Science.gov

Sample records for intrusion detection system

  1. Interior intrusion detection systems

    SciTech Connect

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Bro Intrusion Detection System

    SciTech Connect

    Paxson, Vern; Campbell, Scott; leres, Craig; Lee, Jason

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or access to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.

  3. Bro Intrusion Detection System

    Energy Science and Technology Software Center (ESTSC)

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  4. Evaluation of Intrusion Detection Systems

    PubMed Central

    Ulvila, Jacob W.; Gaffney, John E.

    2003-01-01

    This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs.

  5. A system for distributed intrusion detection

    SciTech Connect

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. . Div. of Computer Science); Grance, T. ); Mansur, D.L.; Pon, K.L. ); Smaha, S.E. )

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  6. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  7. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect

    Hurd, Steven A.; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  8. The architecture of a network level intrusion detection system

    SciTech Connect

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  9. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  10. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  11. Configurable Middleware-Level Intrusion Detection for Embedded Systems

    SciTech Connect

    Naess, Eivind; Frincke, Deborah A.; McKinnon, A. D.; Bakken, David E.

    2005-06-20

    Embedded systems have become integral parts of a diverse range of systems from automobiles to critical infrastructure applications such as gas and electric power distribution. Unfortunately, research on computer security in general and intrusion detection in particular, has not kept pace. Furthermore, embedded systems, by their very nature, are application specific and therefore frameworks for developing application-specific intrusion detection systems for distributed embedded systems must be researched, designed, and implemented. In this paper, we present a configurable middleware-based intrusion detection framework. In particular, this paper presents a system model and a concrete implementation of a highly configurable intrusion detection framework that is integrated into MicroQoSCORBA, a highly configurable middleware framework developed for embedded systems. By exploiting the application-specific logic available to a middleware framework (e.g., object interfaces and method signatures), our integrated framework is able to autogenerate application-specific intrusion detection systems. Next, a set of configurable intrusion detection mechanisms suitable for embedded systems is presented. A performance evaluation of these mechanisms, run on two hardware platforms, is presented at the end of the paper.

  12. Anomaly-based intrusion detection for SCADA systems

    SciTech Connect

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  13. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    PubMed Central

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  14. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  15. Adaptive critic design for computer intrusion detection system

    NASA Astrophysics Data System (ADS)

    Novokhodko, Alexander; Wunsch, Donald C., II; Dagli, Cihan H.

    2001-03-01

    This paper summarizes ongoing research. A neural network is used to detect a computer system intrusion basing on data from the system audit trail generated by Solaris Basic Security Module. The data have been provided by Lincoln Labs, MIT. The system alerts the human operator, when it encounters suspicious activity logged in the audit trail. To reduce the false alarm rate and accommodate the temporal indefiniteness of moment of attack a reinforcement learning approach is chosen to train the network.

  16. Using Unix system auditing for detecting network intrusions

    SciTech Connect

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators know what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.

  17. A model for anomaly classification in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  18. MIDAS, the Mobile Intrusion Detection and Assessment System

    SciTech Connect

    Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

    1990-01-01

    MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

  19. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  20. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  1. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect

    Vigil, J.T.

    1994-03-01

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  2. Nuisance alarm suppression techniques for fibre-optic intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-02-01

    The suppression of nuisance alarms without degrading sensitivity in fibre-optic intrusion detection systems is important for maintaining acceptable performance. Signal processing algorithms that maintain the POD and minimize nuisance alarms are crucial for achieving this. A level crossings algorithm is presented for suppressing torrential rain-induced nuisance alarms in a fibre-optic fence-based perimeter intrusion detection system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr, and intrusion events can be detected simultaneously during rain periods. The use of a level crossing based detection and novel classification algorithm is also presented demonstrating the suppression of nuisance events and discrimination of nuisance and intrusion events in a buried pipeline fibre-optic intrusion detection system. The sensor employed for both types of systems is a distributed bidirectional fibre-optic Mach Zehnder interferometer.

  3. Efficient pattern matching on GPUs for intrusion detection systems

    SciTech Connect

    Villa, Oreste; Tumeo, Antonino; Sciuto, Donatella

    2010-05-17

    Pattern matching is at the core of many security applications, like Network Intrusion Detection Systems (NIDS), spam filters and virus scanner. The always growing traffic on networks requires the ability to recognize potentially malicious signatures effectively, fastly and possibly in real time, without afftecting the performance and the latencies of the connections. Unfortunately, pattern matching is a computationally intensive procedure which poses significant challenges on current software and hardware implementations. Graphic Processing Units (GPU) have become an interesting target for such high-througput applications, but the algorithms and the data structures need to be redesigned to be parallelized and adapted to the underlining hardware, coping with the limitations imposed by these architectures. In this paper we present an efficient implementation of the Aho-Corasick pattern matching algorithm on GPU, showing how we progressively redesigned the algorithm and the data structures to fit on the architecture and comparing it with equivalent implementations on the CPU and with previous work. We show that with realistic TCP-IP workloads and signatures, our implementation obtains a speedup of 6.5 with respect to CPU implementations and of two times when compared to previous GPU solutions.

  4. Optimization of detection sensitivity for a Fiber Optic Intrusion Detection System (FOIDS) using design of experiments.

    SciTech Connect

    Miller, Larry D.; Mack, Thomas Kimball; Mitchiner, Kim W.; Varoz, Carmella A.

    2010-06-01

    The Fiber Optic Intrusion Detection System (FOIDS)1 is a physical security sensor deployed on fence lines to detect climb or cut intrusions by adversaries. Calibration of detection sensitivity can be time consuming because, for example, the FiberSenSys FD-332 has 32 settings that can be adjusted independently to provide a balance between a high probability of detection and a low nuisance alarm rate. Therefore, an efficient method of calibrating the FOIDS in the field, other than by trial and error, was needed. This study was conducted to: x Identify the most significant settings for controlling detection x Develop a way of predicting detection sensitivity for given settings x Develop a set of optimal settings for validation The Design of Experiments (DoE) 2-4 methodology was used to generate small, planned test matrixes, which could be statistically analyzed to yield more information from the test data. Design of Experiments is a statistical methodology for quickly optimizing performance of systems with measurable input and output variables. DoE was used to design custom screening experiments based on 11 FOIDS settings believed to have the most affect on WKH types of fence perimeter intrusions were evaluated: simulated cut intrusions and actual climb intrusions. Two slightly different two-level randomized fractional factorial designed experiment matrixes consisting of 16 unique experiments were performed in the field for each type of intrusion. Three repetitions were conducted for every cut test; two repetitions were conducted for every climb test. Total number of cut tests analyzed was 51; the total number of climb tests was 38. This paper discusses the results and benefits of using Design of Experiments (DoE) to calibrate and optimize the settings for a FOIDS sensor

  5. Hybrid network intrusion detection

    NASA Astrophysics Data System (ADS)

    Tahmoush, David

    2014-05-01

    We report on a machine learning classifier that can be used to discover the patterns hidden within large networking data flows. It utilizes an existing intrusion detection system (IDS) as an oracle to learn a faster, less resource intensive normalcy classifier as a front-end to a hybrid network IDS. This system has the capability to recognize new attacks that are similar to known attack signatures. It is also more highly scalable and distributable than the signature-based IDS. The new hybrid design also allows distributed updates and retraining of the normalcy classifier to stay up-to-date with current threats.

  6. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks.

    PubMed

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  7. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  8. Microcomputer based system for intrusion detection display and assessment

    SciTech Connect

    Weissman, S.J.

    1981-01-01

    A system has been developed to aid in assessing intrusion alarms. Capabilities include color graphic and text displays, prioritized alarms, a high-speed dual loop communications system, a customized function keyboard for operator input and microprocessor controlled Closed Circuit Television (CCTV) and videodisc recording subsytems. The system, which is implemented on a DEC LSI-11/23 utilizing RSX-11S, is designed for use by an operator with no knowledge of computers. Most of the assessment functions can be performed with single keystrokes. During multi-alarm situations, the system manages the display, presenting information about the highest priority alarms to aid in operator assessment. Although the system prioritizes alarms, the operator is free to assess alarms in any order. The system supports multicenter operations. One center is responsible for assessing all alarms and is monitored and backed up by another center.

  9. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  10. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  11. A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Song, Jungsuk; Ohira, Kenji; Takakura, Hiroki; Okabe, Yasuo; Kwon, Yongjin

    Intrusion detection system (IDS) has played a central role as an appliance to effectively defend our crucial computer systems or networks against attackers on the Internet. The most widely deployed and commercially available methods for intrusion detection employ signature-based detection. However, they cannot detect unknown intrusions intrinsically which are not matched to the signatures, and their methods consume huge amounts of cost and time to acquire the signatures. In order to cope with the problems, many researchers have proposed various kinds of methods that are based on unsupervised learning techniques. Although they enable one to construct intrusion detection model with low cost and effort, and have capability to detect unforeseen attacks, they still have mainly two problems in intrusion detection: a low detection rate and a high false positive rate. In this paper, we present a new clustering method to improve the detection rate while maintaining a low false positive rate. We evaluated our method using KDD Cup 1999 data set. Evaluation results show that superiority of our approach to other existing algorithms reported in the literature.

  12. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  13. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  14. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  15. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  16. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  17. Selection of intrusion detection system threshold bounds for effective sensor fusion

    NASA Astrophysics Data System (ADS)

    Thomas, Ciza; Balakrishnan, Narayanaswamy

    2007-04-01

    The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of threshold bounds according to the Chebyshev inequality priciple performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.

  18. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  19. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    SciTech Connect

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals.

  20. An Intelligent Tutor for Intrusion Detection on Computer Systems.

    ERIC Educational Resources Information Center

    Rowe, Neil C.; Schiavo, Sandra

    1998-01-01

    Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…

  1. Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization

    NASA Astrophysics Data System (ADS)

    Kim, Dong Seong; Park, Jong Sou

    Previous approaches for modeling Intrusion Detection System (IDS) have been on twofold: improving detection model(s) in terms of (i) feature selection of audit data through wrapper and filter methods and (ii) parameters optimization of detection model design, based on classification, clustering algorithms, etc. In this paper, we present three approaches to model IDS in the context of feature selection and parameters optimization: First, we present Fusion of Genetic Algorithm (GA) and Support Vector Machines (SVM) (FuGAS), which employs combinations of GA and SVM through genetic operation and it is capable of building an optimal detection model with only selected important features and optimal parameters value. Second, we present Correlation-based Hybrid Feature Selection (CoHyFS), which utilizes a filter method in conjunction of GA for feature selection in order to reduce long training time. Third, we present Simultaneous Intrinsic Model Identification (SIMI), which adopts Random Forest (RF) and shows better intrusion detection rates and feature selection results, along with no additional computational overheads. We show the experimental results and analysis of three approaches on KDD 1999 intrusion detection datasets.

  2. Adapting safety requirements analysis to intrusion detection

    NASA Technical Reports Server (NTRS)

    Lutz, R.

    2001-01-01

    Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety techique for Intrusion Detection Systems is hazard analysis.

  3. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  4. Integrated Scalable Parallel Firewall and Intrusion Detection System for High-Speed Networks

    SciTech Connect

    Fulp, Errin W; Anderson, Robert E; Ahn, David K

    2009-08-31

    This project developed a new scalable network firewall and Intrusion Protection System (IPS) that can manage increasing traffic loads, higher network speeds, and strict Quality of Service (QoS) requirements. This new approach provides a strong foundation for next-generation network security technologies and products that address growing and unmet needs in the government and corporate sectors by delivering Optimal Network Security. Controlling access is an essential task for securing networks that are vital to private industry, government agencies, and the military. This access can be granted or denied based on the packet header or payload contents. For example, a simple network firewall enforces a security policy by inspecting and filtering the packet headers. As a complement to the firewall, an Intrusion Detection System (IDS) inspects the packet payload for known threat signatures; for example, virus or worm. Similar to a firewall policy, IDS policies consist of multiple rules that specify an action for matching packets. Each rule can specify different items, such as the signature contents and the signature location within the payload. When the firewall and IDS are merged into one device, the resulting system is referred to as an Intrusion Protection System (IPS), which provides both packet header and payload inspections. Having both types of inspections is very desirable and more manageable in a single device.

  5. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    PubMed Central

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  6. An intrusion detection system for the protection of railway assets using Fiber Bragg Grating sensors.

    PubMed

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  7. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect

    Chen, Yan

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  8. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    PubMed

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  9. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  10. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  11. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    PubMed Central

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  12. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  13. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect

    Williams, J.D.

    1995-03-01

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  14. Data Mining for Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  15. Alerts Analysis and Visualization in Network-based Intrusion Detection Systems

    SciTech Connect

    Yang, Dr. Li

    2010-08-01

    The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short time frame. This work describes how the visualization of raw IDS alert data assists network administrators in understanding the current state of a network and quickens the process of reviewing and responding to intrusion attempts. The project presented in this work consists of three primary components. The first component provides a visual mapping of the network topology that allows the end-user to easily browse clustered alerts. The second component is based on the flocking behavior of birds such that birds tend to follow other birds with similar behaviors. This component allows the end-user to see the clustering process and provides an efficient means for reviewing alert data. The third component discovers and visualizes patterns of multistage attacks by profiling the attacker s behaviors.

  16. Benefits of wide-area intrusion detection systems using FMCW radar

    NASA Astrophysics Data System (ADS)

    Butler, Walker; Poitevin, Pierre; Bjornholt, John

    2008-04-01

    The history of perimeter protection is based on building fences. That basic concept evolved into detecting activity along fences using a variety of sensors. Today a wide variety of fiber and wire-based sensors are available to mount on a fence, and many different types of IR, radar, optical, seismic and acoustic sensors to place along the fence line. Generally some camera support is provided, with the cameras programmed to point to pre-set locations along the fence. A more robust perimeter protection would consist of wide area sensors with the capability to look out beyond the fence to detect potential intrusion and track intruders. In looking beyond the perimeter, wide area sensors can provide precious time to plan and initiate the appropriate response. In addition, because they sweep a 360-degree circle, the sensors can provide continued tracking of the intrusion, greatly enhancing the effectiveness and safety of the response team. The new wide-area concept consists of using modern radar technology for wide area detection of objects which are moving, and then using the precise location information from the radar to point a camera for assessment. Without having to continually stare at a bank of video monitors, the operator is presented with the location, direction of travel and identification and number of potential intruders, all in a matter of seconds. This paper presents the features of this new wide area system, followed by an overview of radar technology. It closes with a discussion on the benefits of the FMCW topology over Pulse Doppler in security and surveillance applications.

  17. Non-Intrusive Magneto-Optic Detecting System for Investigations of Air Switching Arcs

    NASA Astrophysics Data System (ADS)

    Zhang, Pengfei; Zhang, Guogang; Dong, Jinlong; Liu, Wanying; Geng, Yingsan

    2014-07-01

    In current investigations of electric arc plasmas, experiments based on modern testing technology play an important role. To enrich the testing methods and contribute to the understanding and grasping of the inherent mechanism of air switching arcs, in this paper, a non-intrusive detecting system is described that combines the magneto-optic imaging (MOI) technique with the solution to inverse electromagnetic problems. The detecting system works in a sequence of main steps as follows: MOI of the variation of the arc flux density over a plane, magnetic field information extracted from the magneto-optic (MO) images, arc current density distribution and spatial pattern reconstruction by inverting the resulting field data. Correspondingly, in the system, an MOI set-up is designed based on the Faraday effect and the polarization properties of light, and an intelligent inversion algorithm is proposed that involves simulated annealing (SA). Experiments were carried out for high current (2 kA RMS) discharge cases in a typical low-voltage switchgear. The results show that the MO detection system possesses the advantages of visualization, high resolution and response, and electrical insulation, which provides a novel diagnostics tool for further studies of the arc.

  18. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  19. Fast detection of network intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2011-06-01

    In this paper, we propose new network intrusion detection techniques which promptly detect malicious attacks and thus lower the resulting damage. Moreover, our approach rigorously control the probability of falsely implicating benign remote hosts as malicious. Such technique is especially suitable for detecting DoS attackers and port-scan attackers routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. Our method performs significantly faster and also more accurate than other current solutions.

  20. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect

    Smith, Cathy L.

    2013-04-28

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  1. Multi-pattern string matching algorithms comparison for intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hasan, Awsan A.; Rashid, Nur'Aini Abdul; Abdulrazzaq, Atheer A.

    2014-12-01

    Computer networks are developing exponentially and running at high speeds. With the increasing number of Internet users, computers have become the preferred target for complex attacks that require complex analyses to be detected. The Intrusion detection system (IDS) is created and turned into an important part of any modern network to protect the network from attacks. The IDS relies on string matching algorithms to identify network attacks, but these string matching algorithms consume a considerable amount of IDS processing time, thereby slows down the IDS performance. A new algorithm that can overcome the weakness of the IDS needs to be developed. Improving the multi-pattern matching algorithm ensure that an IDS can work properly and the limitations can be overcome. In this paper, we perform a comparison between our three multi-pattern matching algorithms; MP-KR, MPHQS and MPH-BMH with their corresponding original algorithms Kr, QS and BMH respectively. The experiments show that MPH-QS performs best among the proposed algorithms, followed by MPH-BMH, and MP-KR is the slowest. MPH-QS detects a large number of signature patterns in short time compared to other two algorithms. This finding can prove that the multi-pattern matching algorithms are more efficient in high-speed networks.

  2. A harmful-intrusion detection method based on background reconstruction and two-dimensional K-S test in an optical fiber pre-warning system

    NASA Astrophysics Data System (ADS)

    Bi, Fukun; Zheng, Tong; Qu, Hongquan; Pang, Liping

    2016-06-01

    The key technology and main difficulty for optical fiber intrusion pre-warning systems (OFIPS) is the extraction of harmful-intrusion signals. After being processed by a phase-sensitive optical time-domain reflectometer (Φ-OTDR), vibration signals can be preliminarily extracted. Generally, these include noises and intrusions. Here, intrusions can be divided into harmful and harmless intrusions. With respect to the close study of signal characteristics, an effective extraction method of harmful intrusion is proposed in the paper. Firstly, in the part of the background reconstruction, all intrusion signals are first detected by a constant false alarm rate (CFAR). We then reconstruct the backgrounds by extracting two-part information of alarm points, time and amplitude. This ensures that the detection background consists of intrusion signals. Secondly, in the part of the two-dimensional Kolmogorov-Smirnov (K-S) test, in order to extract harmful ones from all extracted intrusions, we design a separation method. It is based on the signal characteristics of harmful intrusion, which are shorter time interval and higher amplitude. In the actual OFIPS, the detection method is used in some typical scenes, which includes a lot of harmless intrusions, for example construction sites and busy roads. Results show that we can effectively extract harmful intrusions.

  3. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems

    PubMed Central

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  4. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems.

    PubMed

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  5. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model

    NASA Astrophysics Data System (ADS)

    Tong, Xiaojun; Wang, Zhu; Yu, Haining

    2009-10-01

    A hybrid RBF/Elman neural network model that can be employed for both anomaly detection and misuse detection is presented in this paper. The IDSs using the hybrid neural network can detect temporally dispersed and collaborative attacks effectively because of its memory of past events. The RBF network is employed as a real-time pattern classification and the Elman network is employed to restore the memory of past events. The IDSs using the hybrid neural network are evaluated against the intrusion detection evaluation data sponsored by U.S. Defense Advanced Research Projects Agency (DARPA). Experimental results are presented in ROC curves. Experiments show that the IDSs using this hybrid neural network improve the detection rate and decrease the false positive rate effectively.

