WorldWideScience

Sample records for wedge-shaped nephrograms detected

  1. Modelling the wedge shape for the virtual wedge

    International Nuclear Information System (INIS)

    Chang Liyun; Ho Shengyow; Chen, Helen H W

    2003-01-01

    We present a method to model the virtual wedge shape in a 3D treatment planning system as a physical wedge. The virtual wedge shape was determined using the measured dose profile of the virtual wedge at a chosen reference depth. The differences between the calculated and the measured dose profiles for the virtual wedge were within 0.5% at the reference depth, and within 2.5% at other depths. This method provides a fast and accurate way to implement the virtual wedge into our planning system for any wedge angles. This method is also applicable to model the physical wedge shapes with comparable good results

  2. Complex Wedge-Shaped Matrices: A Generalization of Jacobi Matrices

    Czech Academy of Sciences Publication Activity Database

    Hnětynková, Iveta; Plešinger, M.

    2015-01-01

    Roč. 487, 15 December (2015), s. 203-219 ISSN 0024-3795 R&D Projects: GA ČR GA13-06684S Keywords : eigenvalues * eigenvector * wedge-shaped matrices * generalized Jacobi matrices * band (or block) Krylov subspace methods Subject RIV: BA - General Mathematics Impact factor: 0.965, year: 2015

  3. Spatial resolution of wedge shaped silicon microstrip detectors

    International Nuclear Information System (INIS)

    Anticic, T.; Barnett, B.; Blumenfeld, B.; Chien, C.Y.; Fisher, P.; Gougas, A.; Krizmanic, J.; Madansky, L.; Newman, D.; Orndorff, J.; Pevsner, A.; Spangler, J.

    1995-01-01

    Several wedge-shaped silicon microstrip detectors with pitches from 30 to 100 μm have been designed by our group and beam tested at the CERN SPS. We find the spatial resolution σ becomes larger at the rate of 0.21 μm per 1 μm increase in pitch, but the number of strips per cluster remains about the same as the pitch varies from 30 to 100 μm. (orig.)

  4. Usefulness of MPR images of nephrogram in ureteropelvic junction stenosis

    International Nuclear Information System (INIS)

    Usui, Nobutaka; Munechika, Hirotsugu

    2005-01-01

    The study was to see if the multi-planar reconstruction (MPR) images of nephrogram were useful to evaluate the causative lesion of ureteropelvic junction (UPJ) stenosis. Thirty-two cases with UPJ stenosis were selected retrospectively for evaluation. MPR images were compared between nephrogram and ureterogram to see which was more useful for evaluation of the causative lesion. Most of the lesions were evaluated better in nephrogram or equal to ureterogram except for one case of a small ureteral tumor. MPR images in nephrogram were useful for evaluation of crossing vessels and a ureteral tumor. Benign stricture and calculi were also confirmed by the images. (author)

  5. Metamaterials based on wedge-shaped electrodynamic structures

    Directory of Open Access Journals (Sweden)

    Mitrokhin Vladimir

    2017-01-01

    Full Text Available The paper studies a possibility of simulation of artificial composite media with negative values of the real part of the equivalent dielectric (magnetic permittivity, by the use of segments of hollow composite waveguides with cylindrical guided waves in evanescent mode. Reactive evanescent fields of wedge-shaped waveguide eigenmodes are formed in the evanescent region before the critical section of the waveguide which separates the quasistatic field region from the distributing field of the evanescent waveguide mode. The possibility of simulation is determined by the equivalence of dispersion equation of the eigenmode propagation constant and the dispersion equation for the electric (magnetic permittivity of plasma-like medium if cut-off frequency and electric (magnetic plasma frequency of the medium are equal.

  6. Diffusion induced flow on a wedge-shaped obstacle

    International Nuclear Information System (INIS)

    Zagumennyi, Ia V; Dimitrieva, N F

    2016-01-01

    In this paper the problem of evolution of diffusion induced flow on a wedge-shaped obstacle is analyzed numerically. The governing set of fundamental equations is solved using original solvers from the open source OpenFOAM package on supercomputer facilities. Due to breaking of naturally existing diffusion flux of a stratifying agent by the impermeable surface of the wedge a complex multi-level vortex system of compensatory fluid motions is formed around the obstacle. Sharp edges of the obstacle generate extended high-gradient horizontal interfaces which are clearly observed in laboratory experiments by high-resolution Schlieren visualization. Formation of an intensive pressure depression zone in front of the leading vertex of the wedge is responsible for generation of propulsive force resulting in a self-displacement of the obstacle along the neutral buoyancy horizon in a stably stratified environment. The size of the pressure deficiency area near the sharp vertex of a concave wedge is about twice that for a convex one. This demonstrates a more intensive propulsion mechanism in case of the concave wedge and, accordingly, a higher velocity of its self-movement in a continuously stratified medium. (paper)

  7. Chemical risk factors responsible for the formation of wedge-shaped lesions

    Directory of Open Access Journals (Sweden)

    Perić Dejan

    2015-01-01

    Full Text Available Introduction: Non-carious tooth substances loss pose a major health problem of a modern man. The literature often collectively describes all non-carious lesions and is therefore difficult to compare results obtained by different authors. Chemical factors are one of the predisposing factors responsible for the formation of wedge-shaped erosions. Aim: Examination of chemical risk factors as one of the predisposing causes responsible for the formation of wedge-shaped lesions. Method: We examined 62 patients with wedge-shaped erosions (mean age 45.52 ± 12.03 years, 58.1% of men and 60 patients without erosions in the control group (mean age 34.40 ± 9.28 years, 60% men . The entire examination was completed by using a questionnaire at the Dental Clinic of the University of Pristina - Kosovska Mitrovica. salivary pH was measured by the pH meter. Results: The results show that the wedge-shaped lesions often occur equally in both men and women. Considerably often it might appear in older people but can also occur in teenagers. Patients with wedge-shaped erosion have increased acidity of saliva, a heightened sense of acid in the mouth and consume a lot more carbonated drinks compared to patients without erosions. Conclusion: Wedge-shaped lesions are more common in people older than 40 years. Taking into account the results obtained in this study it can be concluded that the chemical risk factors truly fall within the predisposing factors that may be responsible for the creation of wedge-shaped erosions.

  8. The striated MR nephrogram, not a reflection of pathology

    Energy Technology Data Exchange (ETDEWEB)

    Trout, Andrew T.; Care, Marguerite M.; Towbin, Alexander J. [Cincinnati Children' s Hospital Medical Center, Department of Radiology - MLC 5031, Cincinnati, OH (United States); Zhang, Bin [Cincinnati Children' s Hospital Medical Center, Division of Biostatistics and Epidemiology, Cincinnati, OH (United States)

    2015-10-15

    We have intermittently observed low signal striations in the kidneys on delayed post-contrast MR exams of the spine. While we suspected these striations were due to concentrated gadolinium, the clinical importance of this finding was uncertain. To describe the striated MR nephrogram (low signal striations in the kidney) and assess its clinical relevance. Retrospective review of delayed post-contrast MRIs of the spine (mean: 45 min after contrast administration). The presence of the striated MR nephrogram was correlated with imaging parameters (field strength, time since contrast), and findings (gadolinium in the bladder, inferior vena cava and aorta diameters) and with clinical factors (history of renal disease, laboratory values). Seven hundred seventy-three exams performed on 229 patients, 8.3 ± 5.3 years of age, were reviewed. The striated MR nephrogram was observed in 102/773 examinations (13.2%) and was present on at least one study in 54/229 patients (23.6%). The presence of striations was associated with the specific magnet on which the exam was performed (P < 0.01) but not with magnet field strength. Serum creatinine was minimally lower in patients with striations (0.43 ± 0.12 vs. 0.49 ± 0.18 mg/dL, P = 0.002), but no other clinical or historical data, including time from contrast administration (P = 0.54), fluid status (P = 0.17) and clinical history of renal disease (P = 0.14), were predictive of the presence of striations. The striated MR nephrogram was observed in 13% of delayed post-contrast MR exams of the spine. Precipitating factors are unclear, but the striated nephrogram does not appear to be a marker of clinically apparent renal dysfunction. (orig.)

  9. Wedge-shaped parenchymal enhancement peripheral to the hepatic hemangioma : two-phase spiral CT findings

    International Nuclear Information System (INIS)

    Kim, Kyoung Won; Kim, Tae Kyoung; Han, Joon Koo; Kim, Ah Young; Lee, Hyun Ju; Song, Chi Sung; Choi, Byung Ihn

    2000-01-01

    To determine the incidence of hepatic hemangiomas associated with wedge-shaped parenchymal enhancements adjacent to the tumors as seen on two-phase spiral CT images obtained during the hepatic arterial phase and to characterize the two-phase spiral CT findings of those hemangiomas. One hundred and eight consecutive hepatic hemangiomas in 63 patients who underwent two-phase spiral CT scanning during an 11-month period were included in this study. Two-phase spiral CT scans were obtained during the hepatic arterial phase (30-second delay) and portal venous phase (65-second delay) after injection of 120 mL of contrast material at a rate of 3 mL/sec. We evaluated the frequency with which wedge-shaped parenchymal enhancement was adjacent to the hemangiomas during the hepatic arterial phase and divided hemangiomas into two groups according to whether or not wedge-shaped parenchymal enhancement was noted (Group A and Group B). The presence of such enhancement in hemangiomas was correlated with tumor size and the grade of intratumoral enhancement. In 24 of 108 hemangiomas, wedge-shaped parenchymal enhancement adjacent to hepatic tumors was seen on two-phase CT images obtained during the hepatic arterial phase. Mean hemangioma size was 22mm in group A and 24mm in group B. There was no statistically significant relationship between lesion size and the presence of wedge-shaped parenchymal enhancement adjacent to a hemangioma. In 91.7% and 100% of tumors in Group A, and in 9.6% and 17.8% in Group B, hemangiomas showed more than 50% intratumoral enhancement during the arterial and portal venous phase, respectively. Wedge-shaped parenchymal enhancements peripheral to hepatic hemangiomas was more frequently found in tumors showing more than 50% intratumoral enhancement during these two phases (p less than 0.01). Wedge-shaped parenchymal enhancements is not uncommonly seen adjacent to hepatic hemangiomas on two-phase spiral CT images obtained during the hepatic arterial phase. A

  10. A Novel Continuous Extrusion Process to Fabricate Wedge-Shaped Light Guide Plates

    Directory of Open Access Journals (Sweden)

    Wen-Tse Hsiao

    2013-01-01

    Full Text Available Backlight modules are key components in thin-film transistor liquid crystal displays (TFT-LCD. Among the components of a backlight module, the light guide plate (LGP plays the most important role controlling the light projected to the eyes of users. A wedge-shaped LGP, with its asymmetrical structure, is usually fabricated by an injection proces, but the fabrication time of this process is long. This study proposes a continuous extrusion process to fabricate wedge-shaped LGPs. This continuous process has advantages for mass production. Besides a T-die and rollers, this system also has an in situ monitor of the melt-bank that forms during the extrusion process, helping control the plate thickness. Results show that the melt bank has a close relationship with the plate thickness. The temperature of the bottom heater and roller was adjusted to reduce the surface deformation of the wedge-shaped plate. This continuous extrusion system can successfully manufacture wedge-shaped LGPs for mass production.

  11. [A Patient with a Wedge-shaped Pulmonary Lesion Associated with Streptococcus parasanguinis].

    Science.gov (United States)

    Miyamoto, Hiroya; Gomi, Harumi; Ishioka, Haruhiko; Shirokawa, Taijiro

    2016-05-01

    An 84-year-old man was admitted to our hospital with bloody sputum. He was found to have a right lower lobe wedge-shaped nodular lesion with chest X-ray and computed tomography of the chest. Ceftriaxone and minocycline were started empirically based on a working diagnosis of community-acquired pneumonia. Streptococcus parasanguinis was isolated with sputum cultures obtained on three consecutive days and was identified based on its biochemical properties. S. parasanguinis is a member of the sanguinis group of viridans Streptococci. It is known as a causative pathogen for endocarditis. There are very few reports of S. parasanguinis associated with pulmonary infections. The present report describes the association of S. parasanguinis with a wedge-shaped nodular lesion in the lungs.

  12. Allergic Interstitial Nephritis Manifesting as a Striated Nephrogram

    Directory of Open Access Journals (Sweden)

    Irfan Moinuddin

    2015-01-01

    Full Text Available Allergic interstitial nephritis (AIN is an underdiagnosed cause of acute kidney injury (AKI. Guidelines suggest that AIN should be suspected in a patient who presents with an elevated serum creatinine and a urinalysis that shows white cells, white cell casts, or eosinophiluria. Drug-induced AIN is suspected if AKI is temporally related to the initiation of a new drug. However, patients with bland sediment and normal urinalysis can also have AIN. Currently, a definitive diagnosis of AIN is made by renal biopsy which is invasive and fraught with risks such as bleeding, infection, and hematoma. Additionally, it is frequently unclear when a kidney biopsy should be undertaken. We describe a biopsy proven case of allergic interstitial nephritis which manifested on contrast enhanced Magnetic Resonance Imaging (MRI as a striated nephrogram. Newer and more stable macrocyclic gadolinium contrast agents have a well-demonstrated safety profile. Additionally, in the presentation of AKI, gadolinium contrast agents are safe to administer in patients who demonstrate good urine output and a downtrending creatinine. We propose that the differential for a striated nephrogram may include AIN. In cases in which the suspicion for AIN is high, this diagnostic consideration may be further characterized by contrast enhanced MRI.

  13. Wedged-shaped, segmental changes in the liver caused by occlusion of a single hepatic vein

    International Nuclear Information System (INIS)

    Kanazawa, Susumu; Akaki, Shiro; Yasui, Kotaro; Tanaka, Akio; Hiraki, Yoshio

    1997-01-01

    We evaluated wedged-shaped, segmental changes in the liver caused by occlusion of a single hepatic vein in seven patients. The causes of occlusion were due to liver tumors in three patients, metastasis of the right adrenal gland in one, and postoperative changes in three. Changes included low attenuating on unenhanced CT, high attenuation on enhanced CT, low signal intensity on T1-weighted MRI, high signal intensity on T2-weighted MRI, high signal intensity on enhanced MRI, dense hepatogram and retrograde arterioportal shunt on hepatic arteriography. MRI and hepatic arteriography are more sensitive than CT in demonstration of those changes. (author)

  14. Rainfall induced groundwater mound in wedge-shaped promontories: The Strack-Chernyshov model revisited

    Science.gov (United States)

    Kacimov, A. R.; Kayumov, I. R.; Al-Maktoumi, A.

    2016-11-01

    An analytical solution to the Poisson equation governing Strack's discharge potential (squared thickness of a saturated zone in an unconfined aquifer) is obtained in a wedge-shaped domain with given head boundary conditions on the wedge sides (specified water level in an open water body around a porous promontory). The discharge vector components, maximum elevation of the water table in promontory vertical cross-sections, quantity of groundwater seeping through segments of the wedge sides, the volume of fresh groundwater in the mound are found. For acute angles, the solution to the problem is non-unique and specification of the behaviour at infinity is needed. A ;basic; solution is distinguished, which minimizes the water table height above a horizontal bedrock. MODFLOW simulations are carried out in a finite triangular island and compare solutions with a constant-head, no-flow and ;basic; boundary condition on one side of the triangle. Far from the tip of an infinite-size promontory one has to be cautious with truncation of the simulated flow domains and imposing corresponding boundary conditions. For a right and obtuse wedge angles, there are no positive solutions for the case of constant accretion on the water table. In a particular case of a confined rigid wedge-shaped aquifer and incompressible fluid, from an explicit solution to the Laplace equation for the hydraulic head with arbitrary time-space varying boundary conditions along the promontory rays, essentially 2-D transient Darcian flows within the wedge are computed. They illustrate that surface water waves on the promontory boundaries can generate strong Darcian waves inside the porous wedge. Evaporation from the water table and sea-water intruded interface (rather than a horizontal bed) are straightforward generalizations for the Poissonian Strack potential.

  15. Stationary bubble formation and cavity collapse in wedge-shaped hoppers

    Science.gov (United States)

    Yagisawa, Yui; Then, Hui Zee; Okumura, Ko

    2016-01-01

    The hourglass is one of the apparatuses familiar to everyone, but reveals intriguing behaviors peculiar to granular materials, and many issues are remained to be explored. In this study, we examined the dynamics of falling sand in a special form of hourglass, i.e., a wedge-shaped hopper, when a suspended granular layer is stabilized to a certain degree. As a result, we found remarkably different dynamic regimes of bubbling and cavity. In the bubbling regime, bubbles of nearly equal size are created in the sand at a regular time interval. In the cavity regime, a cavity grows as sand beads fall before a sudden collapse of the cavity. Bubbling found here is quite visible to a level never discussed in the physics literature and the cavity regime is a novel phase, which is neither continuous, intermittent nor completely blocked phase. We elucidate the physical conditions necessary for the bubbling and cavity regimes and develop simple theories for the regimes to successfully explain the observed phenomena by considering the stability of a suspended granular layer and clogging of granular flow at the outlet of the hopper. The bubbling and cavity regimes could be useful for mixing a fluid with granular materials. PMID:27138747

  16. Experimental Investigation on Cross Flow of Wedge-shaped Gap in the core of Prismatic VHTR

    International Nuclear Information System (INIS)

    Lee, Jeong Hun; Park, Goon Cherl; Cho, Hyoung Kyu; Yoon, Su Jong

    2014-01-01

    The core of the PMR type reactor consists of assemblies of hexagonal graphite blocks. The graphite blocks have lots of advantages for neutron economy and high temperature structural integrity. The height and flat-to-flat width of fuel bock are 793 mm and 360 mm, respectively. Each block has 108 coolant channels of which the diameter is 16 mm. And there are gaps between blocks not only vertically but also horizontally for reloading of the fuel elements. The vertical gap induces the bypass flow and through the horizontal gap the cross flow is formed. Since the complicated flow distribution occurs by the bypass flow and cross flow, flow characteristics in the core of the PMR reactor cannot be treated as a simple pipe flow. The fuel zone of the PMR core consists of multiple layers of fuel blocks. The shape change of the fuel blocks could be caused by the thermal expansion and fast-neutron induced shrinkage. It could make different axial shrinkage of fuel block and this leads to wedge-shaped gaps between two stacked fuel blocks. The cross flow is often considered as a leakage flow through the horizontal gap between stacked fuel blocks and it complicates the flow distribution in the reactor core by connecting the coolant channel and the bypass gap. Moreover, the cross flow could lead to uneven coolant distribution and consequently cause superheating of individual fuel element zones with increased fission product release. Since the core cross flow has a negative impact on safety and efficiency of VHTR, core cross flow phenomena have to be investigated to improve the core thermal margin of VHTR. To develop the cross flow loss coefficient model for determination of the flow distribution for PMR core analysis codes, study on cross flow for PMR200 core is essential. In particular, to predict the amount of flow through the cross flow gap, obtaining accurate flow loss coefficient is important. In this study, the full-scale cross flow experimental facility was constructed to

  17. Three-dimensional semi-analytical solution to groundwater flow in confined and unconfined wedge-shaped aquifers

    Science.gov (United States)

    Sedghi, Mohammad Mahdi; Samani, Nozar; Sleep, Brent

    2009-06-01

    The Laplace domain solutions have been obtained for three-dimensional groundwater flow to a well in confined and unconfined wedge-shaped aquifers. The solutions take into account partial penetration effects, instantaneous drainage or delayed yield, vertical anisotropy and the water table boundary condition. As a basis, the Laplace domain solutions for drawdown created by a point source in uniform, anisotropic confined and unconfined wedge-shaped aquifers are first derived. Then, by the principle of superposition the point source solutions are extended to the cases of partially and fully penetrating wells. Unlike the previous solution for the confined aquifer that contains improper integrals arising from the Hankel transform [Yeh HD, Chang YC. New analytical solutions for groundwater flow in wedge-shaped aquifers with various topographic boundary conditions. Adv Water Resour 2006;26:471-80], numerical evaluation of our solution is relatively easy using well known numerical Laplace inversion methods. The effects of wedge angle, pumping well location and observation point location on drawdown and the effects of partial penetration, screen location and delay index on the wedge boundary hydraulic gradient in unconfined aquifers have also been investigated. The results are presented in the form of dimensionless drawdown-time and boundary gradient-time type curves. The curves are useful for parameter identification, calculation of stream depletion rates and the assessment of water budgets in river basins.

  18. Application of Green's differential equation to the analysis of ion-matrix sheaths around wedge-shaped cathodes

    International Nuclear Information System (INIS)

    Donolato, C

    2005-01-01

    A relation between the gradient of the electric field and mean curvature of equipotential surfaces (Green's differential equation) is applied to a two-dimensional free-boundary problem arising in the study of ion sheaths around wedge-shaped cathodes. With the assumption that the equipotential lines are hyperbolae, this relation leads to a nonlinear ordinary differential equation for the potential along the bisector line of the wedge. An approximate solution is found, which yields, in particular, the sheath width along this line as a function of the wedge angle. The resulting values are in good agreement with published results obtained by numerically solving Poisson's equation

  19. Renal blood flow, diuresis and isotope nephrogram in experimental stenosis of the renal artery

    International Nuclear Information System (INIS)

    Pemsel, H.K.; Lange, H.; Mahlstedt, J.; Joseph, K.; Marburg Univ.; Marburg Univ.

    1979-01-01

    After experimental stenosis of the renal artery of the dog, the isotope nephrogram shows a prolongation of the transit-time, when the renal blood flow is reduced to 40-70%. This finding was most significant in low diuresis (0,05-0,2 ml/min), sporadic in moderate diuresis (0,2-2,0 ml/min), no longer demonstrable in forced diuresis (>2,0 ml/min). The diuretic effect of X-ray contrast-medium (70% Na-Meglumin-Jotalamat, 0,5 ml/kg i.v.) normalizes a pathologic ING in low diuresis. (orig.) [de

  20. Wedge-shaped lesion in the liver seen on postoperative CT. Probable thromboembolic phenomenon in the portal venous system

    International Nuclear Information System (INIS)

    Yoshimitsu, K.; Charnsangavej, C.; Mi Park, J.; Ibukuro, K.

    1996-01-01

    Retrospective review of teaching files in our institution revealed 18 cases showing postoperative WSL in the liver. We also retrospectively reviewed CT images of the liver in 104 patients with a recent history of abdominopelvic surgery performed during a period of 12 months, as well as in 102 patients with no history of surgery during the same period to be used as control. Three additional patients with WSL were found in the postoperative group and none in the control group. Liver CT images from the 21 patients showing WSL, along with their clinical data and follow-up CT where available, were retrospectively analyzed. I.v. contrast-enhanced CT showed homogeneous higher attenuation of WSL than the surrounding liver in all cases; unenhanced CT showed low density in 5 patients, isodensity in 7 patients, and high density in 5 patients as compared with the surrounding liver. Density of unenhanced CT was significantly correlated with the presence or grade of fatty liver. In 5 cases CT demonstrated clots in the portal vein branch within the area of WSL and in 2 cases portal perfusion defects were observed on arterial portal CT, corresponding to the areas of WSL. Follow-up CT examinations were available on 15 patients: WSL became less prominent, or atrophic, or showed no change in 10, 2 and 3 patients respectively. Follow-up CT showed development of liver metastasis in only 3 cases. Only 2 of the 21 patients were clinically symptomatic; one had postoperative ileus and the other obstructive jaundice. Postoperative WSL may represent a thromboembolic phenomenon at the peripheral intrahepatic branch of the portal venous system during or after abdominopelvic surgery, resulting in a compensatory increase in the hepatic arterial flow that appears as wedge-shaped enhancement on CT. (orig./MG)

  1. Three-level anterior cervical discectomy and fusion in elderly patients with wedge shaped tricortical autologous graft: A consecutive prospective series

    Directory of Open Access Journals (Sweden)

    Lee Suk

    2008-01-01

    Full Text Available Background: Treatment of multilevel cervical spondylotic myelopathy/radiculopathy is a matter of debate, more so in elderly patients due to compromised physiology. We evaluated the clinical and radiological results of cervical fusion, using wedge-shaped tricortical autologous iliac graft and Orion plate for three-level anterior cervical discectomy in elderly patients. Materials and Methods: Twelve elderly patients with mean age of 69.7 years (65-76 years were treated between April 2000 and March 2005, for three-level anterior cervical discectomy and fusion, using wedge-shaped tricortical autologous iliac graft and Orion plate. Outcome was recorded clinically according to Odom′s criteria and radiologically in terms of correction of lordosis angle and intervertebral disc height span at the time of bony union. The mean follow-up was 29.8 months (12-58 months. Results: All the patients had a complete recovery of clinical symptoms after surgery. Postoperative score according to Odom′s criteria was excellent in six patients and good in remaining six. Bony union was achieved in all the patients with average union time of 12 weeks (8-20 weeks. The mean of sum of three segment graft height collapse was 2.50 mm (SD = 2.47. The average angle of lordosis was corrected from 18.2° (SD = 2.59° preoperatively to 24.9° (SD = 4.54° at the final follow-up. This improvement in the radiological findings is statistically significant (P < 0.05. Conclusion: Cervical fusion with wedge-shaped tricortical autologous iliac graft and Orion plate for three-level anterior cervical discectomy is an acceptable technique in elderly patients. It gives satisfactory results in terms of clinical outcome, predictable early solid bony union, and maintenance of disc space height along with restoration of cervical lordosis.

  2. Goldtraces on wedge-shaped artefacts from late neolithic of south Scandinavia analysed by proton induced x-ray emission spectroscopy

    International Nuclear Information System (INIS)

    Ahlberg, M.; Akselsson, R.; Forkman, B.; Rausing, G.

    1975-01-01

    Visible coloured traces on the surface of two selected wedge-shaped artefacts (pendants) of slate from the late Neolithic of South Scandinavia was analysed by means of proton-induced x-ray emission spectroscopy (PIXE). PIXE is shown to be a feasible tool in investigating surface layers of archeological significance. Three different gold-silver alloys was found on the two pendants. The results indicate that we shall have to reconsider the general accepted theories on the economic basis of the early Bronze Age in the area. (author)

  3. Temperature of Heating and Cooling of Massive, Thin, and Wedge-Shaped Plates from Hard-to-Machine Steels During Their Grinding

    Science.gov (United States)

    Dement‧ev, V. B.; Ivanova, T. N.; Dolginov, A. M.

    2017-01-01

    Grinding of flat parts occurs by solid abrasive particles due to the physicomechanical process of deformation and to the action of a process liquid at high temperatures in a zone small in volume and difficult for observation. The rate of heating and cooling depends on the change in the intensity of the heat flux and in the velocity and time of action of the heat source. A study has been made of the regularities of the influence of each of these parameters on the depth and character of structural transformations during the grinding of flat parts from hard-to-machine steels. A procedure to calculate temperature in grinding massive, thin, and wedge-shaped parts has been developed with account taken of the geometric and thermophysical parameters of the tool and the treated part, and also of cutting regimes. The procedure can be used as a constituent part in developing a system for automatic design of the technological process of grinding of flat surfaces. A relationship between the temperature in the grinding zone and the regimes of treatment has been established which makes it possible to control the quality of the surface layer of massive, thin, and wedge-shaped plates from hard-to-machine steels. The rational boundaries of shift of cutting regimes have been determined.

  4. Volumetric Nephrogram Represents Renal Function and Complements Aortic Anatomic Severity Grade in Predicting EVAR Outcomes.

    Science.gov (United States)

    Balceniuk, Mark D; Trakimas, Lauren; Aghaie, Claudia; Mix, Doran; Rasheed, Khurram; Seaman, Matthew; Ellis, Jennifer; Glocker, Roan; Doyle, Adam; Stoner, Michael C

    2018-07-01

    Chronic kidney disease (CKD) is a predictor of poor outcomes for patients undergoing endovascular aortic aneurysm repair (EVAR). Anatomic severity grade (ASG) represents a quantitative mechanism for assessing anatomical suitability for endovascular aortic repair. Anatomic severity grade has been correlated with repair outcomes and resource utilization. The purpose of this study was to identify a novel renal perfusion metric as a way to assist ASG with predicting EVAR outcomes. Retrospective review of a prospectively maintained database identified elective infrarenal aortic aneurysm repair cases. Anatomic grading was undertaken by independent reviewers. Using volumetric software, kidney volume, and a novel measure of kidney functional volume, the volumetric nephrogram (VN) was recorded. Systematic evaluation of the relationship of kidney volume and VN to CKD and ASG was undertaken using linear regression and receiver-operator statistical tools. A total of 386 cases with patient and anatomic data were identified and graded. Mean age was 72.9 ± 0.4 years. Renal volume renal volume (AUC = .628; P ≤ .0001) and VN (AUC = .628; P ≤ .0001). Regression analysis demonstrated a strong, inverse relationship between ASG and VN ( R 2 = .95). These data demonstrate that VN is a strong predictor of CKD in a large database of patients undergoing elective aneurysm repair. We demonstrate an inverse relationship between renal function and ASG that has not been previously described in the literature. Additionally, we have shown that VN complements ASG as a model of overall cardiovascular health and atherosclerotic burden. Outcomes in patients with poor renal function may be related to anatomical issues in addition to well-described systemic ramifications.

  5. High electron mobility through the edge states in random networks of c-axis oriented wedge-shaped GaN nanowalls grown by molecular beam epitaxy

    International Nuclear Information System (INIS)

    Bhasker, H. P.; Dhar, S.; Sain, A.; Kesaria, Manoj; Shivaprasad, S. M.

    2012-01-01

    Transport and optical properties of random networks of c-axis oriented wedge-shaped GaN nanowalls grown spontaneously on c-plane sapphire substrates through molecular beam epitaxy are investigated. Our study suggests a one dimensional confinement of carriers at the top edges of these connected nanowalls, which results in a blue shift of the band edge luminescence, a reduction of the exciton-phonon coupling, and an enhancement of the exciton binding energy. Not only that, the yellow luminescence in these samples is found to be completely suppressed even at room temperature. All these changes are highly desirable for the enhancement of the luminescence efficiency of the material. More interestingly, the electron mobility through the network is found to be significantly higher than that is typically observed for GaN epitaxial films. This dramatic improvement is attributed to the transport of electrons through the edge states formed at the top edges of the nanowalls.

  6. Transport and optical properties of c-axis oriented wedge shaped GaN nanowall network grown by molecular beam epitaxy

    Energy Technology Data Exchange (ETDEWEB)

    Bhasker, H. P.; Dhar, S. [Department of Physics, Indian Institute of Technology Bombay, Powai, Mumbai, Maharashtra-400076 (India); Thakur, Varun; Kesaria, Manoj; Shivaprasad, S. M. [Jawaharlal Nehru Centre for Advanced Scientific Research (JNCASR) Bangalore- 560064 (India)

    2014-02-21

    The transport and optical properties of wedge-shaped nanowall network of GaN grown spontaneously on cplane sapphire substrate by Plasma-Assisted Molecular Beam Epitaxy (PAMBE) show interesting behavior. The electron mobility at room temperature in these samples is found to be orders of magnitude higher than that of a continuous film. Our study reveals a strong correlation between the mobility and the band gap in these nanowall network samples. However, it is seen that when the thickness of the tips of the walls increases to an extent such that more than 70% of the film area is covered, it behaves close to a flat sample. In the sample with lower surface coverage (≈40% and ≈60%), it was observed that the conductivity, mobility as well as the band gap increase with the decrease in the average tip width of the walls. Photoluminescence (PL) experiments show a strong and broad band edge emission with a large (as high as ≈ 90 meV) blue shift, compared to that of a continuous film, suggesting a confinement of carriers on the top edges of the nanowalls. The PL peak width remains wide at all temperatures suggesting the existence of a high density of tail states at the band edge, which is further supported by the photoconductivity result. The high conductivity and mobility observed in these samples is believed to be due to a “dissipation less” transport of carriers, which are localized at the top edges (edge states) of the nanowalls.

  7. Technical note: A new wedge-shaped ionization chamber component module for BEAMnrc to model the integral quality monitoring system®

    Science.gov (United States)

    Oderinde, Oluwaseyi Michael; du Plessis, FCP

    2017-12-01

    The purpose of this study was to develop a new component module (CM) namely IQM to accurately model the integral quality monitoring (IQM) system® to be used in the BEAMnrc Monte Carlo (MC) code. The IQM is essentially a double wedge ionization chamber with the central electrode plate bisecting the wedge. The IQM CM allows the user to characterize the double wedge of this ionization chamber and BEAMnrc can then accurately calculate the dose in this CM including its enclosed air regions. This has been verified against measured data. The newly created CM was added into the standard BEAMnrc CMs, and it will be made available through the NRCC website. The BEAMnrc graphical user interface (GUI) and particle ray-tracing techniques were used to validate the IQM geometry. In subsequent MC simulations, the dose scored in the IQM was verified against measured data over a range of square fields ranging from 1 × 1-30 × 30 cm2. The IQM system is designed for the present day need for a device that could verify beam output in real-time during treatment. This CM is authentic, and it can serve as a basis for researchers that have an interest in real-time beam delivery checking using wedge-shaped ionization chamber based instruments like the IQM.

  8. Transport and optical properties of c-axis oriented wedge shaped GaN nanowall network grown by molecular beam epitaxy

    International Nuclear Information System (INIS)

    Bhasker, H. P.; Dhar, S.; Thakur, Varun; Kesaria, Manoj; Shivaprasad, S. M.

    2014-01-01

    The transport and optical properties of wedge-shaped nanowall network of GaN grown spontaneously on cplane sapphire substrate by Plasma-Assisted Molecular Beam Epitaxy (PAMBE) show interesting behavior. The electron mobility at room temperature in these samples is found to be orders of magnitude higher than that of a continuous film. Our study reveals a strong correlation between the mobility and the band gap in these nanowall network samples. However, it is seen that when the thickness of the tips of the walls increases to an extent such that more than 70% of the film area is covered, it behaves close to a flat sample. In the sample with lower surface coverage (≈40% and ≈60%), it was observed that the conductivity, mobility as well as the band gap increase with the decrease in the average tip width of the walls. Photoluminescence (PL) experiments show a strong and broad band edge emission with a large (as high as ≈ 90 meV) blue shift, compared to that of a continuous film, suggesting a confinement of carriers on the top edges of the nanowalls. The PL peak width remains wide at all temperatures suggesting the existence of a high density of tail states at the band edge, which is further supported by the photoconductivity result. The high conductivity and mobility observed in these samples is believed to be due to a “dissipation less” transport of carriers, which are localized at the top edges (edge states) of the nanowalls

  9. Striated nephrogram as an incidental finding in MRI examination of children; Streifiges Nephrogramm als Zufallsbefund nach Kontrastmittelgabe bei Kindern in der MRT

    Energy Technology Data Exchange (ETDEWEB)

    Strocka, S.; Sorge, I.; Ritter, L.; Hirsch, F.W. [Leipzig Univ. (Germany). Dept. of Pediatric Radiology

    2016-01-15

    A highly striated contrast pattern of the kidneys occasionally appears in abdominal MRI examinations of children following the administration of gadolinium. As this phenomenon is well known but has not yet been explicitly described in literature, we investigated how frequently and in which clinical context this occurred. 855 abdominal MRI examinations with contrast media of 362 children between 2006 and 2014 were analysed retrospectively. A striated renal parenchyma was found in a total of nine children and eleven examinations (1.3 % of examinations) and did only occur at a field strength of 3 Tesla. Of these children, seven had previously had tumors and chemotherapy. In two children there was no evidence of a previously serious condition with medications or a kidney disease. All of them had a normal renal function. A noticeably striated nephrogram in the later phase of an MRI examination following administration of gadolinium may appear as an incidental finding in examinations at 3 Tesla without pathological relevance.

  10. 脉冲 Er:YAG 激光与常规涡轮高速车针治疗楔状缺损的效果比较%The Effect Comparasion between the Pulse Er:YAG Laser and the Conventional Turbine High-speed Dental Bur to the Remedy of Teeth Wedge-shaped Defect

    Institute of Scientific and Technical Information of China (English)

    范伟; 贺慧霞

    2015-01-01

    目的:比较Er:YAG激光与常规涡轮机高速车针治疗楔状缺损的效果。方法收集我院口腔科就诊的、双侧多个同名牙楔状缺损患者85例382颗牙,随机分为激光组和涡轮机组各191牙,其中每位患者每侧至少2颗牙采用激光表面预备,对侧高速涡轮机预备,脉冲照射采用激光剂量为300 mJ,20 Hz间歇操作。涡轮机组采用高速车针制备固位型,自体对照,两组均预备后光固化树脂黏充填。比较两组治疗后1周、1个月、6个月、12个月术后充填物保存率、边缘着色、继发龋等指标,评价其临床治疗效果。结果两组术中疼痛牙齿发生率激光组(16.7%)显著少于涡轮机组(74.8%),差异有统计学意义(P<0.05);术后1周、1个月激光组分别有35牙和12牙出现冷热刺激痛,而涡轮机组发生刺激痛分别为83牙和44牙,两者差异有统计学意义( P<0.05);术后6个月和12个月修复体保存率激光组显著高于涡轮机组,差异有统计学意义( P<0.05);但边缘适合性、边缘着色和继发龋发生率两组差异无统计学意义。结论激光组较涡轮机组在楔状缺损治疗中疼痛发生率低、治疗后疼痛反应轻;修复体保存率高。300 mJ,20 Hz的Er:YAG激光治疗楔状缺损具有无痛、安全、高效的优点。%Objective To compare the effects of Er: YAG laser and conventional high-speed burr in treatment of wedge-shaped tooth defects and to evaluate its applicability and reliability .Methods 382 bilateral multiple teeth with wedge-shaped defects in 85 patients were randomly divided into two groups with 191 teeth in each:laser group and the turbine burr group .At least two teeth of one side in all patients were irradiated by pulsed Er:YAG laser with doses of 300 mj, 20 Hz.Meanwhile, the caries cavities on the contralateral were prepared by high-speed burr .Then the prepared caries defects in both

  11. Spatial Resolution of a Wedge Shaped MSGC Module

    CERN Document Server

    Bachmann, Sebastian

    1997-01-01

    A banana shaped closed design MSGC detector module was tested together with silicon detectors and other MSGCs in a 100 GeV muon beam. Despite of an undesirable geometry of the test setup, a spatial resolution below 40 micron m was reached. The efficiency of the module, defined by track reconstruction, shows to be 95,6 percent

  12. CT findings of renal abscess

    International Nuclear Information System (INIS)

    Lee, Myung Jun; Kim, Mi Young; Woo, Jung Ju; Kim, Ho Kyun; Kim, Won Hong; Jeon, Jeong Dong; Jeon, Woo Ki; Han, Chang Yul

    1996-01-01

    The purpose of this study is to determine characteristic CT findings in renal abscess. Twenty cases of renal abscess were retrospectively analyzed for CT findings relating to the shape and extent of the abscess, change of nephrogram, peripheral rim enhancement, wedge-shaped enhancement on delayed scans, enlargement of the kidney involved and associated findings. Seven patients had a renal abscess at the right kidney, nine at the lift kidney and two bilaterally. The abscesses were round in 18 cases and finger-like in two. Rim enhancement around renal abscess was seen in four cases (20%). Changes in the nephrogram around the abscess were seen in 12 cases (60%). In all six patients who had undergone delayed postcontrast scans, wedge-shaped enhancement was shown around the abscess (100%). In the observation of the extent of renal abscesses, 14 cases were within the kidney, six cases extended the beyond renal capsule, and two were loculated in the renal fascia itself. Renal enlargement was seen in nine cases (45%). These results suggest that CT findings such as delayed wedge-shaped enhancement, change of nephrogram, peripheral rim enhancement, renal enlargement, and associated findings are valuable for diagnosis, and that CT also gives information concerning the extent, evolution and complication of a renal abscess

  13. Shock Initiation of Wedge-shaped Explosive Measured with Smear Camera and Photon Doppler Velocimetry

    Science.gov (United States)

    Gu, Yan

    2017-06-01

    Triaminotrinitrobenzene (TATB) is an important insensitive high explosive in conventional weapons due to its safety and high energy. In order to have an insight into the shock initiation performance of a TATB-based insensitive high explosive (IHE), experimental measurements of the particle velocity histories of the TATB-based Explosive using Photon Doppler Velocimetry and shock wave profile of the TATB-based explosive using High Speed Rotating Mirror Smear Camera had been performed. In this paper, we would describe the shock initiation performance of the TATB-based explosive by run-to-detonation distance and the particle velocity history at an initialization shock of about 7.9 GPa. The parameters of hugoniot of unreacted the TATB-based explosive and Pop relationship could be derived with the particle velocity history obtained in this paper.

  14. Bulk vs wedge shape layering techniques in V class cavities: marginal infiltration evaluation

    Directory of Open Access Journals (Sweden)

    Lo Giudice Roberto

    2017-11-01

    Conclusion: Considering the limitation related to the technique used for the infiltration analysis in small V class cavities, the infiltration score is not influenced by the different stratification techniques.

  15. EDGE DETECTION OF THE SCOLIOTIC VERTEBRAE USING X-RAY IMAGES

    Directory of Open Access Journals (Sweden)

    P. MOHANKUMAR

    2016-02-01

    Full Text Available Bones act as a mineral storage reservoir for calcium and phosphorus. Proper well grown bones give a perfect posture to the human body. In other case, if the bone has an improper growth, it might lead to an abnormal posture or an awkward posture. Scoliosis is a condition where the scoliotic vertebrae are wedge shaped and differ with the shape of normal vertebrae. Treatment for scoliosis depends on Cobb angle which can be measured using spine X-rays. Recent development in the medical imaging techniques brought us to a new research area in image processing which includes medical image enhancement, detailed visualization of internal organs & tissues and edge detection. Bone edges are important feature in an X-ray image. The purpose of application of segmentation in medical imaging is to develop a detailed framework on human anatomy, whose primary objective is to outline the anatomical structures. Whereas edge detection is a technique which extracts vital features like corners, lines, angles and curves from an image. In this study, we are going to deal with the edge detection technique on scoliotic vertebrae. The objective of this paper is to compare the performance of edge detectors using filters and operators.

  16. Analysis of Ventilation Regimes of the Oblique Wedge-Shaped Surface Piercing Hydrofoil During Initial Water Entry Process

    Directory of Open Access Journals (Sweden)

    Ghadimi Parviz

    2018-03-01

    Full Text Available The suction side of a surface piercing hydrofoil, as a section of a Surface Piercing Propeller (SPP, is usually exposed to three phases of flow consisting air, water, and vapour. Hence, ventilation and cavitation pattern of such section during the initial phase of water entry plays an essential role for the propeller’s operational curves. Accordingly, in the current paper a numerical simulation of a simple surface piercing hydrofoil in the form of an oblique wedge is conducted in three-phase environment by using the coupled URANS and VOF equations. The obtained results are validated against water entry experiments and super-cavitation tunnel test data. The resulting pressure curves and free surface profiles of the wedge water entry are presented for different velocity ratios ranging from 0.12 to 0.64. Non-dimensional forces and efficiency relations are defined in order to present the wedge water entry characteristics. Congruent patterns are observed between the performance curves of the propeller and the wedge in different fully ventilated or partially cavitated operation modes. The transition trend from fully ventilated to partially cavitated operation of the surface piercing section of a SPP is studied and analyzed through wedge’s performance during the transitional period.

  17. Evaluation of wedge-shaped phantoms for assessment of scanner display as a part of quality control of scanner performance

    International Nuclear Information System (INIS)

    Bergmann, H.; Havlik, E.

