, Andreas, Westmark; Bantoulidis, Georgios

    2016-01-01

    This paper examines the HBO’s television-series True Detective, a 2014 crime drama, attempting to point out the central elements of detective-fiction, to be found in its narrative. True Detective narrative is a heavy text with a number of references from various well-known, non-adjacent texts within the field of weird fiction, horror fiction and detective fiction. Therefore, the case study of this research will focus on narratological and literary analysis, in order to discover the predominan...

  4. Supernova detection

    Energy Technology Data Exchange (ETDEWEB)

    Nakahata, Masayuki [Kamioka Observatory, Institute for Cosmic Ray research, University of Tokyo, Higashi-Mozumi, Kamioka-cho, Hida-shi, Gifu, Japan, 506-1205 (Japan)], E-mail: nakahata@suketto.icrr.u-tokyo.ac.jp

    2008-11-01

    The detection of supernova neutrinos is reviewed, focusing on the current status of experiments to detect supernova burst neutrinos and supernova relic neutrinos. The capabilities of each detector currently operating and in development are assessed and the likely neutrino yield for a future supernova is estimated. It is expected that much more information will be obtained if a supernova burst were to occur in our Galaxy than was obtained for supernova SN1987A. The detection of supernova relic neutrinos is considered and it is concluded that a large volume detector with a neutron tagging technique is necessary.

  5. Arteriosclerosis Detection

    Science.gov (United States)

    1976-01-01

    The Veterans Administration Hospital used computer image-processing techniques to detect arteriosclerosis. Originally developed by Goddard Space Flight Center engineers to enhance spacecraft pictures, this device replaced the previous testing for this disease which was extremely painful and time consuming. With this instrument, computer detected edges are shown along with an estimate of location of pre-arteriosclerosis vessel wall. The difference between the two represents the relative amount of disease in the blood vessel. Instrumentation will be expanded again in 1976 to analyze the coronary arteries and the blood vessels of the retina.

  6. Malware Detection

    CERN Document Server

    Christodorescu, Mihai; Maughan, Douglas

    2007-01-01

    Shared resources, such as the internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures are achieved by malicious code or malware, such as viruses and worms. This book captures the research in the area of malicious code detection, prevention and mitigation.

  7. Detection device

    Science.gov (United States)

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  8. Radar detection

    CERN Document Server

    DiFranco, Julius

    2004-01-01

    This book presents a comprehensive tutorial exposition of radar detection using the methods and techniques of mathematical statistics. The material presented is as current and useful to today's engineers as when the book was first published by Prentice-Hall in 1968 and then republished by Artech House in 1980. The book is divided into six parts.

  9. Animal Detectives

    Science.gov (United States)

    Mulvey, Bridget; Warnock, Carly

    2015-01-01

    During a two-week inquiry-based 5E learning cycle unit, children made observations and inferences to guide their explorations of animal traits and habitats (Bybee 2014). The children became "animal detectives" by studying a live-feed webcam and digital images of wolves in their natural habitat, reading books and online sources about…

  10. Fingerprint detection

    Energy Technology Data Exchange (ETDEWEB)

    Saunders, G.C.

    1992-01-07

    This patent describes a method for detection and visualization of latent fingerprints. It comprises contacting a substrate containing a latent print thereon the a colloidal metal composition at a pH from about 2.5 to about 4.0 for time sufficient to allow reaction of the colloidal metal composition with the latent print; and, preserving or recording the observable print.

  11. Animal Detectives

    Science.gov (United States)

    Mulvey, Bridget; Warnock, Carly

    2015-01-01

    During a two-week inquiry-based 5E learning cycle unit, children made observations and inferences to guide their explorations of animal traits and habitats (Bybee 2014). The children became "animal detectives" by studying a live-feed webcam and digital images of wolves in their natural habitat, reading books and online sources about…

  12. Edge Detection,

    Science.gov (United States)

    1985-09-01

    PROJECT. T ASK0 Artificial Inteligence Laboratory AREA It WORK UNIT NUMBERS V 545 Technology Square ( Cambridge, HA 02139 I I* CONTOOL1LIN@4OFFICE NAME...ARD-A1t62 62 EDGE DETECTION(U) NASSACNUSETTS INST OF TECH CAMBRIDGE 1/1 ARTIFICIAL INTELLIGENCE LAB E C HILDRETH SEP 85 AI-M-8 N99SI4-8S-C-6595...used to carry out this analysis. cce~iO a N) ’.~" D LI’BL. P p ------------ Sj. t i MASSACHUSETTS INSTITUTE OF TECHNOLOGY i ARTIFICIAL INTELLIGENCE

  13. Smoke detection

    Energy Technology Data Exchange (ETDEWEB)

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2016-09-06

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  14. Smoke detection

    Science.gov (United States)

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2015-10-27

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  15. Space Detectives

    Science.gov (United States)

    Tyszka, Steph; Saraiva, Jose; Doran, Rosa

    2017-04-01

    NUCLIO is a Portuguese non-profit organization with a strong record of investing in science education and outreach. We have developed and implemented many activities mostly directed to a young audience, in a bid to awaken and reinforce the interest that young people devote to Astronomy and all things spatial. In this framework, we have created a week-long program called Space Detectives, supported by the Municipality of Cascais, based on a story-line that provided a number of challenges and opportunities for learning matters as diverse as the electro-magnetic spectrum, means of communication, space travel, the martian environment, coding and robotics. We report on the first session that took place in December 2016. We had as participants several kids aged 9 to 12, with a mixed background in terms of interest in the sciences. Their response varied from enthusiastic to somewhat less interested, depending on the nature of the subject and the way it was presented - a reaction not necessarily related to its complexity. This week was taken as something of a trial run, in preparation for the European Commission- funded project "Stories of Tomorrow", to be implemented in schools. The individual activities and the way they were related to the story-line, as well as the smooth transition from one to the next, were subject to an analysis that will allow for improvements in the next installments of this program. We believe this is an excellent approach to the goals of using Space and Astronomy as an anchor for generating and keeping interest in the scientific areas, and of finding new and richer ways of learning.

  16. Evaluating Edge Detection through Boundary Detection

    Directory of Open Access Journals (Sweden)

    Wang Song

    2006-01-01

    Full Text Available Edge detection has been widely used in computer vision and image processing. However, the performance evaluation of the edge-detection results is still a challenging problem. A major dilemma in edge-detection evaluation is the difficulty to balance the objectivity and generality: a general-purpose edge-detection evaluation independent of specific applications is usually not well defined, while an evaluation on a specific application has weak generality. Aiming at addressing this dilemma, this paper presents new evaluation methodology and a framework in which edge detection is evaluated through boundary detection, that is, the likelihood of retrieving the full object boundaries from this edge-detection output. Such a likelihood, we believe, reflects the performance of edge detection in many applications since boundary detection is the direct and natural goal of edge detection. In this framework, we use the newly developed ratio-contour algorithm to group the detected edges into closed boundaries. We also collect a large data set ( of real images with unambiguous ground-truth boundaries for evaluation. Five edge detectors (Sobel, LoG, Canny, Rothwell, and Edison are evaluated in this paper and we find that the current edge-detection performance still has scope for improvement by choosing appropriate detectors and detector parameters.

  17. Comparison of intravenous urography and magnetic resonance urography in preoperative evaluation of pelvi-ureteric junction obstruction in children.

    Science.gov (United States)

    Sharma, Alok; Sodhi, Kushaljit Singh; Saxena, Akshay Kumar; Bhatia, Anmol; Menon, Prema; Rao, Katragadda L N; Khandelwal, Niranjan

    2016-01-01

    To compare intravenous urography (IVU) and magnetic resonance urography (MRU) in the preoperative evaluation of pelvi-ureteric junction obstruction (PUJO) in children. A total of 35 children up to 10 years of age in whom unilateral or bilateral PUJO were suspected on ultrasonography were enrolled in this prospective study. All children underwent IVU and MRU, and the findings were compared. Of the 70 kidneys evaluated, 14 (20%) were not visualized on IVU because of nonexcretion of contrast, whereas all the 70 (100%) kidneys were visualized on MRU. On IVU, nephrogram was not visualized in 66 (94.2%) of the 70 kidneys, whereas MRU showed prompt and homogeneous nephrogram in 68 (97.1%) of the 70 kidneys. No evidence of PUJO was seen in 31 (44.2%) kidneys on both IVU and MRU. IVU showed PUJO in 26 (37.1%) kidneys, whereas MRU showed it in 38 (54.2%) kidneys. MRU detected two duplex systems that were missed on IVU. A focal renal lesion and two incidental extra renal abnormalities were detected on MRU, which were not visualized on IVU. MRU is better than IVU, especially in case of poorly functioning kidneys which are not visualized on IVU. MRU also provides anatomic details of the ureter and vessels with better evaluation of renal parenchyma. It also has an additional advantage of detecting incidental extra renal abnormalities, if present.

  18. Detection of Terahertz Radiation

    DEFF Research Database (Denmark)

    2015-01-01

    The present invention relates to a system for detecting terahertz radiation, a camera device, and a method for detecting terahertz radiation.......The present invention relates to a system for detecting terahertz radiation, a camera device, and a method for detecting terahertz radiation....

  19. On Edge Detection,

    Science.gov (United States)

    1984-08-01

    T. 0. "On boundary detection." A. I. Memo 183, MIT, 1980. Hildreth, E. C. "Implementation of a theory of edge detection ." A. /. Memo 579, MIT, 1980...Detection." IEEE Trans. PAMI, 6, 678-680, 1983. Marr, 0. C. and Hildreth, E. C, " Theory of edge detection ." Proc. R. Soc. Lond. B, 207, 187-217, 1980. Marr

  20. Outlier detection using autoencoders

    CERN Document Server

    Lyudchik, Olga

    2016-01-01

    Outlier detection is a crucial part of any data analysis applications. The goal of outlier detection is to separate a core of regular observations from some polluting ones, called “outliers”. We propose an outlier detection method using deep autoencoder. In our research the invented method was applied to detect outlier points in the MNIST dataset of handwriting digits. The experimental results show that the proposed method has a potential to be used for anomaly detection.

  1. CT findings of acute pyelonephritis and clinical correlation

    Energy Technology Data Exchange (ETDEWEB)

    Rha, Sung Eun; Byun, Jae Young; Kim, Ki Jun; Kim, Jong Kyu; Kim, Han Bock; Chun, Ho Jong; Bang, Byung Gi; Choi, Kyu Ho; Shinn, Kyung Sub [Catholic Univ. College of Medicine, Seoul (Korea, Republic of)

    1997-02-01

    To evaluate postcontrast CT findings of acute pyelonephritis and correlate these with clinical findings and severities. We retrospectively reviewed the medical records and CT scans of 50 patients with abnormal CT findings among 52 patients of acute pyelonephritis whose postcontrast CT scans had been examined. Fifty cases of acute pyelonephritis were classified into three subgroups on the basis of postcontrast CT findings : Group 1(n=20, 40%) wedge-shaped lesions; Group 2(n=13, 26%) mass-like lesions; Group 3 (n=17, 34%) renal abscess formation. In each group, clinical findings and severity were analyzed and correlated with CT findings. The results were statistically analyzed. Although mean values of clinical parameters of group 1 were lower than those of group 2 and 3 with regard to all clinical parameters (including maximal temperature and duration of fever, flank pain, leukocytosis, and admission period), there was no statistically significant correlation among the three groups (p > 0.05). All cases were successfully treated with antibiotics only, despite the high rate of abscess formation (34%). Acute pyelonephritis spans a continuum of CT findings of varying severity from wedge-shaped or mass-like lesions to multifocal abscesses; postenhanced CT scan shows high sensitivity (96%) in the detection of acute pyelonephritis. Although the clinical course of groups of mass-like lesions and abscess formation was longer and more severe than that of wedge-shaped lesions, there was no statistically significant clinicoradiologic correlation among the three groups.

  2. Revolution in Detection Affairs

    Energy Technology Data Exchange (ETDEWEB)

    Stern W.

    2013-11-02

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  3. Lighting detectives forum

    DEFF Research Database (Denmark)

    Bülow, Katja; Skindbjerg Kristensen, Lisbeth

    2003-01-01

    Belysning for boligområder var emnet for lighting detectives forum, der blev afholdt i Stockholm i august 2003.......Belysning for boligområder var emnet for lighting detectives forum, der blev afholdt i Stockholm i august 2003....

  4. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  5. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  6. Enzyme detection by microfluidics

    DEFF Research Database (Denmark)

    2013-01-01

    Microfluidic-implemented methods of detecting an enzyme, in particular a DNA-modifying enzyme, are provided, as well as methods for detecting a cell, or a microorganism expressing said enzyme. The enzyme is detected by providing a nucleic acid substrate, which is specifically targeted...

  7. Enzyme detection by microfluidics

    DEFF Research Database (Denmark)

    2013-01-01

    Microfluidic-implemented methods of detecting an enzyme, in particular a DNA-modifying enzyme, are provided, as well as methods for detecting a cell, or a microorganism expressing said enzyme. The enzyme is detected by providing a nucleic acid substrate, which is specifically targeted...... by that enzyme...

  8. Autonomous Forest Fire Detection

    NARCIS (Netherlands)

    Breejen, E. den; Breuers, M.; Cremer, F.; Kemp, R.A.W.; Roos, M.; Schutte, K.; Vries, J.S. de

    1998-01-01

    Forest fire detection is a very important issue in the pre-suppression process. Timely detection allows the suppression units to reach the fire in its initial stages and this will reduce the suppression costs considerably. The autonomous forest fire detection principle is based on temporal contrast

  9. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  10. Explicit Content Image Detection

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Marcial Basilio

    2011-02-01

    Full Text Available This paper proposes a system gives for explicit content image detection based on Computer VisionAlgorithms, pattern recognition and FTK software Explicit Image Detection. In the first stage, HSV colormodel is used for the input images for the purpose of discriminating elements that are not human skinimages. Then the image is filtered using skin detection. The output image only contains the areas of whichit is composed. The results show a comparison between the proposed system and the company softwareAccess Data called Forensic Toolkit 3.1 Explicit Image Detection isperformed.

  11. Explicit Content Image Detection

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Marcial Basilio

    2010-12-01

    Full Text Available This paper proposes a system gives for explicit content image detection based on Computer Vision Algorithms, pattern recognition and FTK software Explicit Image Detection. In the first stage, HSV color model is used for the input images for the purpose of discriminating elements that are not human skin images. Then the image is filtered using skin detection. The output image only contains the areas of which it is composed. The results show a comparison between the proposed system and the company software Access Data called Forensic Toolkit 3.1 Explicit Image Detection isperformed.

  12. Can Gravitons Be Detected?

    CERN Document Server

    Rothman, T; Boughn, Stephen; Rothman, Tony

    2006-01-01

    Freeman Dyson has questioned whether any conceivable experiment in the real universe can detect a single graviton. If not, is it meaningful to talk about gravitons as physical entities? We attempt to answer Dyson's question and find it is possible concoct an idealized thought experiment capable of detecting one graviton; however, when anything remotely resembling realistic physics is taken into account, detection becomes impossible, indicating that Dyson's conjecture is very likely true. We also point out several mistakes in the literature dealing with graviton detection and production.

  13. Detecting Illicit Nuclear Materials

    Energy Technology Data Exchange (ETDEWEB)

    Kouzes, Richard T.

    2005-09-01

    The threat that weapons of mass destruction might enter the United States has led to a number of efforts for the detection and interdiction of nuclear, radiological, chemical, and biological weapons at our borders. There have been multiple deployments of instrumentation to detect radiation signatures to interdict radiological material, including weapons and weapons material worldwide.

  14. Turbo Multiuser Detection Architectures

    NARCIS (Netherlands)

    Heinen, Gerben

    2003-01-01

    The discovery of Turbo Codes in 1996 by Berrou et. al. proved to be a huge boost for the research of channel coding. The Turbo Principle behind turbo codes was found to be applicable in other areas. One of these areas is Multiuser Detection. In this thesis, Turbo Multiuser Detection is investigated

  15. Lean blowoff detection sensor

    Science.gov (United States)

    Thornton, Jimmy; Straub, Douglas L.; Chorpening, Benjamin T.; Huckaby, David

    2007-04-03

    Apparatus and method for detecting incipient lean blowoff conditions in a lean premixed combustion nozzle of a gas turbine. A sensor near the flame detects the concentration of hydrocarbon ions and/or electrons produced by combustion and the concentration monitored as a function of time are used to indicate incipient lean blowoff conditions.

  16. Array for detecting microbes

    Energy Technology Data Exchange (ETDEWEB)

    Andersen, Gary L.; DeSantis, Todd D.

    2014-07-08

    The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

  17. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  18. Fraud detection tools

    Directory of Open Access Journals (Sweden)

    Katerina Hawlova

    2013-10-01

    Full Text Available This article aims to introduce to readers the topic of fraud management – detection of fraudulent behaviour. The article is divided into two parts. The first part presents what is meant by fraud and fraudulent behaviour. In the second part a case study dealing with fraudulent behaviour detection in the procurement area is introduced.

  19. The effects of retentive form and different self-etching primer on restoring teeth with wedge shaped ditch using light-cured materials%固位形及粘结剂种类对楔状缺损树脂修复的影响

    Institute of Scientific and Technical Information of China (English)

    谢咏梅; 宋子元; 丁觉非

    2009-01-01

    目的 比较修复楔状缺损时制备固位形及不同粘结剂对临床疗效的影响.方法 选择口内至少4颗楔状缺损的患者89例,609颗患牙,同一患者分别采用四种方法修复患牙(固位形+两步法自酸蚀牙本质粘结系统Clearfil SE Bond;固位形+一步法自酸蚀牙本质粘结系统iBond;无固位形+两步法自酸蚀牙本质粘结系统Clearfil SE Bond;无固位形+一步法自酸蚀牙本质粘结系统iBond),采用自身对照的方法进行为期1年的临床观察.结果 固位形组的成功率明显高于无固位形组,两者差异有统计学意义;无固位形组中两步法自酸蚀牙本质粘结系统Clearfil SE Bond组的成功率高于一步法自酸蚀牙本质粘结系统iBond组,两者差异有统计学意义,但二者在边缘密闭性和术后敏感方面差异没有统计学意义.结论 修复楔状缺损时,制备固位形有助于提高疗效;两步法自酸蚀牙本质粘结系统Clearfil SE Bond较一步法自酸蚀牙本质粘结系统iBond具有更高的粘结强度.

  20. Analogue MIMO Detection

    Directory of Open Access Journals (Sweden)

    McNamara Darren

    2006-01-01

    Full Text Available In this contribution we propose an analogue receiver that can perform turbo detection in MIMO systems. We present the case for a receiver that is built from nonlinear analogue devices, which perform detection in a "free-flow" network (no notion of iterations. This contribution can be viewed as an extension of analogue turbo decoder concepts to include MIMO detection. These first analogue implementations report reductions of few orders of magnitude in the number of required transistors and in consumed energy, and the same order of improvement in processing speed. It is anticipated that such analogue MIMO decoder could bring about the same advantages, when compared to traditional digital implementations.

  1. Anomaly Detection in Sequences

    Data.gov (United States)

    National Aeronautics and Space Administration — We present a set of novel algorithms which we call sequenceMiner, that detect and characterize anomalies in large sets of high-dimensional symbol sequences that...

  2. Light Detection And Ranging

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — LiDAR (Light Detection and Ranging) discrete-return point cloud data are available in the American Society for Photogrammetry and Remote Sensing (ASPRS) LAS format....

  3. Quantum detection of wormholes

    National Research Council Canada - National Science Library

    Carlos Sabín

    2017-01-01

      We show how to use quantum metrology to detect a wormhole. A coherent state of the electromagnetic field experiences a phase shift with a slight dependence on the throat radius of a possible distant wormhole...

  4. Sulphur hexafluoride gas detection

    CSIR Research Space (South Africa)

    Stolper, R

    2006-02-01

    Full Text Available This poster describes the development process of an electro-optical based solution for detecting and locating SF6 gas leaks at gas insulated switch gear. The principal technologies that were researched are explained with their advantages...

  5. Light Detection And Ranging

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — LiDAR (Light Detection and Ranging) discrete-return point cloud data are available in the American Society for Photogrammetry and Remote Sensing (ASPRS) LAS format....

  6. Sensor for metal detection

    KAUST Repository

    Kodzius, Rimantas

    2014-06-26

    NOVELTY - The sensor has a microfluidic flow channel that is provided with an inlet port, an outlet port, and a detection chamber. The detection chamber is provided with a group of sensing electrodes (4) having a working electrode (8), a counter electrode (9), and a reference electrode (10). A flow sensor is configured to measure flow in the channel. A temperature sensor (6) is configured to measure temperature in the channel (3). An electrical connection is configured to connect the sensor to a sensing device. USE - Sensor for detecting metal such as toxic metal in sample such as clinical sample such as stool, saliva, sputum, bronchial lavage, urine, vaginal swab, nasal swab, biopsy, tissue, tears, breath, blood, serum, plasma, cerebrospinal fluid, peritoneal fluid, pleural fluid, pericardial fluid, joint fluid, and amniotic fluid, water sample, food sample, air sample, and soil sample (all claimed). ADVANTAGE - The sensor for use with the portable analytical instrument is configured for detection of metalsin samples. The sensor can provide the excellent solution for on-site metal detection, including heavy metal detection. The sensors can provide significant advantages in higher throughput, lower cost, at the same time being less labor intensive and less dependent on individual skills. The disposable design of the sensor, the enhanced reliability and repeatability of measurements can be obtained. The sensors can be widely applied in various industries. DETAILED DESCRIPTION - INDEPENDENT CLAIMS are included for the following: (1) a system for detecting metal in sample; and (2) a method for using sensor for detecting metal in sample. DESCRIPTION OF DRAWING(S) - The drawing shows a schematic view of the sensor prototype. Channel (3) Sensing electrodes (4) Temperature sensor (6) Working electrode (8) Counter electrode (9) Reference electrode (10)

  7. Emotion Detection from Text

    CERN Document Server

    Shivhare, Shiv Naresh

    2012-01-01

    Emotion can be expressed in many ways that can be seen such as facial expression and gestures, speech and by written text. Emotion Detection in text documents is essentially a content - based classification problem involving concepts from the domains of Natural Language Processing as well as Machine Learning. In this paper emotion recognition based on textual data and the techniques used in emotion detection are discussed.

  8. Lead Poison Detection

    Science.gov (United States)

    1976-01-01

    With NASA contracts, Whittaker Corporations Space Science division has developed an electro-optical instrument to mass screen for lead poisoning. Device is portable and detects protoporphyrin in whole blood. Free corpuscular porphyrins occur as an early effect of lead ingestion. Also detects lead in urine used to confirm blood tests. Test is inexpensive and can be applied by relatively unskilled personnel. Similar Whittaker fluorometry device called "drug screen" can measure morphine and quinine in urine much faster and cheaper than other methods.

  9. Scaling up Copy Detection

    OpenAIRE

    Li, Xian; Dong, Xin Luna; Lyons, Kenneth B.; Meng, Weiyi; Srivastava, Divesh

    2015-01-01

    Recent research shows that copying is prevalent for Deep-Web data and considering copying can significantly improve truth finding from conflicting values. However, existing copy detection techniques do not scale for large sizes and numbers of data sources, so truth finding can be slowed down by one to two orders of magnitude compared with the corresponding techniques that do not consider copying. In this paper, we study {\\em how to improve scalability of copy detection on structured data}. Ou...

  10. Methods of Endotoxin Detection.

    Science.gov (United States)

    Su, Wenqiong; Ding, Xianting

    2015-08-01

    Endotoxin, present in the outer membrane of all gram-negative bacteria, can pose serious risks to human health, from irreversible shock to death. Therefore, it is essential to develop sensitive, accurate, and rapid methods for its detection. The rabbit pyrogen test is the first standard technique for endotoxin detection and, nowadays, has been replaced by the Limulus Amoebocyte Lysate test, which is the most popular detection technique for endotoxin. With in-depth understanding of endotoxin, biosensors based on endotoxin-sensing components are promising alternatives to pursue in developing low-cost, easy-operation, and fast-response endotoxin detection techniques. This article summarizes the recent advances of endotoxin detection methods with a particular emphasis on optical and electrochemical biosensors based on various sensing elements ranging from nature biomolecules to artificial materials. As the research and technological revolution continues, the highly integrated and miniaturized commercial devices for sensitively and reliably detecting endotoxin will provide a wide range of applications in people's daily life.

  11. Survey of Text Plagiarism Detection

    Directory of Open Access Journals (Sweden)

    Albaraa Abuobieda

    2012-06-01

    Full Text Available In this paper we are going to review and list the advantages and limitations of the significant effective techniques employed or developed in text plagiarism detection.  It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text. This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.

  12. Proactive malware detection

    Science.gov (United States)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  13. Changing change detection

    DEFF Research Database (Denmark)

    Kyllingsbæk, Søren; Bundesen, Claus

    2009-01-01

    The change detection paradigm is a popular way of measuring visual short-term memory capacity. Using the paradigm, researchers have found evidence for a capacity of about four independent visual objects, confirming classic estimates that were based on the number of items that could be reported....... Here, we determine the reliability of capacity measures found by change detection. We derive theoretical predictions of the variance of the capacity estimates and show how they depend on the number of items to be remembered and the guessing strategy of the observer. We compare the theoretically derived...... variance to the variance estimated over repeated blocks of trials with the same observer and find close correspondence between predicted and observed variances. Also, we propose a new version of the two-alternative choice change detection paradigm, in which the choice is unforced. This new paradigm reduces...

  14. Quantum detection of wormholes.

    Science.gov (United States)

    Sabín, Carlos

    2017-04-06

    We show how to use quantum metrology to detect a wormhole. A coherent state of the electromagnetic field experiences a phase shift with a slight dependence on the throat radius of a possible distant wormhole. We show that this tiny correction is, in principle, detectable by homodyne measurements after long propagation lengths for a wide range of throat radii and distances to the wormhole, even if the detection takes place very far away from the throat, where the spacetime is very close to a flat geometry. We use realistic parameters from state-of-the-art long-baseline laser interferometry, both Earth-based and space-borne. The scheme is, in principle, robust to optical losses and initial mixedness.

  15. Forensic audio watermark detection

    Science.gov (United States)

    Steinebach, Martin; Zmudzinski, Sascha; Petrautzki, Dirk

    2012-03-01

    Digital audio watermarking detection is often computational complex and requires at least as much audio information as required to embed a complete watermark. In some applications, especially real-time monitoring, this is an important drawback. The reason for this is the usage of sync sequences at the beginning of the watermark, allowing a decision about the presence only if at least the sync has been found and retrieved. We propose an alternative method for detecting the presence of a watermark. Based on the knowledge of the secret key used for embedding, we create a mark for all potential marking stages and then use a sliding window to test a given audio file on the presence of statistical characteristics caused by embedding. In this way we can detect a watermark in less than 1 second of audio.

  16. Neurology and detective writing.

    Science.gov (United States)

    Kempster, Peter A; Lees, Andrew J

    2013-12-01

    When searching for clues to reach a diagnosis, neurologists often empathise with the detective who is trying to solve a case. The premise of this article is that detective stories have been part of the fabric of neurology ever since the time that it evolved into a discrete medical speciality. We will examine how this form of narrative has found expression in detective mystery fiction and popular science publications created by 20th century neurologist physician-writers. We will also investigate the power of the neurologist's alter ego, Sherlock Holmes: his relationship to founders of clinical neuroscience such as Jean-Martin Charcot, William Gowers and Sigmund Freud, and his influences on neurological practice and its literary traditions.

  17. Detection of solar events

    Science.gov (United States)

    Fischbach, Ephraim; Jenkins, Jere

    2013-08-27

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  18. Detecting Patterns of Anomalies

    Science.gov (United States)

    2009-03-01

    detect anomalies in the dataset is used in [Leung and Leckie, 2005] and [Eskin et al., 2002]. One-class SVMs [Li et al., 2003, Heller et al., 2003] and...IEE Proceedings F, 140(2): 107–113, 1993. J.D.F. Habbema, J. Hermans , and K. Vandenbroek. A stepwise discriminant analysis pro- gram using density...Technometrics, 29(4):409–412, 1987. K.A. Heller , K.M. Svore, A. Keromytis, and S.J. Stolfo. One class support vector machines for detecting anomalous

  19. Readers as research detectives

    Directory of Open Access Journals (Sweden)

    Gøtzsche Peter C

    2009-01-01

    Full Text Available Abstract Flaws in research papers are common but it may require arduous detective work to unravel them. Checklists are helpful, but many inconsistencies will only be revealed through repeated cross-checks of every little detail, just like in a crime case. As a major deterrent for dishonesty, raw data from all trials should be posted on a public website. This would also make it much easier to detect errors and flaws in publications, and it would allow many research projects to be performed without collecting new data. The prevailing culture of secrecy and ownership to data is not in the best interests of patients.

  20. Readers as research detectives

    DEFF Research Database (Denmark)

    Gøtzsche, Peter C

    2009-01-01

    Flaws in research papers are common but it may require arduous detective work to unravel them. Checklists are helpful, but many inconsistencies will only be revealed through repeated cross-checks of every little detail, just like in a crime case. As a major deterrent for dishonesty, raw data from...... all trials should be posted on a public website. This would also make it much easier to detect errors and flaws in publications, and it would allow many research projects to be performed without collecting new data. The prevailing culture of secrecy and ownership to data is not in the best interests...

  1. Detecting the brachyspina mutation

    DEFF Research Database (Denmark)

    2012-01-01

    This invention relates to methods for the detection of a bovine that is affected by or carrier of brachyspina. It is based on the identification of a 3.3 Kb deletion in the bovine FANCI gene that is shown to cause the brachyspina syndrome. The present invention provides methods and uses for deter......This invention relates to methods for the detection of a bovine that is affected by or carrier of brachyspina. It is based on the identification of a 3.3 Kb deletion in the bovine FANCI gene that is shown to cause the brachyspina syndrome. The present invention provides methods and uses...

  2. Pretentiously detecting power cancellation

    CERN Document Server

    Jung, Junehyuk

    2011-01-01

    Granville and Soundararajan have recently introduced the notion of pretentiousness in the study of multiplicative functions of modulus bounded by 1, essentially the idea that two functions which are similar in a precise sense should exhibit similar behavior. It turns out, somewhat surprisingly, that this does not directly extend to detecting power cancellation - there are multiplicative functions which exhibit as much cancellation as possible in their partial sums that, modified slightly, give rise to functions which exhibit almost as little as possible. We develop two new notions of pretentiousness under which power cancellation can be detected, one of which applies to a much broader class of multiplicative functions.

  3. Sequential Detection of Digital Watermarking

    Institute of Scientific and Technical Information of China (English)

    LI Li; YU Yu-lian; WANG Pei

    2005-01-01

    The paper analyzed a new watermarking detection paradigm including double detection thresholds based on sequential hypothesis testing. A joint design of watermarking encoding and detection was proposed. The paradigm had good immunity to noisy signal attacks and high detection probability. Many experiments proved that the above algorithm can detect watermarks about 66% faster than popular detectors, which could have significant impact on many applications such as video watermarking detection and watermark-searching in a large database of digital contents.

  4. Detecting Android Malware Using Clone Detection

    Institute of Scientific and Technical Information of China (English)

    陈健; Manar H. Alalfi; Member; ACM; IEEE; Thomas R. Dean; 邹颖

    2015-01-01

    Android is currently one of the most popular smartphone operating systems. However, Android has the largest share of global mobile malware and significant public attention has been brought to the security issues of Android. In this paper, we investigate the use of a clone detector to identify known Android malware. We collect a set of Android applications known to contain malware and a set of benign applications. We extract the Java source code from the binary code of the applications and use NiCad, a near-miss clone detector, to find the classes of clones in a small subset of the malicious applications. We then use these clone classes as a signature to find similar source files in the rest of the malicious applications. The benign collection is used as a control group. In our evaluation, we successfully decompile more than 1 000 malicious apps in 19 malware families. Our results show that using a small portion of malicious applications as a training set can detect 95% of previously known malware with very low false positives and high accuracy at 96.88%. Our method can effectively and reliably pinpoint malicious applications that belong to certain malware families.

  5. Immunity Based Worm Detection System

    Institute of Scientific and Technical Information of China (English)

    HONG Zheng; WU Li-fa; WANG Yuan-yuan

    2007-01-01

    Current worm detection methods are unable to detect multi-vector polymorphic worms effectively.Based on negative selection mechanism of the immune system,a local network worm detection system that detects worms was proposed.Normal network service requests were represented by self-strings,and the detection system used self-strings to monitor the network for anomaly.According to the properties of worm propagation,a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection.Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms.

  6. Detection of colorectal neoplasia

    DEFF Research Database (Denmark)

    Wilhelmsen, Michael; Christensen, Ib J; Rasmussen, Louise

    2017-01-01

    Serological biomarkers may be an option for early detection of colorectal cancer (CRC). The present study assessed 8 cancer-associated protein biomarkers in plasma from subjects undergoing first time ever colonoscopy due to symptoms attributable to colorectal neoplasia. Plasma AFP, CA19-9, CEA, hs...

  7. Change Detection Tools

    NARCIS (Netherlands)

    Dekker, R.J.; Kuenzer, C.; Lehner, M.; Reinartz, P.; Niemeyer, I.; Nussbaum, S.; Lacroix, V.; Sequeira, V.; Stringa, E.; Schöpfer, E.

    2009-01-01

    In this chapter a wide range of change detection tools is addressed. They are grouped into methods suitable for optical and multispectral data, synthetic aperture radar (SAR) images, and 3D data. Optical and multispectral methods include unsupervised approaches, supervised and knowledge-based approa

  8. Detection of counterfeit currency

    Science.gov (United States)

    Burns, D.A.

    1998-05-26

    A method is disclosed of detecting counterfeit currency by contacting the currency to be tested with near infrared beams in the spectrum below 1,250 nanometers, measuring reflectance of the near infrared beams and comparing the reflectance values with those from genuine currency. 18 figs.

  9. Automatic detection of laughter

    NARCIS (Netherlands)

    Truong, K.P.; Leeuwen, D.A. van

    2005-01-01

    In the context of detecting ‘paralinguistic events’ with the aim to make classification of the speaker’s emotional state possible, a detector was developed for one of the most obvious ‘paralinguistic events’, namely laughter. Gaussian Mixture Models were trained with Perceptual Linear Prediction fea

  10. Electrical load detection aparatus

    DEFF Research Database (Denmark)

    2010-01-01

    A load detection technique for a load comprising multiple frequency-dependant sub-loads comprises measuring a representation of the impedance characteristic of the load; providing stored representations of a multiplicity of impedance characteristics of the load; each one of the stored representat...

  11. Soybean allergen detection methods

    DEFF Research Database (Denmark)

    Pedersen, Mona H; Holzhauser, Thomas; Bisson, Caroline

    2008-01-01

    Soybean containing products are widely consumed, thus reliable methods for detection of soy in foods are needed in order to make appropriate risk assessment studies to adequately protect soy allergic patients. Six methods were compared using eight food products with a declared content of soy...

  12. Global Disease Detectives

    Centers for Disease Control (CDC) Podcasts

    2010-09-21

    This podcast documents U.S. efforts to prevent, detect, and control emerging infectious diseases, such as SARS and pandemic influenza.  Created: 9/21/2010 by CDC Center for Global Health.   Date Released: 9/21/2010.