  6. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  7. Intrusion detection using pattern recognition methods

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  8. From Intrusion Detection to Self Protection

    SciTech Connect

    Frincke, Deb; Wespi, Andreas; Zamboni, Diego

    2007-04-11

    Modern computer systems have become so complex and interdependent that the traditional model of system defense, utilizing layers and including an intrusion detection system that provides alerts to a human who responds to them, is becoming unfeasible. Effective human-guided real-time responses are no longer a reasonable expectation for large scale systems--this is particularly troublesome because a failure to respond correctly and rapidly can have disastrous consequences. In an ideal world, our systems would automatically detect and respond to threats of all kinds, including but not limited to automated attacks, human-guided attacks, and the constant onslaught of unsolicited email (spam). Traditionally, these threats have been dealt with by separate communities--the anti-virus community, the intrusion-detection/firewall community, and the anti-spam community. Today however, we see an increasing need for integrating different technologies toward achieving a common goal. In this special issue, we surveyed the research community with the intent of identifying novel, multidisciplinary and integrated approaches to system defense that contribute towards development of true self-protecting and self-healing systems. The result is reflected in the articles we selected.

  9. Intelligent detection and identification in fiber-optical perimeter intrusion monitoring system based on the FBG sensor network

    NASA Astrophysics Data System (ADS)

    Wu, Huijuan; Qian, Ya; Zhang, Wei; Li, Hanyu; Xie, Xin

    2015-12-01

    A real-time intelligent fiber-optic perimeter intrusion detection system (PIDS) based on the fiber Bragg grating (FBG) sensor network is presented in this paper. To distinguish the effects of different intrusion events, a novel real-time behavior impact classification method is proposed based on the essential statistical characteristics of signal's profile in the time domain. The features are extracted by the principal component analysis (PCA), which are then used to identify the event with a K-nearest neighbor classifier. Simulation and field tests are both carried out to validate its effectiveness. The average identification rate (IR) for five sample signals in the simulation test is as high as 96.67%, and the recognition rate for eight typical signals in the field test can also be achieved up to 96.52%, which includes both the fence-mounted and the ground-buried sensing signals. Besides, critically high detection rate (DR) and low false alarm rate (FAR) can be simultaneously obtained based on the autocorrelation characteristics analysis and a hierarchical detection and identification flow.

  10. Security with the 360-degree television-intrusion detection surveillance system

    NASA Astrophysics Data System (ADS)

    Feldman, Sidney; Barton, George G.

    1997-01-01

    A unique, versatile, non-mechanical, non-rotating 360 degrees imaging system has been developed and field-tested successively with conventional black and white, color television, 35-mm, motion picture cameras to prove that intruders, vehicles, radiation can be detected and recognized from any direction using one camera. The system consists of a low-cost, unique first surface reflective conical mirror with special computer programmed aspheric surfaces in operation with conventional narrow field of view (FOV) cameras and objective lenses. The cameras are converted to the 360 degree horizontal FOV and flexibility in conical mirror design provides variable elevation FOV to fit the security application. The wide, efficient spectral reflectance of the conical mirror means that UV, LLLTV, far IR thermal TV cameras can be converted, as well, to 360 degree imaging. The TV real-time 360 degree circular image can be processed electronically and presented on the TV monitor as a typical linear undistorted 360 degree rectangular scene or stacked rectangular scenes and also processed to provide analog to digital real-time motion detection and audible alarm to alert security personnel. For the 360 degree imaging systems or any television systems, the motion detection electronics has been designed to function effectively with image digital memory requirements reduced by magnitudes, thereby, increasing computer speed, but reducing computer costs. The 360 degree TV real-time intruder detection systems can operate in internal and external locations. For external locations, optical filtering and electronic processing has been designed to minimize motion detection false alarms caused by the changing illumination, cloud motion, sun glitter, etc. of the outdoor land or marine environment. The versatile 360 degree TV imaging systems objectives are to replace several narrow FOV cameras for an instantaneous 360 degree sweep, accordingly to reduce number of motion detection accessories, to

  11. Signalprint-Based Intrusion Detection in Wireless Networks

    NASA Astrophysics Data System (ADS)

    Mitchell, Rob; Chen, Ing-Ray; Eltoweissy, Mohamed

    Wireless networks are a critical part of global communication for which intrusion detection techniques should be applied to secure network access, or the cost associated with successful attacks will overshadow the benefits that wireless networks offer. In this paper we investigate a new scheme called Nodeprints to extend the existing centralized Signalprints design for authentication to a distributed voting-based design for intrusion detection. We analyze the effect of voting-based intrusion detection designs, the probability of an individual node voting incorrectly, the ratio of mobile nodes to base stations, and the rate at which nodes are compromised, on the system performance measured by the probability that the intrusion detection system yields a false result. We develop a performance model for evaluating our Nodeprints design and identify conditions under which Nodeprints outperforms the existing Signalprints design.

  12. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  13. An improved intrusion detection model based on paraconsistent logic

    NASA Astrophysics Data System (ADS)

    Yan, Fei; Zhang, Huanguo; Wang, Lina; Yang, Min

    2005-02-01

    A major difficulty of current intrusion detection model is the attack set cannot be separated from normal set thoroughly. On the basis of paraconsistent logic, an improved intrusion detection model is proposed to solve this problem. We give a proof that the detection model is trivial and discuss the reason of false alerts. A parallel paraconsistent detection algorithm is presented to develop the detection technology based on our model. An experiment using network connection data, which is usually used to evaluate the intrusion detection methods, is given to illustrate the performance of this model. We use one-class supported vector machine (SVM) to train our profiles and use supported vector-clustering (SVC) algorithm to update our detection profiles. Results of the experiment indicate that the detection system based on our model can deal with the uncertain events and reduce the false alerts.

  14. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  15. An Improved Real Time Image Detection System for Elephant Intrusion along the Forest Border Areas

    PubMed Central

    Sugumar, S. J.; Jayaparvathy, R.

    2014-01-01

    Human-elephant conflict is a major problem leading to crop damage, human death and injuries caused by elephants, and elephants being killed by humans. In this paper, we propose an automated unsupervised elephant image detection system (EIDS) as a solution to human-elephant conflict in the context of elephant conservation. The elephant's image is captured in the forest border areas and is sent to a base station via an RF network. The received image is decomposed using Haar wavelet to obtain multilevel wavelet coefficients, with which we perform image feature extraction and similarity match between the elephant query image and the database image using image vision algorithms. A GSM message is sent to the forest officials indicating that an elephant has been detected in the forest border and is approaching human habitat. We propose an optimized distance metric to improve the image retrieval time from the database. We compare the optimized distance metric with the popular Euclidean and Manhattan distance methods. The proposed optimized distance metric retrieves more images with lesser retrieval time than the other distance metrics which makes the optimized distance method more efficient and reliable. PMID:24574886

  16. An improved real time image detection system for elephant intrusion along the forest border areas.

    PubMed

    Sugumar, S J; Jayaparvathy, R

    2014-01-01

    Human-elephant conflict is a major problem leading to crop damage, human death and injuries caused by elephants, and elephants being killed by humans. In this paper, we propose an automated unsupervised elephant image detection system (EIDS) as a solution to human-elephant conflict in the context of elephant conservation. The elephant's image is captured in the forest border areas and is sent to a base station via an RF network. The received image is decomposed using Haar wavelet to obtain multilevel wavelet coefficients, with which we perform image feature extraction and similarity match between the elephant query image and the database image using image vision algorithms. A GSM message is sent to the forest officials indicating that an elephant has been detected in the forest border and is approaching human habitat. We propose an optimized distance metric to improve the image retrieval time from the database. We compare the optimized distance metric with the popular Euclidean and Manhattan distance methods. The proposed optimized distance metric retrieves more images with lesser retrieval time than the other distance metrics which makes the optimized distance method more efficient and reliable. PMID:24574886

  17. Seismic intrusion detector system

    DOEpatents

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  18. Detection of intrusion across multiple sensors

    NASA Astrophysics Data System (ADS)

    Long, William J.; Doyle, Jon; Burke, Glenn; Szolovits, Peter

    2003-08-01

    We have been developing an architecture for reasoning with multiple sensors distributed on a computer network, linking them with analysis modules and reasoning with the results to combine evidence of possible intrusion for display to the user. The architecture, called MAITA, consists of monitors distributed across machines and linked together under control of the user and supported by a monitor of monitors that manages the interaction among the monitors. This architecture enables the system to reason about evidence from multiple sensors. For example, a monitor can track FTP logs to detect password scans followed by successful uploads of data from foreign sites. At the same time it can monitor disk use and detect significant trends. Monitors can then combine the evidence in the sequence in which they occur and present evidence to the user that someone has successfully gained write access to the FTP site and is occupying significant disk space. This paper discusses the architecture enabling the creation, linking, and support of the monitors. The monitors may be running on the same or different machines and so appropriate communication links must be supported as well as regular status checks to ensure that monitors are still running. We will also discuss the construction of monitors for sensing the data, abstracting and characterizing data, synchronizing data from different sources, detecting patterns, and displaying the results.

  19. An immunity-based model for dynamic distributed intrusion detection

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Wang, Tong; Su, Jie

    2008-03-01

    The traditional intrusion detection systems mostly adopt the analysis engine of the concentrating type, so the misinformation rate is higher and lack of self-adaptability, which is already difficult to meet increasing extensive security demand of the distributed network environment. An immunity-based model combining immune theory, data mining and data fusion technique for dynamic distributed intrusion detection is proposed in this paper. This system presents the method of establishing and evolving the set of early gene, and defines the sets of Self, Nonself and Immunity cells. Moreover, a detailed description is given to the architecture and work mechanism of the model, and the characters of the model are analyzed.

  20. Sandia Network Intrusion Detection Assessment Version 1.0

    SciTech Connect

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusion detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a complete

  1. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set). PMID:15323002

  2. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.

    PubMed

    Shaikh, Riaz Ahmed; Jameel, Hassan; d'Auriol, Brian J; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  3. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  4. Alerts Visualization and Clustering in Network-based Intrusion Detection

    SciTech Connect

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  5. Misuse and intrusion detection at Los Alamos National Laboratory

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  6. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  7. Detection techniques for non-intrusive testing

    SciTech Connect

    Humphrey, D.L.

    1997-02-01

    Non-intrusive testing using nuclear techniques began with neutron activation. Other industrial applications gradually developed over the years. Explosives, hidden by terrorists, and the sophisticated concealment of contraband by smugglers have motivated the development of new technology for rapid real-time inspection systems. The basic nuclear techniques that have been proposed are reviewed. The applicable detectors are compared. {copyright} {ital 1997 American Institute of Physics.}

  8. Data mining approach to web application intrusions detection

    NASA Astrophysics Data System (ADS)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  9. Experiments on Adaptive Techniques for Host-Based Intrusion Detection

    SciTech Connect

    DRAELOS, TIMOTHY J.; COLLINS, MICHAEL J.; DUGGAN, DAVID P.; THOMAS, EDWARD V.; WUNSCH, DONALD

    2001-09-01

    This research explores four experiments of adaptive host-based intrusion detection (ID) techniques in an attempt to develop systems that can detect novel exploits. The technique considered to have the most potential is adaptive critic designs (ACDs) because of their utilization of reinforcement learning, which allows learning exploits that are difficult to pinpoint in sensor data. Preliminary results of ID using an ACD, an Elman recurrent neural network, and a statistical anomaly detection technique demonstrate an ability to learn to distinguish between clean and exploit data. We used the Solaris Basic Security Module (BSM) as a data source and performed considerable preprocessing on the raw data. A detection approach called generalized signature-based ID is recommended as a middle ground between signature-based ID, which has an inability to detect novel exploits, and anomaly detection, which detects too many events including events that are not exploits. The primary results of the ID experiments demonstrate the use of custom data for generalized signature-based intrusion detection and the ability of neural network-based systems to learn in this application environment.

  10. Sandia Network Intrusion Detection Assessment Version 1.0

    Energy Science and Technology Software Center (ESTSC)

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a

  11. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  12. Organizational coevolutionary classifiers with fuzzy logic used in intrusion detection

    NASA Astrophysics Data System (ADS)

    Chen, Zhenguo

    2009-07-01

    Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. To solve the intrusion detection question, we introduce the fuzzy logic into Organization CoEvolutionary algorithm [1] and present the algorithm of Organization CoEvolutionary Classification with Fuzzy Logic. In this paper, we give an intrusion detection models based on Organization CoEvolutionary Classification with Fuzzy Logic. After illustrating our model with a representative dataset and applying it to the real-world network datasets KDD Cup 1999. The experimental result shown that the intrusion detection based on Organizational Coevolutionary Classifiers with Fuzzy Logic can give higher recognition accuracy than the general method.

  13. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  14. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  15. Intrusion Detection with Quantum Mechanics: A Photonic Quantum Fence

    SciTech Connect

    Humble, Travis S; Bennink, Ryan S; Grice, Warren P; Owens, Israel J

    2008-01-01

    We describe the use of quantum-mechanically entangled photons for sensing intrusions across a physical perimeter. Our approach to intrusion detection uses the no-cloning principle of quantum information science as protection against an intruder s ability to spoof a sensor receiver using a classical intercept-resend attack. We explore the bounds on detection using quantum detection and estimation theory, and we experimentally demonstrate the underlying principle of entanglement-based detection using the visibility derived from polarization-correlation measurements.

  16. The evolution of Interior Intrusion Detection Technology at Sandia National Laboratories

    SciTech Connect

    Graham, R.H.; Workhoven, R.M.

    1987-07-01

    Interior Intrusion Detection Technology began at Sandia National Laboratories (SNL) in 1975 as part of the Fixed Facilities Physical Protection Research and Development program sponsored by the US Department of Energy in connection with their nuclear safeguards effort. This paper describes the evolution of Interior Intrusion Detection Technology at Sandia National Laboratories from the beginning of the Interior Sensor Laboratory to the present. This Laboratory was established in 1976 to evaluate commercial interior intrusion sensors and to assist in site-specific intrusion detection system designs. Examples of special test techniques and new test equipment that were developed at the Lab are presented, including the Sandia Intruder Motion Simulator (SIMS), the Sensor and Environment Monitor (SEM), and the Sandia Interior Robot (SIR). We also discuss new sensors and unique sensor combinations developed when commercial sensors were unavailable and the future application of expert systems.

  17. Walking intrusion signal recognition method for fiber fence system

    NASA Astrophysics Data System (ADS)

    Fang, Nian; Wang, Lutang; Jia, Dongjian; Shan, Chao; Huang, Zhaoming

    2009-11-01

    A recognition method based on the gait characteristic for walking intrusion signal is presented. The gait characteristic of a normal walker in the nature state is an average gait period of 1.2s, in which a step period is about 0.6s and a foot touchdown time is about 0.2s. When a person walks fast or runs, the step period is reduced to about 0.4s and the foot touchdown time still keeps about 0.2s. It is included in the vibration signal caused by a walking intruder inevitably. So the detection system output signal caused by a human intrusion is intermittent and periodical. If a sensing system output waveform has a period of 0.3-0.75s and a duration time of 0.15-0.25s, the disturbance source can be adjudged as a human intrusion, not as an animal or other random one. The effectiveness of the proposed method is verified by the experimental results with an in-line Sagnac interferometer fiber fence system and a φ-OTDR intrusion detection system, respectively.

  18. WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System

    NASA Astrophysics Data System (ADS)

    Rahman, Ahmedur; Ezeife, C. I.; Aggarwal, A. K.

    Intrusion detection in wireless networks has become a vital part in wireless network security systems with wide spread use of Wireless Local Area Networks (WLAN). Currently, almost all devices are Wi-Fi (Wireless Fidelity) capable and can access WLAN. This paper proposes an Intrusion Detection System, WiFi Miner, which applies an infrequent pattern association rule mining Apriori technique to wireless network packets captured through hardware sensors for purposes of real time detection of intrusive or anomalous packets. Contributions of the proposed system includes effectively adapting an efficient data mining association rule technique to important problem of intrusion detection in a wireless network environment using hardware sensors, providing a solution that eliminates the need for hard-to-obtain training data in this environment, providing increased intrusion detection rate and reduction of false alarms.

  19. Non-intrusive cooling system

    DOEpatents

    Morrison, Edward F.; Bergman, John W.

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  20. Anomaly detection enhanced classification in computer intrusion detection

    SciTech Connect

    Fugate, M. L.; Gattiker, J. R.

    2002-01-01

    This report describes work with the goal of enhancing capabilities in computer intrusion detection. The work builds upon a study of classification performance, that compared various methods of classifying information derived from computer network packets into attack versus normal categories, based on a labeled training dataset. This previous work validates our classification methods, and clears the ground for studying whether and how anomaly detection can be used to enhance this performance, The DARPA project that initiated the dataset used here concluded that anomaly detection should be examined to boost the performance of machine learning in the computer intrusion detection task. This report investigates the data set for aspects that will be valuable for anomaly detection application, and supports these results with models constructed from the data. In this report, the term anomaly detection means learning a model from unlabeled data, and using this to make some inference about future data. Our data is a feature vector derived from network packets: an 'example' or 'sample'. On the other hand, classification means building a model from labeled data, and using that model to classify unlabeled (future) examples. There is some precedent in the literature for combining these methods. One approach is to stage the two techniques, using anomaly detection to segment data into two sets for classification. An interpretation of this is a method to combat nonstationarity in the data. In our previous work, we demonstrated that the data has substantial temporal nonstationarity. With classification methods that can be thought of as learning a decision surface between two statistical distributions, performance is expected to degrade significantly when classifying examples that are from regions not well represented in the training set. Anomaly detection can be seen as a problem of learning the density (landscape) or the support (boundary) of a statistical distribution so that

  1. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  2. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  3. Analytic sequential methods for detecting network intrusions

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2014-05-01

    In this paper, we propose an analytic sequential methods for detecting port-scan attackers which routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. In addition to rigorously control the probability of falsely implicating benign remote hosts as malicious, our method performs significantly faster than other current solutions. We have developed explicit formulae for quick determination of the parameters of the new detection algorithm.

  4. An Effective Intrusion Detection Algorithm Based on Improved Semi-supervised Fuzzy Clustering

    NASA Astrophysics Data System (ADS)

    Li, Xueyong; Zhang, Baojian; Sun, Jiaxia; Yan, Shitao

    An algorithm for intrusion detection based on improved evolutionary semi- supervised fuzzy clustering is proposed which is suited for situation that gaining labeled data is more difficulty than unlabeled data in intrusion detection systems. The algorithm requires a small number of labeled data only and a large number of unlabeled data and class labels information provided by labeled data is used to guide the evolution process of each fuzzy partition on unlabeled data, which plays the role of chromosome. This algorithm can deal with fuzzy label, uneasily plunges locally optima and is suited to implement on parallel architecture. Experiments show that the algorithm can improve classification accuracy and has high detection efficiency.

  5. A new framework for intrusion detection based on rough set theory

    NASA Astrophysics Data System (ADS)

    Li, Zhijun; Wu, Yu; Wang, Guoyin; Hai, Yongjun; He, Yunpeng

    2004-04-01

    Intrusion detection is an essential component of critical infrastructure protection mechanism. Since many current IDSs are constructed by manual encoding of expert knowledge, it is time-consuming to update their knowledge. In order to solve this problem, an effective method for misuse intrusion detection with low cost and high efficiency is presented. This paper gives an overview of our research in building a detection model for identifying known intrusions, their variations and novel attacks with unknown natures. The method is based on rough set theory and capable of extracting a set of detection rules from network packet features. After getting a decision table through preprocessing raw packet data, rough-set-based reduction and rule generation algorithms are applied, and useful rules for intrusion detection are obtained. In addition, a rough set and rule-tree-based incremental knowledge acquisition algorithm is presented in order to solve problems of updating rule set when new attacks appear. Compared with other methods, our method requires a smaller size of training data set and less effort to collect training data. Experimental results demonstrate that our system is effective and more suitable for online intrusion detection.