    1981-01-01

    Image manipulation in modern rectilinear scanners comprises background subtraction and contrast enhancement facilities. It has been the aim of this investigation to develop simple quality assurance methods suitable for checking the function of these features on a routine basis. Several types of phantoms have been investigated: an absorption step wedge, an emission step wedge and an emission continuous wedge. The absorption step wedge when used with a usual gamma-camera checking source gave the least satisfactory results. The emission step wedge is best suited for test procedures for background subtraction of the colour printer display and for contrast enhancement of the photo display, whereas the emission continuous wedge gave best results in testing the contrast enhancement of the colour printer display. An evaluation of the relative merits of the phantoms indicates that the emission step wedge is best suited for quality assurance tests. (author)

  18. Interference of wedge-shaped protrusions on the faces of a Griffith crack in biaxial stress. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Boulet, J.A.M. [Tennessee Univ., Knoxville, TN (United States)

    1992-04-01

    An initial investigation of the influence of protrusion interference on the fracture toughness required to prevent unstable propagation of a Griffith crack in a brittle material is described. The interference is caused by relative shear displacement of the crack faces when subjected to remote biaxial stress with neither principal stress parallel to the crack. It is shown that for room temperature cracks smaller than about one centimeter in silicon carbide, or about one millimeter in silicon nitride, the presence of interference changes the fracture stress. A mathematical model based on linear elasticity solutions and including multiple interference sites at arbitrarily specified positions on the crack is presented. Computations of the change in required fracture toughness and its dependence on wedge geometry (size and vertex angle), applied stresses (orientation and magnitude), and location of the interference site are discussed. Results indicate that a single interference site has only a slight effect on required toughness. However, the influence of interference increases monotonically with the number of interference sites. The two-dimensional model described herein is not accurate when the interference sites are closely spaced.

  19. Wedge-Shaped GaN Nanowalls: A Potential Candidate for Two-Dimensional Electronics and Spintronics

    Science.gov (United States)

    Deb, Swarup; Dhar, Subhabrata

    Schrödingerand Poisson equations are solved self-consistently in order to obtain the potential and charge density distribution in n-type GaN nanowalls tapered along c-axis by different angles. The study shows two-dimensional (2D) quantum confinement of electrons in the central vertical plane of the wall for the entire range of tapering. Calculation of room temperature electron mobility in the 2D channel shows a steady decrease with the increase of the inclination angle of the side facets with respect to the base. However, it is interesting to note that the mobility remains to be much larger than that of bulk GaN even for the inclination angle of 65∘. The properties of high mobility and the vertical orientation of the 2DEG plane in this system can be exploited in fabricating highly conducting transparent interconnects and field effect transistors, which can lead to large scale integration of 2D devices in future.

  20. Lung perfusion analysis with dual energy CT in patients with suspected pulmonary embolism—Influence of window settings on the diagnosis of underlying pathologies of perfusion defects

    International Nuclear Information System (INIS)

    Bauer, Ralf W.; Kerl, J. Matthias; Weber, Eva; Weisser, Philipp; Korkusuz, Huedayi; Lehnert, Thomas; Jacobi, Volkmar; Vogl, Thomas J.

    2011-01-01

    Purpose: On lung perfusion analysis with dual energy CT (DECT) in patients with suspected pulmonary embolism (PE) commonly three patterns of perfusion defects (PD) are observed: wedge-shaped, circumscribed but not wedge-shaped, and patchy. We investigated the influence of different window settings on the identification of the underlying pathologies for these types of PD. Materials and methods: 3724 segments in 196 consecutive patients who underwent pulmonary DECT angiography for clinically suspected acute PE were analyzed. Iodine distribution in the lung parenchyma was calculated from the dual energy data and displayed as color map in axial, sagittal and coronal view. Afterwards, lung and angiography window were applied separately and assessed for pulmonary embolism and pathologies of the lung parenchyma. Results: 1420 segments in 141 patients showed PD, of which 276 were wedge-shaped, 287 circumscribed and 857 patchy. Circumscribed PD were associated in 99% with interstitial or alveolar fluid collections and in 1% with located bullae. Patchy PD were associated in 65% with emphysematous or fibrotic changes, in 38% with diffuse infiltrations or interstitial fluid collections and in 0.2% with PE. The underlying pathologies for wedge-shaped PD were in 78% PE, in 3% tumors compressing pulmonary arteries, in another 3% located bullae and in further 3% infiltrations. 13% (n = 15) of the segments in this group did not show vascular or parenchymal pathologies, but in 80% (n = 10) of these cases patients had PE in another segment. Totally n = 6 of wedge-shaped PD in 5 patients remained with unclear direct cause. Conclusion: Whereas patchy and circumscribed PD are almost exclusively associated with pathologies of the lung parenchyma, wedge-shaped PD are mostly associated with PE. For a small number of wedge-shaped PD the underlying cause cannot be detected with DECT. Very small peripherally situated micro-emboli may be discussed as a reason. However, prospective trials are

  1. True Detective

    OpenAIRE

    Gajhede, Andreas; Westmark, [No Value; Bantoulidis, Georgios

    2016-01-01

    This paper examines the HBO’s television-series True Detective, a 2014 crime drama, attempting to point out the central elements of detective-fiction, to be found in its narrative. True Detective narrative is a heavy text with a number of references from various well-known, non-adjacent texts within the field of weird fiction, horror fiction and detective fiction. Therefore, the case study of this research will focus on narratological and literary analysis, in order to discover the predominan...

  2. Optimizing detectability

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    HPLC is useful for trace and ultratrace analyses of a variety of compounds. For most applications, HPLC is useful for determinations in the nanogram-to-microgram range; however, detection limits of a picogram or less have been demonstrated in certain cases. These determinations require state-of-the-art capability; several examples of such determinations are provided in this chapter. As mentioned before, to detect and/or analyze low quantities of a given analyte at submicrogram or ultratrace levels, it is necessary to optimize the whole separation system, including the quantity and type of sample, sample preparation, HPLC equipment, chromatographic conditions (including column), choice of detector, and quantitation techniques. A limited discussion is provided here for optimization based on theoretical considerations, chromatographic conditions, detector selection, and miscellaneous approaches to detectability optimization. 59 refs

  3. Detection block

    International Nuclear Information System (INIS)

    Bezak, A.

    1987-01-01

    A diagram is given of a detection block used for monitoring burnup of nuclear reactor fuel. A shielding block is an important part of the detection block. It stabilizes the fuel assembly in the fixing hole in front of a collimator where a suitable gamma beam is defined for gamma spectrometry determination of fuel burnup. The detector case and a neutron source case are placed on opposite sides of the fixing hole. For neutron measurement for which the water in the tank is used as a moderator, the neutron detector-fuel assembly configuration is selected such that neutrons from spontaneous fission and neutrons induced with the neutron source can both be measured. The patented design of the detection block permits longitudinal travel and rotation of the fuel assembly to any position, and thus more reliable determination of nuclear fuel burnup. (E.S.). 1 fig

  4. Detection device

    Science.gov (United States)

    Smith, J.E.

    1981-02-27

    The present invention is directed to a detection device comprising: (1) an entrance chamber; (2) a central chamber; and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

  5. Animal Detectives

    Science.gov (United States)

    Mulvey, Bridget; Warnock, Carly

    2015-01-01

    During a two-week inquiry-based 5E learning cycle unit, children made observations and inferences to guide their explorations of animal traits and habitats (Bybee 2014). The children became "animal detectives" by studying a live-feed webcam and digital images of wolves in their natural habitat, reading books and online sources about…

  6. Malware Detection

    CERN Document Server

    Christodorescu, Mihai; Maughan, Douglas

    2007-01-01

    Shared resources, such as the internet, have created a highly interconnected cyber-infrastructure. Many malicious attacks on critical infrastructures are achieved by malicious code or malware, such as viruses and worms. This book captures the research in the area of malicious code detection, prevention and mitigation.

  7. Particle detection

    International Nuclear Information System (INIS)

    Charpak, G.

    2000-01-01

    In this article G.Charpak presents the principles on which particle detection is based. Particle accelerators are becoming more and more powerful and require new detectors able to track the right particle in a huge flux of particles. The gigantic size of detectors in high energy physics is often due to the necessity of getting a long enough trajectory in a magnetic field in order to deduce from the curvature an accurate account of impulses in the reaction. (A.C.)

  8. Entanglement detection

    Energy Technology Data Exchange (ETDEWEB)

    Guehne, Otfried [Institut fuer Quantenoptik und Quanteninformation, Osterreichische Akademie der Wissenschaften, Technikerstrasse 21A, A-6020 Innsbruck (Austria); Institut fuer theoretische Physik, Universitaet Innsbruck, Technikerstrasse 25, A-6020 Innsbruck (Austria)], E-mail: otfried.guehne@uibk.ac.at; Toth, Geza [Department of Theoretical Physics, University of the Basque Country, P.O. Box 644, E-48080 Bilbao (Spain); Ikerbasque-Basque Foundation for Science, Alameda Urquijo 36, E-48011 Bilbao (Spain); ICFO-Institute of Photonic Sciences, Mediterranean Technology Park, E-08860 Castelldefels (Barcelona) (Spain); Research Institute for Solid State Physics and Optics, Hungarian Academy of Sciences, P.O. Box 49, H-1525 Budapest (Hungary)

    2009-04-15

    How can one prove that a given quantum state is entangled? In this paper we review different methods that have been proposed for entanglement detection. We first explain the basic elements of entanglement theory for two or more particles and then entanglement verification procedures such as Bell inequalities, entanglement witnesses, the determination of nonlinear properties of a quantum state via measurements on several copies, and spin squeezing inequalities. An emphasis is given to the theory and application of entanglement witnesses. We also discuss several experiments, where some of the presented methods have been implemented.

  9. Edge Detection,

    Science.gov (United States)

    1985-09-01

    PROJECT. T ASK0 Artificial Inteligence Laboratory AREA It WORK UNIT NUMBERS V 545 Technology Square ( Cambridge, HA 02139 I I* CONTOOL1LIN@4OFFICE NAME...ARD-A1t62 62 EDGE DETECTION(U) NASSACNUSETTS INST OF TECH CAMBRIDGE 1/1 ARTIFICIAL INTELLIGENCE LAB E C HILDRETH SEP 85 AI-M-8 N99SI4-8S-C-6595...used to carry out this analysis. cce~iO a N) ’.~" D LI’BL. P p ------------ Sj. t i MASSACHUSETTS INSTITUTE OF TECHNOLOGY i ARTIFICIAL INTELLIGENCE

  10. Smoke detection

    Energy Technology Data Exchange (ETDEWEB)

    Warmack, Robert J. Bruce; Wolf, Dennis A.; Frank, Steven Shane

    2017-10-17

    Various apparatus and methods for smoke detection are disclosed. In one embodiment, a method of training a classifier for a smoke detector comprises inputting sensor data from a plurality of tests into a processor. The sensor data is processed to generate derived signal data corresponding to the test data for respective tests. The derived signal data is assigned into categories comprising at least one fire group and at least one non-fire group. Linear discriminant analysis (LDA) training is performed by the processor. The derived signal data and the assigned categories for the derived signal data are inputs to the LDA training. The output of the LDA training is stored in a computer readable medium, such as in a smoke detector that uses LDA to determine, based on the training, whether present conditions indicate the existence of a fire.

  11. Signal detection

    International Nuclear Information System (INIS)

    Tholomier, M.

    1985-01-01

    In a scanning electron microscope, whatever is the measured signal, the same set is found: incident beam, sample, signal detection, signal amplification. The resulting signal is used to control the spot luminosity with the observer cathodoscope. This is synchronized with the beam scanning on the sample; on the cathodoscope, the image in secondary electrons, backscattered electrons,... of the sample surface is reconstituted. The best compromise must be found between a register time low enough to remove eventual variations (under the incident beam) of the nature of the observed phenomenon, and a good spatial resolution of the image and a signal-to-noise ratio high enough. The noise is one of the basic limitations of the scanning electron microscope performance. The whose measurement line must be optimized to reduce it [fr

  12. Remote detection device and detection method therefor

    International Nuclear Information System (INIS)

    Kogure, Sumio; Yoshida, Yoji; Matsuo, Takashiro; Takehara, Hidetoshi; Kojima, Shinsaku.

    1997-01-01

    The present invention provides a non-destructive detection device for collectively, efficiently and effectively conducting maintenance and detection for confirming the integrity of a nuclear reactor by way of a shielding member for shielding radiation rays generated from an objective portion to be detected. Namely, devices for direct visual detection using an under water TV camera as a sensor, an eddy current detection using a coil as a sensor and each magnetic powder flow detection are integrated and applied collectively. Specifically, the visual detection by using the TV camera and the eddy current flaw detection are adopted together. The flaw detection with magnetic powder is applied as a means for confirming the results of the two kinds of detections by other method. With such procedures, detection techniques using respective specific theories are combined thereby enabling to enhance the accuracy for the evaluation of the detection. (I.S.)

  13. Contraband detection

    International Nuclear Information System (INIS)

    Gozzani, T.

    1995-01-01

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container

  14. Contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Gozzani, T. [Science Applications International Corporation, Santa Clara (United States)

    1995-07-15

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container.

  15. Space Detectives

    Science.gov (United States)

    Tyszka, Steph; Saraiva, Jose; Doran, Rosa

    2017-04-01

    NUCLIO is a Portuguese non-profit organization with a strong record of investing in science education and outreach. We have developed and implemented many activities mostly directed to a young audience, in a bid to awaken and reinforce the interest that young people devote to Astronomy and all things spatial. In this framework, we have created a week-long program called Space Detectives, supported by the Municipality of Cascais, based on a story-line that provided a number of challenges and opportunities for learning matters as diverse as the electro-magnetic spectrum, means of communication, space travel, the martian environment, coding and robotics. We report on the first session that took place in December 2016. We had as participants several kids aged 9 to 12, with a mixed background in terms of interest in the sciences. Their response varied from enthusiastic to somewhat less interested, depending on the nature of the subject and the way it was presented - a reaction not necessarily related to its complexity. This week was taken as something of a trial run, in preparation for the European Commission- funded project "Stories of Tomorrow", to be implemented in schools. The individual activities and the way they were related to the story-line, as well as the smooth transition from one to the next, were subject to an analysis that will allow for improvements in the next installments of this program. We believe this is an excellent approach to the goals of using Space and Astronomy as an anchor for generating and keeping interest in the scientific areas, and of finding new and richer ways of learning.

  16. Detection of Terahertz Radiation

    DEFF Research Database (Denmark)

    2015-01-01

    The present invention relates to a system for detecting terahertz radiation, a camera device, and a method for detecting terahertz radiation.......The present invention relates to a system for detecting terahertz radiation, a camera device, and a method for detecting terahertz radiation....

  17. Portable modular detection system

    Science.gov (United States)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  18. Outlier detection using autoencoders

    CERN Document Server

    Lyudchik, Olga

    2016-01-01

    Outlier detection is a crucial part of any data analysis applications. The goal of outlier detection is to separate a core of regular observations from some polluting ones, called “outliers”. We propose an outlier detection method using deep autoencoder. In our research the invented method was applied to detect outlier points in the MNIST dataset of handwriting digits. The experimental results show that the proposed method has a potential to be used for anomaly detection.

  19. Revolution in Detection Affairs

    Energy Technology Data Exchange (ETDEWEB)

    Stern W.

    2013-11-02

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

  20. Lighting detectives forum

    DEFF Research Database (Denmark)

    Bülow, Katja; Skindbjerg Kristensen, Lisbeth

    2003-01-01

    Belysning for boligområder var emnet for lighting detectives forum, der blev afholdt i Stockholm i august 2003.......Belysning for boligområder var emnet for lighting detectives forum, der blev afholdt i Stockholm i august 2003....

  1. Unobtrusive Deception Detection

    NARCIS (Netherlands)

    Elkins, Aaron; Zafeiriou, Stefanos; Pantic, Maja; Burgoon, Judee; Calvo, Rafael; D' Mello, Sidney; Gratch, Jonathan; Kappas, Arvid

    In response to national security needs and human deception detection limitations paired with advances in sensor and computing technology research into automated deception detection has increased in recent years. These technologies rely on psychological and communication theories of deception to

  2. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  3. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  4. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  5. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  6. Autonomous Forest Fire Detection

    NARCIS (Netherlands)

    Breejen, E. den; Breuers, M.; Cremer, F.; Kemp, R.A.W.; Roos, M.; Schutte, K.; Vries, J.S. de

    1998-01-01

    Forest fire detection is a very important issue in the pre-suppression process. Timely detection allows the suppression units to reach the fire in its initial stages and this will reduce the suppression costs considerably. The autonomous forest fire detection principle is based on temporal contrast

  7. Sodium outleakage detection

    International Nuclear Information System (INIS)

    Casselman, C.

    1979-01-01

    Effective detection of outleakage from sodium facilities permits timely intervention capable of limiting the consequences of such leakage. Two types of detection systems are described: local and overall detection. The use of two independent systems in sodium facilities is recommended. (author)

  8. Enzyme detection by microfluidics

    DEFF Research Database (Denmark)

    2013-01-01

    Microfluidic-implemented methods of detecting an enzyme, in particular a DNA-modifying enzyme, are provided, as well as methods for detecting a cell, or a microorganism expressing said enzyme. The enzyme is detected by providing a nucleic acid substrate, which is specifically targeted...... by that enzyme...

  9. Aerial Radiation Detection

    International Nuclear Information System (INIS)

    Quam, W. M.

    1999-01-01

    An airborne system designed for the detection of radioactive sources on the soil surface from an aircraft normally senses gamma rays emitted by the source. Gamma rays have the longest path length (least attenuation) through the air of any of the common radioactive emissions and will thus permit source detection at large distances. A secondary benefit from gamma rays detection if that nearly all radioactive isotopes can be identified by the spectrum of gammas emitted. Major gaseous emissions from fuel processing plants emit gammas that may be detected and identified. Some types of special nuclear material also emit neutrons which are also useful for detection at a distance

  10. Intravenous digital subtraction angiography of transplanted kidney artery

    International Nuclear Information System (INIS)

    Tessier, J.P; Teyssou, H.; Verdier, J.P.; Tison, E.; Meyblum, J.; Marchal, M.

    1986-01-01

    Results of 351 intravenous digital subtraction angiographs (AN) of transplanted kidneys emphasized reliability of this examination for detection of renal artery stenosis. A prospective study of 219 patients (188 interpretable AN) showed significant stenosis of grafted artery in 22% of cases: 17% of the 126 patients with normal blood pressure and 34% of the 62 cases of hypertension. Digital subtraction allows, with a single injection, assessment of renal artery, nephrogram and excretory cavities, but it is not a substitute for conventional intravenous urography 1 to 2 months after grafting [fr

  11. Acoustic leak detection and ultrasonic crack detection

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.; Groenwald, R.

    1983-10-01

    A program is under way to assess the effectiveness of current and proposed techniques for acoustic leak detection (ALD) in reactor coolant systems. An ALD facility has been constructed and tests have begun on five laboratory-grown cracks (three fatigue and two thermal-fatigue and two field-induced IGSCC specimens. After ultrasonic testing revealed cracks in the Georgia Power Co. HATCH-1 BWR recirculation header, the utility installed an ALD system. Data from HATCH-1 have given an indication of the background noise level at a BWR recirculation header sweepolet weld. The HATCH leak detection system was tested to determine the sensitivity and dynamic range. Other background data have been acquired at the Watts Bar Nuclear Reactor in Tennessee. An ANL waveguide system, including transducer and electronics, was installed and tested on an accumulator safety injection pipe. The possibility of using ultrasonic wave scattering patterns to discriminate between IGSCCs and geometric reflectors has been explored. Thirteen reflectors (field IGSCCs, graphite wool IGSCCs, weld roots, and slits) were examined. Work with cast stainless steel (SS) included sound velocity and attenuation in isotropic and anisotropic cast SS. Reducing anisotropy does not help reduce attenuation in large-grained material. Large artificial flaws (e.g., a 1-cm-deep notch with a 4-cm path) could not be detected in isotropic centrifugally cast SS (1 to 2-mm grains) by longitudinal or shear waves at frequencies of 1 MHz or greater, but could be detected with 0.5-MHz shear waves. 13 figures

  12. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  13. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going...... to discuss issues in detection which is followed by an auditory object recognition exercise. The results of the exercise and its relation to issues in the information processing pipleline is also discussed....

  14. Fuel failure detection device

    International Nuclear Information System (INIS)

    Katagiri, Masaki.

    1979-01-01

    Purpose: To improve the SN ratio in the detection. Constitution: Improved precipitator method is provided. Scintillation detectors of a same function are provided respectively by each one before and after a gas reservoir for depositing fission products in the cover gas to detecting wires. The outputs from the two detectors (output from the wire not deposited with the fission products and the output from the wire after deposition) are compared to eliminate background noises resulted from not-decayed nucleides. A subtraction circuit is provided for the elimination. Since the background noises of the detecting wire can thus be measured and corrected on every detection, the SN ratio can be increased. (Ikeda, J.)

  15. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  16. Detection of ionized foods

    International Nuclear Information System (INIS)

    Beerens, H.

    1986-01-01

    Irradiated foods and feed might be identified with two kinds of tests: 1. biochemical: detection of specific products are not yet available 2. microbiological: when a microbial species dissapears from a sample of food i.e. it is not detectable after enrichment (for instance Coliforms in hamburgers) it is likely that the sample has been ionized [fr

  17. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  18. Fraud detection tools

    Directory of Open Access Journals (Sweden)

    Katerina Hawlova

    2013-10-01

    Full Text Available This article aims to introduce to readers the topic of fraud management – detection of fraudulent behaviour. The article is divided into two parts. The first part presents what is meant by fraud and fraudulent behaviour. In the second part a case study dealing with fraudulent behaviour detection in the procurement area is introduced.

  19. Science detects the forgeries

    International Nuclear Information System (INIS)

    Fleming, S.

    1975-01-01

    The range of laboratory authentication techniques now available for the detection of art fakes is reviewed. In particular the use of neutron activation analysis, x-ray fluorescence analysis and lead isotope analysis, are considered. The underlying principles of these three methods are explained and examples of their use in detecting forgeries of paintings, coins, bronzes etc. are given. (U.K.)

  20. Supernova neutrino detection

    International Nuclear Information System (INIS)

    Selvi, M.

    2005-01-01

    Neutrinos emitted during a supernova core collapse represent a unique feature to study both stellar and neutrino properties. After discussing the details of the neutrino emission in the star and the effect of neutrino oscillations on the expected neutrino fluxes at Earth, a review of the detection techniques is presented in this paper, with particular attention to the problem of electron neutrino detection

  1. Detecting Illicit Nuclear Materials

    International Nuclear Information System (INIS)

    Kouzes, Richard T.

    2005-01-01

    The threat that weapons of mass destruction might enter the United States has led to a number of efforts for the detection and interdiction of nuclear, radiological, chemical, and biological weapons at our borders. There have been multiple deployments of instrumentation to detect radiation signatures to interdict radiological material, including weapons and weapons material worldwide

  2. Water level detection pipeline

    International Nuclear Information System (INIS)

    Koshikawa, Yukinobu; Imanishi, Masatoshi; Niizato, Masaru; Takagi, Masahiro

    1998-01-01

    In the present invention, water levels of a feedwater heater and a drain tank in a nuclear power plant are detected at high accuracy. Detection pipeline headers connected to the upper and lower portions of a feedwater heater or a drain tank are connected with each other. The connection line is branched at appropriate two positions and an upper detection pipeline and a lower detection pipeline are connected thereto, and a gauge entrance valve is disposed to each of the detection pipelines. A diaphragm of a pressure difference generator is connected to a flange formed to the end portion. When detecting the change of water level in the feedwater heater or the drain tank as a change of pressure difference, gauge entrance valves on the exit side of the upper and lower detection pipelines are connected by a connection pipe. The gauge entrance valve is closed, a tube is connected to the lower detection pipe to inject water to the diaphragm of the pressure difference generator passing through the connection pipe thereby enabling to calibrate the pressure difference generator. The accuracy of the calibration of instruments is improved and workability thereof upon flange maintenance is also improved. (I.S.)

  3. Failed fuel detection device

    International Nuclear Information System (INIS)

    Sudo, Takayuki.

    1983-01-01

    Purpose: To enable early and sure detection of failed fuels by automatically changing the alarm set value depending on the operation states of a nuclear reactor. Constitution: Gaseous fission products released into coolants are transferred further into cover gases and then introduced through a pipeway to a failed fuel detector. The cover gases introduced from the pipeway to the pipeway or chamber within the detection device are detected by a radiation detector for the radiation dose of the gaseous fission products contained therein. The detected value is converted and amplified as a signal and inputted to a comparator. While on the other hand, a signal corresponding to the reactor power is converted by an alarm setter into a set value and inputted to the comparator. In such a structure, early and sure detection can be made for the fuel failures. (Yoshino, Y.)

  4. Detecting nuclear warheads

    International Nuclear Information System (INIS)

    Fetter, S.; Frolov, V.A.; Prilutsky, O.F.; Rodionov, S.N.; Sagdeev, R.Z.; Miller, M.

    1992-01-01

    To the best of our knowledge, all nuclear weapons contain at least several kilograms of fissile material - material that can sustain a chain reaction. Such material provides the energy for fission explosives such as those that destroyed Hiroshima and Nagasaki; it is also used in the fission trigger modern thermonuclear weapons. The two fissile materials used in US and Soviet warheads are weapon grade uranium (WgU) and weapon-grade plutonium (WgPu). Fissile materials are radioactive; they are very dense and absorb certain radiations very well; and they can be fissioned. This paper reports on the two basic ways to detect fissile material: passive detection of the radiation emitted by its radioactive decay, or active detection involving either radiographing (x-raying) an object with neutrons or high-energy photons and detecting particles emitted by the resulting induced fissions. Passive detection is the preferred technique for verification purposes because of its simplicity and safety

  5. Flaw detection device

    International Nuclear Information System (INIS)

    Sasahara, Toshihiko

    1998-01-01

    The present invention provides a device for detecting welded portions of a reactor pressure vessel. Namely, the device of the present invention comprises (1) a casing to be disposed on the surface to be detected, (2) a probe driving means loaded to the casing, (3) a probe driven along the surface to be detected and (4) a pressure reduction means for keeping the hollow portion in the casing to an evacuated atmosphere. The casing comprises a flexible suction edge to be tightly in contact with the surface to be tested for maintaining the air tight state, (6) a guide wheel for moving the casing along the surface to be tested and (7) a handle for performing transferring operation. The flaw detection device thus constituted has following features. The working efficiency upon conducting detection is improved. The influence of the weight of the device on the detection is small. The device can be applied on the surface of a nonmagnetic material. The efficiency for the flaw detection can be improved. (I.S.)

  6. Pressure detection device

    International Nuclear Information System (INIS)

    Fuji, Akira.

    1997-01-01

    The present invention provides a pressure detection device having a function of preventing discharge of reactor water in pipelines to the outside of a system when a pipeline for detecting pressure to be connected to a reactor is failed. Namely, a fluid pressure detector is disposed at the downstream of the detection pipeline. A cylindrical member having a shrinkable inner diameter is disposed to the outer circumference at the upstream. A cylindrical member having an outer diameter substantially equal to the inner diameter of the detection pipeline is disposed while restricting the movement of the detection pipeline in the inner circumferential direction. Then, it fasten the detection pipeline from the outside upon failure of the pipeline thereby enabling to suppress the flow rate of the fluid in the detection pipeline. In addition, a shape memory alloy which shrinks upon elevation of temperature is used for the cylindrical member. Then, the discharge of the fluid can be prevented automatically upon rupture of the pipeline. (I.S.)

  7. Analogue MIMO Detection

    Directory of Open Access Journals (Sweden)

    McNamara Darren

    2006-01-01

    Full Text Available In this contribution we propose an analogue receiver that can perform turbo detection in MIMO systems. We present the case for a receiver that is built from nonlinear analogue devices, which perform detection in a "free-flow" network (no notion of iterations. This contribution can be viewed as an extension of analogue turbo decoder concepts to include MIMO detection. These first analogue implementations report reductions of few orders of magnitude in the number of required transistors and in consumed energy, and the same order of improvement in processing speed. It is anticipated that such analogue MIMO decoder could bring about the same advantages, when compared to traditional digital implementations.

  8. System Detects Vibrational Instabilities

    Science.gov (United States)

    Bozeman, Richard J., Jr.

    1990-01-01

    Sustained vibrations at two critical frequencies trigger diagnostic response or shutdown. Vibration-analyzing electronic system detects instabilities of combustion in rocket engine. Controls pulse-mode firing of engine and identifies vibrations above threshold amplitude at 5.9 and/or 12kHz. Adapted to other detection and/or control schemes involving simultaneous real-time detection of signals above or below preset amplitudes at two or more specified frequencies. Potential applications include rotating machinery and encoders and decoders in security systems.

  9. Detection of bilingual plagiarism

    Directory of Open Access Journals (Sweden)

    Frank Zamora R.

    2016-06-01

    Full Text Available In this paper a computational algorithm for text alignment in the task of automatically detecting bilingual plagiarism is proposed. The method of detecting bilingual plagiarism uses machine translation services, in order to have the documents in question a base language, and apply techniques of monolingual plagiarism. The algorithm was tested with The corpus belonging to the International Competition Plagiarism 2013, with the objective of evaluating the step of detecting monolingual plagiarism. Besides it’s experimented with the collection of texts EUROPARL, a collection of documents pertaining to the meeting the European Parliament, specifically it´s to English and Spanish documents.

  10. Social Network Change Detection

    National Research Council Canada - National Science Library

    McCulloh, Ian A; Carley, Kathleen M

    2008-01-01

    ... between group members. The ability to systematically, statistically, effectively and efficiently detect these changes has the potential to enable the anticipation of change, provide early warning of change, and enable...

  11. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  12. Tracers Detect Aquifer Contamination

    National Research Council Canada - National Science Library

    Enfield, Carl

    1995-01-01

    The EPA's National Laboratory (NRMRL) at Ada, OK, along with the University of Florida and the University of Texas, have developed a tracer procedure to detect the amount of contamination in aquifer formations...

  13. Anomaly Detection in Sequences

    Data.gov (United States)

    National Aeronautics and Space Administration — We present a set of novel algorithms which we call sequenceMiner, that detect and characterize anomalies in large sets of high-dimensional symbol sequences that...

  14. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    .... Specifically, the report addresses the problem of detecting faces in color images in the presence of various lighting conditions and complex backgrounds as well as recognizing faces under variations...

  15. Sulphur hexafluoride gas detection

    CSIR Research Space (South Africa)

    Stolper, R

    2006-02-01

    Full Text Available This poster describes the development process of an electro-optical based solution for detecting and locating SF6 gas leaks at gas insulated switch gear. The principal technologies that were researched are explained with their advantages...

  16. Scaling up Copy Detection

    OpenAIRE

    Li, Xian; Dong, Xin Luna; Lyons, Kenneth B.; Meng, Weiyi; Srivastava, Divesh

    2015-01-01

    Recent research shows that copying is prevalent for Deep-Web data and considering copying can significantly improve truth finding from conflicting values. However, existing copy detection techniques do not scale for large sizes and numbers of data sources, so truth finding can be slowed down by one to two orders of magnitude compared with the corresponding techniques that do not consider copying. In this paper, we study {\\em how to improve scalability of copy detection on structured data}. Ou...

  17. Sensor for metal detection

    KAUST Repository

    Kodzius, Rimantas

    2014-06-26

    NOVELTY - The sensor has a microfluidic flow channel that is provided with an inlet port, an outlet port, and a detection chamber. The detection chamber is provided with a group of sensing electrodes (4) having a working electrode (8), a counter electrode (9), and a reference electrode (10). A flow sensor is configured to measure flow in the channel. A temperature sensor (6) is configured to measure temperature in the channel (3). An electrical connection is configured to connect the sensor to a sensing device. USE - Sensor for detecting metal such as toxic metal in sample such as clinical sample such as stool, saliva, sputum, bronchial lavage, urine, vaginal swab, nasal swab, biopsy, tissue, tears, breath, blood, serum, plasma, cerebrospinal fluid, peritoneal fluid, pleural fluid, pericardial fluid, joint fluid, and amniotic fluid, water sample, food sample, air sample, and soil sample (all claimed). ADVANTAGE - The sensor for use with the portable analytical instrument is configured for detection of metalsin samples. The sensor can provide the excellent solution for on-site metal detection, including heavy metal detection. The sensors can provide significant advantages in higher throughput, lower cost, at the same time being less labor intensive and less dependent on individual skills. The disposable design of the sensor, the enhanced reliability and repeatability of measurements can be obtained. The sensors can be widely applied in various industries. DETAILED DESCRIPTION - INDEPENDENT CLAIMS are included for the following: (1) a system for detecting metal in sample; and (2) a method for using sensor for detecting metal in sample. DESCRIPTION OF DRAWING(S) - The drawing shows a schematic view of the sensor prototype. Channel (3) Sensing electrodes (4) Temperature sensor (6) Working electrode (8) Counter electrode (9) Reference electrode (10)

  18. Supervised / unsupervised change detection

    OpenAIRE

    de Alwis Pitts, Dilkushi; De Vecchi, Daniele; Harb, Mostapha; So, Emily; Dell'Acqua, Fabio

    2014-01-01

    The aim of this deliverable is to provide an overview of the state of the art in change detection techniques and a critique of what could be programmed to derive SENSUM products. It is the product of the collaboration between UCAM and EUCENTRE. The document includes as a necessary requirement a discussion about a proposed technique for co-registration. Since change detection techniques require an assessment of a series of images and the basic process involves comparing and contrasting the sim...

  19. Pipeline Leak Detection Techniques

    OpenAIRE

    Chis, Timur

    2009-01-01

    Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method are discussed and some indications of applicability are outlined.

  20. Pipeline Leak Detection Techniques

    Directory of Open Access Journals (Sweden)

    Timur Chis, Ph.D., Dipl.Eng.

    2007-01-01

    Full Text Available Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method are discussed and some indications of applicability are outlined.

  1. Lead Poison Detection

    Science.gov (United States)

    1976-01-01

    With NASA contracts, Whittaker Corporations Space Science division has developed an electro-optical instrument to mass screen for lead poisoning. Device is portable and detects protoporphyrin in whole blood. Free corpuscular porphyrins occur as an early effect of lead ingestion. Also detects lead in urine used to confirm blood tests. Test is inexpensive and can be applied by relatively unskilled personnel. Similar Whittaker fluorometry device called "drug screen" can measure morphine and quinine in urine much faster and cheaper than other methods.

  2. Detecting analogies unconsciously

    Directory of Open Access Journals (Sweden)

    Thomas Peter Reber

    2014-01-01

    Full Text Available Analogies may arise from the conscious detection of similarities between a present and a past situation. In this functional magnetic resonance imaging study, we tested whether young volunteers would detect analogies unconsciously between a current supraliminal (visible and a past subliminal (invisible situation. The subliminal encoding of the past situation precludes awareness of analogy detection in the current situation. First, participants encoded subliminal pairs of unrelated words in either one or nine encoding trials. Later, they judged the semantic fit of supraliminally presented new words that either retained a previously encoded semantic relation (‘analog’ or not (‘broken analog’. Words in analogs versus broken analogs were judged closer semantically, which reflects unconscious analogy detection. Hippocampal activity associated with subliminal encoding correlated with the behavioral measure of unconscious analogy detection. Analogs versus broken analogs were processed with reduced prefrontal but enhanced medial temporal activity. We conclude that analogous episodes can be detected even unconsciously drawing on the episodic memory network.

  3. Abnormal sound detection device

    International Nuclear Information System (INIS)

    Yamada, Izumi; Matsui, Yuji.

    1995-01-01

    Only components synchronized with rotation of pumps are sampled from detected acoustic sounds, to judge the presence or absence of abnormality based on the magnitude of the synchronized components. A synchronized component sampling means can remove resonance sounds and other acoustic sounds generated at a synchronously with the rotation based on the knowledge that generated acoustic components in a normal state are a sort of resonance sounds and are not precisely synchronized with the number of rotation. On the other hand, abnormal sounds of a rotating body are often caused by compulsory force accompanying the rotation as a generation source, and the abnormal sounds can be detected by extracting only the rotation-synchronized components. Since components of normal acoustic sounds generated at present are discriminated from the detected sounds, reduction of the abnormal sounds due to a signal processing can be avoided and, as a result, abnormal sound detection sensitivity can be improved. Further, since it is adapted to discriminate the occurrence of the abnormal sound from the actually detected sounds, the other frequency components which are forecast but not generated actually are not removed, so that it is further effective for the improvement of detection sensitivity. (N.H.)

  4. Phenomenon detection device

    International Nuclear Information System (INIS)

    Suzuki, Yasuo.

    1994-01-01

    Detection signals for a specific phenomenon outputted from any of detectors are distributed by way of half mirrors and inputted to a logic discrimination circuit by way of a photoelectric convertor. The photoelectric convertor detects the quantity of light corresponding to the optical signals from more than two detectors which detected the phenomenon, and outputs detection signals to the logic discrimination circuit. If the phenomenon is detected, since both inputs turn ON in the logic discrimination circuit in accordance with the predetermined logical sum, the occurrence of a specific phenomenon is detected. Thus, an optical system substantially comprises half mirrors, reflection mirrors and photoelectric convertor in combination provides a logic circuit. Since the circuit which transmits signals of the detectors is constituted with an optical system using the half mirrors, the number of parts constituting the logic circuit can greatly be saved. In addition, since the optical system comprises mirrors or half mirrors which have been used so far, they can be used, once assembled, quasipermanently, and the reliability can be enhanced greatly. (N.H.)

  5. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  6. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  7. Single particle detecting telescope system

    International Nuclear Information System (INIS)

    Yamamoto, I.; Tomiyama, T.; Iga, Y.; Komatsubara, T.; Kanada, M.; Yamashita, Y.; Wada, T.; Furukawa, S.

    1981-01-01

    We constructed the single particle detecting telescope system for detecting a fractionally charged particle. The telescope consists of position detecting counters, wall-less multi-cell chambers, single detecting circuits and microcomputer system as data I/0 processor. Especially, a frequency of double particle is compared the case of the single particle detecting with the case of an ordinary measurement

  8. Proactive malware detection

    Science.gov (United States)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  9. π0 detection system

    International Nuclear Information System (INIS)

    Suzuki, Yoichiro

    1977-01-01

    A π-zero meson detection system used for the measurement of charge exchange reaction is described. The detection of π-zero is made by observing the coincidence events of two gamma-ray emission following the decay of π-zero meson. The angles of the emitted gamma-rays are detected with a wire spark chamber system, and the energies of the gamma-rays are measured with hodoscope type lead glass Cherenkov counters. In front of the π-zero counter system, a lead converter is set, and the incident gamma-rays convert to electron positron pairs, which can be detected with the wire spark chambers. The system is a multi-track detection system. The high voltage pulser of the wire spark chamber system is a charge line thyratron pulser, and the chamber itself is a transmission line type. Read-out can be made by a mag-line system. Wave forms and efficiencies were measured. The three-track efficiency was about 90% by the condenser method and 95% by the charge line method. (Kato, T.)

  10. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  11. Detecting dark matter

    International Nuclear Information System (INIS)

    Dixon, Roger L.

    2000-01-01

    Dark matter is one of the most pressing problems in modern cosmology and particle physic research. This talk will motivate the existence of dark matter by reviewing the main experimental evidence for its existence, the rotation curves of galaxies and the motions of galaxies about one another. It will then go on to review the corroborating theoretical motivations before combining all the supporting evidence to explore some of the possibilities for dark matter along with its expected properties. This will lay the ground work for dark matter detection. A number of differing techniques are being developed and used to detect dark matter. These will be briefly discussed before the focus turns to cryogenic detection techniques. Finally, some preliminary results and expectations will be given for the Cryogenic Dark Matter Search (CDMS) experiment

  12. Coolant leakage detection device

    International Nuclear Information System (INIS)

    Ito, Takao.

    1983-01-01

    Purpose: To surely detect the coolant leakage at a time when the leakage amount is still low in the intra-reactor inlet pipeway of FBR type reactor. Constitution: Outside of the intra-reactor inlet piping for introducing coolants at low temperature into a reactor core, an outer closure pipe is furnished. The upper end of the outer closure pipe opens above the liquid level of the coolants in the reactor, and a thermocouple is inserted to the opening of the upper end. In such a structure, if the coolants in the in-reactor piping should leak to the outer closure pipe, coolants over-flows from the opening thereof, at which the thermocouple detects the temperature of the coolants at a low temperature, thereby enabling to detect the leakage of the coolants at a time when it is still low. (Kamimura, M.)

  13. Detection of colorectal neoplasia

    DEFF Research Database (Denmark)

    Wilhelmsen, Michael; Christensen, Ib J; Rasmussen, Louise

    2017-01-01

    Serological biomarkers may be an option for early detection of colorectal cancer (CRC). The present study assessed eight cancer-associated protein biomarkers in plasma from subjects undergoing first time ever colonoscopy due to symptoms attributable to colorectal neoplasia. Plasma AFP, CA19-9, CEA...... value was 18% and the negative predictive value was 97%. Combinations of serological protein biomarkers provided a significant identification of subjects with high risk of the presence of colorectal neoplasia. The present set of biomarkers could become important adjunct in early detection of CRC....

  14. Spear Phishing Attack Detection

    Science.gov (United States)

    2011-03-24

    be sufficiently evaded by encrypting the malware. A similar approach is used by Kolter et al. in [KoM04] and later in [KoM06], where they used data...MeM11] [Mes08] [MKK07] [Off10] [RaS02] [Rep09] J. Z. Kolter and M. A. Maloof. ―Learning to detect...York: ACM, 2004. J. Z. Kolter and M. A. Maloof. ―Learning to detect and classify malicious executables in the Wild,‖ The Journal of Machine Learning

  15. Quantitative secondary electron detection

    Science.gov (United States)

    Agrawal, Jyoti; Joy, David C.; Nayak, Subuhadarshi

    2018-05-08

    Quantitative Secondary Electron Detection (QSED) using the array of solid state devices (SSD) based electron-counters enable critical dimension metrology measurements in materials such as semiconductors, nanomaterials, and biological samples (FIG. 3). Methods and devices effect a quantitative detection of secondary electrons with the array of solid state detectors comprising a number of solid state detectors. An array senses the number of secondary electrons with a plurality of solid state detectors, counting the number of secondary electrons with a time to digital converter circuit in counter mode.

  16. Luminescence detection of shellfish

    International Nuclear Information System (INIS)

    Sanderson, D.C.W.; Carmichael, L.A.; Spencer, J.Q.; Naylor, J.D.

    1996-01-01

    The Scottish Universities Research and Reactor Centre (SURRC) has been active in the development and application of luminescence techniques in the detection of irradiated foods, in support of UK legislation. Thermoluminescence (TL), photostimulated luminescence (PSL) and photo-transfer luminescence (PTTL) are radiation-specific phenomena which arise due to energy stored by trapped charge carriers following irradiation. The energy released following stimulation is accompanied by detectable luminescence. The TL method involves preparation of pure silicate extracts from the sample and subsequent TL analysis, whereas PSL uses stimulation by electromagnetic radiation (visible, or near visible wavelengths) thus avoiding heating the sample. (author)

  17. Detection of pulmonary nodules

    International Nuclear Information System (INIS)

    Vanzulli, A.; Zanello, A.; DelMaschio, M.; Paesano, P.; Panizza, P.; DelMaschio, A.

    1989-01-01

    The authors have prospectively studied 203 pulmonary nodules in 91 patients, selected by CT (gold standard), with both subtraction digital radiography (SDR) and conventional plain film. Subtracted images were obtained by using copper filter inserted between two photostimulable imaging plates. Five radiologists randomly analyzed all conventional and subtracted images. The authors calculated sensitivity, specificity, and positive and negative predictive values for both conventional radiography and SDR. Receiver operating characteristics (ROC) curves were calculated by plotting the number of nodules detected with different degrees of confidence. SDR detected 12% more nodules than conventional radiography. ROC curves demonstrated that the level of confidence was better for SDR (P <.05)

  18. Ultrasensitive leak detection

    International Nuclear Information System (INIS)

    Winkelman, C.R.; Davidson, H.G.