  13. Electrically detected ferromagnetic resonance

    NARCIS (Netherlands)

    Goennenwein, S.T.B.; Schink, S.W.; Brandlmaier, A.; Boger, A.; Opel, M.; Gross, R.; Keizer, R.S.; Klapwijk, T.M.; Gupta, A.; Huebl, H.; Bihler, C.; Brandt, M.S.

    2007-01-01

    We study the magnetoresistance properties of thin ferromagnetic CrO2 and Fe3O4 films under microwave irradiation. Both the sheet resistance ρ and the Hall voltage VHall characteristically change when a ferromagnetic resonance (FMR) occurs in the film. The electrically detected ferromagnetic resonanc

  14. Evolutionary Theories of Detection

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, J P

    2005-04-29

    Current, mid-term and long range technologies for detection of pathogens and toxins are briefly described in the context of performance metrics and operational scenarios. Predictive (evolutionary) and speculative (revolutionary) assessments are given with trade-offs identified, where possible, among competing performance goals.

  15. Fast fight detection.

    Directory of Open Access Journals (Sweden)

    Ismael Serrano Gracia

    Full Text Available Action recognition has become a hot topic within computer vision. However, the action recognition community has focused mainly on relatively simple actions like clapping, walking, jogging, etc. The detection of specific events with direct practical use such as fights or in general aggressive behavior has been comparatively less studied. Such capability may be extremely useful in some video surveillance scenarios like prisons, psychiatric centers or even embedded in camera phones. As a consequence, there is growing interest in developing violence detection algorithms. Recent work considered the well-known Bag-of-Words framework for the specific problem of fight detection. Under this framework, spatio-temporal features are extracted from the video sequences and used for classification. Despite encouraging results in which high accuracy rates were achieved, the computational cost of extracting such features is prohibitive for practical applications. This work proposes a novel method to detect violence sequences. Features extracted from motion blobs are used to discriminate fight and non-fight sequences. Although the method is outperformed in accuracy by state of the art, it has a significantly faster computation time thus making it amenable for real-time applications.

  16. Fast fight detection.

    Science.gov (United States)

    Serrano Gracia, Ismael; Deniz Suarez, Oscar; Bueno Garcia, Gloria; Kim, Tae-Kyun

    2015-01-01

    Action recognition has become a hot topic within computer vision. However, the action recognition community has focused mainly on relatively simple actions like clapping, walking, jogging, etc. The detection of specific events with direct practical use such as fights or in general aggressive behavior has been comparatively less studied. Such capability may be extremely useful in some video surveillance scenarios like prisons, psychiatric centers or even embedded in camera phones. As a consequence, there is growing interest in developing violence detection algorithms. Recent work considered the well-known Bag-of-Words framework for the specific problem of fight detection. Under this framework, spatio-temporal features are extracted from the video sequences and used for classification. Despite encouraging results in which high accuracy rates were achieved, the computational cost of extracting such features is prohibitive for practical applications. This work proposes a novel method to detect violence sequences. Features extracted from motion blobs are used to discriminate fight and non-fight sequences. Although the method is outperformed in accuracy by state of the art, it has a significantly faster computation time thus making it amenable for real-time applications.

  17. VIDOCQ: The First Detective

    OpenAIRE

    Mackenzie-Smith, Gail

    2013-01-01

    UNIVERSITY OF CALIFORNIARIVERSIDEVIDOCQ: The First DetectiveA Thesis submitted in partial satisfactionof the requirements for the degree ofMaster of Fine ArtsinCreative Writing and Writing for the Performing ArtsbyGail Mackenzie-SmithDecember 2013Thesis Committee: Professor William Rabkin, Co-Chairperson Professor Charles Evered, Co-Chairperson Professor Joshua Malkin

  18. Low Complexity MIMO Detection

    CERN Document Server

    Bai, Lin

    2012-01-01

    Methods of signal detection are becoming an ever more vital component of wireless services, as providers lean towards using multiple antennae to compensate for limitations in the available wireless spectrum. The co-authors of this book are two of the world’s leading authorities on so-called MIMO (multiple-input, multiple-output) systems, and here they share the key findings of their years of research. They detail a range of important techniques for signal detection when multiple transmitted and received signals are available. They then review and explain some conventional MIMO detection schemes, including the ML, linear, and SIC detectors, and show why these methodologies are less than optimal compared to the more versatile list decoding and lattice reduction-aided detection systems. In the second part of the book, the authors move on to discuss various user selection schemes in multiuser systems.   Its finely tuned balance of theoretical analysis and practical applications makes this book required reading...

  19. Automatic detection of laughter

    NARCIS (Netherlands)

    Truong, K.P.; Leeuwen, D.A. van

    2005-01-01

    In the context of detecting ‘paralinguistic events’ with the aim to make classification of the speaker’s emotional state possible, a detector was developed for one of the most obvious ‘paralinguistic events’, namely laughter. Gaussian Mixture Models were trained with Perceptual Linear Prediction

  20. Portable raman explosives detection

    Energy Technology Data Exchange (ETDEWEB)

    Moore, David Steven [Los Alamos National Laboratory; Scharff, Robert J [Los Alamos National Laboratory

    2008-01-01

    Recent advances in portable Raman instruments have dramatically increased their application to emergency response and forensics, as well as homeland defense. This paper reviews the relevant attributes and disadvantages of portable Raman spectroscopy, both essentially and instrumentally, to the task of explosives detection in the field.

  1. Detecting Biosphere anomalies hotspots

    Science.gov (United States)

    Guanche-Garcia, Yanira; Mahecha, Miguel; Flach, Milan; Denzler, Joachim

    2017-04-01

    The current amount of satellite remote sensing measurements available allow for applying data-driven methods to investigate environmental processes. The detection of anomalies or abnormal events is crucial to monitor the Earth system and to analyze their impacts on ecosystems and society. By means of a combination of statistical methods, this study proposes an intuitive and efficient methodology to detect those areas that present hotspots of anomalies, i.e. higher levels of abnormal or extreme events or more severe phases during our historical records. Biosphere variables from a preliminary version of the Earth System Data Cube developed within the CAB-LAB project (http://earthsystemdatacube.net/) have been used in this study. This database comprises several atmosphere and biosphere variables expanding 11 years (2001-2011) with 8-day of temporal resolution and 0.25° of global spatial resolution. In this study, we have used 10 variables that measure the biosphere. The methodology applied to detect abnormal events follows the intuitive idea that anomalies are assumed to be time steps that are not well represented by a previously estimated statistical model [1].We combine the use of Autoregressive Moving Average (ARMA) models with a distance metric like Mahalanobis distance to detect abnormal events in multiple biosphere variables. In a first step we pre-treat the variables by removing the seasonality and normalizing them locally (μ=0,σ=1). Additionally we have regionalized the area of study into subregions of similar climate conditions, by using the Köppen climate classification. For each climate region and variable we have selected the best ARMA parameters by means of a Bayesian Criteria. Then we have obtained the residuals by comparing the fitted models with the original data. To detect the extreme residuals from the 10 variables, we have computed the Mahalanobis distance to the data's mean (Hotelling's T^2), which considers the covariance matrix of the joint

  2. Bayesian microsaccade detection

    Science.gov (United States)

    Mihali, Andra; van Opheusden, Bas; Ma, Wei Ji

    2017-01-01

    Microsaccades are high-velocity fixational eye movements, with special roles in perception and cognition. The default microsaccade detection method is to determine when the smoothed eye velocity exceeds a threshold. We have developed a new method, Bayesian microsaccade detection (BMD), which performs inference based on a simple statistical model of eye positions. In this model, a hidden state variable changes between drift and microsaccade states at random times. The eye position is a biased random walk with different velocity distributions for each state. BMD generates samples from the posterior probability distribution over the eye state time series given the eye position time series. Applied to simulated data, BMD recovers the “true” microsaccades with fewer errors than alternative algorithms, especially at high noise. Applied to EyeLink eye tracker data, BMD detects almost all the microsaccades detected by the default method, but also apparent microsaccades embedded in high noise—although these can also be interpreted as false positives. Next we apply the algorithms to data collected with a Dual Purkinje Image eye tracker, whose higher precision justifies defining the inferred microsaccades as ground truth. When we add artificial measurement noise, the inferences of all algorithms degrade; however, at noise levels comparable to EyeLink data, BMD recovers the “true” microsaccades with 54% fewer errors than the default algorithm. Though unsuitable for online detection, BMD has other advantages: It returns probabilities rather than binary judgments, and it can be straightforwardly adapted as the generative model is refined. We make our algorithm available as a software package. PMID:28114483

  3. Mask Blank Defect Detection

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, M A; Sommargren, G E

    2000-02-04

    Mask blanks are the substrates that hold the master patterns for integrated circuits. Integrated circuits are semiconductor devices, such as microprocessors (mPs), dynamic random access memory (DRAMs), and application specific integrated circuits (ASICs) that are central to the computer, communication, and electronics industries. These devices are fabricated using a set of master patterns that are sequentially imaged onto light-sensitive coated silicon wafers and processed to form thin layers of insulating and conductive materials on top of the wafer. These materials form electrical paths and transistors that control the flow of electricity through the device. For the past forty years the semiconductor industry has made phenomenal improvements in device functionality, compactness, speed, power, and cost. This progress is principally due to the exponential decrease in the minimum feature size of integrated circuits, which has been reduced by a factor of {radical}2 every three years. Since 1992 the Semiconductor Industry Association (SIA) has coordinated the efforts of producing a technology roadmap for semiconductors. In the latest document, ''The International Technology Roadmap for Semiconductors: 1999'', future technology nodes (minimum feature sizes) and targeted dates were specified and are summarized in Table 1. Lithography is the imaging technology for producing a de-magnified image of the mask on the wafer. A typical de-magnification factor is 4. Mask blank defects as small as one-eighth the equivalent minimum feature size are printable and may cause device failure. Defects might be the result of the surface preparation, such as polishing, or contamination due to handling or the environment. Table 2 shows the maximum tolerable defect sizes on the mask blank for each technology node. This downward trend puts a tremendous burden on mask fabrication, particularly in the area of defect detection and reduction. A new infrastructure for mask

  4. Acoustic detection of pneumothorax

    Science.gov (United States)

    Mansy, Hansen A.; Royston, Thomas J.; Balk, Robert A.; Sandler, Richard H.

    2003-04-01

    This study aims at investigating the feasibility of using low-frequency (pneumothorax detection were tested in dogs. In the first approach, broadband acoustic signals were introduced into the trachea during end-expiration and transmitted waves were measured at the chest surface. Pneumothorax was found to consistently decrease pulmonary acoustic transmission in the 200-1200-Hz frequency band, while less change was observed at lower frequencies (ppneumothorax states (pPneumothorax was found to be associated with a preferential reduction of sound amplitude in the 200- to 700-Hz range, and a decrease of sound amplitude variation (in the 300 to 600-Hz band) during the respiration cycle (pPneumothorax changed the frequency and decay rate of percussive sounds. These results imply that certain medical conditions may be reliably detected using appropriate acoustic measurements and analysis. [Work supported by NIH/NHLBI #R44HL61108.

  5. Exoplanet Detection Techniques

    CERN Document Server

    Fischer, Debra A; Laughlin, Greg P; Macintosh, Bruce; Mahadevan, Suvrath; Sahlmann, Johannes; Yee, Jennifer C

    2015-01-01

    We are still in the early days of exoplanet discovery. Astronomers are beginning to model the atmospheres and interiors of exoplanets and have developed a deeper understanding of processes of planet formation and evolution. However, we have yet to map out the full complexity of multi-planet architectures or to detect Earth analogues around nearby stars. Reaching these ambitious goals will require further improvements in instrumentation and new analysis tools. In this chapter, we provide an overview of five observational techniques that are currently employed in the detection of exoplanets: optical and IR Doppler measurements, transit photometry, direct imaging, microlensing, and astrometry. We provide a basic description of how each of these techniques works and discuss forefront developments that will result in new discoveries. We also highlight the observational limitations and synergies of each method and their connections to future space missions.

  6. Cell Phone Detection Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Pratt, Richard M.; Bunch, Kyle J.; Puzycki, David J.; Slaugh, Ryan W.; Good, Morris S.; McMakin, Douglas L.

    2007-10-01

    A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phone’s electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.

  7. Chaos detection and predictability

    CERN Document Server

    Gottwald, Georg; Laskar, Jacques

    2016-01-01

    Distinguishing chaoticity from regularity in deterministic dynamical systems and specifying the subspace of the phase space in which instabilities are expected to occur is of utmost importance in as disparate areas as astronomy, particle physics and climate dynamics.   To address these issues there exists a plethora of methods for chaos detection and predictability. The most commonly employed technique for investigating chaotic dynamics, i.e. the computation of Lyapunov exponents, however, may suffer a number of problems and drawbacks, for example when applied to noisy experimental data.   In the last two decades, several novel methods have been developed for the fast and reliable determination of the regular or chaotic nature of orbits, aimed at overcoming the shortcomings of more traditional techniques. This set of lecture notes and tutorial reviews serves as an introduction to and overview of modern chaos detection and predictability techniques for graduate students and non-specialists.   The book cover...

  8. Benchtop Detection of Proteins

    Science.gov (United States)

    Scardelletti, Maximilian C.; Varaljay, Vanessa

    2007-01-01

    A process, and a benchtop-scale apparatus for implementing the process, have been developed to detect proteins associated with specific microbes in water. The process and apparatus may also be useful for detection of proteins in other, more complex liquids. There may be numerous potential applications, including monitoring lakes and streams for contamination, testing of blood and other bodily fluids in medical laboratories, and testing for microbial contamination of liquids in restaurants and industrial food-processing facilities. A sample can be prepared and analyzed by use of this process and apparatus within minutes, whereas an equivalent analysis performed by use of other processes and equipment can often take hours to days. The process begins with the conjugation of near-infrared-fluorescent dyes to antibodies that are specific to a particular protein. Initially, the research has focused on using near-infrared dyes to detect antigens or associated proteins in solution, which has proven successful vs. microbial cells, and streamlining the technique in use for surface protein detection on microbes would theoretically render similar results. However, it is noted that additional work is needed to transition protein-based techniques to microbial cell detection. Consequently, multiple such dye/antibody pairs could be prepared to enable detection of multiple selected microbial species, using a different dye for each species. When excited by near-infrared light of a suitable wavelength, each dye fluoresces at a unique longer wavelength that differs from those of the other dyes, enabling discrimination among the various species. In initial tests, the dye/antibody pairs are mixed into a solution suspected of containing the selected proteins, causing the binding of the dye/antibody pairs to such suspect proteins that may be present. The solution is then run through a microcentrifuge that includes a membrane that acts as a filter in that it retains the dye

  9. Early detection of psychosis

    DEFF Research Database (Denmark)

    Larsen, T. K.; Melle, I.; Auestad, B.

    2011-01-01

    Background During the last decades we have seen a new focus on early treatment of psychosis. Several reviews have shown that duration of untreated psychosis (DUP) is correlated to better outcome. However, it is still unknown whether early treatment will lead to a better long-term outcome....... This study reports the effects of reducing DUP on 5-year course and outcome.Method During 1997â€"2000 a total of 281 consecutive patients aged >17 years with first episode non-affective psychosis were recruited, of which 192 participated in the 5-year follow-up. A comprehensive early detection (ED) programme...... with public information campaigns and low-threshold psychosis detection teams was established in one healthcare area (ED-area), but not in a comparable area (no-ED area). Both areas ran equivalent treatment programmes during the first 2 years and need-adapted treatment thereafter.Results At the start...

  10. Skin Cancer Detection

    Directory of Open Access Journals (Sweden)

    N. Durga Rao

    2016-06-01

    Full Text Available : In recent days, skin cancer is seen as one of the most Hazardous form of the Cancers found in Humans. Skin cancer is found in various types such as Melanoma, Basal and Squamous cell Carcinoma among which Melanoma is the most unpredictable. The detection of Melanoma cancer in early stage can be helpful to cure it. Computer vision can play important role in Medical Image Diagnosis and it has been proved by many existing systems. In this paper, we present a survey on different steps which are being to detect the Melanoma Skin Cancer using Image Processing tools. In every step, what are the different methods are be included in our paper

  11. Exoplanet Detection Methods

    CERN Document Server

    Wright, Jason T

    2012-01-01

    This chapter reviews various methods of detecting planetary companions to stars from an observational perspective, focusing on radial velocities, astrometry, direct imaging, transits, and gravitational microlensing. For each method, this chapter first derives or summarizes the basic observable phenomena that are used to infer the ex- istence of planetary companions, as well as the physical properties of the planets and host stars that can be derived from the measurement of these signals. This chapter then outlines the general experimental requirements to robustly detect the signals us- ing each method, by comparing their magnitude to the typical sources of measurement uncertainty. This chapter goes on to compare the various methods to each other by outlining the regions of planet and host star parameter space where each method is most sensitive, stressing the complementarity of the ensemble of the methods at our disposal. Finally, there is a brief review of the history of the young exoplanet field, from the f...

  12. Supernova Neutrino Detection

    Energy Technology Data Exchange (ETDEWEB)

    Gil-Botella, Ines, E-mail: ines.gil@ciemat.es [CIEMAT, Basic Research Department, Avenida Complutense, 22, 28040 Madrid (Spain)

    2011-07-25

    The neutrino burst from a core collapse supernova can provide information about the explosion mechanism and the mechanisms of proto neutron star cooling but also about the intrinsic properties of the neutrino such as flavor oscillations. One important question is to understand to which extend can the supernova and the neutrino physics be decoupled in the observation of a single supernova. The possibility to probe the neutrino mixing angle {theta}{sub 13} and the type of mass hierarchy from the detection of supernova neutrinos with liquid argon detectors is discussed in this paper. Moreover, a quantitatively study about the possibility to constrain the supernova parameters is presented. A very massive liquid argon detector ({approx} 100 kton) is needed to perform accurate measurements of these parameters. Finally the possible detection of the diffuse supernova neutrino background in liquid argon detectors is also described.

  13. Handbook for Language Detectives

    DEFF Research Database (Denmark)

    Bryanne, Ulla; Bruntt, Karen Scheel Lassen

    Handbook for Language Detectives gives a thorough presentation of English grammar and discusses how to teach grammar. The book unveils to the readers, who will be working as grammar detectives, the fascinating world of language. It does not only deal with "traditional grammar" but also discusses...... what different grammatical structures mean (semantics) and how they influence the level of style (pragmatics). Grammar should not be taught as a separate discipline; it can and should be integrated in communicative language teaching. The book gives you innovative and valuable ideas of how this can...... be done. The book serves a double purpose: - English grammar and language usage at bachelor level from a functional linguistic point of view. - How to teach English grammar within a communicative approach. The book is mainly intended for Danish student teachers of English, but anyone else interested...

  14. Solar neutrino detection

    CERN Document Server

    Miramonti, Lino

    2009-01-01

    More than 40 years ago, neutrinos where conceived as a way to test the validity of the solar models which tell us that stars are powered by nuclear fusion reactions. The first measurement of the neutrino flux, in 1968 in the Homestake mine in South Dakota, detected only one third of the expected value, originating what has been known as the Solar Neutrino Problem. Different experiments were built in order to understand the origin of this discrepancy. Now we know that neutrinos undergo oscillation phenomenon changing their nature traveling from the core of the Sun to our detectors. In the work the 40 year long saga of the neutrino detection is presented; from the first proposals to test the solar models to last real time measurements of the low energy part of the neutrino spectrum.

  15. Gas Detection for Experiments

    CERN Document Server

    Hay, D

    2001-01-01

    Flammable gases are often used in detectors for physics experiments. The storage, distribution and manipulation of such flammable gases present several safety hazards. As most flammable gases cannot be detected by human senses, specific well-placed gas detection systems must be installed. Following a request from the user group and in collaboration with CERN safety officers, risk analyses are performed. An external contractor, who needs to receive detailed user requirements from CERN, performs the installations. The contract is passed on a guaranteed results basis. Co-ordination between all the CERN groups and verification of the technical installation is done by ST/AA/AS. This paper describes and focuses on the structured methodology applied to implement such installations based on goal directed project management techniques (GDPM). This useful supervision tool suited to small to medium sized projects facilitates the task of co-ordinating numerous activities to achieve a completely functional system.

  16. Detection of algorithmic trading

    Science.gov (United States)

    Bogoev, Dimitar; Karam, Arzé

    2017-10-01

    We develop a new approach to reflect the behavior of algorithmic traders. Specifically, we provide an analytical and tractable way to infer patterns of quote volatility and price momentum consistent with different types of strategies employed by algorithmic traders, and we propose two ratios to quantify these patterns. Quote volatility ratio is based on the rate of oscillation of the best ask and best bid quotes over an extremely short period of time; whereas price momentum ratio is based on identifying patterns of rapid upward or downward movement in prices. The two ratios are evaluated across several asset classes. We further run a two-stage Artificial Neural Network experiment on the quote volatility ratio; the first stage is used to detect the quote volatility patterns resulting from algorithmic activity, while the second is used to validate the quality of signal detection provided by our measure.

  17. Bayesian community detection

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel N

    2012-01-01

    Many networks of scientific interest naturally decompose into clusters or communities with comparatively fewer external than internal links; however, current Bayesian models of network communities do not exert this intuitive notion of communities. We formulate a nonparametric Bayesian model...... for community detection consistent with an intuitive definition of communities and present a Markov chain Monte Carlo procedure for inferring the community structure. A Matlab toolbox with the proposed inference procedure is available for download. On synthetic and real networks, our model detects communities...... consistent with ground truth, and on real networks, it outperforms existing approaches in predicting missing links. This suggests that community structure is an important structural property of networks that should be explicitly modeled....

  18. Sherlock Holmes: scientific detective.

    Science.gov (United States)

    Snyder, Laura J

    2004-09-01

    Sherlock Holmes was intended by his creator, Arthur Conan Doyle, to be a 'scientific detective'. Conan Doyle criticized his predecessor Edgar Allan Poe for giving his creation - Inspector Dupin - only the 'illusion' of scientific method. Conan Doyle believed that he had succeeded where Poe had failed; thus, he has Watson remark that Holmes has 'brought detection as near an exact science as it will ever be brought into the world.' By examining Holmes' methods, it becomes clear that Conan Doyle modelled them on certain images of science that were popular in mid- to late-19th century Britain. Contrary to a common view, it is also evident that rather than being responsible for the invention of forensic science, the creation of Holmes was influenced by the early development of it.

  19. Asynchrony Detection in Amblyopes

    Directory of Open Access Journals (Sweden)

    Pi-Chun Huang

    2012-10-01

    Full Text Available Amblyopia is a developmental abnormality of visual cortex. Although amblyopes experience perceptual deficits in spatial vision tasks, they have less temporal sensitivity loss. We investigated whether their temporal synchrony sensitivity is impaired. In experiment 1, four Gaussian blobs, located at the top, bottom, left, and right of a presentation screen, were flickering in 3 Hz and one of them was flickering in out-of-phase fashion in time. Participants needed to tell which blob was different from the other three and contrast threshold of the blobs was measured to determine the synchrony detection threshold. We found the thresholds were not correlated with the contrast thresholds for detecting the flickering blobs, suggesting synchrony detection and temporal detection threshold are processed by different mechanisms. In experiment 2, synchrony thresholds were measured as participants' ability to tell if one of the four high contrast Gaussian blobs was flickering asynchronously in time. Three temporal frequencies (1, 2, and 3 Hz and two element separations (1.25 and 5 deg were compared. We found that the amblyopic group exhibited a deficit only for the 1.25 deg element separation in amblyopic eye but was normal for the other configurations compared to controlled participants. It suggests amblyopes have deficits in temporal processing but only for foveal vision. We also found the sensitivity for the non-strabismic anismetropia group is reduced for all three temporal frequencies whereas for the strabismic anisometropia group it was reduced at 3Hz only, suggesting the impairment in temporal synchrony might be different for different types of amblyopia.

  20. Dynamic Network Change Detection

    Science.gov (United States)

    2008-12-01

    detection methods is presented; the cumulative sum ( CUSUM ), the exponentially weighted moving average (EWMA), and a scan statistic (SS). Statistical...minimizing the risk of false alarms. Three common SPC methods that we consider here are the CUSUM (Page, 1961), EWMA (Roberts, 1959), and the SS...successive dynamic network measures are then used to calculate the statistics for the CUSUM , the EWMA, and the SS. These are then compared to decision

  1. Aspects of leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Chivers, T.C. [Berkeley Technology Centre, Glos (United Kingdom)

    1997-04-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant.

  2. Electronic spinal posture detection

    OpenAIRE

    Thoné, Jef; Jourand, Philippe; Puers, Robert

    2009-01-01

    A wearable automatic monitoring system for back posture has been developed and tested. Making use of only five accelerometers placed on strategic locations on the back, a stand alone system enables detection, logging and feedback of the patient’s posture. The system enables alerting the patient of a bad posture, or long-term data logging to analyze the patient’s posture over a prolonged period.

  3. Detection of pump degradation

    Energy Technology Data Exchange (ETDEWEB)

    Greene, R.H.; Casada, D.A.; Ayers, C.W. [and others

    1995-08-01

    This Phase II Nuclear Plant Aging Research study examines the methods of detecting pump degradation that are currently employed in domestic and overseas nuclear facilities. This report evaluates the criteria mandated by required pump testing at U.S. nuclear power plants and compares them to those features characteristic of state-of-the-art diagnostic programs and practices currently implemented by other major industries. Since the working condition of the pump driver is crucial to pump operability, a brief review of new applications of motor diagnostics is provided that highlights recent developments in this technology. The routine collection and analysis of spectral data is superior to all other technologies in its ability to accurately detect numerous types and causes of pump degradation. Existing ASME Code testing criteria do not require the evaluation of pump vibration spectra but instead overall vibration amplitude. The mechanical information discernible from vibration amplitude analysis is limited, and several cases of pump failure were not detected in their early stages by vibration monitoring. Since spectral analysis can provide a wealth of pertinent information concerning the mechanical condition of rotating machinery, its incorporation into ASME testing criteria could merit a relaxation in the monthly-to-quarterly testing schedules that seek to verify and assure pump operability. Pump drivers are not included in the current battery of testing. Operational problems thought to be caused by pump degradation were found to be the result of motor degradation. Recent advances in nonintrusive monitoring techniques have made motor diagnostics a viable technology for assessing motor operability. Motor current/power analysis can detect rotor bar degradation and ascertain ranges of hydraulically unstable operation for a particular pump and motor set. The concept of using motor current or power fluctuations as an indicator of pump hydraulic load stability is presented.

  4. Method for detecting biomolecules

    Science.gov (United States)

    Huo, Qisheng; Liu, Jun

    2008-08-12

    A method for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode

  5. Nuclear material detection techniques

    Science.gov (United States)

    Christian, James F.; Sia, Radia; Dokhale, Purushottam; Shestakova, Irina; Nagarkar, Vivek; Shah, Kanai; Johnson, Erik B.; Stapels, Christopher J.; Ryan, James M.; Macri, John; Bravar, Ulisse; Leung, Ka-Ngo; Squillante, Michael R.

    2008-04-01

    Illicit nuclear materials represent a threat for the safety of the American citizens, and the detection and interdiction of a nuclear weapon is a national problem that has not been yet solved. Alleviating this threat represents an enormous challenge to current detection methods that have to be substantially improved to identify and discriminate threatening from benign incidents. Rugged, low-power and less-expensive radiation detectors and imagers are needed for large-scale wireless deployment. Detecting the gamma rays emitted by nuclear and fissionable materials, particularly special nuclear materials (SNM), is the most convenient way to identify and locate them. While there are detectors that have the necessary sensitivity, none are suitable to meet the present need, primarily because of the high occurrence of false alarms. The exploitation of neutron signatures represents a promising solution to detecting illicit nuclear materials. This work presents the development of several detector configurations such as a mobile active interrogation system based on a compact RF-Plasma neutron generator developed at LBNL and a fast neutron telescope that uses plastic scintillating-fibers developed at the University of New Hampshire. A human-portable improved Solid-State Neutron Detector (SSND) intended to replace pressurized 3He-tubes will be also presented. The SSND uses an ultra-compact CMOS-SSPM (Solid-State Photomultiplier) detector, developed at Radiation Monitoring devices Inc., coupled to a neutron sensitive scintillator. The detector is very fast and can provide time and spectroscopy information over a wide energy range including fast neutrons.

  6. Fraud Detection in Healthcare

    Energy Technology Data Exchange (ETDEWEB)

    Chandola, Varun [ORNL; Schryver, Jack C [ORNL; Sukumar, Sreenivas R [ORNL

    2015-01-01

    We discuss the problem of fraud detection in healthcare in this chapter. Given the recent scrutiny of the ineciencies in the US healthcare system, identifying fraud has been on the forefront of the eorts towards reducing the healthcare costs. In this chapter we will focus on understanding the issue of healthcare fraud in detail, and review methods that have been proposed in the literature to combat this issue using data driven approach.

  7. Cloud Detection with MATLAB

    OpenAIRE

    P. Shrivastava

    2013-01-01

    The accurate detection of clouds in satellite imagery is important in research and operational applications. Cloud cover influences the distribution of solar radiation reaching the ground where it is absorbed. Resulting fluxes of sensible and latent heat are critical to the accurate characterization of boundary layer behavior and mesoscale circulations that often lead to convective development. Therefore the spatial and temporal variation in cloud cover can greatly affect regional an...

  8. CDC Disease Detective Camp

    Centers for Disease Control (CDC) Podcasts

    2010-08-02

    The CDC Disease Detective Camp gives rising high school juniors and seniors exposure to key aspects of the CDC, including basic epidemiology, infectious and chronic disease tracking, public health law, and outbreak investigations. The camp also helps students explore careers in public health.  Created: 8/2/2010 by Centers for Disease Control and Prevention (CDC).   Date Released: 8/2/2010.

  9. Nonlinear Multiantenna Detection Methods

    Directory of Open Access Journals (Sweden)

    Chen Sheng

    2004-01-01

    Full Text Available A nonlinear detection technique designed for multiple-antenna assisted receivers employed in space-division multiple-access systems is investigated. We derive the optimal solution of the nonlinear spatial-processing assisted receiver for binary phase shift keying signalling, which we refer to as the Bayesian detector. It is shown that this optimal Bayesian receiver significantly outperforms the standard linear beamforming assisted receiver in terms of a reduced bit error rate, at the expense of an increased complexity, while the achievable system capacity is substantially enhanced with the advent of employing nonlinear detection. Specifically, when the spatial separation expressed in terms of the angle of arrival between the desired and interfering signals is below a certain threshold, a linear beamformer would fail to separate them, while a nonlinear detection assisted receiver is still capable of performing adequately. The adaptive implementation of the optimal Bayesian detector can be realized using a radial basis function network. Two techniques are presented for constructing block-data-based adaptive nonlinear multiple-antenna assisted receivers. One of them is based on the relevance vector machine invoked for classification, while the other on the orthogonal forward selection procedure combined with the Fisher ratio class-separability measure. A recursive sample-by-sample adaptation procedure is also proposed for training nonlinear detectors based on an amalgam of enhanced -means clustering techniques and the recursive least squares algorithm.

  10. Neutrino Detection With CLEAN

    CERN Document Server

    McKinsey, D N

    2005-01-01

    This article describes CLEAN, an approach to the detection of low-energy solar neutrinos and neutrinos released from supernovae. The CLEAN concept is based on the detection of elastic scattering events (neutrino-electron scattering and neutrino-nuclear scattering) in liquified noble gases such as liquid helium, liquid neon, and liquid xenon, all of which scintillate brightly in the ultraviolet. Key to the CLEAN technique is the use of a thin film of wavelength-shifting fluor to convert the ultraviolet scintillation light to the visible. This allows the same liquid to be used as both a passive shielding medium and an active self-shielding detector, allowing lower intrinsic radioactive backgrounds at low energies. Liquid neon is a particularly promising medium for CLEAN. Because liquid neon has a high scintillation yield, has no long-lived radioactive isotopes, and can be easily purified by use of cold traps, it is an ideal medium for the detection of rare nuclear events. In addition, neon is inexpensive, dense...

  11. Human kin detection.

    Science.gov (United States)

    Bressan, Paola; Kramer, Peter

    2015-01-01

    Natural selection has favored the evolution of behaviors that benefit not only one's genes, but also their copies in genetically related individuals. These behaviors include optimal outbreeding (choosing a mate that is neither too closely related, nor too distant), nepotism (helping kin), and spite (hurting non-kin at a personal cost), and all require some form of kin detection or kin recognition. Yet, kinship cannot be assessed directly; human kin detection relies on heuristic cues that take into account individuals' context (whether they were reared by our mother, or grew up in our home, or were given birth by our spouse), appearance (whether they smell or look like us), and ability to arouse certain feelings (whether we feel emotionally close to them). The uncertainties of kin detection, along with its dependence on social information, create ample opportunities for the evolution of deception and self-deception. For example, babies carry no unequivocal stamp of their biological father, but across cultures they are passionately claimed to resemble their mother's spouse; to the same effect, 'neutral' observers are greatly influenced by belief in relatedness when judging resemblance between strangers. Still, paternity uncertainty profoundly shapes human relationships, reducing not only the investment contributed by paternal versus maternal kin, but also prosocial behavior between individuals who are related through one or more males rather than females alone. Because of its relevance to racial discrimination and political preferences, the evolutionary pressure to prefer kin to non-kin has a manifold influence on society at large.

  12. Extrasolar planet detection

    Science.gov (United States)

    Korechoff, R. P.; Diner, D. J.; Tubbs, E. F.; Gaiser, S. L.

    1994-01-01

    This paper discusses the concept of extrasolar planet detection using a large-aperture infared imaging telescope. Coronagraphic stellar apodization techniques are less efficient at infrared wavelengths compared to the visible, as a result of practical limitations on aperture dimensions, thus necessitating additional starlight suppression to make planet detection feasible in this spectral domain. We have been investigating the use of rotational shearing interferometry to provide up to three orders of magnitude of starlight suppression over broad spectral bandwidths. We present a theoretical analysis of the system performance requirements needed to make this a viable instrument for planet detection, including specifications on the interferometer design and telescope aperture characteristics. The concept of using rotational shearing interferometry as a wavefront error detector, thus providing a signal that can be used to adaptively correct the wavefront, will be discussed. We also present the status of laboratory studies of on-axis source suppression using a recently constructed rotational shearing interferometer that currently operates in the visible.

  13. Hand Detection Using HSV Model

    Directory of Open Access Journals (Sweden)

    Uzma Noreen

    2015-08-01

    Full Text Available Natural Human Computer Interaction HCI is the demand of todays technology oriented world. Detecting and tracking of face and hands are important for gesture recognition. Skin detection is a very popular and useful technique for detecting and tracking human-body parts. It has been much attention mainly because of its vast range of applications such as face detection and tracking naked people detection hand detection and tracking people retrieval in databases and Internet etc. Many models and algorithms are being used for detection of face hand and its gesture. Hand detection using model or classification is to build a decision rule that will discriminate between skin and non-skin pixels. Identifying skin color pixels involves finding the range of values for which most skin pixels would fall in a given color space. All external factors will be eliminated to detect the hand and its color in the image in complex background.