  6. Adaptive sequential methods for detecting network intrusions

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2013-06-01

    In this paper, we propose new sequential methods for detecting port-scan attackers which routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. In addition to rigorously control the probability of falsely implicating benign remote hosts as malicious, our method performs significantly faster than other current solutions. Moreover, our method guarantees that the maximum amount of observational time is bounded. In contrast to the previous most effective method, Threshold Random Walk Algorithm, which is explicit and analytical in nature, our proposed algorithm involve parameters to be determined by numerical methods. We have introduced computational techniques such as iterative minimax optimization for quick determination of the parameters of the new detection algorithm. A framework of multi-valued decision for detecting portscanners and DoS attacks is also proposed.

  7. Case-Based Multi-Sensor Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Schwartz, Daniel G.; Long, Jidong

    2009-08-01

    Multi-sensor intrusion detection systems (IDSs) combine the alerts raised by individual IDSs and possibly other kinds of devices such as firewalls and antivirus software. A critical issue in building a multi-sensor IDS is alert-correlation, i.e., determining which alerts are caused by the same attack. This paper explores a novel approach to alert correlation using case-based reasoning (CBR). Each case in the CBR system's library contains a pattern of alerts raised by some known attack type, together with the identity of the attack. Then during run time, the alert streams gleaned from the sensors are compared with the patterns in the cases, and a match indicates that the attack described by that case has occurred. For this purpose the design of a fast and accurate matching algorithm is imperative. Two such algorithms were explored: (i) the well-known Hungarian algorithm, and (ii) an order-preserving matching of our own device. Tests were conducted using the DARPA Grand Challenge Problem attack simulator. These showed that the both matching algorithms are effective in detecting attacks; but the Hungarian algorithm is inefficient; whereas the order-preserving one is very efficient, in fact runs in linear time.

  8. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  9. An ethernet/IP security review with intrusion detection applications

    SciTech Connect

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  10. Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time

    NASA Astrophysics Data System (ADS)

    Pham, Congduc

    This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle of view and those with very small angle of view. We show by simulation how a dynamic criticality management scheme can provide fast event detection for mission-critical surveillance applications by increasing the network lifetime and providing low stealth time of intrusions.

  11. Groundwater intrusion into leaky sewer systems.

    PubMed

    Wittenberg, H; Aksoy, H

    2010-01-01

    Vast volumes of groundwater are drained by urban sewer systems. This unwanted flow component intrudes into sewer systems through leaky joints or connected house drains. However, unlike urban storm drainage, it has a high seasonal variation corresponding to groundwater storage and long slow recessions similar to baseflow in rivers also fed by shallow groundwater exfiltrating into the surface waters. By applying the nonlinear reservoir algorithm as used for baseflow separation from total flow in a river, groundwater flow is separated from daily measured influents to treatment plants in Lower Saxony and Baden-Württemberg, Germany and in the Terkos Lake watershed near Istanbul, Turkey. While waste water flows vary only moderately within a year, separated intruded groundwater flows show recessions and seasonal variations correlated to baseflow in neighbouring rivers. It is possible to conclude that recession characteristics of treatment plant influents allow quantification and prediction of groundwater intrusion into sewer systems. PMID:20595758

  12. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  13. Robust human intrusion detection technique using hue-saturation histograms

    NASA Astrophysics Data System (ADS)

    Hassan, Waqas; Mitra, Bhargav; Bangalore, Nagachetan; Birch, Philip; Young, Rupert; Chatwin, Chris

    2011-04-01

    A robust human intrusion detection technique using hue-saturation histograms is presented in this paper. Initially a region of interest (ROI) is manually identified in the scene viewed by a single fixed CCTV camera. All objects in the ROI are automatically demarcated from the background using brightness and chromaticity distortion parameters. The segmented objects are then tracked using correlation between hue-saturation based bivariate distributions. The technique has been applied on all the 'Sterile Zone' sequences of the United Kingdom Home Office iLIDS dataset and its performance is evaluated with over 70% positive results.

  14. Performance of Neural Networks Methods In Intrusion Detection

    SciTech Connect

    Dao, V N; Vemuri, R

    2001-07-09

    By accurately profiling the users via their unique attributes, it is possible to view the intrusion detection problem as a classification of authorized users and intruders. This paper demonstrates that artificial neural network (ANN) techniques can be used to solve this classification problem. Furthermore, the paper compares the performance of three neural networks methods in classifying authorized users and intruders using synthetically generated data. The three methods are the gradient descent back propagation (BP) with momentum, the conjugate gradient BP, and the quasi-Newton BP.

  15. Intrusion detection robust to slow and abrupt lighting changes

    NASA Astrophysics Data System (ADS)

    Makarov, Aleksej; Vesin, Jean-Marc; Reymond, Florian

    1996-03-01

    In this communication we present an image based object detection algorithm which is applied to intrusion detection. The algorithm is based on the comparison of input edges and temporally filtered edges of the background. It is characterized by very low computational and memory loads, high sensitivity to the presence of physical intruders and high robustness to slow and abrupt lighting changes. The algorithm is implementable on a cheap digital signal processor. It was tested on a data base of about one thousand gray-level CIF-format frames representing static scenes with various contents (light sources, intruders, lighting changes), and neither false alarm nor detection failure occurred. The number of parameters involved by the algorithm is very low, and their values do not require a fine tuning. The same set of parameters performs equally well in different conditions: different scenes, various lighting changes, various object sizes.

  16. Phase-sensitive optical time domain reflectometer for distributed fence-perimeter intrusion detection

    NASA Astrophysics Data System (ADS)

    Yu, Xuhui; Zhou, Deliang; Lu, Bin; Liu, Sufang; Pan, Ming

    2015-10-01

    In this paper, we demonstrate a distributed fence-perimeter intrusion detection system using a phase-sensitive optical time domain reflectometer (Φ-OTDR) with several advantages, such as high spatial resolution, large detection range, single-end measurement and immunity from electromagnetic interference. By the effort of generating a high-extinction-ratio optical pulse, optimizing the incident optical power and utilizing a differential algorithm, a home-made Φ-OTDR system, as a distributed vibration sensor, is implemented with a spatial resolution of 10 meter. Nowadays, a fence-perimeter intrusion detection system is desired for the security monitor. We set up a fence perimeter using a fiber cable containing only one fiber and a field experiment is carried out based on our Φ-OTDR system. Various vibration events are recorded and analyzed, including wind blowing, personal climbing and knocking. The experiment results reveal unique vibration characteristics of different events in the frequency domain and confirm the effectiveness of the homemade Φ-OTDR system in the application of the distributed fence-perimeter intrusion detection.

  17. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOEpatents

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  18. Passive intrusion detection in wireless networks by exploiting clustering-based learning

    NASA Astrophysics Data System (ADS)

    Yang, Jie; Chen, Yingying; Desai, Sachi; Quoraishee, Shafik

    2010-04-01

    The large-scale wireless sensing data collected from wireless networks can be used for detecting intruders (e.g., enemies in tactical fields), and further facilitating real-time situation awareness in Army's networkcentric warfare applications such as intrusion detection, battlefield protection and emergency evacuation. In this work, we focus on exploiting Received Signal Strength (RSS) obtained from the existing wireless infrastructures for performing intrusion detection when the intruders or objects do not carry any radio devices. This is also known as passive intrusion detection. Passive intrusion detection based on the RSS data is an attractive approach as it reuses the existing wireless environmental data without requiring a specialized infrastructure. We propose a clustering-based learning mechanism for passive intrusion detection in wireless networks. Specifically, our detection scheme utilizes the clustering method to analyze the changes of RSS, caused by intrusions, at multiple devices to diagnose the presence of intrusions collaboratively. Our experimental results using an IEEE 802.15.4 (Zigbee) network in a real office environment show that our clustering-based learning can effectively detect the presence of intrusions.

  19. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree. PMID:26540724

  20. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  1. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  2. Scanning seismic intrusion detection method and apparatus. [monitoring unwanted subterranean entry and departure

    NASA Technical Reports Server (NTRS)

    Lee, R. D. (Inventor)

    1983-01-01

    An intrusion monitoring system includes an array of seismic sensors, such as geophones, arranged along a perimeter to be monitored for unauthorized intrusion as by surface movement or tunneling. Two wires lead from each sensor to a central monitoring station. The central monitoring station has three modes of operation. In a first mode of operation, the output of all of the seismic sensors is summed into a receiver for amplification and detection. When the amplitude of the summed signals exceeds a certain predetermined threshold value an alarm is sounded. In a second mode of operation, the individual output signals from the sensors are multiplexed into the receiver for sequentially interrogating each of the sensors.

  3. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  4. Nuclear data for non-intrusive inspection systems

    SciTech Connect

    Bendahan, J.; Loveman, R.; Gozani, T.

    1994-12-31

    Non-intrusive inspection systems based on nuclear techniques utilize the interaction of neutrons and gamma rays to determine the elemental constituents of the inspected object. The Thermal Neutron Analysis System has been used to detect explosives and narcotics concealed in passenger luggage and small objects. More recently the Pulsed Fast Neutron Analysis technique is being used to detect contraband in large cargo containers and has been proposed for the characterization of waste drums. The design of these systems requires the utilization of simulation codes where the accuracy of the results depends largely on the nuclear libraries. Several nuclear data evaluations were reviewed and compared with existing data to identify the most accurate ones. Large discrepancies were found among the various nuclear libraries, mainly in the production cross sections and angular distributions of gamma rays, stimulated by neutron interactions. An experimental program was carried out to correct and complement the required data. Evaluations of gamma-ray production cross sections for carbon, oxygen and chlorine are reviewed and compared with existing and new experimental data.

  5. Integration of Self-Organizing Map (SOM) and Kernel Density Estimation (KDE) for network intrusion detection

    NASA Astrophysics Data System (ADS)

    Cao, Yuan; He, Haibo; Man, Hong; Shen, Xiaoping

    2009-09-01

    This paper proposes an approach to integrate the self-organizing map (SOM) and kernel density estimation (KDE) techniques for the anomaly-based network intrusion detection (ABNID) system to monitor the network traffic and capture potential abnormal behaviors. With the continuous development of network technology, information security has become a major concern for the cyber system research. In the modern net-centric and tactical warfare networks, the situation is more critical to provide real-time protection for the availability, confidentiality, and integrity of the networked information. To this end, in this work we propose to explore the learning capabilities of SOM, and integrate it with KDE for the network intrusion detection. KDE is used to estimate the distributions of the observed random variables that describe the network system and determine whether the network traffic is normal or abnormal. Meanwhile, the learning and clustering capabilities of SOM are employed to obtain well-defined data clusters to reduce the computational cost of the KDE. The principle of learning in SOM is to self-organize the network of neurons to seek similar properties for certain input patterns. Therefore, SOM can form an approximation of the distribution of input space in a compact fashion, reduce the number of terms in a kernel density estimator, and thus improve the efficiency for the intrusion detection. We test the proposed algorithm over the real-world data sets obtained from the Integrated Network Based Ohio University's Network Detective Service (INBOUNDS) system to show the effectiveness and efficiency of this method.

  6. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2011-11-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  7. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  8. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  9. Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

    NASA Astrophysics Data System (ADS)

    Zhou, Mian; Lang, Sheau-Dong

    2005-03-01

    While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.

  10. Detection of stratospheric ozone intrusions by windprofiler radars.

    PubMed

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-01

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport. PMID:17994096

  11. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    SciTech Connect

    Micklich, B.J.; Roche, C.T.; Fink, C.L.; Yule, T.J.; Demirgian, J.C.; Kunz, T.D.; Ulvick, S.J.; Cui, J.

    1995-12-31

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), including participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.

  12. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  13. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  14. Long-distance fiber optic sensing solutions for pipeline leakage, intrusion, and ground movement detection

    NASA Astrophysics Data System (ADS)

    Nikles, Marc

    2009-05-01

    An increasing number of pipelines are constructed in remote regions affected by harsh environmental conditions where pipeline routes often cross mountain areas which are characterized by unstable grounds and where soil texture changes between winter and summer increase the probability of hazards. Third party intentional interference or accidental intrusions are a major cause of pipeline failures leading to large leaks or even explosions. Due to the long distances to be monitored and the linear nature of pipelines, distributed fiber optic sensing techniques offer significant advantages and the capability to detect and localize pipeline disturbance with great precision. Furthermore pipeline owner/operators lay fiber optic cable parallel to transmission pipelines for telecommunication purposes and at minimum additional cost monitoring capabilities can be added to the communication system. The Brillouin-based Omnisens DITEST monitoring system has been used in several long distance pipeline projects. The technique is capable of measuring strain and temperature over 100's kilometers with meter spatial resolution. Dedicated fiber optic cables have been developed for continuous strain and temperature monitoring and their deployment along the pipeline has enabled permanent and continuous pipeline ground movement, intrusion and leak detection. This paper presents a description of the fiber optic Brillouin-based DITEST sensing technique, its measurement performance and limits, while addressing future perspectives for pipeline monitoring. The description is supported by case studies and illustrated by field data.

  15. Building Intrusion Detection with a Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Wälchli, Markus; Braun, Torsten

    This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons, has been monitored with ten sensor nodes and a base station. The task of the system is to report suspicious office occupation such as office searching by thieves. On the other hand, normal office occupation should not throw alarms. In order to save energy for communication, the system provides all nodes with some adaptive short-term memory. Thus, a set of sensor activation patterns can be temporarily learned. The local memory is implemented as an Adaptive Resonance Theory (ART) neural network. Unknown event patterns detected on sensor node level are reported to the base station, where the system-wide anomaly detection is performed. The anomaly detector is lightweight and completely self-learning. The system can be run autonomously or it could be used as a triggering system to turn on an additional high-resolution system on demand. Our building monitoring system has proven to work reliably in different evaluated scenarios. Communication costs of up to 90% could be saved compared to a threshold-based approach without local memory.

  16. Fully networked remote intrusion detection sensors for border monitoring and protection

    NASA Astrophysics Data System (ADS)

    Jones, Barry; McQuiddy, John; McQuiddy, Brian

    2006-05-01

    Protection of the Nation's borders in the post-911 era has taken on increased importance while it has become more technically challenging due to dramatic increases in the number of illegal aliens attempting unauthorized border crossings. Unattended ground sensors, used in large numbers, have been a key element of the US Border Patrol's inventory of sensing systems that are deployed along the borders to alert agents to intrusions. The legacy sensors are based upon decades old technology and limited in their ability to be networked and integrated into a cohesive web that can provide timely information that can be readily integrated into the Border Patrol and DHS information networks. This paper presents an introduction to a system developed by McQ for border monitoring and intrusion detection that provides full networked capability, from the sensor to the display. The paper also includes results of testing and integration with DHS information systems. The significance of Internet protocol based information generation at the sensor level and real time distribution of data is emphasized, including resource and infrastructure sharing and scalability to nationwide scope will also be discussed.

  17. Wireless sensing without sensors—an experimental study of motion/intrusion detection using RF irregularity

    NASA Astrophysics Data System (ADS)

    Lee, Pius W. Q.; Seah, Winston K. G.; Tan, Hwee-Pink; Yao, Zexi

    2010-12-01

    Motion and intrusion detection are often cited as wireless sensor network (WSN) applications with typical configurations comprising clusters of wireless nodes equipped with motion sensors to detect human motion. Currently, WSN performance is subjected to several constraints, namely radio irregularity and finite on-board computation/energy resources. Radio irregularity in radio frequency (RF) propagation rises to a higher level in the presence of human activity due to the absorption effect of the human body. In this paper, we investigate the feasibility of monitoring RF transmission for the purpose of intrusion detection through experimentation. With empirical data obtained from the Crossbow TelosB platform in several different environments, the impact of human activity on the signal strength of RF signals in a WSN is evaluated. We then propose a novel approach to intrusion detection by turning a constraint in WSN, namely radio irregularity, into an advantage for the purpose of intrusion detection, using signal fluctuations to detect the presence of human activity within the WSN. Unlike RF fingerprinting, the 'intruders' here neither transmit nor receive any RF signals. By enabling existing wireless infrastructures to serve as intrusion detectors instead of deploying numerous costly sensors, this approach shows great promise for providing novel solutions.

  18. Laser spectroscopy for totally non-intrusive detection of oxygen in modified atmosphere food packages

    NASA Astrophysics Data System (ADS)

    Cocola, L.; Fedel, M.; Poletto, L.; Tondello, G.

    2015-04-01

    A device for measuring the oxygen concentration inside packages in modified atmosphere working in a completely non-intrusive way has been developed and tested. The device uses tunable diode laser spectroscopy in a geometry similar to a short distance LIDAR: A laser beam is sent through the top film of a food package, and the absorption is measured by detecting the light scattered by the bottom of the container or by a portion of the food herein contained. The device can operate completely in a contactless way from the package, and the distances of absorption both outside and inside the package are measured with a triangulation system. The performances of the device have been tested for various types of containers, and absolute values for the oxygen concentration have been compared with standard albeit destructive measurements.

  19. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  20. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

    PubMed Central

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  1. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    PubMed

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  2. Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model

    NASA Astrophysics Data System (ADS)

    Zhijie, Han; Ruchuang, Wang

    In this paper, the authors first propose an efficient traffic prediction algorithm for sensor nodes which exploits the Markov model. Based on this algorithm, a distributed anomaly detection scheme, TPID(Traffic Prediction based Intrusion Detection), is designed to detect the attacks which make more influence on packet traffic, such as selective forwarding attacks, DOS attacks. In TPID, each node acts independently when predicting the traffic and detecting an anomaly. Neither special hardware nor nodes cooperation is needed. The scheme is evaluated and compared with other method in experiments. Results show that the proposed scheme obtain high detection ratio with less computation and communication cost.

  3. Detection of Dry Intrusion on Water Vapor Images Over Central Europe - June 2010 TO September 2011

    NASA Astrophysics Data System (ADS)

    Novotny, J.; Dejmal, K.; Hudec, F.; Kolar, P.

    2016-06-01

    The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth's surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images) is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I'Imagerie satellitaire), originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  4. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors

    PubMed Central

    Choi, Minho; Jeong, Jae Jin; Kim, Seung Hun; Kim, Sang Woo

    2016-01-01

    Non-intrusive electrocardiogram (ECG) monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs) to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements. PMID:27196910

  5. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors.

    PubMed

    Choi, Minho; Jeong, Jae Jin; Kim, Seung Hun; Kim, Sang Woo

    2016-01-01

    Non-intrusive electrocardiogram (ECG) monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs) to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements. PMID:27196910

  6. PLC backplane analyzer for field forensics and intrusion detection

    DOEpatents

    Mulder, John; Schwartz, Moses Daniel; Berg, Michael; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Trent, Jason; Depoy, Jennifer M; Jacob, Joshua

    2015-05-12

    The various technologies presented herein relate to the determination of unexpected and/or malicious activity occurring between components communicatively coupled across a backplane. Control data, etc., can be intercepted at a backplane where the backplane facilitates communication between a controller and at least one device in an automation process. During interception of the control data, etc., a copy of the control data can be made, e.g., the original control data can be replicated to generate a copy of the original control data. The original control data can continue on to its destination, while the control data copy can be forwarded to an analyzer system to determine whether the control data contains a data anomaly. The content of the copy of the control data can be compared with a previously captured baseline data content, where the baseline data can be captured for a same operational state as the subsequently captured control data.