    1978-01-01

    The objective of this investigation was to develop a method of detecting leaks to a sensitivity of 1.0 x 10 -13 std/cm 3 /s in vacuum devices and to develop a qualifiable standard leak to provide system calibration at this leak rate. The development work demonstrated that minimum detectable leak rates of 6.5 x 10 -14 std/cm 3 /s and 5.5 x 10 -15 std/cm 3 /s are possible for respective analog and digital measurement modes

  19. Remote detection of electronic devices

    Science.gov (United States)

    Judd, Stephen L [Los Alamos, NM; Fortgang, Clifford M [Los Alamos, NM; Guenther, David C [Los Alamos, NM

    2012-09-25

    An apparatus and method for detecting solid-state electronic devices are described. Non-linear junction detection techniques are combined with spread-spectrum encoding and cross correlation to increase the range and sensitivity of the non-linear junction detection and to permit the determination of the distances of the detected electronics. Nonlinear elements are detected by transmitting a signal at a chosen frequency and detecting higher harmonic signals that are returned from responding devices.

  20. Leak detection method

    International Nuclear Information System (INIS)

    1978-01-01

    This invention provides a method for removing nuclear fuel elements from a fabrication building while at the same time testing the fuel elements for leaks without releasing contaminants from the fabrication building or from the fuel elements. The vacuum source used, leak detecting mechanism and fuel element fabrication building are specified to withstand environmental hazards. (UK)

  1. Activation analysis. Detection limits

    International Nuclear Information System (INIS)

    Revel, G.

    1999-01-01

    Numerical data and limits of detection related to the four irradiation modes, often used in activation analysis (reactor neutrons, 14 MeV neutrons, photon gamma and charged particles) are presented here. The technical presentation of the activation analysis is detailed in the paper P 2565 of Techniques de l'Ingenieur. (A.L.B.)

  2. Changing change detection

    DEFF Research Database (Denmark)

    Kyllingsbæk, Søren; Bundesen, Claus

    2009-01-01

    The change detection paradigm is a popular way of measuring visual short-term memory capacity. Using the paradigm, researchers have found evidence for a capacity of about four independent visual objects, confirming classic estimates that were based on the number of items that could be reported...

  3. Automatic detection of laughter

    NARCIS (Netherlands)

    Truong, K.P.; Leeuwen, D.A. van

    2005-01-01

    In the context of detecting ‘paralinguistic events’ with the aim to make classification of the speaker’s emotional state possible, a detector was developed for one of the most obvious ‘paralinguistic events’, namely laughter. Gaussian Mixture Models were trained with Perceptual Linear Prediction

  4. Emotion detection from text

    Science.gov (United States)

    Ramalingam, V. V.; Pandian, A.; Jaiswal, Abhijeet; Bhatia, Nikhar

    2018-04-01

    This paper presents a novel method based on concept of Machine Learning for Emotion Detection using various algorithms of Support Vector Machine and major emotions described are linked to the Word-Net for enhanced accuracy. The approach proposed plays a promising role to augment the Artificial Intelligence in the near future and could be vital in optimization of Human-Machine Interface.

  5. Detective fiction and the

    African Journals Online (AJOL)

    Tienie01

    2006-06-15

    Jun 15, 2006 ... tionalist agenda, then the third wave concerns reformulating healthy community ... In real life, no doubt, the best detectives are the professional police, but .... Marple – the ever-observant, intelligent and intuitive elderly, amateur detec- ..... tive, promoting alternative social models for the community at large.

  6. Readers as research detectives

    DEFF Research Database (Denmark)

    Gøtzsche, Peter C

    2009-01-01

    all trials should be posted on a public website. This would also make it much easier to detect errors and flaws in publications, and it would allow many research projects to be performed without collecting new data. The prevailing culture of secrecy and ownership to data is not in the best interests...

  7. Crack detection '86

    International Nuclear Information System (INIS)

    1986-01-01

    The participants of the conference heard 36 papers of which 13 were incorporated in INIS. The incorporated papers deal with the quality control of the equipment of nuclear power plants, with technical specifications and possibilities of diverse crack detection devices, as well as with personnel training for nondestructive materials testing. (E.S.)

  8. Crack detecting method

    International Nuclear Information System (INIS)

    Narita, Michiko; Aida, Shigekazu

    1998-01-01

    A penetration liquid or a slow drying penetration liquid prepared by mixing a penetration liquid and a slow drying liquid is filled to the inside of an artificial crack formed to a member to be detected such as of boiler power generation facilities and nuclear power facilities. A developing liquid is applied to the periphery of the artificial crack on the surface of a member to be detected. As the slow-drying liquid, an oil having a viscosity of 56 is preferably used. Loads are applied repeatedly to the member to be detected, and when a crack is caused to the artificial crack, the permeation liquid penetrates into the crack. The penetration liquid penetrated into the crack is developed by the developing liquid previously coated to the periphery of the artificial crack of the surface of the member to be detected. When a crack is caused, since the crack is developed clearly even if it is a small opening, the crack can be recognized visually reliably. (I.N.)

  9. Antigen detection systems

    Science.gov (United States)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  10. Remote Voice Detection System

    National Research Council Canada - National Science Library

    Blackmon, Fletcher A

    2007-01-01

    A device and system to remotely detect vocalizations of speech. The skin located on the throat region of a speaking person or a reflective layer on the skin on the throat region vibrates in response to vocalizations of speech by the person...

  11. Failed fuel detection device

    International Nuclear Information System (INIS)

    Doi, Akira.

    1994-01-01

    The device of the present invention concerns a failed fuel detection device for a nuclear reactor, such as an FBR type reactor, using electroconductive coolants. A sampling port is disposed at the upper portion of the fuel assembly so as to cover the assembly, so that coolants in the fuel assembly are sampled to improve a device for detecting fuel failure. That is, when coolants in the fuel assembly are sampled from the sampling port, the flow of electroconductive coolants in an sampling tube is detected by a flowmeter, to control an electromagnetic pump. The flow of electroconductive coolants is stopped against the waterhead pressure and dynamic pressure of the conductive coolants, and a predetermined amount of the coolants is pumped up to the sampling tank. Gas is supplied to the pumped up coolants so that fissile products are transferred from the coolants to a gas phase. Radiation in the gas in a gas recycling system is measured to detect presence of fuel failure. (I.S.)

  12. Automated asteroseismic peak detections

    Science.gov (United States)

    García Saravia Ortiz de Montellano, Andrés; Hekker, S.; Themeßl, N.

    2018-05-01

    Space observatories such as Kepler have provided data that can potentially revolutionize our understanding of stars. Through detailed asteroseismic analyses we are capable of determining fundamental stellar parameters and reveal the stellar internal structure with unprecedented accuracy. However, such detailed analyses, known as peak bagging, have so far been obtained for only a small percentage of the observed stars while most of the scientific potential of the available data remains unexplored. One of the major challenges in peak bagging is identifying how many solar-like oscillation modes are visible in a power density spectrum. Identification of oscillation modes is usually done by visual inspection that is time-consuming and has a degree of subjectivity. Here, we present a peak-detection algorithm especially suited for the detection of solar-like oscillations. It reliably characterizes the solar-like oscillations in a power density spectrum and estimates their parameters without human intervention. Furthermore, we provide a metric to characterize the false positive and false negative rates to provide further information about the reliability of a detected oscillation mode or the significance of a lack of detected oscillation modes. The algorithm presented here opens the possibility for detailed and automated peak bagging of the thousands of solar-like oscillators observed by Kepler.

  13. Neutron detection technique

    International Nuclear Information System (INIS)

    Oblath, N.S.; Poon, A.W.P.

    2000-01-01

    The Sudbury Neutrino Observatory (SNO) has the ability to measure the total flux of all active flavors of neutrinos using the neutral current reaction, whose signature is a neutron. By comparing the rates of the neutral current reaction to the charged current reaction, which only detects electron neutrinos, one can test the neutrino oscillation hypothesis independent of solar models. It is necessary to understand the neutron detection efficiency of the detector to make use of the neutral current reaction. This report demonstrates a coincidence technique to identify neutrons emitted from the 252 Cf neutron calibration source. The source releases on average four neutrons when a 252 Cf nucleus spontaneously fissions. Each neutron is detected as a separate event when the neutron is captured by a deuteron, releasing a gamma ray of approximately 6.25 MeV. This gamma ray is in turn detected by the photomultiplier tube (PMT) array. By investigating the time and spatial separation between neutron-like events, it is possible to obtain a pure sample of neutrons for calibration study. Preliminary results of the technique applied to two calibration runs are presented

  14. H2 region detection

    International Nuclear Information System (INIS)

    Comte, G.

    1978-01-01

    The now classical technique of detection of HII regions is by means of photography and/or interferometry through narrow-band interference filters, with a large aperture ratio of the imaging optics. It enables the detailed study of the spiral structure and the repartition of ionized gas in our Galaxy as well as in the external galaxies [fr

  15. Focused detection logging technique

    International Nuclear Information System (INIS)

    Turcotte, R.E.

    1977-01-01

    In accordance with an illustrative embodiment of the present invention, a method and apparatus is disclosed for determining a characteristic of the media surrounding a borehole by emitting gamma radiation in at least one tightly collimated beam toward an earth formation adjacent a borehole, by detecting from a plurality of tightly collimated paths that are focused at a zone of intersection with and aligned to intersect with each emitted beam the gamma radiation scattered by the interaction of the emitted gamma radiation and the media at the zones of intersection, by misaligning the emitted beams and the tightly collimated paths to prevent their intersection, by detecting gamma radiation scattered by the interaction of the emitted gamma radiation and the media with the emitted beams and the tightly collimated paths misaligned and by determining from the detected gamma radiation a media characteristic. In one embodiment, the detection collimater used is formed of a material that is essentially opaque to gamma radiation at the energies of interest and includes a plurality of passageways that are spherically focused at a zone of intersection with one of the emitted beams of gamma radiation and that are arranged in a number of surfaces that are curved to be azimuthally symmetrical about the axis of the intersected beam. 14 figures

  16. Detecting the brachyspina mutation

    DEFF Research Database (Denmark)

    2012-01-01

    This invention relates to methods for the detection of a bovine that is affected by or carrier of brachyspina. It is based on the identification of a 3.3 Kb deletion in the bovine FANCI gene that is shown to cause the brachyspina syndrome. The present invention provides methods and uses for deter...

  17. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  18. "Utilizing" signal detection theory.

    Science.gov (United States)

    Lynn, Spencer K; Barrett, Lisa Feldman

    2014-09-01

    What do inferring what a person is thinking or feeling, judging a defendant's guilt, and navigating a dimly lit room have in common? They involve perceptual uncertainty (e.g., a scowling face might indicate anger or concentration, for which different responses are appropriate) and behavioral risk (e.g., a cost to making the wrong response). Signal detection theory describes these types of decisions. In this tutorial, we show how incorporating the economic concept of utility allows signal detection theory to serve as a model of optimal decision making, going beyond its common use as an analytic method. This utility approach to signal detection theory clarifies otherwise enigmatic influences of perceptual uncertainty on measures of decision-making performance (accuracy and optimality) and on behavior (an inverse relationship between bias magnitude and sensitivity optimizes utility). A "utilized" signal detection theory offers the possibility of expanding the phenomena that can be understood within a decision-making framework. © The Author(s) 2014.

  19. Automatic EEG spike detection.

    Science.gov (United States)

    Harner, Richard

    2009-10-01

    Since the 1970s advances in science and technology during each succeeding decade have renewed the expectation of efficient, reliable automatic epileptiform spike detection (AESD). But even when reinforced with better, faster tools, clinically reliable unsupervised spike detection remains beyond our reach. Expert-selected spike parameters were the first and still most widely used for AESD. Thresholds for amplitude, duration, sharpness, rise-time, fall-time, after-coming slow waves, background frequency, and more have been used. It is still unclear which of these wave parameters are essential, beyond peak-peak amplitude and duration. Wavelet parameters are very appropriate to AESD but need to be combined with other parameters to achieve desired levels of spike detection efficiency. Artificial Neural Network (ANN) and expert-system methods may have reached peak efficiency. Support Vector Machine (SVM) technology focuses on outliers rather than centroids of spike and nonspike data clusters and should improve AESD efficiency. An exemplary spike/nonspike database is suggested as a tool for assessing parameters and methods for AESD and is available in CSV or Matlab formats from the author at brainvue@gmail.com. Exploratory Data Analysis (EDA) is presented as a graphic method for finding better spike parameters and for the step-wise evaluation of the spike detection process.

  20. New fire detection technology

    International Nuclear Information System (INIS)

    Caceres Vinagre, F.J.

    1995-01-01

    Fire detection methods and systems have advanced rapidly in recent years. In practice, there are two categories of fire detection system: conventional, collective identification, and addressable, individual identification. Hybrid systems are also used. Most Spanish nuclear power plants are equipped with the first type, as they were the only types available when the plants were built. Individual identification systems have been a radical change and have opened up new possibilities for nuclear power plants not available using conventional systems. Conventional systems provide no indication of the exact provenance of the fire-alarm signal, which could even come from different rooms. When a new generation detector initiates an alarm, it identifies itself, and the location of the fire, explicity. Faculty detectors can be located and counted, for fast, efficient replacement, or recording if replacement is not necessary immediately. In the past HALON was used in situations that required an extinguishing agent that was clean for people and equipment such as electrical panels, and in control rooms. Now that it is no longer available, faster detection techniques have had to be developed, to avoid the need for generalized extinction or inadequate extinguishing agents. This presentation analyses the new detection technology, and the ways it is being applied to typical cases in nuclear power plants. (Author)

  1. Detection symmetry and asymmetry

    NARCIS (Netherlands)

    du Buf, J.M.H.

    1991-01-01

    Experiments were performed on the detection symmetry and asymmetry of incremental and decremental disks, as a function of both disk diameter and duration. It was found that, for a background luminance of 300cd.m-2, thresholds of dynamic (briefly presented) foveal disks are symmetrical for all

  2. Global Disease Detectives

    Centers for Disease Control (CDC) Podcasts

    2010-09-21

    This podcast documents U.S. efforts to prevent, detect, and control emerging infectious diseases, such as SARS and pandemic influenza.  Created: 9/21/2010 by CDC Center for Global Health.   Date Released: 9/21/2010.

  3. Verbal lie detection

    NARCIS (Netherlands)

    Vrij, Aldert; Taylor, Paul J.; Picornell, Isabel; Oxburgh, Gavin; Myklebust, Trond; Grant, Tim; Milne, Rebecca

    2015-01-01

    In this chapter, we discuss verbal lie detection and will argue that speech content can be revealing about deception. Starting with a section discussing the, in our view, myth that non-verbal behaviour would be more revealing about deception than speech, we then provide an overview of verbal lie

  4. Ultrasonic leak detection

    International Nuclear Information System (INIS)

    Murphy, R.V.

    1977-01-01

    A scanning ultrasonic microphone was used to detect the presence and locate the sources of hydraulic noises in piping systems in a reactor environment. The intensity changes of the noises correspond to changes of flow conditions within the system caused by throttled valves, flow rate changes, and leaks. (author)

  5. CDC Disease Detective Camp

    Centers for Disease Control (CDC) Podcasts

    The CDC Disease Detective Camp gives rising high school juniors and seniors exposure to key aspects of the CDC, including basic epidemiology, infectious and chronic disease tracking, public health law, and outbreak investigations. The camp also helps students explore careers in public health.

  6. Seismic detection of tornadoes

    Science.gov (United States)

    Tatom, F. B.

    1993-01-01

    Tornadoes represent the most violent of all forms of atmospheric storms, each year resulting in hundreds of millions of dollars in property damage and approximately one hundred fatalities. In recent years, considerable success has been achieved in detecting tornadic storms by means of Doppler radar. However, radar systems cannot determine when a tornado is actually in contact with the ground, expect possibly at extremely close range. At the present time, human observation is the only truly reliable way of knowing that a tornado is actually on the ground. However, considerable evidence exists indicating that a tornado in contact with the ground produces a significant seismic signal. If such signals are generated, the seismic detection and warning of an imminent tornado can become a distinct possibility. 

  7. Fissile materials detection

    International Nuclear Information System (INIS)

    Dumesnil, P.

    1977-03-01

    Description is given of three types of apparatus intended for controlling fossile materials in view of avoiding their diversion or preventing said products to be mixed to less dangerous radioactive wastes. The gantry-type apparatus is intended for the detection of small masses of fissile materials moving through a crossing place; the neutron gantry consists of helium 3 detectors of the type 150NH100, located inside polyethylene blocks; as for the gamma gantry, it consists of two large plastic scintillators integrated to the vertical legs of said gantry. The second apparatus is a high-efficiency detector intended for controlling Pu inside waste casks. It can detect 10mg of Pu inside a 100 liters drum for one minute counting. The third apparatus intended for persons and things monitoring is still on study. Such as the gantries it is based on sampled measurement of the background noise [fr

  8. Street light detection

    DEFF Research Database (Denmark)

    2017-01-01

    Disclosed is a method, a vehicle and a system for measuring light from one or more outdoor lamps on a road, the system comprising a number of light sensors configured to be arranged in a fixed position relative to a vehicle, where at least a first part of the light sensors is configured...... for measuring light from the one or more outdoor lamps, wherein at least a second part of the light sensors comprises at least two light sensors configured for detecting the angle which the light from the one or more outdoor lamps arrives at in the second part of the light sensors; a processing unit configured...... for calculating the position relative to the vehicle of the one or more outdoor lamps based on the detected angle which the light arrives in, and wherein the processing unit is configured for calculating the light on the road based on the light measured in the fixed position relative to the vehicle and based...

  9. The IASI detection chain

    Science.gov (United States)

    Nicol, Patrick; Fleury, Joel; Le Naour, Claire; Bernard, Frédéric

    2017-11-01

    IASI (Infrared Atmospheric Sounding Interferometer) is an infrared atmospheric sounder. It will provide meteorologist and scientific community with atmospheric spectra. The instrument is composed of a Fourier transform spectrometer and an associated infrared imager. The presentation will describe the spectrometer detection chain architecture, composed by three different detectors cooled in a passive cryo-cooler (so called CBS : Cold Box Subsystem) and associated analog electronics up to digital conversion. It will mainly focus on design choices with regards to environment constraints, implemented technologies, and associated performances. CNES is leading the IASI program in collaboration with EUMETSAT. The instrument Prime is ALCATEL SPACE responsible, notably, of the detection chain architecture. SAGEM SA provides the detector package (so called CAU : Cold Acquisition Unit).

  10. Bayesian community detection

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel N

    2012-01-01

    Many networks of scientific interest naturally decompose into clusters or communities with comparatively fewer external than internal links; however, current Bayesian models of network communities do not exert this intuitive notion of communities. We formulate a nonparametric Bayesian model...... for community detection consistent with an intuitive definition of communities and present a Markov chain Monte Carlo procedure for inferring the community structure. A Matlab toolbox with the proposed inference procedure is available for download. On synthetic and real networks, our model detects communities...... consistent with ground truth, and on real networks, it outperforms existing approaches in predicting missing links. This suggests that community structure is an important structural property of networks that should be explicitly modeled....

  11. Handbook for Language Detectives

    DEFF Research Database (Denmark)

    Bryanne, Ulla; Bruntt, Karen Scheel Lassen

    Handbook for Language Detectives gives a thorough presentation of English grammar and discusses how to teach grammar. The book unveils to the readers, who will be working as grammar detectives, the fascinating world of language. It does not only deal with "traditional grammar" but also discusses...... what different grammatical structures mean (semantics) and how they influence the level of style (pragmatics). Grammar should not be taught as a separate discipline; it can and should be integrated in communicative language teaching. The book gives you innovative and valuable ideas of how this can...... be done. The book serves a double purpose: - English grammar and language usage at bachelor level from a functional linguistic point of view. - How to teach English grammar within a communicative approach. The book is mainly intended for Danish student teachers of English, but anyone else interested...

  12. Rate based failure detection

    Science.gov (United States)

    Johnson, Brett Emery Trabun; Gamage, Thoshitha Thanushka; Bakken, David Edward

    2018-01-02

    This disclosure describes, in part, a system management component and failure detection component for use in a power grid data network to identify anomalies within the network and systematically adjust the quality of service of data published by publishers and subscribed to by subscribers within the network. In one implementation, subscribers may identify a desired data rate, a minimum acceptable data rate, desired latency, minimum acceptable latency and a priority for each subscription. The failure detection component may identify an anomaly within the network and a source of the anomaly. Based on the identified anomaly, data rates and or data paths may be adjusted in real-time to ensure that the power grid data network does not become overloaded and/or fail.

  13. Acoustic detection of pneumothorax

    Science.gov (United States)

    Mansy, Hansen A.; Royston, Thomas J.; Balk, Robert A.; Sandler, Richard H.

    2003-04-01

    This study aims at investigating the feasibility of using low-frequency (pneumothorax detection were tested in dogs. In the first approach, broadband acoustic signals were introduced into the trachea during end-expiration and transmitted waves were measured at the chest surface. Pneumothorax was found to consistently decrease pulmonary acoustic transmission in the 200-1200-Hz frequency band, while less change was observed at lower frequencies (ppneumothorax states (pPneumothorax was found to be associated with a preferential reduction of sound amplitude in the 200- to 700-Hz range, and a decrease of sound amplitude variation (in the 300 to 600-Hz band) during the respiration cycle (pPneumothorax changed the frequency and decay rate of percussive sounds. These results imply that certain medical conditions may be reliably detected using appropriate acoustic measurements and analysis. [Work supported by NIH/NHLBI #R44HL61108.

  14. Gas Detection for Experiments

    CERN Document Server

    Hay, D

    2001-01-01

    Flammable gases are often used in detectors for physics experiments. The storage, distribution and manipulation of such flammable gases present several safety hazards. As most flammable gases cannot be detected by human senses, specific well-placed gas detection systems must be installed. Following a request from the user group and in collaboration with CERN safety officers, risk analyses are performed. An external contractor, who needs to receive detailed user requirements from CERN, performs the installations. The contract is passed on a guaranteed results basis. Co-ordination between all the CERN groups and verification of the technical installation is done by ST/AA/AS. This paper describes and focuses on the structured methodology applied to implement such installations based on goal directed project management techniques (GDPM). This useful supervision tool suited to small to medium sized projects facilitates the task of co-ordinating numerous activities to achieve a completely functional system.

  15. Sherlock Holmes: scientific detective.

    Science.gov (United States)

    Snyder, Laura J

    2004-09-01

    Sherlock Holmes was intended by his creator, Arthur Conan Doyle, to be a 'scientific detective'. Conan Doyle criticized his predecessor Edgar Allan Poe for giving his creation - Inspector Dupin - only the 'illusion' of scientific method. Conan Doyle believed that he had succeeded where Poe had failed; thus, he has Watson remark that Holmes has 'brought detection as near an exact science as it will ever be brought into the world.' By examining Holmes' methods, it becomes clear that Conan Doyle modelled them on certain images of science that were popular in mid- to late-19th century Britain. Contrary to a common view, it is also evident that rather than being responsible for the invention of forensic science, the creation of Holmes was influenced by the early development of it.

  16. Detection of algorithmic trading

    Science.gov (United States)

    Bogoev, Dimitar; Karam, Arzé

    2017-10-01

    We develop a new approach to reflect the behavior of algorithmic traders. Specifically, we provide an analytical and tractable way to infer patterns of quote volatility and price momentum consistent with different types of strategies employed by algorithmic traders, and we propose two ratios to quantify these patterns. Quote volatility ratio is based on the rate of oscillation of the best ask and best bid quotes over an extremely short period of time; whereas price momentum ratio is based on identifying patterns of rapid upward or downward movement in prices. The two ratios are evaluated across several asset classes. We further run a two-stage Artificial Neural Network experiment on the quote volatility ratio; the first stage is used to detect the quote volatility patterns resulting from algorithmic activity, while the second is used to validate the quality of signal detection provided by our measure.

  17. Cell Phone Detection Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Pratt, Richard M.; Bunch, Kyle J.; Puzycki, David J.; Slaugh, Ryan W.; Good, Morris S.; McMakin, Douglas L.

    2007-10-01

    A team composed of Rick Pratt, Dave Puczyki, Kyle Bunch, Ryan Slaugh, Morris Good, and Doug McMakin teamed together to attempt to exploit cellular telephone features and detect if a person was carrying a cellular telephone into a Limited Area. The cell phone’s electromagnetic properties were measured, analyzed, and tested in over 10 different ways to determine if an exploitable signature exists. The method that appears to have the most potential for success without adding an external tag is to measure the RF spectrum, not in the cell phone band, but between 240 and 400MHz. Figures 1- 7 show the detected signal levels from cell phones from three different manufacturers.

  18. Idaho Explosives Detection System

    International Nuclear Information System (INIS)

    Reber, Edward L.; Blackwood, Larry G.; Edwards, Andrew J.; Jewell, J. Keith; Rohde, Kenneth W.; Seabury, Edward H.; Klinger, Jeffery B.

    2005-01-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004

  19. Idaho Explosives Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Reber, Edward L. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)]. E-mail: reber@inel.gov; Blackwood, Larry G. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Edwards, Andrew J. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Jewell, J. Keith [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Rohde, Kenneth W. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Seabury, Edward H. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States); Klinger, Jeffery B. [Idaho National Laboratory, 2525 N. Freemont Ave., Idaho Falls, ID 83415-2114 (United States)

    2005-12-15

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  20. Chaos detection and predictability

    CERN Document Server

    Gottwald, Georg; Laskar, Jacques

    2016-01-01

    Distinguishing chaoticity from regularity in deterministic dynamical systems and specifying the subspace of the phase space in which instabilities are expected to occur is of utmost importance in as disparate areas as astronomy, particle physics and climate dynamics.   To address these issues there exists a plethora of methods for chaos detection and predictability. The most commonly employed technique for investigating chaotic dynamics, i.e. the computation of Lyapunov exponents, however, may suffer a number of problems and drawbacks, for example when applied to noisy experimental data.   In the last two decades, several novel methods have been developed for the fast and reliable determination of the regular or chaotic nature of orbits, aimed at overcoming the shortcomings of more traditional techniques. This set of lecture notes and tutorial reviews serves as an introduction to and overview of modern chaos detection and predictability techniques for graduate students and non-specialists.   The book cover...

  1. Solar neutrino detection

    International Nuclear Information System (INIS)

    Miramonti, Lino

    2009-01-01

    More than 40 years ago, neutrinos where conceived as a way to test the validity of the solar models which tell us that stars are powered by nuclear fusion reactions. The first measurement of the neutrino flux, in 1968 in the Homestake mine in South Dakota, detected only one third of the expected value, originating what has been known as the Solar Neutrino Problem. Different experiments were built in order to understand the origin of this discrepancy. Now we know that neutrinos undergo oscillation phenomenon changing their nature traveling from the core of the Sun to our detectors. In the work the 40 year long saga of the neutrino detection is presented; from the first proposals to test the solar models to last real time measurements of the low energy part of the neutrino spectrum.

  2. Detection of pump degradation

    International Nuclear Information System (INIS)

    Greene, R.H.; Casada, D.A.; Ayers, C.W.

    1995-08-01

    This Phase II Nuclear Plant Aging Research study examines the methods of detecting pump degradation that are currently employed in domestic and overseas nuclear facilities. This report evaluates the criteria mandated by required pump testing at U.S. nuclear power plants and compares them to those features characteristic of state-of-the-art diagnostic programs and practices currently implemented by other major industries. Since the working condition of the pump driver is crucial to pump operability, a brief review of new applications of motor diagnostics is provided that highlights recent developments in this technology. The routine collection and analysis of spectral data is superior to all other technologies in its ability to accurately detect numerous types and causes of pump degradation. Existing ASME Code testing criteria do not require the evaluation of pump vibration spectra but instead overall vibration amplitude. The mechanical information discernible from vibration amplitude analysis is limited, and several cases of pump failure were not detected in their early stages by vibration monitoring. Since spectral analysis can provide a wealth of pertinent information concerning the mechanical condition of rotating machinery, its incorporation into ASME testing criteria could merit a relaxation in the monthly-to-quarterly testing schedules that seek to verify and assure pump operability. Pump drivers are not included in the current battery of testing. Operational problems thought to be caused by pump degradation were found to be the result of motor degradation. Recent advances in nonintrusive monitoring techniques have made motor diagnostics a viable technology for assessing motor operability. Motor current/power analysis can detect rotor bar degradation and ascertain ranges of hydraulically unstable operation for a particular pump and motor set. The concept of using motor current or power fluctuations as an indicator of pump hydraulic load stability is presented

  3. Abscess detection with radionuclides

    International Nuclear Information System (INIS)

    Alavi, J.B.

    1988-01-01

    Radionuclide studies may aid in the diagnosis and localization of intra-abdominal infections. Despite the introduction of new radiographic and ultrasound methods, there are several clinical situations in which radionuclide scans have proved useful. Those include detection of postoperative intra-abdominal abscess, evaluation of liver abscess, differentiation between pancreatic pseudocyst or abscess, evaluation of fever of unknown origin, and evaluation of inflammatory bowel disease. Each clinical situation is discussed separately here

  4. Shunt detection and measurement

    International Nuclear Information System (INIS)

    Grossman, W.

    1986-01-01

    Detection, localization, and quantification of intracardiac shunts are an integral part of the hemodynamic evaluation of patients with congenital heart disease. In most cases, an intracardiac shunt is suspected on the basis of the clinical evaluation of the patient prior to catheterization. However, there are several circumstances in which data obtained at catheterization should alert the cardiologist to look for a shunt that previously had not been suspected

  5. Radar detection of Vesta

    International Nuclear Information System (INIS)

    Ostro, S.J.; Cornell University, Ithaca, N.Y.); Campbell, D.B.; Pettengill, G.H.

    1980-01-01

    Asteroid 4 Vesta was detected on November 6, 1979 with the Arecibo Observatory's S-band (12.6-cm-wavelength) radar. The echo power spectrum, received in the circular polarization opposite to that transmitted, yields a radar cross section of (0.2 + or - 0.1)pi a-squared, for a 272 km. The data are too noisy to permit derivation of Vesta's rotation period

  6. Aspects of leak detection

    International Nuclear Information System (INIS)

    Chivers, T.C.

    1997-01-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant

  7. Deception Detection in Videos

    OpenAIRE

    Wu, Zhe; Singh, Bharat; Davis, Larry S.; Subrahmanian, V. S.

    2017-01-01

    We present a system for covert automated deception detection in real-life courtroom trial videos. We study the importance of different modalities like vision, audio and text for this task. On the vision side, our system uses classifiers trained on low level video features which predict human micro-expressions. We show that predictions of high-level micro-expressions can be used as features for deception prediction. Surprisingly, IDT (Improved Dense Trajectory) features which have been widely ...

  8. Aspects of leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Chivers, T.C. [Berkeley Technology Centre, Glos (United Kingdom)

    1997-04-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant.

  9. Detection of pump degradation

    Energy Technology Data Exchange (ETDEWEB)

    Greene, R.H.; Casada, D.A.; Ayers, C.W. [and others

    1995-08-01

    This Phase II Nuclear Plant Aging Research study examines the methods of detecting pump degradation that are currently employed in domestic and overseas nuclear facilities. This report evaluates the criteria mandated by required pump testing at U.S. nuclear power plants and compares them to those features characteristic of state-of-the-art diagnostic programs and practices currently implemented by other major industries. Since the working condition of the pump driver is crucial to pump operability, a brief review of new applications of motor diagnostics is provided that highlights recent developments in this technology. The routine collection and analysis of spectral data is superior to all other technologies in its ability to accurately detect numerous types and causes of pump degradation. Existing ASME Code testing criteria do not require the evaluation of pump vibration spectra but instead overall vibration amplitude. The mechanical information discernible from vibration amplitude analysis is limited, and several cases of pump failure were not detected in their early stages by vibration monitoring. Since spectral analysis can provide a wealth of pertinent information concerning the mechanical condition of rotating machinery, its incorporation into ASME testing criteria could merit a relaxation in the monthly-to-quarterly testing schedules that seek to verify and assure pump operability. Pump drivers are not included in the current battery of testing. Operational problems thought to be caused by pump degradation were found to be the result of motor degradation. Recent advances in nonintrusive monitoring techniques have made motor diagnostics a viable technology for assessing motor operability. Motor current/power analysis can detect rotor bar degradation and ascertain ranges of hydraulically unstable operation for a particular pump and motor set. The concept of using motor current or power fluctuations as an indicator of pump hydraulic load stability is presented.

  10. Biomolecular detection device

    Science.gov (United States)

    Huo, Qisheng [Albuquerque, NM; Liu, Jun [Albuquerque, NM

    2008-10-21

    A device for detecting and measuring the concentration of biomolecules in solution, utilizing a conducting electrode in contact with a solution containing target biomolecules, with a film with controllable pore size distribution characteristics applied to at least one surface of the conducting electrode. The film is functionalized with probe molecules that chemically interact with the target biomolecules at the film surface, blocking indicator molecules present in solution from diffusing from the solution to the electrode, thereby changing the electrochemical response of the electrode.

  11. Security From Detection (Vehicles)

    Science.gov (United States)

    2011-02-24

    Tester ( TVT ) or other TOP 02-2-615A 24 February 2011 5 similar device. Color vision can be assessed using the seven Ishihara Pseudo...Isochromatic plates usually contained in the TVT . b. Personnel chosen as observers for aural detectability tests must also have hearing ability...Test Test Measurement Diagnostic Equipment TOP Test Operations Procedure TVT Titmus® Vision Tester USMC United States Marine Corps

  12. Online deforestation detection

    OpenAIRE

    Diaz, Emiliano

    2017-01-01

    Deforestation detection using satellite images can make an important contribution to forest management. Current approaches can be broadly divided into those that compare two images taken at similar periods of the year and those that monitor changes by using multiple images taken during the growing season. The CMFDA algorithm described in Zhu et al. (2012) is an algorithm that builds on the latter category by implementing a year-long, continuous, time-series based approach to monitoring images...

  13. Asynchrony Detection in Amblyopes

    Directory of Open Access Journals (Sweden)

    Pi-Chun Huang

    2012-10-01

    Full Text Available Amblyopia is a developmental abnormality of visual cortex. Although amblyopes experience perceptual deficits in spatial vision tasks, they have less temporal sensitivity loss. We investigated whether their temporal synchrony sensitivity is impaired. In experiment 1, four Gaussian blobs, located at the top, bottom, left, and right of a presentation screen, were flickering in 3 Hz and one of them was flickering in out-of-phase fashion in time. Participants needed to tell which blob was different from the other three and contrast threshold of the blobs was measured to determine the synchrony detection threshold. We found the thresholds were not correlated with the contrast thresholds for detecting the flickering blobs, suggesting synchrony detection and temporal detection threshold are processed by different mechanisms. In experiment 2, synchrony thresholds were measured as participants' ability to tell if one of the four high contrast Gaussian blobs was flickering asynchronously in time. Three temporal frequencies (1, 2, and 3 Hz and two element separations (1.25 and 5 deg were compared. We found that the amblyopic group exhibited a deficit only for the 1.25 deg element separation in amblyopic eye but was normal for the other configurations compared to controlled participants. It suggests amblyopes have deficits in temporal processing but only for foveal vision. We also found the sensitivity for the non-strabismic anismetropia group is reduced for all three temporal frequencies whereas for the strabismic anisometropia group it was reduced at 3Hz only, suggesting the impairment in temporal synchrony might be different for different types of amblyopia.

  14. CDC Disease Detective Camp

    Centers for Disease Control (CDC) Podcasts

    2010-08-02

    The CDC Disease Detective Camp gives rising high school juniors and seniors exposure to key aspects of the CDC, including basic epidemiology, infectious and chronic disease tracking, public health law, and outbreak investigations. The camp also helps students explore careers in public health.  Created: 8/2/2010 by Centers for Disease Control and Prevention (CDC).   Date Released: 8/2/2010.

  15. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  16. Dark matter detection - II

    International Nuclear Information System (INIS)

    Zacek, Viktor

    2015-01-01

    The quest for the mysterious missing mass of the universe has become one of the big challenges of today's particle physics and cosmology. Astronomical observations show that only 1% of the matter of the universe is luminous. Moreover there is now convincing evidence that 85% of all gravitationally observable matter in the universe is of a new exotic kind, different from the 'ordinary' matter surrounding us. In a series of three lectures we discuss past, recent and future efforts made world-wide to detect and/or decipher the nature of Dark Matter. In Lecture I we review our present knowledge of the Dark Matter content of the Universe and how experimenters search for it's candidates; In Lecture II we discuss so-called 'direct detection' techniques which allow to search for scattering of galactic dark matter particles with detectors in deep-underground laboratories; we discuss the interpretation of experimental results and the challenges posed by different backgrounds; In Lecture III we take a look at the 'indirect detection' of the annihilation of dark matter candidates in astrophysical objects, such as our sun or the center of the Milky Way; In addition we will have a look at efforts to produce Dark Matter particles directly at accelerators and we shall close with a look at alternative nonparticle searches and future prospects. (author)

  17. Nonlinear Multiantenna Detection Methods

    Directory of Open Access Journals (Sweden)

    Chen Sheng

    2004-01-01

    Full Text Available A nonlinear detection technique designed for multiple-antenna assisted receivers employed in space-division multiple-access systems is investigated. We derive the optimal solution of the nonlinear spatial-processing assisted receiver for binary phase shift keying signalling, which we refer to as the Bayesian detector. It is shown that this optimal Bayesian receiver significantly outperforms the standard linear beamforming assisted receiver in terms of a reduced bit error rate, at the expense of an increased complexity, while the achievable system capacity is substantially enhanced with the advent of employing nonlinear detection. Specifically, when the spatial separation expressed in terms of the angle of arrival between the desired and interfering signals is below a certain threshold, a linear beamformer would fail to separate them, while a nonlinear detection assisted receiver is still capable of performing adequately. The adaptive implementation of the optimal Bayesian detector can be realized using a radial basis function network. Two techniques are presented for constructing block-data-based adaptive nonlinear multiple-antenna assisted receivers. One of them is based on the relevance vector machine invoked for classification, while the other on the orthogonal forward selection procedure combined with the Fisher ratio class-separability measure. A recursive sample-by-sample adaptation procedure is also proposed for training nonlinear detectors based on an amalgam of enhanced -means clustering techniques and the recursive least squares algorithm.

  18. Protein detection using biobarcodes.

    Science.gov (United States)

    Müller, Uwe R

    2006-10-01

    Over the past 50 years the development of assays for the detection of protein analytes has been driven by continuing demands for higher levels of sensitivity and multiplexing. The result has been a progression of sandwich-type immunoassays, starting with simple radioisotopic, colorimetric, or fluorescent labeling systems to include various enzymatic or nanostructure-based signal amplification schemes, with a concomitant sensitivity increase of over 1 million fold. Multiplexing of samples and tests has been enabled by microplate and microarray platforms, respectively, or lately by various molecular barcoding systems. Two different platforms have emerged as the current front-runners by combining a nucleic acid amplification step with the standard two-sided immunoassay. In both, the captured protein analyte is replaced by a multiplicity of oligonucleotides that serve as surrogate targets. One of these platforms employs DNA or RNA polymerases for the amplification step, while detection is by fluorescence. The other is based on gold nanoparticles for both amplification as well as detection. The latter technology, now termed Biobarcode, is completely enzyme-free and offers potentially much higher multiplexing power.

  19. Dark matter detection - I

    International Nuclear Information System (INIS)

    Zacek, Viktor

    2015-01-01

    The quest for the mysterious missing mass of the universe has become one of the big challenges of today's particle physics and cosmology. Astronomical observations show that only 1% of the matter of the universe is luminous. Moreover there is now convincing evidence that 85% of all gravitationally observable matter in the universe is of a new exotic kind, different from the 'ordinary' matter surrounding us. In a series of three lectures we discuss past, recent and future efforts made world-wide to detect and/or decipher the nature of Dark Matter. In Lecture I we review our present knowledge of the Dark Matter content of the Universe and how experimenters search for it's candidates; In Lecture II we discuss so-called 'direct detection' techniques which allow to search for scattering of galactic dark matter particles with detectors in deep-underground laboratories; we discuss the interpretation of experimental results and the challenges posed by different backgrounds; In Lecture III we take a look at the 'indirect detection' of the annihilation of dark matter candidates in astrophysical objects, such as our sun or the center of the Milky Way; In addition we will have a look at efforts to produce Dark Matter particles directly at accelerators and we shall close with a look at alternative nonparticle searches and future prospects. (author)

  20. Dark matter detection - III

    International Nuclear Information System (INIS)

    Zacek, Viktor

    2015-01-01

    The quest for the missing mass of the universe has become one of the big challenges of todays particle physics and cosmology. Astronomical observations show that only 1% of the matter of the Universe is luminous. Moreover there is now convincing evidence that 85% of all gravitationally observable matter in the Universe is of a new exotic kind, different from the 'ordinary' matter surrounding us. In a series of three lectures we discuss past, recent and future efforts made world- wide to detect and/or decipher the nature of Dark Matter. In Lecture I we review our present knowledge of the Dark Matter content of the Universe and how experimenters search for it's candidates; In Lecture II we discuss so-called 'direct detection' techniques which allow to search for scattering of galactic dark matter particles with detectors in deep-underground laboratories; we discuss the interpretation of experimental results and the challenges posed by different backgrounds; In Lecture III we take a look at the 'indirect detection' of the annihilation of dark matter candidates in astrophysical objects, such as our sun or the center of the Milky Way; In addition we will have a look at efforts to produce Dark Matter particles directly at accelerators and we shall close with a look at alternative nonparticle searches and future prospects. (author)

  1. SUERC AMS ion detection

    International Nuclear Information System (INIS)

    Maden, C.; Anastasi, P.A.F.; Dougans, A.; Freeman, S.P.H.T.; Kitchen, R.; Klody, G.; Schnabel, C.; Sundquist, M.; Vanner, K.; Xu, S.

    2007-01-01

    In a short time Be, C, Al, Cl, Ca and I accelerator mass spectrometry (AMS) have been established on the National Electrostatics Corporation (NEC) 5 MV pelletron system at the Scottish Universities Environmental Research Centre (SUERC). While summarising the present performance of the system, this report will focus on the details of ion detection, which sample materials are used and the analytical procedures employed for each individual species during routine analysis. All rare isotope detection is with a single flexible detector and ion event analysis system, but switching of analysed species typically requires a detector reconfiguration. Configurations for routine 10 Be, 14 C, 26 Al, 36 Cl, 41 Ca and 129 I detection have been established and will be presented here. Notably, there has proven to be sufficient suppression of the isobaric interferences of 36 Cl and 41 Ca in the 5+ charge state using an argon gas stripper at a terminal voltage of 5.0 MV to allow for routine analysis of these isotopes

  2. Gas Flow Detection System

    Science.gov (United States)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  3. Visualization of the renal venous system by renal arteriography with digital subtraction angiography

    International Nuclear Information System (INIS)

    Nagai, Jun

    1989-01-01

    The purpose of this study was to obtain vivid and precise images of intrarenal venous branching using DSA for renal arteriography. The type of system used was an ADAC DPS-4100C with 70-80 kVp, and 320 mA, 25-50 msec at 6 frames/sec. The duration was 10 sec and the matrix size was 512x512. In order to retain clear subtracted images of intrarenal venous branching with minimal noise the three frames were selected on the time-density curve of DSA: (Fig.3). 1) a frame on which renal arteries disappear (frame X), 2) the frame with highest renal venous density value as (frame Y), 3) the difference of the nephrogram density between X and Y frames in which only the density of the nephrogram decreases (frame Z). The mask image is the image subtracted by the equation of the weighted averaging method on X and Z frame and is subtracted from the image of Y frame in the final step. By this method, 40 kidneys in 36 patients were studied, and the intrarenal venous branches up to the interlobar vein was clearly demonstrated in 28 of these cases (70%). This method is useful to estimate the extent of intrarenal lesions and detect abnormal renal blood flow compared with conventional temporal subtraction method. (author)

  4. Detection of the neutrino

    International Nuclear Information System (INIS)

    Reines, F.