  14. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  15. Rapid Detection of Pathogens

    Energy Technology Data Exchange (ETDEWEB)

    David Perlin

    2005-08-14

    Pathogen identification is a crucial first defense against bioterrorism. A major emphasis of our national biodefense strategy is to establish fast, accurate and sensitive assays for diagnosis of infectious diseases agents. Such assays will ensure early and appropriate treatment of infected patients. Rapid diagnostics can also support infection control measures, which monitor and limit the spread of infectious diseases agents. Many select agents are highly transmissible in the early stages of disease, and it is critical to identify infected patients and limit the risk to the remainder of the population and to stem potential panic in the general population. Nucleic acid-based molecular approaches for identification overcome many of the deficiencies associated with conventional culture methods by exploiting both large- and small-scale genomic differences between organisms. PCR-based amplification of highly conserved ribosomal RNA (rRNA) genes, intergenic sequences, and specific toxin genes is currently the most reliable approach for bacterial, fungal and many viral pathogenic agents. When combined with fluorescence-based oligonucleotide detection systems, this approach provides real-time, quantitative, high fidelity analysis capable of single nucleotide allelic discrimination (4). These probe systems offer rapid turn around time (<2 h) and are suitable for high throughput, automated multiplex operations that are critical for clinical diagnostic laboratories. In this pilot program, we have used molecular beacon technology invented at the Public health Research Institute to develop a new generation of molecular probes to rapidly detect important agents of infectious diseases. We have also developed protocols to rapidly extract nucleic acids from a variety of clinical specimen including and blood and tissue to for detection in the molecular assays. This work represented a cooperative research development program between the Kramer-Tyagi/Perlin labs on probe development

  16. Theory of Edge Detection

    Science.gov (United States)

    Marr, D.; Hildreth, E.

    1980-02-01

    A theory of edge detection is presented. The analysis proceeds in two parts. (1) Intensity changes, which occur in a natural image over a wide range of scales, are detected separately at different scales. An appropriate filter for this purpose at a given scale is found to be the second derivative of a Gaussian, and it is shown that, provided some simple conditions are satisfied, these primary filters need not be orientation-dependent. Thus, intensity changes at a given scale are best detected by finding the zero values of nabla 2G(x, y)* I(x, y) for image I, where G(x, y) is a two-dimensional Gaussian distribution and nabla 2 is the Laplacian. The intensity changes thus discovered in each of the channels are then represented by oriented primitives called zero-crossing segments, and evidence is given that this representation is complete. (2) Intensity changes in images arise from surface discontinuities or from reflectance or illumination boundaries, and these all have the property that they are spatially localized. Because of this, the zero-crossing segments from the different channels are not independent, and rules are deduced for combining them into a description of the image. This description is called the raw primal sketch. The theory explains several basic psychophysical findings, and the operation of forming oriented zero-crossing segments from the output of centre-surround nabla 2G filters acting on the image forms the basis for a physiological model of simple cells (see Marr & Ullman 1979).

  17. High Speed Edge Detection

    Science.gov (United States)

    Prokop, Norman F (Inventor)

    2016-01-01

    Analog circuits for detecting edges in pixel arrays are disclosed. A comparator may be configured to receive an all pass signal and a low pass signal for a pixel intensity in an array of pixels. A latch may be configured to receive a counter signal and a latching signal from the comparator. The comparator may be configured to send the latching signal to the latch when the all pass signal is below the low pass signal minus an offset. The latch may be configured to hold a last negative edge location when the latching signal is received from the comparator.

  18. License plate detection algorithm

    Science.gov (United States)

    Broitman, Michael; Klopovsky, Yuri; Silinskis, Normunds

    2013-12-01

    A novel algorithm for vehicle license plates localization is proposed. The algorithm is based on pixel intensity transition gradient analysis. Near to 2500 natural-scene gray-level vehicle images of different backgrounds and ambient illumination was tested. The best set of algorithm's parameters produces detection rate up to 0.94. Taking into account abnormal camera location during our tests and therefore geometrical distortion and troubles from trees this result could be considered as passable. Correlation between source data, such as license Plate dimensions and texture, cameras location and others, and parameters of algorithm were also defined.

  19. Opaque cloud detection

    Science.gov (United States)

    Roskovensky, John K [Albuquerque, NM

    2009-01-20

    A method of detecting clouds in a digital image comprising, for an area of the digital image, determining a reflectance value in at least three discrete electromagnetic spectrum bands, computing a first ratio of one reflectance value minus another reflectance value and the same two values added together, computing a second ratio of one reflectance value and another reflectance value, choosing one of the reflectance values, and concluding that an opaque cloud exists in the area if the results of each of the two computing steps and the choosing step fall within three corresponding predetermined ranges.

  20. Outlier Detection Method Use for the Network Flow Anomaly Detection

    Directory of Open Access Journals (Sweden)

    Rimas Ciplinskas

    2016-06-01

    Full Text Available New and existing methods of cyber-attack detection are constantly being developed and improved because there is a great number of attacks and the demand to protect from them. In prac-tice, current methods of attack detection operates like antivirus programs, i. e. known attacks signatures are created and attacks are detected by using them. These methods have a drawback – they cannot detect new attacks. As a solution, anomaly detection methods are used. They allow to detect deviations from normal network behaviour that may show a new type of attack. This article introduces a new method that allows to detect network flow anomalies by using local outlier factor algorithm. Accom-plished research allowed to identify groups of features which showed the best results of anomaly flow detection according the highest values of precision, recall and F-measure.

  1. Novelty detection in dermatological images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel

    2003-01-01

    The problem of novelty detection is considered for at set of dermatological image data. Different points of view are analyzed in detail. First, novelty detection is treated as a contextual classification problem. Different learning phases can be detected when the sample size is increased....... The detection of the emergence a new class is considered here. A model that estimates the minimal amount of information required to recognize structure in the data as a function of class separability is also proposed. Secondly, texture alteration detection is considered a novelty detection problem...

  2. Visual Concept Detection and Real Time Object Detection

    CERN Document Server

    Tao, Ran

    2011-01-01

    Bag-of-words model is implemented and tried on 10-class visual concept detection problem. The experimental results show that "DURF+ERT+SVM" outperforms "SIFT+ERT+SVM" both in detection performance and computation efficiency. Besides, combining DURF and SIFT results in even better detection performance. Real-time object detection using SIFT and RANSAC is also tried on simple objects, e.g. drink can, and good result is achieved.

  3. Detecting underabundant neutralinos

    CERN Document Server

    Badziak, Marcin; Olechowski, Marek; Pokorski, Stefan; Sakurai, Kazuki

    2015-01-01

    The electroweak sector may play a crucial role in discovering supersymmetry. We systematically investigate the patterns of the MSSM-like electroweakinos, when the neutralino relic abundance $\\Omega_\\chi h^2\\leq 0.12$, that is, also admitting for multi-component Dark Matter, in a broad range of the parameter space. We find that for a very large range of parameters the Direct Detection experiments are/will be sensitive to underabundant neutralinos, in spite of the strong rescaling of the flux factor. The second general conclusion is that the bound $\\Omega_\\chi h^2\\leq 0.12$ together with the LUX (XENON1T) limits for the neutralino spin independent scattering cross sections constrain the electroweakino spectrum so that the mass differences between the NLSP and the LSP are smaller than 40 (10) GeV, respectively, with important implications for the collider searches. The future Direct Detection experiments and the high luminosity LHC run will probe almost the entire range of the LSP and NLSP mass spectrum that is ...

  4. Infrasound detection of meteors

    Science.gov (United States)

    ElGabry, M. N.; Korrat, I. M.; Hussein, H. M.; Hamama, I. H.

    2017-06-01

    Meteorites that penetrate the atmosphere generate infrasound waves of very low frequency content. These waves can be detected even at large distances. In this study, we analyzed the infrasound waves produced by three meteors. The October 7, 2008 TC3 meteor fell over the north Sudan Nubian Desert, the February 15, 2013 Russian fireball, and the February 6, 2016 Atlantic meteor near to the Brazil coast. The signals of these three meteors were detected by the infrasound sensors of the International Monitoring System (IMS) of the Comprehensive Test Ban Treaty Organization (CTBTO). The progressive Multi Channel Technique is applied to the signals in order to locate these infrasound sources. Correlation of the recorded signals in the collocated elements of each array enables to calculate the delays at the different array element relative to a reference one as a way to estimate the azimuth and velocity of the coming infrasound signals. The meteorite infrasound signals show a sudden change in pressure with azimuth due to its track variation at different heights in the atmosphere. Due to movement of the source, a change in azimuth with time occurs. Our deduced locations correlate well with those obtained from the catalogues of the IDC of the CTBTO.

  5. Detecting Priming News Events

    CERN Document Server

    Wu, Di; Yu, Jeffrey Xu; Liu, Zheng

    2012-01-01

    We study a problem of detecting priming events based on a time series index and an evolving document stream. We define a priming event as an event which triggers abnormal movements of the time series index, i.e., the Iraq war with respect to the president approval index of President Bush. Existing solutions either focus on organizing coherent keywords from a document stream into events or identifying correlated movements between keyword frequency trajectories and the time series index. In this paper, we tackle the problem in two major steps. (1) We identify the elements that form a priming event. The element identified is called influential topic which consists of a set of coherent keywords. And we extract them by looking at the correlation between keyword trajectories and the interested time series index at a global level. (2) We extract priming events by detecting and organizing the bursty influential topics at a micro level. We evaluate our algorithms on a real-world dataset and the result confirms that ou...

  6. DCA for Bot Detection

    CERN Document Server

    Al-Hammadi, Yousof; Greensmith, Julie

    2010-01-01

    Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a 'bot' - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the 'botmaster of a botnet'. In this work, we use the biologically inspired Dendritic Cell Algorithm (DCA) to detect the existence of a single bot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the applica...

  7. Distributed Impact Detection System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  8. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  9. Novelty Detection Methods and Novel Fault Class Detection

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jiafan; HUANG Zhichu; WANG Xiaoming

    2006-01-01

    The ability to detect a new fault class can be a useful feature for an intelligent fault classification and diagnosis system. We adopt two novelty detection methods, the support vector data description (SVDD) and the Parzen density estimation, to represent known fault class samples, and to detect new fault class samples. The experiments on real multi-class bearing fault data show that the SVDD can give both high novelty detection rate and target recognition rate, respectively for the prescribed 'unknown' fault samples and the known fault samples by choosing the appropriate SVDD algorithm parameters; but the Parzen density estimation only give a better novelty detection rate in our experiments.

  10. Nucleic acid detection system and method for detecting influenza

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  11. Malware detection and analysis

    Energy Technology Data Exchange (ETDEWEB)

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  12. Silicosis: controversy in detection

    Directory of Open Access Journals (Sweden)

    Diemen Darwin Delgado García

    2014-03-01

    Full Text Available In many countries, the work of mining, quarrying, construction of tunnels and galleries, abrasive jet cleaning and smelting continue to present significant risks of silica exposure and silicosis epidemics still occur, even in developed countries. Patients with silicosis are particularly susceptible to opportunistic lung infections such as aspergillosis and tuberculosis. Occasionally silicosis is associated with scleroderma, systemic lupus erythematosus, nephritis and cancer. Early detection of silicosis is made by chest X-ray method, being the presence of rounded opacities the main sign of illness. However, no systematic information is available that allows use as a standard method of evaluation because their interpretation remains operator dependent both conventional radiological technique, digital and interpretation of computed tomography with high resolution.

  13. Metal Detecting in Denmark

    DEFF Research Database (Denmark)

    Dobat, A.S.

    2016-01-01

    Since the early 1980s, metal detector surveying conducted by non-professional volunteers (amateur archaeologists) has contributed significantly to archaeological research and heritage practice in Denmark. Metal detecting has always been legal in Denmark, and official stakeholders have from...... the beginning of metal detector archaeology pursued a liberal model, focusing on cooperation and inclusion rather than confrontation and criminalization. Like no other surveying method, the metal detector has contributed to increasing enormously the amount of data and sites from metal-rich periods. Virtually...... all of the spectacular and ground-breaking discoveries of the past decades are owed to metal detectors in the hands of amateur archaeologists. In order to serve as a contribution to the discussion on the upsides and downsides of liberal metal detector archaeology, this article addresses mainly three...

  14. Suicide bomber detection

    Science.gov (United States)

    Alexander, Naomi; Callejero, Carlos; Fiore, Franco; Gómez, Ignacio; Gonzalo, Ramón; Enríquez de Luna, Álvaro; Ederra, Iñigo; Palacios, Inés

    2009-05-01

    The chance of suicide bomber attacks against troops in the Theatre of Operations is currently quite high. Most of the time checkpoints and compound gates are not equipped with the appropriate equipment to screen for potential suicide bombers. The ultimate solution would be to be able to perform stand-off screening under various weather conditions whilst avoiding contact between Force Protection personnel and potential suicide bombers. Radiation in the millimeterwave and the lower Terahertz range, having the useful property of being able to penetrate clothing in addition to fog and rain, makes it a clear candidate for imaging in this situation. A study has been made simulating real case scenarios to test practical detection performance and stand-off distances at a range of frequencies in this band, the results of which will be presented.

  15. Watermark Embedding and Detection

    CERN Document Server

    Zhong, Jidong

    2006-01-01

    The embedder and the detector (or decoder) are the two most important components of the digital watermarking systems. Thus in this work, we discuss how to design a better embedder and detector (or decoder). I first give a summary of the prospective applications of watermarking technology and major watermarking schemes in the literature. My review on the literature closely centers upon how the side information is exploited at both embedders and detectors. In Chapter 3, I explore the optimum detector or decoder according to a particular probability distribution of the host signals. We found that the performance of both multiplicative and additive spread spectrum schemes depends on the shape parameter of the host signals. For spread spectrum schemes, the performance of the detector or the decoder is reduced by the host interference. Thus I present a new host-interference rejection technique for the multiplicative spread spectrum schemes. Its embedding rule is tailored to the optimum detection or decoding rule. T...

  16. Strategies of Life Detection

    CERN Document Server

    Botta, Oliver; Gomez-Elvira, Javier; Javaux, Emmanuelle; Selsis, Franck; Summons, Roger

    2008-01-01

    The search for life outside the Earth has been one of mankind's most challenging quests. We have reached a level of technology that allows for initial steps toward thorough scientific investigation. The aim of this workshop was to take an interdisciplinary look at the signatures that would be indicative of past or present life on another planet and compare them to biosignatures on Earth. The purpose of the workshop was also to discuss state-of-the-art in-situ instruments that are envisioned to search for these signatures in the exploration of the solar system, as well as the discussion of concepts descriptive of the search for habitable planets around other stars. This book is intended to provide a reference to scientists and instrument developers working in the field of in-situ and remote life detection. It can also be used as an interdisciplinary introduction for students and post-doctoral researchers entering this new and exciting field.

  17. Transient Detection and Classification

    CERN Document Server

    Becker, Andrew C

    2008-01-01

    I provide an incomplete inventory of the astronomical variability that will be found by next-generation time-domain astronomical surveys. These phenomena span the distance range from near-Earth satellites to the farthest Gamma Ray Bursts. The surveys that detect these transients will issue alerts to the greater astronomical community; this decision process must be extremely robust to avoid a slew of ``false'' alerts, and to maintain the community's trust in the surveys. I review the functionality required of both the surveys and the telescope networks that will be following them up, and the role of VOEvents in this process. Finally, I offer some ideas about object and event classification, which will be explored more thoroughly by other articles in these proceedings.

  18. How mammals detect pheromones.

    Science.gov (United States)

    Silvotti, L; Montani, G; Tirindelli, R

    2003-01-01

    One of the most intriguing discoveries in mammalian pheromone research is the report that a short exposure of women to volatile compounds from sweat can significantly alter their menstrual cycle. This work suggests that specific molecules are produced by women at different stages of the menstrual cycle and that this putative 'pheromonal' blend has effects on the timing of the cycle in women that were briefly exposed to it. What human pheromones are and how they work are not known, however a considerable progress has been made in understanding how other mammals are likely to detect pheromones with the discovery of pheromone receptors. Even though it is proved that pheromones affect human responses, it remains unlikely that similar receptors account for these effects.

  19. Pulsed ELDOR detected NMR

    Science.gov (United States)

    Schosseler, P.; Wacker, Th.; Schweiger, A.

    1994-07-01

    A pulsed EPR method for the determination of small hyperfine interactions in disordered systems is described. A selective preparation pulse of frequency ω mw(1) excites allowed and forbidden transitions, thereby burning spectral holes into the EPR line. The positions of the holes caused by the excitation of forbidden transitions correspond to the nuclear transition frequencies of the spin system. A selective detection pulse of frequency ω mw(2) creates an FID with integrated intensity proportional to the magnetization at frequency ω mw(2). The entire hole pattern is obtained by recording the integrated intensity of the FID while varying the frequency difference Δω mw=ω mw(1)-ω mw(2) step by step.

  20. Infrasound detection of meteors

    Directory of Open Access Journals (Sweden)

    M.N. ElGabry

    2017-06-01

    The signals of these three meteors were detected by the infrasound sensors of the International Monitoring System (IMS of the Comprehensive Test Ban Treaty Organization (CTBTO. The progressive Multi Channel Technique is applied to the signals in order to locate these infrasound sources. Correlation of the recorded signals in the collocated elements of each array enables to calculate the delays at the different array element relative to a reference one as a way to estimate the azimuth and velocity of the coming infrasound signals. The meteorite infrasound signals show a sudden change in pressure with azimuth due to its track variation at different heights in the atmosphere. Due to movement of the source, a change in azimuth with time occurs. Our deduced locations correlate well with those obtained from the catalogues of the IDC of the CTBTO.

  1. Purge corruption detection

    Energy Technology Data Exchange (ETDEWEB)

    Nankee, R.J. II; Frantz, D.C.; Tamm, J.R.; Gutermuth, T.R.

    1989-04-18

    This patent describes an adaptive memory cell update method for the detection and correction of a possible purge corruption of the adaptive memory portion of the memory in an internal combustion engine control unit, the adaptive memory portion having purge free cells and normal cells. The method consists of: determining the adaptive memory cells to be used during the adaptive memory cell update by determining if the engine conditions are right to turn the purge system off; if the conditions are right to turn the purge system off, turning the purge system off and using the purge free cells in the adaptive memory cell update; if the conditions are not right to turn the purge system off, turning the purge system on and using the normal cells in the adaptive memory cell update.

  2. Directional Antineutrino Detection

    CERN Document Server

    Safdi, Benjamin R

    2014-01-01

    We propose the first truly directional antineutrino detector for antineutrinos above the hydrogen inverse beta decay (IBD) threshold, with potential applications including monitoring for nuclear nonproliferation, spatially mapping geo-neutrinos, characterizing the diffuse supernova neutrino background, and searching for new physics in the neutrino sector. The detector consists of adjacent and separated target and capture scintillator planes. IBD events take place in the target layers, which are thin enough to allow the neutrons to escape without scattering elastically. The neutrons are detected in the thicker, boron-loaded capture layers. The location of the IBD event and the momentum of the positron are determined by tracking the positron's trajectory through the detector. Our design is a straightforward modification of existing antineutrino detectors; a prototype could be built with existing technology.

  3. Immunological Detection of Arbutin

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    The relative molecular mass of Arbutin is small.Both fluorolabeling and radiolabeling may affect its properties and functions.Therefore, the immunoassay of Arbutin was studied.Arbutin was coupled to bovine serum albumin to get the Arbutin-BSA conjugate with high molar ratio of Arbutin to BSA.Two rabbits were injected with the conjugate to develop the anti-Arbutin serum.Ammonium sulfate precipitation and affinity chromatography were used to purify the antibody.Double agar diffusion test and enzyme-linked immunosorbent assay (ELISA) were adopted to identify the antibody titer.The results demonstrated that the purity and activity of the antibody are high.The method proposed is satisfactory for the immunological detection of Arbutin.

  4. Detection of anomalous events

    Energy Technology Data Exchange (ETDEWEB)

    Ferragut, Erik M.; Laska, Jason A.; Bridges, Robert A.

    2016-06-07

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can include a plurality of anomaly detectors that together implement an algorithm to identify low-probability events and detect atypical traffic patterns. The anomaly detector provides for comparability of disparate sources of data (e.g., network flow data and firewall logs.) Additionally, the anomaly detector allows for regulatability, meaning that the algorithm can be user configurable to adjust a number of false alerts. The anomaly detector can be used for a variety of probability density functions, including normal Gaussian distributions, irregular distributions, as well as functions associated with continuous or discrete variables.

  5. Digital quadrature phase detection

    Science.gov (United States)

    Smith, J.A.; Johnson, J.A.

    1992-05-26

    A system for detecting the phase of a frequency or phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2[pi] when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2[pi] when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention. 6 figs.

  6. MASTER Four OT's detection

    Science.gov (United States)

    Podvorotniy, P.; Balanutsa, P.; Lipunov, V.; Shumkov, V.; Gorbovskoy, E.; Tiurina, N.; Kornilov, V.; Belinski, A.; Shatskiy, N.; Chazov, V.; Kuznetsov, A.; Krushinsky, V.; Zimnukhov, D.; Zalozhnih, I.; Ivanov, K.; Popov, A.; Yazev, S.; Budnev, N.; Konstantinov, E.; Chuvalaev, O.; Poleshchuk, V.; Parkhomenko, A.; Gress, O.; Tlatov, A.; Dormidontov, D.; Yurkov, V.; Senik, V.; Sergienko, Y.; Varda, D.; Sinyakov, E.; Shurpakov, S.; Levato, Hugo; Saffe, Carlos; Mallamaci, Claudio; Lopez, Carlos; Podest, Federico

    2012-03-01

    MASTER163105.47+615548.4 - PSN MASTER-Tunka auto-detection system discovered OT source at (RA, Dec) = 16h 31m 05.47s +61d 55m 48.4s on 2012-03-14.83877 UT. The OT unfiltered magnitude is 18.1m (limit 19.8m). The OT is seen in 5 images. There is no minor planet at this place. There is one nonstar object in The Guide Star Catalog N4HU009709 with 1.3 arcsec offset (jmag=21.9). We have reference image without OT on 2011-05-01.72794 UT with unfiltered magnitude limit 20.1m.

  7. Dark matter detection

    Science.gov (United States)

    Baudis, Laura

    2016-08-01

    More than 80 years after its first postulation in modern form, the existence and distribution of dark matter in our Universe is well established. Dark matter is the gravitational glue that holds together galaxies, galaxy clusters and structures on the largest cosmological scales, and an essential component to explain the observed fluctuations in the cosmic microwave background. Yet its existence is inferred indirectly, through its gravitational influence on luminous matter, and its nature is not known. A viable hypothesis is that dark matter is made of new, elementary particles, with allowed masses and interaction strengths spanning a wide range. Two well-motivated classes of candidates are axions and weakly interacting massive particles (WIMPs), and experimental efforts have now reached sensitivities that allow them to test this hypothesis. Axions, produced non-thermally in the early Universe, can be detected by exploiting their predicted couplings to photons and electrons. WIMPs can be detected directly by looking for their collisions with atomic nuclei ultra-low background detectors, or indirectly, through the observation of their annihilation products such as neutrinos, gamma rays, positrons and antiprotons over the astrophysical background. A complementary method is the production of dark matter particles at colliders such as the Large Hadron Collider, where they could be observed indirectly via missing transverse energy, or via associated particle production. I will review the main experimental efforts to search for dark matter particles, and the existing constraints on the interaction cross sections. I will also discuss future experiments, their complementarity and their ability to measure the properties of these particles.

  8. Early Detection Of Cancer

    Directory of Open Access Journals (Sweden)

    V B Bhatnagar

    1987-04-01

    Full Text Available Farly detection of cancer is based upon three fundamental assumptions, firstly that the trea'ment of benign and precancerous lesions reduces the incidence of cancer, secondly, that the treatment of in situ cancers is conducive to total cure and thirdly that early diagnosis and management of invasive cancer ensures be.ter survival. When patient seeks medical advice for vague symptoms, which could however be due to a possible malignant tumour at a particular site, the alert clinician should investigate the patient immediately to exclude cancer. At this stage cancer is usually not significantly advanced.Currently the U. I. C. C. (International Union for Cancer Control} is studying the epidemiology of cancers in various countries The importance of this is two folds : Firstly by focussing attention on a section of population vulnerable to a particular cancer an early detection is facilitated Secondly by changing the causative factors responsible to a particular cancer, the incidence of that cancer can be reduced e. g. reduction in lung cancer following campaigns against ciguette smoking and reductioi in breast cancer after campaigns for advocating breast feeding of infants, lowering fat consumption and encouraging self palpation of breast regularly.Indeed early diagnosis of cancer implies diagnosis of cancer in almost a symptomatic stage It involves motiva’ion of the population towards acquisitio : of knowledge, attitude and practice.. Epidemiologies and clinicians should be able to recognise high risk cases exposed to particular neoplasia and knowledge of alarming symptoms should be pro- pogated for wide publicity through common available media and means. Probable cases should have regular clhrcal examination periodically and relevant investigations including radiological, imaging techniques and Bio-Chemical examination should be undertaken as and when desired Suspicious lesions should be investigated by specific tests including smear cytology

  9. Statistical theory of signal detection

    CERN Document Server

    Helstrom, Carl Wilhelm; Costrell, L; Kandiah, K

    1968-01-01

    Statistical Theory of Signal Detection, Second Edition provides an elementary introduction to the theory of statistical testing of hypotheses that is related to the detection of signals in radar and communications technology. This book presents a comprehensive survey of digital communication systems. Organized into 11 chapters, this edition begins with an overview of the theory of signal detection and the typical detection problem. This text then examines the goals of the detection system, which are defined through an analogy with the testing of statistical hypotheses. Other chapters consider

  10. Corner Detection of Hand Gesture

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2012-12-01

    Full Text Available This paper studies the methods of corner detection of hand gesture, and mainly introduces the orthogonal three-direction chain code (3OT and uses it in corner detection of hand gesture. The study is discussed from four aspects: the techniques used in corner detection, the techniques of Freeman chain code, the main idea of 3OT, the process of corner detection with 3OT and the experiments on corner detectors used for hand gesture images of 26 letters in American Sign Language are described in detail. Experiment results show that the 3OT has well performance with exact corner detection rate and least false corner’s number.

  11. Detection Range of Airborne Magnetometers in Magnetic Anomaly Detection

    Directory of Open Access Journals (Sweden)

    Chengjing Li

    2015-11-01

    Full Text Available Airborne magnetometers are utilized for the small-range search, precise positioning, and identification of the ferromagnetic properties of underwater targets. As an important performance parameter of sensors, the detection range of airborne magnetometers is commonly set as a fixed value in references regardless of the influences of environment noise, target magnetic properties, and platform features in a classical model to detect airborne magnetic anomalies. As a consequence, deviation in detection ability analysis is observed. In this study, a novel detection range model is proposed on the basis of classic detection range models of airborne magnetometers. In this model, probability distribution is applied, and the magnetic properties of targets and the environment noise properties of a moving submarine are considered. The detection range model is also constructed by considering the distribution of the moving submarine during detection. A cell-averaging greatest-of-constant false alarm rate test method is also used to calculate the detection range of the model at a desired false alarm rate. The detection range model is then used to establish typical submarine search probabilistic models. Results show that the model can be used to evaluate not only the effects of ambient magnetic noise but also the moving and geomagnetic features of the target and airborne detection platform. The model can also be utilized to display the actual operating range of sensor systems.

  12. Features Based Text Similarity Detection

    CERN Document Server

    Kent, Chow Kok

    2010-01-01

    As the Internet help us cross cultural border by providing different information, plagiarism issue is bound to arise. As a result, plagiarism detection becomes more demanding in overcoming this issue. Different plagiarism detection tools have been developed based on various detection techniques. Nowadays, fingerprint matching technique plays an important role in those detection tools. However, in handling some large content articles, there are some weaknesses in fingerprint matching technique especially in space and time consumption issue. In this paper, we propose a new approach to detect plagiarism which integrates the use of fingerprint matching technique with four key features to assist in the detection process. These proposed features are capable to choose the main point or key sentence in the articles to be compared. Those selected sentence will be undergo the fingerprint matching process in order to detect the similarity between the sentences. Hence, time and space usage for the comparison process is r...

  13. Robust fault detection filter design

    Science.gov (United States)

    Douglas, Randal Kirk

    The detection filter is a specially tuned linear observer that forms the residual generation part of an analytical redundancy system designed for model-based fault detection and identification. The detection filter has an invariant state subspace structure that produces a residual with known and fixed directional characteristics in response to a known design fault direction. In addition to a parameterization of the detection filter gain, three methods are given for improving performance in the presence of system disturbances, sensor noise, model mismatch and sensitivity to small parameter variations. First, it is shown that by solving a modified algebraic Riccati equation, a stabilizing detection filter gain is found that bounds the H-infinity norm of the transfer matrix from system disturbances and sensor noise to the detection filter residual. Second, a specially chosen expanded-order detection filter is formed with fault detection properties identical to a set of independent reduced-order filters that have no structural constraints. This result is important to the practitioner because the difficult problem of finding a detection filter insensitive to disturbances and sensor noise is converted to the easier problem of finding a set of uncoupled noise insensitive filters. Furthermore, the statistical properties of the reduced-order filter residuals are easier to find than the statistical properties of the structurally constrained detection filter residual. Third, an interpretation of the detection filter as a special case of the dual of the restricted decoupling problem leads to a new detection filter eigenstructure assignment algorithm. The new algorithm places detection filter left eigenvectors, which annihilate the detection spaces, rather than right eigenvectors, which span the detection spaces. This allows for a more flexible observer based fault detection system structure that could not be formulated as a detection filter. Furthermore, the link to the dual

  14. Detecting alternative graph clusterings.

    Science.gov (United States)

    Mandala, Supreet; Kumara, Soundar; Yao, Tao

    2012-07-01

    The problem of graph clustering or community detection has enjoyed a lot of attention in complex networks literature. A quality function, modularity, quantifies the strength of clustering and on maximization yields sensible partitions. However, in most real world networks, there are an exponentially large number of near-optimal partitions with some being very different from each other. Therefore, picking an optimal clustering among the alternatives does not provide complete information about network topology. To tackle this problem, we propose a graph perturbation scheme which can be used to identify an ensemble of near-optimal and diverse clusterings. We establish analytical properties of modularity function under the perturbation which ensures diversity. Our approach is algorithm independent and therefore can leverage any of the existing modularity maximizing algorithms. We numerically show that our methodology can systematically identify very different partitions on several existing data sets. The knowledge of diverse partitions sheds more light into the topological organization and helps gain a more complete understanding of the underlying complex network.

  15. Detection of pump degradation

    Energy Technology Data Exchange (ETDEWEB)

    Casada, D. [Oak Ridge National Lab., TN (United States)

    1995-04-01

    There are a variety of stressors that can affect the operation of centrifugal pumps. Although these general stressors are active in essentially all centrifugal pumps, the stressor level and the extent of wear and degradation can vary greatly. Parameters that affect the extent of stressor activity are manifold. In order to assure the long-term operational readiness of a pump, it is important to both understand the nature and magnitude of the specific degradation mechanisms and to monitor the performance of the pump. The most commonly applied method of monitoring the condition of not only pumps, but rotating machinery in general, is vibration analysis. Periodic or continuous special vibration analysis is a cornerstone of most pump monitoring programs. In the nuclear industry, non-spectral vibration monitoring of safety-related pumps is performed in accordance with the ASME code. Pump head and flow rate are also monitored, per code requirements. Although vibration analysis has dominated the condition monitoring field for many years, there are other measures that have been historically used to help understand pump condition; advances in historically applied technologies and developing technologies offer improved monitoring capabilities. The capabilities of several technologies (including vibration analysis, dynamic pressure analysis, and motor power analysis) to detect the presence and magnitude of both stressors and resultant degradation are discussed.

  16. Fracture Detection and Mapping

    Energy Technology Data Exchange (ETDEWEB)

    Goldstein, Norman E.; Iovenitti, Joseph L.

    1986-01-21

    Because the costs of drilling, completing, and testing a well can be extremely high, it is important to develop better tools and methods for locating high permeability zones prior to drilling, and to develop better tools and methods for identifying and characterizing major fracture zones during the drilling and well testing stages. At the recommendation of the LBL Industry Review Panel on Geothermal Reservoir Technology, we organized and convened a one-day workshop this past July to discuss various aspects of DOE's current and planned activities in fracture detection, to review the geothermal industry's near-term and long-term research needs, to determine the priority of those needs, to disseminate to industry the status of research in progress, and to discuss the possibility of future joint research between industry and DOE. In this paper we present a brief overview of the workshop from the perspective of those who participated in it and provided us with written comments to a questionnaire that was distributed.

  17. Fracture detection and mapping

    Energy Technology Data Exchange (ETDEWEB)

    Goldstein, N.E.; Iovenitti, J.L.

    1986-03-01

    Because the costs of drilling, completing, and testing a well can be extremely high, it is important to develop better tools and methods for locating high permeability zones prior to drilling, and to develop better tools and methods for identifying and characterizing major fracture zones during the drilling and well testing stages. At the recommendation of the LBL Industry Review Panel on Geothermal Reservoir Technology, we organized and convened a one-day workshop this past July to discuss various aspects of DOE's current and planned activities in fracture detection, to review the geothermal industry's near-term and long-term research needs, to determine the priority of those needs, to disseminate to industry the status of research in progress, and to discuss the possibility of future joint research between industry and DOE. In this paper we present a brief overview of the workshop from the perspective of those who participated in it and provided us with written comments to a questionnaire that was distributed.

  18. Network intrusion detection

    Institute of Scientific and Technical Information of China (English)

    Oboile Tirelo; YANG Chun-hua

    2003-01-01

    Nowadays, network computer systems play an increasingly important role in society and economy. They have become the targets of a wide array of malicious attacks that invariably turn into actual intrusions. This is why the computer security has become an essential concern for network administrators. Too often, intrusions wreak havoc inside LANs and the time and cost to repair the damage can grow to extreme proportions. Instead of using passive measures to fix and patch security holes once they have been exploited, it is more effective to adopt a protective approach to intrusions. In addition to the well-established intrusion prevention techniques such as data encryption and message integrity, user authentication and user authorization, as well as the avoidance of security flaws inherent to many off-the-shelf applications, intrusion detection techniques can be viewed as an addition safeguard for network computers. The paper discusses traditional and new security designs, the approach to implementing best-practice security measures and the method to trace the malicious computer attackers.

  19. Doing detective work

    Energy Technology Data Exchange (ETDEWEB)

    Tocci, L.

    1991-01-01

    This paper reports that government statistics show a significant downward trend in injuries and fatalities from gas pipeline incidents since 1970. Not only are pipelines the safest mode of energy transportation in the nation, but they also help to make natural gas the bargain that it is. This record hasn't evolved by accident---the gas industry constantly keeps at its detective work to identify the sources of leakage, make repairs and look for ways to prevent leaks in the first place. In analyzing the sources of leakage, A.G.A. found that two-thirds are caused by outside forces ranging from natural disasters such as earthquakes to damaged gas facilities caused by third-party excavators. The two other leading causes of leakage--corrosion and material defects--together account for only a quarter of the incidents, yet eliminating these has been a top priority for gas companies. An array of weapons has been embraced, including leakage surveys, cathodic protection systems, pipeline coatings and annual safety audits.

  20. Directional Antineutrino Detection

    Science.gov (United States)

    Safdi, B. R.; Suerfu, J.