  7. Applying hardware-based machine learning to signature-based network intrusion detection

    NASA Astrophysics Data System (ADS)

    Payer, Garrett; McCormick, Chris; Harang, Richard

    2014-06-01

    We present a proof-of-concept of a lightweight and low-power network intrusion detection system (NIDS) using a commercially available neural network chip. Such a system is well-suited to the increasing deployment of low-power devices with ubiquitous internet connectivity. Our proposal makes use of previous work on extracting a feature vector from network packets using a histogram of hashed n-grams. The commercially available CogniMem CM1K device implements a version of the Restricted Coulomb Energy neural network classifier, which was used to classify the resulting feature vectors at high speed and low power. In this paper, we describe our feature extraction technique for network packets and the classification algorithm used by the CM1K chip, and present initial classification results on a fabricated test set. Despite the generality of the RCE algorithm and our `plug-in' approach to the classification task, with no fine-tuning of the hardware to our problem domain, we obtain surprisingly good classification results even on highly imbalanced and restricted training sets.

  8. Automatic identification of responses from porphyry intrusive systems within magnetic data using image analysis

    NASA Astrophysics Data System (ADS)

    Holden, Eun-Jung; Fu, Shih Ching; Kovesi, Peter; Dentith, Michael; Bourne, Barry; Hope, Matthew

    2011-08-01

    Direct targeting of mineral deposits using magnetic data may be facilitated by hydrothermal alteration associated with the mineralising event if the alteration changes the magnetic properties of the host rock. Hydrothermal alteration associated with porphyry-style mineralisation typically comprises concentric near-circular alteration zones surrounding a roughly circular central intrusion. The intrusion itself and the proximal alteration zone are usually associated with positive magnetic anomalies whilst the outer alteration zones are much less magnetic. Because the country rocks are usually magnetic, this pattern of alteration produces a central magnetic 'high' surrounded by an annular magnetic 'low'. This paper presents an automatic image analysis system for gridded data that provides an efficient, accurate and non-subjective way to seek the magnetic response of an idealised porphyry mineralising system within magnetic datasets. The method finds circular anomalies that are associated with the central intrusion and inner alteration zone of the porphyry system using a circular feature detection method called the radial symmetry transform. Next, their boundaries are traced using deformable splines that are drawn to the locations of maximum contrast between the amplitudes of the central 'high' and surrounding area of lower magnetisation. Experiments were conducted on magnetic data from Reko Diq, Pakistan; a region known to contain numerous occurrences of porphyry-style mineralisation. The predicted locations of porphyry systems closely match the locations of the known deposits in this region. This system is suitable as an initial screening tool for large geophysical datasets, therefore reducing the time and cost imposed by manual data inspection in the exploration process. The same principles can be applied to the search for circular magnetic responses with different amplitude characteristics.

  9. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing

    PubMed Central

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs. PMID:22399990

  10. Distributed intrusion monitoring system with fiber link backup and on-line fault diagnosis functions

    NASA Astrophysics Data System (ADS)

    Xu, Jiwei; Wu, Huijuan; Xiao, Shunkun

    2014-12-01

    A novel multi-channel distributed optical fiber intrusion monitoring system with smart fiber link backup and on-line fault diagnosis functions was proposed. A 1× N optical switch was intelligently controlled by a peripheral interface controller (PIC) to expand the fiber link from one channel to several ones to lower the cost of the long or ultra-long distance intrusion monitoring system and also to strengthen the intelligent monitoring link backup function. At the same time, a sliding window auto-correlation method was presented to identify and locate the broken or fault point of the cable. The experimental results showed that the proposed multi-channel system performed well especially whenever any a broken cable was detected. It could locate the broken or fault point by itself accurately and switch to its backup sensing link immediately to ensure the security system to operate stably without a minute idling. And it was successfully applied in a field test for security monitoring of the 220-km-length national borderline in China.

  11. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  12. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  13. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Galley, Alan G.

    2003-06-01

    trondhjemite phases. The trondhjemite phases contain numerous internal contacts indicating emplacement as composite sills. Common structural features of the composite intrusions include early xenolith phases, abundant small comagmatic dikes, fractures and veins and, in places, columnar jointing. Internal phases may differ greatly in texture from fine- to coarse-grained, aphyric and granophyric through seriate to porphyritic. Mineralogical and isotopic evidence indicates that early phases of each composite intrusion are affected by pervasive to fracture-controlled high-temperature (350-450 °C) alteration reflecting seawater-rock interaction. Trondhjemite phases contain hydrothermal-magmatic alteration assemblages within miarolitic cavities, hydrothermal breccias and veins. This hydrothermal-magmatic alteration may, in part, be inherited from previously altered wall rocks. Two of the four intrusions are host to Cu-Mo-rich intrusive breccias and porphyry-type mineralization which formed as much as 14 Ma after the main subvolcanic magmatic activity. The recognition of these Precambrian, subvolcanic composite intrusions is important for greenfields VMS exploration, as they define the location of thermal corridors within extensional oceanic-arc regimes which have the greatest potential for significant VMS mineralization. The VMS mineralization may occur for 2,000 m above the intrusions. In some cases, VMS mineralization has been truncated or enveloped by late trondhjemite phases of the composite intrusions. Evidence that much of the trondhjemitic magmatism postdates the principal VMS activity is a critical factor when developing heat and fluid flow models for these subseafloor magmatic-hydrothermal systems.

  14. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    PubMed

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity. PMID:16902133

  15. Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection

    SciTech Connect

    Soldan, D. L.; Ahmed, N.; Stearns, S. D.

    1980-01-01

    The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

  16. Surveillance photonic fence based on active range-gated imaging for night intrusion detection

    NASA Astrophysics Data System (ADS)

    Wang, Xinwei; Zhou, Yan; He, Jun; Fan, Songtao; Liu, Yuliang

    2011-06-01

    We propose a surveillance photonic fence for night remote intrusion detection, especially in bad environmental conditions. The photonic fence is established by the synchronization of a pulsed infrared laser and a gated imaging sensor. Since the wavelength of the laser is invisible, the photonic fence is also invisible. Only when targets pass the fence, their image information can be collected. Objects and backgrounds out of the fence are all filtered directly which decreases the complexity of image processing about target extraction. For the fence, its location can be easily adjusted by the delay time between the laser pulse and the gate pulse, and its thickness can be set by changing the gate time and the laser pulse width. Furthermore, target space information can also be estimated in terms of the range information of the photonic fence.

  17. Non-intrusive detection of methanol in gas phase using infrared degenerate four-wave mixing

    NASA Astrophysics Data System (ADS)

    Zhou, J.; Sahlberg, A. L.; Nilsson, H.; Lundgren, E.; Zetterberg, J.

    2015-11-01

    Sensitive and non-intrusive detection of gas-phase methanol with high spatial and temporal resolution has for the first time been reported using mid-infrared degenerate four-wave mixing (IR-DFWM). IR-DFWM spectra of methanol have been successfully recorded in nitrogen-diluted gas flows at room temperature and at 300 °C, by probing ro-vibrational transitions belonging to the fundamental C-H stretching modes, ν 2 and ν 9, and the O-H stretching mode, ν 1. The detection limit of methanol vapor at room temperature and atmospheric pressure is estimated to be 250 ppm with the present setup. Potential interference from CH4 and CO2 is discussed from recorded IR-DFWM spectra of CH4 and CO2, and it was found that detection of methanol free from CH4 and CO2 interference is possible. These results show the potential of the detection of methanol with IR-DFWM for applications in both combustion and catalytic environments, such as CO2 hydrogenation and CH4 oxidation.

  18. Preliminary experimental results for a non-intrusive scheme for the detection of flaws in metal pipelines

    NASA Astrophysics Data System (ADS)

    Aydin, K.; Shinde, S.; Suhail, M.; Vyas, A.; Zieher, K. W.

    2002-05-01

    An acoustic pulse echo scheme for non-intrusive detection of flaws in metal pipelines has been investigated in the laboratory. The primary pulse is generated by a pulsed magnetic field enclosing a short section of a free pipe. The detection is by an electrostatic detector surrounding a short section of the pipe. Reflected pulses from thin areas, with a longitudinal extension of about one pipe radius and a reduction of the wall thickness of 40%, can be detected clearly.

  19. A Non-Intrusive Pressure Sensor by Detecting Multiple Longitudinal Waves.

    PubMed

    Zhou, Hongliang; Lin, Weibin; Ge, Xiaocheng; Zhou, Jian

    2016-01-01

    Pressure vessels are widely used in industrial fields, and some of them are safety-critical components in the system-for example, those which contain flammable or explosive material. Therefore, the pressure of these vessels becomes one of the critical measurements for operational management. In the paper, we introduce a new approach to the design of non-intrusive pressure sensors, based on ultrasonic waves. The model of this sensor is built based upon the travel-time change of the critically refracted longitudinal wave (LCR wave) and the reflected longitudinal waves with the pressure. To evaluate the model, experiments are carried out to compare the proposed model with other existing models. The results show that the proposed model can improve the accuracy compared to models based on a single wave. PMID:27527183

  20. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGESBeta

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  1. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  2. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect

    Najm, Habib N.; Valorani, Mauro

    2014-08-01

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  3. Non-intrusive tunable resonant microwave cavity for optical detected magnetic resonance of NV centres in nanodiamonds

    NASA Astrophysics Data System (ADS)

    Le Floch, Jean-Michel; Bradac, Carlo; Volz, Thomas; Tobar, Michael E.; Castelletto, Stefania

    2013-12-01

    Optically detected magnetic resonance (ODMR) in nanodiamond nitrogen-vacancy (NV) centres is usually achieved by applying a microwave field delivered by micron-size wires, strips or antennas directly positioned in very close proximity (~ μm) of the nanodiamond crystals. The microwave field couples evanescently with the ground state spin transition of the NV centre (2.87 GHz at zero magnetic field), which results in a reduction of the centre photoluminescence. We propose an alternative approach based on the construction of a dielectric resonator. We show that such a resonator allows for the efficient detection of NV spins in nanodiamonds without the constraints associated to the laborious positioning of the microwave antenna next to the nanodiamonds, providing therefore improved flexibility. The resonator is based on a tunable Transverse Electric Mode in a dielectric-loaded cavity, and we demonstrate that the resonator can detect single NV centre spins in nanodiamonds using less microwave power than alternative techniques in a non-intrusive manner. This method can achieve higher precision measurement of ODMR of paramagnetic defects spin transition in the micro to millimetre-wave frequency domain. Our approach would permit the tracking of NV centres in biological solutions rather than simply on the surface, which is desirable in light of the recently proposed applications of using nanodiamonds containing NV centres for spin labelling in biological systems with single spin and single particle resolution.

  4. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  5. Non-intrusive detection of rotating stall in pump-turbines

    NASA Astrophysics Data System (ADS)

    Botero, F.; Hasmatuchi, V.; Roth, S.; Farhat, M.

    2014-10-01

    When operated far from their optimum conditions, pump-turbines may exhibit strong hydrodynamic instabilities, often called rotating stall, which lead to substantial increase of vibration and risk of mechanical failure. In the present study, we have investigated the flow filed in a model of radial pump-turbine with the help of tuft visualization, wall pressure measurement and structure-borne noise monitoring. As the rotation speed is increased, the machine is brought from its optimum operation to runaway with zero torque on the shaft. The runaway operation is characterized by a significant increase of pressure fluctuation at the rotor-stator interaction frequency. As the speed is further increased, the flow exhibits sub-synchronous instability, which rotates at 70% of the rotation frequency. Tuft visualization clearly shows that, as the instability evolves, the flow in a given distributor channel suddenly stalls and switches to reverse pumping mode in periodic way. We have also investigated the monitoring of the rotating stall with the help of vibration signals. A specific signal processing method, based on amplitude demodulation, was developed. The use of 2 accelerometers allows for the identification of the optimum carrier frequency by computing the cyclic coherence of vibration signals. This non-intrusive method is proved to be efficient in detecting the rotating stall instability and the number of stall cells. We strongly believe that it could be implemented in full scale pump-turbines.

  6. Detection of ethene and other hydrocarbons in gas turbine engine exhaust using non-intrusive FTIR spectroscopy

    NASA Astrophysics Data System (ADS)

    Arrigone, Giovanni M.; Welch, Michael A.; Hilton, Moira; Miller, Michael N.; Wilson, Christopher W.

    2003-04-01

    As part of the EU funded project AEROJET2, a number of gas turbine engine tests were performed in different facilities around Europe. At Farnborough, UK a Spey engine was used to test a suite of prototype optically based instrumentation designed to measure exhaust gas emissions without using extractive probe systems. In addition to the AEROJET 2 prototype instrumentation, a Bruker Equinox 55 Fourier transform infrared (FTIR) spectrometer was used to obtain infrared spectra of the exhaust plume both in emission and absorption mode. The Bruker FTIR spectrometer was fitted with a periscope system so that different lines of sight could be monitored in the plume in a vertical plane 25 cm downstream from the nozzle exit and 20 cm upstream of the center line of sight of the AEROJET 2 prototype instrumentation. DERA (now QinetiQ) provided exhaust gas analysis data for different engine running conditions using samples extracted from the plume with an intrusive probe. The probe sampled along a horizontal plane across the centerline of the engine 45 cm downstream of the nozzle exit. The Bruker spectrometer used both InSb (indium antimonide) and MCT (mercury-cadmium-telluride) detectors to maximize the sensitivity across the IR range 600-4000 cm-1. Typically, CO2 and H2O IR signatures dominate the observed spectra of the plume. However, the engine tests showed that at low power engine conditions spectral features associated with CO around 2147 cm-1 and with hydrocarbons could be observed at around 3000 cm-1. In particular the presence of ethene (C2H2) was detected from observation of its characteristic in and out of plane vibration mode at 949 cm-1. At high engine powers the presence of NO was detected at 1900.3 cm-1. Species concentrations were calculated using a slab model for each line of sight compared against reference spectra. The engine plume was assumed to be symmetric about the centerline. On this basis, data from the extractive sampling gas analysis that had been

  7. Ad Duwayhi, Saudi Arabia: Geology and geochronology of a neoproterozoic intrusion-related gold system in the Arabian shield

    USGS Publications Warehouse

    Doebrich, Jeff L.; Zahony, S.G.; Leavitt, J.D.; Portacio, J.S., Jr.; Siddiqui, A.A.; Wooden, Joseph L.; Fleck, Robert J.; Stein, Holly J.

    2004-01-01

    In light of our findings at Ad Duwayhi, a reassessment of similar intrusion-hosted deposits in the Arabian shield is warranted, and areas of late- to postorogenic plutonism, particularly in the Afif composite terrane, should be considered prospective for intrusion-related gold systems.

  8. Non-Intrusive Electric Appliances Load Monitoring System-Experiment for Real Household-

    NASA Astrophysics Data System (ADS)

    Murata, Hiroshi; Onoda, Takashi; Yoshimoto, Katsuhisa; Nakano, Yukio; Kondo, Syuhei

    This paper presents applying results of four estimation algorithms of non-intrusive monitoring system for real household. We conclude that all algorithms have practicable ability. 1) support vector machine(SVM): SVM was used to estimate ON/OFF states for fluorescent and refrigerator. SVM has the performance equivalent to best performance of sigmoid function networks(SFN). However, SVM has high estimating ability constantly. 2) RBF networks(RBFN): RBFN was used to estimate power consumption for air conditioner. RBFN has the performance equivalent to best performance of SFN. However, RBFN has high estimating ability constantly. 3) step change detection method(SCD): SCD was used to estimate ON/OFF states and power consumption for IH cooking range. SCD does not need the necessary learning process for SFN and has higher estimating ability than SFN. 4) spectrum reference method(SRM): SRM was used to estimate working conditions for rice cocker and washing machine. SRM is able to estimate these working conditions that cannot be estimated by earlier methods.

  9. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  10. An analysis of security system for intrusion in Smartphone environment.

    PubMed

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. PMID:25165754

  11. An Analysis of Security System for Intrusion in Smartphone Environment

    PubMed Central

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. PMID:25165754

  12. iSSH v. Auditd: Intrusion Detection in High Performance Computing

    SciTech Connect

    Karns, David M.; Protin, Kathryn S.; Wolf, Justin G.

    2012-07-30

    The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks

  13. Force Protection Joint Experiment (FPJE) Battlefield Anti-Intrusion System (BAIS) sensors data analysis and filtering metrics

    NASA Astrophysics Data System (ADS)

    Barngrover, C. M.; Laird, R. T.; Kramer, T. A.; Cruickshanks, J. R.; Cutler, S. H.

    2009-04-01

    The FPJE was an experiment to consider the best way to develop and evaluate a system of systems approach to Force Protection. It was sponsored by Physical Security Equipment Action Group (PSEAG) and Joint Program Manager - Guardian (JPM-G), and was managed by the Product Manager - Force Protection Systems (PM-FPS). The experiment was an effort to utilize existing technical solutions from all branches of the military in order to provide more efficient and effective force protection. The FPJE consisted of four separate Integration Assessments (IA), which were intended as opportunities to assess the status of integration, automation and fusion efforts, and the effectiveness of the current configuration and "system" components. The underlying goal of the FPJE was to increase integration, automation, and fusion of the many different sensors and their data to provide enhanced situational awareness and a common operational picture. One such sensor system is the Battlefield Anti-Intrusion System (BAIS), which is a system of seismic and acoustic unmanned ground sensors. These sensors were originally designed for employment by infantry soldiers at the platoon level to provide early warning of personnel and vehicle intrusion in austere environments. However, when employed around airfields and high traffic areas, the sensitivity of these sensors can cause an excessive number of detections. During the second FPJE-IA all of the BAIS detections and the locations of all Opposing Forces were logged and analyzed to determine the accuracy rate of the sensors. This analysis revealed that with minimal filtering of detections, the number of false positives and false negatives could be reduced substantially to manageable levels while using the sensors within extreme operational acoustic and seismic noise conditions that are beyond the design requirements.

  14. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  15. Modeling And Detecting Anomalies In Scada Systems

    NASA Astrophysics Data System (ADS)

    Svendsen, Nils; Wolthusen, Stephen

    The detection of attacks and intrusions based on anomalies is hampered by the limits of specificity underlying the detection techniques. However, in the case of many critical infrastructure systems, domain-specific knowledge and models can impose constraints that potentially reduce error rates. At the same time, attackers can use their knowledge of system behavior to mask their manipulations, causing adverse effects to observed only after a significant period of time. This paper describes elementary statistical techniques that can be applied to detect anomalies in critical infrastructure networks. A SCADA system employed in liquefied natural gas (LNG) production is used as a case study.

  16. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  17. Lead and cadmium associated with saltwater intrusion in a New Jersey aquifer system

    USGS Publications Warehouse

    Pucci, Amleto A., Jr.; Harriman, Douglas A.; Ervin, Elisabeth M.; Bratton, Lisa; Gordon, Alison

    1989-01-01

    The U.S. Geological Survey collected ground-water samples from the upper and middle aquifers of the Potomac-Raritan-Magothy aquifer system in a 400-square-mile area of New Jersey from 1984 through 1986. Concentrations of lead were greater than the U.S. Environmental Protection Agency maximum contaminant level (MCL) of 50 micrograms per liter in water from 16 to 239 wells. The concentrations of cadmium were greater than the MCL of 10 micrograms per liter in water from 10 to 241 wells. One-half of the wells that exceeded the lead MCL were in known areas of saltwater intrusion, as were all 10 wells that exceeded the cadmium MCL. The association of elevated concentrations of these metals with elevated concentrations of chloride indicates a mechanism related to saltwater intrusion.