    1989-01-01

    Using the nuclear bomb developed at Los Alamos as an intense source of neutrinos, the author aimed to build a detector suitable to observe this newly predicted particle for the first time during his work there in the early 1950s. He chose to work on the reaction of beta decay inversion. The discovery of organic liquid scintillation counters brought the possibility of neutrino detection one place closer. Delayed coincidence between positron and neutron capture pulses were planned as a way to eliminate background signals. Experiments finally went ahead using nuclear reactors rather than bombs and was successful although many problems with shielding, and the sheer scale of the apparatus were encountered. (UK)

  5. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  6. High Speed Edge Detection

    Science.gov (United States)

    Prokop, Norman F (Inventor)

    2016-01-01

    Analog circuits for detecting edges in pixel arrays are disclosed. A comparator may be configured to receive an all pass signal and a low pass signal for a pixel intensity in an array of pixels. A latch may be configured to receive a counter signal and a latching signal from the comparator. The comparator may be configured to send the latching signal to the latch when the all pass signal is below the low pass signal minus an offset. The latch may be configured to hold a last negative edge location when the latching signal is received from the comparator.

  7. Traffic Light Detection

    DEFF Research Database (Denmark)

    Philipsen, Mark Philip; Jensen, Morten Bornø; Møgelmose, Andreas

    2015-01-01

    Traffic light recognition (TLR) is an integral part of any intelligent vehicle, which must function in the existing infrastructure. Pedestrian and sign detection have recently seen great improvements due to the introduction of learning based detectors using integral channel features. A similar push...... database is collected based on footage from US roads. The database consists of both test and training data, totaling 46,418 frames and 112,971 annotated traffic lights, captured in continuous sequences under a varying light and weather conditions. The learning based detector achieves an AUC of 0.4 and 0...

  8. Detecting flaws in welds

    International Nuclear Information System (INIS)

    Woodacre, A.; Lawton, H.

    1979-01-01

    An apparatus and a method for detecting flaws in welds in a workpiece, the portion of the workpiece containing the weld is maintained at a constant temperature and the weld is scanned by an infra red detector. The weld is then scanned again with the workpiece in contact with a cooling probe to produce a steeper temperature gradient across the weld. Comparison of the signals produced by each scan reveals the existence of defects in the welds. The signals may be displayed on an oscilloscope and the display may be observed by a TV camera and recorded on videotape. (UK)

  9. Opaque cloud detection

    Science.gov (United States)

    Roskovensky, John K [Albuquerque, NM

    2009-01-20

    A method of detecting clouds in a digital image comprising, for an area of the digital image, determining a reflectance value in at least three discrete electromagnetic spectrum bands, computing a first ratio of one reflectance value minus another reflectance value and the same two values added together, computing a second ratio of one reflectance value and another reflectance value, choosing one of the reflectance values, and concluding that an opaque cloud exists in the area if the results of each of the two computing steps and the choosing step fall within three corresponding predetermined ranges.

  10. Counterbalanced radiation detection system

    International Nuclear Information System (INIS)

    Platz, W.

    1987-01-01

    A counterbalanced radiation detection system is described comprising: (a) a stand; (b) a first radiation detector; (c) a first radiation detector arm means for tiltably connecting the first radiation detector with the stand; (d) a second radiation detector; (e) a second radiation detector arm means for tiltably connecting the second radiation detector with the stand, whereby the tilting angles of the radiation detector arm means define a distance between the radiation detectors; and (f) a torque transforming means connected between the first and second radiation detector arm means for transforming the torque created by one of the radiation detectors in a sense opposed to the torque created by the other radiation detector

  11. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  12. Novelty detection in dermatological images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel

    2003-01-01

    The problem of novelty detection is considered for at set of dermatological image data. Different points of view are analyzed in detail. First, novelty detection is treated as a contextual classification problem. Different learning phases can be detected when the sample size is increased. The det......The problem of novelty detection is considered for at set of dermatological image data. Different points of view are analyzed in detail. First, novelty detection is treated as a contextual classification problem. Different learning phases can be detected when the sample size is increased...

  13. Revolution in nuclear detection affairs

    International Nuclear Information System (INIS)

    Stern, Warren M.

    2014-01-01

    The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms

  14. Failed fuel detection device

    International Nuclear Information System (INIS)

    Kawai, Masayoshi; Hayashida, Yoshihisa; Niidome, Jiro.

    1985-01-01

    Purpose: To prevent intrusion of background neutrons to neutron detectors thereby improve the S/N ratio of the detectors in the failed fuel detection device of LMFBR type reactors. Constitution: Neutrons from the reactor core pass through the gaps around the penetration holes in which the primary pipeways pass through the concrete shielding walls and pass through the gaps between the thermal shielding members and the neutron moderating shielding members of the failed fuel detection device and then intrude into the neutron detectors. In view of the above, inner neutron moderating shielding members and movable or resilient neutron shielding members are disposed to the inside of the neutron moderating shielding member. Graphite or carbon hydrides such as paraffin or synthetic resin with a large neutron moderation effect are used as the outer moderating shielding member and materials such as boron or carbon are used for the inner members. As a result, the background neutrons are shielded by the inner neutron moderating shielding members and the resilient neutron shielding members, by which the S/N ratio of the neutron detectors can be increased to 2 - 4 times. (Moriyama, K.)

  15. Detection of interstellar methylcyanoacetylene

    International Nuclear Information System (INIS)

    Broten, N.W.; MacLeod, J.M.; Avery, L.W.; Irvine, W.M.; Hoeglund, B.; Friberg, P.; Hjalmarson

    1984-01-01

    A new interstellar molecule, methylcyanoacetylene (CH 3 C 3 N), has been detected in the molecular cloud TMC-1. The J = 8 → 7, J = 7 → 6, J = 6 → 5, and J = 5 → 4 transitions have been observed. For the first three of these, both the K = 0 and K = 1 components are present, while for J = 5 → 4, only the K = 0 line has been detected. The observed frequencies were calculated by assuming a value of radial velocity V/sub lSR/ = 5.8 km s -1 for TMC-1, typical of other molecules in the cloud. All Observed frequencies are within 10 kHz of the calculated frequencies, which are based on the 1982 laboratory constants of Moises et al., so the identification is secure. The lines are broadened by hyperfine splitting, and the J = 5 → 4, K = 0 transition shows incipient resolution into three hyperfine components. The rotational temperature determined from these observations is quite low, with 2.7 K 12 cm -2

  16. What value, detection limits

    International Nuclear Information System (INIS)

    Currie, L.A.

    1986-01-01

    Specific approaches and applications of LLD's to nuclear and ''nuclear-related'' measurements are presented in connection with work undertaken for the U.S. Nuclear Regulatory Commission and the International Atomic Energy Agency. In this work, special attention was given to assumptions and potential error sources, as well as to different types of analysis. For the former, the authors considered random and systematic error associated with the blank and the calibration and sample preparation processes, as well as issues relating to the nature of the random error distributions. Analysis types considered included continuous monitoring, ''simple counting'' involving scalar quantities, and spectrum fitting involving data vectors. The investigation of data matrices and multivariate analysis is also described. The most important conclusions derived from this study are: that there is a significant lack of communication and compatibility resulting from diverse terminology and conceptual bases - including no-basis ''ad hoc'' definitions; that the distinction between detection decisions and detection limits is frequently lost sight of; and that quite erroneous LOD estimates follow from inadequate consideration of the actual variability of the blank, and systematic error associated with the blank, the calibration-recovery factor, matrix effects, and ''black box'' data reduction models

  17. Detecting underabundant neutralinos

    CERN Document Server

    Badziak, Marcin; Olechowski, Marek; Pokorski, Stefan; Sakurai, Kazuki

    2015-01-01

    The electroweak sector may play a crucial role in discovering supersymmetry. We systematically investigate the patterns of the MSSM-like electroweakinos, when the neutralino relic abundance $\\Omega_\\chi h^2\\leq 0.12$, that is, also admitting for multi-component Dark Matter, in a broad range of the parameter space. We find that for a very large range of parameters the Direct Detection experiments are/will be sensitive to underabundant neutralinos, in spite of the strong rescaling of the flux factor. The second general conclusion is that the bound $\\Omega_\\chi h^2\\leq 0.12$ together with the LUX (XENON1T) limits for the neutralino spin independent scattering cross sections constrain the electroweakino spectrum so that the mass differences between the NLSP and the LSP are smaller than 40 (10) GeV, respectively, with important implications for the collider searches. The future Direct Detection experiments and the high luminosity LHC run will probe almost the entire range of the LSP and NLSP mass spectrum that is ...

  18. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  19. Detecting deviating behaviors without models

    NARCIS (Netherlands)

    Lu, X.; Fahland, D.; van den Biggelaar, F.J.H.M.; van der Aalst, W.M.P.; Reichert, M.; Reijers, H.A.

    2016-01-01

    Deviation detection is a set of techniques that identify deviations from normative processes in real process executions. These diagnostics are used to derive recommendations for improving business processes. Existing detection techniques identify deviations either only on the process instance level

  20. Multi-lane detection based on multiple vanishing points detection

    Science.gov (United States)

    Li, Chuanxiang; Nie, Yiming; Dai, Bin; Wu, Tao

    2015-03-01

    Lane detection plays a significant role in Advanced Driver Assistance Systems (ADAS) for intelligent vehicles. In this paper we present a multi-lane detection method based on multiple vanishing points detection. A new multi-lane model assumes that a single lane, which has two approximately parallel boundaries, may not parallel to others on road plane. Non-parallel lanes associate with different vanishing points. A biological plausibility model is used to detect multiple vanishing points and fit lane model. Experimental results show that the proposed method can detect both parallel lanes and non-parallel lanes.

  1. Nucleic acid detection system and method for detecting influenza

    Science.gov (United States)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  2. HARDWARE TROJAN IDENTIFICATION AND DETECTION

    OpenAIRE

    Samer Moein; Fayez Gebali; T. Aaron Gulliver; Abdulrahman Alkandari

    2017-01-01

    ABSTRACT The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques and the characteristics of existing hardware trojans is presented. This is used to dev...

  3. Microcontroller based driver alertness detection systems to detect drowsiness

    Science.gov (United States)

    Adenin, Hasibah; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    The advancement of embedded system for detecting and preventing drowsiness in a vehicle is a major challenge for road traffic accident systems. To prevent drowsiness while driving, it is necessary to have an alert system that can detect a decline in driver concentration and send a signal to the driver. Studies have shown that traffc accidents usually occur when the driver is distracted while driving. In this paper, we have reviewed a number of detection systems to monitor the concentration of a car driver and propose a portable Driver Alertness Detection System (DADS) to determine the level of concentration of the driver based on pixelated coloration detection technique using facial recognition. A portable camera will be placed at the front visor to capture facial expression and the eye activities. We evaluate DADS using 26 participants and have achieved 100% detection rate with good lighting condition and a low detection rate at night.

  4. Radioimmunological detection of parathormone

    International Nuclear Information System (INIS)

    Klueber, S.

    1978-01-01

    On the basis of the principle of competitive displacement of standard or proband hormone from the antibody by 125 I-labelled hormone, the structure of a radioimmunological PTH assay for humans is presented. In agreement with the pathophysiological knowledge gained during the last few years, i.e. that the C-terminal residual fragment-produced partly in the gland and partly by peripheral splitting of the total molecule secreted - circulates longer than the 1-34 N fragment containing the biologically active region, the C assay showed clearly increased hormone levels (more than 1 ng eq/ml) in the peripheral venous blood of HPT patients while the N assay showed a strong overlap of normal and HPT sera. The detection limit of 100pg eq/ml for both systems did not permit a discrimination between normal and reduced serum levels. (orig.) [de

  5. Early detection of psychosis

    DEFF Research Database (Denmark)

    Larsen, Tor Ketil; Melle, Ingrid; Auestad, B.

    2011-01-01

    Background During the last decades we have seen a new focus on early treatment of psychosis. Several reviews have shown that duration of untreated psychosis (DUP) is correlated to better outcome. However, it is still unknown whether early treatment will lead to a better long-term outcome....... This study reports the effects of reducing DUP on 5-year course and outcome. Method During 1997–2000 a total of 281 consecutive patients aged >17 years with first episode non-affective psychosis were recruited, of which 192 participated in the 5-year follow-up. A comprehensive early detection (ED) programme...... and cognitive factors and for global assessment of functioning for social functioning at 5-year follow-up. The ED group also had more contacts with friends. Regression analysis did not find that these differences could be explained by confounders. Conclusions Early treatment had positive effects on clinical...

  6. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  7. Failed fuel detection method

    International Nuclear Information System (INIS)

    Utamura, Motoaki; Urata, Megumu.

    1976-01-01

    Object: To detect failed fuel element in a reactor with high precision by measuring the radioactivity concentrations for more than one nuclides of fission products ( 131 I and 132 I, for example) contained in each sample of coolant in fuel channel. Method: The radioactivity concentrations in the sampled coolant are obtained from gamma spectra measured by a pulse height analyser after suitable cooling periods according to the half-lives of the fission products to be measured. The first measurement for 132 I is made in two hours after sampling, and the second for 131 I is started one day after the sampling. Fuel element corresponding to the high radioactivity concentrations for both 131 I and 132 I is expected with certainty to have failed

  8. Detection of diamonds

    International Nuclear Information System (INIS)

    Hansen, J.O.; Blondeel, E.J.G.; Taylor, G.T.

    1991-01-01

    Diamond particles are distinguished from non-diamond, associated particles on the basis of their higher refractive index. The particles are brought to a specific location, typically in a stream of water flowing full in a vertical duct, and a beam of collimated electromagnetic radiation is directed at them. An array of radiation detectors is provided to detect refracted and/or reflected radiation. The array is so configured that the responses of the detectors, considered collectively, will be indicative of the presence of a diamond when a diamond is in fact present. However, when a particle having a substantially lower refractive index is present, the responses of the detectors will not be so indicative. The diamond and non-diamond particles can subsequently be sorted from one another

  9. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  10. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  11. Online Community Transition Detection

    DEFF Research Database (Denmark)

    Tan, Biying; Zhu, Feida; Qu, Qiang

    2014-01-01

    communities over time. How to automatically detect the online community transitions of individual users is a research problem of immense practical value yet with great technical challenges. In this paper, we propose an algorithm based on the Minimum Description Length (MDL) principle to trace the evolution......Mining user behavior patterns in social networks is of great importance in user behavior analysis, targeted marketing, churn prediction and other applications. However, less effort has been made to study the evolution of user behavior in social communities. In particular, users join and leave...... of community transition of individual users, adaptive to the noisy behavior. Experiments on real data sets demonstrate the efficiency and effectiveness of our proposed method....

  12. Malware detection and analysis

    Science.gov (United States)

    Chiang, Ken; Lloyd, Levi; Crussell, Jonathan; Sanders, Benjamin; Erickson, Jeremy Lee; Fritz, David Jakob

    2016-03-22

    Embodiments of the invention describe systems and methods for malicious software detection and analysis. A binary executable comprising obfuscated malware on a host device may be received, and incident data indicating a time when the binary executable was received and identifying processes operating on the host device may be recorded. The binary executable is analyzed via a scalable plurality of execution environments, including one or more non-virtual execution environments and one or more virtual execution environments, to generate runtime data and deobfuscation data attributable to the binary executable. At least some of the runtime data and deobfuscation data attributable to the binary executable is stored in a shared database, while at least some of the incident data is stored in a private, non-shared database.

  13. Counterbalanced radiation detection device

    International Nuclear Information System (INIS)

    Platz, W.

    1986-01-01

    A counterbalanced radiation detection device is described which consists of: (a) a base; (b) a radiation detector having a known weight; (c) means connected with the radiation detector and the base for positioning the radiation detector in different heights with respect to the base; (d) electronic component means movably mounted on the base for counterbalancing the weight of the radiation detector; (e) means connected with the electronic component means and the radiation detector positioning means for positioning the electronic component means in different heights with respect to the base opposite to the heights of the radiation detector; (f) means connected with the radiation detector and the base for shifting the radiation detector horizontally with respect to the base; and (g) means connected with the electronic component means and the radiation detector shifting means for shifting the electronic component means horizontally with respect to the base in opposite direction to shifting of the radiation detector

  14. Arc fault detection system

    Science.gov (United States)

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  15. Automated asteroseismic peak detections

    DEFF Research Database (Denmark)

    de Montellano, Andres Garcia Saravia Ortiz; Hekker, S.; Themessl, N.

    2018-01-01

    Space observatories such as Kepler have provided data that can potentially revolutionize our understanding of stars. Through detailed asteroseismic analyses we are capable of determining fundamental stellar parameters and reveal the stellar internal structure with unprecedented accuracy. However......, such detailed analyses, known as peak bagging, have so far been obtained for only a small percentage of the observed stars while most of the scientific potential of the available data remains unexplored. One of the major challenges in peak bagging is identifying how many solar-like oscillation modes are visible...... of detected oscillation modes. The algorithm presented here opens the possibility for detailed and automated peak bagging of the thousands of solar-like oscillators observed by Kepler....

  16. Strategies of Life Detection

    CERN Document Server

    Botta, Oliver; Gomez-Elvira, Javier; Javaux, Emmanuelle; Selsis, Franck; Summons, Roger

    2008-01-01

    The search for life outside the Earth has been one of mankind's most challenging quests. We have reached a level of technology that allows for initial steps toward thorough scientific investigation. The aim of this workshop was to take an interdisciplinary look at the signatures that would be indicative of past or present life on another planet and compare them to biosignatures on Earth. The purpose of the workshop was also to discuss state-of-the-art in-situ instruments that are envisioned to search for these signatures in the exploration of the solar system, as well as the discussion of concepts descriptive of the search for habitable planets around other stars. This book is intended to provide a reference to scientists and instrument developers working in the field of in-situ and remote life detection. It can also be used as an interdisciplinary introduction for students and post-doctoral researchers entering this new and exciting field.

  17. Detection of gas leakage

    Science.gov (United States)

    Thornberg, Steven M; Brown, Jason

    2015-02-17

    A method of detecting leaks and measuring volumes as well as a device, the Power-free Pump Module (PPM), provides a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement. The PPM is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr) using a venturi pump, perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  18. Detection of diffusible substances

    Energy Technology Data Exchange (ETDEWEB)

    Warembourg, M [Lille-1 Univ., 59 - Villeneuve-d' Ascq (France)

    1976-12-01

    The different steps of a radioautographic technique for the detection of diffusible substances are described. Using this radioautographic method, the topographic distribution of estradiol-concentrating neurons was studied in the nervous system and pituitary of the ovariectomized mouse and guinea-pig. A relatively good morphological preservation of structures can be ascertained on sections from unfixed, unembedded tissues prepared at low temperatures and kept-under relatively low humidity. The translocation or extraction of diffusible substances is avoided by directly mounting of frozen sections on dried photographic emulsion. Since no solvent is used, this technique excludes the major sources of diffusion artifacts and permits to be in favourable conditions for the localization of diffusible substances.

  19. Detection of gas leakage

    Science.gov (United States)

    Thornberg, Steven [Peralta, NM; Brown, Jason [Albuquerque, NM

    2012-06-19

    A method of detecting leaks and measuring volumes as well as an apparatus, the Power-free Pump Module (PPM), that is a self-contained leak test and volume measurement apparatus that requires no external sources of electrical power during leak testing or volume measurement, where the invention is a portable, pneumatically-controlled instrument capable of generating a vacuum, calibrating volumes, and performing quantitative leak tests on a closed test system or device, all without the use of alternating current (AC) power. Capabilities include the ability is to provide a modest vacuum (less than 10 Torr), perform a pressure rise leak test, measure the gas's absolute pressure, and perform volume measurements. All operations are performed through a simple rotary control valve which controls pneumatically-operated manifold valves.

  20. Detection of anomalous events

    Science.gov (United States)

    Ferragut, Erik M.; Laska, Jason A.; Bridges, Robert A.

    2016-06-07

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can include a plurality of anomaly detectors that together implement an algorithm to identify low-probability events and detect atypical traffic patterns. The anomaly detector provides for comparability of disparate sources of data (e.g., network flow data and firewall logs.) Additionally, the anomaly detector allows for regulatability, meaning that the algorithm can be user configurable to adjust a number of false alerts. The anomaly detector can be used for a variety of probability density functions, including normal Gaussian distributions, irregular distributions, as well as functions associated with continuous or discrete variables.

  1. Digital quadrature phase detection

    Science.gov (United States)

    Smith, J.A.; Johnson, J.A.

    1992-05-26

    A system for detecting the phase of a frequency or phase modulated signal that includes digital quadrature sampling of the frequency or phase modulated signal at two times that are one quarter of a cycle of a reference signal apart, determination of the arctangent of the ratio of a first sampling of the frequency or phase modulated signal to the second sampling of the frequency or phase modulated signal, and a determination of quadrant in which the phase determination is increased by 2[pi] when the quadrant changes from the first quadrant to the fourth quadrant and decreased by 2[pi] when the quadrant changes from the fourth quadrant to the first quadrant whereby the absolute phase of the frequency or phase modulated signal can be determined using an arbitrary reference convention. 6 figs.

  2. Detection of elliptical contours

    International Nuclear Information System (INIS)

    Blokland, J.A.K.

    1987-01-01

    This dissertation describes the quantitation of myocardial perfusion defects in planar thallium-201 scintigrams. To be able to quantify the distribution of 201 Tl in the myocardium as imaged by the scintigram, accurate delineation of the target object is a prerequisite. The distribution of the radionuclide within the contour of the left ventricle can be described by application of circumferential profiles. By comparing the computed circumferential profile with those of normal subjects, humans with no evidence of coronary artery disease, segments of the left ventricle with decreased bloodflow can be detected. In practice there is no real standard to compare with, and due to noise and biological variations, it is not always possible to make a definite decision regarding the presence of a defect in the distribution of the radionuclide. The value and limitations of the developed quantification procedure are discussed. Some future developments are suggested. 108 refs.; 57 figs.; 5 tabs

  3. Suicide bomber detection

    Science.gov (United States)

    Alexander, Naomi; Callejero, Carlos; Fiore, Franco; Gómez, Ignacio; Gonzalo, Ramón; Enríquez de Luna, Álvaro; Ederra, Iñigo; Palacios, Inés

    2009-05-01

    The chance of suicide bomber attacks against troops in the Theatre of Operations is currently quite high. Most of the time checkpoints and compound gates are not equipped with the appropriate equipment to screen for potential suicide bombers. The ultimate solution would be to be able to perform stand-off screening under various weather conditions whilst avoiding contact between Force Protection personnel and potential suicide bombers. Radiation in the millimeterwave and the lower Terahertz range, having the useful property of being able to penetrate clothing in addition to fog and rain, makes it a clear candidate for imaging in this situation. A study has been made simulating real case scenarios to test practical detection performance and stand-off distances at a range of frequencies in this band, the results of which will be presented.

  4. Detecting drugs at customs

    International Nuclear Information System (INIS)

    Hibbert, D.B.

    1999-01-01

    The principle of measuring ions by their drift times at atmospheric pressure is not new, but it has been only recently that ion mobility spectrometry (IMS) has been realised as a powerful method of identifying certain molecules of importance at low concentrations. The impetus has arisen initially from the desire of the military to detect chemical warfare agents in the field but more recently has been taken up by police and customs services to monitor drugs of abuse and explosives. The Australian Customs Service (Border Technology) has purchased a number of IM spectrometers and has installed them in all international ports and airports. The first cases of persons apprehended for importation of controlled substances with evidence from IMS have appeared in the courts and the legal system is coming to terms with this new forensic tool. Ion mobility spectrometry may be thought of as time of flight mass spectrometry at atmospheric pressure. The presence of gas gives the possibility of a number of ion-molecule reactions, and the time taken to traverse drift tubes of a few centimetres at a field of typically 25 kV m -1 is around 10-20 ms. Ions are generated by a 63 Ni source, which ionises the carrier gas (dry air), which in turn ionises the injected analyte. Detection limits in the low ppb range are found for many substances. Details of sample collection, sensitivity and limitations of the ion mobility spectrometry are given. Extensions to IMS include the use of Fourier Transform method, electro spray and neural networks

  5. Radiographic detection of IGSCC

    International Nuclear Information System (INIS)

    Schonberg, R.G.

    1985-01-01

    One of the most troubling problems which the Nuclear Industry faces is Intergranular Stress Corrosion Cracking on BWR reactors. The detection and repair of pipe welds exhibiting possible flaws can easily exceed $100,000,000.00 (one hundred million dollars) per reactor, if a complete pipe replacement is necessary. Most of the detection work has involved use of ultrasonics to locate and in some cases approximate flaw depth. In Service inspection (ISI) of primary nuclear piping by means of radiography has not been possible in most cases because of the presence of relatively high background dose rates. Neither Iridium 192 or Cobalt 60 can be used for small wall pipe thicker than approximately 5 cm where background radiation exceeds 1 R/hr and the distance is about 1 meter F.F.D. through double wall water filled pipe. The other problem is meeting code requirements for penetrameter sensitivity with the large source size of a Cobalt source such as a 100 curies unit. Development of the MINAC, a highly portable high energy X-ray source, makes field radiography possible on thick section piping. Radiography through total steel thicknesses of up to 300 mm has been done with a 45 minute exposure with an F.F.D. of 1.6 meters. The delivered dose to the film was 2.0 Rads and produced a film density of 2.5 on Kodak AA film. Feasibility of use of the 4 MeV MINAC for high quality film radiography has been established. The focal spot size is 1.7 mm which assures good resolution even where short F.F.D.s are employed

  6. Early Detection Of Cancer

    Directory of Open Access Journals (Sweden)

    V B Bhatnagar

    1987-04-01

    Full Text Available Farly detection of cancer is based upon three fundamental assumptions, firstly that the trea'ment of benign and precancerous lesions reduces the incidence of cancer, secondly, that the treatment of in situ cancers is conducive to total cure and thirdly that early diagnosis and management of invasive cancer ensures be.ter survival. When patient seeks medical advice for vague symptoms, which could however be due to a possible malignant tumour at a particular site, the alert clinician should investigate the patient immediately to exclude cancer. At this stage cancer is usually not significantly advanced. Currently the U. I. C. C. (International Union for Cancer Control} is studying the epidemiology of cancers in various countries The importance of this is two folds : Firstly by focussing attention on a section of population vulnerable to a particular cancer an early detection is facilitated Secondly by changing the causative factors responsible to a particular cancer, the incidence of that cancer can be reduced e. g. reduction in lung cancer following campaigns against ciguette smoking and reductioi in breast cancer after campaigns for advocating breast feeding of infants, lowering fat consumption and encouraging self palpation of breast regularly. Indeed early diagnosis of cancer implies diagnosis of cancer in almost a symptomatic stage It involves motiva’ion of the population towards acquisitio : of knowledge, attitude and practice.. Epidemiologies and clinicians should be able to recognise high risk cases exposed to particular neoplasia and knowledge of alarming symptoms should be pro- pogated for wide publicity through common available media and means. Probable cases should have regular clhrcal examination periodically and relevant investigations including radiological, imaging techniques and Bio-Chemical examination should be undertaken as and when desired Suspicious lesions should be investigated by specific tests including smear cytology

  7. Supersymmetric dark matter: Indirect detection

    International Nuclear Information System (INIS)

    Bergstroem, L.

    2000-01-01

    Dark matter detection experiments are improving to the point where they can detect or restrict the primary particle physics candidates for non baryonic dark matter. The methods for detection are usually categorized as direct, i.e., searching for signals caused by passage of dark matter particles in terrestrial detectors, or indirect. Indirect detection methods include searching for antimatter and gamma rays, in particular gamma ray lines, in cosmic rays and high-energy neutrinos from the centre of the Earth or Sun caused by accretion and annihilation of dark matter particles. A review is given of recent progress in indirect detection, both on the theoretical and experimental side

  8. Statistical theory of signal detection

    CERN Document Server

    Helstrom, Carl Wilhelm; Costrell, L; Kandiah, K

    1968-01-01

    Statistical Theory of Signal Detection, Second Edition provides an elementary introduction to the theory of statistical testing of hypotheses that is related to the detection of signals in radar and communications technology. This book presents a comprehensive survey of digital communication systems. Organized into 11 chapters, this edition begins with an overview of the theory of signal detection and the typical detection problem. This text then examines the goals of the detection system, which are defined through an analogy with the testing of statistical hypotheses. Other chapters consider

  9. Detection Range of Airborne Magnetometers in Magnetic Anomaly Detection

    Directory of Open Access Journals (Sweden)

    Chengjing Li

    2015-11-01

    Full Text Available Airborne magnetometers are utilized for the small-range search, precise positioning, and identification of the ferromagnetic properties of underwater targets. As an important performance parameter of sensors, the detection range of airborne magnetometers is commonly set as a fixed value in references regardless of the influences of environment noise, target magnetic properties, and platform features in a classical model to detect airborne magnetic anomalies. As a consequence, deviation in detection ability analysis is observed. In this study, a novel detection range model is proposed on the basis of classic detection range models of airborne magnetometers. In this model, probability distribution is applied, and the magnetic properties of targets and the environment noise properties of a moving submarine are considered. The detection range model is also constructed by considering the distribution of the moving submarine during detection. A cell-averaging greatest-of-constant false alarm rate test method is also used to calculate the detection range of the model at a desired false alarm rate. The detection range model is then used to establish typical submarine search probabilistic models. Results show that the model can be used to evaluate not only the effects of ambient magnetic noise but also the moving and geomagnetic features of the target and airborne detection platform. The model can also be utilized to display the actual operating range of sensor systems.

  10. Detection of cryptic species

    International Nuclear Information System (INIS)

    Cockburn, A.F.; Jensen, T.; Seawright, J.A.

    1998-01-01

    Morphologically similar cryptic species are common in insects. In Anopheles mosquitoes morphologically described species are complexes of cryptic species. Cryptic species are of great practical importance for two reasons: first, one or more species of the complex might not be a pest and control efforts directed at the complex as a whole would therefore be partly wasted; and second, genetic (and perhaps biological) control strategies directed against one species of the complex would not affect other species of the complex. At least one SIT effort has failed because the released sterile insect were of a different species and therefore did not mate with the wild insects being targeted. We use a multidisciplinary approach for detection of cryptic species complexes, focusing first on identifying variability in wild populations using RFLPs of mitochondrial and ribosomal RNA genes (mtDNA and rDNA); followed by confirmation using a variety of other techniques. For rapid identification of wild individuals of field collections, we use a DNA dot blot assay. DNA probes can be isolated by differential screening, however we are currently focusing on the sequencing of the rDNA extragenic spacers. These regions are repeated several hundred times per genome in mosquitoes and evolve rapidly. Molecular drive tends to keen the individual genes homogeneous within a species. (author)

  11. Detection of cryptic species

    Energy Technology Data Exchange (ETDEWEB)

    Cockburn, A F; Jensen, T; Seawright, J A [United States Dept. of Agriculture, Agricultural Research Service, Medical and Veterinary Entomology Research Lab., Gainesville, FL (United States)

    1998-01-01

    Morphologically similar cryptic species are common in insects. In Anopheles mosquitoes morphologically described species are complexes of cryptic species. Cryptic species are of great practical importance for two reasons: first, one or more species of the complex might not be a pest and control efforts directed at the complex as a whole would therefore be partly wasted; and second, genetic (and perhaps biological) control strategies directed against one species of the complex would not affect other species of the complex. At least one SIT effort has failed because the released sterile insect were of a different species and therefore did not mate with the wild insects being targeted. We use a multidisciplinary approach for detection of cryptic species complexes, focusing first on identifying variability in wild populations using RFLPs of mitochondrial and ribosomal RNA genes (mtDNA and rDNA); followed by confirmation using a variety of other techniques. For rapid identification of wild individuals of field collections, we use a DNA dot blot assay. DNA probes can be isolated by differential screening, however we are currently focusing on the sequencing of the rDNA extragenic spacers. These regions are repeated several hundred times per genome in mosquitoes and evolve rapidly. Molecular drive tends to keen the individual genes homogeneous within a species. (author). 11 refs, 2 figs, 2 tabs.

  12. Multiple symbol differential detection

    Science.gov (United States)

    Divsalar, Dariush (Inventor); Simon, Marvin K. (Inventor)

    1991-01-01

    A differential detection technique for multiple phase shift keying (MPSK) signals is provided which uses a multiple symbol observation interval on the basis of which a joint decision is made regarding the phase of the received symbols. In accordance with the invention, a first difference phase is created between first and second received symbols. Next, the first difference phase is correlated with the possible values thereof to provide a first plurality of intermediate output signals. A second difference phase is next created between second and third received symbols. The second difference phase is correlated with plural possible values thereof to provide a second plurality of intermediate output signals. Next, a third difference phase is created between the first and third symbols. The third difference phase is correlated with plural possible values thereof to provide a third plurality of intermediate output signals. Each of the first plurality of intermediate outputs are combined with each of the second plurality of intermediate outputs and each of the third plurality of intermediate outputs to provide a plurality of possible output values. Finally, a joint decision is made by choosing from the plurality of possible output values the value which represents the best combined correlation of the first, second and third difference values with the possible values thereof.

  13. Detection of pump degradation

    International Nuclear Information System (INIS)

    Casada, D.

    1994-01-01

    There are a variety of stressors that can affect the operation of centrifugal pumps. Although these general stressors are active in essentially all centrifugal pumps, the stressor level and the extent of wear and degradation can vary greatly. Parameters that affect the extent of stressor activity are manifold. In order to assure the long-term operational readiness of a pump, it is important to both understand the nature and magnitude of the specific degradation mechanisms and to monitor the performance of the pump. The most commonly applied method of monitoring the condition of not only pumps, but rotating machinery in general, is vibration analysis. Periodic or continuous spectral vibration analysis is a cornerstone of most pump monitoring programs. In the nuclear industry, non-spectral vibration monitoring of safety-related pumps is performed in accordance with the ASME code. Although vibration analysis has dominated the condition monitoring field for many years, there are other measures that have been historically used to help understand pump condition: advances in historically applied technologies and developing technologies offer improved monitoring capabilities. The capabilities of several technologies (including vibration analysis, dynamic pressure analysis, and motor power analysis) to detect the presence and magnitude of both stressors and resultant degradation are discussed

  14. Detection of pump degradation

    International Nuclear Information System (INIS)

    Casada, D.

    1995-01-01

    There are a variety of stressors that can affect the operation of centrifugal pumps. Although these general stressors are active in essentially all centrifugal pumps, the stressor level and the extent of wear and degradation can vary greatly. Parameters that affect the extent of stressor activity are manifold. In order to assure the long-term operational readiness of a pump, it is important to both understand the nature and magnitude of the specific degradation mechanisms and to monitor the performance of the pump. The most commonly applied method of monitoring the condition of not only pumps, but rotating machinery in general, is vibration analysis. Periodic or continuous special vibration analysis is a cornerstone of most pump monitoring programs. In the nuclear industry, non-spectral vibration monitoring of safety-related pumps is performed in accordance with the ASME code. Pump head and flow rate are also monitored, per code requirements. Although vibration analysis has dominated the condition monitoring field for many years, there are other measures that have been historically used to help understand pump condition; advances in historically applied technologies and developing technologies offer improved monitoring capabilities. The capabilities of several technologies (including vibration analysis, dynamic pressure analysis, and motor power analysis) to detect the presence and magnitude of both stressors and resultant degradation are discussed

  15. Coolant leakage detecting device

    International Nuclear Information System (INIS)

    Yamauchi, Kiyoshi; Kawai, Katsunori; Ishihara, Yoshinao.

    1995-01-01

    The device of the present invention judges an amount of leakage of primary coolants of a PWR power plant at high speed. Namely, a mass of coolants contained in a pressurizer, a volume controlling tank and loop regions is obtained based on a preset relational formula and signals of each of process amount, summed up to determine the total mass of coolants for every period of time. The amount of leakage for every period of time is calculated by a formula of Karman's filter based on the total mass of the primary coolants for every predetermined period of time, and displays it on CRT. The Karman's filter is formed on every formula for several kinds of states formed based on the preset amount of the leakage, to calculate forecasting values for every mass of coolants. An adaptable probability for every preset leakage amount is determined based on the difference between the forecast value and the observed value and the scattering thereof. The adaptable probability is compared with a predetermined threshold value, which is displayed on the CRT. This device enables earlier detection of leakage and identification of minute leakage amount as compared with the prior device. (I.S.)

  16. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  17. MUSIC algorithms for rebar detection

    International Nuclear Information System (INIS)

    Solimene, Raffaele; Leone, Giovanni; Dell’Aversano, Angela

    2013-01-01

    The MUSIC (MUltiple SIgnal Classification) algorithm is employed to detect and localize an unknown number of scattering objects which are small in size as compared to the wavelength. The ensemble of objects to be detected consists of both strong and weak scatterers. This represents a scattering environment challenging for detection purposes as strong scatterers tend to mask the weak ones. Consequently, the detection of more weakly scattering objects is not always guaranteed and can be completely impaired when the noise corrupting data is of a relatively high level. To overcome this drawback, here a new technique is proposed, starting from the idea of applying a two-stage MUSIC algorithm. In the first stage strong scatterers are detected. Then, information concerning their number and location is employed in the second stage focusing only on the weak scatterers. The role of an adequate scattering model is emphasized to improve drastically detection performance in realistic scenarios. (paper)

  18. THE APPROACHING TRAIN DETECTION ALGORITHM

    OpenAIRE

    S. V. Bibikov

    2015-01-01

    The paper deals with detection algorithm for rail vibroacoustic waves caused by approaching train on the background of increased noise. The urgency of algorithm development for train detection in view of increased rail noise, when railway lines are close to roads or road intersections is justified. The algorithm is based on the method of weak signals detection in a noisy environment. The information statistics ultimate expression is adjusted. We present the results of algorithm research and t...

  19. Decentralised firewall for malware detection

    OpenAIRE

    Raje, Saurabh; Vaderia, Shyamal; Wilson, Neil; Panigrahi, Rudrakh

    2017-01-01

    This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology. The detection engine aims to classify Portable Executable (PE) files as malicious or benign. File classification is carried out using a deep belief neural network (DBN) as the detection engine. Our approach is to model the files as grayscale images and use the DBN to classify those images into the aforementioned two ...

  20. Detection of signals in noise

    CERN Document Server

    McDonough, Robert N

    1995-01-01

    The Second Edition is an updated revision to the authors highly successful and widely used introduction to the principles and application of the statistical theory of signal detection. This book emphasizes those theories that have been found to be particularly useful in practice including principles applied to detection problems encountered in digital communications, radar, and sonar.Detection processing based upon the fast Fourier transform

  1. Subband Energy Detection in Passive Array Processing

    National Research Council Canada - National Science Library

    Bono, Michael

    2000-01-01

    ...), which includes both Subband Peak Energy Detection (SPED) and Subband Extrema Energy Detection (SEED). It will be shown that SED has several performance advantages over Conventional Energy Detection...

  2. Change Detection in Social Networks

    National Research Council Canada - National Science Library

    McCulloh, Ian; Webb, Matthew; Graham, John; Carley, Kathleen; Horn, Daniel B

    2008-01-01

    .... This project proposes a new method for detecting change in social networks over time, by applying a cumulative sum statistical process control statistic to normally distributed network measures...

  3. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  4. Measurement and detection of radiation

    National Research Council Canada - National Science Library

    Tsoulfanidis, Nicholas; Landsberger, Sheldon

    2011-01-01

    .... With the miniaturization of equipment, increased speed of electronic components, and more sophisticated software, radiation detection systems are now more productively used in many disciplines...

  5. Dark matter and its detection

    International Nuclear Information System (INIS)

    Bi Xiaojun; Qin Bo

    2011-01-01

    We first explain the concept of dark matter,then review the history of its discovery and the evidence of its existence. We describe our understanding of the nature of dark matter particles, the popular dark matter models,and why the weakly interacting massive particles (called WIMPs) are the most attractive candidates for dark matter. Then we introduce the three methods of dark matter detection: colliders, direct detection and indirect detection. Finally, we review the recent development of dark matter detection, including the new results from DAMA, CoGent, PAMELA, ATIC and Fermi. (authors)

  6. Detection of signals in noise

    CERN Document Server

    Whalen, Anthony D; Declaris, Nicholas

    1971-01-01

    Detection of Signals in Noise serves as an introduction to the principles and applications of the statistical theory of signal detection. The book discusses probability and random processes; narrowband signals, their complex representation, and their properties described with the aid of the Hilbert transform; and Gaussian-derived processes. The text also describes the application of hypothesis testing for the detection of signals and the fundamentals required for statistical detection of signals in noise. Problem exercises, references, and a supplementary bibliography are included after each c

  7. Adaptive filtering and change detection

    CERN Document Server

    Gustafsson, Fredrik

    2003-01-01

    Adaptive filtering is a classical branch of digital signal processing (DSP). Industrial interest in adaptive filtering grows continuously with the increase in computer performance that allows ever more conplex algorithms to be run in real-time. Change detection is a type of adaptive filtering for non-stationary signals and is also the basic tool in fault detection and diagnosis. Often considered as separate subjects Adaptive Filtering and Change Detection bridges a gap in the literature with a unified treatment of these areas, emphasizing that change detection is a natural extensi

  8. Eu-Detect: An algorithm for detecting eukaryotic sequences in ...

    Indian Academy of Sciences (India)

    Supplementary figure 1. Plots depicting the classification accuracy of Eu-Detect with various combinations of. 'cumulative sequence count' (40K, 50K, 60K, 70K, 80K) and 'coverage threshold' (20%, 30%, 40%, 50%, 60%, 70%,. 80%). While blue bars represent Eu-Detect's average classification accuracy with eukaryotic ...

  9. In-plane object detection : detection algorithms and visibility problems

    NARCIS (Netherlands)

    Jovanovic, N.

    2011-01-01

    A large number of devices today incorporate some form of detection of objects and people in a given environment. Various detection technologies have been developed over the years, as a response to many different demands. The devices such as video surveillance systems, scanners, touch screens and

  10. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  11. Detecting suicidality on Twitter

    Directory of Open Access Journals (Sweden)

    Bridianne O'Dea

    2015-05-01

    Full Text Available Twitter is increasingly investigated as a means of detecting mental health status, including depression and suicidality, in the population. However, validated and reliable methods are not yet fully established. This study aimed to examine whether the level of concern for a suicide-related post on Twitter could be determined based solely on the content of the post, as judged by human coders and then replicated by machine learning. From 18th February 2014 to 23rd April 2014, Twitter was monitored for a series of suicide-related phrases and terms using the public Application Program Interface (API. Matching tweets were stored in a data annotation tool developed by the Commonwealth Scientific and Industrial Research Organisation (CSIRO. During this time, 14,701 suicide-related tweets were collected: 14% were randomly (n = 2000 selected and divided into two equal sets (Set A and B for coding by human researchers. Overall, 14% of suicide-related tweets were classified as ‘strongly concerning’, with the majority coded as ‘possibly concerning’ (56% and the remainder (29% considered ‘safe to ignore’. The overall agreement rate among the human coders was 76% (average κ = 0.55. Machine learning processes were subsequently applied to assess whether a ‘strongly concerning’ tweet could be identified automatically. The computer classifier correctly identified 80% of ‘strongly concerning’ tweets and showed increasing gains in accuracy; however, future improvements are necessary as a plateau was not reached as the amount of data increased. The current study demonstrated that it is possible to distinguish the level of concern among suicide-related tweets, using both human coders and an automatic machine classifier. Importantly, the machine classifier replicated the accuracy of the human coders. The findings confirmed that Twitter is used by individuals to express suicidality and that such posts evoked a level of concern that warranted

  12. Control rod position detection device

    International Nuclear Information System (INIS)

    Akita, Haruo; Ogiwara, Sakae.