    2014-12-01

    We propose the first truly directional antineutrino detector for antineutrinos near the threshold for the inverse beta decay (IBD) of hydrogen, with potential applications including the spatial mapping of geo-neutrinos, searches for stellar antineutrinos, and the monitoring of nuclear reactors. The detector consists of adjacent and separated target and neutron-capture layers. The IBD events, which result in a neutron and a positron, take place in the target layers. These layers are thin enough so that the neutrons escape without scattering elastically. The neutrons are detected in the thicker neutron-capture layers. The location of the IBD event is determined from the energy deposited by the positron as it slows in the medium and from the two gamma rays that come from the positron annihilation. Since the neutron recoils in the direction of the antineutrino's motion, a line may then be drawn between the IBD event location and the neutron-capture location to approximate the antineutrino's velocity. In some events, we may even measure the positron's velocity, which further increases our ability to reconstruct the antineutrino's direction of motion. Our method significantly improves upon previous methods by allowing the neutron to freely travel a long distance before diffusing and being captured. Moreover, our design is a straightforward modification of existing antineutrino detectors; a prototype could easily be built with existing technology. We verify our design through Monte Carlo simulations in Geant4, using commercially-available boron-loaded plastic scintillators for the target and neutron-capture layer materials. We are able to discriminate from background using multiple coincidence signatures within a short, ~microsecond time interval. We conclude that the detector could likely operate above ground with minimal shielding.

  1. Detection statistics in the micromaser

    CERN Document Server

    Johnson, D B; Johnson, David B.

    2001-01-01

    We present a general method for the derivation of various statistical quantities describing the detection of a beam of atoms emerging from a micromaser. The user of non-normalized conditioned density operators and a linear master equation for the dynamics between detection events is discussed as are the counting statistics, sequence statistics, and waiting time statistics. In particular, we derive expressions for the mean number of successive detections of atoms in one of any two orthogonal states of the two-level atom. We also derive expressions for the mean waiting times between detections. We show that the mean waiting times between de- tections of atoms in like states are equivalent to the mean waiting times calculated from the uncorrelated steady state detection rates, though like atoms are indeed correlated. The mean waiting times between detections of atoms in unlike states exhibit correlations. We evaluate the expressions for various detector efficiencies using numerical integration, reporting re- sul...

  2. Molecular detection of foodborne pathogens

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann

    Microbiological Methods (NordVal) in comparative and collaborative trials, and was approved for detection of Campylobacter in chicken neck skin, cloacal swab and boot swab samples. A comparison study on probe chemistries for real-time PCR was performed on locked nucleic acid (LNA), minor groove binder (MGB......Val in comparative and collaborative trials and was approved as an alternative method for detection of Salmonella in chicken neck skin, minced meat and pig carcass swabs. In conclusion, this thesis presents the development and validation of real-time PCR methods for detection of Salmonella and Campylobacter...... for detection and enumeration of Salmonella and Campylobacter are time-consuming and laborious. They lack specificity and do not enable detection of viable but non-culturable (VBNC) bacteria. The focus of the present thesis has been development and validation of PCR-based detection methods for Salmonella...

  3. A fast meteor detection algorithm

    Science.gov (United States)

    Gural, P.

    2016-01-01

    A low latency meteor detection algorithm for use with fast steering mirrors had been previously developed to track and telescopically follow meteors in real-time (Gural, 2007). It has been rewritten as a generic clustering and tracking software module for meteor detection that meets both the demanding throughput requirements of a Raspberry Pi while also maintaining a high probability of detection. The software interface is generalized to work with various forms of front-end video pre-processing approaches and provides a rich product set of parameterized line detection metrics. Discussion will include the Maximum Temporal Pixel (MTP) compression technique as a fast thresholding option for feeding the detection module, the detection algorithm trade for maximum processing throughput, details on the clustering and tracking methodology, processing products, performance metrics, and a general interface description.

  4. Detection of signals in noise

    CERN Document Server

    McDonough, Robert N

    1995-01-01

    The Second Edition is an updated revision to the authors highly successful and widely used introduction to the principles and application of the statistical theory of signal detection. This book emphasizes those theories that have been found to be particularly useful in practice including principles applied to detection problems encountered in digital communications, radar, and sonar.Detection processing based upon the fast Fourier transform

  5. Automatic Sarcasm Detection: A Survey

    OpenAIRE

    Joshi, Aditya; Bhattacharyya, Pushpak; Carman, Mark James

    2016-01-01

    Automatic sarcasm detection is the task of predicting sarcasm in text. This is a crucial step to sentiment analysis, considering prevalence and challenges of sarcasm in sentiment-bearing text. Beginning with an approach that used speech-based features, sarcasm detection has witnessed great interest from the sentiment analysis community. This paper is the first known compilation of past work in automatic sarcasm detection. We observe three milestones in the research so far: semi-supervised pat...

  6. Materials science for nuclear detection

    Directory of Open Access Journals (Sweden)

    Anthony Peurrung

    2008-03-01

    Full Text Available The increasing importance of nuclear detection technology has led to a variety of research efforts that seek to accelerate the discovery and development of useful new radiation detection materials. These efforts aim to improve our understanding of how these materials perform, develop formalized discovery tools, and enable rapid and effective performance characterization. We provide an overview of these efforts along with an introduction to the history, physics, and taxonomy of radiation detection materials.

  7. Nanosensors for trace explosive detection

    OpenAIRE

    2008-01-01

    Selective and sensitive detection of explosives is very important in countering terrorist threats. Detecting trace explosives has become a very complex and expensive endeavor because of a number of factors, such as the wide variety of materials that can be used as explosives, the lack of easily detectable signatures, the vast number of avenues by which these weapons can be deployed, and the lack of inexpensive sensors with high sensitivity and selectivity. High sensitivity and selectivity, co...

  8. Theoretically Optimal Distributed Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — A novel general framework for distributed anomaly detection with theoretical performance guarantees is proposed. Our algorithmic approach combines existing anomaly...

  9. Detection of signals in noise

    CERN Document Server

    Whalen, Anthony D; Declaris, Nicholas

    1971-01-01

    Detection of Signals in Noise serves as an introduction to the principles and applications of the statistical theory of signal detection. The book discusses probability and random processes; narrowband signals, their complex representation, and their properties described with the aid of the Hilbert transform; and Gaussian-derived processes. The text also describes the application of hypothesis testing for the detection of signals and the fundamentals required for statistical detection of signals in noise. Problem exercises, references, and a supplementary bibliography are included after each c

  10. Ultrasound detection through turbid media.

    Science.gov (United States)

    Yu, P; Peng, L; Nolte, D D; Melloch, M R

    2003-05-15

    Optical coherence-domain reflectometry and laser-based ultrasound detection have been combined with the use of adaptive optics to detect ultrasound through turbid media. The dynamic hologram in a photorefractive quantum-well device performs as a coherence gate that eliminates multiply scattered background. Quadrature homodyne detection conditions are selected by the choice of center wavelength of the pulse spectrum, requiring no active stabilization or feedback. A depth resolution of 30 microm was achieved, with a pulse duration of nominally 120 fs for ultrasound detection through turbid media up to optical thicknesses of 11 mean free scattering lengths.

  11. Adaptive filtering and change detection

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    Adaptive filtering is a classical branch of digital signal processing (DSP). Industrial interest in adaptive filtering grows continuously with the increase in computer performance that allows ever more conplex algorithms to be run in real-time. Change detection is a type of adaptive filtering for non-stationary signals and is also the basic tool in fault detection and diagnosis. Often considered as separate subjects Adaptive Filtering and Change Detection bridges a gap in the literature with a unified treatment of these areas, emphasizing that change detection is a natural extensi

  12. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li Jia-chun; Li Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variations of attack signature. In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  13. Novel Model for Intrusion Detection

    Institute of Scientific and Technical Information of China (English)

    Li; Jia-chun; Li; Zhi-tang

    2003-01-01

    It's very difficult that the traditional intrusion detection methods based on accurate match adapt to the blur and uncertainty of user information and expert knowledge, it results in failing to report the variation of attack signature.In addition security itself includes fuzziness, the judgment standard of confidentiality, integrity and availability of system resource is uncertain. In this paper fuzzy intrusion detection based on partial match is presented to detect some types of attacks availably and alleviate some of the difficulties of above approaches, the architecture of fuzzy intrusion detection system(FIDS) is introduced and its performance is analyzed.

  14. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  15. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  16. MPI Runtime Error Detection with MUST: Advances in Deadlock Detection

    Directory of Open Access Journals (Sweden)

    Tobias Hilbrich

    2013-01-01

    Full Text Available The widely used Message Passing Interface (MPI is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST that detects such errors with significantly increased scalability. We present improvements to our graph-based deadlock detection approach for MPI, which cover future MPI extensions. Our enhancements also check complex MPI constructs that no previous graph-based detection approach handled correctly. Finally, we present optimizations for the processing of MPI operations that reduce runtime deadlock detection overheads. Existing approaches often require (p analysis time per MPI operation, for p processes. We empirically observe that our improvements lead to sub-linear or better analysis time per operation for a wide range of real world applications.

  17. Detecting suicidality on Twitter

    Directory of Open Access Journals (Sweden)

    Bridianne O'Dea

    2015-05-01

    Full Text Available Twitter is increasingly investigated as a means of detecting mental health status, including depression and suicidality, in the population. However, validated and reliable methods are not yet fully established. This study aimed to examine whether the level of concern for a suicide-related post on Twitter could be determined based solely on the content of the post, as judged by human coders and then replicated by machine learning. From 18th February 2014 to 23rd April 2014, Twitter was monitored for a series of suicide-related phrases and terms using the public Application Program Interface (API. Matching tweets were stored in a data annotation tool developed by the Commonwealth Scientific and Industrial Research Organisation (CSIRO. During this time, 14,701 suicide-related tweets were collected: 14% were randomly (n = 2000 selected and divided into two equal sets (Set A and B for coding by human researchers. Overall, 14% of suicide-related tweets were classified as ‘strongly concerning’, with the majority coded as ‘possibly concerning’ (56% and the remainder (29% considered ‘safe to ignore’. The overall agreement rate among the human coders was 76% (average κ = 0.55. Machine learning processes were subsequently applied to assess whether a ‘strongly concerning’ tweet could be identified automatically. The computer classifier correctly identified 80% of ‘strongly concerning’ tweets and showed increasing gains in accuracy; however, future improvements are necessary as a plateau was not reached as the amount of data increased. The current study demonstrated that it is possible to distinguish the level of concern among suicide-related tweets, using both human coders and an automatic machine classifier. Importantly, the machine classifier replicated the accuracy of the human coders. The findings confirmed that Twitter is used by individuals to express suicidality and that such posts evoked a level of concern that warranted

  18. Putting sarcasm detection into context

    DEFF Research Database (Denmark)

    Abercrombie, Gavin; Hovy, Dirk

    2016-01-01

    Sarcasm can radically alter or invert a phrase's meaning. Sarcasm detection can therefore help improve natural language processing (NLP) tasks. However, the majority of prior research has treated sarcasm detection as classification, with three important limitations: 1. Balanced datasets, when sar...

  19. Instruments for Methane Gas Detection

    Directory of Open Access Journals (Sweden)

    Mr. Sibu Thomas

    2014-05-01

    Full Text Available This paper gives the explanation of different instruments for detecting methane gas in detail. This paper discusses their working principles. Methane gas detection is essentially required in the areas like in coal mines, power plant, Waste Water Treatment, Boiler Rooms etc. This paper also discusses their roles in various applications.

  20. The history of exoplanet detection.

    Science.gov (United States)

    Perryman, Michael

    2012-10-01

    I summarize the early developments of the more quantitative aspects of exoplanet detection. After a brief overview of the observational methods currently applied to exoplanet searches and a summary of the first true exoplanet detections resulting from these various techniques, the more relevant historical background is organized according to the observational techniques that are currently most relevant.

  1. Detection of Sapovirus in oysters.

    Science.gov (United States)

    Ueki, You; Shoji, Mika; Okimura, Yoko; Miyota, Yasuko; Masago, Yoshifumi; Oka, Tomoichiro; Katayama, Kazuhiko; Takeda, Naokazu; Noda, Mamoru; Miura, Takayuki; Sano, Daisuke; Omura, Tatsuo

    2010-08-01

    SaV sequences which are either genetically identical or similar were detected from oysters, feces from gastroenteritis patients, and domestic wastewater samples in geographically close areas. This is the first report of the detection of SaV in oysters which meet the legal requirements for raw consumption in Japan.

  2. Candida infections : detection and epidemiology

    NARCIS (Netherlands)

    Borst, A. (Annemarie)

    2002-01-01

    Despite the fact that the yeast Candida is the number 4 cause of bloodstream infections in the United States and ranks number 8 in Europe, adequate detection methods are lacking. Furthermore, relatively little is known about the epidemiology of Candida. Our aim was to improve the detection and ident

  3. Learning to Detect Traffic Signs

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Trivedi, Mohan M.; Moeslund, Thomas B.

    2012-01-01

    This study compares the performance of sign detection based on synthetic training data to the performance of detection based on real-world training images. Viola-Jones detectors are created for 4 different traffic signs with both synthetic and real data, and varying numbers of training samples...

  4. Calculations for cosmic axion detection

    Science.gov (United States)

    Krauss, L.; Moody, J.; Wilczek, F.; Morris, D. E.

    1985-01-01

    Calculations are presented, using properly nomalized couplings and masses for Dine-Fischler-Srednicki axions, of power rates and signal temperatures for axion-photon conversion in microwave cavities. The importance of the galactic-halo axion line shape is emphasized. Spin-coupled detection as an alternative to magnetic-field-coupled detection is mentioned.

  5. Detection of COPD in smokers

    NARCIS (Netherlands)

    Geijer, R.M.M.

    2006-01-01

    Smoking is the main risk factor for Chronic Obstructive Pulmonary Disease (COPD), formerly known as lung emphysema or ‘chronic bronchitis’. Early detection of COPD and smoking cessation may result in significant health gain. In a thesis titled ‘Detection of COPD in smokers’ the results of 6 studies

  6. Surface Detection using Round Cut

    DEFF Research Database (Denmark)

    Dahl, Vedrana Andersen; Dahl, Anders Bjorholm; Larsen, Rasmus

    2014-01-01

    We propose an iterative method for detecting closed surfaces in a volumetric data, where an optimal search is performed in a graph build upon a triangular mesh. Our approach is based on previous techniques for detecting an optimal terrain-like or tubular surface employing a regular grid. Unlike s...

  7. Technology improves CBRNE response, detection

    OpenAIRE

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM The Washington, D.C. Metropolitan Police Department uses numerous programs designed to assist in the detection and response to Chemical-Biological-Radiological-Nuclear and Explosive (CBRNE incidents). These programs include deployment of detection and...

  8. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  9. Locomotive track detection for underground

    Science.gov (United States)

    Ma, Zhonglei; Lang, Wenhui; Li, Xiaoming; Wei, Xing

    2017-08-01

    In order to improve the PC-based track detection system, this paper proposes a method to detect linear track for underground locomotive based on DSP + FPGA. Firstly, the analog signal outputted from the camera is sampled by A / D chip. Then the collected digital signal is preprocessed by FPGA. Secondly, the output signal of FPGA is transmitted to DSP via EMIF port. Subsequently, the adaptive threshold edge detection, polar angle and radius constrain based Hough transform are implemented by DSP. Lastly, the detected track information is transmitted to host computer through Ethernet interface. The experimental results show that the system can not only meet the requirements of real-time detection, but also has good robustness.

  10. Molecular detection of foodborne pathogens

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann

    of these pathogens in the food chain, in order to improve intervention strategies and make more effective the control of production lines and single food items. To serve this purpose, rapid and reliable detection and quantification methods are imperative. The culture-based standard methods currently applied...... for detection and enumeration of Salmonella and Campylobacter are time-consuming and laborious. They lack specificity and do not enable detection of viable but non-culturable (VBNC) bacteria. The focus of the present thesis has been development and validation of PCR-based detection methods for Salmonella...... and Campylobacter. A conventional PCR-based method for detection of Campylobacter in chicken carcass rinse following 20 h of enrichment in Bolton broth was successfully compared to the ISO standard culture-based method (10272) on 68 naturally infected chickens. The method was subsequently validated on artificially...

  11. Potential fire detection based on Kalman-driven change detection

    CSIR Research Space (South Africa)

    Van Den Bergh, F

    2009-07-01

    Full Text Available A new active fire event detection algorithm for data collected with the Spinning Enhanced Visible and Infrared Imager (SEVIRI) sensor, based on the extended Kalman filter, is introduced. Instead of using the observed temperatures of the spatial...

  12. Change detection in satellite images

    Science.gov (United States)

    Thonnessen, U.; Hofele, G.; Middelmann, W.

    2005-05-01

    Change detection plays an important role in different military areas as strategic reconnaissance, verification of armament and disarmament control and damage assessment. It is the process of identifying differences in the state of an object or phenomenon by observing it at different times. The availability of spaceborne reconnaissance systems with high spatial resolution, multi spectral capabilities, and short revisit times offer new perspectives for change detection. Before performing any kind of change detection it is necessary to separate changes of interest from changes caused by differences in data acquisition parameters. In these cases it is necessary to perform a pre-processing to correct the data or to normalize it. Image registration and, corresponding to this task, the ortho-rectification of the image data is a further prerequisite for change detection. If feasible, a 1-to-1 geometric correspondence should be aspired for. Change detection on an iconic level with a succeeding interpretation of the changes by the observer is often proposed; nevertheless an automatic knowledge-based analysis delivering the interpretation of the changes on a semantic level should be the aim of the future. We present first results of change detection on a structural level concerning urban areas. After pre-processing, the images are segmented in areas of interest and structural analysis is applied to these regions to extract descriptions of urban infrastructure like buildings, roads and tanks of refineries. These descriptions are matched to detect changes and similarities.

  13. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...... in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models....

  14. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...... in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models....

  15. THE APPROACHING TRAIN DETECTION ALGORITHM

    Directory of Open Access Journals (Sweden)

    S. V. Bibikov

    2015-09-01

    Full Text Available The paper deals with detection algorithm for rail vibroacoustic waves caused by approaching train on the background of increased noise. The urgency of algorithm development for train detection in view of increased rail noise, when railway lines are close to roads or road intersections is justified. The algorithm is based on the method of weak signals detection in a noisy environment. The information statistics ultimate expression is adjusted. We present the results of algorithm research and testing of the train approach alarm device that implements the proposed algorithm. The algorithm is prepared for upgrading the train approach alarm device “Signalizator-P".

  16. Trends In Android Malware Detection

    Directory of Open Access Journals (Sweden)

    Kaveh Shaerpour

    2013-09-01

    Full Text Available This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the review have been well documented in this paper to aid those making an effort to research in the area of Android malware detection by understanding the current scenario and developments that have happened in the field thus far.

  17. SKIN DETECTION OF ANIMATION CHARACTERS

    Directory of Open Access Journals (Sweden)

    Kazi Tanvir Ahmed Siddiqui

    2015-02-01

    Full Text Available The increasing popularity of animes makes it vulnerable to unwanted usages like copyright violations and pornography. That’s why, we need to develop a method to detect and recognize animation characters. Skin detection is one of the most important steps in this way. Though there are some methods to detect human skin color, but those methods do not work properly for anime characters. Anime skin varies greatly from human skin in color, texture, tone and in different kinds of lighting. They also vary greatly among themselves. Moreover, many other things (for example leather, shirt, hair etc., which are not skin, can have color similar to skin. In this paper, we have proposed three methods that can identify an anime character’s skin more successfully as compared with Kovac, Swift, Saleh and Osman methods, which are primarily designed for human skin detection. Our methods are based on RGB values and their comparative relations.

  18. Detecting coherent structures using braids

    CERN Document Server

    Allshouse, Michael R

    2011-01-01

    The detection of coherent structures is an important problem in fluid dynamics, particularly in geophysical applications. For instance, knowledge of how regions of fluid are isolated from each other allows prediction of the ultimate fate of oil spills. Existing methods detect Lagrangian coherent structures, which are barriers to transport, by examining the stretching field as given by finite-time Lyapunov exponents. These methods are very effective when the velocity field is well-determined, but in many applications only a small number of flow trajectories are known, for example when dealing with oceanic float data. We introduce a topological method for detecting invariant regions based on a small set of trajectories. In the method we regard the two-dimensional trajectory data as a braid in three dimensions, with time being the third coordinate. Invariant regions then correspond to trajectories that travel together and do not entangle other trajectories. We detect these regions by examining the growth of hypo...

  19. Measurement and detection of radiation

    CERN Document Server

    Tsoulfanidis, Nicholas

    2011-01-01

    This is an update of the standard textbook for the field of radiation measurement. It includes illustrative examples and new problems. The research and applications of nuclear instrumentation have grown substantially since publication of the previous editions. With the miniaturization of equipment, increased speed of electronic components, and more sophisticated software, radiation detection systems are now more productively used in many disciplines, including nuclear nonproliferation, homeland security, and nuclear medicine. Continuing in the tradition of its bestselling predecessors, "Measurement and Detection of Radiation, Third Edition" illustrates the fundamentals of nuclear interactions and radiation detection with a multitude of examples and problems. It offers a clearly written, accessible introduction to nuclear instrumentation concepts. The following are new to the third edition: a new chapter on the latest applications of radiation detection, covering nuclear medicine, dosimetry, health physics, no...

  20. Standoff Detection Technology Evaluation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Standoff Detection Technology Evaluation facility is the only one of its kind in the country and allows researchers to release a known amount of material while...

  1. Detecting Stochastic Information of Electrocardiograms

    CERN Document Server

    Gutíerrez, R M; Guti'errez, Rafael M.; Sandoval, Luis A.

    2003-01-01

    In this work we present a method to detect, identify and characterize stochastic information contained in an electrocardiogram (ECG). We assume, as it is well known, that the ECG has information corresponding to many different processes related to the cardiac activity. We analyze scaling and Markov processes properties of the detected stochastic information using the power spectrum of the ECG and the Fokker-Planck equation respectively. The detected stochastic information is then characterized by three measures. First, the slope of the power spectrum in a particular range of frequencies as a scaling parameter. Second, an empirical estimation of the drift and diffusion coefficients of the Fokker-Planck equation through the Kramers-Moyal coefficients which define the evolution of the probability distribution of the detected stochastic information.

  2. Reduced-Dimension Multiuser Detection

    CERN Document Server

    Xie, Yao; Goldsmith, Andrea

    2011-01-01

    We explore several reduced-dimension multiuser detection (RD-MUD) structures that significantly decrease the number of required correlation branches at the receiver front-end, while still achieving performance similar to that of the conventional matched-filter (MF) bank. RD-MUD exploits the fact that the number of active users is typically small relative to the total number of users in the system and relies on ideas of analog compressed sensing to reduce the number of correlators. We first develop a general framework for both linear and nonlinear RD-MUD detectors. We then present theoretical performance analysis for two specific detectors: the linear reduced-dimension decorrelating (RDD) detector, which combines subspace projection and thresholding to determine active users and sign detection for data recovery, and the nonlinear reduced-dimension decision-feedback (RDDF) detector, which combines decision-feedback orthogonal matching pursuit for active user detection and sign detection for data recovery. The t...

  3. Detection of precessing circumpulsar disks

    CERN Document Server

    Grimani, C

    2014-01-01

    Experimental evidences indicate that formations of disks and planetary systems around pulsars are allowed. Unfortunately, direct detections through electromagnetic observations appear to be quite rare. In the case of PSR 1931+24, the hypothesis of a rigid precessing disk penetrating the pulsar light cylinder is found consistent with radio transient observations from this star. Disk self-occultation and precession may limit electromagnetic observations. Conversely, we show here that gravitational waves generated by disk precessing near the light cylinder of young and middle aged pulsars would be detected by future space interferometers with sensitivities like those expected for DECIGO (DECI-hertz Interferometer Gravitational Wave Observatory) and BBO (Big Bang Observer). The characteristics of circumpulsar detectable precessing disks are estimated as a function of distance from the Solar System. Speculations on upper limits to detection rates are presented.

  4. Hydrocarbon Leak Detection Sensor Project

    Data.gov (United States)

    National Aeronautics and Space Administration — FTT is proposing the development of a sensor to detect the presence of hydrocarbons in turbopump Inter-Propellant Seals (IPS). The purpose of the IPS is to prevent...

  5. Mystery in Sepedi detective stories

    Directory of Open Access Journals (Sweden)

    M.J. Mojalefa

    2007-07-01

    Full Text Available The aim of this article is to illustrate the importance of the concept “mystery” in the classification of Sepedi detective stories. Mystery is therefore first defined, and then some rules governing how mystery is created and sustained in a narrative are reviewed. Examples are given of how the writers of Sepedi detective stories mislead their readers in order to create mystery. Mystery is then examined according to five of its constituent elements, namely the real character of the detective, the name of the criminal, the identity of the victim, the evidence that reveals the mystery in the end, and the investigation that reveals the mystery. Each category is explored by citing relevant examples from Sepedi detective stories.

  6. Group discussion improves lie detection

    National Research Council Canada - National Science Library

    Nadav Klein; Nicholas Epley

    2015-01-01

    ... identify when a person is lying. These experiments demonstrate that the group advantage in lie detection comes through the process of group discussion, and is not a product of aggregating individual opinions...

  7. Nanotechnology for Early Cancer Detection

    Directory of Open Access Journals (Sweden)

    Joon Won Park

    2010-01-01

    Full Text Available Vast numbers of studies and developments in the nanotechnology area have been conducted and many nanomaterials have been utilized to detect cancers at early stages. Nanomaterials have unique physical, optical and electrical properties that have proven to be very useful in sensing. Quantum dots, gold nanoparticles, magnetic nanoparticles, carbon nanotubes, gold nanowires and many other materials have been developed over the years, alongside the discovery of a wide range of biomarkers to lower the detection limit of cancer biomarkers. Proteins, antibody fragments, DNA fragments, and RNA fragments are the base of cancer biomarkers and have been used as targets in cancer detection and monitoring. It is highly anticipated that in the near future, we might be able to detect cancer at a very early stage, providing a much higher chance of treatment.

  8. Method for detecting biological toxins

    Energy Technology Data Exchange (ETDEWEB)

    Ligler, F.S.; Campbell, J.R.

    1992-01-01

    Biological toxins are indirectly detected by using polymerase chain reaction to amplify unique nucleic acid sequences coding for the toxins or enzymes unique to toxin synthesis. Buffer, primers coding for the unique nucleic acid sequences and an amplifying enzyme are added to a sample suspected of containing the toxin. The mixture is then cycled thermally to exponentially amplify any of these unique nucleic acid sequences present in the sample. The amplified sequences can be detected by various means, including fluorescence. Detection of the amplified sequences is indicative of the presence of toxin in the original sample. By using more than one set of labeled primers, the method can be used to simultaneously detect several toxins in a sample.

  9. Validation of Plant Virus Detection

    NARCIS (Netherlands)

    Schadewijk, van A.R.; Meekes, E.T.M.; Verbeek, M.; Verhoeven, J.Th.J.

    2011-01-01

    Validation of test methods is required for laboratories seeking ISO 17025 accreditation. Recently developed manuals help choosing relevant performance characteristics to be studied for qualitative tests common in plant virus detection. For routine testing in certification schemes additional

  10. Recent advances in mycotoxins detection.

    Science.gov (United States)

    Chauhan, Ruchika; Singh, Jay; Sachdev, Tushar; Basu, T; Malhotra, B D

    2016-07-15

    Mycotoxins contamination in both food and feed is inevitable. Mycotoxin toxicity in foodstuff can occur at very low concentrations necessitating early availability of sensitive and reliable methods for their detection. The present research thrust is towards the development of a user friendly biosensor for mycotoxin detection at both academic and industrial levels to replace conventional expensive chromatographic and ELISA techniques. This review critically analyzes the recent research trend towards the construction of immunosensor, aptasensor, enzymatic sensors and others for mycotoxin detection with a reference to label and label free methods, synthesis of new materials including nano dimension, and transuding techniques. Technological aspects in the development of biosensors for mycotoxin detection, current challenges and future prospects are also included to provide a overview and suggestions for future research directions.

  11. Marfan's Syndrome: Detection and Management.

    Science.gov (United States)

    Cantwell, John D.

    1986-01-01

    Marfan's Syndrome, a disorder of connective tissue, has gained increased attention since the death of volleyball star Flo Hyman. This article reviews the disease and discusses methods of detection and management. (Author/MT)

  12. Acoustic detection of manatee vocalizations

    Science.gov (United States)

    Niezrecki, Christopher; Phillips, Richard; Meyer, Michael; Beusse, Diedrich O.

    2003-09-01

    The West Indian manatee (trichechus manatus latirostris) has become endangered partly because of a growing number of collisions with boats. A system to warn boaters of the presence of manatees, that can signal to boaters that manatees are present in the immediate vicinity, could potentially reduce these boat collisions. In order to identify the presence of manatees, acoustic methods are employed. Within this paper, three different detection algorithms are used to detect the calls of the West Indian manatee. The detection systems are tested in the laboratory using simulated manatee vocalizations from an audio compact disk. The detection method that provides the best overall performance is able to correctly identify ~96% of the manatee vocalizations. However, the system also results in a false alarm rate of ~16%. The results of this work may ultimately lead to the development of a manatee warning system that can warn boaters of the presence of manatees.

  13. Detection of interstellar $CH_{3}$

    CERN Document Server

    Feuchtgruber, H; Van Dishoeck, E F; Wright, C M

    2000-01-01

    Observations with the Short Wavelength Spectrometer (SWS) onboard the {\\it Infrared Space Observatory} (ISO) have led to the first detection of the methyl radical ${\\rm CH_3}$ in the interstellar medium. The $\

  14. Separating detection and catalog production

    CERN Document Server

    Akhlaghi, Mohammad

    2016-01-01

    In the coming era of massive surveys (e.g. LSST, SKA), the role of the database designers and the algorithms they choose to adopt becomes the decisive factor in scientific progress. Systems that allow/encourage users/scientists to be more creative with the reduction/analysis algorithms can greatly enhance scientific productivity. The separation/modularity of the detection processes and catalog production is one proposal for achieving `Reduction/analysis algorithms for large databases and vice versa' (a key theme for the 26th ADASS). With the new noise-based detection paradigm, non-parametric detection is now possible for astronomical objects to very low surface brightness limits. In our implementation, one software (NoiseChisel) is in charge of detection and another (MakeCatalog) is in charge of catalog production. This modularity has many advantages for pipeline developers, and more importantly, it empowers scientific curiosity and creativity.

  15. The Detectability of Orphan Afterglows

    CERN Document Server

    Piran, E N T

    2002-01-01

    The realization that GRBs release a rather constant amount of energy implies that the post jet-break afterglow evolution would be rather universal and for a given redshift they should be detected up to a fixed observer angle. We estimate the observed magnitude and the implied detectability of orphan afterglows. We show that orphan afterglows would be detectable only up to rather small ($\\sim 10^o$) angles away from the GRB jet axis. Thus a detection orphan afterglow would generally correspond to a "near-miss" of the GRB whose jet was pointing just slightly away from us. Both theoretical and phenomenological estimates of the rate of orphan afterglows suffer from a rather large uncertainty. With our "canonical" parameters we expect a dozen transients that would arise from orphan GRBs in the SDSS and a comparable number of transients in a dedicated 2M class telescope operating full time in an orphan afterglow search.

  16. Dendritic Cells for Anomaly Detection

    CERN Document Server

    Greensmith, Julie; Aickelin, Uwe

    2010-01-01

    Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in immunology, the Danger Theory. Dendritic Cells (DCs) are antigen presenting cells and key to the activation of the human signals from the host tissue and correlate these signals with proteins know as antigens. In algorithmic terms, individual DCs perform multi-sensor data fusion based on time-windows. The whole population of DCs asynchronously correlates the fused signals with a secondary data stream. The behaviour of human DCs is abstracted to form the DC Algorithm (DCA), which is implemented using an immune inspired framework, libtissue. This system is used to detect context switching for a basic machine learning dataset and to detect outgoing portscans in real-time. Experimental results show a significant difference between an outgoing portscan and normal traffic.

  17. Detection of Life Forms Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Gaia Genomics proposes to develop an instrument for the detection of earthborn and/or planetary life forms that are based on a nucleic acid paradigm. Highly...

  18. Detection of landmines (Review Paper

    Directory of Open Access Journals (Sweden)

    A.K. Sinha

    2001-04-01

    Full Text Available Detection of landmines is a problem concerning both military and peacekeeping forces. This paper reviews literature on strategic minefield layouts, modern mine clearing, and mine countermeasure techniques based on mechanical methods. Discusses hydraulic and signal processing techniques, ion-trap mobility spectrometer, subsurface probing radar and few other novel methods employed for this purpose. The specialised directions that the landmine detection methods are taking are clearly pointed out.

  19. Mine Safety Detection System (MSDS)

    Science.gov (United States)

    2012-09-01

    BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS Acronym Term ALMDS Airborne Laser -Mine Detection System AMCM Airborne Mine Countermeasure AoA...Streak Tube Imaging Laser ULCC Ultra Large Crude Carrier USN United States Navy UWIED Under Water Improvised Explosive Devices VLCC Very Large Crude...active sonar, passive sonar, infra-red (IR) thermal imaging, LIDAR (Light Detection and Ranging), and the use of marine mammals ( dolphins and porpoises

  20. A Voltage Quality Detection Method

    DEFF Research Database (Denmark)

    Chen, Zhe; Wei, Mu

    2008-01-01

    This paper presents a voltage quality detection method based on a phase-locked loop (PLL) technique. The technique can detect the voltage magnitude and phase angle of each individual phase under both normal and fault power system conditions. The proposed method has the potential to evaluate vario...... power quality disturbances, such as interruptions, sags and imbalances. Simulation studies have been performed. The effectiveness of the proposed method has been demonstrated under the simulated typical power disturbances....

  1. Photoacoustic Spectroscopy for Chemical Detection

    Science.gov (United States)

    2012-09-01

    Photoacoustic Spectroscopy for Chemical Detection by Ellen L. Holthoff and Paul M. Pellegrino ARL-RP-0410 September 2012...Laboratory Adelphi, MD 20783-1197 ARL-RP-0410 September 2012 Photoacoustic Spectroscopy for Chemical Detection Ellen L. Holthoff and Paul M...ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) September 2012 2. REPORT TYPE 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Photoacoustic

  2. Accounting fraud detection and prevention

    OpenAIRE

    DICHTLOVÁ, Anna

    2009-01-01

    The purpose, of my thesis, was to extend results of my previous thesis concerning ethics in accounting. Mainly in the field of accounting fraud detection and prevention. First, I referred to ethics in accounting, financial fraud, risks resulting from its insufficient sentencing and specific types of fraud. Secondly, I described methods of accounting fraud detection and prevention. Among others internal audit, whistleblowing, software, preventive controls, confirmation of work history and educ...

  3. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  4. Trace Explosives Detection by Photoluminescence

    OpenAIRE

    2004-01-01

    Some field tests in counter-terrorism efforts to detect explosive traces employ chemistries that yield colored products. We have examined a test kit of this kind, ETKPlus, based on widely used chemistries and employed extensively by the Israel Police. Our investigation focuses on the prospect of gaining sensitivity by replacing the normal colorimetric modality with photoluminescence detection, which, to our knowledge, has not been explored to date. We find two or more orders of magnitude sens...

  5. Local method for detecting communities

    Science.gov (United States)

    Bagrow, James P.; Bollt, Erik M.

    2005-10-01

    We propose a method of community detection that is computationally inexpensive and possesses physical significance to a member of a social network. This method is unlike many divisive and agglomerative techniques and is local in the sense that a community can be detected within a network without requiring knowledge of the entire network. A global application of this method is also introduced. Several artificial and real-world networks, including the famous Zachary karate club, are analyzed.