  18. Improved wavelet packet classification algorithm for vibrational intrusions in distributed fiber-optic monitoring systems

    NASA Astrophysics Data System (ADS)

    Wang, Bingjie; Pi, Shaohua; Sun, Qi; Jia, Bo

    2015-05-01

    An improved classification algorithm that considers multiscale wavelet packet Shannon entropy is proposed. Decomposition coefficients at all levels are obtained to build the initial Shannon entropy feature vector. After subtracting the Shannon entropy map of the background signal, components of the strongest discriminating power in the initial feature vector are picked out to rebuild the Shannon entropy feature vector, which is transferred to radial basis function (RBF) neural network for classification. Four types of man-made vibrational intrusion signals are recorded based on a modified Sagnac interferometer. The performance of the improved classification algorithm has been evaluated by the classification experiments via RBF neural network under different diffusion coefficients. An 85% classification accuracy rate is achieved, which is higher than the other common algorithms. The classification results show that this improved classification algorithm can be used to classify vibrational intrusion signals in an automatic real-time monitoring system.

  19. Lead and cadmium associated with saltwater intrusion in a New Jersey aquifer system

    SciTech Connect

    Pucci, A.A. Jr.; Gordon, A. ); Harriman, D.A. ); Ervin, E.M. ); Bratton, L. )

    1989-12-01

    The US Geological Survey collected ground-water samples from the upper and middle aquifers of the Potomac-Raritan-Magothy aquifer system in a 400-square-mile are of New Jersey from 1984 through 1986. Concentrations of lead were greater than the US Environmental Protection Agency maximum contaminant level (MCL) of 50 micrograms per liter in water from 16 to 239 wells. The concentrations of cadmium were greater than the MCL of 10 micrograms per liter in water from 10 to 241 wells. One-half of the wells that exceeded the lead MCL were in known areas of saltwater intrusion, as were all 10 wells that exceeded the cadmium MCL. The association of elevated concentrations of these metals with elevated concentrations of chloride indicates a mechanism related to saltwater intrusion.

  20. Non-intrusive rattle noise detection in non-stationary conditions by an angle/time cyclostationary approach

    NASA Astrophysics Data System (ADS)

    Baudin, Sophie; Rémond, Didier; Antoni, Jérôme; Sauvage, Olivier

    2016-03-01

    This work proposes an original non-intrusive approach to detect and quantify rattle noise in automotive gearboxes operating under non-stationary conditions by means of vibration or instantaneous angular speed measurements. Rattle noise is produced by vibro impacts between teeth of unloaded gears excited by the engine acyclism. It appears during acceleration or deceleration phases and its detection requires the analysis of non-stationary signals. In order to take advantage of the repetitive nature of the impacts, an angle/time cyclostationary approach is introduced. Rattle noise is thus characterized through the angle/time duality: the cyclic frequency expressed in events per revolution is directly linked to the periodicity of the impacts while their frequency content is expressed in Hertz. The proposed detection method uses an order/frequency spectral coherence and may be applied either on vibration signals or instantaneous angular speed signals. For validation purposes, a specific instrumentation of a gearbox is set up. The relative speed of the unloaded meshing gears is observed by means of optical encoders to directly detect the instants of impact which then serve as a basis for validation of the non-intrusive detection method proposed in this paper.

  1. Calculation notes that support accident scenario and consequence development for the steam intrusion from interfacing systems accident

    SciTech Connect

    Ryan, G.W., Westinghouse Hanford

    1996-07-25

    This document supports the development and presentation of the following accident scenario in the TWRS Final Safety Analysis Report: Steam Intrusion from Interfacing Systems. The calculations needed to quantify the risk associated with this accident scenario are included within.

  2. Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm

    PubMed Central

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data. PMID:25807466

  3. An evaluation of interior video motion detection systems

    SciTech Connect

    Vigil, J.T.

    1993-02-01

    This report discusses the testing and evaluation of five commercially available interior video emotion detection (VMD) systems. Three digital VMDs and two analog VMDs were tested. The report focuses on nuisance alarm data and on intrusion detection results. Tests were conducted in a high-bay (warehouse) location and in an office.

  4. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  5. Three-dimensional hydrostratigraphical modelling to support evaluation of recharge and saltwater intrusion in a coastal groundwater system in Vietnam

    NASA Astrophysics Data System (ADS)

    Tam, Vu Thanh; Batelaan, Okke; Le, Tran Thanh; Nhan, Pham Quy

    2014-12-01

    Saltwater intrusion is generally related to seawater-level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface plays an important role in (non-)intrusion as well. Local hydrogeological conditions for recharge and saltwater intrusion are studied in a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A three-dimensional (3D) hydrostratigraphical solid model of the study area is constructed by way of a recursive classification procedure. The procedure includes a cluster analysis which uses as parameters geological formation, lithological composition, distribution depth and thickness of each lithologically distinctive drilling interval of 47 boreholes, to distinguish and map well-log intervals of similar lithological properties in different geological formations. A 3D hydrostratigraphical fence diagram is then generated from the constructed solid model and is used as a tool to evaluate recharge paths and saltwater intrusion to the groundwater system. Groundwater level and chemistry, and geophysical direct current (DC) resistivity measurements, are used to support the hydrostratigraphical model. Results of this research contribute to the explanation of why the aquifer system of the study area is almost uninfluenced by saltwater intrusion, which is otherwise relatively common in coastal aquifers of Vietnam.

  6. Online Intrusion Alert Aggregation Through Mobile

    NASA Astrophysics Data System (ADS)

    kumar, S. Magesh; Mohan, K.; Kadirvelu, G.; Muruganandam, S.

    2012-08-01

    Online Intrusion Alert Aggregation with Generative Data Stream Modeling is a generative modeling approach using probabilistic methods. Assuming that attack instances can be regarded as random processes ìproducingî alerts, we aim at modeling these processes using approximative maximum likelihood parameterestimation techniques. Thus, the beginning as well as the completion of attack instances can be detected. In the proposed scheme of Online Intrusion Alert Aggregation, we extend our idea of sending Intrusion alerts to the mobile. This makes the process easier and comfortable. Online Intrusion Alert Aggregation with Generative Data Stream Modeling does not degrade system performance as individual layers are independent and are trained with only a small number of features, thereby, resulting in an efficient system

  7. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    USGS Publications Warehouse

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  8. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    NASA Astrophysics Data System (ADS)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  9. Design of no blind area perimeter intrusion recognition system based on fisheye lens

    NASA Astrophysics Data System (ADS)

    Dai, Jun-jian; Han, Wen-bo

    2013-08-01

    The Perimeter intrusion recognition technology has slowly become an indispensable function in the intelligent video surveillance system. The existed always use the multiple video acquisition nodes to respectively control a monitoring area and each node alarm independently. However, the existed solutions are difficult to avoid the existence of monitoring blind area, and can't suitable for the perimeter environment with irregular outline, and at the same time, because of the too many nodes, it inevitably decreased the overall accuracy of intrusion recognition system and increased the cost of system. To avoid the above defects, this paper mainly talks about the following three aspects. Firstly, we used the fisheye lens as the optical system of video acquisition node, and it evidently enhances each node's information acquisition ability. And in this way, we just need to decorate a small amount of video acquisition node to get no blind area environmental information of the perimeter when against a larger monitoring situation. Secondly, due to the inexistence of blind area, the system will have enough video image information to generate the 360 degree panoramic image for monitoring environment, and finally the system server collected the wide-angle image information to splice into the panoramic video image. Finally, the system will use the panoramic image to complete the intrusion behavior recognition, thus we can effectively avoid the parallel computation in many nodes independently invasion of recognition, and this can greatly reduces the dependence for the multiple CPU operation platform and enhances the reliability of the system. The field test results show that, with the help of this paper's solution, the perimeter of the invasion of recognition system can effectively avoids the recognition of blind area. In the same recognition algorithm and same level delay premise, it greatly reduces the monitoring system server configuration requirements, especially for the

  10. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  11. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    NASA Astrophysics Data System (ADS)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  12. Portable modular detection system

    DOEpatents

    Brennan, James S.; Singh, Anup; Throckmorton, Daniel J.; Stamps, James F.

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  13. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  14. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  15. Non-intrusive hybrid interval method for uncertain nonlinear systems using derivative information

    NASA Astrophysics Data System (ADS)

    Liu, Zhuang-Zhuang; Wang, Tian-Shu; Li, Jun-Feng

    2016-02-01

    This paper proposes a new non-intrusive hybrid interval method using derivative information for the dynamic response analysis of nonlinear systems with uncertain-but-bounded parameters and/or initial conditions. This method provides tighter solution ranges compared to the existing polynomial approximation interval methods. Interval arithmetic using the Chebyshev basis and interval arithmetic using the general form modified affine basis for polynomials are developed to obtain tighter bounds for interval computation. To further reduce the overestimation caused by the "wrapping effect" of interval arithmetic, the derivative information of dynamic responses is used to achieve exact solutions when the dynamic responses are monotonic with respect to all the uncertain variables. Finally, two typical numerical examples with nonlinearity are applied to demonstrate the effectiveness of the proposed hybrid interval method, in particular, its ability to effectively control the overestimation for specific timepoints.

  16. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  17. Extracting Features from an Electrical Signal of a Non-Intrusive Load Monitoring System

    NASA Astrophysics Data System (ADS)

    Figueiredo, Marisa B.; de Almeida, Ana; Ribeiro, Bernardete; Martins, António

    Improving energy efficiency by monitoring household electrical consumption is of significant importance with the present-day climate change concerns. A solution for the electrical consumption management problem is the use of a non-intrusive load monitoring system (NILM). This system captures the signals from the aggregate consumption, extracts the features from these signals and classifies the extracted features in order to identify the switched on appliances. An effective device identification (ID) requires a signature to be assigned for each appliance. Moreover, to specify an ID for each device, signal processing techniques are needed for extracting the relevant features. This paper describes a technique for the steady-states recognition in an electrical digital signal as the first stage for the implementation of an innovative NILM. Furthermore, the final goal is to develop an intelligent system for the identification of the appliances by automated learning. The proposed approach is based on the ratio value between rectangular areas defined by the signal samples. The computational experiments show the method effectiveness for the accurate steady-states identification in the electrical input signals.

  18. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  19. Deployment-ready multimode micropower wireless sensors networks for intrusion detection, classification, and tracking

    NASA Astrophysics Data System (ADS)

    Horton, Mike A.; Broad, Alan; Grimmer, Mike; Pister, Kristofer S. J.; Sastry, S. Shankar; Rosenbury, Tom; Whitaker, Norman A.

    2002-08-01

    Accurate personnel and vehicle tracking has been achieved using networks of small, unobtrusive, low-cost wireless sensors. The wireless MSTAR sensors developed in this work are based on previous pioneering MEMS sensing and TinyOS communications software work completed at UC Berkeley. The works has been funded under the DARPA SensIT, SensorWebs, and on-going DARPA NEST programs. These MSTAR sensors deliver around the clock all-weather surveillance and perimeter protection for field environments, including buildings, camp and tent locations, streets, mountainous regions, and other geographies. These capabilities satisfy many on-going intelligence and warfighter safety requirements. The MSTAR sensors are quickly deployed by hand emplacement or air-drop from a UAV or other airborne platform. The combination of multimode sensing on each wireless MSTAR sensor and multiple MSTAR sensors in the environment yields low false detections within the network perimeter. In addition, using the geopgraphy dispersion and networked algorithms, it is possible to estimate the target's speed, direction, and loosely classify the target. Satellite exfiltration of data provides real-time access to the data on a worldwide basis. Future work includes additional field trials and the incorporation of acoustic capture, video capture, and biosensors into the MSTAR wireless sensor platform.

  20. Deployment-ready multimode micropower wireless sensor networks for intrusion detection, classification, and tracking

    NASA Astrophysics Data System (ADS)

    Horton, Mike A.; Broad, Alan; Grimmer, Mike; Pister, Kristofer S. J.; Sastry, S. Shankar; Rosenbury, Tom; Whitaker, Norman A.

    2002-08-01

    Accurate personnel and vehicle tracking has been achieved using networks of small, unobtrusive, low-cost wireless sensors. The wireless MSTAR sensors developed in this work are based on previous pioneering MEMS sensing and TinyOS communications software work completed at UC Berkeley. The works has been funded under the DARPA SensIT, SensorWebs, and on-going DARPA NEST programs. These MSTAR sensors deliver around the clock all-weather surveillance and perimeter protection for field environments, including buildings, camp and tent locations, streets, mountainous regions, and other geographies. These capabilities satisfy many on-going intelligence and warfighter safety requirements. The MSTAR sensors are quickly deployed by hand emplacement or air-drop from a UAV or other airborne platform. The combination of multimode sensing on each wireless MSTAR sensor and multiple MSTAR sensors in the environment yields low false detections within the network perimeter. A low-power spread spectrum wireless link is used for communication across the MSTAR sensor network. Satellite exfiltration of data provides real-time access to the data on a worldwide basis. Future work includes additional field trials and the incorporation of acoustic capture, video capture, and biosensors into the MSTAR wireless sensor platform.

  1. Geophysical characterization of hydrothermal systems and intrusive bodies, El Chichón volcano (Mexico)

    NASA Astrophysics Data System (ADS)

    Jutzeler, Martin; Varley, Nick; Roach, Michael

    2011-04-01

    The 1982 explosive eruptions of El Chichón volcano (Chiapas, Mexico) destroyed the inner dome and created a 1-km-wide and 180-m-deep crater within the somma crater. A shallow hydrothermal system was exposed to the surface of the new crater floor and is characterized by an acid crater lake, a geyser-like Cl-rich spring (soap pool), and numerous fumarole fields. Multiple geophysical surveys were performed to define the internal structure of the volcanic edifice and its hydrothermal system. We carried out a high-resolution ground-based geomagnetic survey in the 1982 crater and its surroundings and 38 very low frequency (VLF) transects around the crater lake. A 3-D inversion of the ground-based magnetic data set highlighted three high-susceptibility isosurfaces, interpreted as highly magnetized bodies beneath the 1982 crater floor. Inversion of a digitized regional aeromagnetic map highlighted four major deeply rooted cryptodomes, corresponding to major topographic highs and massive lava dome outcrops outside and on the somma rim. The intracrater magnetic bodies correspond closely to the active hydrothermal vents and their modeled maximum basal depth matches the elevation of the springs on the flanks of the volcano. Position, dip, and vertical extent of active and extinct hydrothermal vents identified by VLF-EM surveys match the magnetic data set. We interpret the shallow lake spring hydrothermal system to be mostly associated with buried remnants of the 550 BP dome, but the Cl-rich soap pool may be connected to a small intrusion emplaced at shallow depth during the 1982 eruption.

  2. Design considerations for intrusion detection wide-area surveillance radars for perimeters and borders

    NASA Astrophysics Data System (ADS)

    Butler, Walker

    2009-05-01

    Ground Surveillance Radars (GSRs) can build a virtual wall around facilities or on a border. They provide operators and agents with much more time to assess, prioritize and apprehend intruders than a traditional fence system. The extra response time is one of the important features of the wide area surveillance concept, along with added benefits for both the operators and the response teams. These are described in detail in the paper. But all GSRs are not alike. There are two primary GSR technologies - Frequency Modulated Continuous Wave (FMCW) and Pulse Doppler. Most pulse Doppler radars are derivatives of legacy military battlefield radar technology being applied for wide area surveillance, while a new generation of FMCW radar technology has been developed for this new type of surveillance, applied to high value site security, airports, military bases, ports and borders. The purpose of this paper is to explore the benefits of each type of radar for the wide area application.

  3. A surrogate model for simulation-optimization of aquifer systems subjected to seawater intrusion

    NASA Astrophysics Data System (ADS)

    Hussain, Mohammed S.; Javadi, Akbar A.; Ahangar-Asr, Alireza; Farmani, Raziyeh

    2015-04-01

    This study presents the application of Evolutionary Polynomial Regression (EPR) as a pattern recognition system to predicate the behavior of nonlinear and computationally complex aquifer systems subjected to seawater intrusion (SWI). The developed EPR models are integrated with a multi objective genetic algorithm to examine the efficiency of different arrangements of hydraulic barriers in controlling SWI. The objective of the optimization is to minimize the economic and environmental costs. The developed EPR model is trained and tested for different control scenarios, on sets of data including different pumping patterns as inputs and the corresponding set of numerically calculated outputs. The results are compared with those obtained by direct linking of the numerical simulation model with the optimization tool. The results of the two above-mentioned simulation-optimization (S/O) strategies are in excellent agreement. Three management scenarios are considered involving simultaneous use of abstraction and recharge to control SWI. Minimization of cost of the management process and the salinity levels in the aquifer are the two objective functions used for evaluating the efficiency of each management scenario. By considering the effects of the unsaturated zone, a subsurface pond is used to collect the water and artificially recharge the aquifer. The distinguished feature of EPR emerges in its application as the metamodel in the S/O process where it significantly reduces the overall computational complexity and time. The results also suggest that the application of other sources of water such as treated waste water (TWW) and/or storm water, coupled with continuous abstraction of brackish water and its desalination and use is the most cost effective method to control SWI. A sensitivity analysis is conducted to investigate the effects of different external sources of recharge water and different recovery ratios of desalination plant on the optimal results.

  4. Idaho Explosive Detection System

    SciTech Connect

    Klinger, Jeff

    2011-01-01

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  5. Idaho Explosive Detection System

    ScienceCinema

    Klinger, Jeff

    2013-05-28

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  6. Underwater laser detection system

    NASA Astrophysics Data System (ADS)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  7. Detecting the thermal aureole of a magmatic intrusion in immature to mature sediments: a case study in the East Greenland Basin (73°N)

    NASA Astrophysics Data System (ADS)

    Aubourg, Charles; Techer, Isabelle; Geoffroy, Laurent; Clauer, Norbert; Baudin, François

    2014-01-01

    The Cretaceous and Triassic argillaceous rocks from the passive margin of Greenland have been investigated in order to detect the thermal aureole of magmatic intrusions, ranging from metric dyke to kilometric syenite pluton. Rock-Eval data (Tmax generally <468 °C), vitrinite reflectance data (R0 < 0.9 per cent) and illite cristallinity data (ICI > 0.3), all indicate a maximum of 5 km burial for the argillaceous rocks whatever the distance to an intrusion. The K-Ar dating of the clays <2 μm fraction suggests that illites are mostly detrital, except near magmatic intrusions where younger ages are recorded. To get more information about the extent of the thermal aureole, rock magnetism data were determined. At distance away from the thermal aureole of the syenite intrusion, Triassic argillaceous rocks reveal a standard magnetic assemblage compatible with their burial (R0 ˜ 0.4 per cent). It is constituted essentially by neoformed stoichiometric magnetite (Fe3O4). In contrast, within the thermal aureole of the magmatic intrusions, the Cretaceous argillaceous rocks contain micron-sized pyrrhotite (Fe7S8), firmly identified through the recognition of Besnus transition at 35 K. The thermal demagnetization of natural remanence carried by this pyrrhotite shows a diagnostic `square shouldered' pattern, indicating a narrow grain size distribution of pyrrhotite. The extension of this diagnostic pyrrhotite maps a ˜10-km-thick aureole around the syenitic pluton. Away from this aureole, the magnetic assemblage is diagnostic of those found in argillaceous rocks where organic matter is mature.

  8. Portable pathogen detection system

    DOEpatents

    Colston, Billy W.; Everett, Matthew; Milanovich, Fred P.; Brown, Steve B.; Vendateswaran, Kodumudi; Simon, Jonathan N.