    1996-01-01

    The device of the present invention is used in a back-up shut down system of an LMFBR type reactor which is easy for maintenance, has high reliability and can recognize the position of control rods accurately. Namely, a permanent magnet is disposed to a control rod extension tube connected to the lower portion of the control rod. The detector guide tube is disposed in the vicinity of the control rod extension tube. A detector having a detection coil is inserted into a detector tube. With such constitution, the control rod can be detected at one position using the following method. (1) the movement of the magnetic field of the permanent magnet is detected by the detection coil. (2) a plurality of grooves are formed on the control rod extension tube, and the movement of the grooves is detected. In addition, the detection coil is inserted into the detector guide tube, and the signals from the detection coil are inputted to a signal processing circuit disposed at the outside of the reactor vessel using an MI cable to enable the maintenance of the detector. Further, if the detector comprises a detection coil and an excitation coil, the position of a dropped control rod can be recognized at a plurality of points. (I.S.)

  13. Candida infections : detection and epidemiology

    NARCIS (Netherlands)

    Borst, A. (Annemarie)

    2002-01-01

    Despite the fact that the yeast Candida is the number 4 cause of bloodstream infections in the United States and ranks number 8 in Europe, adequate detection methods are lacking. Furthermore, relatively little is known about the epidemiology of Candida. Our aim was to improve the detection and

  14. Learning to Detect Traffic Signs

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Trivedi, Mohan M.; Moeslund, Thomas B.

    2012-01-01

    This study compares the performance of sign detection based on synthetic training data to the performance of detection based on real-world training images. Viola-Jones detectors are created for 4 different traffic signs with both synthetic and real data, and varying numbers of training samples. T...

  15. Tumor detection using feature extraction

    International Nuclear Information System (INIS)

    Sankar, A.S.; Amudhavalli, N.; Sivakolundu, M.K.

    2008-01-01

    The assistance system for brain tumor detection helps the doctor to analyse the brain tumor in MRI image and help to make decision. The manual detection system takes 3 -5 hours time to analyse the tumor. Doctors are in a position to analyze the tumor faster and make a correct decision with an assistance system

  16. Data Mining for Intrusion Detection

    Science.gov (United States)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  17. Decoupling Object Detection and Categorization

    Science.gov (United States)

    Mack, Michael L.; Palmeri, Thomas J.

    2010-01-01

    We investigated whether there exists a behavioral dependency between object detection and categorization. Previous work (Grill-Spector & Kanwisher, 2005) suggests that object detection and basic-level categorization may be the very same perceptual mechanism: As objects are parsed from the background they are categorized at the basic level. In…

  18. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon

  19. A Voltage Quality Detection Method

    DEFF Research Database (Denmark)

    Chen, Zhe; Wei, Mu

    2008-01-01

    This paper presents a voltage quality detection method based on a phase-locked loop (PLL) technique. The technique can detect the voltage magnitude and phase angle of each individual phase under both normal and fault power system conditions. The proposed method has the potential to evaluate various...

  20. Caries detection in dental radiographs

    International Nuclear Information System (INIS)

    Dunn, S.M.

    1987-01-01

    Caries, or the decay of teeth are difficult to automatically detect in dental radiographs because of the small area of the image that is occupied by the decay. Images of dental radiographs has distinct regions of homogeneous gray levels, and therefore naturally lead to a segmentation based automatic caries detection algorithm. This paper describes a method for caries detection based on a multiclass, area independent thresholding and segmenting scheme. This multiclass thresholding algorithm is an extension of the uniform error threshold, an area independent, distribution free thresholding method used for images of only two classes of objects. The authors first consider the problem of caries detection and the image features that characterize the presence of caries. Next, the uniform error threshold is reviewed, and the general multiclass uniform error threshold algorithm is presented. This algorithm is used to automatically detect caries in dental radiographs

  1. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  2. Rapid deployment intrusion detection system

    International Nuclear Information System (INIS)

    Graham, R.H.

    1997-01-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs

  3. The detection of criticality accidents

    International Nuclear Information System (INIS)

    Prigent, R.; Renard, C.

    It is necessary to shield the personnel from the radiological consequences of a criticality accident. In the past ten years the study programmes have highlighted fresh data which have led to new thinking on the detection philosophy and as a consequence the design of detection equipment. Concurrently, new recommendations have been drawn up by the Safety Criticality Committee. The new detection equipment was developed by the CEA on the basis of the CRAC and SILENE experiments. Its industrialization was entrusted to the Intertechnique Company and the first network installed dates back to 1976. An examination is made of the problem of accident detection, dealing in turn with detection, the characteristics of the equipment and the installation rules. To clarify the various points discussed, a parallel has been drawn between the equipment existing up to 1975 and the new generation developed since then [fr

  4. Ion detection in mass spectrometry

    International Nuclear Information System (INIS)

    Bolbach, Gerard

    2016-03-01

    This course aims at providing some elements for a better understanding of ion detectors used in mass spectrometers, of their operations, and of their limitations. A first part addresses the functions and properties of an ideal detector, how to detect ions in gas phase, and particle detectors and ion detectors used in mass spectrometry. The second part proposes an overview of currently used detectors with respect to their operation principle: detection from the ion charge (Faraday cylinder), detection by inductive effects (FTICR, Fourier Transform Ion Cyclotron Resonance), and detection by secondary electron emission. The third part discusses the specificities of secondary electron emission. The fourth one addresses operating modes and parameters related to detectors. The sixth part proposes a prospective view on future detectors by addressing the following issues: cryo-detector, inductive effect and charge detectors, ion detection and nano materials

  5. Particle detection systems and methods

    Science.gov (United States)

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  6. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  7. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  8. Track-before-detect procedures for detection of extended object

    Science.gov (United States)

    Fan, Ling; Zhang, Xiaoling; Shi, Jun

    2011-12-01

    In this article, we present a particle filter (PF)-based track-before-detect (PF TBD) procedure for detection of extended objects whose shape is modeled by an ellipse. By incorporating of an existence variable and the target shape parameters into the state vector, the proposed algorithm performs joint estimation of the target presence/absence, trajectory and shape parameters under unknown nuisance parameters (target power and noise variance). Simulation results show that the proposed algorithm has good detection and tracking capabilities for extended objects.

  9. Track-before-detect procedures for detection of extended object

    Directory of Open Access Journals (Sweden)

    Fan Ling

    2011-01-01

    Full Text Available Abstract In this article, we present a particle filter (PF-based track-before-detect (PF TBD procedure for detection of extended objects whose shape is modeled by an ellipse. By incorporating of an existence variable and the target shape parameters into the state vector, the proposed algorithm performs joint estimation of the target presence/absence, trajectory and shape parameters under unknown nuisance parameters (target power and noise variance. Simulation results show that the proposed algorithm has good detection and tracking capabilities for extended objects.

  10. Neutrons detection by scintillation; Detection de neutrons par scintillations

    Energy Technology Data Exchange (ETDEWEB)

    Giraudon, J [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1955-01-15

    The absence of charge of neutrons and their elevated penetration power make difficult their detection. Techniques vary otherwise with the energy of the particle. The author proposes the realization of a scintillation detector with a big volume of liquid scintillator and containing boron for the detection of slowing-down neutrons in the domain of intermediate energies from 1 to 10{sup 5} eV about. (M.B.) [French] L'absence de charge du neutron et son pouvoir de penetration eleve rendent difficile sa detection. Les techniques par ailleurs varient avec l'energie de cette particule. L'auteur propose la realisation d'un detecteur a scintillations comprenant un grand volume de scintillateur liquide et contenant du bore pour la detection des neutrons en ralentissement dans le domaine des energies intermediaires de 1 a 10{sup 5} eV environ. (M.B.)

  11. Potential fire detection based on Kalman-driven change detection

    CSIR Research Space (South Africa)

    Van Den Bergh, F

    2009-07-01

    Full Text Available A new active fire event detection algorithm for data collected with the Spinning Enhanced Visible and Infrared Imager (SEVIRI) sensor, based on the extended Kalman filter, is introduced. Instead of using the observed temperatures of the spatial...

  12. Neutrons detection by scintillation; Detection de neutrons par scintillations

    Energy Technology Data Exchange (ETDEWEB)

    Giraudon, J. [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1955-01-15

    The absence of charge of neutrons and their elevated penetration power make difficult their detection. Techniques vary otherwise with the energy of the particle. The author proposes the realization of a scintillation detector with a big volume of liquid scintillator and containing boron for the detection of slowing-down neutrons in the domain of intermediate energies from 1 to 10{sup 5} eV about. (M.B.) [French] L'absence de charge du neutron et son pouvoir de penetration eleve rendent difficile sa detection. Les techniques par ailleurs varient avec l'energie de cette particule. L'auteur propose la realisation d'un detecteur a scintillations comprenant un grand volume de scintillateur liquide et contenant du bore pour la detection des neutrons en ralentissement dans le domaine des energies intermediaires de 1 a 10{sup 5} eV environ. (M.B.)

  13. Energy conservation using face detection

    Science.gov (United States)

    Deotale, Nilesh T.; Kalbande, Dhananjay R.; Mishra, Akassh A.

    2011-10-01

    Computerized Face Detection, is concerned with the difficult task of converting a video signal of a person to written text. It has several applications like face recognition, simultaneous multiple face processing, biometrics, security, video surveillance, human computer interface, image database management, digital cameras use face detection for autofocus, selecting regions of interest in photo slideshows that use a pan-and-scale and The Present Paper deals with energy conservation using face detection. Automating the process to a computer requires the use of various image processing techniques. There are various methods that can be used for Face Detection such as Contour tracking methods, Template matching, Controlled background, Model based, Motion based and color based. Basically, the video of the subject are converted into images are further selected manually for processing. However, several factors like poor illumination, movement of face, viewpoint-dependent Physical appearance, Acquisition geometry, Imaging conditions, Compression artifacts makes Face detection difficult. This paper reports an algorithm for conservation of energy using face detection for various devices. The present paper suggests Energy Conservation can be done by Detecting the Face and reducing the brightness of complete image and then adjusting the brightness of the particular area of an image where the face is located using histogram equalization.

  14. Robotic Detection of Marine Litter Using Deep Visual Detection Models

    OpenAIRE

    Fulton, Michael; Hong, Jungseok; Islam, Md Jahidul; Sattar, Junaed

    2018-01-01

    Trash deposits in aquatic environments have a destructive effect on marine ecosystems and pose a long-term economic and environmental threat. Autonomous underwater vehicles (AUVs) could very well contribute to the solution of this problem by finding and eventually removing trash. A step towards this goal is the successful detection of trash in underwater environments. This paper evaluates a number of deep-learning algorithms to the task of visually detecting trash in realistic underwater envi...

  15. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  16. Robust Adaptable Video Copy Detection

    DEFF Research Database (Denmark)

    Assent, Ira; Kremer, Hardy

    2009-01-01

    in contrast). Our query processing combines filtering and indexing structures for efficient multistep computation of video copies under this model. We show that our model successfully identifies altered video copies and does so more reliably than existing models.......Video copy detection should be capable of identifying video copies subject to alterations e.g. in video contrast or frame rates. We propose a video copy detection scheme that allows for adaptable detection of videos that are altered temporally (e.g. frame rate change) and/or visually (e.g. change...

  17. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  18. Microconductometric Detection of Bacterial Contamination

    Directory of Open Access Journals (Sweden)

    Sarra EL ICHI

    2014-05-01

    Full Text Available Several approaches can be used for the electrochemical detection of bacterial contamination. Their performance can be assessed by the ability to detect bacteria at very low concentrations within a short-time response. We have already demonstrated that a conductometric biosensor based on interdigitated thin-film electrodes is adapted to detect bacteria in clinical samples like serum and compatible with microfluidic fabrication. The type of interdigitated microelectrodes influences the performance of the biosensor. This was shown by the results obtained in this work. A magnetic-nanoparticles based immunosensor was designed using gold screen-printed electrodes. The immunosensor was able to specifically detect E. coli in the range of 1-103 CFU mL-1. The new transducer offered a larger active sensing surface with a lower cost and a robust material. Accuracy of the conductance value was enhanced by differential measurements. The immunosensor is compatible with a microfluidic system.

  19. Research on driver fatigue detection

    Science.gov (United States)

    Zhang, Ting; Chen, Zhong; Ouyang, Chao

    2018-03-01

    Driver fatigue is one of the main causes of frequent traffic accidents. In this case, driver fatigue detection system has very important significance in avoiding traffic accidents. This paper presents a real-time method based on fusion of multiple facial features, including eye closure, yawn and head movement. The eye state is classified as being open or closed by a linear SVM classifier trained using HOG features of the detected eye. The mouth state is determined according to the width-height ratio of the mouth. The head movement is detected by head pitch angle calculated by facial landmark. The driver's fatigue state can be reasoned by the model trained by above features. According to experimental results, drive fatigue detection obtains an excellent performance. It indicates that the developed method is valuable for the application of avoiding traffic accidents caused by driver's fatigue.

  20. Standoff Detection Technology Evaluation Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Standoff Detection Technology Evaluation facility is the only one of its kind in the country and allows researchers to release a known amount of material while...

  1. Marfan's Syndrome: Detection and Management.

    Science.gov (United States)

    Cantwell, John D.

    1986-01-01

    Marfan's Syndrome, a disorder of connective tissue, has gained increased attention since the death of volleyball star Flo Hyman. This article reviews the disease and discusses methods of detection and management. (Author/MT)

  2. Trends In Android Malware Detection

    Directory of Open Access Journals (Sweden)

    Kaveh Shaerpour

    2013-09-01

    Full Text Available This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the review have been well documented in this paper to aid those making an effort to research in the area of Android malware detection by understanding the current scenario and developments that have happened in the field thus far.

  3. Detection Limits for Nanoscale Biosensors

    National Research Council Canada - National Science Library

    Sheehan, Paul E; Whitman, Lloyd J

    2005-01-01

    We examine through analytical calculations and finite element simulations how the detection efficiency of disk and wire-like biosensors in unmixed fluids varies with size from the micrometer to nanometer scales...

  4. Measurement and detection of radiation

    CERN Document Server

    Tsoulfanidis, Nicholas

    2011-01-01

    This is an update of the standard textbook for the field of radiation measurement. It includes illustrative examples and new problems. The research and applications of nuclear instrumentation have grown substantially since publication of the previous editions. With the miniaturization of equipment, increased speed of electronic components, and more sophisticated software, radiation detection systems are now more productively used in many disciplines, including nuclear nonproliferation, homeland security, and nuclear medicine. Continuing in the tradition of its bestselling predecessors, "Measurement and Detection of Radiation, Third Edition" illustrates the fundamentals of nuclear interactions and radiation detection with a multitude of examples and problems. It offers a clearly written, accessible introduction to nuclear instrumentation concepts. The following are new to the third edition: a new chapter on the latest applications of radiation detection, covering nuclear medicine, dosimetry, health physics, no...

  5. Nanotechnology for Early Cancer Detection

    Directory of Open Access Journals (Sweden)

    Joon Won Park

    2010-01-01

    Full Text Available Vast numbers of studies and developments in the nanotechnology area have been conducted and many nanomaterials have been utilized to detect cancers at early stages. Nanomaterials have unique physical, optical and electrical properties that have proven to be very useful in sensing. Quantum dots, gold nanoparticles, magnetic nanoparticles, carbon nanotubes, gold nanowires and many other materials have been developed over the years, alongside the discovery of a wide range of biomarkers to lower the detection limit of cancer biomarkers. Proteins, antibody fragments, DNA fragments, and RNA fragments are the base of cancer biomarkers and have been used as targets in cancer detection and monitoring. It is highly anticipated that in the near future, we might be able to detect cancer at a very early stage, providing a much higher chance of treatment.

  6. Leak detection : Principles and practice

    International Nuclear Information System (INIS)

    Rama Rao, V.V.K.

    1981-01-01

    Principles of leak detection are explained and various aspects of leak detection techniques and leak detectors are reviewed. The review covers: units for leaks and leak tightness, classification of leaks, timing of leak testing, designing for ease of leak testing of any job, methods of leak detection, their ranges of application and limitations, leak detectors, response time of leak test, minimum detectable concentration of search gas during leak tests, and validity of leak tests. Helium mass spectrometer type leak detector and technique are described in detail. Recent improvements in leak detectors and techniques, particularly mass spectrometer leak detectors using gases other than helium (e.g. hydrogen, argon) are also covered in the review. (M.G.B.)

  7. Novelty Detection via Answer Updating

    National Research Council Canada - National Science Library

    Li, Xiaoyan; Croft, W. B

    2004-01-01

    .... Specifically, we explore the use of question-answering techniques for novelty detection. New information is defined as new/previously unseen answers to questions representing a user's information need...

  8. Predictive coding in Agency Detection

    DEFF Research Database (Denmark)

    Andersen, Marc Malmdorf

    2017-01-01

    Agency detection is a central concept in the cognitive science of religion (CSR). Experimental studies, however, have so far failed to lend support to some of the most common predictions that follow from current theories on agency detection. In this article, I argue that predictive coding, a highly...... promising new framework for understanding perception and action, may solve pending theoretical inconsistencies in agency detection research, account for the puzzling experimental findings mentioned above, and provide hypotheses for future experimental testing. Predictive coding explains how the brain......, unbeknownst to consciousness, engages in sophisticated Bayesian statistics in an effort to constantly predict the hidden causes of sensory input. My fundamental argument is that most false positives in agency detection can be seen as the result of top-down interference in a Bayesian system generating high...

  9. Resonance detection of Moessbauer radiation

    International Nuclear Information System (INIS)

    Morozov, V.V.

    1985-01-01

    The resonance detection method as compared with the usual method of registering Moessbauer spectra has a number of advantages, one of which is the increase of resolution of the Moessbauer spectrum. The method is based on the modulation of a secondary radiation of a converter tuned in the resonance with the Moessbauer gamma-quantum source. The resonance detection method with account of supression, secondary radiation outgoing from the converter is investigated. The converter represents a substrate enriched by the Moessbauer isotope placed either inside the gas counter, or coupled with any other detecting device. Analytical expressions for Moessbauer spectrum parameters: effect, area and width of the spectral line are derived. It is shown that the joint application of usual and resonance detection methods for registering the Moessbauer spectrum allows one to determine parameters of the source, converter and the investigated absorber

  10. The detection of gravitational waves

    CERN Document Server

    Barish, Barry C

    1996-01-01

    General Relativity predicts the emission of gravitanional waves whenever compact concentrations of energy change shape. This could occur in a variety of astrophysical phenomena. For example, the coalescence of binary systems such as a pair of neutron stars or black holes emit gravitanional waves that propagate through space at the speed of light, and in principle, can be directly detected on the earth's surface. This lecture series will review the possible sources of gravitanional waves and the various approaches toward detection, with special emphasis on long baseline interferometer detectors. The Laser Interferometer Gravitanional Wave Observatory (LIGO) is being constructed with a goal to detect these waves and then to use them as a new tool to explore and study the Universe. The sources of gravitanional waves and techniques for detection will be presented, as well as the status and prospects for the LIGO project.

  11. Low level photoneutron detection equipment

    International Nuclear Information System (INIS)

    Ji Changsong; Zhang Yuqin; Li Yuansui

    1991-01-01

    A low level photoneutron detection equipment has been developed. The photoneutrons produced by interaction of 226 Ra gamma quanta and deutron (D) target are detected with n-n discrimination detector made up of 3 He proportional counter array. The D-content information in the target can be obtained from the measured photoneutron counts. The equipment developed is mainly used for nondestructive D-content measurement of D-devices

  12. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  13. Community Detection for Large Graphs

    KAUST Repository

    Peng, Chengbin

    2014-05-04

    Many real world networks have inherent community structures, including social networks, transportation networks, biological networks, etc. For large scale networks with millions or billions of nodes in real-world applications, accelerating current community detection algorithms is in demand, and we present two approaches to tackle this issue -A K-core based framework that can accelerate existing community detection algorithms significantly; -A parallel inference algorithm via stochastic block models that can distribute the workload.

  14. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  15. Contraband detection with fast neutrons

    Energy Technology Data Exchange (ETDEWEB)

    Buffler, Andy E-mail: abuffler@science.uct.ac.za

    2004-11-01

    Recent terror events and the increase in the trade of illicit drugs have fuelled the exploration of the use of fast neutrons as probes for the detection of hidden contraband, especially explosives, in packages ranging in size from small mail items to cargo containers. The various approaches using fast neutrons for contraband detection, presently under development, are reviewed. The role that a neutron system might play in the non-intrusive interrogation of airline luggage is discussed.

  16. Psychoacoustics and Passive Sonar Detection

    Science.gov (United States)

    1974-09-09

    not matched to the signal duration. This simple physical model provides a faiily credible replica of the detection performance of the ear, under...al., 1956; Veniar, 1958; Swets, Shipley, McKey und Gree^., 1959; Creelman , 1960; Green, 1961; and Gundy, 1961). In general, the experiments first...Acoust. Soc. Am. 3_7. 1064, (1965). 5. CD. Creelman , "Detection of Signals of Uncertain Frequency", J. Acoust. Soc. Am. 32, 805, (1960). 6. J.P

  17. Static Decoupling in fault detection

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik

    1998-01-01

    An algebraic approach is given for a design of a static residual weighting factor in connection with fault detection. A complete parameterization is given of the weighting factor which will minimize a given performance index......An algebraic approach is given for a design of a static residual weighting factor in connection with fault detection. A complete parameterization is given of the weighting factor which will minimize a given performance index...

  18. Materials science for nuclear detection

    OpenAIRE

    Peurrung, Anthony

    2008-01-01

    The increasing importance of nuclear detection technology has led to a variety of research efforts that seek to accelerate the discovery and development of useful new radiation detection materials. These efforts aim to improve our understanding of how these materials perform, develop formalized discovery tools, and enable rapid and effective performance characterization. We provide an overview of these efforts along with an introduction to the history, physics, and taxonomy of radiation detec...

  19. Integrated multisensor perimeter detection systems

    Science.gov (United States)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  20. Multi-Sensor Mud Detection

    Science.gov (United States)

    Rankin, Arturo L.; Matthies, Larry H.

    2010-01-01

    Robust mud detection is a critical perception requirement for Unmanned Ground Vehicle (UGV) autonomous offroad navigation. A military UGV stuck in a mud body during a mission may have to be sacrificed or rescued, both of which are unattractive options. There are several characteristics of mud that may be detectable with appropriate UGV-mounted sensors. For example, mud only occurs on the ground surface, is cooler than surrounding dry soil during the daytime under nominal weather conditions, is generally darker than surrounding dry soil in visible imagery, and is highly polarized. However, none of these cues are definitive on their own. Dry soil also occurs on the ground surface, shadows, snow, ice, and water can also be cooler than surrounding dry soil, shadows are also darker than surrounding dry soil in visible imagery, and cars, water, and some vegetation are also highly polarized. Shadows, snow, ice, water, cars, and vegetation can all be disambiguated from mud by using a suite of sensors that span multiple bands in the electromagnetic spectrum. Because there are military operations when it is imperative for UGV's to operate without emitting strong, detectable electromagnetic signals, passive sensors are desirable. JPL has developed a daytime mud detection capability using multiple passive imaging sensors. Cues for mud from multiple passive imaging sensors are fused into a single mud detection image using a rule base, and the resultant mud detection is localized in a terrain map using range data generated from a stereo pair of color cameras.

  1. Hanle Detection for Optical Clocks

    Directory of Open Access Journals (Sweden)

    Xiaogang Zhang

    2015-01-01

    Full Text Available Considering the strong inhomogeneous spatial polarization and intensity distribution of spontaneous decay fluorescence due to the Hanle effect, we propose and demonstrate a universe Hanle detection configuration of electron-shelving method for optical clocks. Experimental results from Ca atomic beam optical frequency standard with electron-shelving method show that a designed Hanle detection geometry with optimized magnetic field direction, detection laser beam propagation and polarization direction, and detector position can improve the fluorescence collection rate by more than one order of magnitude comparing with that of inefficient geometry. With the fixed 423 nm fluorescence, the improved 657 nm optical frequency standard signal intensity is presented. The potential application of the Hanle detection geometry designed for facilitating the fluorescence collection for optical lattice clock with a limited solid angle of the fluorescence collection has been discussed. The Hanle detection geometry is also effective for ion detection in ion optical clock and quantum information experiments. Besides, a cylinder fluorescence collection structure is designed to increase the solid angle of the fluorescence collection in Ca atomic beam optical frequency standard.

  2. Long-Range Neutron Detection

    International Nuclear Information System (INIS)

    Peurrung, A.J.; Stromswold, D.C.; Hansen, R.R.; Reeder, P.L.; Barnett, D.S.

    1999-01-01

    A neutron detector designed for detecting neutron sources at distances of 50 to 100 m has been constructed and tested. This detector has a large surface area (1 m 2 ) to enhance detection efficiency, and it contains a collimator and shielding to achieve direction sensitivity and reduce background. An unusual feature of the detector is that it contains no added moderator, such as polyethylene, to moderate fast neutrons before they reach the 3 He detector. As a result, the detector is sensitive mainly to thermal neutrons. The moderator-free design reduces the weight of the detector, making it more portable, and it also aids in achieving directional sensitivity and background reduction. Test results show that moderated fission-neutron sources of strength about 3 x 10 5 n/s can be detected at a distance out to 70 m in a counting time of 1000 s. The best angular resolution of the detector is obtained at distances of 30 m or less. As the separation .distance between the source and detector increases, the contribution of scattered neutrons to the measured signal increases with a resultant decrease in the ability to detect the direction to a distant source. Applications for which the long-range detector appears to be suitable include detecting remote neutron sources (including sources in moving vehicles) and monitoring neutron storage vaults for the intrusion of humans and the effects they make on the detected neutron signal. Also, the detector can be used to measure waste for the presence of transuranic material in the presence of high gamma-ray background. A test with a neutron source (3 x 10 5 n/s) in a vehicle showed that the detector could readily measure an increase in count rate at a distance of 10 m for vehicle speeds up to 35 mph (the highest speed tested). These results. indicate that the source should be detectable at this distance at speeds up to 55 mph

  3. Biosensors for plant pathogen detection.

    Science.gov (United States)

    Khater, Mohga; de la Escosura-Muñiz, Alfredo; Merkoçi, Arben

    2017-07-15

    Infectious plant diseases are caused by pathogenic microorganisms such as fungi, bacteria, viruses, viroids, phytoplasma and nematodes. Worldwide, plant pathogen infections are among main factors limiting crop productivity and increasing economic losses. Plant pathogen detection is important as first step to manage a plant disease in greenhouses, field conditions and at the country boarders. Current immunological techniques used to detect pathogens in plant include enzyme-linked immunosorbent assays (ELISA) and direct tissue blot immunoassays (DTBIA). DNA-based techniques such as polymerase chain reaction (PCR), real time PCR (RT-PCR) and dot blot hybridization have also been proposed for pathogen identification and detection. However these methodologies are time-consuming and require complex instruments, being not suitable for in-situ analysis. Consequently, there is strong interest for developing new biosensing systems for early detection of plant diseases with high sensitivity and specificity at the point-of-care. In this context, we revise here the recent advancement in the development of advantageous biosensing systems for plant pathogen detection based on both antibody and DNA receptors. The use of different nanomaterials such as nanochannels and metallic nanoparticles for the development of innovative and sensitive biosensing systems for the detection of pathogens (i.e. bacteria and viruses) at the point-of-care is also shown. Plastic and paper-based platforms have been used for this purpose, offering cheap and easy-to-use really integrated sensing systems for rapid on-site detection. Beside devices developed at research and development level a brief revision of commercially available kits is also included in this review. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Ghost imaging with bucket detection and point detection

    Science.gov (United States)

    Zhang, De-Jian; Yin, Rao; Wang, Tong-Biao; Liao, Qing-Hua; Li, Hong-Guo; Liao, Qinghong; Liu, Jiang-Tao

    2018-04-01

    We experimentally investigate ghost imaging with bucket detection and point detection in which three types of illuminating sources are applied: (a) pseudo-thermal light source; (b) amplitude modulated true thermal light source; (c) amplitude modulated laser source. Experimental results show that the quality of ghost images reconstructed with true thermal light or laser beam is insensitive to the usage of bucket or point detector, however, the quality of ghost images reconstructed with pseudo-thermal light in bucket detector case is better than that in point detector case. Our theoretical analysis shows that the reason for this is due to the first order transverse coherence of the illuminating source.

  5. Method of detecting failed fuels

    International Nuclear Information System (INIS)

    Ishizaki, Hideaki; Suzumura, Takeshi.

    1982-01-01

    Purpose: To enable the settlement of the temperature of an adequate filling high temperature pure water by detecting the outlet temperature of a high temperature pure water filling tube to a fuel assembly to control the heating of the pure water and detecting the failed fuel due to the sampling of the pure water. Method: A temperature sensor is provided at a water tube connected to a sipping cap for filling high temperature pure water to detect the temperature of the high temperature pure water at the outlet of the tube, and the temperature is confirmed by a temperature indicator. A heater is controlled on the basis of this confirmation, an adequate high temperature pure water is filled in the fuel assembly, and the pure water is replaced with coolant. Then, it is sampled to settle the adequate temperature of the high temperature coolant used for detecting the failure of the fuel assembly. As a result, the sipping effect does not decrease, and the failed fuel can be precisely detected. (Yoshihara, H.)

  6. Gear Tooth Wear Detection Algorithm

    Science.gov (United States)

    Delgado, Irebert R.

    2015-01-01

    Vibration-based condition indicators continue to be developed for Health Usage Monitoring of rotorcraft gearboxes. Testing performed at NASA Glenn Research Center have shown correlations between specific condition indicators and specific types of gear wear. To speed up the detection and analysis of gear teeth, an image detection program based on the Viola-Jones algorithm was trained to automatically detect spiral bevel gear wear pitting. The detector was tested using a training set of gear wear pictures and a blind set of gear wear pictures. The detector accuracy for the training set was 75 percent while the accuracy for the blind set was 15 percent. Further improvements on the accuracy of the detector are required but preliminary results have shown its ability to automatically detect gear tooth wear. The trained detector would be used to quickly evaluate a set of gear or pinion pictures for pits, spalls, or abrasive wear. The results could then be used to correlate with vibration or oil debris data. In general, the program could be retrained to detect features of interest from pictures of a component taken over a period of time.

  7. Molecular Detection of Antimicrobial Resistance

    Science.gov (United States)

    Fluit, Ad C.; Visser, Maarten R.; Schmitz, Franz-Josef

    2001-01-01

    The determination of antimicrobial susceptibility of a clinical isolate, especially with increasing resistance, is often crucial for the optimal antimicrobial therapy of infected patients. Nucleic acid-based assays for the detection of resistance may offer advantages over phenotypic assays. Examples are the detection of the methicillin resistance-encoding mecA gene in staphylococci, rifampin resistance in Mycobacterium tuberculosis, and the spread of resistance determinants across the globe. However, molecular assays for the detection of resistance have a number of limitations. New resistance mechanisms may be missed, and in some cases the number of different genes makes generating an assay too costly to compete with phenotypic assays. In addition, proper quality control for molecular assays poses a problem for many laboratories, and this results in questionable results at best. The development of new molecular techniques, e.g., PCR using molecular beacons and DNA chips, expands the possibilities for monitoring resistance. Although molecular techniques for the detection of antimicrobial resistance clearly are winning a place in routine diagnostics, phenotypic assays are still the method of choice for most resistance determinations. In this review, we describe the applications of molecular techniques for the detection of antimicrobial resistance and the current state of the art. PMID:11585788

  8. Signal analysis for failure detection

    International Nuclear Information System (INIS)

    Parpaglione, M.C.; Perez, L.V.; Rubio, D.A.; Czibener, D.; D'Attellis, C.E.; Brudny, P.I.; Ruzzante, J.E.

    1994-01-01

    Several methods for analysis of acoustic emission signals are presented. They are mainly oriented to detection of changes in noisy signals and characterization of higher amplitude discrete pulses or bursts. The aim was to relate changes and events with failure, crack or wear in materials, being the final goal to obtain automatic means of detecting such changes and/or events. Performance evaluation was made using both simulated and laboratory test signals. The methods being presented are the following: 1. Application of the Hopfield Neural Network (NN) model for classifying faults in pipes and detecting wear of a bearing. 2. Application of the Kohonnen and Back Propagation Neural Network model for the same problem. 3. Application of Kalman filtering to determine time occurrence of bursts. 4. Application of a bank of Kalman filters (KF) for failure detection in pipes. 5. Study of amplitude distribution of signals for detecting changes in their shape. 6. Application of the entropy distance to measure differences between signals. (author). 10 refs, 11 figs

  9. Analog electronics for radiation detection

    CERN Document Server

    2016-01-01

    Analog Electronics for Radiation Detection showcases the latest advances in readout electronics for particle, or radiation, detectors. Featuring chapters written by international experts in their respective fields, this authoritative text: Defines the main design parameters of front-end circuitry developed in microelectronics technologies Explains the basis for the use of complementary metal oxide semiconductor (CMOS) image sensors for the detection of charged particles and other non-consumer applications Delivers an in-depth review of analog-to-digital converters (ADCs), evaluating the pros and cons of ADCs integrated at the pixel, column, and per-chip levels Describes incremental sigma delta ADCs, time-to-digital converter (TDC) architectures, and digital pulse-processing techniques complementary to analog processing Examines the fundamental parameters and front-end types associated with silicon photomultipliers used for single visible-light photon detection Discusses pixel sensors ...

  10. Optimal dynamic detection of explosives

    Energy Technology Data Exchange (ETDEWEB)

    Moore, David Steven [Los Alamos National Laboratory; Mcgrane, Shawn D [Los Alamos National Laboratory; Greenfield, Margo T [Los Alamos National Laboratory; Scharff, R J [Los Alamos National Laboratory; Rabitz, Herschel A [PRINCETON UNIV; Roslund, J [PRINCETON UNIV

    2009-01-01

    The detection of explosives is a notoriously difficult problem, especially at stand-off distances, due to their (generally) low vapor pressure, environmental and matrix interferences, and packaging. We are exploring optimal dynamic detection to exploit the best capabilities of recent advances in laser technology and recent discoveries in optimal shaping of laser pulses for control of molecular processes to significantly enhance the standoff detection of explosives. The core of the ODD-Ex technique is the introduction of optimally shaped laser pulses to simultaneously enhance sensitivity of explosives signatures while reducing the influence of noise and the signals from background interferents in the field (increase selectivity). These goals are being addressed by operating in an optimal nonlinear fashion, typically with a single shaped laser pulse inherently containing within it coherently locked control and probe sub-pulses. With sufficient bandwidth, the technique is capable of intrinsically providing orthogonal broad spectral information for data fusion, all from a single optimal pulse.

  11. Photoacoustic Imaging in Oxygen Detection

    Directory of Open Access Journals (Sweden)

    Fei Cao

    2017-12-01

    Full Text Available Oxygen level, including blood oxygen saturation (sO2 and tissue oxygen partial pressure (pO2, are crucial physiological parameters in life science. This paper reviews the importance of these two parameters and the detection methods for them, focusing on the application of photoacoustic imaging in this scenario. sO2 is traditionally detected with optical spectra-based methods, and has recently been proven uniquely efficient by using photoacoustic methods. pO2, on the other hand, is typically detected by PET, MRI, or pure optical approaches, yet with limited spatial resolution, imaging frame rate, or penetration depth. Great potential has also been demonstrated by employing photoacoustic imaging to overcome the existing limitations of the aforementioned techniques.

  12. Detection of Weather Radar Clutter

    DEFF Research Database (Denmark)

    Bøvith, Thomas

    2008-01-01

    classification and use a range of different techniques and input data. The first method uses external information from multispectral satellite images to detect clutter. The information in the visual, near-infrared, and infrared parts of the spectrum can be used to distinguish between cloud and cloud-free areas......Weather radars provide valuable information on precipitation in the atmosphere but due to the way radars work, not only precipitation is observed by the weather radar. Weather radar clutter, echoes from non-precipitating targets, occur frequently in the data, resulting in lowered data quality....... Especially in the application of weather radar data in quantitative precipitation estimation and forecasting a high data quality is important. Clutter detection is one of the key components in achieving this goal. This thesis presents three methods for detection of clutter. The methods use supervised...

  13. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  14. Automated detection of retinal disease.

    Science.gov (United States)

    Helmchen, Lorens A; Lehmann, Harold P; Abràmoff, Michael D

    2014-11-01

    Nearly 4 in 10 Americans with diabetes currently fail to undergo recommended annual retinal exams, resulting in tens of thousands of cases of blindness that could have been prevented. Advances in automated retinal disease detection could greatly reduce the burden of labor-intensive dilated retinal examinations by ophthalmologists and optometrists and deliver diagnostic services at lower cost. As the current availability of ophthalmologists and optometrists is inadequate to screen all patients at risk every year, automated screening systems deployed in primary care settings and even in patients' homes could fill the current gap in supply. Expanding screens to all patients at risk by switching to automated detection systems would in turn yield significantly higher rates of detecting and treating diabetic retinopathy per dilated retinal examination. Fewer diabetic patients would develop complications such as blindness, while ophthalmologists could focus on more complex cases.

  15. Electochemical detection of chromosome translocation

    DEFF Research Database (Denmark)

    Kwasny, Dorota; Dimaki, Maria; Silahtaroglu, Asli

    2014-01-01

    Cytogenetics is a study of the cell structure with a main focus on chromosomes content and their structure. Chromosome abnormalities, such as translocations may cause various genetic disorders and heametological malignancies. Chromosome translocations are structural rearrangements of two...... chromosomes that results in formation of derivative chromosomes with a mixed DNA sequence. The method currently used for their detection is Fluorescent In Situ Hybridization, which requires a use of expensive, fluorescently labeled probes that target the derivative chromosomes. We present here a double...... hybridization approach developed for label-free detection of the chromosome translocations. For specific translocation detection it is necessary to determine that the two DNA sequences forming a derivative chromosome are connected, which is achieved by two subsequent hybridization steps. The electrochemical...

  16. Detection of irradiated frozen foods

    International Nuclear Information System (INIS)

    Miyahara, Makoto; Toyoda, Masatake; Saito, Yukio

    1998-01-01

    We tried to detect whether foods were irradiated or not by the o-tyrosine method and the mtDNA method. The o-tyrosine method was applied to four kinds of meat (beef, pork, chicken and tuna). The results showed the linear relation between amount of o-tyrosine and dose (0-10 kGy). However, small amount of o-tyrosine were produced in some cases which application of the method summed to be very difficult because small difference between irradiated foods and untreated foods. Possibility of mtDNA method was investigated. Work and time for separation of mitochondria and extraction of DNA were reduced by a protease-solid phase extraction method. By PCR method, accurate mtDNA could be detected from very small amount of DNA. The irradiation effect is able to detect from 50 Gy. (S.Y.)

  17. Criticality incident detection assessment methodology

    International Nuclear Information System (INIS)

    Haley, Richard M.; Warburton, Simon J.; Bowden, Russell L.

    2003-01-01

    In the United Kingdom, all nuclear facilities that handle, treat or store fissile material require a Criticality Incident Detection and Alarm System (CIDAS) to be installed, unless a case is made for the omission of such a system. Where it is concluded that a CIDAS is required, the primary objective is the reliable detection of criticality and the initiation of prompt evacuation of plant workers from the vicinity of the incident. This paper will examine and compare various methods that can be used to demonstrate that a CIDAS will satisfy the detection criterion. The paper will focus on fit-for-purpose and cost-effective methods for the assessment of gamma-based systems. In the experience of the authors this is particularly useful in demonstrating the efficacy of existing systems in operational plant. (author)

  18. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  19. Visual Inspection for Caries Detection

    DEFF Research Database (Denmark)

    Gimenez, T; Piovesan, C; Braga, M M

    2015-01-01

    July 2014 to identify published and nonpublished studies in English. Studies of visual inspection were included that 1) assessed accuracy of the method in detecting caries lesions; 2) were performed on occlusal, proximal, or free smooth surfaces in primary or permanent teeth; 3) had a reference...... (from 5,808 articles initially identified) and 1 abstract (from 168) met the inclusion criteria. In general, the analysis demonstrated that the visual method had good accuracy for detecting caries lesions. Although laboratory and clinical studies have presented similar accuracy, clinically obtained...... caries detection method has good overall performance. Furthermore, although the identified studies had high heterogeneity and risk of bias, the use of detailed and validated indices seems to improve the accuracy of the method....

  20. Fluorescence detection of dental calculus

    Science.gov (United States)

    Gonchukov, S.; Biryukova, T.; Sukhinina, A.; Vdovin, Yu

    2010-11-01

    This work is devoted to the optimization of fluorescence dental calculus diagnostics in optical spectrum. The optimal wavelengths for fluorescence excitation and registration are determined. Two spectral ranges 620 - 645 nm and 340 - 370 nm are the most convenient for supra- and subgingival calculus determination. The simple implementation of differential method free from the necessity of spectrometer using was investigated. Calculus detection reliability in the case of simple implementation is higher than in the case of spectra analysis at optimal wavelengths. The use of modulated excitation light and narrowband detection of informative signal allows us to decrease essentially its diagnostic intensity even in comparison with intensity of the low level laser dental therapy.

  1. A contrario line segment detection

    CERN Document Server

    von Gioi, Rafael Grompone

    2014-01-01

    The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This?book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic. Based on the a contrario framework, the algorithm works efficiently without the need of any parameter tuning. The design criteria are thoroughly explained and the algorithm's good and bad results are illustrated on real and synthetic images. The issues involved, as well as the strategies used, are common to many geometrical structure detection problems and some possible

  2. Spices, irradiation and detection methods

    International Nuclear Information System (INIS)

    Sjoeberg, A.M.; Manninen, M.

    1991-01-01

    This paper is about microbiological aspects of spices and microbiological methods to detect irradiated food. The proposed method is a combination of the Direct Epifluorescence Filter Technique (DEFT) and the Aerobic Plate Count (APC). The evidence for irradiation of spices is based on the demonstration of a higher DEFT count than the APC. The principle was first tested in our earlier investigation in the detection of irradiation of whole spices. The combined DEFT+APC procedure was found to give a fairly reliable indication of whether or not a whole spice sample had been irradiated. The results are given (8 figs, 22 refs)

  3. Fire detection in warehouse facilities

    CERN Document Server

    Dinaburg, Joshua

    2013-01-01

    Automatic sprinklers systems are the primary fire protection system in warehouse and storage facilities. The effectiveness of this strategy has come into question due to the challenges presented by modern warehouse facilities, including increased storage heights and areas, automated storage retrieval systems (ASRS), limitations on water supplies, and changes in firefighting strategies. The application of fire detection devices used to provide early warning and notification of incipient warehouse fire events is being considered as a component of modern warehouse fire protection.Fire Detection i

  4. Sky Detection in Hazy Image.

    Science.gov (United States)

    Song, Yingchao; Luo, Haibo; Ma, Junkai; Hui, Bin; Chang, Zheng

    2018-04-01

    Sky detection plays an essential role in various computer vision applications. Most existing sky detection approaches, being trained on ideal dataset, may lose efficacy when facing unfavorable conditions like the effects of weather and lighting conditions. In this paper, a novel algorithm for sky detection in hazy images is proposed from the perspective of probing the density of haze. We address the problem by an image segmentation and a region-level classification. To characterize the sky of hazy scenes, we unprecedentedly introduce several haze-relevant features that reflect the perceptual hazy density and the scene depth. Based on these features, the sky is separated by two imbalance SVM classifiers and a similarity measurement. Moreover, a sky dataset (named HazySky) with 500 annotated hazy images is built for model training and performance evaluation. To evaluate the performance of our method, we conducted extensive experiments both on our HazySky dataset and the SkyFinder dataset. The results demonstrate that our method performs better on the detection accuracy than previous methods, not only under hazy scenes, but also under other weather conditions.