  6. Event Detection by Velocity Pyramid

    OpenAIRE

    2014-01-01

    In this paper, we propose velocity pyramid for multimediaevent detection. Recently, spatial pyramid matching is proposed to in-troduce coarse geometric information into Bag of Features framework,and is eective for static image recognition and detection. In video, notonly spatial information but also temporal information, which repre-sents its dynamic nature, is important. In order to fully utilize it, wepropose velocity pyramid where video frames are divided into motionalsub-regions. Our meth...

  7. Static Decoupling in fault detection

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik

    1998-01-01

    An algebraic approach is given for a design of a static residual weighting factor in connection with fault detection. A complete parameterization is given of the weighting factor which will minimize a given performance index......An algebraic approach is given for a design of a static residual weighting factor in connection with fault detection. A complete parameterization is given of the weighting factor which will minimize a given performance index...

  8. Community Detection for Large Graphs

    KAUST Repository

    Peng, Chengbin

    2014-05-04

    Many real world networks have inherent community structures, including social networks, transportation networks, biological networks, etc. For large scale networks with millions or billions of nodes in real-world applications, accelerating current community detection algorithms is in demand, and we present two approaches to tackle this issue -A K-core based framework that can accelerate existing community detection algorithms significantly; -A parallel inference algorithm via stochastic block models that can distribute the workload.

  9. Kernel Rootkits Implement and Detection

    Institute of Scientific and Technical Information of China (English)

    LI Xianghe; ZHANG Liancheng; LI Shuo

    2006-01-01

    Rootkits, which unnoticeably reside in your computer, stealthily carry on remote control and software eavesdropping, are a great threat to network and computer security. It' time to acquaint ourselves with their implement and detection. This article pays more attention to kernel rootkits, because they are more difficult to compose and to be identified than useland rootkits. The latest technologies used to write and detect kernel rootkits, along with their advantages and disadvantages, are present in this article.

  10. Multi-Sensor Mud Detection

    Science.gov (United States)

    Rankin, Arturo L.; Matthies, Larry H.

    2010-01-01

    Robust mud detection is a critical perception requirement for Unmanned Ground Vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may have to be sacrificed or rescued, both of which are unattractive options. There are several characteristics of mud that may be detectable with appropriate UGV-mounted sensors. For example, mud only occurs on the ground surface, is cooler than surrounding dry soil during the daytime under nominal weather conditions, is generally darker than surrounding dry soil in visible imagery, and is highly polarized. However, none of these cues are definitive on their own. Dry soil also occurs on the ground surface, shadows, snow, ice, and water can also be cooler than surrounding dry soil, shadows are also darker than surrounding dry soil in visible imagery, and cars, water, and some vegetation are also highly polarized. Shadows, snow, ice, water, cars, and vegetation can all be disambiguated from mud by using a suite of sensors that span multiple bands in the electromagnetic spectrum. Because there are military operations when it is imperative for UGV's to operate without emitting strong, detectable electromagnetic signals, passive sensors are desirable. JPL has developed a daytime mud detection capability using multiple passive imaging sensors. Cues for mud from multiple passive imaging sensors are fused into a single mud detection image using a rule base, and the resultant mud detection is localized in a terrain map using range data generated from a stereo pair of color cameras.

  11. Bimetallic nanoparticles for arsenic detection.

    Science.gov (United States)

    Moghimi, Nafiseh; Mohapatra, Mamata; Leung, Kam Tong

    2015-06-02

    Effective and sensitive monitoring of heavy metal ions, particularly arsenic, in drinking water is very important to risk management of public health. Arsenic is one of the most serious natural pollutants in soil and water in more than 70 countries in the world. The need for very sensitive sensors to detect ultralow amounts of arsenic has attracted great research interest. Here, bimetallic FePt, FeAu, FePd, and AuPt nanoparticles (NPs) are electrochemically deposited on the Si(100) substrate, and their electrochemical properties are studied for As(III) detection. We show that trace amounts of As(III) in neutral pH could be determined by using anodic stripping voltammetry. The synergistic effect of alloying with Fe leads to better performance for Fe-noble metal NPs (Au, Pt, and Pd) than pristine noble metal NPs (without Fe alloying). Limit of detection and linear range are obtained for FePt, FeAu, and FePd NPs. The best performance is found for FePt NPs with a limit of detection of 0.8 ppb and a sensitivity of 0.42 μA ppb(-1). The selectivity of the sensor has also been tested in the presence of a large amount of Cu(II), as the most detrimental interferer ion for As detection. The bimetallic NPs therefore promise to be an effective, high-performance electrochemical sensor for the detection of ultratrace quantities of arsenic.

  12. Seismic data fusion anomaly detection

    Science.gov (United States)

    Harrity, Kyle; Blasch, Erik; Alford, Mark; Ezekiel, Soundararajan; Ferris, David

    2014-06-01

    Detecting anomalies in non-stationary signals has valuable applications in many fields including medicine and meteorology. These include uses such as identifying possible heart conditions from an Electrocardiography (ECG) signals or predicting earthquakes via seismographic data. Over the many choices of anomaly detection algorithms, it is important to compare possible methods. In this paper, we examine and compare two approaches to anomaly detection and see how data fusion methods may improve performance. The first approach involves using an artificial neural network (ANN) to detect anomalies in a wavelet de-noised signal. The other method uses a perspective neural network (PNN) to analyze an arbitrary number of "perspectives" or transformations of the observed signal for anomalies. Possible perspectives may include wavelet de-noising, Fourier transform, peak-filtering, etc.. In order to evaluate these techniques via signal fusion metrics, we must apply signal preprocessing techniques such as de-noising methods to the original signal and then use a neural network to find anomalies in the generated signal. From this secondary result it is possible to use data fusion techniques that can be evaluated via existing data fusion metrics for single and multiple perspectives. The result will show which anomaly detection method, according to the metrics, is better suited overall for anomaly detection applications. The method used in this study could be applied to compare other signal processing algorithms.

  13. Hanle Detection for Optical Clocks

    Directory of Open Access Journals (Sweden)

    Xiaogang Zhang

    2015-01-01

    Full Text Available Considering the strong inhomogeneous spatial polarization and intensity distribution of spontaneous decay fluorescence due to the Hanle effect, we propose and demonstrate a universe Hanle detection configuration of electron-shelving method for optical clocks. Experimental results from Ca atomic beam optical frequency standard with electron-shelving method show that a designed Hanle detection geometry with optimized magnetic field direction, detection laser beam propagation and polarization direction, and detector position can improve the fluorescence collection rate by more than one order of magnitude comparing with that of inefficient geometry. With the fixed 423 nm fluorescence, the improved 657 nm optical frequency standard signal intensity is presented. The potential application of the Hanle detection geometry designed for facilitating the fluorescence collection for optical lattice clock with a limited solid angle of the fluorescence collection has been discussed. The Hanle detection geometry is also effective for ion detection in ion optical clock and quantum information experiments. Besides, a cylinder fluorescence collection structure is designed to increase the solid angle of the fluorescence collection in Ca atomic beam optical frequency standard.

  14. Detecting true lies: police officers' ability to detect suspects' lies.

    Science.gov (United States)

    Mann, Samantha; Vrij, Aldert; Bull, Ray

    2004-02-01

    Ninety-nine police officers, not identified in previous research as belonging to groups that are superior in lie detection, attempted to detect truths and lies told by suspects during their videotaped police interviews. Accuracy rates were higher than those typically found in deception research and reached levels similar to those obtained by specialized lie detectors in previous research. Accuracy was positively correlated with perceived experience in interviewing suspects and with mentioning cues to detecting deceit that relate to a suspect's story. Accuracy was negatively correlated with popular stereotypical cues such as gaze aversion and fidgeting. As in previous research, accuracy and confidence were not significantly correlated, but the level of confidence was dependent on whether officers judged actual truths or actual lies and on the method by which confidence was measured.

  15. Zeptomole electrochemical detection of metallothioneins.

    Directory of Open Access Journals (Sweden)

    Vojtech Adam

    Full Text Available BACKGROUND: Thiol-rich peptides and proteins possess a large number of biological activities and may serve as markers for numerous health problems including cancer. Metallothionein (MT, a small molecular mass protein rich in cysteine, may be considered as one of the promising tumour markers. The aim of this paper was to employ chronopotentiometric stripping analysis (CPSA for highly sensitive detection of MT. METHODOLOGY/PRINCIPAL FINDINGS: In this study, we used adsorptive transfer stripping technique coupled with CPSA for detection of cysteine, glutathione oxidized and reduced, phytochelatin, bovine serum albumin, and metallothionein. Under the optimal conditions, we were able to estimate detection limits down to tens of fg per ml. Further, this method was applied to detect metallothioneins in blood serum obtained from patients with breast cancer and in neuroblastoma cells resistant and sensitive to cisplatin in order to show the possible role of metallothioneins in carcinogenesis. It was found that MT level in blood serum was almost twice higher as compared to the level determined in healthy individuals. CONCLUSIONS/SIGNIFICANCE: This paper brings unique results on the application of ultra-sensitive electroanalytical method for metallothionein detection. The detection limit and other analytical parameters are the best among the parameters of other techniques. In spite of the fact that the paper is mainly focused on metallothionein, it is worth mentioning that successful detection of other biologically important molecules is possible by this method. Coupling of this method with simple isolation methods such as antibody-modified paramagnetic particles may be implemented to lab-on-chip instrument.

  16. On Applications of Selenodesy to Lunar Detection

    Institute of Scientific and Technical Information of China (English)

    WEI Erhu; LIU Jingnan

    2006-01-01

    According to the history of lunar detection, the relationship between selenodesy and lunar detection is reviewed , and the focus of the lunar detection and the lunar detection plan of China are summarized. The key techniques of selenodesy are presented, and the applications of selenodesy to the lunar detection are discussed.

  17. Application of detecting algorithm based on network

    Institute of Scientific and Technical Information of China (English)

    张凤斌; 杨永田; 江子扬; 孙冰心

    2004-01-01

    Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively,according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively.

  18. Complementarity between collider, direct detection, and indirect detection experiments

    CERN Document Server

    Cahill-Rowley, Matthew

    2014-01-01

    We examine the capabilities of planned direct detection, indirect detection, and collider experiments in exploring the 19-parameter p(henomenological)MSSM, focusing on the complementarity between the different search techniques. In particular, we consider dark matter searches at the 7, 8 (and eventually 14) TeV LHC, \\Fermi, CTA, IceCube/DeepCore, and LZ. We see that the search sensitivities depend strongly on the WIMP mass and annihilation mechanism, with the result that different search techniques explore orthogonal territory. We also show that advances in each technique are necessary to fully explore the space of Supersymmetric WIMPs.

  19. Radio frequency detection assembly and method for detecting radio frequencies

    Science.gov (United States)

    Cown, Steven H.; Derr, Kurt Warren

    2010-03-16

    A radio frequency detection assembly is described and which includes a radio frequency detector which detects a radio frequency emission produced by a radio frequency emitter from a given location which is remote relative to the radio frequency detector; a location assembly electrically coupled with the radio frequency detector and which is operable to estimate the location of the radio frequency emitter from the radio frequency emission which has been received; and a radio frequency transmitter electrically coupled with the radio frequency detector and the location assembly, and which transmits a radio frequency signal which reports the presence of the radio frequency emitter.

  20. Bioreporter bacteria for landmine detection

    Energy Technology Data Exchange (ETDEWEB)

    Burlage, R.S. [Oak Ridge National Lab., TN (United States); Youngblood, T. [Frisby Technologies, Aiken, SC (United States); Lamothe, D. [American Technologies, Inc., Huntsville, AL (United States). Ordnance/Explosives Environmental Services Div.

    1998-04-01

    Landmines (and other UXO) gradually leak explosive chemicals into the soil at significant concentrations. Bacteria, which have adapted to scavenge low concentrations of nutrients, can detect these explosive chemicals. Uptake of these chemicals results in the triggering of specific bacterial genes. The authors have created genetically recombinant bioreporter bacteria that detect small concentrations of energetic chemicals. These bacteria are genetically engineered to produce a bioluminescent signal when they contact specific explosives. A gene for a brightly fluorescent compound can be substituted for increased sensitivity. By finding the fluorescent bacteria, you find the landmine. Detection might be accomplished using stand-off illumination of the minefield and GPS technology, which would result in greatly reduced risk to the deminers. Bioreporter technology has been proven at the laboratory scale, and will be tested under field conditions in the near future. They have created a bacterial strain that detects sub-micromolar concentrations of o- and p-nitrotoluene. Related bacterial strains were produced using standard laboratory protocols, and bioreporters of dinitrotoluene and trinitrotoluene were produced, screening for activity with the explosive compounds. Response time is dependent on the growth rate of the bacteria. Although frill signal production may require several hours, the bacteria can be applied over vast areas and scanned quickly, producing an equivalent detection speed that is very fast. This technology may be applicable to other needs, such as locating buried explosives at military and ordnance/explosive manufacturing facilities.

  1. Saliency detection for stereoscopic images.

    Science.gov (United States)

    Fang, Yuming; Wang, Junle; Narwaria, Manish; Le Callet, Patrick; Lin, Weisi

    2014-06-01

    Many saliency detection models for 2D images have been proposed for various multimedia processing applications during the past decades. Currently, the emerging applications of stereoscopic display require new saliency detection models for salient region extraction. Different from saliency detection for 2D images, the depth feature has to be taken into account in saliency detection for stereoscopic images. In this paper, we propose a novel stereoscopic saliency detection framework based on the feature contrast of color, luminance, texture, and depth. Four types of features, namely color, luminance, texture, and depth, are extracted from discrete cosine transform coefficients for feature contrast calculation. A Gaussian model of the spatial distance between image patches is adopted for consideration of local and global contrast calculation. Then, a new fusion method is designed to combine the feature maps to obtain the final saliency map for stereoscopic images. In addition, we adopt the center bias factor and human visual acuity, the important characteristics of the human visual system, to enhance the final saliency map for stereoscopic images. Experimental results on eye tracking databases show the superior performance of the proposed model over other existing methods.

  2. Software Defect Detection with Rocus

    Institute of Scientific and Technical Information of China (English)

    Yuan Jiang; Ming Li; Zhi-Hua Zhou

    2011-01-01

    Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many machine learning methods have been successfully applied to the task, most of them fail to consider two practical yet important issues in software defect detection. First, it is rather difficult to collect a large amount of labeled training data for learning a well-performing model; second, in a software system there are usually much fewer defective modules than defect-free modules, so learning would have to be conducted over an imbalanced data set. In this paper, we address these two practical issues simultaneously by proposing a novel semi-supervised learning approach named Rocus. This method exploits the abundant unlabeled examples to improve the detection accuracy, as well as employs under-sampling to tackle the class-imbalance problem in the learning process. Experimental results of real-world software defect detection tasks show that Rocgs is effective for software defect detection. Its performance is better than a semi-supervised learning method that ignores the class-imbalance nature of the task and a class-imbalance learning method that does not make effective use of unlabeled data.

  3. Automatic Hazard Detection for Landers

    Science.gov (United States)

    Huertas, Andres; Cheng, Yang; Matthies, Larry H.

    2008-01-01

    Unmanned planetary landers to date have landed 'blind'; that is, without the benefit of onboard landing hazard detection and avoidance systems. This constrains landing site selection to very benign terrain,which in turn constrains the scientific agenda of missions. The state of the art Entry, Descent, and Landing (EDL) technology can land a spacecraft on Mars somewhere within a 20-100km landing ellipse.Landing ellipses are very likely to contain hazards such as craters, discontinuities, steep slopes, and large rocks, than can cause mission-fatal damage. We briefly review sensor options for landing hazard detection and identify a perception approach based on stereo vision and shadow analysis that addresses the broadest set of missions. Our approach fuses stereo vision and monocular shadow-based rock detection to maximize spacecraft safety. We summarize performance models for slope estimation and rock detection within this approach and validate those models experimentally. Instantiating our model of rock detection reliability for Mars predicts that this approach can reduce the probability of failed landing by at least a factor of 4 in any given terrain. We also describe a rock detector/mapper applied to large-high-resolution images from the Mars Reconnaissance Orbiter (MRO) for landing site characterization and selection for Mars missions.

  4. Historical Techniques of Lie Detection

    Directory of Open Access Journals (Sweden)

    Martina Vicianova

    2015-08-01

    Full Text Available Since time immemorial, lying has been a part of everyday life. For this reason, it has become a subject of interest in several disciplines, including psychology. The purpose of this article is to provide a general overview of the literature and thinking to date about the evolution of lie detection techniques. The first part explores ancient methods recorded circa 1000 B.C. (e.g., God’s judgment in Europe. The second part describes technical methods based on sciences such as phrenology, polygraph and graphology. This is followed by an outline of more modern-day approaches such as FACS (Facial Action Coding System, functional MRI, and Brain Fingerprinting. Finally, after the familiarization with the historical development of techniques for lie detection, we discuss the scope for new initiatives not only in the area of designing new methods, but also for the research into lie detection itself, such as its motives and regulatory issues related to deception.

  5. Optimal dynamic detection of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Moore, David Steven [Los Alamos National Laboratory; Mcgrane, Shawn D [Los Alamos National Laboratory; Greenfield, Margo T [Los Alamos National Laboratory; Scharff, R J [Los Alamos National Laboratory; Rabitz, Herschel A [PRINCETON UNIV; Roslund, J [PRINCETON UNIV

    2009-01-01

    The detection of explosives is a notoriously difficult problem, especially at stand-off distances, due to their (generally) low vapor pressure, environmental and matrix interferences, and packaging. We are exploring optimal dynamic detection to exploit the best capabilities of recent advances in laser technology and recent discoveries in optimal shaping of laser pulses for control of molecular processes to significantly enhance the standoff detection of explosives. The core of the ODD-Ex technique is the introduction of optimally shaped laser pulses to simultaneously enhance sensitivity of explosives signatures while reducing the influence of noise and the signals from background interferents in the field (increase selectivity). These goals are being addressed by operating in an optimal nonlinear fashion, typically with a single shaped laser pulse inherently containing within it coherently locked control and probe sub-pulses. With sufficient bandwidth, the technique is capable of intrinsically providing orthogonal broad spectral information for data fusion, all from a single optimal pulse.

  6. Quickest detection in coupled systems

    CERN Document Server

    Hadjiliadis, Olympia; Poor, H Vincent

    2009-01-01

    This work considers the problem of quickest detection of signals in a coupled system of N sensors, which receive continuous sequential observations from the environment. It is assumed that the signals, which are modeled a general Ito processes, are coupled across sensors, but that their onset times may differ from sensor to sensor. The objective is the optimal detection of the first time at which any sensor in the system receives a signal. The problem is formulated as a stochastic optimization problem in which an extended average Kullback- Leibler divergence criterion is used as a measure of detection delay, with a constraint on the mean time between false alarms. The case in which the sensors employ cumulative sum (CUSUM) strategies is considered, and it is proved that the minimum of N CUSUMs is asymptotically optimal as the mean time between false alarms increases without bound.

  7. A new vehicle detection method

    Directory of Open Access Journals (Sweden)

    Zebbara Khalid

    2011-09-01

    Full Text Available This paper presents a new vehicle detection method from images acquired by cameras embedded in a moving vehicle. Given the sequence of images, the proposed algorithms should detect out all cars in realtime. Related to the driving direction, the cars can be classified into two types. Cars drive in the same direction as the intelligent vehicle (IV and cars drive in the opposite direction. Due to the distinct features of these two types, we suggest to achieve this method in two main steps. The first one detects all obstacles from images using the so-called association combined with corner detector. The second step is applied to validate each vehicle using AdaBoost classifier. The new method has been applied to different images data and the experimental results validate the efficacy of our method.

  8. EUROmediCAT signal detection

    DEFF Research Database (Denmark)

    Given, Joanne E; Loane, Maria; Luteijn, Johannes Michiel

    2016-01-01

    AIMS: To evaluate congenital anomaly (CA)-medication exposure associations produced by the new EUROmediCAT signal detection system and determine which require further investigation. METHODS: Data from 15 EUROCAT registries (1995-2011) with medication exposures at the chemical substance (5th level......, and independent evidence sought to confirm the remaining signals. Some chance associations are expected and confounding by indication is possible.......AIMS: To evaluate congenital anomaly (CA)-medication exposure associations produced by the new EUROmediCAT signal detection system and determine which require further investigation. METHODS: Data from 15 EUROCAT registries (1995-2011) with medication exposures at the chemical substance (5th level...... of Anatomic Therapeutic Chemical classification) and chemical subgroup (4th level) were analysed using a 50% false detection rate. After excluding antiepileptics, antidiabetics, antiasthmatics and SSRIs/psycholeptics already under investigation, 27 associations were evaluated. If evidence for a signal...

  9. Group discussion improves lie detection.

    Science.gov (United States)

    Klein, Nadav; Epley, Nicholas

    2015-06-16

    Groups of individuals can sometimes make more accurate judgments than the average individual could make alone. We tested whether this group advantage extends to lie detection, an exceptionally challenging judgment with accuracy rates rarely exceeding chance. In four experiments, we find that groups are consistently more accurate than individuals in distinguishing truths from lies, an effect that comes primarily from an increased ability to correctly identify when a person is lying. These experiments demonstrate that the group advantage in lie detection comes through the process of group discussion, and is not a product of aggregating individual opinions (a "wisdom-of-crowds" effect) or of altering response biases (such as reducing the "truth bias"). Interventions to improve lie detection typically focus on improving individual judgment, a costly and generally ineffective endeavor. Our findings suggest a cheap and simple synergistic approach of enabling group discussion before rendering a judgment.

  10. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  11. Informant: Detecting Sybils Using Incentives

    Science.gov (United States)

    Margolin, N. Boris; Levine, Brian N.

    We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one identity a security deposit and the name of target peer; the deposit and a reward are given to the target. We prove the optimal strategy for the informant is to play the game if and only if she is Sybil with a low opportunity cost, and the target will cooperate if and only if she is identical to the informant. Informant uses a Dutch auction to find the minimum possible reward that will reveal a Sybil attacker. Because our approach is economic, it is not limited to a specific application and does not rely on a physical device or token.

  12. EUROmediCAT signal detection

    DEFF Research Database (Denmark)

    Luteijn, Johannes Michiel; Morris, Joan K; Garne, Ester

    2016-01-01

    AIMS: Information about medication safety in pregnancy is inadequate. We aimed to develop a signal detection methodology to routinely identify unusual associations between medications and congenital anomalies using data collected by 15 European congenital anomaly registries. METHODS: EUROmedi....... The methodology was evaluated by considering the detection of well-known teratogens. RESULTS: The most common exposures were genitourinary system medications and sex hormones (35.2%), nervous system medications (28.0%) and anti-infectives for systemic use (25.7%). Fifty-two specific medication anomaly......). CONCLUSIONS: Medication exposure data in the EUROmediCAT central database can be analyzed systematically to determine a manageable set of associations for validation and then testing in independent datasets. Detection of teratogens depends on frequency of exposure, level of risk and teratogenic specificity....

  13. Minimax Robust Quickest Change Detection

    CERN Document Server

    Unnikrishnan, Jayakrishnan; Meyn, Sean

    2009-01-01

    The two popular criteria of optimality for quickest change detection procedures are Lorden's criterion and the Bayesian criterion. In this paper a robust version of these quickest change detection problems is considered when the pre-change and post-change distributions are not known exactly but belong to known uncertainty classes of distributions. For uncertainty classes that satisfy a specific condition, it is shown that one can identify least favorable distributions (LFDs) from the uncertainty classes, such that the detection rule designed for the LFDs is optimal for the robust problem in a minimax sense. The condition is similar to that required for the identification of LFDs for the robust hypothesis testing problem studied by Huber. An upper bound on the delay incurred by the robust test is also obtained in the asymptotic setting under Lorden's criterion of optimality, which quantifies the delay penalty incurred to guarantee robustness. When the LFDs can be identified, the proposed test is easier to impl...

  14. Optomechanics for absolute rotation detection

    Science.gov (United States)

    Davuluri, Sankar

    2016-07-01

    In this article, we present an application of optomechanical cavity for the absolute rotation detection. The optomechanical cavity is arranged in a Michelson interferometer in such a way that the classical centrifugal force due to rotation changes the length of the optomechanical cavity. The change in the cavity length induces a shift in the frequency of the cavity mode. The phase shift corresponding to the frequency shift in the cavity mode is measured at the interferometer output to estimate the angular velocity of absolute rotation. We derived an analytic expression to estimate the minimum detectable rotation rate in our scheme for a given optomechanical cavity. Temperature dependence of the rotation detection sensitivity is studied.

  15. Analog electronics for radiation detection

    CERN Document Server

    2016-01-01

    Analog Electronics for Radiation Detection showcases the latest advances in readout electronics for particle, or radiation, detectors. Featuring chapters written by international experts in their respective fields, this authoritative text: Defines the main design parameters of front-end circuitry developed in microelectronics technologies Explains the basis for the use of complementary metal oxide semiconductor (CMOS) image sensors for the detection of charged particles and other non-consumer applications Delivers an in-depth review of analog-to-digital converters (ADCs), evaluating the pros and cons of ADCs integrated at the pixel, column, and per-chip levels Describes incremental sigma delta ADCs, time-to-digital converter (TDC) architectures, and digital pulse-processing techniques complementary to analog processing Examines the fundamental parameters and front-end types associated with silicon photomultipliers used for single visible-light photon detection Discusses pixel sensors ...

  16. APDS: Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

    2002-02-14

    An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

  17. Intelligent Detection of Drill Wear

    Science.gov (United States)

    Liu, T. I.; Chen, W. Y.; Anatharaman, K. S.

    1998-11-01

    Backpropagation neural networks (BPNs) were used for on-line detection of drill wear. The neural network consisted of three layers: input, hidden, and output. The input vector comprised drill size, feed rate, spindle speed, and eight features obtained by processing the thrust and torque signals. The output was the drill wear state which either usable or failure. Drilling experiments with various drill sizes, feed rates and spindle speeds were carried out. The learning process was performed effectively by utilising backpropagation with smoothing and an activation function slope. The on-line detection of drill wear states using BPNs achieved 100% reliability even when the drill size, feed rate and spindle speed were changed. In other words, the developed on-line drill wear detection systems have very high robustness and hence can be used in very complex production environments, such as flexible manufacturing systems.

  18. Detecting density variations and nanovoids.

    Science.gov (United States)

    Miller, M K; Longstreth-Spoor, L; Kelton, K F

    2011-05-01

    A combination of simulated and experimental data has been used to investigate the size range of nanovoids that can be detected in atom probe tomography data. Simulated atom probe tomography data have revealed that nanovoids as small as 1 nm in diameter can be detected in atom probe tomography data with the use of iso-density surfaces. Iso-density surfaces may be used to quantify the size, morphology and number density of nanovoids and other variations in density in atom probe tomography data. Experimental data from an aluminum-yttrium-iron metallic glass ribbon have revealed the effectiveness of this approach. Combining iso-density surfaces with atom maps also permits the segregation of solute to the nanovoids to be investigated. Field ion microscopy and thin section atom maps have also been used to detect pores and larger voids. Published by Elsevier B.V.

  19. C. elegans-on-a-chip for in situ and in vivo Ag nanoparticles’ uptake and toxicity assay

    Science.gov (United States)

    Kim, Jin Ho; Lee, Seung Hwan; Cha, Yun Jeong; Hong, Sung Jin; Chung, Sang Kug; Park, Tai Hyun; Choi, Shin Sik

    2017-01-01

    Nanomaterials are extensively used in consumer products and medical applications, but little is known about their environmental and biological toxicities. Moreover, the toxicity analysis requires sophisticated instruments and labor-intensive experiments. Here we report a microfluidic chip incorporated with the nematode Caenorhabditis elegans that rapidly displays the changes in body growth and gene expression specifically responsive to the silver nanoparticles (AgNPs). C. elegans were cultured in microfluidic chambers in the presence or absence of AgNPs and were consequently transferred to wedge-shaped channels, which immobilized the animals, allowing the evaluation of parameters such as length, moving distance, and fluorescence from the reporter gene. The AgNPs reduced the length of C. elegans body, which was easily identified in the channel of chip. In addition, the decrease of body width enabled the worm to advance the longer distance compared to the animal without nanoparticles in a wedge-shaped channel. The transgenic marker DNA, mtl-2::gfp was highly expressed upon the uptake of AgNPs, resulting in green fluorescence emission. The comparative investigation using gold nanoparticles and heavy-metal ions indicated that these parameters are specific to AgNPs. These results demonstrate that C. elegans-on-a-chip has a great potential as a rapid and specific nanoparticle detection or nanotoxicity assessment system.

  20. C. elegans-on-a-chip for in situ and in vivo Ag nanoparticles' uptake and toxicity assay.

    Science.gov (United States)

    Kim, Jin Ho; Lee, Seung Hwan; Cha, Yun Jeong; Hong, Sung Jin; Chung, Sang Kug; Park, Tai Hyun; Choi, Shin Sik

    2017-01-09

    Nanomaterials are extensively used in consumer products and medical applications, but little is known about their environmental and biological toxicities. Moreover, the toxicity analysis requires sophisticated instruments and labor-intensive experiments. Here we report a microfluidic chip incorporated with the nematode Caenorhabditis elegans that rapidly displays the changes in body growth and gene expression specifically responsive to the silver nanoparticles (AgNPs). C. elegans were cultured in microfluidic chambers in the presence or absence of AgNPs and were consequently transferred to wedge-shaped channels, which immobilized the animals, allowing the evaluation of parameters such as length, moving distance, and fluorescence from the reporter gene. The AgNPs reduced the length of C. elegans body, which was easily identified in the channel of chip. In addition, the decrease of body width enabled the worm to advance the longer distance compared to the animal without nanoparticles in a wedge-shaped channel. The transgenic marker DNA, mtl-2::gfp was highly expressed upon the uptake of AgNPs, resulting in green fluorescence emission. The comparative investigation using gold nanoparticles and heavy-metal ions indicated that these parameters are specific to AgNPs. These results demonstrate that C. elegans-on-a-chip has a great potential as a rapid and specific nanoparticle detection or nanotoxicity assessment system.

  1. C. elegans-on-a-chip for in situ and in vivo Ag nanoparticles’ uptake and toxicity assay

    Science.gov (United States)

    Kim, Jin Ho; Lee, Seung Hwan; Cha, Yun Jeong; Hong, Sung Jin; Chung, Sang Kug; Park, Tai Hyun; Choi, Shin Sik

    2017-01-01

    Nanomaterials are extensively used in consumer products and medical applications, but little is known about their environmental and biological toxicities. Moreover, the toxicity analysis requires sophisticated instruments and labor-intensive experiments. Here we report a microfluidic chip incorporated with the nematode Caenorhabditis elegans that rapidly displays the changes in body growth and gene expression specifically responsive to the silver nanoparticles (AgNPs). C. elegans were cultured in microfluidic chambers in the presence or absence of AgNPs and were consequently transferred to wedge-shaped channels, which immobilized the animals, allowing the evaluation of parameters such as length, moving distance, and fluorescence from the reporter gene. The AgNPs reduced the length of C. elegans body, which was easily identified in the channel of chip. In addition, the decrease of body width enabled the worm to advance the longer distance compared to the animal without nanoparticles in a wedge-shaped channel. The transgenic marker DNA, mtl-2::gfp was highly expressed upon the uptake of AgNPs, resulting in green fluorescence emission. The comparative investigation using gold nanoparticles and heavy-metal ions indicated that these parameters are specific to AgNPs. These results demonstrate that C. elegans-on-a-chip has a great potential as a rapid and specific nanoparticle detection or nanotoxicity assessment system. PMID:28067319

  2. Community Detection by Neighborhood Similarity

    Institute of Scientific and Technical Information of China (English)

    LIU Xu; XIE Zheng; YI Dong-Yun

    2012-01-01

    Detection of the community structure in a network is important for understanding the structure and dynamics of the network.By exploring the neighborhood of vertices,a local similarity metric is proposed,which can be quickly computed.The resulting similarity matrix retains the same support as the adjacency matrix.Based on local similarity,an agglomerative hierarchical clustering algorithm is proposed for community detection.The algorithm is implemented by an efficient max-heap data structure and runs in nearly linear time,thus is capable of dealing with large sparse networks with tens of thousands of nodes.Experiments on synthesized and real-world networks demonstrate that our method is efficient to detect community structures,and the proposed metric is the most suitable one among all the tested similarity indices.%Detection of the community structure in a network is important for understanding the structure and dynamics of the network. By exploring the neighborhood of vertices, a local similarity metric is proposed, which can be quickly computed. The resulting similarity matrix retains the same support as the adjacency matrix. Based on local similarity, an agglomerative hierarchical clustering algorithm is proposed for community detection. The algorithm is implemented by an efficient max-heap data structure and runs in nearly linear time, thus is capable of dealing with large sparse networks with tens of thousands of nodes. Experiments on synthesized and real-world networks demonstrate that our method is efficient to detect community structures, and the proposed metric is the most suitable one among all the tested similarity indices.

  3. The detectability of climate engineering

    Science.gov (United States)

    Bürger, Gerd; Cubasch, Ulrich

    2015-11-01

    We assess the detection and attribution (D&A) of climate engineering (CE) as a function of their duration after initiation. We employ "surrogate" climates where observations are mimicked by simulations. Unlike classical, stationary D&A, the null hypothesis for this analysis is the nonstationary gradual warming caused by continued greenhouse gas (GHG) forcing, which creates a number of theoretical and technical complications. Adapting D&A to this nonstationary setting requires several ad hoc assumptions whose validity is analyzed and discussed. We study the stratospheric sulfur injection scenarios G3 and G4 of the Geoengineering Model Intercomparison Project. For G3, which smoothly balances global warming with a corresponding cooling, the effect is smaller initially and harder to detect. Temperature and precipitation signals are detectable about a decade after commencing CE and attributable a few years later (details depending on model and scenario). The G4 scenario consists of a continuous injection of 5 Tg SO2 (roughly one fourth of the Pinatubo eruption per year), which represents a shock-like forcing that is easier and earlier detectable, just after a few years. Later into the century, uncertainty in GHG sensitivity increasingly dominates the background noise, hampering G4 detection. Spatiotemporal CE fingerprints produce more stable D&A results, with smoother dependence on time. Spatial resolution (within the range of a few spherical harmonics) is less relevant. We argue that especially for early detectability, climate predictions (with proper initialization from observations) are more promising. Many details depend on the choice of climate model for observation and fingerprint. We discuss the potential and limitation of using multimodel ensembles.

  4. Anomaly detection enhanced classification in computer intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Fugate, M. L. (Michael L.); Gattiker, J. R. (James R.)

    2002-01-01

    This report describes work with the goal of enhancing capabilities in computer intrusion detection. The work builds upon a study of classification performance, that compared various methods of classifying information derived from computer network packets into attack versus normal categories, based on a labeled training dataset. This previous work validates our classification methods, and clears the ground for studying whether and how anomaly detection can be used to enhance this performance, The DARPA project that initiated the dataset used here concluded that anomaly detection should be examined to boost the performance of machine learning in the computer intrusion detection task. This report investigates the data set for aspects that will be valuable for anomaly detection application, and supports these results with models constructed from the data. In this report, the term anomaly detection means learning a model from unlabeled data, and using this to make some inference about future data. Our data is a feature vector derived from network packets: an 'example' or 'sample'. On the other hand, classification means building a model from labeled data, and using that model to classify unlabeled (future) examples. There is some precedent in the literature for combining these methods. One approach is to stage the two techniques, using anomaly detection to segment data into two sets for classification. An interpretation of this is a method to combat nonstationarity in the data. In our previous work, we demonstrated that the data has substantial temporal nonstationarity. With classification methods that can be thought of as learning a decision surface between two statistical distributions, performance is expected to degrade significantly when classifying examples that are from regions not well represented in the training set. Anomaly detection can be seen as a problem of learning the density (landscape) or the support (boundary) of a statistical

  5. Thermographic Detection of separated Flow

    Science.gov (United States)

    Dollinger, C.; Balaresque, N.; Schaffarczyk, A. P.; Fischer, A.