    2005-06-14

    A portable pathogen detection system that accomplishes on-site multiplex detection of targets in biological samples. The system includes: microbead specific reagents, incubation/mixing chambers, a disposable microbead capture substrate, and an optical measurement and decoding arrangement. The basis of this system is a highly flexible Liquid Array that utilizes optically encoded microbeads as the templates for biological assays. Target biological samples are optically labeled and captured on the microbeads, which are in turn captured on an ordered array or disordered array disposable capture substrate and then optically read.

  9. Solar system fault detection

    DOEpatents

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  10. Solar system fault detection

    DOEpatents

    Farrington, Robert B.; Pruett, Jr., James C.

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  11. Idaho Explosives Detection System

    SciTech Connect

    Edward L. Reber; Larry G. Blackwood; Andrew J. Edwards; J. Keith Jewell; Kenneth W. Rohde; Edward H. Seabury; Jeffery B. Klinger

    2005-12-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  12. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  13. The Eagle and East Eagle sulfide ore-bearing mafic-ultramafic intrusions in the Midcontinent Rift System, upper Michigan: Geochronology and petrologic evolution

    NASA Astrophysics Data System (ADS)

    Ding, Xin; Li, Chusi; Ripley, Edward M.; Rossell, Dean; Kamo, Sandra

    2010-03-01

    The Eagle and East Eagle intrusions are small, subvertical dike-like mafic-ultramafic bodies that cut Proterozoic sedimentary strata in the Baraga Basin in northern Michigan. The Eagle intrusion hosts a newly discovered magmatic Ni-Cu-PGE deposit. The nearby East Eagle intrusion also contains sulfide mineralization, but the extent of this mineralization has yet to be determined by further drilling. Both intrusions contain olivine-bearing rocks such as feldspathic peridotite, melatroctolite, and olivine melagabbro. Sulfide accumulations range from disseminated at both Eagle and East Eagle to semimassive and massive at Eagle. U-Pb baddeleyite dating gives a crystallization age of 1107.2 ± 5.7 Ma for the Eagle intrusion, coeval with eruption of picritic basalts at the base of the volcanic succession in the Midcontinent Rift System (MRS). The Fo contents of olivine cores in the Eagle and East Eagle intrusions vary between 75 and 85 mol %, higher than those of olivine in larger layered intrusions in the MRS such as the Duluth Complex. The FeO/MgO ratios and Al2O3 contents of the parental magmas for the Eagle and East Eagle intrusions inferred from olivine and spinel compositions are similar to those of picritic basalts in the base of the MRS volcanic succession. These petrochemical data suggest that the Eagle and East Eagle intrusions are the intrusive equivalents of high-MgO basalts that erupted in the early stages of continental magmatism associated with the development of the rift. Variations in mineral compositions and incompatible trace element ratios suggest that at least three major pulses of magmas were involved in the formation of low-sulfide rocks in the Eagle intrusion. Lower Fo contents of olivine associated with semimassive sulfides as compared to that of olivine in low-sulfide rocks suggest that the magma associated with the semimassive sulfide was more fractionated than the parental magmas of the low-sulfide rocks in the Eagle intrusion. Accumulation of

  14. Minimally Intrusive and Nonintrusive Supersonic Injectors for LANTR and RBCC/Scramjet Propulsion Systems

    NASA Astrophysics Data System (ADS)

    Buggele, Alvin E.; Gallagher, John R.

    2002-10-01

    A family of supersonic injectors for use on spaceplanes, rockets and missiles and the like is disclosed and claimed. Each injector maintains a specific constant (uniform) Mach number along its length when used while being minimally intrusive at significantly higher injectant pressure than combuster freestream total pressure. Each injector is substantially non-intrusive when it is not being used. The injectors may be used individually or in a group. Different orientations of the injectors in a group promotes greater penetration and mixing of fuel or oxidizer into a supersonic combustor. The injectors can be made from single piece of Aluminum, investment cast metal, or ceramic or they can be made from starboard and port blocks strapped together to accurately control the throat area. Each injector includes an elongated body having an opening which in cross section is an hour glass (venturi shaped) and the opening diverges in width and depth from the bow section to the stem section of the opening.

  15. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J.

    1975-01-01

    A monitoring system developed to test the capability of a water recovery system to reject the passage of viruses into the recovered water is described. A nonpathogenic marker virus, bacteriophage F2, is fed into the process stream before the recovery unit and the reclaimed water is assayed for its presence. Detection of the marker virus consists of two major components, concentration and isolation of the marker virus, and detection of the marker virus. The concentration system involves adsorption of virus to cellulose acetate filters in the presence of trivalent cations and low pH with subsequent desorption of the virus using volumes of high pH buffer. The detection of the virus is performed by a passive immune agglutination test utilizing specially prepared polystyrene particles. An engineering preliminary design was performed as a parallel effort to the laboratory development of the marker virus test system. Engineering schematics and drawings of a fully functional laboratory prototype capable of zero-G operation are presented. The instrument consists of reagent pump/metering system, reagent storage containers, a filter concentrator, an incubation/detector system, and an electronic readout and control system.

  16. The behavior of double-diffusive intrusion in a rotating system

    SciTech Connect

    Yoshida, J. ); Nagashima, H. ); Niino, H. )

    1989-04-15

    The effects of Earth's rotation on the stability of a thermohaline front of finite width are studied by means of a linear theory. It is found that when the rotation is present, two different types of unstable modes are possible. When the front is narrow and a Rossby radius of deformation based on Ruddick and Turner's (1979) vertical scale is large in comparison with the width of the front, the fastest growing intrusion is nearly two dimensional (nonrotational mode), and its vertical scale is given by Ruddick and Turner's scale. When the Rossby radius becomes small, in addition to the nonrotational mode there appears another unstable mode (the rotational mode) which has a smaller vertical wave number than the nonrotational mode. With the introduction of rotation, the fastest growing mode has nonzero along-frontal wave number; that is, the intrusion becomes tilted in the along-frontal direction. When the Rossby radius of deformation is sufficiently small in comparison with the width of the front, transition from the nonrotational mode to the rotational one occurs. The transition from nonrotational to rotational mode becomes less pronounced when the width of the front is increased for fixed horizontal density-compensating gradients of temperature and salinity. For a wide front the growth rate and vertical wave number for both modes becomes similar, which agrees with the results of previous studies for infinite fronts that rotation does not modify the behavior of the intrusion except for the occurrence of along-frontal tilt.

  17. Development and evaluation of a decision-supporting model for identifying the source location of microbial intrusions in real gravity sewer systems.

    PubMed

    Kim, Minyoung; Choi, Christopher Y; Gerba, Charles P

    2013-09-01

    Assuming a scenario of a hypothetical pathogenic outbreak, we aimed this study at developing a decision-support model for identifying the location of the pathogenic intrusion as a means of facilitating rapid detection and efficient containment. The developed model was applied to a real sewer system (the Campbell wash basin in Tucson, AZ) in order to validate its feasibility. The basin under investigation was divided into 14 sub-basins. The geometric information associated with the sewer network was digitized using GIS (Geological Information System) and imported into an urban sewer network simulation model to generate microbial breakthrough curves at the outlet. A pre-defined amount of Escherichia coli (E. coli), which is an indicator of fecal coliform bacteria, was hypothetically introduced into 56 manholes (four in each sub-basin, chosen at random), and a total of 56 breakthrough curves of E. coli were generated using the simulation model at the outlet. Transport patterns were classified depending upon the location of the injection site (manhole), various known characteristics (peak concentration and time, pipe length, travel time, etc.) extracted from each E. coli breakthrough curve and the layout of sewer network. Using this information, we back-predicted the injection location once an E. coli intrusion was detected at a monitoring site using Artificial Neural Networks (ANNs). The results showed that ANNs identified the location of the injection sites with 57% accuracy; ANNs correctly recognized eight out of fourteen expressions with relying on data from a single detection sensor. Increasing the available sensors within the basin significantly improved the accuracy of the simulation results (from 57% to 100%). PMID:23770478

  18. A Proposed Non-Intrusion Method for Estimating the Specific Yield for a Regional Groundwater System

    NASA Astrophysics Data System (ADS)

    Chen, Y.; Cheng, C.; Chang, L.; Hwang, C.; Tsai, J.; Yeh, W.

    2013-12-01

    In Taiwan, groundwater resources play an important role in the management of regional water supply. However, because the lack of proper management over the last several decades, over-pumping of groundwater occurred, which resulted in serious land subsidence in the coastal areas. To properly manage the coastal aquifers, an accurately estimation of the specific yield (Sy) for the aquifer is needed. The traditional pumping test is costly. In this paper, we present a cost-saving, non-intrusive, geophysical method for estimating Sy. The method is based on gravity measurements and uses theories derived from geophysics. Because gravity variation is a function of the mass variation of materials, the gravity measurements correlate with the mass variation of the shallow groundwater in the neighborhood of the measurements. Comparing the groundwater level variations and gravity measurements between the droughts and flooding seasons, Sy can be interpreted. The proposed method combines MODFLOW with a numerical integration procedure that calculates the gravity variations. Heterogeneous parameters (Sy) can be assigned to MODFLOW cells. An inverse procedure is then applied to interpret and identify the Sy value around the gravity station. The proposed methodology is applied to the Choshui alluvial fan, one of the most important groundwater basins in Taiwan. Three gravity measurement stations, 'GS01', 'GS02' and 'GS03', were established. The location of GS01 is in the neighborhood of a groundwater observation well where pumping test data are available. The Sy value estimated from the gravitation measurements collected from GS01 compares favorably with that obtained from the traditional pumping test. The comparison verifies the correctness and accuracy of the proposed method. We then use the gravity measurements collected from GS02 and GS03 to estimate the Sy values in the areas where there exist no pumping test data. Using the estimated values obtained from gravity measurements, the

  19. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  20. Radiation detection system

    DOEpatents

    Nelson, Melvin A.; Davies, Terence J.; Morton, III, John R.

    1976-01-01

    A radiation detection system which utilizes the generation of Cerenkov light in and the transmission of that light longitudinally through fiber optic wave guides in order to transmit intelligence relating to the radiation to a remote location. The wave guides are aligned with respect to charged particle radiation so that the Cerenkov light, which is generated at an angle to the radiation, is accepted by the fiber for transmission therethrough. The Cerenkov radiation is detected, recorded, and analyzed at the other end of the fiber.

  1. Rapid dike intrusion into Sakurajima volcano on August 15, 2015, as detected by multi-parameter ground deformation observations

    NASA Astrophysics Data System (ADS)

    Hotta, Kohei; Iguchi, Masato; Tameguri, Takeshi

    2016-04-01

    We present observations of ground deformation at Sakurajima in August 2015 and model the deformation using a combination of GNSS, tilt and strain data in order to interpret a rapid deformation event on August 15, 2015. The pattern of horizontal displacement during the period from August 14 to 16, 2015, shows a WNW-ESE extension, which suggests the opening of a dike. Using a genetic algorithm, we obtained the position, dip, strike length, width and opening of a dislocation source based on the combined data. A nearly vertical dike with a NNE-SSW strike was found at a depth of 1.0 km below sea level beneath the Showa crater. The length and width are 2.3 and 0.6 km, respectively, and a dike opening of 1.97 m yields a volume increase of 2.7 × 106 m3. 887 volcano-tectonic (VT) earthquakes beside the dike suggest that the rapid opening of the dike caused an accumulation of strain in the surrounding rocks, and the VT earthquakes were generated to release this strain. Half of the total amount of deformation was concentrated between 10:27 and 11:54 on August 15. It is estimated that the magma intrusion rate was 1 × 106 m3/h during this period. This is 200 times larger than the magma intrusion rate prior to one of the biggest eruptions at the summit crater of Minami-dake on July 24, 2012, and 2200 times larger than the average magma intrusion rate during the period from October 2011 to March 2012. The previous Mogi-type ground deformation is considered to be a process of magma accumulation in preexisting spherical reservoirs. Conversely, the August 2015 event was a dike intrusion and occurred in a different location to the preexisting reservoirs. The direction of the opening of the dike coincides with the T-axes and direction of faults creating a graben structure.

  2. Calculation notes that support accident scenario and consequence development for the steam intrusion from interfacing systems accident

    SciTech Connect

    Van Vleet, R.J.; Ryan, G.W.; Crowe, R.D.; Lindberg, S.E., Fluor Daniel Hanford

    1997-03-04

    This document supports the development and presentation of the following accident scenario in the TWRS Final Safety Analysis Report (FSAR): Steam Intrusion From Interfacing Systems. The calculations needed to quantify the risk associated with this accident scenario are included in the following sections to aid in the understanding of this accident scenario. Information validation forms citing assumptions that were approved for use specifically in this analysis are included in Appendix A. Copies of these forms are also on file with TWRS Project Files. Calculations performed in this document, in general, are expressed in traditional (English) units to aid understanding of the accident scenario and related parameters.

  3. Ultrasonic Leak Detection System

    NASA Technical Reports Server (NTRS)

    Youngquist, Robert C. (Inventor); Moerk, J. Steven (Inventor)

    1998-01-01

    A system for detecting ultrasonic vibrations. such as those generated by a small leak in a pressurized container. vessel. pipe. or the like. comprises an ultrasonic transducer assembly and a processing circuit for converting transducer signals into an audio frequency range signal. The audio frequency range signal can be used to drive a pair of headphones worn by an operator. A diode rectifier based mixing circuit provides a simple, inexpensive way to mix the transducer signal with a square wave signal generated by an oscillator, and thereby generate the audio frequency signal. The sensitivity of the system is greatly increased through proper selection and matching of the system components. and the use of noise rejection filters and elements. In addition, a parabolic collecting horn is preferably employed which is mounted on the transducer assembly housing. The collecting horn increases sensitivity of the system by amplifying the received signals. and provides directionality which facilitates easier location of an ultrasonic vibration source.

  4. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J. (Inventor)

    1978-01-01

    The performance of a waste water reclamation system is monitored by introducing a non-pathogenic marker virus, bacteriophage F2, into the waste-water prior to treatment and, thereafter, testing the reclaimed water for the presence of the marker virus. A test sample is first concentrated by absorbing any marker virus onto a cellulose acetate filter in the presence of a trivalent cation at low pH and then flushing the filter with a limited quantity of a glycine buffer solution to desorb any marker virus present on the filter. Photo-optical detection of indirect passive immune agglutination by polystyrene beads indicates the performance of the water reclamation system in removing the marker virus. A closed system provides for concentrating any marker virus, initiating and monitoring the passive immune agglutination reaction, and then flushing the system to prepare for another sample.

  5. SHRIMP U-Pb zircon geochronology and thermal modeling of multilayer granitoid intrusions. Implications for the building and thermal evolution of the Central System batholith, Iberian Massif, Spain

    NASA Astrophysics Data System (ADS)

    Díaz Alvarado, Juan; Fernández, Carlos; Castro, Antonio; Moreno-Ventas, Ignacio

    2013-08-01

    This work shows the results of a U-Pb SHRIMP zircon geochronological study of the central part of the Gredos massif (Spanish Central System batholith). The studied batholith is composed of several granodiorite and monzogranite tabular bodies, around 1 km thick each, intruded into partially molten pelitic metasediments. Granodiorites and monzogranites, belonging to three distinct intrusive bodies, and samples of anatectic leucogranites have been selected for SHRIMP U-Pb zircon geochronology. Distinct age groups, separated by up to 20 Ma, have been distinguished in each sample. Important age differences have also been determined among the most representative age groups of the three analyzed granitoid bodies: 312.6 ± 2.8 Ma for the Circo de Gredos Bt-granodiorites (floor intrusive layer), 306.9 ± 1.5 Ma for the Barbellido-Plataforma granitoids (top intrusive layer) and 303.5 ± 2.8 Ma for Las Pozas Crd-monzogranites (middle intrusive layer). These age differences are interpreted in terms of sequential emplacement of the three intrusive bodies, contemporary with the Late Paleozoic D3 deformation phase. The anatectic leucogranites are coeval to slightly younger than the adjacent intrusive granodiorites and monzogranites (305.4 ± 1.6 Ma for Refugio del Rey leucogranites and 303 ± 2 Ma for migmatitic hornfelses). It is suggested that these anatectic magmas were generated in response to the thermal effects of granodiorite intrusions. Thermal modeling with COMSOL Multiphysics® reveals that sequential emplacement was able to keep the thermal conditions of the batholith around the temperature of zircon crystallization in granitic melts (around 750 °C) for several million of years, favoring the partial melting of host rocks and the existence of large magma chambers composed of crystal mush prone to be rejuvenated after new intrusions.

  6. Gas Flow Detection System

    NASA Technical Reports Server (NTRS)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  7. Universal explosive detection system for homeland security applications

    NASA Astrophysics Data System (ADS)

    Lee, Vincent Y.; Bromberg, Edward E. A.

    2010-04-01

    L-3 Communications CyTerra Corporation has developed a high throughput universal explosive detection system (PassPort) to automatically screen the passengers in airports without requiring them to remove their shoes. The technical approach is based on the patented energetic material detection (EMD) technology. By analyzing the results of sample heating with an infrared camera, one can distinguish the deflagration or decomposition of an energetic material from other clutters such as flammables and general background substances. This becomes the basis of a universal explosive detection system that does not require a library and is capable of detecting trace levels of explosives with a low false alarm rate. The PassPort is a simple turnstile type device and integrates a non-intrusive aerodynamic sampling scheme that has been shown capable of detecting trace levels of explosives on shoes. A detailed description of the detection theory and the automated sampling techniques, as well as the field test results, will be presented.

  8. Arc fault detection system

    DOEpatents

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  9. Arc fault detection system

    DOEpatents

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  10. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  11. A Weld Defects Detection System Based on a Spectrometer

    PubMed Central

    Bebiano, Daniel; Alfaro, Sadek C. A.

    2009-01-01

    Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects. PMID:22574049

  12. An automated computer misuse detection system for UNICOS

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  13. Real-Time, Non-Intrusive Detection of Liquid Nitrogen in Liquid Oxygen at High Pressure and High Flow

    NASA Technical Reports Server (NTRS)

    Singh, Jagdish P.; Yueh, Fang-Yu; Kalluru, Rajamohan R.; Harrison, Louie

    2012-01-01

    An integrated fiber-optic Raman sensor has been designed for real-time, nonintrusive detection of liquid nitrogen in liquid oxygen (LOX) at high pressures and high flow rates in order to monitor the quality of LOX used during rocket engine ground testing. The integrated sensor employs a high-power (3-W) Melles Griot diode-pumped, solid-state (DPSS), frequency-doubled Nd:YAG 532- nm laser; a modified Raman probe that has built-in Raman signal filter optics; two high-resolution spectrometers; and photomultiplier tubes (PMTs) with selected bandpass filters to collect both N2 and O2 Raman signals. The PMT detection units are interfaced with National Instruments Lab- VIEW for fast data acquisition. Studies of sensor performance with different detection systems (i.e., spectrometer and PMT) were carried out. The concentration ratio of N2 and O2 can be inferred by comparing the intensities of the N2 and O2 Raman signals. The final system was fabricated to measure N2 and O2 gas mixtures as well as mixtures of liquid N2 and LOX

  14. Unified Mars detection system. [life detection

    NASA Technical Reports Server (NTRS)

    Martin, J. P.; Kok, B.; Radmer, R.; Johnson, R. D.

    1976-01-01

    A life-detection system is described which is designed to detect and characterize possible Martian biota and to gather information about the chemical environment of Mars, especially the water and amino acid contents of the soil. The system is organized around a central mass spectrometer that can sensitively analyze trace gases from a variety of different experiments. Some biological assays and soil-chemistry tests that have been performed in the laboratory as typical experiment candidates for the system are discussed, including tests for soil-organism metabolism, measurements of soil carbon contents, and determinations of primary aliphatic amines (amino acids and protein) in soils. Two possible test strategies are outlined, and the operational concept of the detection system is illustrated. Detailed descriptions are given for the mass spectrometer, gas inlet, incubation box, test cell modules, seal drive mechanism, soil distribution assembly, and electronic control system.