  5. Prospects for relic neutrino detection

    International Nuclear Information System (INIS)

    Smith, P.F.

    1991-03-01

    The standard big bang model predicts a universal background of relic neutrinos, comparable in number density to the background microwave photons. This neutrino background is undetectable at the present time firstly because the neutrino energy is very low (10 -4 -10 -5 eV) resulting in a very low energy transfer to any conceivable detector, and secondly the low energy gives a lower interaction cross section and hence a very low event rate per unit mass. These obstacles have so far precluded any realistic proposal for relic neutrino detection. The aim of this paper is to illustrate the difficulties in detecting these neutrinos by summarizing six detection ideas which have been previously considered, indicating in each case the problems which have prevented the idea being developed into an experimental proposal. The most promising direction for further study would appear to be that of coherent interactions. So far, no investigations of this idea have resulted in a practical detection scheme, but in this paper one new variation is suggested which could in principle give an observable effect, if the necessary stringent experimental conditions could be created. It is suggested that this may become possible with the aid of foreseeable 21st century developments in nanotechnology. (author)

  6. Computer Viruses: Pathology and Detection.

    Science.gov (United States)

    Maxwell, John R.; Lamon, William E.

    1992-01-01

    Explains how computer viruses were originally created, how a computer can become infected by a virus, how viruses operate, symptoms that indicate a computer is infected, how to detect and remove viruses, and how to prevent a reinfection. A sidebar lists eight antivirus resources. (four references) (LRW)

  7. Real time freeway incident detection.

    Science.gov (United States)

    2014-04-01

    The US Department of Transportation (US-DOT) estimates that over half of all congestion : events are caused by highway incidents rather than by rush-hour traffic in big cities. Real-time : incident detection on freeways is an important part of any mo...

  8. Junction detection and pathway selection

    Science.gov (United States)

    Peck, Alex N.; Lim, Willie Y.; Breul, Harry T.

    1992-02-01

    The ability to detect junctions and make choices among the possible pathways is important for autonomous navigation. In our script-based navigation approach where a journey is specified as a script of high-level instructions, actions are frequently referenced to junctions, e.g., `turn left at the intersection.' In order for the robot to carry out these kind of instructions, it must be able (1) to detect an intersection (i.e., an intersection of pathways), (2) know that there are several possible pathways it can take, and (3) pick the pathway consistent with the high level instruction. In this paper we describe our implementation of the ability to detect junctions in an indoor environment, such as corners, T-junctions and intersections, using sonar. Our approach uses a combination of partial scan of the local environment and recognition of sonar signatures of certain features of the junctions. In the case where the environment is known, we use additional sensor information (such as compass bearings) to help recognize the specific junction. In general, once a junction is detected and its type known, the number of possible pathways can be deduced and the correct pathway selected. Then the appropriate behavior for negotiating the junction is activated.

  9. Detection capabilities. Some historical footnotes

    International Nuclear Information System (INIS)

    Currie, L.A.

    2017-01-01

    Part I Summary of relevant topics from 1923 to present-including: Currie (Anal Chem 40:586-593, 1968) detection concepts and capabilities; International detection and uncertainty standards; Failure of classical "1"4C dating and birth of new scientific disciplines; Exploratory nuclear data analysis of "8"5Kr monitors found coincident with the collapse of the Iron Curtain (1989); Faulty statistics proved responsible for mistaken assertions that Currie's LC yields excessive false positives; Low-level counting and AMS for atmospheric "3"7Ar and µmolar fossil/biomass carbon in the environment; Erroneous assumption that our low-level background is a Poisson Process, linked to ∼8 % spurious anticoincidence events. Part II. Exact treatment of bivariate Poisson data-solved in 1930s by Przyborowski and Wilenski, Krakow University, for detecting extreme trace amounts of a malicious contaminant (dodder) in high purity seed standards. We adapted their treatment to detection capabilities in ultra-low-level nuclear counting. The timing of their work had great historical significance, marking the start of World War II, with the invasion of Poland (1939). (author)

  10. Alpha particles detection in nitrocellulose

    International Nuclear Information System (INIS)

    Romero C, M.

    1976-01-01

    The method for the manufacturing of the detection films follows these steps: preparation of the mass which includes nitrocellulose in the form of cotton as raw material ethyl acetate, cellosolve acetate, isopropyl and butyl alcohols as solvents and dioctyl phtalate as plasticiser; dilution of the paste; pouring of the diluted mass; and drying of the detection films. The results obtained experimentally are: The determination of the development times of the different thicknesses of the manufactured films. Response linearity of the detectors, variation of the number of tracks according to the distance of the source to the detector. Sizes of the diameter of the tracks depending of the distance detector-alpha emmission source. As a conclusion we can say the the nitrocellulose detectors are specific for alpha radiation; the more effective thicknesses in uranium prospecting works were those of 60 microns, since for the laboratory works the thicknesses of 30 to 40 microns were the ideal; the development technique of the detection films is simple and cheap and can be realized even in another place than the laboratory; this way of the manufacturing of nitrocellulose detection film sensitive to alpha nuclear radiation is open to future research. (author)

  11. Detecting leaks in vacuum bags

    Science.gov (United States)

    Carlstrom, E. E.

    1980-01-01

    Small leaks in vacuum bag can be readily detected by eye, using simple chemical reaction: combination of ammonia and acetic acid vapors to produce cloudy white smoke. Technique has been successfully used to test seam integrity and to identify minute pinholes in vacuum bag used in assembly of ceramic-tile heat shield for Space Shuttle Orbiter.

  12. Protein Detection with Aptamer Biosensors

    Directory of Open Access Journals (Sweden)

    Regina Stoltenburg

    2008-07-01

    Full Text Available Aptamers have been developed for different applications. Their use as new biological recognition elements in biosensors promises progress for fast and easy detection of proteins. This new generation of biosensor (aptasensors will be more stable and well adapted to the conditions of real samples because of the specific properties of aptamers.

  13. A Visual Detection Learning Model

    Science.gov (United States)

    Beard, Bettina L.; Ahumada, Albert J., Jr.; Trejo, Leonard (Technical Monitor)

    1998-01-01

    Our learning model has memory templates representing the target-plus-noise and noise-alone stimulus sets. The best correlating template determines the response. The correlations and the feedback participate in the additive template updating rule. The model can predict the relative thresholds for detection in random, fixed and twin noise.

  14. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-01

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal

  15. Helicopter detection and classification demonstrator

    NARCIS (Netherlands)

    Koersel, A.C. van

    2000-01-01

    A technology demonstrator that detects and classifies different helicopter types automatically, was developed at TNO-FEL. The demonstrator is based on a PC, which receives its acoustic input from an all-weather microphone. The demonstrator uses commercial off-the-shelf hardware to digitize the

  16. Direct detection with dark mediators

    Energy Technology Data Exchange (ETDEWEB)

    Curtin, David; Surujon, Ze' ev [C. N. Yang Institute for Theoretical Physics, Stony Brook University, Stony Brook, NY 11794 (United States); Tsai, Yuhsin [Physics Department, University of California Davis, Davis, CA 95616 (United States)

    2014-11-10

    We introduce dark mediator Dark Matter (dmDM) where the dark and visible sectors are connected by at least one light mediator ϕ carrying the same dark charge that stabilizes DM. ϕ is coupled to the Standard Model via an operator q{sup ¯}qϕϕ{sup ⁎}/Λ, and to dark matter via a Yukawa coupling y{sub χ}χ{sup c¯}χϕ. Direct detection is realized as the 2→3 process χN→χ{sup ¯}Nϕ at tree-level for m{sub ϕ}≲10 keV and small Yukawa coupling, or alternatively as a loop-induced 2→2 process χN→χN. We explore the direct-detection consequences of this scenario and find that a heavy O(100 GeV) dmDM candidate fakes different O(10 GeV) standard WIMPs in different experiments. Large portions of the dmDM parameter space are detectable above the irreducible neutrino background and not yet excluded by any bounds. Interestingly, for the m{sub ϕ} range leading to novel direct detection phenomenology, dmDM is also a form of Self-Interacting Dark Matter (SIDM), which resolves inconsistencies between dwarf galaxy observations and numerical simulations.

  17. Traffic sign detection and analysis

    DEFF Research Database (Denmark)

    Møgelmose, Andreas; Trivedi, Mohan M.; Moeslund, Thomas B.

    2012-01-01

    Traffic sign recognition (TSR) is a research field that has seen much activity in the recent decade. This paper introduces the problem and presents 4 recent papers on traffic sign detection and 4 recent papers on traffic sign classification. It attempts to extract recent trends in the field...

  18. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  19. EUROmediCAT signal detection

    DEFF Research Database (Denmark)

    Given, Joanne E; Loane, Maria; Luteijn, Johannes Michiel

    2016-01-01

    AIMS: To evaluate congenital anomaly (CA)-medication exposure associations produced by the new EUROmediCAT signal detection system and determine which require further investigation. METHODS: Data from 15 EUROCAT registries (1995-2011) with medication exposures at the chemical substance (5th level...

  20. Strategies for dark matter detection

    International Nuclear Information System (INIS)

    Silk, J.

    1988-01-01

    The present status of alternative forms of dark matter, both baryonic and nonbaryonic, is reviewed. Alternative arguments are presented for the predominance of either cold dark matter (CDM) or of baryonic dark matter (BDM). Strategies are described for dark matter detection, both for dark matter that consists of weakly interacting relic particles and for dark matter that consists of dark stellar remnants

  1. Lameness detection in dairy cattle

    NARCIS (Netherlands)

    Hertem, Van T.; Bahr, C.; Schlageter Tello, A.; Viazzi, S.; Steensels, M.; Romanini, C.E.B.; Lokhorst, C.; Maltz, E.; Halachmi, I.; Berckmans, D.

    2016-01-01

    The objective of this study was to evaluate if a multi-sensor system (milk, activity, body posture) was a better classifier for lameness than the single-sensor-based detection models. Between September 2013 and August 2014, 3629 cow observations were collected on a commercial dairy farm in

  2. Supernova neutrino detection in LZ

    Science.gov (United States)

    Khaitan, D.

    2018-02-01

    In the first 10 seconds of a core-collapse supernova, almost all of its progenitor's gravitational potential, O(1053 ergs), is carried away in the form of neutrinos. These neutrinos, with O(10 MeV) kinetic energy, can interact via coherent elastic neutrino-nucleus scattering (CEνNS) depositing O(1 keV) in detectors. In this work we describe the performances of low-background dark matter detectors, such as LUX-ZEPLIN (LZ), optimized for detecting low-energy depositions, in detecting these neutrino interactions. For instance, a 27 Msolar supernova at 10 kpc is expected to produce ~350 neutrino interactions in the 7-tonne liquid xenon active volume of LZ. Based on the LS220 EoS neutrino flux model for a SN, the Noble Element Simulation Technique (NEST), and predicted CEνNS cross-sections for xenon, to study energy deposition and detection of SN neutrinos in LZ. We simulate the response of the LZ data acquisition system (DAQ) and demonstrate its capability and limitations in handling this interaction rate. We present an overview of the LZ detector, focusing on the benefits of liquid xenon for supernova neutrino detection. We discuss energy deposition and detector response simulations and their results. We present an analysis technique to reconstruct the total number of neutrinos and the time of the supernova core bounce.

  3. Pipe Leak Detection Technology Development

    Science.gov (United States)

    The U. S. Environmental Protection Agency (EPA) has determined that one of the nation’s biggest infrastructural needs is the replacement or rehabilitation of the water distribution and transmission systems. The institution of more effective pipe leak detection technology will im...

  4. Fault detection using (PI) observers

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Stoustrup, J.; Shafai, B.

    1997-01-01

    The fault detection and isolation (FDI) problem in connection with Proportional Integral (PI) Observers is considered in this paper. A compact formulation of the FDI design problem using PI observers is given. An analysis of the FDI design problem is derived with respectt to the time domain...

  5. Global Disease Detectives in Kibera

    Centers for Disease Control (CDC) Podcasts

    2010-12-06

    In partnership with our disease detectives, urban poor open their homes to the world to prevent and control emerging diseases.  Created: 12/6/2010 by CDC Center for Global Health.   Date Released: 12/6/2010.

  6. Social Network Aided Plagiarism Detection

    Science.gov (United States)

    Zrnec, Aljaž; Lavbic, Dejan

    2017-01-01

    The prevalence of different kinds of electronic devices and the volume of content on the Web have increased the amount of plagiarism, which is considered an unethical act. If we want to be efficient in the detection and prevention of these acts, we have to improve today's methods of discovering plagiarism. The paper presents a research study where…

  7. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  8. Detecting decay in wood components

    Science.gov (United States)

    R.J. Ross; X. Wang; B.K. Brashaw

    2005-01-01

    This chapter presents a summary of the Wood and Timber Condition Assessment Manual. It focuses on current inspection techniques for decay detection and provides guidelines on the use of various non-destructive evaluation (NDE) methods in locating and defining areas of deterioration in timber bridge components and other civil structures.

  9. Anomaly detection in diurnal data

    NARCIS (Netherlands)

    Mata, F.; Zuraniewski, P.W.; Mandjes, M.; Mellia, M.

    2014-01-01

    In this paper we present methodological advances in anomaly detection tailored to discover abnormal traffic patterns under the presence of seasonal trends in data. In our setup we impose specific assumptions on the traffic type and nature; our study features VoIP call counts, for which several

  10. Adjunct methods for caries detection

    DEFF Research Database (Denmark)

    Twetman, Svante; Axelsson, Susanna Bihari; Dahlén, Gunnar

    2012-01-01

    Abstract Objective. To assess the diagnostic accuracy of adjunct methods used to detect and quantify dental caries. Study design. A systematic literature search for relevant papers was conducted with pre-determined inclusion and exclusion criteria. Abstracts and full text articles were assessed...

  11. Fiber optic fire detection technology

    International Nuclear Information System (INIS)

    Hering, D.W.

    1990-01-01

    Electrostatic application of paint was, and still is, the most technically feasible method of reducing VOC (volatile organic compounds) emissions, while reducing the cost to apply the coatings. Prior to the use of electrostatics, only two sides of the traditional fire triangle were normally present in the booth, fuel (solvent), and oxygen (air). Now the third leg (the ignition source) was present at virtually all times during the production operation in the form of the electrostatic charge and the resulting energy in the system. The introduction of fiber optics into the field of fire detection was for specific application to the electrostatic painting industry, but specifically, robots used in the application of electrostatic painting in the automotive industry. The use of fiber optics in this hazard provided detection for locations that have been previously prohibited or inaccessible with the traditional fire detection systems. The fiber optic technology that has been adapted to the field of fire detection operates on the principle of transmission of photons through a light guide (optic fiber). When the light guide is subjected to heat, the cladding on the light guide melts away from the core and allows the light (photons) to escape. The controller, which contains the emitter and receiver is set-up to distinguish between partial loss of light and a total loss of light. Glass optical fibers carrying light offer distinct advantages over wires or coaxial cables carrying electricity as a transmission media. The uses of fiber optic detection will be expanded in the near future into such areas as aircraft, cable trays and long conveyor runs because fiber optics can carry more information and deliver it with greater clarity over longer distances with total immunity to all kinds of electrical interference

  12. Detection in superheated water chromatography

    International Nuclear Information System (INIS)

    Chienthavorn, O.

    1999-11-01

    Superheated water has been used successfully as an eluent in liquid chromatography and has been coupled to various modes of detection, ultraviolet (UV), fluorescence, and nuclear magnetic resonance spectroscopy (NMR) and mass spectrometry (MS). A number of compounds were examined on poly(styrene-divinylbenzene) (PS-DVB), polybutadiene (PBD), and octadecylsilyl bonded silica (ODS) column with isothermal and temperature programmes. The PS-DVB column was mostly used throughout the project as it was the most stable. Not only pure water could serve as superheated water mobile phase; inorganic buffered water and ion-pairing reagent with a concentration of 1-3 mM of the buffer and reagent were also exploited. It was shown that the pH could be controlled during the separation without salt precipitation and the separations followed a conventional reversed-phase HPLC method. Results from fluorescence detection showed good separation of a series of vitamins, such as pyridoxine, riboflavin, thiamine, and some analgesics. The relationship of riboflavin using the detection was linear and the detection limit was seven times higher than that of a conventional method. Simultaneous separation and identification using superheated water chromatography-NMR was demonstrated. With using a stop flow method, NMR spectra of model drugs, namely barbiturates, paracetamol, caffeine and phenacetin were obtained and the results agreed with reference spectra, confirming a perfect separation. A demonstration to obtain COSY spectrum of salicylamide was also performed. The method was expanded to the coupling of superheated water LC to NMR-MS. Results from the hyphenated detection method showed that deuteration and degradation happened in the superheated water conditions. The methyl group hydrogens of pyrimidine ring of sulfonamide and thiamine were exchanged with deuterium. Thiamine was decomposed to 4-methyl-5-thiazoleethanol and both were deuterated under the conditions. (author)

  13. Marker Detection in Aerial Images

    KAUST Repository

    Alharbi, Yazeed

    2017-04-09

    The problem that the thesis is trying to solve is the detection of small markers in high-resolution aerial images. Given a high-resolution image, the goal is to return the pixel coordinates corresponding to the center of the marker in the image. The marker has the shape of two triangles sharing a vertex in the middle, and it occupies no more than 0.01% of the image size. An improvement on the Histogram of Oriented Gradients (HOG) is proposed, eliminating the majority of baseline HOG false positives for marker detection. The improvement is guided by the observation that standard HOG description struggles to separate markers from negatives patches containing an X shape. The proposed method alters intensities with the aim of altering gradients. The intensity-dependent gradient alteration leads to more separation between filled and unfilled shapes. The improvement is used in a two-stage algorithm to achieve high recall and high precision in detection of markers in aerial images. In the first stage, two classifiers are used: one to quickly eliminate most of the uninteresting parts of the image, and one to carefully select the marker among the remaining interesting regions. Interesting regions are selected by scanning the image with a fast classifier trained on the HOG features of markers in all rotations and scales. The next classifier is more precise and uses our method to eliminate the majority of the false positives of standard HOG. In the second stage, detected markers are tracked forward and backward in time. Tracking is needed to detect extremely blurred or distorted markers that are missed by the previous stage. The algorithm achieves 94% recall with minimal user guidance. An average of 30 guesses are given per image; the user verifies for each whether it is a marker or not. The brute force approach would return 100,000 guesses per image.

  14. Radioelements: their detection and measurement; Les radioelements: detection et mesure

    Energy Technology Data Exchange (ETDEWEB)

    Grinberg, B [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1960-07-01

    A brief review of the properties of nuclear radiations is followed by a description of the basic techniques used for their detection: autoradiography, methods using the ionisation of gases (ionisation chambers, proportional counters, Geiger-Muller counters), scintillation techniques. The principles of the different methods of measurement are explained, whether they concern the activity or the energy absorbed (dosimetry). This is followed by a description of the basic techniques (4 {pi} counter, defined solid angle, {beta}-{gamma} coincidences). (author) [French] Apres un bref rappel des proprietes des rayonnements nucleaires, on decrit les techniques fondamentales employees pour leur detection: autoradiographie, procedes utilisant l'ionisation des gaz (chambres d'ionisation, compteurs proportionnels, compteurs de Geiger-Muller), technique des scintillations. On expose le principe des differentes methodes de mesure concernant soit l'activite, soit l'energie absorbee (dosimetrie). Les techniques fondamentales (compteur 4 {pi}, angle solide defini, coincidences {beta}-{gamma}) sont ensuite decrites. (auteur)

  15. Radioelements: their detection and measurement; Les radioelements: detection et mesure

    Energy Technology Data Exchange (ETDEWEB)

    Grinberg, B. [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1960-07-01

    A brief review of the properties of nuclear radiations is followed by a description of the basic techniques used for their detection: autoradiography, methods using the ionisation of gases (ionisation chambers, proportional counters, Geiger-Muller counters), scintillation techniques. The principles of the different methods of measurement are explained, whether they concern the activity or the energy absorbed (dosimetry). This is followed by a description of the basic techniques (4 {pi} counter, defined solid angle, {beta}-{gamma} coincidences). (author) [French] Apres un bref rappel des proprietes des rayonnements nucleaires, on decrit les techniques fondamentales employees pour leur detection: autoradiographie, procedes utilisant l'ionisation des gaz (chambres d'ionisation, compteurs proportionnels, compteurs de Geiger-Muller), technique des scintillations. On expose le principe des differentes methodes de mesure concernant soit l'activite, soit l'energie absorbee (dosimetrie). Les techniques fondamentales (compteur 4 {pi}, angle solide defini, coincidences {beta}-{gamma}) sont ensuite decrites. (auteur)

  16. Imaging, object detection, and change detection with a polarized multistatic GPR array

    Science.gov (United States)

    Beer, N. Reginald; Paglieroni, David W.

    2015-07-21

    A polarized detection system performs imaging, object detection, and change detection factoring in the orientation of an object relative to the orientation of transceivers. The polarized detection system may operate on one of several modes of operation based on whether the imaging, object detection, or change detection is performed separately for each transceiver orientation. In combined change mode, the polarized detection system performs imaging, object detection, and change detection separately for each transceiver orientation, and then combines changes across polarizations. In combined object mode, the polarized detection system performs imaging and object detection separately for each transceiver orientation, and then combines objects across polarizations and performs change detection on the result. In combined image mode, the polarized detection system performs imaging separately for each transceiver orientation, and then combines images across polarizations and performs object detection followed by change detection on the result.

  17. Real-Time Detection of a Virus Using Detection Dogs

    Directory of Open Access Journals (Sweden)

    Craig eAngle

    2016-01-01

    Full Text Available Viral infections are ubiquitous in humans, animals, and plants. Real-time methods to identify viral infections are limited and do not exist for use in harsh or resource-constrained environments. Previous research identified that tissues produce unique volatile organic compounds (VOC and demonstrated that VOC concentrations change during pathologic states including infection, neoplasia, or metabolic disease. Patterns of VOC expression may be pathogen-specific and may be associated with an odor that could be used for disease detection.We investigated the ability of two trained dogs to detect cell cultures infected with bovine viral diarrhea virus (BVDV and to discriminate BVDV-infected cell cultures from uninfected cell cultures and from cell cultures infected with bovine herpes virus 1 (BHV 1 and bovine parainfluenza virus 3 (BPIV 3. Dogs were trained to recognize cell cultures infected with two different biotypes of BVDV propagated in MDBK cells using one of three culture media. For detection trials, one target and seven distractors were presented on a scent wheel by a dog handler unaware of the location of targets and distractors.Detection of BVDV- infected cell cultures by Dog 1 had a diagnostic sensitivity of 0.850 (95% CI: 0.701 - 0.942, which was lower than Dog 2 (0.967, 95% CI: 0.837 - 0.994. Both dogs exhibited very high diagnostic specificity (0.981, 95% CI: 0.960 - 0.993 and (0.993, 95% CI: 0.975 - 0.999, respectively.These findings demonstrate that trained dogs can differentiate between cultured cells infected with BVDV, BHV1, and BPIV3 and are a realistic real-time mobile pathogen sensing technology for viral pathogens. The ability to discriminate between target and distractor samples plausibly results from expression of unique VOC patterns virus-infected and uninfected cells.

  18. Real-Time Detection of a Virus Using Detection Dogs.

    Science.gov (United States)

    Angle, T Craig; Passler, Thomas; Waggoner, Paul L; Fischer, Terrence D; Rogers, Bart; Galik, Patricia K; Maxwell, Herris S

    2015-01-01

    Viral infections are ubiquitous in humans, animals, and plants. Real-time methods to identify viral infections are limited and do not exist for use in harsh or resource-constrained environments. Previous research identified that tissues produce unique volatile organic compounds (VOC) and demonstrated that VOC concentrations change during pathologic states, including infection, neoplasia, or metabolic disease. Patterns of VOC expression may be pathogen specific and may be associated with an odor that could be used for disease detection. We investigated the ability of two trained dogs to detect cell cultures infected with bovine viral diarrhea virus (BVDV) and to discriminate BVDV-infected cell cultures from uninfected cell cultures and from cell cultures infected with bovine herpes virus 1 (BHV 1) and bovine parainfluenza virus 3 (BPIV 3). Dogs were trained to recognize cell cultures infected with two different biotypes of BVDV propagated in Madin-Darby bovine kidney cells using one of three culture media. For detection trials, one target and seven distractors were presented on a scent wheel by a dog handler unaware of the location of targets and distractors. Detection of BVDV-infected cell cultures by Dog 1 had a diagnostic sensitivity of 0.850 (95% CI: 0.701-0.942), which was lower than Dog 2 (0.967, 95% CI: 0.837-0.994). Both dogs exhibited very high diagnostic specificity (0.981, 95% CI: 0.960-0.993) and (0.993, 95% CI: 0.975-0.999), respectively. These findings demonstrate that trained dogs can differentiate between cultured cells infected with BVDV, BHV1, and BPIV3 and are a realistic real-time mobile pathogen sensing technology for viral pathogens. The ability to discriminate between target and distractor samples plausibly results from expression of unique VOC patterns in virus-infected and -uninfected cells.

  19. Noise canceling in-situ detection

    Science.gov (United States)

    Walsh, David O.

    2014-08-26

    Technologies applicable to noise canceling in-situ NMR detection and imaging are disclosed. An example noise canceling in-situ NMR detection apparatus may comprise one or more of a static magnetic field generator, an alternating magnetic field generator, an in-situ NMR detection device, an auxiliary noise detection device, and a computer.

  20. Corrosion detection of nanowires by magnetic sensors

    KAUST Repository

    Kosel, Jü rgen; Amara, Selma; Ivanov, Iurii; Blanco, Mario

    2017-01-01

    Disclosed are various embodiments related to a corrosion detection device for detecting corrosive environments. A corrosion detection device comprises a magnetic sensor and at least one magnetic nanowire disposed on the magnetic sensor. The magnetic sensor is configured to detect corrosion of the one or more magnetic nanowires based at least in part on a magnetic field of the one or more magnetic nanowires.

  1. Time resolution research in liquid scintillating detection

    International Nuclear Information System (INIS)

    He Hongkun; Shi Haoshan

    2006-01-01

    The signal processing design method is introduced into liquid scintillating detection system design. By analyzing the signal of liquid scintillating detection, improving time resolution is propitious to upgrade efficiency of detecting. The scheme of realization and satisfactory experiment data is demonstrated. Besides other types of liquid scintillating detection is the same, just using more high speed data signal processing techniques and elements. (authors)

  2. Corrosion detection of nanowires by magnetic sensors

    KAUST Repository

    Kosel, Jürgen

    2017-10-05

    Disclosed are various embodiments related to a corrosion detection device for detecting corrosive environments. A corrosion detection device comprises a magnetic sensor and at least one magnetic nanowire disposed on the magnetic sensor. The magnetic sensor is configured to detect corrosion of the one or more magnetic nanowires based at least in part on a magnetic field of the one or more magnetic nanowires.

  3. On Radar Resolution in Coherent Change Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Bickel, Douglas L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    It is commonly observed that resolution plays a role in coherent change detection. Although this is the case, the relationship of the resolution in coherent change detection is not yet defined . In this document, we present an analytical method of evaluating this relationship using detection theory. Specifically we examine the effect of resolution on receiver operating characteristic curves for coherent change detection.

  4. Anomalous human behavior detection: An Adaptive approach

    NARCIS (Netherlands)

    Leeuwen, C. van; Halma, A.; Schutte, K.

    2013-01-01

    Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous

  5. Attribute and topology based change detection in a constellation of previously detected objects

    Science.gov (United States)

    Paglieroni, David W.; Beer, Reginald N.

    2016-01-19

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  6. The detection of neutron clusters

    Energy Technology Data Exchange (ETDEWEB)

    Marques, F.M.; Labiche, M.; Orr, N.A.; Angelique, J.C. [Caen Univ., 14 (France). Lab. de Physique Corpusculaire] [and others

    2001-11-01

    A new approach to the production and detection of bound neutron clusters is presented. The technique is based on the breakup of beams of very neutron-rich nuclei and the subsequent detection of the recoiling proton in a liquid scintillator. The method has been tested in the breakup of {sup 11}Li, {sup 14}Be and {sup 15}B beams by a C target. Some 6 events were observed that exhibit the characteristics of a multi-neutron cluster liberated in the breakup of {sup 14}Be, most probably in the channel {sup 10}Be+{sup 4}n. The various backgrounds that may mimic such a signal are discussed in detail. (author)

  7. Fluorescence detection of dental calculus

    International Nuclear Information System (INIS)

    Gonchukov, S; Sukhinina, A; Vdovin, Yu; Biryukova, T

    2010-01-01

    This work is devoted to the optimization of fluorescence dental calculus diagnostics in optical spectrum. The optimal wavelengths for fluorescence excitation and registration are determined. Two spectral ranges 620 – 645 nm and 340 – 370 nm are the most convenient for supra- and subgingival calculus determination. The simple implementation of differential method free from the necessity of spectrometer using was investigated. Calculus detection reliability in the case of simple implementation is higher than in the case of spectra analysis at optimal wavelengths. The use of modulated excitation light and narrowband detection of informative signal allows us to decrease essentially its diagnostic intensity even in comparison with intensity of the low level laser dental therapy

  8. Exoplanets Detection, Formation, Properties, Habitability

    CERN Document Server

    Mason, John W

    2008-01-01

    This edited, multi-author volume will be an invaluable introduction and reference to all key aspects in the field of exoplanet research. The reviews cover: Detection methods and properties of known exoplanets, Detection of extrasolar planets by gravitational microlensing. The formation and evolution of terrestrial planets in protoplanetary and debris disks. The brown dwarf-exoplanet connection. Formation, migration mechanisms and properties of hot Jupiters. Dynamics of multiple exoplanet systems. Doppler exoplanet surveys. Searching for exoplanets in the stellar graveyard. Formation and habitability of extra solar planets in multiple star systems. Exoplanet habitats and the possibilities for life. Moons of exoplanets: habitats for life. Contributing authors: •Rory Barnes •David P. Bennett •Jian Ge •Nader Haghighipour •Patrick Irwin •Hugh Jones •Victoria Meadows •Stanimir Metchev •I. Neill Reid •George Rieke •Caleb Scharf •Steinn Sigurdsson

  9. Optoacoustic detection of thermal lesions

    Science.gov (United States)

    Arsenault, Michel G.; Kolios, Michael C.; Whelan, William M.

    2009-02-01

    Minimally invasive thermal therapy is being investigated as an alternative cancer treatment. It involves heating tissues to greater than 55°C over a period of a few minutes, which results in tissue coagulation. Optoacoustic (OA) imaging is a new imaging technique that involves exposing tissues to pulsed light and detecting the acoustic waves that are generated. In this study, adult bovine liver tissue samples were heated using continuous wave laser energy for various times, then scanned using an optoacoustic imaging system. Large optoacoustic signal variability was observed in the native tissue prior to heating. OA signal amplitude increased with maximum tissue temperature achieved, characterized by a correlation coefficient of 0.63. In this study we show that there are detectable changes in optoacoustic signal strength that arise from tissue coagulation, which demonstrates the potential of optoacoustic technology for the monitoring of thermal therapy delivery.

  10. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  11. RDX Detection with THz Spectroscopy

    Science.gov (United States)

    Michalopoulou, Zoi-Heleni; Mukherjee, Suman; Hor, Yew Li; Su, Ke; Liu, Zhiwei; Barat, Robert B.; Gary, Dale E.; Federici, John F.

    2010-10-01

    Spectroscopic analysis in the Terahertz frequency range, providing characteristic “signatures” for explosive and non-explosive materials, is proposed as an efficient and powerful tool for explosive identification. It is demonstrated that spectral responses of materials can be used as fingerprints that distinguish cyclotrimethylenetrinitramine (RDX) from other materials even with simple detectors and a limited number of available frequencies. Detection is performed using a modified least squares approach and multilayer perceptrons that operate on smoothed reflectance spectra. The performance of the detectors is evaluated through application to spectra of RDX and several common materials. A Receiver Operating Characteristic curve analysis demonstrates that our detectors exhibit the desirable properties of high probability of detection and low probability of false alarm.

  12. Detecting determinism from point processes.

    Science.gov (United States)

    Andrzejak, Ralph G; Mormann, Florian; Kreuz, Thomas

    2014-12-01

    The detection of a nonrandom structure from experimental data can be crucial for the classification, understanding, and interpretation of the generating process. We here introduce a rank-based nonlinear predictability score to detect determinism from point process data. Thanks to its modular nature, this approach can be adapted to whatever signature in the data one considers indicative of deterministic structure. After validating our approach using point process signals from deterministic and stochastic model dynamics, we show an application to neuronal spike trains recorded in the brain of an epilepsy patient. While we illustrate our approach in the context of temporal point processes, it can be readily applied to spatial point processes as well.

  13. The Bering Autonomous Target Detection

    DEFF Research Database (Denmark)

    Jørgensen, John Leif; Denver, Troelz; Betto, Maurizio

    2003-01-01

    An autonomous asteroid target detection and tracking method has been developed. The method features near omnidirectionality and focus on high speed operations and completeness of search of the near space rather than the traditional faint object search methods, employed presently at the larger...... telescopes. The method has proven robust in operation and is well suited for use onboard spacecraft. As development target for the method and the associated instrumentation the asteroid research mission Bering has been used. Onboard a spacecraft, the autonomous detection is centered around the fully...... autonomous star tracker the Advanced Stellar Compass (ASC). One feature of this instrument is that potential targets are registered directly in terms of date, right ascension, declination, and intensity, which greatly facilitates both tracking search and registering. Results from ground and inflight tests...

  14. Optical and acoustical UAV detection

    Science.gov (United States)

    Christnacher, Frank; Hengy, Sébastien; Laurenzis, Martin; Matwyschuk, Alexis; Naz, Pierre; Schertzer, Stéphane; Schmitt, Gwenael

    2016-10-01

    Recent world events have highlighted that the proliferation of UAVs is bringing with it a new and rapidly increasing threat for national defense and security agencies. Whilst many of the reported UAV incidents seem to indicate that there was no terrorist intent behind them, it is not unreasonable to assume that it may not be long before UAV platforms are regularly employed by terrorists or other criminal organizations. The flight characteristics of many of these mini- and micro-platforms present challenges for current systems which have been optimized over time to defend against the traditional air-breathing airborne platforms. A lot of programs to identify cost-effective measures for the detection, classification, tracking and neutralization have begun in the recent past. In this paper, lSL shows how the performance of a UAV detection and tracking concept based on acousto-optical technology can be powerfully increased through active imaging.

  15. Plagiarism Detection by Online Solutions.

    Science.gov (United States)

    Masic, Izet; Begic, Edin; Dobraca, Amra

    2017-01-01

    The problem of plagiarism represents one of the burning issues of the modern scientific world. Detection of plagiarism is a problem that the Editorial Board encounters in their daily work. Software solutions represent a good solution for the detection of plagiarism. The problem of plagiarism will become most discussed topic of the modern scientific world, especially due to the development of standard measures, which rank the work of one author. Investment in education, education of young research personnel about the importance of scientific research, with paying particular attention on ethical behavior, becomes an imperative of academic staff. Editors have to invest additional effort in the development of the base of reviewers team as well as in their proper guidance, because after all, despite the software solutions, they are the best weapon to fight plagiarism. Peer review process should be a key of successful operation of each journal.

  16. Toward Intelligent Software Defect Detection

    Science.gov (United States)

    Benson, Markland J.

    2011-01-01

    Source code level software defect detection has gone from state of the art to a software engineering best practice. Automated code analysis tools streamline many of the aspects of formal code inspections but have the drawback of being difficult to construct and either prone to false positives or severely limited in the set of defects that can be detected. Machine learning technology provides the promise of learning software defects by example, easing construction of detectors and broadening the range of defects that can be found. Pinpointing software defects with the same level of granularity as prominent source code analysis tools distinguishes this research from past efforts, which focused on analyzing software engineering metrics data with granularity limited to that of a particular function rather than a line of code.

  17. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose...... a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  18. Mammographic detection of breast cancer

    International Nuclear Information System (INIS)

    Homer, M.J.

    1982-01-01

    Mammography, whether film or xerography, is a complementary examination to breast palpation in the detection of breast cancer. According to the guidelines of the American Cancer Society, mammography should be performed on every asymptomatic woman, at least once, over the age of 35. Annual mammography after 50 is also advised. The radiation dose to the breast from current equipment is so low as to not be considered a factor in denying a woman this screening examination. Mammography has a role in evaluating the woman with solitary and multiple breast masses. It is the only proved reliable modality able to detect nonpalpable breast cancers and small tumors less than 2 cm in size. All nonpalpable lesions should be excised by directed biopsy, using a preoperative localization technique

  19. Self compensating fire detection device

    International Nuclear Information System (INIS)

    Cholin, J. M.

    1985-01-01

    A device employing ionization principles for fire detection disclosing a configuration which allows compensation for adverse effects due to the flow of the gas through the device or due to the accumulation of dust and dirt therein. The detecting device includes two ionization chambers, each having a first member, such as a cylindrically shaped cup, having first and second conductive surface portions. Each chamber also incudes a second member, such as a circular, electrode disc having two conductive surface portions. There is disposed in each chamber a radioactive source for ionizing the gas in the volumes intervening between respective pairs of surfaces. The area dimensions of the respective pairs of surfaces, the interventing volumes and the distances there between, and the relative orientation of the respective pairs are calculated and placed such that the ionization currents flowing between pairs of conductive surfaces are substantially equal and orthogonal to each other

  20. Vehicular camera pedestrian detection research

    Science.gov (United States)

    Liu, Jiahui

    2018-03-01

    With the rapid development of science and technology, it has made great development, but at the same time of highway traffic more convenient in highway traffic and transportation. However, in the meantime, traffic safety accidents occur more and more frequently in China. In order to deal with the increasingly heavy traffic safety. So, protecting the safety of people's personal property and facilitating travel has become a top priority. The real-time accurate pedestrian and driving environment are obtained through a vehicular camera which are used to detection and track the preceding moving targets. It is popular in the domain of intelligent vehicle safety driving, autonomous navigation and traffic system research. Based on the pedestrian video obtained by the Vehicular Camera, this paper studies the trajectory of pedestrian detection and its algorithm.

  1. Facial detection using deep learning

    Science.gov (United States)

    Sharma, Manik; Anuradha, J.; Manne, H. K.; Kashyap, G. S. C.

    2017-11-01

    In the recent past, we have observed that Facebook has developed an uncanny ability to recognize people in photographs. Previously, we had to tag people in photos by clicking on them and typing their name. Now as soon as we upload a photo, Facebook tags everyone on its own. Facebook can recognize faces with 98% accuracy which is pretty much as good as humans can do. This technology is called Face Detection. Face detection is a popular topic in biometrics. We have surveillance cameras in public places for video capture as well as security purposes. The main advantages of this algorithm over other are uniqueness and approval. We need speed and accuracy to identify. But face detection is really a series of several related problems: First, look at a picture and find all the faces in it. Second, focus on each face and understand that even if a face is turned in a weird direction or in bad lighting, it is still the same person. Third select features which can be used to identify each face uniquely like size of the eyes, face etc. Finally, compare these features to data we have to find the person name. As a human, your brain is wired to do all of this automatically and instantly. In fact, humans are too good at recognizing faces. Computers are not capable of this kind of high-level generalization, so we must teach them how to do each step in this process separately. The growth of face detection is largely driven by growing applications such as credit card verification, surveillance video images, authentication for banking and security system access.

  2. Measurement and detection of radiation

    CERN Document Server

    Tsoulfanidis, Nicholas

    2015-01-01

    This fourth edition reflects recent major developments that have occurred in radiation detector materials, systems, and applications. It continues to provide the most practical and up-to-date introduction to radiation detector technology, proper measurement techniques, and analysis of results for engineers and scientists using radiation sources. New chapters emphasize the expanded use of radiation detection systems in nuclear non-proliferation, homeland security, and nuclear medicine. The book also discusses the correct ways to perform measurements following current health physics procedures.

  3. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...... to ease commercialisation of the devices. This work will hopefully result in more commercial products that benefit from integrated optics, because the impact on commercial devices so far has been modest....

  4. Detection methods for irradiated foods

    International Nuclear Information System (INIS)

    Dyakova, A.; Tsvetkova, E.; Nikolova, R.

    2005-01-01

    In connection with the ongoing world application of irradiation as a technology in Food industry for increasing food safety, it became a need for methods of identification of irradiation. It was required to control international trade of irradiated foods, because of the certain that legally imposed food laws are not violated; supervise correct labeling; avoid multiple irradiation. Physical, chemical and biological methods for detection of irradiated foods as well principle that are based, are introducing in this summary

  5. Regression algorithm for emotion detection

    OpenAIRE

    Berthelon , Franck; Sander , Peter

    2013-01-01

    International audience; We present here two components of a computational system for emotion detection. PEMs (Personalized Emotion Maps) store links between bodily expressions and emotion values, and are individually calibrated to capture each person's emotion profile. They are an implementation based on aspects of Scherer's theoretical complex system model of emotion~\\cite{scherer00, scherer09}. We also present a regression algorithm that determines a person's emotional feeling from sensor m...

  6. Smart accelerometer. [vibration damage detection

    Science.gov (United States)

    Bozeman, Richard J., Jr. (Inventor)

    1994-01-01

    The invention discloses methods and apparatus for detecting vibrations from machines which indicate an impending malfunction for the purpose of preventing additional damage and allowing for an orderly shutdown or a change in mode of operation. The method and apparatus is especially suited for reliable operation in providing thruster control data concerning unstable vibration in an electrical environment which is typically noisy and in which unrecognized ground loops may exist.

  7. Human Signatures for Personnel Detection

    Science.gov (United States)

    2010-09-14

    eternal gratitude, my sister Isabel, Walter Hunter, but specially my mother whose incredible sacrifice is finally paying off, and Eileen who always...higher than the others. A high contrast image will exhibit a large variety of gray tones and great detail and also will have high dynamic range...with a gray line. By manipulating each color separately we can choose a color for each object detected. 66 currentr = round(trackedlist(currentID

  8. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  9. Instrumentation for Detecting Hazardous Materials.

    Science.gov (United States)

    1980-06-01

    equipment a detector for monitoring radioactivity . A portable device for detecting the presence of hazardous mate- rials should also be included in the...Acrylonitrile 2 Natural Gas/LNG 2 211 ----- Material Name (Cont’d.) Number of Times Listed Radioactive Materials 2 Fertilizers 1 Cellulose Nitrate 1 Acrolein...Birnbaum, and Curtis Fincher, L "Fluorescence Determination of the Atmospheric Polutant NO2 in Impact of Lasers in Spectroscopy, Vol. 49 of Proceed

  10. Radar-based hail detection

    Czech Academy of Sciences Publication Activity Database

    Skripniková, Kateřina; Řezáčová, Daniela

    2014-01-01

    Roč. 144, č. 1 (2014), s. 175-185 ISSN 0169-8095 R&D Projects: GA ČR(CZ) GAP209/11/2045; GA MŠk LD11044 Institutional support: RVO:68378289 Keywords : hail detection * weather radar * hail damage risk Subject RIV: DG - Athmosphere Sciences, Meteorology Impact factor: 2.844, year: 2014 http://www.sciencedirect.com/science/article/pii/S0169809513001804

  11. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  12. Space debris: modeling and detectability

    Science.gov (United States)

    Wiedemann, C.; Lorenz, J.; Radtke, J.; Kebschull, C.; Horstmann, A.; Stoll, E.