    2016-09-01

    Thermographic wind tunnel measurements, both on a cylinder as well as on a 2D airfoil, were performed at various Reynolds numbers in order to evaluate the possibility of detecting and visualizing separated flow areas. A new approach by acquiring a series of thermographic images and applying a spatial-temporal statistical analysis allows improving both the resolution and the information content of the thermographic images. Separated flow regions become visible and laminar/turbulent transitions can be detected more accurately. The knowledge about possibly present stall cells can be used to confirm two-dimensional flow conditions and support the development of more effective and silent rotorblades.

  6. Detecting and Correcting Speech Repairs

    CERN Document Server

    Heeman, P A; Heeman, Peter; Allen, James

    1994-01-01

    Interactive spoken dialog provides many new challenges for spoken language systems. One of the most critical is the prevalence of speech repairs. This paper presents an algorithm that detects and corrects speech repairs based on finding the repair pattern. The repair pattern is built by finding word matches and word replacements, and identifying fragments and editing terms. Rather than using a set of prebuilt templates, we build the pattern on the fly. In a fair test, our method, when combined with a statistical model to filter possible repairs, was successful at detecting and correcting 80\\% of the repairs, without using prosodic information or a parser.

  7. The Portable Metal Detecting Meter

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Using backscatter principle of ray, one kind of the portable metal detecting meters, which comprises five parts, i.e., a ray-emitter, a ray acceptor, discriminating and forming pulse circuits, storing and processing data units, a light and sound alarm device, and a power supply, had been invented. It can judge existence of danger articles as weapons and daggers hided inside luggages, pracels, or clothing of passengers or persons without opening packing. The detecting distance between the meter and danger objects, at present, is about one meter, but can be extended adopting improvement for key parts. For comparison, up to now, in the whole world, known information

  8. Fire detection in warehouse facilities

    CERN Document Server

    Dinaburg, Joshua

    2013-01-01

    Automatic sprinklers systems are the primary fire protection system in warehouse and storage facilities. The effectiveness of this strategy has come into question due to the challenges presented by modern warehouse facilities, including increased storage heights and areas, automated storage retrieval systems (ASRS), limitations on water supplies, and changes in firefighting strategies. The application of fire detection devices used to provide early warning and notification of incipient warehouse fire events is being considered as a component of modern warehouse fire protection.Fire Detection i

  9. Single Bacterium Detection Using Sers

    Science.gov (United States)

    Gonchukov, S. A.; Baikova, T. V.; Alushin, M. V.; Svistunova, T. S.; Minaeva, S. A.; Ionin, A. A.; Kudryashov, S. I.; Saraeva, I. N.; Zayarny, D. A.

    2016-02-01

    This work is devoted to the study of a single Staphylococcus aureus bacterium detection using surface-enhanced Raman spectroscopy (SERS) and resonant Raman spectroscopy (RS). It was shown that SERS allows increasing sensitivity of predominantly low frequency lines connected with the vibrations of Amide, Proteins and DNA. At the same time the lines of carotenoids inherent to this kind of bacterium are well-detected due to the resonance Raman scattering mechanism. The reproducibility and stability of Raman spectra strongly depend on the characteristics of nanostructured substrate, and molecular structure and size of the tested biological object.

  10. Intelligent System for Worm Detection

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2009-01-01

    Full Text Available Worms are on the top of malware threats attacking computer system although of the evolution of worms detectiontechniques. Early detection of unknown worms is still a problem. This paper produce a method for detecting unknown wormsbased on local victim information. The proposed system uses Artificial Neural Network (ANN for classifying worm/ nonwormtraffic and predicting the percentage of infection in the infected network. This prediction can be used to support decisionmaking process for network administrator to respond quickly to worm propagation in an accurate procedure.

  11. Detection of Water Borne Protozoa

    DEFF Research Database (Denmark)

    Al-Sabi, Mohammad Nafi Solaiman; Enemark, Heidi L.; Kurtzhals, J.A.L.

    Protozoa of several species play a key role in water borne outbreaks of diarrhea worldwide. Identification of such protozoa depends mainly on parasite detection. However, water contains several hundreds of thousands of microorganisms belonging to different taxa. The exact identification...... of pathogenic protozoa relies on selective isolation and detection that is conducted by experienced technicians. Advanced techniques such as immuno-fluorescent dyes, polymerase chain reaction, and many other techniques, may be used for species-specific identification of pathogenic protozoa. Each diagnostic...... parasitic protozoa from other organisms in the aquatic environment....

  12. Detecting lateral genetic material transfer

    CERN Document Server

    Calderón, C; Mireles, V; Miramontes, P

    2012-01-01

    The bioinformatical methods to detect lateral gene transfer events are mainly based on functional coding DNA characteristics. In this paper, we propose the use of DNA traits not depending on protein coding requirements. We introduce several semilocal variables that depend on DNA primary sequence and that reflect thermodynamic as well as physico-chemical magnitudes that are able to tell apart the genome of different organisms. After combining these variables in a neural classificator, we obtain results whose power of resolution go as far as to detect the exchange of genomic material between bacteria that are phylogenetically close.

  13. Picosecond measurements using photoacoustic detection

    Science.gov (United States)

    Heritier, J.-M.; Siegman, A. E.

    1983-01-01

    A report is presented of experimental results on picosecond time-resolved photoacoustic measurements of excited-state lifetimes, cross sections, and polarization properties for organic dye molecules in solution, using a new technique in which the total photoacoustic impulse produced by two ultrashort optical pulses with variable time delay between them is detected. The picosecond photoacoustic detection technique reported here appears to be a promising new way to observe weak excited-state cross sections and to perform picosecond lifetime measurements in a large variety of weakly absorbing and/or nonfluorescing atomic and molecular systems.

  14. Detecting and detering employee theft.

    Science.gov (United States)

    Stewart, E E

    1997-02-01

    Physician group practices can limit their vulnerability to employee theft by taking steps to detect theft when it occurs and to deter future occurrences. Steps for detecting theft include being wary of an employee's refusal to take earned time off, conducting periodic credit checks on employees, rotating employees' duties, and conducting impromptu reviews of the practice's finances. Steps for detering theft include routing the practice's checks to a lock box; reviewing cash reports; reconciling check with deposit statements; separating employees' duties; reviewing bank, credit card, and ATM statements; setting the tone for prudent financial management; and reporting cases of theft when they occur.

  15. Detecting Botnets Through Log Correlation

    CERN Document Server

    Al-Hammadi, Yousof

    2010-01-01

    Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (SSoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their arguments in log files. Our algorithm detects botnets based on monitoring abnormal activity by correlating the changes in log file sizes from different hosts.

  16. A contrario line segment detection

    CERN Document Server

    von Gioi, Rafael Grompone

    2014-01-01

    The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This?book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some possible

  17. Detection of Water Borne Protozoa

    DEFF Research Database (Denmark)

    Al-Sabi, Mohammad Nafi Solaiman; Enemark, Heidi L.; Kurtzhals, J.A.L.

    Protozoa of several species play a key role in water borne outbreaks of diarrhea worldwide. Identification of such protozoa depends mainly on parasite detection. However, water contains several hundreds of thousands of microorganisms belonging to different taxa. The exact identification...... of pathogenic protozoa relies on selective isolation and detection that is conducted by experienced technicians. Advanced techniques such as immuno-fluorescent dyes, polymerase chain reaction, and many other techniques, may be used for species-specific identification of pathogenic protozoa. Each diagnostic...... parasitic protozoa from other organisms in the aquatic environment....

  18. Intrusion Detection using unsupervised learning

    Directory of Open Access Journals (Sweden)

    Kusum bharti

    2010-08-01

    Full Text Available Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge datasets. But sometime kmean clustering fails to give best result because of class dominance problem and no class problem. So for removing these problems we are proposing two new algorithms for cluster to class assignment. According to our experimental results the proposed algorithm are having high precision and recall for low class instances.

  19. The Bering Autonomous Target Detection

    DEFF Research Database (Denmark)

    Jørgensen, John Leif; Denver, Troelz; Betto, Maurizio

    2003-01-01

    An autonomous asteroid target detection and tracking method has been developed. The method features near omnidirectionality and focus on high speed operations and completeness of search of the near space rather than the traditional faint object search methods, employed presently at the larger...... telescopes. The method has proven robust in operation and is well suited for use onboard spacecraft. As development target for the method and the associated instrumentation the asteroid research mission Bering has been used. Onboard a spacecraft, the autonomous detection is centered around the fully...

  20. On computational Gestalt detection thresholds.

    Science.gov (United States)

    Grompone von Gioi, Rafael; Jakubowicz, Jérémie

    2009-01-01

    The aim of this paper is to show some recent developments of computational Gestalt theory, as pioneered by Desolneux, Moisan and Morel. The new results allow to predict much more accurately the detection thresholds. This step is unavoidable if one wants to analyze visual detection thresholds in the light of computational Gestalt theory. The paper first recalls the main elements of computational Gestalt theory. It points out a precision issue in this theory, essentially due to the use of discrete probability distributions. It then proposes to overcome this issue by using continuous probability distributions and illustrates it on the meaningful alignment detector of Desolneux et al.

  1. Worm attack detection and response

    Institute of Scientific and Technical Information of China (English)

    CHEN Bo; YU Xiangzhan; FANG Binxing; YUN Xiaochun

    2007-01-01

    There appear many Internet-scale worm incidents in recent years,which have caused severe damage to the society.It is clear that a simple self-propagation worm can quickly spread across the Internet.Therefore,it is necessary to implement automatic mitigation which can detect worm and drop its packet.In this paper,the worm's framework was first analyzed and its two characteristies were detected.Based on the two characteristics,a defending algorithm was presented to protect network.Experimental results verify that our algorithm is very effective to constrain the worm propagation and meanwhile it almost does not interfere in normal activity.

  2. Comparison of time to detect definitions

    OpenAIRE

    Dubois, Laurence M.

    1986-01-01

    Approved for public release; distribution is unlimited This thesis concerns the measurement of times to detect multiple targets. It compares two common definitions of times to detection--interdetection time, and search time to detection--to a relatively new definition called time in field-of-view until detection. This comparison uses the data from the Thermal Pinpoint Test conducted from July to December 1983. Detection time distributions and mean times to detection were studied, lookin...

  3. Point pattern match-based change detection in a constellation of previously detected objects

    Science.gov (United States)

    Paglieroni, David W.

    2016-06-07

    A method and system is provided that applies attribute- and topology-based change detection to objects that were detected on previous scans of a medium. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, detection strength, size, elongation, orientation, etc. The locations define a three-dimensional network topology forming a constellation of previously detected objects. The change detection system stores attributes of the previously detected objects in a constellation database. The change detection system detects changes by comparing the attributes and topological consistency of newly detected objects encountered during a new scan of the medium to previously detected objects in the constellation database. The change detection system may receive the attributes of the newly detected objects as the objects are detected by an object detection system in real time.

  4. Social Network Aided Plagiarism Detection

    Science.gov (United States)

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  5. Can Lies Be Detected Unconsciously?

    Directory of Open Access Journals (Sweden)

    David eShanks

    2015-08-01

    Full Text Available People are typically poor at telling apart truthful and deceptive statements. Based on the Unconscious Thought Theory, it has been suggested that poor lie detection arises from the intrinsic limitations of conscious thinking and can be improved by facilitating the contribution of unconscious thought. In support of this hypothesis, Reinhard, Greifeneder, and Scharmach (2013 observed improved lie detection among participants engaging in unconscious thought. The present study aimed to replicate this unconscious thought advantage using a similar experimental procedure but with an important improvement in a key control condition. Specifically, participants judged the truthfulness of 8 video recordings in three thinking modes: immediately after watching them or after a period of unconscious or conscious deliberation. Results from two experiments (combined N = 226 failed to reveal a significant difference in lie detection accuracy between the thinking modes, even after efforts were made to facilitate the occurrence of an unconscious thought advantage in Experiment 2. The results imply that the unconscious thought advantage in deception detection is not a robust phenomenon.

  6. Anomalous change detection in imagery

    Science.gov (United States)

    Theiler, James P.; Perkins, Simon J.

    2011-05-31

    A distribution-based anomaly detection platform is described that identifies a non-flat background that is specified in terms of the distribution of the data. A resampling approach is also disclosed employing scrambled resampling of the original data with one class specified by the data and the other by the explicit distribution, and solving using binary classification.

  7. Detecting Social Polarization and Radicalization

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    This paper proposes a novel system to detect social polarization and to estimate the chances of violent radicalization associated with it. The required processes for such a system are indicated; it is also analyzed how existing technologies can be integrated into the proposed system to fulfill...

  8. Detecting abnormalities in gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Smati, A. (Institut National des Hydrocarbures et de la Chimie, Bournerdes (Azerbaijan))

    1994-12-01

    The results of the measurement of the principal operating parameters can contain precious information on the condition of gas pipelines. This article explains how statistical tests may be useful in detecting anomalies that can occur on lines and in compressor stations. (author). 6 refs., 3 tabs., 1 fig.

  9. Cousin of Higgs boson detected

    CERN Multimedia

    2006-01-01

    "A particle with no chage, a very low mass and a lifetime much shorter than a nanosecond, known as the axion, has been detected by the University of Buffalo (UB) physicist who first suggested its existence 30 years ago. (1,5 page)

  10. Ship Infrared Detection/Vulnerability

    NARCIS (Netherlands)

    Jong, A.N. de

    1993-01-01

    The IR contrast of ships at sea is of importance for those who want to detect or identify the ship and for those who worry about this. This IR contrast is determined by a large number of parameters. Of course temperatures of the ship's structure and those of the ambient sea and air are important, bu

  11. System for detecting microbial contamination

    NARCIS (Netherlands)

    Gerritse, J.; Groenestijn, J.W.; Zegers, N.D.

    2009-01-01

    The present invention relates to a system for detecting microbial contamination of a liquid specimen comprising a device for concentrating micro-organisms from a liquid specimen, having (i) a hypobaric chamber, (ii) a filter housing comprising a liquid-permeable bed of an adsorbent material and adap

  12. Detecting non-transiting exoplanets

    Science.gov (United States)

    Placek, Ben; Richards, Zachary; Knuth, Kevin H.

    2013-08-01

    Currently, the most popular way of detecting Extra-solar planets (exoplanets) is via the Transit Method. This method is limited only to planets with orbits such that we observe them transiting their host star. In this work in progress, we propose to identify non-transiting exoplanets in the data currently being collected by the Kepler Space Telescope by detecting orbital phase reflected light variations. Since such variations are due to light from the host star reflected by the planet, we expect this method to work best on closely orbitting large planets. Using the Metropolis-Hastings Monte Carlo and Nested Sampling algorithms, we will determine the presence or absence of nontransiting planets and estimate their orbital parameters such as, orbital inclination, semi-major axis, period, and eccentricity. Our estimates indicate that the development of this technique has the potential to double the number of detectable planets in the Kepler data sets. Here we demonstrate feasibility using portions of data from one of the first transiting planets detected by Kepler, HAT-P-7b.

  13. Fault detection using (PI) observers

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Stoustrup, J.; Shafai, B.

    The fault detection and isolation (FDI) problem in connection with Proportional Integral (PI) Observers is considered in this paper. A compact formulation of the FDI design problem using PI observers is given. An analysis of the FDI design problem is derived with respectt to the time domain...... properties. A method for design of PI observers applied to FDI is given....

  14. Towards Detection of Unknown GMOs

    NARCIS (Netherlands)

    Holst-Jensen, A.; Berdal, K.G.; Bertheau, Y.; Bohanec, M.; Bohlin, J.; Chaouachi, M.; Gruden, K.; Hamels, S.; Kok, E.J.; Krech, A.; Kristoffersen, A.B.; Laval, V.; Leimanis, S.; Lovoll, M.; Morisset, D.; Nemeth, A.; Papazova, N.; Prins, T.W.; Remacle, J.; Richl, P.; Ruttink, T.; Taverniers, I.; Tengs, T.; Dijk, van J.P.; Wulff, D.; Zel, J.; Zhang, H.; Znidarsic, M.

    2012-01-01

    The state-of-the-art technology for detection of genetically modified organisms (GMOs) is polymerase chain reaction. The targets are novel sequences such as genes, but the insertion locus sequences are also important for GMO identification. GMOs go through a series of developmental stages, in which

  15. Lameness detection in dairy cattle

    NARCIS (Netherlands)

    Hertem, Van T.; Bahr, C.; Schlageter Tello, A.; Viazzi, S.; Steensels, M.; Romanini, C.E.B.; Lokhorst, C.; Maltz, E.; Halachmi, I.; Berckmans, D.

    2016-01-01

    The objective of this study was to evaluate if a multi-sensor system (milk, activity, body posture) was a better classifier for lameness than the single-sensor-based detection models. Between September 2013 and August 2014, 3629 cow observations were collected on a commercial dairy farm in

  16. Fault Detection for Nonlinear Systems

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, H.H.

    1998-01-01

    The paper describes a general method for designing fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of methods based...

  17. Visual Inspection for Caries Detection

    DEFF Research Database (Denmark)

    Gimenez, T; Piovesan, C; Braga, M M

    2015-01-01

    We aimed to perform a systematic review including a meta-analysis to evaluate the overall accuracy of visual methods for detecting carious lesions and to identify possible sources of heterogeneity among the studies included. Two reviewers searched PubMed, Embase, Scopus, and other sources through...

  18. Global Disease Detectives in Kibera

    Centers for Disease Control (CDC) Podcasts

    2010-12-06

    In partnership with our disease detectives, urban poor open their homes to the world to prevent and control emerging diseases.  Created: 12/6/2010 by CDC Center for Global Health.   Date Released: 12/6/2010.

  19. Turning Students into Symmetry Detectives

    Science.gov (United States)

    Wilders, Richard; VanOyen, Lawrence

    2011-01-01

    Exploring mathematical symmetry is one way of increasing students' understanding of art. By asking students to search designs and become pattern detectives, teachers can potentially increase their appreciation of art while reinforcing their perception of the use of math in their day-to-day lives. This article shows teachers how they can interest…

  20. Towards Detection of Unknown GMOs

    NARCIS (Netherlands)

    Holst-Jensen, A.; Berdal, K.G.; Bertheau, Y.; Bohanec, M.; Bohlin, J.; Chaouachi, M.; Gruden, K.; Hamels, S.; Kok, E.J.; Krech, A.; Kristoffersen, A.B.; Laval, V.; Leimanis, S.; Lovoll, M.; Morisset, D.; Nemeth, A.; Papazova, N.; Prins, T.W.; Remacle, J.; Richl, P.; Ruttink, T.; Taverniers, I.; Tengs, T.; Dijk, van J.P.; Wulff, D.; Zel, J.; Zhang, H.; Znidarsic, M.

    2012-01-01

    The state-of-the-art technology for detection of genetically modified organisms (GMOs) is polymerase chain reaction. The targets are novel sequences such as genes, but the insertion locus sequences are also important for GMO identification. GMOs go through a series of developmental stages, in which

  1. Operational formulation of homodyne detection

    CERN Document Server

    Tyc, T; Tyc, Tomas; Sanders, Barry C.

    2004-01-01

    We obtain the standard quadrature-phase positive operator-valued measure (POVM) for homodyne detection directly and rigorously from the POVM for direct photon counting. In addition we obtain correction terms for the quadrature-phase POVM that are applicable for relatively weak local oscillator field strengths and typical signal states.

  2. Microvariability Detection of Mrk 421

    Indian Academy of Sciences (India)

    Xu Chen; Shao Ming Hu; Di Fu Guo

    2014-09-01

    BL Lac object Mrk 421 was observed in optical bands from 2009 April to 2012 May with the 1.0-m telescope at Weihai Observatory of Shandong University. Microvariability was analysed by C and F tests, but no significant microvariability was detected during our observations.

  3. Modeling for Standoff Surface Detection

    Science.gov (United States)

    2013-11-01

    Start Digi ” button (Figure 6) starts the Acqiris digitizer, and clicking on the “Stop Digi ” button stops the digitizer. The flow chart (Figure 7) shows...the algorithm used to collect data during this process. When the operator clicks the “Start Digi ” button, the Surface Detect software has a

  4. Protein Detection with Aptamer Biosensors

    Directory of Open Access Journals (Sweden)

    Regina Stoltenburg

    2008-07-01

    Full Text Available Aptamers have been developed for different applications. Their use as new biological recognition elements in biosensors promises progress for fast and easy detection of proteins. This new generation of biosensor (aptasensors will be more stable and well adapted to the conditions of real samples because of the specific properties of aptamers.

  5. Computational Attention for Event Detection

    OpenAIRE

    Mancas, Matei; Couvreur, Laurent; Gosselin, Bernard; Macq, Benoît

    2007-01-01

    This article deals with a biologically-motivated three-level computational attention model architecture based on the rarity and the information theory framework. It mainly focuses on low-level and medium-level steps and their application in pre-attentive detection of tumours in CT scans and unusual events in audio recordings.

  6. Experiences with network intrusion detection

    NARCIS (Netherlands)

    Coolen, R.; Luiijf, H.A.M.; Geloven, W.J.F. van; Bakker, E.A.

    2002-01-01

    This paper describes our experience with several commercial Network Intrusion Detection Systems (NIDSs)deployed in a network connected to the Internet. Specific problems in the operation of NIDS are highlighted, and a number of solutions to identified problems will be presented. Finally, we shall pr

  7. Improved immunocytochemical detection of daunomycin

    DEFF Research Database (Denmark)

    Ohara, Koji; Shin, Masashi; Larsson, Lars-Inge

    2007-01-01

    Improved immunocytochemical (ICC) detection of the anthracycline anticancer antibiotic daunomycin (DM) has been achieved by used of hydrogen peroxide oxidation prior to ICC staining for DM. The new method greatly enhanced the localization of DM accumulation in cardiac, smooth and skeletal muscle...

  8. Detection of autoantibodies to cytokines

    DEFF Research Database (Denmark)

    Bendtzen, K; Hansen, M B; Ross, C

    2000-01-01

    to the native forms of the mediators unrecognized. On the other hand, Ab may bind nonspecifically and/or with biologically irrelevant low affinities, leading to erroneous interpretations. This article describes in detail the use of radioimmunoassays that we have optimized and used successfully for the detection...

  9. Expository Escapade--Detective's Handbook.

    Science.gov (United States)

    Gaines, Lisa

    Students will combine reading in the detective fiction genre with expository writing. Embedded in this unit are reading and writing skills, such as defining, editing, explaining, illustrating, justifying, revising, supporting, and validating. During fifteen 40-minute lessons, grade 6-8 students will: recognize a form of literature according to its…

  10. Detecting Social Polarization and Radicalization

    DEFF Research Database (Denmark)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    This paper proposes a novel system to detect social polarization and to estimate the chances of violent radicalization associated with it. The required processes for such a system are indicated; it is also analyzed how existing technologies can be integrated into the proposed system to fulfill...

  11. Molecular detection of foodborne pathogens

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann

    ), Scorpion and TaqMan probes. The LNA probe was shown to be the most sensitive probe chemistry in the real-time PCR assay for detection of Campylobacter, producing the highest amplification efficiency. Choice of probe chemistry was found to impact the sensitivity of PCR assays, and should be considered...

  12. Computer Viruses: Pathology and Detection.

    Science.gov (United States)

    Maxwell, John R.; Lamon, William E.

    1992-01-01

    Explains how computer viruses were originally created, how a computer can become infected by a virus, how viruses operate, symptoms that indicate a computer is infected, how to detect and remove viruses, and how to prevent a reinfection. A sidebar lists eight antivirus resources. (four references) (LRW)

  13. Dark Matter Detection in Space

    OpenAIRE

    Feng, Jonathan L.

    2004-01-01

    I review prospects for detecting dark matter in space-based experiments, with an emphasis on recent developments. I propose the ``Martha Stewart criterion'' for identifying dark matter candidates that are particularly worth investigation and focus on three that satisfy it: neutralino dark matter, Kaluza-Klein dark matter, and superWIMP gravitino dark matter.

  14. Neutron detection apparatus and method

    Energy Technology Data Exchange (ETDEWEB)

    Derzon, Mark S.; Borek, III, Theodore T.

    2017-08-15

    An apparatus for neutron detection is provided. The apparatus comprises a sensor medium in electrical contact with an electrode arrangement conformed to collect radiation-generated charge from the sensor medium. The sensor medium comprises a borazine and/or a borazine-based polymer.

  15. The Detectability of Orphan Afterglows

    Science.gov (United States)

    Nakar, Ehud; Piran, Tsvi; Granot, Jonathan

    2002-11-01

    The realization that gamma-ray bursts (GRBs) release a constant amount of energy implies that post-jet-break afterglow evolution is largely universal. For a given redshift, all afterglows should be detected up to a fixed observer angle. We estimate the observed magnitude and the implied detectability of orphan afterglows. We show that for reasonable limiting magnitudes (mlim=25), orphan afterglows will typically be detected from small (~10°) angles away from the GRB jet axis. A detected orphan afterglow generally corresponds to a ``near miss'' of a GRB whose jet is pointing just slightly away from us. With our most optimistic parameters, we expect that 15 orphan afterglows will be recorded in the Sloan Digital Sky Survey, and 35 transients will be recorded in a dedicated 2 m class telescope operating full time for a year in an orphan afterglow search. The rate is smaller by a factor of 15 for our ``canonical'' parameters. We show that for a given facility, an optimal survey should be shallower, covering a larger area, rather than deeper. The limiting magnitude should not be, however, lower than ~23, as in this case, more transients from on-axis GRBs will be discovered than orphan afterglows. About 15% of the transients could be discovered with a second exposure of the same area provided that it follows after 3, 4, and 8 days for mlim=23, 25, and 27, respectively.

  16. Social Network Aided Plagiarism Detection

    Science.gov (United States)

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  17. Marker Detection in Aerial Images

    KAUST Repository

    Alharbi, Yazeed

    2017-04-09

    The problem that the thesis is trying to solve is the detection of small markers in high-resolution aerial images. Given a high-resolution image, the goal is to return the pixel coordinates corresponding to the center of the marker in the image. The marker has the shape of two triangles sharing a vertex in the middle, and it occupies no more than 0.01% of the image size. An improvement on the Histogram of Oriented Gradients (HOG) is proposed, eliminating the majority of baseline HOG false positives for marker detection. The improvement is guided by the observation that standard HOG description struggles to separate markers from negatives patches containing an X shape. The proposed method alters intensities with the aim of altering gradients. The intensity-dependent gradient alteration leads to more separation between filled and unfilled shapes. The improvement is used in a two-stage algorithm to achieve high recall and high precision in detection of markers in aerial images. In the first stage, two classifiers are used: one to quickly eliminate most of the uninteresting parts of the image, and one to carefully select the marker among the remaining interesting regions. Interesting regions are selected by scanning the image with a fast classifier trained on the HOG features of markers in all rotations and scales. The next classifier is more precise and uses our method to eliminate the majority of the false positives of standard HOG. In the second stage, detected markers are tracked forward and backward in time. Tracking is needed to detect extremely blurred or distorted markers that are missed by the previous stage. The algorithm achieves 94% recall with minimal user guidance. An average of 30 guesses are given per image; the user verifies for each whether it is a marker or not. The brute force approach would return 100,000 guesses per image.

  18. Detection in superheated water chromatography

    Energy Technology Data Exchange (ETDEWEB)

    Chienthavorn, O

    1999-11-01

    Superheated water has been used successfully as an eluent in liquid chromatography and has been coupled to various modes of detection, ultraviolet (UV), fluorescence, and nuclear magnetic resonance spectroscopy (NMR) and mass spectrometry (MS). A number of compounds were examined on poly(styrene-divinylbenzene) (PS-DVB), polybutadiene (PBD), and octadecylsilyl bonded silica (ODS) column with isothermal and temperature programmes. The PS-DVB column was mostly used throughout the project as it was the most stable. Not only pure water could serve as superheated water mobile phase; inorganic buffered water and ion-pairing reagent with a concentration of 1-3 mM of the buffer and reagent were also exploited. It was shown that the pH could be controlled during the separation without salt precipitation and the separations followed a conventional reversed-phase HPLC method. Results from fluorescence detection showed good separation of a series of vitamins, such as pyridoxine, riboflavin, thiamine, and some analgesics. The relationship of riboflavin using the detection was linear and the detection limit was seven times higher than that of a conventional method. Simultaneous separation and identification using superheated water chromatography-NMR was demonstrated. With using a stop flow method, NMR spectra of model drugs, namely barbiturates, paracetamol, caffeine and phenacetin were obtained and the results agreed with reference spectra, confirming a perfect separation. A demonstration to obtain COSY spectrum of salicylamide was also performed. The method was expanded to the coupling of superheated water LC to NMR-MS. Results from the hyphenated detection method showed that deuteration and degradation happened in the superheated water conditions. The methyl group hydrogens of pyrimidine ring of sulfonamide and thiamine were exchanged with deuterium. Thiamine was decomposed to 4-methyl-5-thiazoleethanol and both were deuterated under the conditions. (author)

  19. Countering countermeasures: detecting identity lies by detecting conscious breakthrough.

    Directory of Open Access Journals (Sweden)

    Howard Bowman

    Full Text Available One major drawback of deception detection is its vulnerability to countermeasures, whereby participants wilfully modulate their physiological or neurophysiological response to critical guilt-determining stimuli. One reason for this vulnerability is that stimuli are usually presented slowly. This allows enough time to consciously apply countermeasures, once the role of stimuli is determined. However, by increasing presentation speed, stimuli can be placed on the fringe of awareness, rendering it hard to perceive those that have not been previously identified, hindering the possibility to employ countermeasures. We tested an identity deception detector by presenting first names in Rapid Serial Visual Presentation and instructing participants to lie about their own identity. We also instructed participants to apply a series of countermeasures. The method proved resilient, remaining effective at detecting deception under all countermeasures.

  20. Landmine Detection Technologies to TraceExplosive Vapour Detection Techniques

    Directory of Open Access Journals (Sweden)

    J. C. Kapoor

    2007-11-01

    Full Text Available Large quantity of explosive is manufactured worldwide for use in various types of ammunition,arms, and mines, and used in armed conflicts. During manufacturing and usage of the explosiveequipment, some of the explosive residues are released into the environment in the form ofcontaminated effluents, unburnt explosives fumes and vapours. Limited but uncontrolledcontinuous release of trace vapours also takes place when explosive-laden landmines are deployedin the field. One of the major technological challenges in post-war scenario worldwide is thedetection of landmines using these trace vapour signatures and neutralising them safely.  Differenttypes of explosives are utilised as the main charge in antipersonnel and antitank landmines. Inthis paper, an effort has been made to review the techniques so far available based on explosivevapour detection especially to detect the landmines. A comprehensive compilation of relevantinformation on the techniques is presented, and their maturity levels, shortcomings, and difficultiesfaced are highlighted.

  1. Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources

    CERN Document Server

    Merhav, Neri

    2007-01-01

    An information-theoretic approach is proposed to watermark embedding and detection under limited detector resources. First, we consider the attack-free scenario under which asymptotically optimal decision regions in the Neyman-Pearson sense are proposed, along with the optimal embedding rule. Later, we explore the case of zero-mean i.i.d. Gaussian covertext distribution with unknown variance under the attack-free scenario. For this case, we propose a lower bound on the exponential decay rate of the false-negative probability and prove that the optimal embedding and detecting strategy is superior to the customary linear, additive embedding strategy in the exponential sense. Finally, these results are extended to the case of memoryless attacks and general worst case attacks. Optimal decision regions and embedding rules are offered, and the worst attack channel is identified.

  2. Real-Time Detection of a Virus Using Detection Dogs

    Directory of Open Access Journals (Sweden)

    Craig eAngle

    2016-01-01

    Full Text Available Viral infections are ubiquitous in humans, animals, and plants. Real-time methods to identify viral infections are limited and do not exist for use in harsh or resource-constrained environments. Previous research identified that tissues produce unique volatile organic compounds (VOC and demonstrated that VOC concentrations change during pathologic states including infection, neoplasia, or metabolic disease. Patterns of VOC expression may be pathogen-specific and may be associated with an odor that could be used for disease detection.We investigated the ability of two trained dogs to detect cell cultures infected with bovine viral diarrhea virus (BVDV and to discriminate BVDV-infected cell cultures from uninfected cell cultures and from cell cultures infected with bovine herpes virus 1 (BHV 1 and bovine parainfluenza virus 3 (BPIV 3. Dogs were trained to recognize cell cultures infected with two different biotypes of BVDV propagated in MDBK cells using one of three culture media. For detection trials, one target and seven distractors were presented on a scent wheel by a dog handler unaware of the location of targets and distractors.Detection of BVDV- infected cell cultures by Dog 1 had a diagnostic sensitivity of 0.850 (95% CI: 0.701 - 0.942, which was lower than Dog 2 (0.967, 95% CI: 0.837 - 0.994. Both dogs exhibited very high diagnostic specificity (0.981, 95% CI: 0.960 - 0.993 and (0.993, 95% CI: 0.975 - 0.999, respectively.These findings demonstrate that trained dogs can differentiate between cultured cells infected with BVDV, BHV1, and BPIV3 and are a realistic real-time mobile pathogen sensing technology for viral pathogens. The ability to discriminate between target and distractor samples plausibly results from expression of unique VOC patterns virus-infected and uninfected cells.

  3. Effective LiDAR Damage Detection: Comparing Two Detection Algorithms

    Institute of Scientific and Technical Information of China (English)

    BIAN Haitao; BAI Libin; WANG Xiaoyu; LIU Wangiu; CHEN Shenen; WANG Shengguo

    2011-01-01

    The health conditions of highway bridges is critical for sustained transportation operations. US federal government mandates that all bridges built with public funds are to be inspected visually every two years.There is a growing consensus that additional rapid and non-intrusive methods for bridge damage evaluation are needed. This paper explores the potential of applying ground-based laser scanners for bridge damage evaluation. LiDAR has the potential of providing high-density, full-field surface static imaging. Hence, it can generate volumetric quantification of concrete corrosion or steel erosion. By recording object surface topology, LiDAR can detect different damages on the bridge structure and differentiate damage types according to the surface flatness and smoothness. To determine the effectiveness of LiDAR damage detection, two damage detection algorithms are presented and compared using scans on actual bridge damages. The results demonstrate and validate LiDAR damage quantification, which can be a powerful tool for bridge condition evaluation.