  15. Neonatal Jaundice Detection System.

    PubMed

    Aydın, Mustafa; Hardalaç, Fırat; Ural, Berkan; Karap, Serhat

    2016-07-01

    Neonatal jaundice is a common condition that occurs in newborn infants in the first week of life. Today, techniques used for detection are required blood samples and other clinical testing with special equipment. The aim of this study is creating a non-invasive system to control and to detect the jaundice periodically and helping doctors for early diagnosis. In this work, first, a patient group which is consisted from jaundiced babies and a control group which is consisted from healthy babies are prepared, then between 24 and 48 h after birth, 40 jaundiced and 40 healthy newborns are chosen. Second, advanced image processing techniques are used on the images which are taken with a standard smartphone and the color calibration card. Segmentation, pixel similarity and white balancing methods are used as image processing techniques and RGB values and pixels' important information are obtained exactly. Third, during feature extraction stage, with using colormap transformations and feature calculation, comparisons are done in RGB plane between color change values and the 8-color calibration card which is specially designed. Finally, in the bilirubin level estimation stage, kNN and SVR machine learning regressions are used on the dataset which are obtained from feature extraction. At the end of the process, when the control group is based on for comparisons, jaundice is succesfully detected for 40 jaundiced infants and the success rate is 85 %. Obtained bilirubin estimation results are consisted with bilirubin results which are obtained from the standard blood test and the compliance rate is 85 %. PMID:27229489

  16. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    SciTech Connect

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  17. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    PubMed

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south. PMID:26085452

  18. Reconciling Volatile Outputs with Heat Flow and Magma Intrusion Rates at the Yellowstone Magma-Hydrothermal System

    NASA Astrophysics Data System (ADS)

    Lowenstern, J. B.; Hurwitz, S.

    2012-12-01

    The Yellowstone hydrothermal system releases hundreds of millions of liters of water on a daily basis. Gigawatts of heat and kilotons of magmatic volatiles (CO2, S, Cl, F and He) are discharged by these waters. By quantifying the relative contributions of crustal, meteoric, and mantle-derived components, we can estimate the rate at which magma is fed to the crust from below (1). Combining isotopic studies with mass discharge rates of geothermal gases and aqueous dissolved solids, we recognize that over 20,000 tons of CO2 is released from basaltic magmas ponding beneath any silicic magma reservoir in the mid to shallow crust (1,2). In contrast, silicic magma provides significantly less volatiles than what emerges from the hydrothermal system. Estimates of heat flow range from ~3 to 8 GW (1,3,4), derived from satellite, surface geophysics and geochemical methods. Such values, combined with estimates from gas flux, imply prolific basalt intrusion rates between 0.05 and 0.3 cubic kilometers per year (1). Over the history of the Yellowstone Plateau Volcanic Field, a picture emerges where the lower crust is converted from Precambrian metasediments and silicic intrusions into a thick gabbroic batholith similar to that envisioned by some to reside beneath the Snake River Plain along the ancestral track of the Yellowstone Hot Spot (5). (1) Lowenstern and Hurwitz, 2008, Elements 4: 35-40. (2) Werner and Brantley, 2003, G-Cubed 4;7: 1061 (3) Vaughan and others, 2012, JVGR 233-234: 72-89. (4) Hurwitz and others, in press, JGR (5) Shervais and others, 2006, Geology 34:365-368.

  19. A mathematical model for 2D heat transfer dynamics in fluid systems with localized sink of magmatic fluid into local fractured zones above the top of crystallizing intrusions

    NASA Astrophysics Data System (ADS)

    Sharapov, V. N.; Cherepanov, A. N.; Popov, V. N.; Bykova, V. G.

    2012-11-01

    A model describing two-dimensional (2D) dynamics of heat transfer in the fluid systems with a localized sink of a magmatic fluid into local fractured zones above the roof of crystallizing crustal intrusions is suggested. Numerical modeling of the migration of the phase boundaries in 2D intrusive chambers under retrograde boiling of magma with relatively high initial water content in the melt shows that, depending on the character of heat dissipation from a magmatic fluid into the host rock, two types of fluid magmatic systems can arise. (1) At high heat losses, the zoning of fluidogenic ore formation is determined by the changes in temperature of the rocks within the contact aureole of the intrusive bodies. These temperature variations are controlled by the migration of the phase boundaries in the cooling melt towards the center of the magmatic bodies from their contacts. (2) In the case of a localized sink of the magmatic fluid in different parts of the top of the intrusive chambers, a specific characteristic scenario of cooling of the magmatic bodies is probably implemented. In 2D systems with a heat transfer coefficient α k < 5 × 104 W/m2 K, an area with quasi-stationary phase boundaries develops close to the region of fluid drainage through the fractured zone in the intrusion. Therefore, as the phase boundaries contract to the sink zone of a fluid, specific thermal tubes arise, whose characteristics depend on the width of the fluid-conductive zone and the heat losses into the side rocks. (3) The time required for the intrusion to solidify varies depending on the particular position of the fluid conductor above the top of the magmatic body.

  20. Intelligent Leak Detection System

    Energy Science and Technology Software Center (ESTSC)

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or nearmore » surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift

  1. Intelligent Leak Detection System

    SciTech Connect

    Mohaghegh, Shahab D.

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or near surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise

  2. Incipient fire detection system

    DOEpatents

    Brooks, Jr., William K.

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  3. A Web-Based Non-Intrusive Ambient System to Measure and Classify Activities of Daily Living

    PubMed Central

    Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P

    2014-01-01

    Background The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer’s disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors’ and caregivers’ awareness of the patient’s cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient’s ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient’s home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (eg, via smartphone). Objective We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient’s attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. Methods The components of this novel assistive technology system were wireless sensors distributed in every room of the participant’s home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified

  4. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena. PMID:20391178

  5. Coupling of hydrogeological models with hydrogeophysical data to characterize seawater intrusion and shallow geothermal systems

    NASA Astrophysics Data System (ADS)

    Beaujean, J.; Kemna, A.; Engesgaard, P. K.; Hermans, T.; Vandenbohede, A.; Nguyen, F.

    2013-12-01

    While coastal aquifers are being stressed due to climate changes and excessive groundwater withdrawals require characterizing efficiently seawater intrusion (SWI) dynamics, production of geothermal energy is increasingly being used to hinder global warming. To study these issues, we need both robust measuring technologies and reliable predictions based on numerical models. SWI models are currently calibrated using borehole observations. Similarly, geothermal models depend mainly on the temperature field at few locations. Electrical resistivity tomography (ERT) can be used to improve these models given its high sensitivity to TDS and temperature and its relatively high lateral resolution. Inherent geophysical limitations, such as the resolution loss, can affect the overall quality of the ERT images and also prevent the correct recovery of the desired hydrochemical property. We present an uncoupled and coupled hydrogeophysical inversion to calibrate SWI and thermohydrogeologic models using ERT. In the SWI models, we demonstrate with two synthetic benchmarks (homogeneous and heterogeneous coastal aquifers) the ability of cumulative sensitivity-filtered ERT images using surface-only data to recover the hydraulic conductivity. Filtering of ERT-derived data at depth, where resolution is poorer, and the model errors make the dispersivity more difficult to estimate. In the coupled approach, we showed that parameter estimation is significantly improved because regularization bias is replaced by forward modeling only. Our efforts are currently focusing on applying the uncoupled/coupled approaches on a real life case study using field data from the site of Almeria, SE Spain. In the thermohydrogeologic models, the most sensitive hydrologic parameters responsible for heat transport are estimated from surface ERT-derived temperatures and ERT resistance data. A real life geothermal experiment that took place on the Campus De Sterre of Ghent University, Belgium and a synthetic

  6. Hand held explosives detection system

    DOEpatents

    Conrad, Frank J.

    1992-01-01

    The present invention is directed to a sensitive hand-held explosives detection device capable of detecting the presence of extremely low quantities of high explosives molecules, and which is applicable to sampling vapors from personnel, baggage, cargo, etc., as part of an explosives detection system.

  7. Antigen detection systems

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissue using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular methodology is chosen ...

  8. Antigen detection systems

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  9. From intrusive to oscillating thoughts.

    PubMed

    Peirce, Anne Griswold

    2007-10-01

    This paper focused on the possibility that intrusive thoughts (ITs) are a form of an evolutionary, adaptive, and complex strategy to prepare for and resolve stressful life events through schema formation. Intrusive thoughts have been studied in relation to individual conditions, such as traumatic stress disorder and obsessive-compulsive disorder. They have also been documented in the average person experiencing everyday stress. In many descriptions of thought intrusion, it is accompanied by thought suppression. Several theories have been put forth to describe ITs, although none provides a satisfactory explanation as to whether ITs are a normal process, a normal process gone astray, or a sign of pathology. There is also no consistent view of the role that thought suppression plays in the process. I propose that thought intrusion and thought suppression may be better understood by examining them together as a complex and adaptive mechanism capable of escalating in times of need. The ability of a biological mechanism to scale up in times of need is one hallmark of a complex and adaptive system. Other hallmarks of complexity, including self-similarity across scales, sensitivity to initial conditions, presence of feedback loops, and system oscillation, are also discussed in this article. Finally, I propose that thought intrusion and thought suppression are better described together as an oscillatory cycle. PMID:17904485

  10. Modelling of paleo-saltwater intrusion in the northern part of the Nubian Aquifer System, Northeast Africa

    NASA Astrophysics Data System (ADS)

    Gossel, Wolfgang; Sefelnasr, Ahmed; Wycisk, Peter

    2010-09-01

    A numerical groundwater model of the Nubian Aquifer System was established to prove the influence of rising seawater levels on the groundwater salinity in northern Egypt over the last 140,000 years. In addition, the impact of a groundwater recharge scenario for these 140,000 years, involving climatic change, on the saltwater/freshwater interface was investigated. Saltwater intrusion induced by rising water levels of the Mediterranean Sea led to salinisation from the Mediterranean Sea to the Qattara depression. This modeling approach was supported by a density-driven model setup and calculation. The modelled saltwater/freshwater interfaces partially fitted the observed ones, especially in the southern half of the Qattara depression. In other parts of the northern Nubian Aquifer System, the ingression of salt water was modelled adequately, but in the west, small regions of the measured interface were not. The development in the Qattara depression (Egypt) and Sirte basin (Libya) were investigated in more detail. The different behaviour in the Sirte basin may be due to high evapotranspiration rates in some former periods, salt solutions from the pre-Quaternary layers or saltwater infiltration from sabkha-like recent salt-bearing sediments.

  11. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  12. Potential effects of deepening the St. Johns River navigation channel on saltwater intrusion in the surficial aquifer system, Jacksonville, Florida

    USGS Publications Warehouse

    Bellino, Jason C.; Spechler, Rick M.

    2013-01-01

    The U.S. Army Corps of Engineers (USACE) has proposed dredging a 13-mile reach of the St. Johns River navigation channel in Jacksonville, Florida, deepening it to depths between 50 and 54 feet below North American Vertical Datum of 1988. The dredging operation will remove about 10 feet of sediments from the surficial aquifer system, including limestone in some locations. The limestone unit, which is in the lowermost part of the surficial aquifer system, supplies water to domestic wells in the Jacksonville area. Because of density-driven hydrodynamics of the St. Johns River, saline water from the Atlantic Ocean travels upstream as a saltwater “wedge” along the bottom of the channel, where the limestone is most likely to be exposed by the proposed dredging. A study was conducted to determine the potential effects of navigation channel deepening in the St. Johns River on salinity in the adjacent surficial aquifer system. Simulations were performed with each of four cross-sectional, variable-density groundwater-flow models, developed using SEAWAT, to simulate hypothetical changes in salinity in the surficial aquifer system as a result of dredging. The cross-sectional models were designed to incorporate a range of hydrogeologic conceptualizations to estimate the effect of uncertainty in hydrogeologic properties. The cross-sectional models developed in this study do not necessarily simulate actual projected conditions; instead, the models were used to examine the potential effects of deepening the navigation channel on saltwater intrusion in the surficial aquifer system under a range of plausible hypothetical conditions. Simulated results for modeled conditions indicate that dredging will have little to no effect on salinity variations in areas upstream of currently proposed dredging activities. Results also indicate little to no effect in any part of the surficial aquifer system along the cross section near River Mile 11 or in the water-table unit along the cross

  13. Hydrodynamic behavior of the Cape Fear River and estuarine system: A synthesis and observational investigation of discharge-salinity intrusion relationships

    NASA Astrophysics Data System (ADS)

    Becker, May Ling; Luettich, Richard A., Jr.; Mallin, Michael A.

    2010-07-01

    Transport of constituents in partially mixed estuaries depends on the relative strengths of dominant forcing mechanisms which may include tides, river input, and wind. In this study, we investigated the major physical mechanisms that influence the salinity structure in the Cape Fear River Estuary (CFRE), a partially mixed estuary that is representative of river-dominated estuaries along the southeast Atlantic coast of the U.S. Based on analysis of observed hydrographic and hydrodynamic data, we first describe differences in velocity, salinity, and stratification at along-channel sections of the estuary for relatively low-flow conditions. We then investigate the influence of river inflow on the salinity intrusion (defined by the 1-salinity contour near the bottom), based on six methods of choosing discharge in order to identify an appropriate means of incorporating flow history into the discharge value. Our analyses indicate: 1) 92 percent of the variability in the length of the salinity intrusion over a five-year period can be explained based on the Hydrologic Flood Method identified in this work, 2) the salinity intrusion depends more weakly on discharge than predicted by classic analytical relationships for exchange-dominated systems in which the intrusion varies with discharge to the power of (-1/3), and 3) intra-tidal and tidal-range differences based on a 29-day modulation significantly influence the salinity structure. Our results suggest that the salinity intrusion location is dependent upon the hydrologic "flood," defined by a peak in the river-discharge hydrograph. The analysis indicates that the new method used to determine discharge in the CFRE can more accurately explain river inflow-salinity relationships than previously investigated methods. In river-estuary systems in which hydrologic flood peaks are large relative to base flow, we hypothesize the hydrologic flood model offers a useful tool for predicting the estuarine salinity response to river

  14. Protein detection system

    DOEpatents

    Fruetel, Julie A.; Fiechtner, Gregory J.; Kliner, Dahv A. V.; McIlroy, Andrew

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  15. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    USGS Publications Warehouse

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  16. Particle detection systems and methods

    DOEpatents

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  17. Petrogenetic connections between volcanic rocks and intrusive suites in the California arc - toward an integrated model for upper-crustal magma system evolution

    NASA Astrophysics Data System (ADS)

    Barth, A. P.; Riggs, N.; Walker, J. D.; Andrew, J.; Jacobson, C. E.; Miller, D. M.; Robert, J.

    2014-12-01

    Volcanic and clastic sedimentary rocks in deeply eroded, predominantly plutonic arcs provide records of arc development and the links between volcanic and plutonic processes. We are analyzing existing and new geochronologic and petrologic data from volcanic breccias, ignimbrites and intrusive suites in the Sierra Nevada and Mojave Desert sectors of the Mesozoic California arc, in an effort to construct an integrated volcano-plutonic model for silicic magmatism in arc upper crust. SIMS and TIMS U-Pb zircon ages, immobile element abundances in whole rocks, and trace element abundances in zircons allow us to interpret the magmatic heritage of ignimbrites and components of underlying granodioritic to granitic intrusive suites. Preliminary results suggest several conclusions: (1) first-order magma production was episodic, with plutonic, forearc and retro-arc detrital zircons defining three magmatic pulses of ~40-60 m.y. duration that are largely mimicked by the more limited record of zircons in ignimbrites; (2) in the Triassic and Jurassic, second-order pulses on 2-10 m.y. time scales are recorded in both the intrusive and ignimbrite records, suggesting that eruption of ignimbrites was synchronous at the shortest resolvable time scales with assembly of underlying incrementally emplaced intrusive suites; (3) ignimbrites range from dacite to rhyolite in bulk composition, and are petrographically similar to modern "monotonous intermediate" dacite or phenocryst-poor low-silica rhyolite; (4) these tuffs are as fractionated as intrusive rocks, and commonly, though not always, contain zircons with similarly complex, multi-stage growth histories. Thus ignimbrites and felsic granodiorites in this arc are complementary elements recording lengthy and episodic evolutionary histories in cool and hydrous upper-crustal arc magma systems.

  18. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1-dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 parts per billion by volume (ppbv), as cited in Method TO-15, to ...

  19. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1- dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 ppbv, as cited in Method TO-15, to much lower concentrations. R...

  20. Non-Intrusive Device for Real-Time Circulatory System Assessment with Advanced Signal Processing Capabilities

    NASA Astrophysics Data System (ADS)

    Pinheiro, E.; Postolache, O.; Girão, P.

    2010-01-01

    This paper presents a device that uses three cardiography signals to characterize several important parameters of a subject's circulatory system. Using electrocardiogram, finger photoplethysmogram, and ballistocardiogram, three heart rate estimates are acquired from beat-to-beat time interval extraction. Furthermore, pre-ejection period, pulse transit time (PTT), and pulse arrival time (PAT) are computed, and their long-term evolution is analyzed. The system estimates heart rate variability (HRV) and blood pressure variability (BPV) from the heart rate and PAT time series, to infer the activity of the cardiac autonomic system. The software component of the device evaluates the frequency content of HRV and BPV, and also their fractal dimension and entropy, thus providing a detailed analysis of the time series' regularity and complexity evolution, to allow personalized subject evaluation.

  1. Thermal neutron detection system

    DOEpatents

    Peurrung, Anthony J.; Stromswold, David C.

    2000-01-01

    According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

  2. Power line detection system

    DOEpatents

    Latorre, Victor R.; Watwood, Donald B.

    1994-01-01

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

  3. Power line detection system

    DOEpatents

    Latorre, V.R.; Watwood, D.B.

    1994-09-27

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

  4. Centrifugal unbalance detection system

    DOEpatents

    Cordaro, Joseph V.; Reeves, George; Mets, Michael

    2002-01-01

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  5. Radiation detection system

    DOEpatents

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  6. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    PubMed

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. PMID:12765281

  7. APDS: Autonomous Pathogen Detection System

    SciTech Connect

    Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

    2002-02-14

    An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

  8. Diversified transmission multichannel detection system

    SciTech Connect

    Tournois, P.; Engelhard, P.

    1984-07-03

    A detection system for imaging by sonar or radar signals. The system associates diversified transmissions with an interferometric base. This base provides an angular channel formation means and each signal formed in this way is processed by matched filtering in a circuit containing copy signals characterizing the space coloring obtained by the diversified transmission means. The invention is particularly applicable to side or front looking detection sonars.

  9. Integrated multisensor perimeter detection systems

    NASA Astrophysics Data System (ADS)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  10. Comparison and Characterization of Android-Based Fall Detection Systems

    PubMed Central

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  11. Comparison and characterization of Android-based fall detection systems.

    PubMed

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  12. NADIR: A prototype system for detecting network and file system abuse

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

    1992-10-01

    This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory`s Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

  13. NADIR: A prototype system for detecting network and file system abuse

    SciTech Connect

    Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

    1992-01-01

    This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory's Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

  14. Hearing aid malfunction detection system

    NASA Technical Reports Server (NTRS)

    Kessinger, R. L. (Inventor)

    1977-01-01

    A malfunction detection system for detecting malfunctions in electrical signal processing circuits is disclosed. Malfunctions of a hearing aid in the form of frequency distortion and/or inadequate amplification by the hearing aid amplifier, as well as weakening of the hearing aid power supply are detectable. A test signal is generated and a timed switching circuit periodically applies the test signal to the input of the hearing aid amplifier in place of the input signal from the microphone. The resulting amplifier output is compared with the input test signal used as a reference signal. The hearing aid battery voltage is also periodically compared to a reference voltage. Deviations from the references beyond preset limits cause a warning system to operate.