    2017-01-01

    High precision orbit determination is required for the detection and removal of space debris. Knowledge of the distribution of debris objects in orbit is necessary for orbit determination by active or passive sensors. The results can be used to investigate the orbits on which objects of a certain size at a certain frequency can be found. The knowledge of the orbital distribution of the objects as well as their properties in accordance with sensor performance models provide the basis for estimating the expected detection rates. Comprehensive modeling of the space debris environment is required for this. This paper provides an overview of the current state of knowledge about the space debris environment. In particular non-cataloged small objects are evaluated. Furthermore, improvements concerning the update of the current space debris model are addressed. The model of the space debris environment is based on the simulation of historical events, such as fragmentations due to explosions and collisions that actually occurred in Earth orbits. The orbital distribution of debris is simulated by propagating the orbits considering all perturbing forces up to a reference epoch. The modeled object population is compared with measured data and validated. The model provides a statistical distribution of space objects, according to their size and number. This distribution is based on the correct consideration of orbital mechanics. This allows for a realistic description of the space debris environment. Subsequently, a realistic prediction can be provided concerning the question, how many pieces of debris can be expected on certain orbits. To validate the model, a software tool has been developed which allows the simulation of the observation behavior of ground-based or space-based sensors. Thus, it is possible to compare the results of published measurement data with simulated detections. This tool can also be used for the simulation of sensor measurement campaigns. It is

  13. Biospeckle Supported Fruit Bruise Detection

    OpenAIRE

    Adilson M. Enes; Juliana A. Fracarolli; Inácio M. Dal Fabbro; Silvestre Rodrigues

    2012-01-01

    This research work proposed a study of fruit bruise detection by means of a biospeckle method, selecting the papaya fruit (Carica papaya) as testing body. Papaya is recognized as a fruit of outstanding nutritional qualities, showing high vitamin A content, calcium, carbohydrates, exhibiting high popularity all over the world, considering consumption and acceptability. The commercialization of papaya faces special problems which are associated to bruise generation during harvesting, packing an...

  14. Approaches to single photon detection

    International Nuclear Information System (INIS)

    Thew, R.T.; Curtz, N.; Eraerds, P.; Walenta, N.; Gautier, J.-D.; Koller, E.; Zhang, J.; Gisin, N.; Zbinden, H.

    2009-01-01

    We present recent results on our development of single photon detectors, including: gated and free-running InGaAs/InP avalanche photodiodes (APDs); hybrid detection systems based on sum-frequency generation (SFG) and Si APDs-SFG-Si APDs; and SSPDs (superconducting single photon detectors), for telecom wavelengths; as well as SiPM (Silicon photomultiplier) detectors operating in the visible regime.

  15. Detecting selection needs comparative data

    DEFF Research Database (Denmark)

    Nielsen, Rasmus; Hubisz, Melissa J.

    2005-01-01

    Positive selection at the molecular level is usually indicated by an increase in the ratio of non-synonymous to synonymous substitutions (dN/dS) in comparative data. However, Plotkin et al. 1 describe a new method for detecting positive selection based on a single nucleotide sequence. We show here...... that this method is particularly sensitive to assumptions regarding the underlying mutational processes and does not provide a reliable way to identify positive selection....

  16. Hydrogen Leak Detection Sensor Database

    Science.gov (United States)

    Baker, Barton D.

    2010-01-01

    This slide presentation reviews the characteristics of the Hydrogen Sensor database. The database is the result of NASA's continuing interest in and improvement of its ability to detect and assess gas leaks in space applications. The database specifics and a snapshot of an entry in the database are reviewed. Attempts were made to determine the applicability of each of the 65 sensors for ground and/or vehicle use.

  17. Microcantilever-Enabled Neutron Detection

    Directory of Open Access Journals (Sweden)

    Kevin R. Kyle

    2014-04-01

    Full Text Available A new concept for neutron radiation detection was demonstrated using piezoresistive microcantilevers as the active sensing element. Microcantilevers were used to measure the tiny volumetric changes in a sensing material upon absorption of neutron radiation and transmutation into a new element. Highly ordered inorganic crystalline lattices of boron-rich materials dispersed in polymeric rubber matrices were shown to act as volumetric neutron transducers.

  18. Domain similarity based orthology detection

    OpenAIRE

    Bitard-Feildel, Tristan; Kemena, Carsten; Greenwood, Jenny M; Bornberg-Bauer, Erich

    2015-01-01

    Background Orthologous protein detection software mostly uses pairwise comparisons of amino-acid sequences to assert whether two proteins are orthologous or not. Accordingly, when the number of sequences for comparison increases, the number of comparisons to compute grows in a quadratic order. A current challenge of bioinformatic research, especially when taking into account the increasing number of sequenced organisms available, is to make this ever-growing number of comparisons computationa...

  19. Radioelements: their detection and measurement

    International Nuclear Information System (INIS)

    Grinberg, B.

    1960-01-01

    A brief review of the properties of nuclear radiations is followed by a description of the basic techniques used for their detection: autoradiography, methods using the ionisation of gases (ionisation chambers, proportional counters, Geiger-Muller counters), scintillation techniques. The principles of the different methods of measurement are explained, whether they concern the activity or the energy absorbed (dosimetry). This is followed by a description of the basic techniques (4 π counter, defined solid angle, β-γ coincidences). (author) [fr

  20. Molecular clouds without detectable CO

    International Nuclear Information System (INIS)

    Blitz, L.; Bazell, D.; Desert, F.X.

    1990-01-01

    The clouds identified by Desert, Bazell, and Boulanger (DBB clouds) in their search for high-latitude molecular clouds were observed in the CO (J = 1-0) line, but only 13 percent of the sample was detected. The remaining 87 percent are diffuse molecular clouds with CO abundances of about 10 to the -6th, a typical value for diffuse clouds. This hypothesis is shown to be consistent with Copernicus data. The DBB clouds are shown to be an essentially complete catalog of diffuse molecular clouds in the solar vicinity. The total molecular surface density in the vicinity of the sun is then only about 20 percent greater than the 1.3 solar masses/sq pc determined by Dame et al. (1987). Analysis of the CO detections indicates that there is a sharp threshold in extinction of 0.25 mag before CO is detectable and is derived from the IRAS I(100) micron threshold of 4 MJy/sr. This threshold is presumably where the CO abundance exhibits a sharp increase 18 refs

  1. A prescription fraud detection model.

    Science.gov (United States)

    Aral, Karca Duru; Güvenir, Halil Altay; Sabuncuoğlu, Ihsan; Akar, Ahmet Ruchan

    2012-04-01

    Prescription fraud is a main problem that causes substantial monetary loss in health care systems. We aimed to develop a model for detecting cases of prescription fraud and test it on real world data from a large multi-center medical prescription database. Conventionally, prescription fraud detection is conducted on random samples by human experts. However, the samples might be misleading and manual detection is costly. We propose a novel distance based on data-mining approach for assessing the fraudulent risk of prescriptions regarding cross-features. Final tests have been conducted on adult cardiac surgery database. The results obtained from experiments reveal that the proposed model works considerably well with a true positive rate of 77.4% and a false positive rate of 6% for the fraudulent medical prescriptions. The proposed model has the potential advantages including on-line risk prediction for prescription fraud, off-line analysis of high-risk prescriptions by human experts, and self-learning ability by regular updates of the integrative data sets. We conclude that incorporating such a system in health authorities, social security agencies and insurance companies would improve efficiency of internal review to ensure compliance with the law, and radically decrease human-expert auditing costs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  2. Method of detecting irradiated pepper

    International Nuclear Information System (INIS)

    Doumaru, Takaaki; Furuta, Masakazu; Katayama, Tadashi; Toratani, Hirokazu; Takeda, Atsuhiko

    1989-01-01

    Spices represented by pepper are generally contaminated by microorganisms, and for using them as foodstuffs, some sterilizing treatment is indispensable. However, heating is not suitable to spices, accordingly ethylene oxide gas sterilization has been inevitably carried out, but its carcinogenic property is a problem. Food irradiation is the technology for killing microorganisms and noxious insects which cause the rotting and spoiling of foods and preventing the germination, which is an energy-conserving method without the fear of residual chemicals, therefore, it is most suitable to the sterilization of spices. In the irradiation of lower than 10 kGy, the toxicity test is not required for any food, and the irradiation of spices is permitted in 20 countries. However, in order to establish the international distribution organization for irradiated foods, the PR to consumers and the development of the means of detecting irradiation are the important subjects. The authors used pepper, and examined whether the hydrogen generated by irradiation remains in seeds and it can be detected or not. The experimental method and the results are reported. From the samples without irradiation, hydrogen was scarcely detected. The quantity of hydrogen generated was proportional to dose. The measuring instrument is only a gas chromatograph. (K.I.)

  3. Community Detection for Correlation Matrices

    Directory of Open Access Journals (Sweden)

    Mel MacMahon

    2015-04-01

    Full Text Available A challenging problem in the study of complex systems is that of resolving, without prior information, the emergent, mesoscopic organization determined by groups of units whose dynamical activity is more strongly correlated internally than with the rest of the system. The existing techniques to filter correlations are not explicitly oriented towards identifying such modules and can suffer from an unavoidable information loss. A promising alternative is that of employing community detection techniques developed in network theory. Unfortunately, this approach has focused predominantly on replacing network data with correlation matrices, a procedure that we show to be intrinsically biased because of its inconsistency with the null hypotheses underlying the existing algorithms. Here, we introduce, via a consistent redefinition of null models based on random matrix theory, the appropriate correlation-based counterparts of the most popular community detection techniques. Our methods can filter out both unit-specific noise and system-wide dependencies, and the resulting communities are internally correlated and mutually anticorrelated. We also implement multiresolution and multifrequency approaches revealing hierarchically nested subcommunities with “hard” cores and “soft” peripheries. We apply our techniques to several financial time series and identify mesoscopic groups of stocks which are irreducible to a standard, sectorial taxonomy; detect “soft stocks” that alternate between communities; and discuss implications for portfolio optimization and risk management.

  4. Road Anomalies Detection System Evaluation.

    Science.gov (United States)

    Silva, Nuno; Shah, Vaibhav; Soares, João; Rodrigues, Helena

    2018-06-21

    Anomalies on road pavement cause discomfort to drivers and passengers, and may cause mechanical failure or even accidents. Governments spend millions of Euros every year on road maintenance, often causing traffic jams and congestion on urban roads on a daily basis. This paper analyses the difference between the deployment of a road anomalies detection and identification system in a “conditioned” and a real world setup, where the system performed worse compared to the “conditioned” setup. It also presents a system performance analysis based on the analysis of the training data sets; on the analysis of the attributes complexity, through the application of PCA techniques; and on the analysis of the attributes in the context of each anomaly type, using acceleration standard deviation attributes to observe how different anomalies classes are distributed in the Cartesian coordinates system. Overall, in this paper, we describe the main insights on road anomalies detection challenges to support the design and deployment of a new iteration of our system towards the deployment of a road anomaly detection service to provide information about roads condition to drivers and government entities.

  5. Defect detection using transient thermography

    International Nuclear Information System (INIS)

    Mohd Zaki Umar; Ibrahim Ahmad; Ab Razak Hamzah; Wan Saffiey Wan Abdullah

    2008-08-01

    An experimental research had been carried out to study the potential of transient thermography in detecting sub-surface defect of non-metal material. In this research, eight pieces of bakelite material were used as samples. Each samples had a sub-surface defect in the circular shape with different diameters and depths. Experiment was conducted using one-sided Pulsed Thermal technique. Heating of samples were done using 30 kWatt adjustable quartz lamp while infra red (IR) images of samples were recorded using THV 550 IR camera. These IR images were then analysed with ThermofitTMPro software to obtain the Maximum Absolute Differential Temperature Signal value, ΔΤ m ax and the time of its appearance, τ m ax (ΔΤ). Result showed that all defects were able to be detected even for the smallest and deepest defect (diameter = 5 mm and depth = 4 mm). However the highest value of Differential Temperature Signal (ΔΤ m ax), were obtained at defect with the largest diameter, 20 mm and at the shallowest depth, 1 mm. As a conclusion, the sensitivity of the pulsed thermography technique to detect sub-surface defects of bakelite material is proportionately related with the size of defect diameter if the defects are at the same depth. On the contrary, the sensitivity of the pulsed thermography technique inversely related with the depth of defect if the defects have similar diameter size. (Author)

  6. Early detection of materials degradation

    Science.gov (United States)

    Meyendorf, Norbert

    2017-02-01

    Lightweight components for transportation and aerospace applications are designed for an estimated lifecycle, taking expected mechanical and environmental loads into account. The main reason for catastrophic failure of components within the expected lifecycle are material inhomogeneities, like pores and inclusions as origin for fatigue cracks, that have not been detected by NDE. However, material degradation by designed or unexpected loading conditions or environmental impacts can accelerate the crack initiation or growth. Conventional NDE methods are usually able to detect cracks that are formed at the end of the degradation process, but methods for early detection of fatigue, creep, and corrosion are still a matter of research. For conventional materials ultrasonic, electromagnetic, or thermographic methods have been demonstrated as promising. Other approaches are focused to surface damage by using optical methods or characterization of the residual surface stresses that can significantly affect the creation of fatigue cracks. For conventional metallic materials, material models for nucleation and propagation of damage have been successfully applied for several years. Material microstructure/property relations are well established and the effect of loading conditions on the component life can be simulated. For advanced materials, for example carbon matrix composites or ceramic matrix composites, the processes of nucleation and propagation of damage is still not fully understood. For these materials NDE methods can not only be used for the periodic inspections, but can significantly contribute to the material scientific knowledge to understand and model the behavior of composite materials.

  7. Interface detection by neutron scattering

    International Nuclear Information System (INIS)

    De Monchy, A.R.; Kok, C.A.; Dorrepaal, J.

    1979-01-01

    A method and apparatus for detecting an interface of materials having different hydrogen content present in a metal vessel or pipe eg. made of steel, are described. Steel walls of columns, reactors, pipelines etc can be monitored. It is very suitable for detection of liquid water or hydrocarbons present in gas pipelines and also for the detection of a liquid hydrocarbon in a vessel or column. A series of measurements of the hydrogen density of the contents of a vessel or pipe are made using at least one californium-252 neutron source located near the outer side of the pipe. Neutrons are emitted and are scattered by the contents of the pipe. At least one neutron detector is located near the outer side of the metal wall. The detectors have a higher sensitivity for scattered neutrons (from the light hydrogen nuclei present in water or hydrocarbons). A source of 0.1 - 1 micrograms produces enough neutrons for most technical applications so the handling is relatively safe although shielding is advocated. The detectors contain helium-3 at a pressure of about 10 bar. Current pulses from the detector are counted. (U.K.)

  8. UNICORN: Misuse detection for UNICOS

    Energy Technology Data Exchange (ETDEWEB)

    Christoph, G.G; Jackson, K.A.; Neuman, M.C.; Siciliano, C.L.B.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.

    1995-03-29

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year and a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.

  9. Community Detection for Correlation Matrices

    Science.gov (United States)

    MacMahon, Mel; Garlaschelli, Diego

    2015-04-01

    A challenging problem in the study of complex systems is that of resolving, without prior information, the emergent, mesoscopic organization determined by groups of units whose dynamical activity is more strongly correlated internally than with the rest of the system. The existing techniques to filter correlations are not explicitly oriented towards identifying such modules and can suffer from an unavoidable information loss. A promising alternative is that of employing community detection techniques developed in network theory. Unfortunately, this approach has focused predominantly on replacing network data with correlation matrices, a procedure that we show to be intrinsically biased because of its inconsistency with the null hypotheses underlying the existing algorithms. Here, we introduce, via a consistent redefinition of null models based on random matrix theory, the appropriate correlation-based counterparts of the most popular community detection techniques. Our methods can filter out both unit-specific noise and system-wide dependencies, and the resulting communities are internally correlated and mutually anticorrelated. We also implement multiresolution and multifrequency approaches revealing hierarchically nested subcommunities with "hard" cores and "soft" peripheries. We apply our techniques to several financial time series and identify mesoscopic groups of stocks which are irreducible to a standard, sectorial taxonomy; detect "soft stocks" that alternate between communities; and discuss implications for portfolio optimization and risk management.

  10. Compensated intruder-detection systems

    Science.gov (United States)

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  11. Detecting failure of climate predictions

    Science.gov (United States)

    Runge, Michael C.; Stroeve, Julienne C.; Barrett, Andrew P.; McDonald-Madden, Eve

    2016-01-01

    The practical consequences of climate change challenge society to formulate responses that are more suited to achieving long-term objectives, even if those responses have to be made in the face of uncertainty1, 2. Such a decision-analytic focus uses the products of climate science as probabilistic predictions about the effects of management policies3. Here we present methods to detect when climate predictions are failing to capture the system dynamics. For a single model, we measure goodness of fit based on the empirical distribution function, and define failure when the distribution of observed values significantly diverges from the modelled distribution. For a set of models, the same statistic can be used to provide relative weights for the individual models, and we define failure when there is no linear weighting of the ensemble models that produces a satisfactory match to the observations. Early detection of failure of a set of predictions is important for improving model predictions and the decisions based on them. We show that these methods would have detected a range shift in northern pintail 20 years before it was actually discovered, and are increasingly giving more weight to those climate models that forecast a September ice-free Arctic by 2055.

  12. Optical detection of polychlorinated biphenyls

    Science.gov (United States)

    Kuncova, Gabriela; Berkova, Daniela; Burkhard, Jiri; Demnerova, Katerina; Pazlarova, Jarmila; Triska, Jan; Vrchotova, Nadezda

    1999-12-01

    In this paper we describe the detection of polychlorinated biphenyls (PCBs) which is based on the measurement of changes of optical absorption at 400 nm of the medium in an aerobic bioreactor with immobilized cells Pseudomonas species 2. The rate of production, composition and the concentration of yellow intermediates are influenced by concentration and composition of PCB mixtures, concentration of cells and by the methods of immobilization. The method was applied in the detection of commercial mixture D103. It was found that the advantageous carriers were inorganic or organic-inorganic matrices, which sorbed PCBs and a cell outgrowth from their surface was low. In water contaminated with transformer oil and chlorinated hydrocarbons the detection limit is 10-2 gD103/kg. In transformer oil the upper limit for degradation of D103 by sodium dehalogenation (1.5 gD103 /kgoil) was determined also in the presence of the same concentration of trichloroethylene. The employment to of a liquid core waveguide spectrophotometer instead of a diode array spectrophotometer increased the sensitivity of the measurement of yellow intermediates by a factor of 100. An extrinsic fiber-optic sensor was used for in-situ measurement during biodegradation of PCBs in bioreactors.

  13. Direct Fast-Neutron Detection

    International Nuclear Information System (INIS)

    DC Stromswold; AJ Peurrung; RR Hansen; PL Reeder

    2000-01-01

    Direct fast-neutron detection is the detection of fast neutrons before they are moderated to thermal energy. We have investigated two approaches for using proton-recoil in plastic scintillators to detect fast neutrons and distinguish them from gamma-ray interactions. Both approaches use the difference in travel speed between neutrons and gamma rays as the basis for separating the types of events. In the first method, we examined the pulses generated during scattering in a plastic scintillator to see if they provide a means for distinguishing fast-neutron events from gamma-ray events. The slower speed of neutrons compared to gamma rays results in the production of broader pulses when neutrons scatter several times within a plastic scintillator. In contrast, gamma-ray interactions should produce narrow pulses, even if multiple scattering takes place, because the time between successive scattering is small. Experiments using a fast scintillator confirmed the presence of broader pulses from neutrons than from gamma rays. However, the difference in pulse widths between neutrons and gamma rays using the best commercially available scintillators was not sufficiently large to provide a practical means for distinguishing fast neutrons and gamma rays on a pulse-by-pulse basis. A faster scintillator is needed, and that scintillator might become available in the literature. Results of the pulse-width studies were presented in a previous report (peurrung et al. 1998), and they are only summarized here

  14. Detecting spatial regimes in ecosystems

    Science.gov (United States)

    Sundstrom, Shana M.; Eason, Tarsha; Nelson, R. John; Angeler, David G.; Barichievy, Chris; Garmestani, Ahjond S.; Graham, Nicholas A.J.; Granholm, Dean; Gunderson, Lance; Knutson, Melinda; Nash, Kirsty L.; Spanbauer, Trisha; Stow, Craig A.; Allen, Craig R.

    2017-01-01

    Research on early warning indicators has generally focused on assessing temporal transitions with limited application of these methods to detecting spatial regimes. Traditional spatial boundary detection procedures that result in ecoregion maps are typically based on ecological potential (i.e. potential vegetation), and often fail to account for ongoing changes due to stressors such as land use change and climate change and their effects on plant and animal communities. We use Fisher information, an information theory-based method, on both terrestrial and aquatic animal data (U.S. Breeding Bird Survey and marine zooplankton) to identify ecological boundaries, and compare our results to traditional early warning indicators, conventional ecoregion maps and multivariate analyses such as nMDS and cluster analysis. We successfully detected spatial regimes and transitions in both terrestrial and aquatic systems using Fisher information. Furthermore, Fisher information provided explicit spatial information about community change that is absent from other multivariate approaches. Our results suggest that defining spatial regimes based on animal communities may better reflect ecological reality than do traditional ecoregion maps, especially in our current era of rapid and unpredictable ecological change.

  15. The SPLENDID chewing detection challenge.

    Science.gov (United States)

    Papapanagiotou, Vasileios; Diou, Christos; Lingchuan Zhou; van den Boer, Janet; Mars, Monica; Delopoulos, Anastasios

    2017-07-01

    Monitoring of eating behavior using wearable technology is receiving increased attention, driven by the recent advances in wearable devices and mobile phones. One particularly interesting aspect of eating behavior is the monitoring of chewing activity and eating occurrences. There are several chewing sensor types and chewing detection algorithms proposed in the bibliography, however no datasets are publicly available to facilitate evaluation and further research. In this paper, we present a multi-modal dataset of over 60 hours of recordings from 14 participants in semi-free living conditions, collected in the context of the SPLENDID project. The dataset includes raw signals from a photoplethysmography (PPG) sensor and a 3D accelerometer, and a set of extracted features from audio recordings; detailed annotations and ground truth are also provided both at eating event level and at individual chew level. We also provide a baseline evaluation method, and introduce the "challenge" of improving the baseline chewing detection algorithms. The dataset can be downloaded from http: //dx.doi.org/10.17026/dans-zxw-v8gy, and supplementary code can be downloaded from https://github. com/mug-auth/chewing-detection-challenge.git.

  16. Fluorescence detection of esophageal neoplasia

    Science.gov (United States)

    Borisova, E.; Vladimirov, B.; Avramov, L.

    2008-06-01

    White-light endoscopy is well-established and wide used modality. However, despite the many technological advances that have been occurred, conventional endoscopy is suboptimal and usually detects advanced stage lesions. The limitations of standard endoscopy initiate development of spectroscopic techniques, additional to standard endoscopic equipment. One of the most sensitive approaches is fluorescence spectroscopy of gastrointestinal mucosa for neoplasia detection. In the recent study delta-aminolevulinic acid/Protoporphyrin IX (5-ALA/PpIX) is used as fluorescent marker for dysplasia and tumor detection in esophagus. The 5-ALA is administered per os six hours before measurements at dose 20 mg/kg weight. Excitation source has max of emission at 405 nm and light is delivered by the standard light guide of the endoscopic equipment. Through endoscopic instrumental channel a fiber is applied to return information about fluorescence to microspectrometer. Spectral features observed during endoscopic investigations could be distinct as the next regions: 450-630 nm region, where tissue autofluorescence is observed; 630-710 nm region, where fluorescence of PpIX is clearly pronounced; 530-580 nm region, where minima in the autofluorescence signal are observed, related to reabsorption of blood. The lack of fluorescence peaks in the red spectral area for normal mucosa is an indication for selective accumulation of 5-ALA/PpIX only in abnormal sites Very good correlation between fluorescence signals and histology examination of the lesions investigated is achieved.

  17. Meteotsunami Detection with ASOS data

    Science.gov (United States)

    Kim, Y. Y.; Angove, M.

    2017-12-01

    A meteotsunami can strike almost any coast. Recent researches have shown that meteotsunamis are more common than previously thought and suggest that some past events may have been mistaken for other types of coastal floods, such as storm surges or seiches. In the United States, conditions for destructive meteotsunamis are most favorable along the East Coast, Gulf of Mexico, and in the Great Lakes, where they may pose a greater threat than earthquake-generated tsunamis. It is evident that meteotsunamis are strongly related to a mesoscale convective system or derecho of sufficient intensity and translational speed. Meteotsunamis are generated by pressure and wind disturbances related to the convective system above continental shelf area of the ocean. In this study it is noted that air pressure, wind gust speed, and air temperature display specific simultaneous changes favorable for meteotsunami development. Sudden wind gust rise, air pressure rise, and air temperature drop occur due to gust front related to cloud downdrafts. Therefore, we suggest that such a consistent tendency of wind gust speed, air pressure, and air temperature associated with mesoscale convective system capable of generating meteotsunami can be used for meteotsunami detection about one or two days before the event in the ocean. It was applied for the June 13, 2013 meteotsunami with automated surface observing systems (ASOS) meteorological data. For operational use of the detection of potential for meteotsunami development at U.S. East or Gulf of Mexico coasts in waters, detection threshold values for the three variables are also discussed.

  18. Presymptomatic detection of Parkinson's disease.

    Science.gov (United States)

    Jenner, P

    1993-01-01

    Presymptomatic detection of Parkinson's disease is necessary if neuroprotective therapies are to be utilized in its treatment. Various methods (PET, electrophysiology, enzyme assays, olfactory function) may be applicable but none has been rigorously evaluated. Other possible approaches are now considered. Plasma HVA levels (pHVA) in the presence of debrisoquine may reflect cerebral dopamine function. However, there are no detectable differences in pHVA between newly diagnosed and untreated parkinsonian patients and control subjects. Compensatory increases in dopamine turnover may mask a decrease in pHVA in the early stages of the disease. So, at present this technique could not be used as a diagnostic tool. Post-mortem studies of brain in Parkinson's disease may provide clues to biochemical markers indicative of nigral pathology. Mitochondrial complex I activity is reduced in substantia nigra in Parkinson's disease and it was reported also to be markedly reduced in blood platelets. However, subsequent studies suggest that the difference in platelet complex I activity is too small to be diagnostic of Parkinson's disease. There are also selective reductions in brain glutathione levels in Parkinson's disease restricted to substantia nigra, which do not occur in other neurodegenerative disorders and are not due to drug treatment. Importantly, in incidental Lewy body disease (preclinical Parkinson's disease) nigral glutathione levels are reduced to the same degree as in advanced Parkinson's disease. So, some peripheral index of altered glutathione function may be valuable in the early detection of the disease process.

  19. Crack detection using image processing

    International Nuclear Information System (INIS)

    Moustafa, M.A.A

    2010-01-01

    This thesis contains five main subjects in eight chapters and two appendices. The first subject discus Wiener filter for filtering images. In the second subject, we examine using different methods, as Steepest Descent Algorithm (SDA) and the Wavelet Transformation, to detect and filling the cracks, and it's applications in different areas as Nano technology and Bio-technology. In third subject, we attempt to find 3-D images from 1-D or 2-D images using texture mapping with Open Gl under Visual C ++ language programming. The fourth subject consists of the process of using the image warping methods for finding the depth of 2-D images using affine transformation, bilinear transformation, projective mapping, Mosaic warping and similarity transformation. More details about this subject will be discussed below. The fifth subject, the Bezier curves and surface, will be discussed in details. The methods for creating Bezier curves and surface with unknown distribution, using only control points. At the end of our discussion we will obtain the solid form, using the so called NURBS (Non-Uniform Rational B-Spline); which depends on: the degree of freedom, control points, knots, and an evaluation rule; and is defined as a mathematical representation of 3-D geometry that can accurately describe any shape from a simple 2-D line, circle, arc, or curve to the most complex 3-D organic free-form surface or (solid) which depends on finding the Bezier curve and creating family of curves (surface), then filling in between to obtain the solid form. Another representation for this subject is concerned with building 3D geometric models from physical objects using image-based techniques. The advantage of image techniques is that they require no expensive equipment; we use NURBS, subdivision surface and mesh for finding the depth of any image with one still view or 2D image. The quality of filtering depends on the way the data is incorporated into the model. The data should be treated with

  20. Anomaly Detection in Dynamic Networks

    Energy Technology Data Exchange (ETDEWEB)

    Turcotte, Melissa [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-10-14

    Anomaly detection in dynamic communication networks has many important security applications. These networks can be extremely large and so detecting any changes in their structure can be computationally challenging; hence, computationally fast, parallelisable methods for monitoring the network are paramount. For this reason the methods presented here use independent node and edge based models to detect locally anomalous substructures within communication networks. As a first stage, the aim is to detect changes in the data streams arising from node or edge communications. Throughout the thesis simple, conjugate Bayesian models for counting processes are used to model these data streams. A second stage of analysis can then be performed on a much reduced subset of the network comprising nodes and edges which have been identified as potentially anomalous in the first stage. The first method assumes communications in a network arise from an inhomogeneous Poisson process with piecewise constant intensity. Anomaly detection is then treated as a changepoint problem on the intensities. The changepoint model is extended to incorporate seasonal behavior inherent in communication networks. This seasonal behavior is also viewed as a changepoint problem acting on a piecewise constant Poisson process. In a static time frame, inference is made on this extended model via a Gibbs sampling strategy. In a sequential time frame, where the data arrive as a stream, a novel, fast Sequential Monte Carlo (SMC) algorithm is introduced to sample from the sequence of posterior distributions of the change points over time. A second method is considered for monitoring communications in a large scale computer network. The usage patterns in these types of networks are very bursty in nature and don’t fit a Poisson process model. For tractable inference, discrete time models are considered, where the data are aggregated into discrete time periods and probability models are fitted to the

  1. Detection methods of irradiated foodstuffs

    Energy Technology Data Exchange (ETDEWEB)

    Ponta, C C; Cutrubinis, M; Georgescu, R [IRASM Center, Horia Hulubei National Institute for Physics and Nuclear Engineering, PO Box MG-6, RO-077125 Magurele-Bucharest (Romania); Mihai, R [Life and Environmental Physics Department, Horia Hulubei National Institute for Physics and Nuclear Engineering, PO Box MG-6, RO-077125 Magurele-Bucharest (Romania); Secu, M [National Institute of Materials Physics, Bucharest (Romania)

    2005-07-01

    food is marketed as irradiated or if irradiated goods are sold without the appropriate labeling, then detection tests should be able to prove the authenticity of the product. For the moment in Romania there is not any food control laboratory able to detect irradiated foodstuffs. The Technological Irradiation Department coordinates and co finances a research project aimed to establish the first Laboratory of Irradiated Foodstuffs Detection. The detection methods studied in this project are the ESR methods (for cellulose EN 1787/2000, bone EN 1786/1996 and crystalline sugar EN 13708/2003), the TL method (EN 1788/2001), the PSL method (EN 13751/2002) and the DNA Comet Assay method (EN 13784/2001). The above detection methods will be applied on various foodstuffs such: garlic, onion, potatoes, rice, beans, wheat, maize, pistachio, sunflower seeds, raisins, figs, strawberries, chicken, beef, fish, pepper, paprika, thyme, laurel and mushrooms. As an example of the application of a detection method there are presented the ESR spectra of irradiated and nonirradiated paprika acquired according to ESR detection method for irradiated foodstuffs containing cellulose. First of all it can be noticed that the intensity of the signal of cellulose is much higher for the irradiated sample than that for the nonirradiated one and second that appear two radiation specific signals symmetrical to the cellulose signal. These two radiation specific signals prove the irradiation treatment of paprika. (author)

  2. Radiation Detection Computational Benchmark Scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Shaver, Mark W.; Casella, Andrew M.; Wittman, Richard S.; McDonald, Ben S.

    2013-09-24

    Modeling forms an important component of radiation detection development, allowing for testing of new detector designs, evaluation of existing equipment against a wide variety of potential threat sources, and assessing operation performance of radiation detection systems. This can, however, result in large and complex scenarios which are time consuming to model. A variety of approaches to radiation transport modeling exist with complementary strengths and weaknesses for different problems. This variety of approaches, and the development of promising new tools (such as ORNL’s ADVANTG) which combine benefits of multiple approaches, illustrates the need for a means of evaluating or comparing different techniques for radiation detection problems. This report presents a set of 9 benchmark problems for comparing different types of radiation transport calculations, identifying appropriate tools for classes of problems, and testing and guiding the development of new methods. The benchmarks were drawn primarily from existing or previous calculations with a preference for scenarios which include experimental data, or otherwise have results with a high level of confidence, are non-sensitive, and represent problem sets of interest to NA-22. From a technical perspective, the benchmarks were chosen to span a range of difficulty and to include gamma transport, neutron transport, or both and represent different important physical processes and a range of sensitivity to angular or energy fidelity. Following benchmark identification, existing information about geometry, measurements, and previous calculations were assembled. Monte Carlo results (MCNP decks) were reviewed or created and re-run in order to attain accurate computational times and to verify agreement with experimental data, when present. Benchmark information was then conveyed to ORNL in order to guide testing and development of hybrid calculations. The results of those ADVANTG calculations were then sent to PNNL for

  3. Community detection using preference networks

    Science.gov (United States)

    Tasgin, Mursel; Bingol, Haluk O.

    2018-04-01

    Community detection is the task of identifying clusters or groups of nodes in a network where nodes within the same group are more connected with each other than with nodes in different groups. It has practical uses in identifying similar functions or roles of nodes in many biological, social and computer networks. With the availability of very large networks in recent years, performance and scalability of community detection algorithms become crucial, i.e. if time complexity of an algorithm is high, it cannot run on large networks. In this paper, we propose a new community detection algorithm, which has a local approach and is able to run on large networks. It has a simple and effective method; given a network, algorithm constructs a preference network of nodes where each node has a single outgoing edge showing its preferred node to be in the same community with. In such a preference network, each connected component is a community. Selection of the preferred node is performed using similarity based metrics of nodes. We use two alternatives for this purpose which can be calculated in 1-neighborhood of nodes, i.e. number of common neighbors of selector node and its neighbors and, the spread capability of neighbors around the selector node which is calculated by the gossip algorithm of Lind et.al. Our algorithm is tested on both computer generated LFR networks and real-life networks with ground-truth community structure. It can identify communities accurately in a fast way. It is local, scalable and suitable for distributed execution on large networks.

  4. Geodesic detection of Agulhas rings

    Science.gov (United States)

    Beron-Vera, F. J.; Wang, Y.; Olascoaga, M. J.; Goni, G. J.; Haller, G.

    2012-12-01

    Mesoscale oceanic eddies are routinely detected from instantaneous velocities. While simple to implement, this Eulerian approach gives frame-dependent results and often hides true material transport by eddies. Building on the recent geodesic theory of transport barriers, we develop an objective (i.e., frame-independent) method for accurately locating coherent Lagrangian eddies. These eddies act as compact water bodies, with boundaries showing no leakage or filamentation over long periods of time. Applying the algorithm to altimetry-derived velocities in the South Atlantic, we detect, for the first time, Agulhas rings that preserve their material coherence for several months, while eddy candidates yielded by other approaches tend to disperse or leak within weeks. These findings suggest that current Eulerian estimates of the Agulhas leakage need significant revision.Temporal evolution of fluid patches identified as eddies by different methods. First column: eddies extracted using geodesic eddy identification [1,2]. Second column: eddies identified from sea surface height (SSH) using the methodology of Chelton et al. [2] with U/c > 1. Third column: eddies identified as elliptic regions by the Okubo-Weiss (OW) criterion [e.g., 3]. Fourth column: eddies identified as mesoelliptic (ME) regions by Mezic et al.'s [4] criterion. References: [1] Beron-Vera et al. (2012). Geodesic eddy detection suggests reassessment of Agulhas leakage. Proc. Nat. Acad. Sci. USA, submitted. [2] Haller & Beron-Vera (2012). Geodesic theory of transport barriers in two-dimensional flows. Physica D, in press. [2] Chelton et al. (2011). Prog. Oceanog. 91, 167. [3] Chelton et al. (2007). Geophys. Res. Lett. 34, L5606. [4] Mezic et al. (2010). Science 330, 486.

  5. Radiopharmaceuticals for SPECT cancer detection

    Energy Technology Data Exchange (ETDEWEB)

    Chernov, V. I., E-mail: chernov@oncology.tomsk.ru; Medvedeva, A. A., E-mail: tickayaAA@oncology.tomsk.ru; Zelchan, R. V., E-mail: r.zelchan@yandex.ru; Sinilkin, I. G., E-mail: sinilkinig@oncology.tomsk.ru [Tomsk Cancer Research Institute, Kooperativny Street 5, Tomsk, 634050 (Russian Federation); Tomsk Polytechnic University, Lenin Avenue 30, Tomsk, 634050 (Russian Federation); Stasyuk, E. S.; Larionova, L. A. [Tomsk Polytechnic University, Lenin Avenue 30, Tomsk, 634050 (Russian Federation); Slonimskaya, E. M.; Choynzonov, E. L. [Tomsk Cancer Research Institute, Kooperativny Street 5, Tomsk, 634050 (Russian Federation)

    2016-08-02

    The purpose of the study was to assess the efficacy of single photon emission computed tomography (SPECT) with {sup 199}Tl and {sup 99}mTc-MIBI in the detection of breast, laryngeal and hypopharyngeal cancers. A total of 220 patients were included into the study: 120 patients with breast lesions (100 patients with breast cancer and 20 patients with benign breast tumors) and 100 patients with laryngeal/hypopharyngeal diseases (80 patients with laryngeal/hypopharyngeal cancer and 20 patients with benign laryngeal/hypopharyngeal lesions). No abnormal {sup 199}Tl uptake was seen in all patients with benign breast and laryngeal lesions, indicating a 100% specificity of {sup 199}Tl SPECT. In the breast cancer patients, the increased {sup 199}Tl uptake in the breast was visualized in 94.8% patients, {sup 99m}Tc-MIBI—in 93.4% patients. The increased {sup 199}Tl uptake in axillary lymph nodes was detected in 60% patients, and {sup 99m}Tc-MIBI—in 93.1% patients. In patients with laryngeal/hypopharyngeal cancer, the sensitivity of SPECT with {sup 199}Tl and {sup 99m}Tc-MIBI was 95%. The {sup 199}Tl SPECT sensitivity in identification of regional lymph node metastases in the patients with laryngeal/hypopharyngeal cancer was 75% and the {sup 99m}Tc-MIBI SPECT sensitivity was 17%. The data obtained showed that SPECT with {sup 199}Tl and {sup 99m}Tc-MIBI can be used as one of the additional imaging methods in detection of tumors.

  6. Domain similarity based orthology detection.

    Science.gov (United States)

    Bitard-Feildel, Tristan; Kemena, Carsten; Greenwood, Jenny M; Bornberg-Bauer, Erich

    2015-05-13

    Orthologous protein detection software mostly uses pairwise comparisons of amino-acid sequences to assert whether two proteins are orthologous or not. Accordingly, when the number of sequences for comparison increases, the number of comparisons to compute grows in a quadratic order. A current challenge of bioinformatic research, especially when taking into account the increasing number of sequenced organisms available, is to make this ever-growing number of comparisons computationally feasible in a reasonable amount of time. We propose to speed up the detection of orthologous proteins by using strings of domains to characterize the proteins. We present two new protein similarity measures, a cosine and a maximal weight matching score based on domain content similarity, and new software, named porthoDom. The qualities of the cosine and the maximal weight matching similarity measures are compared against curated datasets. The measures show that domain content similarities are able to correctly group proteins into their families. Accordingly, the cosine similarity measure is used inside porthoDom, the wrapper developed for proteinortho. porthoDom makes use of domain content similarity measures to group proteins together before searching for orthologs. By using domains instead of amino acid sequences, the reduction of the search space decreases the computational complexity of an all-against-all sequence comparison. We demonstrate that representing and comparing proteins as strings of discrete domains, i.e. as a concatenation of their unique identifiers, allows a drastic simplification of search space. porthoDom has the advantage of speeding up orthology detection while maintaining a degree of accuracy similar to proteinortho. The implementation of porthoDom is released using python and C++ languages and is available under the GNU GPL licence 3 at http://www.bornberglab.org/pages/porthoda .

  7. Indirect detection of dark matter

    International Nuclear Information System (INIS)

    Pieri, L.

    2008-01-01

    In the Cold Dark Matter scenario, the Dark Matter particle candidate may be a Weakly Interacting Massive Particle (Wimp). Annihilation of two Wimps in local or cosmological structures would result in the production of a number of standard model particles such as photons, leptons and baryons which could be observed with the presently available or future experiments such as the Pamela or Glast satellites or the Cherenkov Telescopes. In this work we review the status-of-the-art of the theoretical and phenomenological studies about the possibility of indirect detection of signals coming from Wimp annihilation.

  8. EUROmediCAT signal detection

    DEFF Research Database (Denmark)

    Luteijn, Johannes Michiel; Morris, Joan K; Garne, Ester

    2016-01-01

    AIMS: Information about medication safety in pregnancy is inadequate. We aimed to develop a signal detection methodology to routinely identify unusual associations between medications and congenital anomalies using data collected by 15 European congenital anomaly registries. METHODS: EUROmedi...... for 40 385 medication anomaly combinations in the data. Simes multiple testing procedure with a 50% false discovery rate (FDR) identified associations least likely to be due to chance and those associations with more than two cases with the exposure and the anomaly were selected for further investigation...

  9. Landmine detection by nuclear techniques

    Energy Technology Data Exchange (ETDEWEB)

    Megahid, R M [Reactor Physics Department, Nuclear Research Centre, Atomic Energy Authority, Cairo (Egypt)

    2000-11-15

    According to the information given by recent published data , more than 150 million land mines are buried in more than 70 countries, among them is Egypt . In Egypt, more than 23 million land mines lie buried in the northern parts of the western desert and western parts of Sinai . These mines are triggered accidentally by civilian activities, ravaging the land and killing or maiming a lot of innocent civilian people . For humanitarian demining , the removal of land mines already in the ground is very difficult and quite costly. In addition, detecting minimum metal antipersonnel mines and distinguishing them from the metallic debris of a minefields is difficult with current available detectors.

  10. NIR detects, destroys insect pests

    International Nuclear Information System (INIS)

    McGraw, L.C.

    1998-01-01

    What’s good for Georgia peanuts may also be good for Kansas wheat. An electric eye that scans all food-grade peanuts for visual defects could one day do the same for wheat kernels. For peanuts, it’s a proven method for monitoring quality. In wheat, scanning with near-infrared (NIR) energy can reveal hidden insect infestations that lower wheat quality. ARS entomologists James E. Throne and James E. Baker and ARS agricultural engineer Floyd E. Dowell are the first to combine NIR with an automated grain-handling system to rapidly detect insects hidden in single wheat kernels

  11. Traffic Light Detection at Night

    DEFF Research Database (Denmark)

    Jensen, Morten Bornø; Philipsen, Mark Philip; Bahnsen, Chris

    2015-01-01

    Traffic light recognition (TLR) is an integral part of any in- telligent vehicle, it must function both at day and at night. However, the majority of TLR research is focused on day-time scenarios. In this paper we will focus on detection of traffic lights at night and evalu- ate the performance...... of three detectors based on heuristic models and one learning-based detector. Evaluation is done on night-time data from the public LISA Traffic Light Dataset. The learning-based detector out- performs the model-based detectors in both precision and recall. The learning-based detector achieves an average...

  12. Detection of neutral current events

    International Nuclear Information System (INIS)

    Innocenti, P.G.

    1979-01-01

    The topics investigated in the course of the study can be broadly divided into three classes: (i) Inclusive measurements of the scattered electron for the determination of structure functions, scaling violations, deltaL/deltaT and weak interaction effects. (ii) Exclusive measurements of the current jet (momentum, energy, particle composition) for the study of fragmentation functions, for search of new particles, new quarks and QCD effects in the jet. (iii) Search for heavy leptons by detection and identification of their decay products. (orig.)