  4. Early Detection of Ovarian Cancer

    Directory of Open Access Journals (Sweden)

    Donna Badgwell

    2007-01-01

    Full Text Available Despite advances in therapy, ovarian cancer remains the most deadly of the gynecological cancers. Less than 30% of women with advanced stage disease survive long-term. When diagnosed in stage I, up to 90% of patients can be cured with conventional surgery and chemotherapy. At present, only 25% of ovarian cancers are detected in stage I due, in part, to the absence of specific symptoms and to lack of an effective screening strategy. Early detection of ovarian cancer might significantly improve the overall survival rate of women with ovarian cancer if 1 most cancers are clonal and unifocal, arising in the ovary rather than in the peritoneum, 2 metastatic disease results from progression of clinically detectable stage I lesions, and 3 cancers remain localized for a sufficient interval to permit cost-effective screening. Given the prevalence of ovarian cancer, strategies for early detection must have high sensitivity for early stage disease (> 75%, but must have extremely high specificity (99.6% to attain a positive predictive value of at least 10%. Transvaginal sonography (TVS, serum markers and a combination of the two modalities have been evaluated for early detection of ovarian cancer. Among the serum markers, CA125 has received the most attention, but lacks the sensitivity or specificity to function alone as a screening test. Greater specificity can be achieved by combining CA125 and TVS and/or by monitoring CA125 over time. Two stage screening strategies promise to be cost effective, where abnormal serum assays prompt TVS to detect lesions that require laparotomy. Accrual has been completed for a 200,000 woman trial in the United Kingdom that will test the ability of a rising CA125 to trigger TVS and subsequent exploratory surgery. Given the heterogeneity of ovarian cancer, it is unlikely that any single marker will be sufficiently sensitive to provide an effective initial screen. Sensitivity of serum assays might be enhanced by utilizing a

  5. Anomalous human behavior detection: An Adaptive approach

    NARCIS (Netherlands)

    Leeuwen, C. van; Halma, A.; Schutte, K.

    2013-01-01

    Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous

  6. Infrared landmine detection and thermal model analysis

    NARCIS (Netherlands)

    Schwering, P.B.W.; Kokonozi, A.; Carter, L.J.; Lensen, H.A.; Franken, E.M.

    2001-01-01

    Infrared imagers are capable of the detection of surface laid mines. Several sensor fused land mine detection systems make use of metal detectors, ground penetrating radar and infrared imagers. Infrared detection systems are sensitive to apparent temperature contrasts and their detection capabilitie

  7. On Radar Resolution in Coherent Change Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Bickel, Douglas L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    It is commonly observed that resolution plays a role in coherent change detection. Although this is the case, the relationship of the resolution in coherent change detection is not yet defined . In this document, we present an analytical method of evaluating this relationship using detection theory. Specifically we examine the effect of resolution on receiver operating characteristic curves for coherent change detection.

  8. Anomalous human behavior detection: An Adaptive approach

    NARCIS (Netherlands)

    Leeuwen, C. van; Halma, A.; Schutte, K.

    2013-01-01

    Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous b

  9. Noise canceling in-situ detection

    Science.gov (United States)

    Walsh, David O.

    2014-08-26

    Technologies applicable to noise canceling in-situ NMR detection and imaging are disclosed. An example noise canceling in-situ NMR detection apparatus may comprise one or more of a static magnetic field generator, an alternating magnetic field generator, an in-situ NMR detection device, an auxiliary noise detection device, and a computer.

  10. Attribute and topology based change detection in a constellation of previously detected objects

    Energy Technology Data Exchange (ETDEWEB)

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  11. Circle Detection Based on HSI Color Space

    Institute of Scientific and Technical Information of China (English)

    MAOXia; LIXing-xin; XUEYu-li

    2005-01-01

    A method based on HSI color space is presented to solve the problem of circle detection from color images. In terms of the evaluation to the edge detection method based on intensity, the edge detection based on hue is chosen to process the color image, and the simplified calculation of hue transform is discussed. Then the algorithm of circle detection based on Canny edge detection is proposed. Due to the dispersive distribution of the detected result, Hough transformation and template smooth are used in circle detection, and the proposed method gives a quite good result.

  12. Detection of Weather Radar Clutter

    DEFF Research Database (Denmark)

    Bøvith, Thomas

    2008-01-01

    Weather radars provide valuable information on precipitation in the atmosphere but due to the way radars work, not only precipitation is observed by the weather radar. Weather radar clutter, echoes from non-precipitating targets, occur frequently in the data, resulting in lowered data quality....... Especially in the application of weather radar data in quantitative precipitation estimation and forecasting a high data quality is important. Clutter detection is one of the key components in achieving this goal. This thesis presents three methods for detection of clutter. The methods use supervised...... and precipitating and non-precipitating clouds. Another method uses the difference in the motion field of clutter and precipitation measured between two radar images. Furthermore, the direction of the wind field extracted from a weather model is used. The third method uses information about the refractive index...

  13. Optical and acoustical UAV detection

    Science.gov (United States)

    Christnacher, Frank; Hengy, Sébastien; Laurenzis, Martin; Matwyschuk, Alexis; Naz, Pierre; Schertzer, Stéphane; Schmitt, Gwenael

    2016-10-01

    Recent world events have highlighted that the proliferation of UAVs is bringing with it a new and rapidly increasing threat for national defense and security agencies. Whilst many of the reported UAV incidents seem to indicate that there was no terrorist intent behind them, it is not unreasonable to assume that it may not be long before UAV platforms are regularly employed by terrorists or other criminal organizations. The flight characteristics of many of these mini- and micro-platforms present challenges for current systems which have been optimized over time to defend against the traditional air-breathing airborne platforms. A lot of programs to identify cost-effective measures for the detection, classification, tracking and neutralization have begun in the recent past. In this paper, lSL shows how the performance of a UAV detection and tracking concept based on acousto-optical technology can be powerfully increased through active imaging.

  14. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard;

    2012-01-01

    a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure......Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  15. Detecting variation in chaotic attractors.

    Science.gov (United States)

    Carroll, T L

    2011-06-01

    If the output of an experiment is a chaotic signal, it may be useful to detect small changes in the signal, but there are a limited number of ways to compare signals from chaotic systems, and most known methods are not robust in the presence of noise. One may calculate dimension or Lyapunov exponents from the signal, or construct a synchronizing model, but all of these are only useful in low noise situations. I introduce a method for detecting small variations in a chaotic attractor based on directly calculating the difference between vector fields in phase space. The differences are found by comparing close strands in phase space, rather than close neighbors. The use of strands makes the method more robust to noise and more sensitive to small attractor differences.

  16. Longitudinal peak detected Schottky spectrum

    CERN Document Server

    Shaposhnikova, E

    2009-01-01

    The "peak detected Schottky" spectrum is a diagnostic used since the late seventies for beam observation in the SPS and now already applied to the LHC. This tool was always believed, however without proof, to give a good picture of the particle distribution in synchrotron frequencies similar to the longitudinal Schottky spectrum of unbunched beam for revolution frequencies.In this paper an analysis of this measurement technique is presented both in a general form and for the particular realisation in the SPS. In addition the limitations of the present experimental set-up are discussed together with possible improvements. The analysis shows that for an optimised experimental set-up the spectrum of the peak detected signal is very close to the synchrotron frequency distribution inside the bunch - much closer than that given by the traditional longitudinal bunched-beam Schottky spectrum.

  17. Spontaneous Emotional Facial Expression Detection

    Directory of Open Access Journals (Sweden)

    Zhihong Zeng

    2006-08-01

    Full Text Available Change in a speaker’s emotion is a fundamental component in human communication. Automatic recognition of spontaneous emotion would significantly impact human-computer interaction and emotion-related studies in education, psychology and psychiatry. In this paper, we explore methods for detecting emotional facial expressions occurring in a realistic human conversation setting—the Adult Attachment Interview (AAI. Because non-emotional facial expressions have no distinct description and are expensive to model, we treat emotional facial expression detection as a one- class classification problem, which is to describe target objects (i.e., emotional facial expressions and distinguish them from outliers (i.e., non-emotional ones. Our preliminary experiments on AAI data suggest that one-class classification methods can reach a good balance between cost (labeling and computing and recognition performance by avoiding non-emotional expression labeling and modeling.

  18. Plasma dark matter direct detection

    CERN Document Server

    Clarke, Jackson D

    2015-01-01

    Dark matter in spiral galaxies like the Milky Way may take the form of a dark plasma. Hidden sector dark matter charged under an unbroken $U(1)'$ gauge interaction provides a simple and well defined particle physics model realising this possibility. The assumed $U(1)'$ neutrality of the Universe then implies (at least) two oppositely charged dark matter components with self-interactions mediated via a massless "dark photon" (the $U(1)'$ gauge boson). In addition to nuclear recoils such dark matter can give rise to keV electron recoils in direct detection experiments. In this context, the detailed physical properties of the dark matter plasma interacting with the Earth is required. This is a complex system, which is here modelled as a fluid governed by the magnetohydrodynamic equations. These equations are numerically solved for some illustrative examples, and implications for direct detection experiments discussed. In particular, the analysis presented here leaves open the intriguing possibility that the DAMA...

  19. Automatic spikes detection in seismogram

    Institute of Scientific and Technical Information of China (English)

    王海军; 靳平; 刘贵忠

    2003-01-01

    @@ Data processing for seismic network is very complex and fussy, because a lot of data is recorded in seismic network every day, which make it impossible to process these data all by manual work. Therefore, seismic data should be processed automatically to produce a initial results about events detection and location. Afterwards, these results are reviewed and modified by analyst. In automatic processing data quality checking is important. There are three main problem data thatexist in real seismic records, which include: spike, repeated data and dropouts. Spike is defined as isolated large amplitude point; the other two problem datahave the same features that amplitude of sample points are uniform in a interval. In data quality checking, the first step is to detect and statistic problem data in a data segment, if percent of problem data exceed a threshold, then the whole data segment is masked and not be processed in the later process.

  20. Exoplanets Detection, Formation, Properties, Habitability

    CERN Document Server

    Mason, John W

    2008-01-01

    This edited, multi-author volume will be an invaluable introduction and reference to all key aspects in the field of exoplanet research. The reviews cover: Detection methods and properties of known exoplanets, Detection of extrasolar planets by gravitational microlensing. The formation and evolution of terrestrial planets in protoplanetary and debris disks. The brown dwarf-exoplanet connection. Formation, migration mechanisms and properties of hot Jupiters. Dynamics of multiple exoplanet systems. Doppler exoplanet surveys. Searching for exoplanets in the stellar graveyard. Formation and habitability of extra solar planets in multiple star systems. Exoplanet habitats and the possibilities for life. Moons of exoplanets: habitats for life. Contributing authors: •Rory Barnes •David P. Bennett •Jian Ge •Nader Haghighipour •Patrick Irwin •Hugh Jones •Victoria Meadows •Stanimir Metchev •I. Neill Reid •George Rieke •Caleb Scharf •Steinn Sigurdsson

  1. Nanocomposite materials for radiation detection

    Science.gov (United States)

    Sahi, Sunil

    2013-03-01

    Colloidal quantum dots (CdTe, CdSe, and ZnO) have attracted tremendous interest in wide range of application from biological imaging, biosensing, solar cells to optoelectronic devices. However very few published reports on the radiation detection based on colloidal quantum dots. Quantum dots based nanocomposite materials could be a promising material for radiation detection because of their short luminescence life time and high quantum efficiencies as a consequence of quantum size confinement. However stopping power of most quantum dots is low and their scintillation luminescence is very weak. The combination of high stopping power of inorganic scintillator (CeF3LaF3: Ce, YAG:Ce) and high efficiency of quantum dot could potentially lead to a new class of scintillator. We have studied the nanocomposite of inorganic scintillator and quantum dot based on energy transfer principle and investigate the scintillation properties of nanocomposite scintillator.

  2. Plagiarism Detection by Online Solutions.

    Science.gov (United States)

    Masic, Izet; Begic, Edin; Dobraca, Amra

    2017-01-01

    The problem of plagiarism represents one of the burning issues of the modern scientific world. Detection of plagiarism is a problem that the Editorial Board encounters in their daily work. Software solutions represent a good solution for the detection of plagiarism. The problem of plagiarism will become most discussed topic of the modern scientific world, especially due to the development of standard measures, which rank the work of one author. Investment in education, education of young research personnel about the importance of scientific research, with paying particular attention on ethical behavior, becomes an imperative of academic staff. Editors have to invest additional effort in the development of the base of reviewers team as well as in their proper guidance, because after all, despite the software solutions, they are the best weapon to fight plagiarism. Peer review process should be a key of successful operation of each journal.

  3. Detecting hybridization using ancient DNA.

    Science.gov (United States)

    Schaefer, Nathan K; Shapiro, Beth; Green, Richard E

    2016-06-01

    It is well established that related species hybridize and that this can have varied but significant effects on speciation and environmental adaptation. It should therefore come as no surprise that hybridization is not limited to species that are alive today. In the last several decades, advances in technologies for recovering and sequencing DNA from fossil remains have enabled the assembly of high-coverage genome sequences for a growing diversity of organisms, including many that are extinct. Thanks to the development of new statistical approaches for detecting and quantifying admixture from genomic data, genomes from extinct populations have proven useful both in revealing previously unknown hybridization events and informing the study of hybridization between living organisms. Here, we review some of the key recent statistical innovations for detecting ancient hybridization using genomewide sequence data and discuss how these innovations have revised our understanding of human evolutionary history.

  4. DNA detection by THz pumping

    Energy Technology Data Exchange (ETDEWEB)

    Chernev, A. L. [Russian Academy of Sciences, St. Petersburg Academic University—Nanotechnology Research and Education Centre (Russian Federation); Bagraev, N. T.; Klyachkin, L. E. [Russian Academy of Sciences, Ioffe Physicotechnical Institute (Russian Federation); Emelyanov, A. K.; Dubina, M. V. [Russian Academy of Sciences, St. Petersburg Academic University—Nanotechnology Research and Education Centre (Russian Federation)

    2015-07-15

    DNA semiconductor detection and sequencing is considered to be the most promising approach for future discoveries in genome and proteome research which is dramatically dependent on the challenges faced by semiconductor nanotechnologies. DNA pH-sensing with ion-sensitive field effect transistor (ISFET) is well-known to be a successfully applied electronic platform for genetic research. However this method lacks fundamentally in chemical specificity. Here we develop the first ever silicon nanosandwich pump device, which provides both the excitation of DNA fragments’ self-resonant modes and the feedback for current-voltage measurements at room temperature. This device allows direct detection of singlestranded label-free oligonucleotides by measuring their THz frequency response in aqueous solution. These results provide a new insight into the nanobioelectronics for the future real-time technologies of direct gene observations.

  5. Astrometric Detection of Earthlike Planets

    CERN Document Server

    Shao, Michael; Catanzarite, Joseph H; Edberg, Stephen J; Leger, Alain; Malbet, Fabien; Queloz, Didier; Muterspaugh, Matthew W; Beichman, Charles; Fischer, Debra A; Ford, Eric; Olling, Robert; Kulkarni, Shrinivas; Unwin, Stephen C; Traub, Wesley

    2009-01-01

    Astrometry can detect rocky planets in a broad range of masses and orbital distances and measure their masses and three-dimensional orbital parameters, including eccentricity and inclination, to provide the properties of terrestrial planets. The masses of both the new planets and the known gas giants can be measured unambiguously, allowing a direct calculation of the gravitational interactions, both past and future. Such dynamical interactions inform theories of the formation and evolution of planetary systems, including Earth-like planets. Astrometry is the only technique technologically ready to detect planets of Earth mass in the habitable zone (HZ) around solar-type stars within 20 pc. These Earth analogs are close enough for follow-up observations to characterize the planets by infrared imaging and spectroscopy with planned future missions such as the James Webb Space Telescope (JWST) and the Terrestrial Planet Finder/Darwin. Employing a demonstrated astrometric precision of 1 microarcsecond and a noise ...

  6. The detection of neutron clusters

    Energy Technology Data Exchange (ETDEWEB)

    Marques, F.M.; Labiche, M.; Orr, N.A.; Angelique, J.C. [Caen Univ., 14 (France). Lab. de Physique Corpusculaire] [and others

    2001-11-01

    A new approach to the production and detection of bound neutron clusters is presented. The technique is based on the breakup of beams of very neutron-rich nuclei and the subsequent detection of the recoiling proton in a liquid scintillator. The method has been tested in the breakup of {sup 11}Li, {sup 14}Be and {sup 15}B beams by a C target. Some 6 events were observed that exhibit the characteristics of a multi-neutron cluster liberated in the breakup of {sup 14}Be, most probably in the channel {sup 10}Be+{sup 4}n. The various backgrounds that may mimic such a signal are discussed in detail. (author)

  7. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  8. Detecting itinerant single microwave photons

    Science.gov (United States)

    Sathyamoorthy, Sankar Raman; Stace, Thomas M.; Johansson, Göran

    2016-08-01

    Single-photon detectors are fundamental tools of investigation in quantum optics and play a central role in measurement theory and quantum informatics. Photodetectors based on different technologies exist at optical frequencies and much effort is currently being spent on pushing their efficiencies to meet the demands coming from the quantum computing and quantum communication proposals. In the microwave regime, however, a single-photon detector has remained elusive, although several theoretical proposals have been put forth. In this article, we review these recent proposals, especially focusing on non-destructive detectors of propagating microwave photons. These detection schemes using superconducting artificial atoms can reach detection efficiencies of 90% with the existing technologies and are ripe for experimental investigations.

  9. On the detection of Exomoons

    CERN Document Server

    Hippke, Michael

    2015-01-01

    Despite the discovery of thousands of exoplanets, no exomoons have been detected so far. We test a recently developed method for exomoon search, the "orbital sampling effect" (OSE), using the full exoplanet photometry from the Kepler Space Telescope. The OSE is applied to phase-folded transits, for which we present a framework to detect false positives, and discuss four candidates which pass several of our tests. Using numerical simulations, we inject exomoon signals into real Kepler data and retrieve them, showing that under favorable conditions, exomoons can be found with Kepler and the OSE method. In addition, we super-stack a large sample of Kepler planets to search for the average exomoon OSE and the accompanying increase in noise, the "scatter peak". We find significant exomoon presence for planets with 35d

  10. Survey of Anomaly Detection Methods

    Energy Technology Data Exchange (ETDEWEB)

    Ng, B

    2006-10-12

    This survey defines the problem of anomaly detection and provides an overview of existing methods. The methods are categorized into two general classes: generative and discriminative. A generative approach involves building a model that represents the joint distribution of the input features and the output labels of system behavior (e.g., normal or anomalous) then applies the model to formulate a decision rule for detecting anomalies. On the other hand, a discriminative approach aims directly to find the decision rule, with the smallest error rate, that distinguishes between normal and anomalous behavior. For each approach, we will give an overview of popular techniques and provide references to state-of-the-art applications.

  11. Early detection of tubular dysfunction.

    Science.gov (United States)

    Piscator, M

    1991-11-01

    The determination of low-molecular-weight proteins in urine as a tool for early detection of damage to the proximal tubules is briefly discussed. Beta 2-microglobulin, retinol-binding protein and alpha 1-microglobulin are at present the most widely used markers for tubular dysfunction. The determination of beta 2-microglobulin has earlier been the method of choice, but due to its instability at low pH there are certain disadvantages. Available data indicate that alpha 1-microglobulin may replace beta 2-microglobulin for screening purposes. The low-molecular-weight proteins are at present the best markers for early detection of tubular dysfunction; other constituents are not as well suited for this, even if the determination of urine enzymes has its supporters.

  12. Space debris: modeling and detectability

    Science.gov (United States)

    Wiedemann, C.; Lorenz, J.; Radtke, J.; Kebschull, C.; Horstmann, A.; Stoll, E.

    2017-01-01

    High precision orbit determination is required for the detection and removal of space debris. Knowledge of the distribution of debris objects in orbit is necessary for orbit determination by active or passive sensors. The results can be used to investigate the orbits on which objects of a certain size at a certain frequency can be found. The knowledge of the orbital distribution of the objects as well as their properties in accordance with sensor performance models provide the basis for estimating the expected detection rates. Comprehensive modeling of the space debris environment is required for this. This paper provides an overview of the current state of knowledge about the space debris environment. In particular non-cataloged small objects are evaluated. Furthermore, improvements concerning the update of the current space debris model are addressed. The model of the space debris environment is based on the simulation of historical events, such as fragmentations due to explosions and collisions that actually occurred in Earth orbits. The orbital distribution of debris is simulated by propagating the orbits considering all perturbing forces up to a reference epoch. The modeled object population is compared with measured data and validated. The model provides a statistical distribution of space objects, according to their size and number. This distribution is based on the correct consideration of orbital mechanics. This allows for a realistic description of the space debris environment. Subsequently, a realistic prediction can be provided concerning the question, how many pieces of debris can be expected on certain orbits. To validate the model, a software tool has been developed which allows the simulation of the observation behavior of ground-based or space-based sensors. Thus, it is possible to compare the results of published measurement data with simulated detections. This tool can also be used for the simulation of sensor measurement campaigns. It is

  13. Geomagnetic field detection in rodents

    Energy Technology Data Exchange (ETDEWEB)

    Olcese, J.; Reuss, S.; Semm, P.

    1988-01-01

    In addition to behavioral evidence for the detection of earth-strength magnetic fields (MF) by rodents, recent investigations have revealed that electrophysiological and biochemical responses to MF occur in the pineal organ and retina of rodents. In addition, ferrimagnetic deposits have been identified in the ethmoidal regions of the rodent skull. These findings point to a new sensory phenomenon, which interfaces with many fields of biology, including neuroscience, psychophysics, behavioral ecology, chronobiology and sensory physiology.

  14. Heart Disease Detection Using Wavelets

    Science.gov (United States)

    González S., A.; Acosta P., J. L.; Sandoval M., M.

    2004-09-01

    We develop a wavelet based method to obtain standardized gray-scale chart of both healthy hearts and of hearts suffering left ventricular hypertrophy. The hypothesis that early bad functioning of heart can be detected must be tested by comparing the wavelet analysis of the corresponding ECD with the limit cases. Several important parameters shall be taken into account such as age, sex and electrolytic changes.

  15. Early Detection of Disease Outbreaks

    OpenAIRE

    2005-01-01

    BACKGROUND: The ability to detect disease outbreaks early is important in order to minimize morbidity and mortality through timely implementation of disease prevention and control measures. Many national, state, and local health departments are launching disease surveillance systems with daily analyses of hospital emergency department visits, ambulance dispatch calls, or pharmacy sales for which population-at-risk information is unavailable or irrelevant. METHODS AND FINDINGS: We propose a pr...

  16. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  17. Fake accounts detection on Twitter

    OpenAIRE

    Di Pietro, Roberto; Cresci, Stefano; Petrocchi, Marinella; Spognardi, Angelo; Tesconi, Maurizio

    2013-01-01

    Fake followers are those Twitter accounts created to inflate the number of followers of a target account. Fake followers are dangerous to the social platform and beyond, since they may alter concepts like popularity and influence in the Twittersphere-hence impacting on economy, politics, and Society. In this paper, we provide several contributions. First, we review the most relevant existing criteria (proposed by Academia and Media) for anomalous Twitter accounts detection, and later we asses...

  18. Lidar Detection of Explosives Traces

    Directory of Open Access Journals (Sweden)

    Bobrovnikov Sergei M.

    2016-01-01

    Full Text Available The possibility of remote detection of traces of explosives using laser fragmentation/laser-induced fluorescence (LF/LIF is studied. Experimental data on the remote visualization of traces of trinitrotoluene (TNT, hexogen (RDX, trotyl-hexogen (Comp B, octogen (HMX, and tetryl with a scanning lidar detector of traces of nitrogen-containing explosives at a distance of 5 m are presented.

  19. Extremely Lightweight Intrusion Detection (ELIDe)

    Science.gov (United States)

    2013-12-01

    21) (among many others), field- programmable gate array (FPGA) processors are used to implement high-speed matching of Snort rules. They develop an...techniques for detecting the presence of malware in ad-hoc mobile infrastructure with specific emphasis on the Android operating system (10). The proof...of- concept implementation of this work relies upon simulating both an ad-hoc network containing compromised Android hosts, as well as multiple “bot

  20. Nucleic acid detection using MNAzymes.

    Science.gov (United States)

    Gerasimova, Yulia V; Kolpashchikov, Dmitry M

    2010-02-26

    Deoxyribozymes are promising biotechnological tools. In a recent JACS article, Mokany et al. reported on the design of multi-component deoxyribozyme (MNAzyme) sensors based on 10-23 and 8-17 DNA enzymes. The sensors can detect down to 5 pM of a specific nucleic acid. The versatility of MNAzyme platform allows the design of catalytic cascades for signal amplification. This work is a step forward to PCR-free molecular diagnostics.

  1. Lightning detection in planetary atmospheres

    CERN Document Server

    Aplin, Karen L

    2016-01-01

    Lightning in planetary atmospheres is now a well-established concept. Here we discuss the available detection techniques for, and observations of, planetary lightning by spacecraft, planetary landers and, increasingly, sophisticated terrestrial radio telescopes. Future space missions carrying lightning-related instrumentation are also summarised, specifically the European ExoMars mission and Japanese Akatsuki mission to Venus, which could both yield lightning observations in 2016.

  2. Diamond Nanowire for UV Detection

    Science.gov (United States)

    2010-02-28

    02/28/2010 6. Program Manager: Dr. Donald Silversmith , yr. 1- yr.3, and Dr. Brian Thomas, yr. 3. 7. Distribution Statement (as on SF-298...if any): None 11. Change in AFOSR program manager, if any: It was in the program managed by Dr. Donald Silversmith . In yr-3 it was transitioned to...NANOWIRE FOR UV DETECTION FA9550-07-1-0140 To Dr. Donald Silversmith and Dr. Brian Thomas AFOSR PI: Jimmy Xu Brown University 184 Hope St

  3. Detection of malicious computer executables

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  4. Detecting selection needs comparative data

    DEFF Research Database (Denmark)

    Nielsen, Rasmus; Hubisz, Melissa J.

    2005-01-01

    Positive selection at the molecular level is usually indicated by an increase in the ratio of non-synonymous to synonymous substitutions (dN/dS) in comparative data. However, Plotkin et al. 1 describe a new method for detecting positive selection based on a single nucleotide sequence. We show here...... that this method is particularly sensitive to assumptions regarding the underlying mutational processes and does not provide a reliable way to identify positive selection....

  5. Discovering the Botnet Detection Techniques

    Science.gov (United States)

    Rahim, Aneel; Bin Muhaya, Fahad T.

    Botnet is a network of compromised computers. It just fellow the master slave concept. Bots are comprised computers and do the tasks what ever their master orders them. Internet Relay Chat (IRC) is used for the communication between the master and bots. Information is also encrypted to avoid the effect of third party. In this paper we discuss the Botnets detection techniques and comparative analysis of these techniques on the basis of DNS query, History data and group activity.

  6. Topic Detection in Online Chat

    Science.gov (United States)

    2009-09-01

    including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the...you. “ … Of making many books there is no end, and much study is a weariness of the flesh.” Ecclesiastes 12:12 , ESV xvi THIS PAGE INTENTIONALLY...topic detection," Online Information Review , vol. 30, pp. 496–516, 2006. [2] D. Jurafsky and J. H. Martin, Speech and Language Processing : An

  7. Anomaly detection on cup anemometers

    Science.gov (United States)

    Vega, Enrique; Pindado, Santiago; Martínez, Alejandro; Meseguer, Encarnación; García, Luis

    2014-12-01

    The performances of two rotor-damaged commercial anemometers (Vector Instruments A100 LK) were studied. The calibration results (i.e. the transfer function) were very linear, the aerodynamic behavior being more efficient than the one shown by both anemometers equipped with undamaged rotors. No detection of the anomaly (the rotors’ damage) was possible based on the calibration results. However, the Fourier analysis clearly revealed this anomaly.

  8. Gravitational Waves III: Detecting Systems

    OpenAIRE

    Cattani, M.

    2010-01-01

    In a recent paper we have deduced the basic equations that predict the emission of gravitational waves (GW) according to the Einstein gravitation theory. In a subsequent paper these equations have been used to calculate the luminosities and the amplitudes of the waves generated by binary stars, pulsations of neutron stars, wobbling of deformed neutron stars, oscillating quadrupoles, rotating bars and collapsing and bouncing cores of supernovas. We show here how the GW could be detected in our...

  9. Spectroscopic Detection of Caries Lesions

    OpenAIRE

    Mika Ruohonen; Katri Palo; Jarmo Alander

    2013-01-01

    Background. A caries lesion causes changes in the optical properties of the affected tissue. Currently a caries lesion can be detected only at a relatively late stage of development. Caries diagnosis also suffers from high interobserver variance. Methods. This is a pilot study to test the suitability of an optical diffuse reflectance spectroscopy for caries diagnosis. Reflectance visible/near-infrared spectroscopy (VIS/NIRS) was used to measure caries lesions and healthy enamel on extracted h...

  10. Measurement and detection of radiation

    CERN Document Server

    Tsoulfanidis, Nicholas

    2015-01-01

    This fourth edition reflects recent major developments that have occurred in radiation detector materials, systems, and applications. It continues to provide the most practical and up-to-date introduction to radiation detector technology, proper measurement techniques, and analysis of results for engineers and scientists using radiation sources. New chapters emphasize the expanded use of radiation detection systems in nuclear non-proliferation, homeland security, and nuclear medicine. The book also discusses the correct ways to perform measurements following current health physics procedures.

  11. Detecting spatial regimes in ecosystems

    Science.gov (United States)

    Sundstrom, Shana M.; Eason, Tarsha; Nelson, R. John; Angeler, David G.; Barichievy, Chris; Garmestani, Ahjond S.; Graham, Nicholas A.J.; Granholm, Dean; Gunderson, Lance; Knutson, Melinda; Nash, Kirsty L.; Spanbauer, Trisha; Stow, Craig A.; Allen, Craig R.

    2017-01-01

    Research on early warning indicators has generally focused on assessing temporal transitions with limited application of these methods to detecting spatial regimes. Traditional spatial boundary detection procedures that result in ecoregion maps are typically based on ecological potential (i.e. potential vegetation), and often fail to account for ongoing changes due to stressors such as land use change and climate change and their effects on plant and animal communities. We use Fisher information, an information theory-based method, on both terrestrial and aquatic animal data (U.S. Breeding Bird Survey and marine zooplankton) to identify ecological boundaries, and compare our results to traditional early warning indicators, conventional ecoregion maps and multivariate analyses such as nMDS and cluster analysis. We successfully detected spatial regimes and transitions in both terrestrial and aquatic systems using Fisher information. Furthermore, Fisher information provided explicit spatial information about community change that is absent from other multivariate approaches. Our results suggest that defining spatial regimes based on animal communities may better reflect ecological reality than do traditional ecoregion maps, especially in our current era of rapid and unpredictable ecological change.

  12. Bacteriophage-Based Pathogen Detection

    Science.gov (United States)

    Ripp, Steven

    Considered the most abundant organism on Earth, at a population approaching 1031, bacteriophage, or phage for short, mediate interactions with myriad bacterial hosts that has for decades been exploited in phage typing schemes for signature identification of clinical, food-borne, and water-borne pathogens. With over 5,000 phage being morphologically characterized and grouped as to susceptible host, there exists an enormous cache of bacterial-specific sensors that has more recently been incorporated into novel bio-recognition assays with heightened sensitivity, specificity, and speed. These assays take many forms, ranging from straightforward visualization of labeled phage as they attach to their specific bacterial hosts to reporter phage that genetically deposit trackable signals within their bacterial hosts to the detection of progeny phage or other uniquely identifiable elements released from infected host cells. A comprehensive review of these and other phage-based detection assays, as directed towards the detection and monitoring of bacterial pathogens, will be provided in this chapter.

  13. Dynamical detection of network communities

    Science.gov (United States)

    Quiles, Marcos G.; Macau, Elbert E. N.; Rubido, Nicolás

    2016-05-01

    A prominent feature of complex networks is the appearance of communities, also known as modular structures. Specifically, communities are groups of nodes that are densely connected among each other but connect sparsely with others. However, detecting communities in networks is so far a major challenge, in particular, when networks evolve in time. Here, we propose a change in the community detection approach. It underlies in defining an intrinsic dynamic for the nodes of the network as interacting particles (based on diffusive equations of motion and on the topological properties of the network) that results in a fast convergence of the particle system into clustered patterns. The resulting patterns correspond to the communities of the network. Since our detection of communities is constructed from a dynamical process, it is able to analyse time-varying networks straightforwardly. Moreover, for static networks, our numerical experiments show that our approach achieves similar results as the methodologies currently recognized as the most efficient ones. Also, since our approach defines an N-body problem, it allows for efficient numerical implementations using parallel computations that increase its speed performance.

  14. A prescription fraud detection model.

    Science.gov (United States)

    Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan

    2012-04-01

    Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  15. New approaches in GMO detection.

    Science.gov (United States)

    Querci, Maddalena; Van den Bulcke, Marc; Zel, Jana; Van den Eede, Guy; Broll, Hermann

    2010-03-01

    The steady rate of development and diffusion of genetically modified plants and their increasing diversification of characteristics, genes and genetic control elements poses a challenge in analysis of genetically modified organisms (GMOs). It is expected that in the near future the picture will be even more complex. Traditional approaches, mostly based on the sequential detection of one target at a time, or on a limited multiplexing, allowing only a few targets to be analysed at once, no longer meet the testing requirements. Along with new analytical technologies, new approaches for the detection of GMOs authorized for commercial purposes in various countries have been developed that rely on (1) a smart and accurate strategy for target selection, (2) the use of high-throughput systems or platforms for the detection of multiple targets and (3) algorithms that allow the conversion of analytical results into an indication of the presence of individual GMOs potentially present in an unknown sample. This paper reviews the latest progress made in GMO analysis, taking examples from the most recently developed strategies and tools, and addresses some of the critical aspects related to these approaches.

  16. Molecular clouds without detectable CO

    Science.gov (United States)

    Blitz, Leo; Bazell, David; Desert, F. Xavier

    1990-03-01

    The clouds identified by Desert, Bazell, and Boulanger (DBB clouds) in their search for high-latitude molecular clouds were observed in the CO (J = 1-0) line, but only 13 percent of the sample was detected. The remaining 87 percent are diffuse molecular clouds with CO abundances of about 10 to the -6th, a typical value for diffuse clouds. This hypothesis is shown to be consistent with Copernicus data. The DBB clouds are shown to ben an essentially complete catalog of diffuse molecular clouds in the solar vicinity. The total molecular surface density in the vicinity of the sun is then only about 20 percent greater than the 1.3 solar masses/sq pc determined by Dame et al. (1987). Analysis of the CO detections indicates that there is a sharp threshold in extinction of 0.25 mag before CO is detectable and is derived from the IRAS I(100) micron threshold of 4 MJy/sr. This threshold is presumably where the CO abundance exhibits a sharp increase

  17. Capillary Electrophoresis - Optical Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Sepaniak, M. J.

    2001-08-06

    Molecular recognition systems are developed via molecular modeling and synthesis to enhance separation performance in capillary electrophoresis and optical detection methods for capillary electrophoresis. The underpinning theme of our work is the rational design and development of molecular recognition systems in chemical separations and analysis. There have been, however, some subtle and exciting shifts in our research paradigm during this period. Specifically, we have moved from mostly separations research to a good balance between separations and spectroscopic detection for separations. This shift is based on our perception that the pressing research challenges and needs in capillary electrophoresis and electrokinetic chromatography relate to the persistent detection and flow rate reproducibility limitations of these techniques (see page 1 of the accompanying Renewal Application for further discussion). In most of our work molecular recognition reagents are employed to provide selectivity and enhance performance. Also, an emerging trend is the use of these reagents with specially-prepared nano-scale materials. Although not part of our DOE BES-supported work, the modeling and synthesis of new receptors has indirectly supported the development of novel microcantilevers-based MEMS for the sensing of vapor and liquid phase analytes. This fortuitous overlap is briefly covered in this report. Several of the more significant publications that have resulted from our work are appended. To facilitate brevity we refer to these publications liberally in this progress report. Reference is also made to very recent work in the Background and Preliminary Studies Section of the Renewal Application.

  18. Portable Microleak-Detection System

    Science.gov (United States)

    Rivers, H. Kevin; Sikora, Joseph G.; Sankaran, Sankara N.

    2007-01-01

    The figure schematically depicts a portable microleak-detection system that has been built especially for use in testing hydrogen tanks made of polymer-matrix composite materials. (As used here, microleak signifies a leak that is too small to be detectable by the simple soap-bubble technique.) The system can also be used to test for microleaks in tanks that are made of other materials and that contain gases other than hydrogen. Results of calibration tests have shown that measurement errors are less than 10 percent for leak rates ranging from 0.3 to 200 cm3/min. Like some other microleak-detection systems, this system includes a vacuum pump and associated plumbing for sampling the leaking gas, and a mass spectrometer for analyzing the molecular constituents of the gas. The system includes a flexible vacuum chamber that can be attached to the outer surface of a tank or other object of interest that is to be tested for leakage (hereafter denoted, simply, the test object). The gas used in a test can be the gas or vapor (e.g., hydrogen in the original application) to be contained by the test object. Alternatively, following common practice in leak testing, helium can be used as a test gas. In either case, the mass spectrometer can be used to verify that the gas measured by the system is the test gas rather than a different gas and, hence, that the leak is indeed from the test object.

  19. Fluorescence detection of esophageal neoplasia

    Science.gov (United States)

    Borisova, E.; Vladimirov, B.; Avramov, L.

    2008-06-01

    White-light endoscopy is well-established and wide used modality. However, despite the many technological advances that have been occurred, conventional endoscopy is suboptimal and usually detects advanced stage lesions. The limitations of standard endoscopy initiate development of spectroscopic techniques, additional to standard endoscopic equipment. One of the most sensitive approaches is fluorescence spectroscopy of gastrointestinal mucosa for neoplasia detection. In the recent study delta-aminolevulinic acid/Protoporphyrin IX (5-ALA/PpIX) is used as fluorescent marker for dysplasia and tumor detection in esophagus. The 5-ALA is administered per os six hours before measurements at dose 20 mg/kg weight. Excitation source has max of emission at 405 nm and light is delivered by the standard light guide of the endoscopic equipment. Through endoscopic instrumental channel a fiber is applied to return information about fluorescence to microspectrometer. Spectral features observed during endoscopic investigations could be distinct as the next regions: 450-630 nm region, where tissue autofluorescence is observed; 630-710 nm region, where fluorescence of PpIX is clearly pronounced; 530-580 nm region, where minima in the autofluorescence signal are observed, related to reabsorption of blood. The lack of fluorescence peaks in the red spectral area for normal mucosa is an indication for selective accumulation of 5-ALA/PpIX only in abnormal sites Very good correlation between fluorescence signals and histology examination of the lesions investigated is achieved.

  20. Early detection of materials degradation

    Science.gov (United States)

    Meyendorf, Norbert

    2017-02-01

    Lightweight components for transportation and aerospace applications are designed for an estimated lifecycle, taking expected mechanical and environmental loads into account. The main reason for catastrophic failure of components within the expected lifecycle are material inhomogeneities, like pores and inclusions as origin for fatigue cracks, that have not been detected by NDE. However, material degradation by designed or unexpected loading conditions or environmental impacts can accelerate the crack initiation or growth. Conventional NDE methods are usually able to detect cracks that are formed at the end of the degradation process, but methods for early detection of fatigue, creep, and corrosion are still a matter of research. For conventional materials ultrasonic, electromagnetic, or thermographic methods have been demonstrated as promising. Other approaches are focused to surface damage by using optical methods or characterization of the residual surface stresses that can significantly affect the creation of fatigue cracks. For conventional metallic materials, material models for nucleation and propagation of damage have been successfully applied for several years. Material microstructure/property relations are well established and the effect of loading conditions on the component life can be simulated. For advanced materials, for example carbon matrix composites or ceramic matrix composites, the processes of nucleation and propagation of damage is still not fully understood. For these materials NDE methods can not only be used for the periodic inspections, but can significantly contribute to the material scientific knowledge to understand and model the behavior of composite materials.

  1. Detection of interstellar hydrogen peroxide

    CERN Document Server

    Bergman, P; Liseau, R; Larsson, B; Olofsson, H; Menten, K M; Güsten, R

    2011-01-01

    The molecular species hydrogen peroxide, HOOH, is likely to be a key ingredient in the oxygen and water chemistry in the interstellar medium. Our aim with this investigation is to determine how abundant HOOH is in the cloud core {\\rho} Oph A. By observing several transitions of HOOH in the (sub)millimeter regime we seek to identify the molecule and also to determine the excitation conditions through a multilevel excitation analysis. We have detected three spectral lines toward the SM1 position of {\\rho} Oph A at velocity-corrected frequencies that coincide very closely with those measured from laboratory spectroscopy of HOOH. A fourth line was detected at the 4{\\sigma} level. We also found through mapping observations that the HOOH emission extends (about 0.05 pc) over the densest part of the {\\rho} Oph A cloud core. We derive an abundance of HOOH relative to that of H_2 in the SM1 core of about 1\\times10^(-10). To our knowledge, this is the first reported detection of HOOH in the interstellar medium.

  2. Contextualizing Object Detection and Classification.

    Science.gov (United States)

    Chen, Qiang; Song, Zheng; Dong, Jian; Huang, Zhongyang; Hua, Yang; Yan, Shuicheng

    2015-01-01

    We investigate how to iteratively and mutually boost object classification and detection performance by taking the outputs from one task as the context of the other one. While context models have been quite popular, previous works mainly concentrate on co-occurrence relationship within classes and few of them focus on contextualization from a top-down perspective, i.e. high-level task context. In this paper, our system adopts a new method for adaptive context modeling and iterative boosting. First, the contextualized support vector machine (Context-SVM) is proposed, where the context takes the role of dynamically adjusting the classification score based on the sample ambiguity, and thus the context-adaptive classifier is achieved. Then, an iterative training procedure is presented. In each step, Context-SVM, associated with the output context from one task (object classification or detection), is instantiated to boost the performance for the other task, whose augmented outputs are then further used to improve the former task by Context-SVM. The proposed solution is evaluated on the object classification and detection tasks of PASCAL Visual Object Classes Challenge (VOC) 2007, 2010 and SUN09 data sets, and achieves the state-of-the-art performance.

  3. Noninvasive genomic detection of melanoma.

    Science.gov (United States)

    Wachsman, W; Morhenn, V; Palmer, T; Walls, L; Hata, T; Zalla, J; Scheinberg, R; Sofen, H; Mraz, S; Gross, K; Rabinovitz, H; Polsky, D; Chang, S

    2011-04-01

    Early detection and treatment of melanoma is important for optimal clinical outcome, leading to biopsy of pigmented lesions deemed suspicious for the disease. The vast majority of such lesions are benign. Thus, a more objective and accurate means for detection of melanoma is needed to identify lesions for excision. To provide proof-of-principle that epidermal genetic information retrieval (EGIR™; DermTech International, La Jolla, CA, U.S.A.), a method that noninvasively samples cells from stratum corneum by means of adhesive tape stripping, can be used to discern melanomas from naevi. Skin overlying pigmented lesions clinically suspicious for melanoma was harvested using EGIR. RNA isolated from the tapes was amplified and gene expression profiled. All lesions were removed for histopathological evaluation. Supervised analysis of the microarray data identified 312 genes differentially expressed between melanomas, naevi and normal skin specimens (Pclassifier that discriminates these skin lesions. Upon testing with an independent dataset, this classifier discerned in situ and invasive melanomas from naevi with 100% sensitivity and 88% specificity, with an area under the curve for the receiver operating characteristic of 0·955. These results demonstrate that EGIR-harvested specimens can be used to detect melanoma accurately by means of a 17-gene genomic biomarker. © 2011 The Authors. BJD © 2011 British Association of Dermatologists 2011.

  4. DNA detection using recombination proteins.

    Directory of Open Access Journals (Sweden)

    Olaf Piepenburg

    2006-07-01

    Full Text Available DNA amplification is essential to most nucleic acid testing strategies, but established techniques require sophisticated equipment or complex experimental procedures, and their uptake outside specialised laboratories has been limited. Our novel approach, recombinase polymerase amplification (RPA, couples isothermal recombinase-driven primer targeting of template material with strand-displacement DNA synthesis. It achieves exponential amplification with no need for pretreatment of sample DNA. Reactions are sensitive, specific, and rapid and operate at constant low temperature. We have also developed a probe-based detection system. Key aspects of the combined RPA amplification/detection process are illustrated by a test for the pathogen methicillin-resistant Staphylococcus aureus. The technology proves to be sensitive to fewer than ten copies of genomic DNA. Furthermore, products can be detected in a simple sandwich assay, thereby establishing an instrument-free DNA testing system. This unique combination of properties is a significant advance in the development of portable and widely accessible nucleic acid-based tests.

  5. Radiopharmaceuticals for SPECT cancer detection

    Science.gov (United States)

    Chernov, V. I.; Medvedeva, A. A.; Zelchan, R. V.; Sinilkin, I. G.; Stasyuk, E. S.; Larionova, L. A.; Slonimskaya, E. M.; Choynzonov, E. L.

    2016-08-01

    The purpose of the study was to assess the efficacy of single photon emission computed tomography (SPECT) with 199Tl and 99mTc-MIBI in the detection of breast, laryngeal and hypopharyngeal cancers. A total of 220 patients were included into the study: 120 patients with breast lesions (100 patients with breast cancer and 20 patients with benign breast tumors) and 100 patients with laryngeal/hypopharyngeal diseases (80 patients with laryngeal/hypopharyngeal cancer and 20 patients with benign laryngeal/hypopharyngeal lesions). No abnormal 199Tl uptake was seen in all patients with benign breast and laryngeal lesions, indicating a 100% specificity of 199Tl SPECT. In the breast cancer patients, the increased 199Tl uptake in the breast was visualized in 94.8% patients, 99mTc-MIBI—in 93.4% patients. The increased 199Tl uptake in axillary lymph nodes was detected in 60% patients, and 99mTc-MIBI—in 93.1% patients. In patients with laryngeal/hypopharyngeal cancer, the sensitivity of SPECT with 199Tl and 99mTc-MIBI was 95%. The 199Tl SPECT sensitivity in identification of regional lymph node metastases in the patients with laryngeal/hypopharyngeal cancer was 75% and the 99mTc-MIBI SPECT sensitivity was 17%. The data obtained showed that SPECT with 199Tl and 99mTc-MIBI can be used as one of the additional imaging methods in detection of tumors.

  6. UNICORN: Misuse detection for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Christoph, G.G; Jackson, K.A.; Neuman, M.C.; Siciliano, C.L.B.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.

    1995-03-29

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year and a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.

  7. Detecting failure of climate predictions

    Science.gov (United States)

    Runge, Michael C.; Stroeve, Julienne C.; Barrett, Andrew P.; McDonald-Madden, Eve

    2016-09-01

    The practical consequences of climate change challenge society to formulate responses that are more suited to achieving long-term objectives, even if those responses have to be made in the face of uncertainty. Such a decision-analytic focus uses the products of climate science as probabilistic predictions about the effects of management policies. Here we present methods to detect when climate predictions are failing to capture the system dynamics. For a single model, we measure goodness of fit based on the empirical distribution function, and define failure when the distribution of observed values significantly diverges from the modelled distribution. For a set of models, the same statistic can be used to provide relative weights for the individual models, and we define failure when there is no linear weighting of the ensemble models that produces a satisfactory match to the observations. Early detection of failure of a set of predictions is important for improving model predictions and the decisions based on them. We show that these methods would have detected a range shift in northern pintail 20 years before it was actually discovered, and are increasingly giving more weight to those climate models that forecast a September ice-free Arctic by 2055.

  8. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  9. Detecting failure of climate predictions

    Science.gov (United States)

    Runge, Michael C.; Stroeve, Julienne C.; Barrett, Andrew P.; McDonald-Madden, Eve

    2016-01-01

    The practical consequences of climate change challenge society to formulate responses that are more suited to achieving long-term objectives, even if those responses have to be made in the face of uncertainty1, 2. Such a decision-analytic focus uses the products of climate science as probabilistic predictions about the effects of management policies3. Here we present methods to detect when climate predictions are failing to capture the system dynamics. For a single model, we measure goodness of fit based on the empirical distribution function, and define failure when the distribution of observed values significantly diverges from the modelled distribution. For a set of models, the same statistic can be used to provide relative weights for the individual models, and we define failure when there is no linear weighting of the ensemble models that produces a satisfactory match to the observations. Early detection of failure of a set of predictions is important for improving model predictions and the decisions based on them. We show that these methods would have detected a range shift in northern pintail 20 years before it was actually discovered, and are increasingly giving more weight to those climate models that forecast a September ice-free Arctic by 2055.

  10. Mutation detection using Surveyor nuclease.

    Science.gov (United States)

    Qiu, Peter; Shandilya, Harini; D'Alessio, James M; O'Connor, Kevin; Durocher, Jeffrey; Gerard, Gary F

    2004-04-01

    We have developed a simple and flexible mutation detection technology for the discovery and mapping of both known and unknown mutations. This technology is based on a new mismatch-specific DNA endonuclease from celery, Surveyor nuclease, which is a member of the CEL nuclease family of plant DNA endonucleases. Surveyor nuclease cleaves with high specificity at the 3' side of any mismatch site in both DNA strands, including all base substitutions and insertion/deletions up to at least 12 nucleotides. Surveyor nuclease technology involves four steps: (i) PCR to amplify target DNA from both mutant and wild-type reference DNA; (ii) hybridization to form heteroduplexes between mutant and wild-type reference DNA; (iii) treatment of annealed DNA with Surveyor nuclease to cleave heteroduplexes; and (iv) analysis of digested DNA products using the detection/separation platform of choice. The technology is highly sensitive, detecting rare mutants present at as low as 1 in 32 copies. Unlabeled Surveyor nuclease digestion products can be analyzed using conventional gel electrophoresis or high-performance liquid chromatography (HPLC), while end labeled digestion products are suitable for analysis by automated gel or capillary electrophoresis. The entire protocol can be performed in less than a day and is suitable for automated and high-throughput procedures.

  11. Semi autonomous mine detection system

    Energy Technology Data Exchange (ETDEWEB)

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  12. Gravitational wave detection in space

    CERN Document Server

    Ni, Wei-Tou

    2016-01-01

    Gravitational wave (GW) detection in space is aimed at low frequency band (100 nHz - 100 mHz) and middle frequency band (100 mHz - 10 Hz). The science goals are the detection of GWs from (i) Supermassive Black Holes; (ii) Extreme-Mass-Ratio Black Hole Inspirals; (iii) Intermediate-Mass Black Holes; (iv) Galactic Compact Binaries and (v) Relic GW Background. In this paper, we present an overview on the sensitivity, orbit design, basic orbit configuration, angular resolution, orbit optimization, deployment, time-delay interferometry and payload concept of the current proposed GW detectors in space under study. The detector proposals under study have arm length ranging from 1000 km to 1.3 x 109 km (8.6 AU) including (a) Solar orbiting detectors -- ASTROD-GW (ASTROD [Astrodynamical Space Test of Relativity using Optical Devices] optimized for GW detection), BBO (Big Bang Observer), DECIGO (DECi-hertz Interferometer GW Observatory), e-LISA (evolved LISA [Laser Interferometer Space Antenna]), LISA, other LISA-type ...

  13. Semi autonomous mine detection system

    Science.gov (United States)

    Few, Doug; Versteeg, Roelof; Herman, Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude - from an autonomous robotic perspective - the rapid development and deployment of fieldable systems.

  14. Seq-NMS for Video Object Detection

    OpenAIRE

    Han, Wei; Khorrami, Pooya; Paine, Tom Le; Ramachandran, Prajit; Babaeizadeh, Mohammad; Shi, Honghui; Li, Jianan; Yan, Shuicheng; Huang, Thomas S.

    2016-01-01

    Video object detection is challenging because objects that are easily detected in one frame may be difficult to detect in another frame within the same clip. Recently, there have been major advances for doing object detection in a single image. These methods typically contain three phases: (i) object proposal generation (ii) object classification and (iii) post-processing. We propose a modification of the post-processing phase that uses high-scoring object detections from nearby frames to boo...

  15. Anomaly Detection in Dynamic Networks

    Energy Technology Data Exchange (ETDEWEB)

    Turcotte, Melissa [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the

  16. Maintenance energy requirements of odor detection, explosive detection and human detection working dogs.

    Science.gov (United States)

    Mullis, Rebecca A; Witzel, Angela L; Price, Joshua

    2015-01-01

    Despite their important role in security, little is known about the energy requirements of working dogs such as odor, explosive and human detection dogs. Previous researchers have evaluated the energy requirements of individual canine breeds as well as dogs in exercise roles such as sprint racing. This study is the first to evaluate the energy requirements of working dogs trained in odor, explosive and human detection. This retrospective study evaluated twenty adult dogs who maintained consistent body weights over a six month period. During this time, the average energy consumption was [Formula: see text] or two times the calculated resting energy requirement ([Formula: see text]). No statistical differences were found between breeds, age or sex, but a statistically significant association (p = 0.0033, R-square = 0.0854) was seen between the number of searches a dog performs and their energy requirement. Based on this study's population, it appears that working dogs have maintenance energy requirements similar to the 1974 National Research Council's (NRC) maintenance energy requirement of [Formula: see text] (National Research Council (NRC), 1974) and the [Formula: see text] reported for young laboratory beagles (Rainbird & Kienzle, 1990). Additional research is needed to determine if these data can be applied to all odor, explosive and human detection dogs and to determine if other types of working dogs (tracking, search and rescue etc.) have similar energy requirements.

  17. Latent error detection: A golden two hours for detection.

    Science.gov (United States)

    Saward, Justin R E; Stanton, Neville A

    2017-03-01

    Undetected error in safety critical contexts generates a latent condition that can contribute to a future safety failure. The detection of latent errors post-task completion is observed in naval air engineers using a diary to record work-related latent error detection (LED) events. A systems view is combined with multi-process theories to explore sociotechnical factors associated with LED. Perception of cues in different environments facilitates successful LED, for which the deliberate review of past tasks within two hours of the error occurring and whilst remaining in the same or similar sociotechnical environment to that which the error occurred appears most effective. Identified ergonomic interventions offer potential mitigation for latent errors; particularly in simple everyday habitual tasks. It is thought safety critical organisations should look to engineer further resilience through the application of LED techniques that engage with system cues across the entire sociotechnical environment, rather than relying on consistent human performance. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  18. Intelligent Detection System framework using Mobile agents

    CERN Document Server

    Jaisankar, N; Swamy, K Durai

    2010-01-01

    An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very challenging task since its aim is to detect unknown attacks without any priori knowledge about specific intrusions. This technology is still at its early stage. The objective of this paper is that the system can detect anomalous user activity. Existing research in this area focuses either on user activity or on program operation but not on both simultaneously. In this paper, an attempt to look at both concurrently is presented. Based on an intrusion detection framework [1], a novel user anomaly detection system has been implemented and conducted several intrusion detection experiments in a simulated environment by analy...

  19. Domain similarity based orthology detection.

    Science.gov (United States)

    Bitard-Feildel, Tristan; Kemena, Carsten; Greenwood, Jenny M; Bornberg-Bauer, Erich

    2015-05-13

    Orthologous protein detection software mostly uses pairwise comparisons of amino-acid sequences to assert whether two proteins are orthologous or not. Accordingly, when the number of sequences for comparison increases, the number of comparisons to compute grows in a quadratic order. A current challenge of bioinformatic research, especially when taking into account the increasing number of sequenced organisms available, is to make this ever-growing number of comparisons computationally feasible in a reasonable amount of time. We propose to speed up the detection of orthologous proteins by using strings of domains to characterize the proteins. We present two new protein similarity measures, a cosine and a maximal weight matching score based on domain content similarity, and new software, named porthoDom. The qualities of the cosine and the maximal weight matching similarity measures are compared against curated datasets. The measures show that domain content similarities are able to correctly group proteins into their families. Accordingly, the cosine similarity measure is used inside porthoDom, the wrapper developed for proteinortho. porthoDom makes use of domain content similarity measures to group proteins together before searching for orthologs. By using domains instead of amino acid sequences, the reduction of the search space decreases the computational complexity of an all-against-all sequence comparison. We demonstrate that representing and comparing proteins as strings of discrete domains, i.e. as a concatenation of their unique identifiers, allows a drastic simplification of search space. porthoDom has the advantage of speeding up orthology detection while maintaining a degree of accuracy similar to proteinortho. The implementation of porthoDom is released using python and C++ languages and is available under the GNU GPL licence 3 at http://www.bornberglab.org/pages/porthoda .

  20. Radiation Detection Computational Benchmark Scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; McDonald, Ben S.

    2013-09-24

    Modeling forms an important component of radiation detection development, allowing for testing of new detector designs, evaluation of existing equipment against a wide variety of potential threat sources, and assessing operation performance of radiation detection systems. This can, however, result in large and complex scenarios which are time consuming to model. A variety of approaches to radiation transport modeling exist with complementary strengths and weaknesses for different problems. This variety of approaches, and the development of promising new tools (such as ORNL’s ADVANTG) which combine benefits of multiple approaches, illustrates the need for a means of evaluating or comparing different techniques for radiation detection problems. This report presents a set of 9 benchmark problems for comparing different types of radiation transport calculations, identifying appropriate tools for classes of problems, and testing and guiding the development of new methods. The benchmarks were drawn primarily from existing or previous calculations with a preference for scenarios which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22. From a technical perspective, the benchmarks were chosen to span a range of difficulty and to include gamma transport, neutron transport, or both and represent different important physical processes and a range of sensitivity to angular or energy fidelity. Following benchmark identification, existing information about geometry, measurements, and previous calculations were assembled. Monte Carlo results (MCNP decks) were reviewed or created and re-run in order to attain accurate computational times and to verify agreement with experimental data, when present. Benchmark information was then conveyed to ORNL in order to guide testing and development of hybrid calculations. The results of those ADVANTG calculations were then sent to PNNL for

  1. An Introduction to Duplicate Detection

    CERN Document Server

    Nauman, Felix

    2010-01-01

    With the ever increasing volume of data, data quality problems abound. Multiple, yet different representations of the same real-world objects in data, duplicates, are one of the most intriguing data quality problems. The effects of such duplicates are detrimental; for instance, bank customers can obtain duplicate identities, inventory levels are monitored incorrectly, catalogs are mailed multiple times to the same household, etc. Automatically detecting duplicates is difficult: First, duplicate representations are usually not identical but slightly differ in their values. Second, in principle

  2. Near Duplicate Document Detection Survey

    Directory of Open Access Journals (Sweden)

    Bassma S. Alsulami

    2012-04-01

    Full Text Available Search engines are the major breakthrough on the web for retrieving the information. But List of retrieved documents contains a high percentage of duplicated and near document result. So there is the need to improve the performance of search results. Some of current search engine use data filtering algorithm which can eliminate duplicate and near duplicate documents to save the users’ time and effort. The identification of similar or near-duplicate pairs in a large collection is a significant problem with wide-spread applications. In this paper survey present an up-to-date review of the existing literature in duplicate and near duplicate detection in Web

  3. Lightning not detected on Titan

    Science.gov (United States)

    Tretkoff, Ernie

    2011-05-01

    Scientists have speculated that lightning on Saturn's moon Titan could produce changes in atmospheric chemistry and could even spark production of organic compounds that could be precursors to the evolution of life, but so far there has been no conclusive detection of lightning on Titan. Extending previous searches for lightning on Titan, Fischer and Gurnett analyzed radio data up to the 72nd close flyby of Titan by the Cassini spacecraft. They found no evidence of lightning and concluded that if lightning occurs at all on Titan, it is probably a very rare event. (Geophysical Research Letters, doi:10.1029/2011GL047316, 2011)

  4. Frequency Jump Detection and Analysis

    Science.gov (United States)

    2008-12-01

    CUMULATIVE SUM JUMP DETECTION The Cumulative Sum ( CUSUM ) is a classic change-point analysis technique that uses the cumulative sum of the...sum and y is the average of the data. The CUSUM slope indicates the value of the data with respect to the overall average. A flat cumulative sum...sudden change in the CUSUM slope indicates a jump in the data. The CUSUM plot for a data set having a single jump will have a V or inverted V shape

  5. Edge detection by nonlinear dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Yiu-fai

    1994-07-01

    We demonstrate how the formulation of a nonlinear scale-space filter can be used for edge detection and junction analysis. By casting edge-preserving filtering in terms of maximizing information content subject to an average cost function, the computed cost at each pixel location becomes a local measure of edgeness. This computation depends on a single scale parameter and the given image data. Unlike previous approaches which require careful tuning of the filter kernels for various types of edges, our scheme is general enough to be able to handle different edges, such as lines, step-edges, corners and junctions. Anisotropy in the data is handled automatically by the nonlinear dynamics.

  6. Local Outlier Detection with Interpretation

    DEFF Research Database (Denmark)

    Dang, Xuan-Hong; Micenková, Barbora; Assent, Ira

    2013-01-01

    Outlier detection aims at searching for a small set of objects that are inconsistent or considerably deviating from other objects in a dataset. Existing research focuses on outlier identification while omitting the equally important problem of outlier interpretation. This paper presents a novel...... that this learning task can be solved via the matrix eigen-decomposition and its solution contains essential information to reveal features that are most important to interpret the exceptional properties of outliers. We demonstrate the appealing performance of LODI via a number of synthetic and real world datasets...

  7. Local Outlier Detection with Interpretation

    DEFF Research Database (Denmark)

    Dang, Xuan-Hong; Micenková, Barbora; Assent, Ira;

    2013-01-01

    Outlier detection aims at searching for a small set of objects that are inconsistent or considerably deviating from other objects in a dataset. Existing research focuses on outlier identification while omitting the equally important problem of outlier interpretation. This paper presents a novel...... that this learning task can be solved via the matrix eigen-decomposition and its solution contains essential information to reveal features that are most important to interpret the exceptional properties of outliers. We demonstrate the appealing performance of LODI via a number of synthetic and real world datasets...

  8. Traffic Light Detection at Night

    DEFF Research Database (Denmark)

    Jensen, Morten Bornø; Philipsen, Mark Philip; Bahnsen, Chris

    2015-01-01

    of three detectors based on heuristic models and one learning-based detector. Evaluation is done on night-time data from the public LISA Traffic Light Dataset. The learning-based detector out- performs the model-based detectors in both precision and recall. The learning-based detector achieves an average......Traffic light recognition (TLR) is an integral part of any in- telligent vehicle, it must function both at day and at night. However, the majority of TLR research is focused on day-time scenarios. In this paper we will focus on detection of traffic lights at night and evalu- ate the performance...

  9. Subgraph detection using graph signals

    KAUST Repository

    Chepuri, Sundeep Prabhakar

    2017-03-06

    In this paper we develop statistical detection theory for graph signals. In particular, given two graphs, namely, a background graph that represents an usual activity and an alternative graph that represents some unusual activity, we are interested in answering the following question: To which of the two graphs does the observed graph signal fit the best? To begin with, we assume both the graphs are known, and derive an optimal Neyman-Pearson detector. Next, we derive a suboptimal detector for the case when the alternative graph is not known. The developed theory is illustrated with numerical experiments.

  10. Kepler planet-detection mission

    DEFF Research Database (Denmark)

    Borucki...[], William J.; Koch, David; Buchhave, Lars C. Astrup

    2010-01-01

    The Kepler mission was designed to determine the frequency of Earth-sized planets in and near the habitable zone of Sun-like stars. The habitable zone is the region where planetary temperatures are suitable for water to exist on a planet’s surface. During the first 6 weeks of observations, Kepler...... is one of the lowest-density planets (~0.17 gram per cubic centimeter) yet detected. Kepler-5b, -6b, and -8b confirm the existence of planets with densities lower than those predicted for gas giant planets....

  11. Sensors for Fluid Leak Detection

    Directory of Open Access Journals (Sweden)

    Gonzalo Pajares Martinsanz

    2015-02-01

    Full Text Available Fluid leak detection represents a problem that has attracted the interest of researchers, but not exclusively because in industries and services leaks are frequently common. Indeed, in water or gas supplies, chemical or thermal plants, sea-lines or cooling/heating systems leakage rates can cause important economic losses and sometimes, what it is more relevant, environmental pollution with human, animal or plant lives at risk. This last issue has led to increased national and international regulations with different degrees of severity regarding environmental conservation.[...

  12. The Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  13. Microwave sensor for ice detection

    Science.gov (United States)

    Arndt, G. D.; Chu, A.; Stolarczyk, L. G.; Stolarczyk, G. L.

    1994-01-01

    A microwave technique has been developed for detecting ice build-up on the wing surfaces of commercial airliners and highway bridges. A microstrip patch antenna serves as the sensor, with changes in the resonant frequency and impedance being dependent upon the overlying layers of ice, water and glycol mixtures. The antenna sensor is conformably mounted on the wing. The depth and dielectric constants of the layers are measured by comparing the complex resonant admittance with a calibrated standard. An initial breadboard unit has been built and tested. Additional development is now underway. Another commercial application is in the robotics field of remote sensing of coal seam thickness.

  14. Deep Water Munitions Detection System

    Science.gov (United States)

    2010-03-01

    signal to noise ratios which are shown in Figure 5. The signal to noise was calculated using an algorithm that is part of the Oasis montaj software...using an algorithm that is part of the Oasis montaj software suite. The signal strength of an anomaly is calculated as the sum of the squares of...Process Software extension for Geosoft Oasis Montaj , version 6.4, May 28, 2007 8. DeProspo,D. and R. DiMarco, “Automatic Detection and

  15. Probability of Detection Demonstration Transferability

    Science.gov (United States)

    Parker, Bradford H.

    2008-01-01

    The ongoing Mars Science Laboratory (MSL) Propellant Tank Penetrant Nondestructive Evaluation (NDE) Probability of Detection (POD) Assessment (NESC activity) has surfaced several issues associated with liquid penetrant POD demonstration testing. This presentation lists factors that may influence the transferability of POD demonstration tests. Initial testing will address the liquid penetrant inspection technique. Some of the factors to be considered in this task are crack aspect ratio, the extent of the crack opening, the material and the distance between the inspection surface and the inspector's eye.

  16. An Adaptive Algorithm to Detect Port Scans

    Institute of Scientific and Technical Information of China (English)

    单蓉胜; 李小勇; 李建华

    2004-01-01

    Detection of port scan is an important component in a network intrusion detection and prevention system. Traditional statistical methods can be easily evaded by stealthy scans and are prone to DeS attacks. This paper presents a new mechanism termed PSD(port scan detection), which is based on TCP packet anomaly evaluation. By learning the port distribution and flags of TCP packets arriving at the protected hosts, PSD can compute the anomaly score of each packet and effectively detect port scans including slow scans and stealthy scans. Experiments show that PSD has high detection accuracy and low detection latency.

  17. Neutron Detection with Mercuric Iodide

    CERN Document Server

    Bell, Z A

    2003-01-01

    Mercuric iodide is a high-density, high-Z semiconducting material useful for gamma ray detection. This makes it convertible to a thermal neutron detector by covering it with a boron rich material and detecting the 478 keV gamma rays resulting from the sup 1 sup 0 B(n, alpha) sup 7 Li* reaction. However, the 374 barn thermal capture cross section of sup n sup a sup t Hg, makes the detector itself an attractive absorber, and this has been exploited previously. Since previous work indicates that there are no low-energy gamma rays emitted in coincidence with the 368 keV capture gamma from the dominant sup 1 sup 9 sup 9 Hg(n, gamma) sup 2 sup 0 sup 0 Hg reaction, only the 368 keV capture gamma is seen with any efficiency a relatively thin (few mm) detector. In this paper we report preliminary measurements of neutrons via capture reactions in a bare mercuric iodide crystal and a crystal covered in sup 1 sup 0 B-loaded epoxy. The covered detector is an improvement over the bare detector because the presence of both ...

  18. Building Detection in SAR Imagery

    Energy Technology Data Exchange (ETDEWEB)

    Steinbach, Ryan Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Koch, Mark William [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Moya, Mary M [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Goold, Jeremy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-08-01

    Current techniques for building detection in Synthetic Aperture Radar (SAR) imagery can be computationally expensive and/or enforce stringent requirements for data acquisition. The desire is to present a technique that is effective and efficient at determining an approximate building location. This approximate location can be used to extract a portion of the SAR image to then perform a more robust detection. The proposed technique assumes that for the desired image, bright lines and shadows, SAR artifact effects, are approximately labeled. These labels are enhanced and utilized to locate buildings, only if the related bright lines and shadows can be grouped. In order to find which of the bright lines and shadows are related, all of the bright lines are connected to all of the shadows. This allows the problem to be solved from a connected graph viewpoint. Where the nodes are the bright lines and shadows and the arcs are the connections between bright lines and shadows. Constraints based on angle of depression and the relationship between connected bright lines and shadows are applied to remove unrelated arcs. Once the related bright lines and shadows are grouped, their locations are combined to provide an approximate building location. Experimental results are provided showing the outcome of the technique.

  19. Biologically inspired robust onset detection

    Science.gov (United States)

    Smith, Leslie S.

    2003-04-01

    Onsets are rapid increases in signal strength. The common onset time in different frequency bands provides an important cue for dynamically grouping sound energy, and hence for sound streaming. Onsets are important for segmenting sounds [Smith, J. New Music Res. 23, 11-23 (1994)] and for determining where to measure IIDs and ITDs for the sound direction finding [Smith, J. Acoust. Soc. Am. 111, 2467 (2002)]. Effective onset detection requires low latency and the capacity to cope with wide variation in the dynamic range. Many neurons in the auditory brainstem are sensitive to onsets. The system filters sound into cochlea-like bands (using a Gammatone filterbank), then spike codes positive-going zero-crossings. A wide dynamic range is achieved by using multiple spike trains per filter band, each with different sensitivity. The spike trains from each band innervate a leaky integrate-and-fire neuron. The excitatory synapses from the spike trains are fast and depressing: the shunting inhibitory synapses are facilitating and slower. The combined effect is that the neuron produces a single spike for each onset over a wide dynamic range with very low latency. The use of both inhibitory and excitatory synapses improves onset detection over purely excitatory synapses, leading to a better sound direction finding than previously reported.

  20. Community Detection in Complex Networks

    Institute of Scientific and Technical Information of China (English)

    Nan Du; Bai Wang; Bin Wu

    2008-01-01

    With the rapidly growing evidence that various systems in nature and society can be modeled as complex networks, community detection in networks becomes a hot research topic in physics, sociology, computer society, etc. Although this investigation of community structures has motivated many diverse algorithms, most of them are unsuitable when dealing with large networks due to their computational cost. In this paper, we present a faster algorithm ComTeetor,which is more efficient for the community detection in large complex networks based on the nature of overlapping cliques.This algorithm does not require any priori knowledge about the number or the original division of the communities. With respect to practical applications, ComTector is challenging with five different types of networks including the classic Zachary Karate Club, Scientific Collaboration Network, South Florida Free Word Association Network, Urban Traffic Network, North America Power Grid and the Telecomnmnication Call Network. Experimental results show that our algorithm can discover meaningful communities that meet both the objective basis and our intuitions.