  13. Subgraph detection using graph signals

    KAUST Repository

    Chepuri, Sundeep Prabhakar

    2017-03-06

    In this paper we develop statistical detection theory for graph signals. In particular, given two graphs, namely, a background graph that represents an usual activity and an alternative graph that represents some unusual activity, we are interested in answering the following question: To which of the two graphs does the observed graph signal fit the best? To begin with, we assume both the graphs are known, and derive an optimal Neyman-Pearson detector. Next, we derive a suboptimal detector for the case when the alternative graph is not known. The developed theory is illustrated with numerical experiments.

  14. Fault Detection for Industrial Processes

    Directory of Open Access Journals (Sweden)

    Yingwei Zhang

    2012-01-01

    Full Text Available A new fault-relevant KPCA algorithm is proposed. Then the fault detection approach is proposed based on the fault-relevant KPCA algorithm. The proposed method further decomposes both the KPCA principal space and residual space into two subspaces. Compared with traditional statistical techniques, the fault subspace is separated based on the fault-relevant influence. This method can find fault-relevant principal directions and principal components of systematic subspace and residual subspace for process monitoring. The proposed monitoring approach is applied to Tennessee Eastman process and penicillin fermentation process. The simulation results show the effectiveness of the proposed method.

  15. Methande detected in orion A

    International Nuclear Information System (INIS)

    Fox, K.; Jennings, D.E.; and Infrared and Radio Astronomy Branch, Laboratory for Extraterrestrial Physics, NASA Goddard Space Flight Center)

    1978-01-01

    Six distinct pure-rotational ΔJ=0 transitions in 1 2CH 4 have been detected in microwave emission from the Orion Molecular Cloud. The spectral frequencies range from 4.6004 to 82.874 GHz, corresponding to J values from 11 to 20, respectively. These spectral lines include all possible tetrahedral symmetry types A, E, and F. The methane transitions observed in Orion A show definite maser characteristics. This is the first observational evidence for methane outside the solar system

  16. Leak detection of KNI seals

    International Nuclear Information System (INIS)

    Baranyai, G.; Peter, A.; Windberg, P.

    1990-03-01

    In Unit 3 and 4 of the Paks Nuclear Power Plant, Hungary, KNI type seals are used as lead-throughs with conical nickel sealing rings. Their failure can be critical for the operation of the reactor. An Acoustical Leak Detection System (ALDS) was constructed and tested for the operational testing of the seals. Some individual papers are presented in this collection on the calibration and testing of the ALDS intended to be placed on the top of the reactor vessels. The papers include simulation measurements of Unit 3 of NPP, laboratory experiments, evaluation of measurements, and further development needs with the ALDS. (R.P.) 50 figs.; 19 tabs

  17. Detection methods for irradiated food

    International Nuclear Information System (INIS)

    Stevenson, M.H.

    1993-01-01

    The plenary lecture gives a brief historical review of the development of methods for the detection of food irradiation and defines the demands on such methods. The methods described in detail are as follows: 1) Physical methods: As examples of luminescence methods, thermoluminescence and chermoluminescence are mentioned; ESR spectroscopy is discussed in detail by means of individual examples (crustaceans, frutis and vegetables, spieces and herbs, nuts). 2) Chemical methods: Examples given for these are methods that make use of alterations in lipids through radiation (formation of long-chain hydrocarbons, formation of 2-alkyl butanones), respectively radiation-induced alterations in the DNA. 3) Microbiological methods. An extensive bibliography is appended. (VHE) [de

  18. Kepler planet-detection mission

    DEFF Research Database (Denmark)

    Borucki...[], William J.; Koch, David; Buchhave, Lars C. Astrup

    2010-01-01

    The Kepler mission was designed to determine the frequency of Earth-sized planets in and near the habitable zone of Sun-like stars. The habitable zone is the region where planetary temperatures are suitable for water to exist on a planet’s surface. During the first 6 weeks of observations, Kepler...... is one of the lowest-density planets (~0.17 gram per cubic centimeter) yet detected. Kepler-5b, -6b, and -8b confirm the existence of planets with densities lower than those predicted for gas giant planets....

  19. Luminescence detection of irradiated foods

    International Nuclear Information System (INIS)

    Sanderson, D.C.W.

    1990-01-01

    The need for forensic tests to identify irradiated foods has been widely recognised at a time of growing international trade in such products and impending changes in UK and EEC legislation to control the process. This paper outlines the requirements for and of such tests, and discusses recent developments in luminescence approaches aimed at meeting the needs of public analysts, retailers and consumers. Detecting whether or not food has been irradiated, and if so to what dose, is one of the challenges which food irradiation poses to the scientist. (author)

  20. Awe, uncertainty, and agency detection.

    Science.gov (United States)

    Valdesolo, Piercarlo; Graham, Jesse

    2014-01-01

    Across five studies, we found that awe increases both supernatural belief (Studies 1, 2, and 5) and intentional-pattern perception (Studies 3 and 4)-two phenomena that have been linked to agency detection, or the tendency to interpret events as the consequence of intentional and purpose-driven agents. Effects were both directly and conceptually replicated, and mediational analyses revealed that these effects were driven by the influence of awe on tolerance for uncertainty. Experiences of awe decreased tolerance for uncertainty, which, in turn, increased the tendency to believe in nonhuman agents and to perceive human agency in random events.

  1. Molecular detection of foodborne pathogens

    DEFF Research Database (Denmark)

    Josefsen, Mathilde Hartmann

    Microbiological Methods (NordVal) in comparative and collaborative trials, and was approved for detection of Campylobacter in chicken neck skin, cloacal swab and boot swab samples. A comparison study on probe chemistries for real-time PCR was performed on locked nucleic acid (LNA), minor groove binder (MGB...... of the optimization strategy were observed from increasing 1) the sampling volume from the pre-enrichment, 2) the paramagnetic particles applied in the DNA extraction procedure, and 3) the amount of DNA template in the PCR. This method was subsequently validated according to the recommendations of NordVal...

  2. Subgraph detection using graph signals

    KAUST Repository

    Chepuri, Sundeep Prabhakar; Leus, Geert

    2017-01-01

    In this paper we develop statistical detection theory for graph signals. In particular, given two graphs, namely, a background graph that represents an usual activity and an alternative graph that represents some unusual activity, we are interested in answering the following question: To which of the two graphs does the observed graph signal fit the best? To begin with, we assume both the graphs are known, and derive an optimal Neyman-Pearson detector. Next, we derive a suboptimal detector for the case when the alternative graph is not known. The developed theory is illustrated with numerical experiments.

  3. Expert AE signal arrival detection

    Czech Academy of Sciences Publication Activity Database

    Chlada, Milan; Převorovský, Zdeněk

    2011-01-01

    Roč. 6, 3/4 (2011), s. 191-205 ISSN 1741-8410. [NDT in PROGRESS /4./. Praha, 05.11.2007-07.11.2007] R&D Projects: GA MPO(CZ) FR-TI1/274; GA ČR GA101/07/1518 Institutional research plan: CEZ:AV0Z20760514 Keywords : acoustic emission * signal arrival detection Subject RIV: BI - Acoustics http://www.inderscience.com/search/index.php?mainAction=search& action =record&rec_id=43215&prevQuery=&ps=10&m=or

  4. Conducting Polymers for Neutron Detection

    International Nuclear Information System (INIS)

    Clare Kimblin; Kirk Miller; Bob Vogel; Bill Quam; Harry McHugh; Glen Anthony; Steve Jones; Mike Grover

    2007-01-01

    Conjugated polymers have emerged as an attractive technology for large-area electronic applications. As organic semiconductors, they can be used to make large-area arrays of diodes or transistors using fabrication techniques developed for polymer coatings, such as spraying and screen-printing. We have demonstrated both neutron and alpha detection using diodes made from conjugated polymers and have done preliminary work to integrate a boron carbide layer into the conventional polymer device structure to capture thermal neutrons. The polymer devices appear to be insensitive to gamma rays, due to their small physical thickness and low atomic number

  5. Detecting Bioterrorism: Is Chemistry Enough?

    Energy Technology Data Exchange (ETDEWEB)

    Omberg, Kristin M. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-13

    This slide shows how most bioaerosol detection systems work. There is a lot of concern in the biothreat community, and in the federal government, about a large-scale aerosolized attack. Because of that, we’ve implemented environmental monitoring programs that use aerosol collectors to continuously monitor for the presence of threat agents in the air. Air samples are usually analyzed using PCR, which is one of the most effective analytical techniques we have for identifying DNA. Experiments and modeling have shown these systems are effective, and can warn public health of an impending crisis in time to mount an effective response.

  6. Sensors for Fluid Leak Detection

    Directory of Open Access Journals (Sweden)

    Gonzalo Pajares Martinsanz

    2015-02-01

    Full Text Available Fluid leak detection represents a problem that has attracted the interest of researchers, but not exclusively because in industries and services leaks are frequently common. Indeed, in water or gas supplies, chemical or thermal plants, sea-lines or cooling/heating systems leakage rates can cause important economic losses and sometimes, what it is more relevant, environmental pollution with human, animal or plant lives at risk. This last issue has led to increased national and international regulations with different degrees of severity regarding environmental conservation.[...

  7. Landmine detection by nuclear techniques

    International Nuclear Information System (INIS)

    Megahid, R.M.

    2000-01-01

    According to the information given by recent published data , more than 150 million land mines are buried in more than 70 countries, among them is Egypt . In Egypt, more than 23 million land mines lie buried in the northern parts of the western desert and western parts of Sinai . These mines are triggered accidentally by civilian activities, ravaging the land and killing or maiming a lot of innocent civilian people . For humanitarian demining , the removal of land mines already in the ground is very difficult and quite costly. In addition, detecting minimum metal antipersonnel mines and distinguishing them from the metallic debris of a minefields is difficult with current available detectors

  8. Dark Matter Detection: Current Status

    International Nuclear Information System (INIS)

    Akerib, Daniel S.

    2011-01-01

    Overwhelming observational evidence indicates that most of the matter in the Universe consists of non-baryonic dark matter. One possibility is that the dark matter is Weakly-Interacting Massive Particles (WIMPs) that were produced in the early Universe. These relics could comprise the Milky Way's dark halo and provide evidence for new particle physics, such as Supersymmetry. This talk focuses on the status of current efforts to detect dark matter by testing the hypothesis that WIMPs exist in the galactic halo. WIMP searches have begun to explore the region of parameter space where SUSY particles could provide dark matter candidates.

  9. Detecting and mitigating inverter aging

    International Nuclear Information System (INIS)

    Gunther, W.E.; Taylor, J.H.; Aggarwal, S.K.

    1988-01-01

    Nuclear power plants use inverters to supply power to safety-related equipment, instrumentation, and controls. They convert direct current (dc) to alternating current (ac) power, thereby making low voltage ac power available even under a station blackout condition. As part of the U.S. NRC's nuclear plant aging research (NPAR) program, the operating experience of this equipment has been analyzed to determine the dominant failure modes and causes. This paper summarizes that data, and then describes methods which can be employed to detect inverter degradation prior to failure, as well as methods to minimize the failure effects. In both cases, the mitigation of inverter aging is emphasized

  10. Detection circuit for gamma-ray burst

    International Nuclear Information System (INIS)

    Murakami, Hiroyuki; Yamagami, Takamasa; Mori, Kunishiro; Uchiyama, Sadayuki.

    1982-01-01

    A new gamma-ray burst detection system is described. The system was developed as an environmental monitor of an accelerator, and can be used as the burst detection system. The system detects the arrival time of burst. The difference between the arrival times detected at different places will give information on the burst source. The frequency of detecting false burst was estimated, and the detection limit under the estimated frequency of false burst was also calculated. Decision whether the signal is false or true burst was made by the statistical treatment. (Kato, T.)

  11. Fluorescence detection system for microfluidic droplets

    Science.gov (United States)

    Chen, Binyu; Han, Xiaoming; Su, Zhen; Liu, Quanjun

    2018-05-01

    In microfluidic detection technology, because of the universality of optical methods in laboratory, optical detection is an attractive solution for microfluidic chip laboratory equipment. In addition, the equipment with high stability and low cost can be realized by integrating appropriate optical detection technology on the chip. This paper reports a detection system for microfluidic droplets. Photomultiplier tubes (PMT) is used as a detection device to improve the sensitivity of detection. This system improves the signal to noise ratio by software filtering and spatial filter. The fluorescence intensity is proportional to the concentration of the fluorescence and intensity of the laser. The fluorescence micro droplets of different concentrations can be distinguished by this system.

  12. Unconventional applications of conventional intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.; Matter, J.C.

    1983-01-01

    A number of conventional intrusion detection sensors exists for the detection of persons entering buildings, moving within a given volume, and crossing a perimeter isolation zone. Unconventional applications of some of these sensors have recently been investigated. Some of the applications which are discussed include detection on the edges and tops of buildings, detection in storm sewers, detection on steam and other types of large pipes, and detection of unauthorized movement within secure enclosures. The enclosures can be used around complicated control valves, electrical control panels, emergency generators, etc

  13. Generalized Detectability for Discrete Event Systems

    Science.gov (United States)

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  14. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  15. Did LIGO Detect Dark Matter?

    Science.gov (United States)

    Bird, Simeon; Cholis, Ilias; Muñoz, Julian B; Ali-Haïmoud, Yacine; Kamionkowski, Marc; Kovetz, Ely D; Raccanelli, Alvise; Riess, Adam G

    2016-05-20

    We consider the possibility that the black-hole (BH) binary detected by LIGO may be a signature of dark matter. Interestingly enough, there remains a window for masses 20M_{⊙}≲M_{bh}≲100M_{⊙} where primordial black holes (PBHs) may constitute the dark matter. If two BHs in a galactic halo pass sufficiently close, they radiate enough energy in gravitational waves to become gravitationally bound. The bound BHs will rapidly spiral inward due to the emission of gravitational radiation and ultimately will merge. Uncertainties in the rate for such events arise from our imprecise knowledge of the phase-space structure of galactic halos on the smallest scales. Still, reasonable estimates span a range that overlaps the 2-53  Gpc^{-3} yr^{-1} rate estimated from GW150914, thus raising the possibility that LIGO has detected PBH dark matter. PBH mergers are likely to be distributed spatially more like dark matter than luminous matter and have neither optical nor neutrino counterparts. They may be distinguished from mergers of BHs from more traditional astrophysical sources through the observed mass spectrum, their high ellipticities, or their stochastic gravitational wave background. Next-generation experiments will be invaluable in performing these tests.

  16. Spatial filtering precedes motion detection.

    Science.gov (United States)

    Morgan, M J

    1992-01-23

    When we perceive motion on a television or cinema screen, there must be some process that allows us to track moving objects over time: if not, the result would be a conflicting mass of motion signals in all directions. A possible mechanism, suggested by studies of motion displacement in spatially random patterns, is that low-level motion detectors have a limited spatial range, which ensures that they tend to be stimulated over time by the same object. This model predicts that the direction of displacement of random patterns cannot be detected reliably above a critical absolute displacement value (Dmax) that is independent of the size or density of elements in the display. It has been inferred that Dmax is a measure of the size of motion detectors in the visual pathway. Other studies, however, have shown that Dmax increases with element size, in which case the most likely interpretation is that Dmax depends on the probability of false matches between pattern elements following a displacement. These conflicting accounts are reconciled here by showing that Dmax is indeed determined by the spacing between the elements in the pattern, but only after fine detail has been removed by a physiological prefiltering stage: the filter required to explain the data has a similar size to the receptive field of neurons in the primate magnocellular pathway. The model explains why Dmax can be increased by removing high spatial frequencies from random patterns, and simplifies our view of early motion detection.

  17. Detection of irradiated frozen foods

    International Nuclear Information System (INIS)

    Miyahara, Makoto; Toyota, Masatake; Saito, Yukio

    1999-01-01

    To detect irradiated foods, ESR method is most frequently used, but its application is limited to a very narrow range of foods. So, the authors have attempted to introduce ortho-tyrosine method in this area. In this study, the possibility that ortho-tyrosine may be generated during analysis was examined and the results were compared with those obtained by other detection methods. The production of ortho-tyrosine by γ-ray was demonstrated to be due to secondary effects of the irradiation. The lower limit of this method was thought to be in a range, 0.1 - 0.2 kGy in consideration of individual difference depending on the method of processing, measurement, etc. The specificity and sensitivity of ortho-tyrosine method were remarkably improved compared with other methods. Realization of automatic analysis resulted to exclude the analytical difficulties due to labeling. However, the sensitivity of ESR method was much higher than that of ortho-tyrosine method. The present results show that further improvement of ortho-tyrosine method is necessary for practical application. (M.N.)

  18. Detecting periodicities with Gaussian processes

    Directory of Open Access Journals (Sweden)

    Nicolas Durrande

    2016-04-01

    Full Text Available We consider the problem of detecting and quantifying the periodic component of a function given noise-corrupted observations of a limited number of input/output tuples. Our approach is based on Gaussian process regression, which provides a flexible non-parametric framework for modelling periodic data. We introduce a novel decomposition of the covariance function as the sum of periodic and aperiodic kernels. This decomposition allows for the creation of sub-models which capture the periodic nature of the signal and its complement. To quantify the periodicity of the signal, we derive a periodicity ratio which reflects the uncertainty in the fitted sub-models. Although the method can be applied to many kernels, we give a special emphasis to the Matérn family, from the expression of the reproducing kernel Hilbert space inner product to the implementation of the associated periodic kernels in a Gaussian process toolkit. The proposed method is illustrated by considering the detection of periodically expressed genes in the arabidopsis genome.

  19. Ultrasonic wave damage detecting device

    International Nuclear Information System (INIS)

    Miura, Yuichi; Nagao, Tetsuya; Nishi, Yuji; Kubota, Keisuke; Maruyama, Takayuki.

    1994-01-01

    Upon detecting a damage for a joint between a connecting nozzle at the outer circumference of a reactor pressure vessel and pipelines, the present invention greatly shortens the operation time. That is, it is noted that the connecting nozzle has a tapered portion and a small-diameter portion in view of strength. A main magnetic wheel supported on a base of a running vehicle is attracted to the small-diameter portion and an auxiliary magnet wheel is attracted to the tapered portion respectively and they are rolled. This regulate the deviation of the position of the base of the running vehicle in axial direction of the nozzle by the small-diameter portion and the tapered portion. Accordingly, the running vehicle can be circulated along a predetermined course on the outer circumference of the connecting nozzle without using tracks such as an existent ring track. The test can be performed conveniently only by placing the damage detecting device on the connecting nozzle. As a result, preparation time required before the test can remarkably be shortened. (I.S.)

  20. Data Mining for Anomaly Detection

    Science.gov (United States)

    Biswas, Gautam; Mack, Daniel; Mylaraswamy, Dinkar; Bharadwaj, Raj

    2013-01-01

    The Vehicle Integrated Prognostics Reasoner (VIPR) program describes methods for enhanced diagnostics as well as a prognostic extension to current state of art Aircraft Diagnostic and Maintenance System (ADMS). VIPR introduced a new anomaly detection function for discovering previously undetected and undocumented situations, where there are clear deviations from nominal behavior. Once a baseline (nominal model of operations) is established, the detection and analysis is split between on-aircraft outlier generation and off-aircraft expert analysis to characterize and classify events that may not have been anticipated by individual system providers. Offline expert analysis is supported by data curation and data mining algorithms that can be applied in the contexts of supervised learning methods and unsupervised learning. In this report, we discuss efficient methods to implement the Kolmogorov complexity measure using compression algorithms, and run a systematic empirical analysis to determine the best compression measure. Our experiments established that the combination of the DZIP compression algorithm and CiDM distance measure provides the best results for capturing relevant properties of time series data encountered in aircraft operations. This combination was used as the basis for developing an unsupervised learning algorithm to define "nominal" flight segments using historical flight segments.

  1. Signal anomaly detection and characterization

    International Nuclear Information System (INIS)

    Morgenstern, V.M.; Upadhyaya, B.R.; Gloeckler, O.

    1988-08-01

    As part of a comprehensive signal validation system, we have developed a signal anomaly detector, without specifically establishing the cause of the anomaly. A signal recorded from process instrumentation is said to have an anomaly, if during steady-state operation, the deviation in the level of the signal, its root-mean-square (RMS) value, or its statistical distribution changes by a preset value. This deviation could be an unacceptable increase or a decrease in the quantity being monitored. An anomaly in a signal may be characterized by wideband or single-frequency noise, bias error, pulse-type error, nonsymmetric behavior, or a change in the signal bandwidth. Various signatures can be easily computed from data samples and compared against specified threshold values. We want to point out that in real processes, pulses can appear with different time widths, and at different rates of change of the signal. Thus, in characterizing an anomaly as a pulse-type, the fastest pulse width is constrained by the signal sampling interval. For example, if a signal is sampled at 100 Hz, we will not be able to detect pulses occurring at kHz rates. Discussion with utility and Combustion Engineering personnel indicated that it is not practical to detect pulses having a narrow time width. 9 refs., 11 figs., 8 tabs

  2. Zika detection: comparison of methodologies

    Directory of Open Access Journals (Sweden)

    Tatiana Elias Colombo

    Full Text Available ABSTRACT Many countries in the Americas have detected local transmission of multiple arboviruses that cause febrile illnesses. Therefore, laboratory testing has become an important tool for confirming the etiology of these diseases. The present study aimed to compare the sensitivity and specificity of three different Zika virus detection assays. One hundred serum samples from patients presenting with acute febrile symptoms were tested using a previously reported TaqMan® RT-qPCR assay. We used a SYBR® Green RT-qPCR and a conventional PCR methodologies to compare the results. Of the samples that were determined to be negative by the TaqMan® RT-qPCR assay, 100% (Kappa = 0.670 were also found to be negative by SYBR® Green RT-qPCR based on Tm comparison; however, 14% (Kappa = 0.035 were found to be positive by conventional PCR followed by agarose gel electrophoresis. The differences between the ZIKV strains circulating worldwide and the low viremia period can compromise diagnostic accuracy and thereby the accuracy of outbreak data. Therefore, improved assays are required to improve the diagnosis and surveillance of arbovirus.

  3. Automated radiometric detection of bacteria

    International Nuclear Information System (INIS)

    Waters, J.R.

    1974-01-01

    A new radiometric method called BACTEC, used for the detection of bacteria in cultures or in supposedly sterile samples, was discussed from the standpoint of methodology, both automated and semi-automated. Some of the results obtained so far were reported and some future applications and development possibilities were described. In this new method, the test sample is incubated in a sealed vial with a liquid culture medium containing a 14 C-labeled substrate. If bacteria are present, they break down the substrate, producing 14 CO 2 which is periodically extracted from the vial as a gas and is tested for radioactivity. If this gaseous radioactivity exceeds a threshold level, it is evidence of bacterial presence and growth in the test vial. The first application was for the detection of bacteria in the blood cultures of hospital patients. Data were presented showing typical results. Also discussed were future applications, such as rapid screening for bacteria in urine industrial sterility testing and the disposal of used 14 C substrates. (Mukohata, S.)

  4. SEMIAUTOMATIC DETECTION OF TUMORAL ZONE

    Directory of Open Access Journals (Sweden)

    Ezzeddine Zagrouba

    2011-05-01

    Full Text Available This paper describes a robust method based on the cooperation of fuzzy classification and regions segmentation algorithms, in order to detect the tumoral zone in the brain Magnetic Resonance Imaging (MRI. On one hand, the classification in fuzzy sets is done by the Fuzzy C-Means algorithm (FCM, where a study of its different parameters and its complexity has been previously realised, which led us to improve it. On the other hand, the segmentation in regions is obtained by an hierarchical method through adaptive thresholding. Then, an operator expert selects a germ in the tumoral zone, and the class containing the sick zone is localised in return for the FCM algorithm. Finally, the superposition of the two partitions of the image will determine the sick zone. The originality of our approach is the parallel exploitation of different types of information in the image by the cooperation of two complementary approaches. This allows us to carry out a pertinent approach for the detection of sick zone in MRI images.

  5. Plasma dark matter direct detection

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, J.D.; Foot, R., E-mail: j.clarke5@pgrad.unimelb.edu.au, E-mail: rfoot@unimelb.edu.au [ARC Centre of Excellence for Particle Physics at the Terascale, School of Physics, University of Melbourne, Victoria 3010 Australia (Australia)

    2016-01-01

    Dark matter in spiral galaxies like the Milky Way may take the form of a dark plasma. Hidden sector dark matter charged under an unbroken U(1)' gauge interaction provides a simple and well defined particle physics model realising this possibility. The assumed U(1)' neutrality of the Universe then implies (at least) two oppositely charged dark matter components with self-interactions mediated via a massless 'dark photon' (the U(1)' gauge boson). In addition to nuclear recoils such dark matter can give rise to keV electron recoils in direct detection experiments. In this context, the detailed physical properties of the dark matter plasma interacting with the Earth is required. This is a complex system, which is here modelled as a fluid governed by the magnetohydrodynamic equations. These equations are numerically solved for some illustrative examples, and implications for direct detection experiments discussed. In particular, the analysis presented here leaves open the intriguing possibility that the DAMA annual modulation signal is due primarily to electron recoils (or even a combination of electron recoils and nuclear recoils). The importance of diurnal modulation (in addition to annual modulation) as a means of probing this kind of dark matter is also emphasised.

  6. Supernova neutrino detection with LVD

    International Nuclear Information System (INIS)

    Selvi, M.

    2007-01-01

    The Large Volume Detector (LVD) in the INFN Gran Sasso National Laboratory, Italy, is a ν observatory mainly designed to study low energy neutrinos from the gravitational collapse of galactic objects.We describe the characteristics of the supernova neutrino signal expected in the LVD detector and, in particular, we investigate the effect of neutrino oscillations. The MSW effect has been studied in detail for neutrinos travelling through the collapsing star and the Earth. We show that the expected number of events and their energy spectrum are sensitive to the oscillation parameters, in particular to the mass hierarchy and the value of θ 13 , presently unknown.The experiment has been monitoring the Galaxy since June 1992, under increasing larger configurations: in January 2001 it has reached its final active mass M = 1 kt. LVD is one of the largest liquid scintillator apparatus for the detection of stellar collapses and, besides SNO, SuperKamiokande and Amanda, it is a charter member of the SNEWS network, that has become fully operational since July 1st, 2005. No gravitational core-collapse has been detected by LVD during 14 years of data acquisition; this allows to put an upper limit of 0.18 events y -1 in our galaxy at the 90% C.L

  7. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  8. Ultrasonographic Detection of Tooth Flaws

    Science.gov (United States)

    Bertoncini, C. A.; Hinders, M. K.; Ghorayeb, S. R.

    2010-02-01

    The goal of our work is to adapt pulse-echo ultrasound into a high resolution imaging modality for early detection of oral diseases and for monitoring treatment outcome. In this talk we discuss our preliminary results in the detection of: demineralization of the enamel and dentin, demineralization or caries under and around existing restorations, caries on occlusal and interproximal surfaces, cracks of enamel and dentin, calculus, and periapical lesions. In vitro immersion tank experiments are compared to results from a handpiece which uses a compliant delay line to couple the ultrasound to the tooth surface. Because the waveform echoes are complex, and in order to make clinical interpretation of ultrasonic waveform data in real time, it is necessary to automatically interpret the signals. We apply the dynamic wavelet fingerprint algorithms to identify and delineate echographic features that correspond to the flaws of interest in teeth. The resulting features show a clear distinction between flawed and unflawed waveforms collected with an ultrasonic handpiece on both phantom and human cadaver teeth.

  9. Ionizing radiations, detection, dosimetry, spectrometry

    International Nuclear Information System (INIS)

    Blanc, D.

    1997-10-01

    A few works in French language are devoted to the detection of radiations. The purpose of this book is to fill a gap.The five first chapters are devoted to the properties of ionizing radiations (x rays, gamma rays, leptons, hadrons, nuclei) and to their interactions with matter. The way of classification of detectors is delicate and is studied in the chapter six. In the chapter seven are studied the statistics laws for counting and the spectrometry of particles is treated. The chapters eight to thirteen study the problems of ionization: charges transport in a gas, ionization chambers (theory of Boag), counters and proportional chambers, counters with 'streamers', chambers with derive, spark detectors, ionization chambers in liquid medium, Geiger-Mueller counters. The use of a luminous signal is the object of the chapters 14 to 16: conversion of a luminous signal in an electric signal, scintillators, use of the Cerenkov radiation. Then, we find the neutron detection with the chapter seventeen and the dosimetry of particles in the chapter eighteen. This book does not pretend to answer to specialists questions but can be useful to physicians, engineers or physics teachers. (N.C.)

  10. Detecting Cancer Quickly and Accurately

    Science.gov (United States)

    Gourley, Paul; McDonald, Anthony; Hendricks, Judy; Copeland, Guild; Hunter, John; Akhil, Ohmar; Capps, Heather; Curry, Marc; Skirboll, Steve

    2000-03-01

    We present a new technique for high throughput screening of tumor cells in a sensitive nanodevice that has the potential to quickly identify a cell population that has begun the rapid protein synthesis and mitosis characteristic of cancer cell proliferation. Currently, pathologists rely on microscopic examination of cell morphology using century-old staining methods that are labor-intensive, time-consuming and frequently in error. New micro-analytical methods for automated, real time screening without chemical modification are critically needed to advance pathology and improve diagnoses. We have teamed scientists with physicians to create a microlaser biochip (based upon our R&D award winning bio-laser concept)1 which evaluates tumor cells by quantifying their growth kinetics. The key new discovery was demonstrating that the lasing spectra are sensitive to the biomolecular mass in the cell, which changes the speed of light in the laser microcavity. Initial results with normal and cancerous human brain cells show that only a few hundred cells -- the equivalent of a billionth of a liter -- are required to detect abnormal growth. The ability to detect cancer in such a minute tissue sample is crucial for resecting a tumor margin or grading highly localized tumor malignancy. 1. P. L. Gourley, NanoLasers, Scientific American, March 1998, pp. 56-61. This work supported under DOE contract DE-AC04-94AL85000 and the Office of Basic Energy Sciences.

  11. Detection of some irradiated foods

    International Nuclear Information System (INIS)

    NASR, E.H.A

    2009-01-01

    This study was performed to investigate the possibility of using two rapid methods namely Supercritical Fluid Extraction (SFE) and Direct Solvent Extraction (DSE) methods for extraction and isolation of 2-dodecylcyclobutanone (2-DCB) followed by detecting this chemical marker by Gas chromatography technique and used this marker for identification of irradiated some foods containing fat (beef meat, chicken, camembert cheese and avocado) post irradiation, during cold and frozen storage. Consequently, this investigation was designed to study the following main points:- 1- The possibility of applying SFE-GC and DSE-GC rapid methods for the detection of 2-DCB from irradiated food containing fat (beef meat, chicken, camembert cheese and avocado fruits) under investigation.2-Studies the effect of gamma irradiation doses on the concentration of 2-DCB chemical marker post irradiation and during frozen storage at -18 degree C of chicken and beef meats for 12 months.3-Studies the effect of gamma irradiation doses on the concentration of 2-DCB chemical marker post irradiation and during cold storage at 4±1 degree C of camembert cheese and avocado fruits for 20 days.

  12. Face Liveness Detection Using Defocus

    Directory of Open Access Journals (Sweden)

    Sooyeon Kim

    2015-01-01

    Full Text Available In order to develop security systems for identity authentication, face recognition (FR technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures. To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently developed. In this paper, we propose a method for face liveness detection using the effect of defocus. From two images sequentially taken at different focuses, three features, focus, power histogram and gradient location and orientation histogram (GLOH, are extracted. Afterwards, we detect forged faces through the feature-level fusion approach. For reliable performance verification, we develop two databases with a handheld digital camera and a webcam. The proposed method achieves a 3.29% half total error rate (HTER at a given depth of field (DoF and can be extended to camera-equipped devices, like smartphones.

  13. Radiation detection device and a radiation detection method

    International Nuclear Information System (INIS)

    Blum, A.

    1975-01-01

    A radiation detection device is described including at least one scintillator in the path of radiation emissions from a distributed radiation source; a plurality of photodetectors for viewing each scintillator; a signal processing means, a storage means, and a data processing means that are interconnected with one another and connected to said photodetectors; and display means connected to the data processing means to locate a plurality of radiation sources in said distributed radiation source and to provide an image of the distributed radiation sources. The storage means includes radiation emission response data and location data from a plurality of known locations for use by the data processing means to derive a more accurate image by comparison of radiation responses from known locations with radiation responses from unknown locations. (auth)

  14. Independent Laboratory for Detection of Irradiated Foods. Detection of the irradiated food in the INCT

    International Nuclear Information System (INIS)

    Stachowicz, W.

    2007-01-01

    Lecture shows different methods applied for detection of irradiated foods. Structure and equipment of the Independent Laboratory for Detection of Irradiated Foods operating in the INCT is described. Several examples of detection of food irradiation are given in details

  15. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  16. Cancer Detection and Diagnosis Methods - Annual Plan

    Science.gov (United States)

    Early cancer detection is a proven life-saving strategy. Learn about the research opportunities NCI supports, including liquid biopsies and other less-invasive methods, for detecting early cancers and precancerous growths.

  17. Abstracting audit data for lightweight intrusion detection

    KAUST Repository

    Wang, Wei; Zhang, Xiangliang; Pitsilis, Georgios

    2010-01-01

    are used to validate the two strategies of data abstraction. The extensive test results show that the process of exemplar extraction significantly improves the detection efficiency and has a better detection performance than PCA in data abstraction. © 2010

  18. Adaptively detecting changes in Autonomic Grid Computing

    KAUST Repository

    Zhang, Xiangliang; Germain, Cé cile; Sebag, Michè le

    2010-01-01

    Detecting the changes is the common issue in many application fields due to the non-stationary distribution of the applicative data, e.g., sensor network signals, web logs and gridrunning logs. Toward Autonomic Grid Computing, adaptively detecting

  19. Unsupervised learning for robust bitcoin fraud detection

    CSIR Research Space (South Africa)

    Monamo, Patrick

    2016-08-01

    Full Text Available The rampant absorption of Bitcoin as a cryptographic currency, along with rising cybercrime activities, warrants utilization of anomaly detection to identify potential fraud. Anomaly detection plays a pivotal role in data mining since most outlying...

  20. A simple strategy for fall events detection

    KAUST Repository

    Harrou, Fouzi

    2017-01-20

    The paper concerns the detection of fall events based on human silhouette shape variations. The detection of fall events is addressed from the statistical point of view as an anomaly detection problem. Specifically, the paper investigates the multivariate exponentially weighted moving average (MEWMA) control chart to detect fall events. Towards this end, a set of ratios for five partial occupancy areas of the human body for each frame are collected and used as the input data to MEWMA chart. The MEWMA fall detection scheme has been successfully applied to two publicly available fall detection databases, the UR fall detection dataset (URFD) and the fall detection dataset (FDD). The monitoring strategy developed was able to provide early alert mechanisms in the event of fall situations.

  1. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  2. Automated Windowing Processing for Pupil Detection

    National Research Council Canada - National Science Library

    Ebisawa, Y

    2001-01-01

    .... The pupil center in the video image is a focal point to determine the eye gaze. Recently, to improve the disadvantages of traditional pupil detection methods, a pupil detection technique using two light sources (LEDs...

  3. The development of fire detection robot

    OpenAIRE

    Sucuoğlu, Hilmi Saygın

    2015-01-01

    The aim of this thesis is to design and manufacture a fire detection robot that especially operates in industrial areas for fire inspection and early detection. Robot is designed and implemented to track prescribed paths with obstacle avoidance function through obstacle avoidance and motion planning units and to scan the environment in order to detect fire source using fire detection unit. Robot is able to track patrolling routes using virtual lines that defined to the motion planning unit. ...

  4. Computerized flow monitors detect small kicks

    Energy Technology Data Exchange (ETDEWEB)

    McCann, D.; White, D. (Sedco Forex, Paris (FR))

    1992-02-24

    This paper reports on a smart alarm system installed on a number of offshore rigs and one land rig which can detect kicks more quickly than conventional systems. This rapid kick detection improves rig safety because the smaller the detected influx, the easier it is to control the well. The extensive computerized monitoring system helps drilling personnel detect fluid influxes and fluid losses before the changes in flow would normally be apparent.

  5. Comparison of Methods for Oscillation Detection

    DEFF Research Database (Denmark)

    Odgaard, Peter Fogh; Trangbæk, Klaus

    2006-01-01

    This paper compares a selection of methods for detecting oscillations in control loops. The methods are tested on measurement data from a coal-fired power plant, where some oscillations are occurring. Emphasis is put on being able to detect oscillations without having a system model and without...... using process knowledge. The tested methods show potential for detecting the oscillations, however, transient components in the signals cause false detections as well, motivating usage of models in order to remove the expected signals behavior....

  6. Network anomaly detection a machine learning perspective

    CERN Document Server

    Bhattacharyya, Dhruba Kumar

    2013-01-01

    With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patterns in network traffic data compared to normal behavior. Finding these anomalies has extensive applications in areas such as cyber security, credit card and insurance fraud detection, and military surveillance for enemy activities. Network Anomaly Detection: A Machine Learning Perspective presents mach

  7. Efficient Network Monitoring for Attack Detection

    OpenAIRE

    Limmer, Tobias

    2011-01-01

    Techniques for network-based intrusion detection have been evolving for years, and the focus of most research is on detection algorithms, although networks are distributed and dynamically managed nowadays. A data processing framework is required that allows to embed multiple detection techniques and to provide data with the needed aggregation levels. Within that framework, this work concentrates on methods that improve the interoperability of intrusion detection techniques and focuses on data...

  8. A kernel version of multivariate alteration detection

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg; Vestergaard, Jacob Schack

    2013-01-01

    Based on the established methods kernel canonical correlation analysis and multivariate alteration detection we introduce a kernel version of multivariate alteration detection. A case study with SPOT HRV data shows that the kMAD variates focus on extreme change observations.......Based on the established methods kernel canonical correlation analysis and multivariate alteration detection we introduce a kernel version of multivariate alteration detection. A case study with SPOT HRV data shows that the kMAD variates focus on extreme change observations....

  9. Enzymatic Activity Detection via Electrochemistry for Enceladus

    Science.gov (United States)

    Studemeister, Lucy; Koehne, Jessica; Quinn, Richard

    2017-01-01

    Electrochemical detection of biological molecules is a pertinent topic and application in many fields such as medicine, environmental spills, and life detection in space. Proteases, a class of molecules of interest in the search for life, catalyze the hydrolysis of peptides. Trypsin, a specific protease, was chosen to investigate an optimized enzyme detection system using electrochemistry. This study aims at providing the ideal functionalization of an electrode that can reliably detect a signal indicative of an enzymatic reaction from an Enceladus sample.

  10. Hyperspectral Imagery Target Detection Using Improved Anomaly Detection and Signature Matching Methods

    National Research Council Canada - National Science Library

    Smetek, Timothy E

    2007-01-01

    This research extends the field of hyperspectral target detection by developing autonomous anomaly detection and signature matching methodologies that reduce false alarms relative to existing benchmark detectors...

  11. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  12. Ethics dilemmas of early detection of obesity

    DEFF Research Database (Denmark)

    Vallgårda, Signild

    2016-01-01

    Aim: To discuss the ethics dilemmas of the early detection of overweight and obesity. Methods: Analysis of the ethical aspects of early detection. Results: The early detection of overweight and obesity entails a number of ethical dilemmas because it may both be helpful and harmful. It may help...

  13. Detection unit for X-ray radiography

    International Nuclear Information System (INIS)

    Svobodova, B.; Hamouz, J.; Pavlicek, Z.; Jursova, L.; Pohanka, J.

    1987-01-01

    The detection field consists of a carrier accommodating detection elements with Umaplex light pipes connected to photomultipliers with level converters. The detection field and the photomultipliers are placed in a light-proof cover. The configuration improves the hygiene conditions of work with radiation. It makes possible the use of pulsed fluoroscopy instead of continuous radiography. (M.D.). 1 fig

  14. Final Technical Report: PV Fault Detection Tool.

    Energy Technology Data Exchange (ETDEWEB)

    King, Bruce Hardison [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Christian Birk [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    The PV Fault Detection Tool project plans to demonstrate that the FDT can (a) detect catastrophic and degradation faults and (b) identify the type of fault. This will be accomplished by collecting fault signatures using different instruments and integrating this information to establish a logical controller for detecting, diagnosing and classifying each fault.

  15. Fusion for Audio-Visual Laughter Detection

    NARCIS (Netherlands)

    Reuderink, B.

    2007-01-01

    Laughter is a highly variable signal, and can express a spectrum of emotions. This makes the automatic detection of laughter a challenging but interesting task. We perform automatic laughter detection using audio-visual data from the AMI Meeting Corpus. Audio-visual laughter detection is performed

  16. Selection of tests for outlier detection

    NARCIS (Netherlands)

    Bossers, H.C.M.; Hurink, Johann L.; Smit, Gerardus Johannes Maria

    Integrated circuits are tested thoroughly in order to meet the high demands on quality. As an additional step, outlier detection is used to detect potential unreliable chips such that quality can be improved further. However, it is often unclear to which tests outlier detection should be applied and

  17. Detecting Fraudulent Erasures at an Aggregate Level

    Science.gov (United States)

    Sinharay, Sandip

    2018-01-01

    Wollack, Cohen, and Eckerly suggested the "erasure detection index" (EDI) to detect fraudulent erasures for individual examinees. Wollack and Eckerly extended the EDI to detect fraudulent erasures at the group level. The EDI at the group level was found to be slightly conservative. This article suggests two modifications of the EDI for…

  18. Exact, almost and delayed fault detection

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Saberi, Ali; Stoorvogel, Anton A.

    1999-01-01

    Considers the problem of fault detection and isolation while using zero or almost zero threshold. A number of different fault detection and isolation problems using exact or almost exact disturbance decoupling are formulated. Solvability conditions are given for the formulated design problems....... The l-step delayed fault detection problem is also considered for discrete-time systems....

  19. Comparing Face Detection and Recognition Techniques

    OpenAIRE

    Korra, Jyothi

    2016-01-01

    This paper implements and compares different techniques for face detection and recognition. One is find where the face is located in the images that is face detection and second is face recognition that is identifying the person. We study three techniques in this paper: Face detection using self organizing map (SOM), Face recognition by projection and nearest neighbor and Face recognition using SVM.

  20. New maxillofacial infrared detection technologies

    Energy Technology Data Exchange (ETDEWEB)

    Reshetnikov, A. P.; Kopylov, M. V.; Nasyrov, M. R., E-mail: marat.1994@me.com; Fisher, E. L.; Chernova, L. V. [Izhevsk State Medical Academy, Izhevsk, Russia (426034, Izhevsk, Kommunarov street, 281) (Russian Federation); Soicher, E. M. [Moscow State University of Medicine and Dentistry named after A.I. Evdokimov of the Ministry of Health of the Russian Federation, Moscow, Russia, (127473, Moscow, Delegatskaya str., 20/1) (Russian Federation)

    2015-11-17

    At the dental clinic the infrared range radiation spectrum of tissues was used to study the dynamics of local temperature and structure of the skin, subcutaneous fat, and other tissues of the maxillofacial area in adult healthy volunteers and patients. In particular, we studied the dynamics of local temperature of mucous membranes of the mouth, teeth, and places in the mouth and dental structures in the norm and in various pathological conditions of the lips, gums, teeth, tongue, palate, and cheeks before, during and after chewing food, drinking water, medication, and inhalation of air. High safety and informational content of infrared thermography are prospective for the development of diagnostics in medicine. We have 3 new methods for infrared detection protected by patents in Russia.