  15. Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster- Shafer Theory

    SciTech Connect

    Yu, Dong; Frincke, Deborah A.

    2005-03-01

    Extend Dempster-Shafer Theory of Evidence to include differential weightings of alerts drawn from multiple sources. The intent is to support automated (and manual) response to threat by producing more realistic confidence ratings for IDS alerts than is currently available.

  16. Semi autonomous mine detection system

    SciTech Connect

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  17. Portable Microleak-Detection System

    NASA Technical Reports Server (NTRS)

    Rivers, H. Kevin; Sikora, Joseph G.; Sankaran, Sankara N.

    2007-01-01

    The figure schematically depicts a portable microleak-detection system that has been built especially for use in testing hydrogen tanks made of polymer-matrix composite materials. (As used here, microleak signifies a leak that is too small to be detectable by the simple soap-bubble technique.) The system can also be used to test for microleaks in tanks that are made of other materials and that contain gases other than hydrogen. Results of calibration tests have shown that measurement errors are less than 10 percent for leak rates ranging from 0.3 to 200 cm3/min. Like some other microleak-detection systems, this system includes a vacuum pump and associated plumbing for sampling the leaking gas, and a mass spectrometer for analyzing the molecular constituents of the gas. The system includes a flexible vacuum chamber that can be attached to the outer surface of a tank or other object of interest that is to be tested for leakage (hereafter denoted, simply, the test object). The gas used in a test can be the gas or vapor (e.g., hydrogen in the original application) to be contained by the test object. Alternatively, following common practice in leak testing, helium can be used as a test gas. In either case, the mass spectrometer can be used to verify that the gas measured by the system is the test gas rather than a different gas and, hence, that the leak is indeed from the test object.

  18. Tape Cassette Bacteria Detection System

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  19. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  20. Modeling Heat Transfer, Fluid Circulation and Permeability Alteration in Hydrothermal Systems with Loose Coupling to Magmatic Intrusion Modeling in the Lower Crust

    NASA Astrophysics Data System (ADS)

    Taron, J.; Karakas, O.; Mangan, M.; Dufek, J.; Ingebritsen, S.; Hickman, S. H.; Williams, C. F.

    2014-12-01

    The evolution of large scale hydrothermal systems entails spatially and temporally evolving permeability fields. During hydrothermal circulation, thermo-elastic stress and fluid pressure changes act upon partially open or hydrothermally altered fracture sets to modify permeability within the system, thereby shifting the patterns of circulation. To explore these interactions we are developing a thermo-hydromechanical (THM) simulator capable of coupling the dominant physics of the hydrothermal system and allowing flexibility in the use of monolithic or staggered numerical schemes. Permeability is allowed to evolve under several constitutive models tailored to both porous media and fractures, considering the influence of thermo-hydromechanical stress, creep, and elasto-plastic shear and dilation in a ubiquitously fractured medium. To expand our understanding of the long-term evolution of these systems, simulations incorporate information gleaned from the modeling of magmatic processes in the lower crust, where characteristics of the heat source are crucial in defining hydrothermal evolution. Results of a stochastic dike intrusion model are fed into the hydrothermal simulator to explore sensitivity relative to characteristics of the magmatic source. This is a first step to examining feedback mechanisms between heat transfer within geothermal fields and heat supply from the lower crust in a rigorous manner. We compare several simulations that elucidate the relative importance of magma intrusion rate and spatial distribution on overall heat transfer characteristics.

  1. Fiber optic hydrogen detection system

    NASA Astrophysics Data System (ADS)

    Kazemi, Alex A.; Larson, David B.; Wuestling, Mark D.

    1999-12-01

    Commercial and military launch vehicles are designed to use hydrogen as the main propellant, which is very volatile, extremely flammable, and highly explosive. Current detection systems uses Teflon transfer tubes at a large number of vehicle locations through which gas samples are drawn and the stream analyzed by a mass spectrometer. A concern with this approach is the high cost of the system. Also, the current system does not provide leak location and is not in real-time. This system is very complex and cumbersome for production and ground support measurement personnel. The fiber optic micromirror sensor under development for cryogenic environment relies on a reversible chemical interaction causing a change in reflectivity of a thin film of coated Palladium. The magnitude of the reflectivity change is correlated to hydrogen concentration. The sensor uses only a tiny light beam, with no electricity whatsoever at the sensor, leading to devices that is intrinsically safe from explosive ignition. The sensor, extremely small in size and weight detects, hydrogen concentration using a passive element consisting of chemically reactive microcoatings deposited on the surface of a glass microlens, which is then bonded to an optical fiber. The system uses a multiplexing technique with a fiber optic driver-receiver consisting of a modulated LED source that is launched into the sensor, and a photodiode detector that synchronously measures the reflected signal. The system incorporates a microprocessor (or PC) to perform the data analysis and storage, as well as trending and set alarm function. As it is a low cost system with a fast response, many more detection sensors can be used that will be extremely helpful in determining leak location for safety of crew and vehicles during launch operations.

  2. The Autonomous Pathogen Detection System

    SciTech Connect

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  3. Blind Leak Detection for Closed Systems

    NASA Technical Reports Server (NTRS)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  4. Detecting transition in agricultural systems

    NASA Technical Reports Server (NTRS)

    Neary, P. J.; Coiner, J. C.

    1979-01-01

    Remote sensing of agricultural phenomena has been largely concentrated on analysis of agriculture at the field level. Concern has been to identify crop status, crop condition, and crop distribution, all of which are spatially analyzed on a field-by-field basis. A more general level of abstraction is the agricultural system, or the complex of crops and other land cover that differentiate various agricultural economies. The paper reports on a methodology to assist in the analysis of the landscape elements of agricultural systems with Landsat digital data. The methodology involves tracing periods of photosynthetic activity for a fixed area. Change from one agricultural system to another is detected through shifts in the intensity and periodicity of photosynthetic activity as recorded in the radiometric return to Landsat. The Landsat-derived radiometric indicator of photosynthetic activity appears to provide the ability to differentiate agricultural systems from each other as well as from conterminous natural vegetation.

  5. Nucleic acid detection system and method for detecting influenza

    SciTech Connect

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  6. Compensated intruder-detection systems

    DOEpatents

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  7. Capillary Electrophoresis - Optical Detection Systems

    SciTech Connect

    Sepaniak, M. J.

    2001-08-06

    Molecular recognition systems are developed via molecular modeling and synthesis to enhance separation performance in capillary electrophoresis and optical detection methods for capillary electrophoresis. The underpinning theme of our work is the rational design and development of molecular recognition systems in chemical separations and analysis. There have been, however, some subtle and exciting shifts in our research paradigm during this period. Specifically, we have moved from mostly separations research to a good balance between separations and spectroscopic detection for separations. This shift is based on our perception that the pressing research challenges and needs in capillary electrophoresis and electrokinetic chromatography relate to the persistent detection and flow rate reproducibility limitations of these techniques (see page 1 of the accompanying Renewal Application for further discussion). In most of our work molecular recognition reagents are employed to provide selectivity and enhance performance. Also, an emerging trend is the use of these reagents with specially-prepared nano-scale materials. Although not part of our DOE BES-supported work, the modeling and synthesis of new receptors has indirectly supported the development of novel microcantilevers-based MEMS for the sensing of vapor and liquid phase analytes. This fortuitous overlap is briefly covered in this report. Several of the more significant publications that have resulted from our work are appended. To facilitate brevity we refer to these publications liberally in this progress report. Reference is also made to very recent work in the Background and Preliminary Studies Section of the Renewal Application.

  8. GLIMPCE Seismic reflection evidence of deep-crustal and upper-mantle intrusions and magmatic underplating associated with the Midcontinent Rift system of North America

    USGS Publications Warehouse

    Behrendt, John C.; Hutchinson, D.R.; Lee, M.; Thornber, C.R.; Trehu, A.; Cannon, W.; Green, A.

    1990-01-01

    Deep-crustal and Moho reflections, recorded on vertical incidence and wide angle ocean bottom Seismometer (OBS) data in the 1986 GLIMPCE (Great Lakes International Multidisciplinary Program on Crustal Evolution) experiment, provide evidence for magmatic underplating and intrusions within the lower crust and upper mantle contemporaneous with crustal extension in the Midcontinent Rift system at 1100 Ma. The rift fill consists of 20-30 km (7-10 s) of basalt flows, secondary syn-rift volcaniclastic and post-basalt sedimentary rock. Moho reflections recorded in Lake Superior over the Midcontinent Rift system have times from 14-18 s (about 46 km to as great as 58 km) in contrast to times of about 11-13 s (about 36-42 km crustal thickness) beneath the surrounding Great Lakes. The Seismically complex deep-crust to mantle transition zone (30-60 km) in north-central Lake Superior, which is 100 km wider than the rift half-graben, reflects the complicated products of tectonic and magmatic interaction of lower-crustal and mantle components during evolution or shutdown of the aborted Midcontinent Rift. In effect, mantle was changed into crust by lowering Seismic velocity (through intrusion of lower density magmatic rocks) and increasing Moho (about 8.1 km s-1 depth. ?? 1990.

  9. Design of DroDeASys (Drowsy Detection and Alarming System)

    NASA Astrophysics Data System (ADS)

    Juvale, Hrishikesh B.; Mahajan, Anant S.; Bhagwat, Ashwin A.; Badiger, Vishal T.; Bhutkar, Ganesh D.; Dhabe, Priyadarshan S.; Dhore, Manikrao L.

    The paper discusses the Drowsy Detection & Alarming System that has been developed, using a non-intrusive approach. The system is basically developed to detect drivers dozing at the wheel at night time driving. The system uses a small infra-red night vision camera that points directly towards the driver`s face and monitors the driver`s eyes in order to detect fatigue. In such a case when fatigue is detected, a warning signal is issued to alert the driver. This paper discusses the algorithms that have been used to detect drowsiness. The decision whether the driver is dozing or not is taken depending on whether the eyes are open for a specific number of frames. If the eyes are found to be closed for a certain number of consecutive frames then the driver is alerted with an alarm.

  10. Fish detection and classification system

    NASA Astrophysics Data System (ADS)

    Tidd, Richard A.; Wilder, Joseph

    2001-01-01

    Marine biologists traditionally determine the presence and quantities of different types of fish by dragging nets across the bottom, and examining their contents. This method, although accurate, kills the collected fish, damages their habitat, and consumes large quantities of resources. This paper presents an alternative, a machine vision system capable of determining the presence of fish species. Illumination presents a unique problem in this environment, and the design of an effective illumination system is discussed. The related issues of object orientation and measurement are also discussed and resolved. Capturing images of fish in murky water also presents challenges. An adaptive thresholding technique is required to appropriately segment the fish from the background in these images. Mode detection, and histogram analysis are useful tools in determining these localized thresholds. It is anticipated that this system, created in conjunction with the Rutgers Institute for Marine and Coastal Science, will effectively classify fish in the estuarine environment.

  11. Ionization detection system for aerosols

    DOEpatents

    Jacobs, Martin E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber.

  12. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, Roswitha S.; Todd, Richard A.

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  13. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  14. Zircon Recycling in Arc Intrusions

    NASA Astrophysics Data System (ADS)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]<150 ppm) and thus low calculated zircon saturation temperatures (Tzrnsat). Within the Half Dome and Cathedral Peak, TzrnTi values are predominantly at or below average Tzrnsat, and there is no apparent correlation between age and TzrnTi. At temperatures appropriate for granodiorite/tonalite melt generation (at or above biotite dehydration; >825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically <200 ppm and frequently 100-150 ppm for individual large intrusions or intrusive suites). We infer from this that [Zr] in anatectic melts is probably not limited by zircon supply and is primarily controlled by melting parameters. Comparison of the data from TIS with one of these intrusions, the smaller but otherwise

  15. Infrared trace element detection system

    DOEpatents

    Bien, Fritz; Bernstein, Lawrence S.; Matthew, Michael W.

    1988-01-01

    An infrared trace element detection system including an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined.

  16. Infrared trace element detection system

    DOEpatents

    Bien, F.; Bernstein, L.S.; Matthew, M.W.

    1988-11-15

    An infrared trace element detection system includes an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined. 11 figs.

  17. Explosives detection system and method

    DOEpatents

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  18. Recent advances in microfluidic detection systems

    PubMed Central

    Baker, Christopher A; Duong, Cindy T; Grimley, Alix; Roper, Michael G

    2009-01-01

    There are numerous detection methods available for methods are being put to use for detection on these miniaturized systems, with the analyte of interest driving the choice of detection method. In this article, we summarize microfluidic 2 years. More focus is given to unconventional approaches to detection routes and novel strategies for performing high-sensitivity detection. PMID:20414455

  19. Acoustic leak-detection system for railroad transportation security

    NASA Astrophysics Data System (ADS)

    Womble, P. C.; Spadaro, J.; Harrison, M. A.; Barzilov, A.; Harper, D.; Hopper, L.; Houchins, E.; Lemoff, B.; Martin, R.; McGrath, C.; Moore, R.; Novikov, I.; Paschal, J.; Rogers, S.

    2007-04-01

    Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. These gases, once released in the atmosphere, can wreak havoc with the environment and local populations. We developed a system which can non-intrusively and non-invasively detect and locate pinhole-sized leaks in pressurized rail tank cars using acoustic sensors. The sound waves from a leak are produced by turbulence from the gas leaking to the atmosphere. For example, a 500 μm hole in an air tank pressurized to 689 kPa produces a broad audio frequency spectrum with a peak near 40 kHz. This signal is detectable at 10 meters with a sound pressure level of 25 dB. We are able to locate a leak source using triangulation techniques. The prototype of the system consists of a network of acoustic sensors and is located approximately 10 meters from the center of the rail-line. The prototype has two types of acoustic sensors, each with different narrow frequency response band: 40 kHz and 80 kHz. The prototype is connected to the Internet using WiFi (802.11g) transceiver and can be remotely operated from anywhere in the world. The paper discusses the construction, operation and performance of the system.

  20. Intrusive prospective imagery, posttraumatic intrusions and anxiety in schizophrenia.

    PubMed

    Malcolm, Charlotte P; Picchioni, Marco M; Ellett, Lyn

    2015-12-30

    Trauma exposure and intrusive thoughts are commonly reported in both schizophrenia and posttraumatic stress disorder (PTSD). Information processing accounts suggest that intrusions occur in the two conditions as a result of insufficient state and/or trait contextual processing in long-term memory. Most research has focused on intrusions about past events, while growing evidence suggests that intrusions about prospective imagined events warrants further investigation. Prospective intrusive imagery has yet to be examined in psychotic disorders but could provide crucial information regarding the aetiology and maintenance of psychotic symptoms. The current study examines the role of prospective intrusive imagery, posttraumatic intrusions and anxiety in schizophrenia. Fifty-seven participants (30 patients and 27 healthy controls) completed measures of trauma, PTSD, anxiety, general non-affective use of imagery, and intrusive prospective imagery. Patients reported significantly more intrusive prospective imagery relative to control participants but, importantly, not greater use of general non-affective imagery. Intrusive prospective imagery was associated with posttraumatic intrusions and anxiety in schizophrenia. The findings are consistent with information processing models of intrusions and psychosis, and provide novel insights for theoretical accounts, clinical formulation and therapeutic targets for psychotic symptoms in schizophrenia. PMID:26619917

  1. Mineral-Scale and Regional Isotopic Heterogeneity within the Kiglapait Intrusion and Other Mafic Intrusions of the ca. 1.3 Ga Nain Plutonic Suite, Labrador

    NASA Astrophysics Data System (ADS)

    Weis, D.; Morse, S. A.; Scoates, J. S.

    2004-05-01

    For years, stratigraphic variations in the radiogenic isotopic compositions of whole rocks from layered intrusions have been used to document compositional changes (e.g., magma recharge, mixing, contamination) associated with the filling, crystallization, and cooling of crustal magma chambers. However, recent studies are revealing pronounced isotopic disequilibrium or heterogeneity between minerals from many major layered intrusions, including Pb isotopes in coexisting plagioclase and sulfide from the Bushveld (Mathez & Waight, 2003, GCA) and the Stillwater (McCallum et al, 1999, CMP), Sr and Nd isotopes in whole rock, plagioclase, and clinopyroxene from the Skaergaard (McBirney & Creaser, 2003, JP), and Sr isotopes in single plagioclase crystals from the Rum layered intrusion (Tepley & Davidson, 2003, CMP). Except for the Stillwater intrusion, these isotopic variations are not related to low-temperature secondary alteration. Instead, slow cooling (105-106 years) of these large bodies from near-liquidus to subsolidus temperatures appears to allow for complex geochemical evolution of partially molten systems. Proterozoic anorthosite plutonic suites are especially attractive targets for investigating the significance and extent of isotopic differences between crystals, whole rocks, and different intrusions given their typically protracted emplacement histories, range of magma compositions, and slow cooling at mid-crustal depths. To this list of intrusions that record mineral-mineral isotopic disequilibrium, we can add the large 1308 Ma troctolitic Kiglapait layered intrusion in the Nain Plutonic Suite, Labrador. Plagioclase separates and whole rocks show significant differences in both measured and initial Pb isotopic compositions. Bulk mafics and separated minerals (apatite, magnetite, augite and olivine) give internal Pb-Pb and U-Pb isochron ages consistent with the crystallization age. Measured 206Pb/204Pb is highest in apatite (30-73), indicating that apatite is

  2. A Portable Infrasonic Detection System

    NASA Technical Reports Server (NTRS)

    Shams, Qamar A.; Burkett, Cecil G.; Zuckerwar, Allan J.; Lawrenson, Christopher C.; Masterman, Michael

    2008-01-01

    During last couple of years, NASA Langley has designed and developed a portable infrasonic detection system which can be used to make useful infrasound measurements at a location where it was not possible previously. The system comprises an electret condenser microphone, having a 3-inch membrane diameter, and a small, compact windscreen. Electret-based technology offers the lowest possible background noise, because Johnson noise generated in the supporting electronics (preamplifier) is minimized. The microphone features a high membrane compliance with a large backchamber volume, a prepolarized backplane and a high impedance preamplifier located inside the backchamber. The windscreen, based on the high transmission coefficient of infrasound through matter, is made of a material having a low acoustic impedance and sufficiently thick wall to insure structural stability. Close-cell polyurethane foam has been found to serve the purpose well. In the proposed test, test parameters will be sensitivity, background noise, signal fidelity (harmonic distortion), and temporal stability. The design and results of the compact system, based upon laboratory and field experiments, will be presented.

  3. Photoelectric detection system. [manufacturing automation

    NASA Technical Reports Server (NTRS)

    Currie, J. R.; Schansman, R. R. (Inventor)

    1982-01-01

    A photoelectric beam system for the detection of the arrival of an object at a discrete station wherein artificial light, natural light, or no light may be present is described. A signal generator turns on and off a signal light at a selected frequency. When the object in question arrives on station, ambient light is blocked by the object, and the light from the signal light is reflected onto a photoelectric sensor which has a delayed electrical output but is of the frequency of the signal light. Outputs from both the signal source and the photoelectric sensor are fed to inputs of an exclusively OR detector which provides as an output the difference between them. The difference signal is a small width pulse occurring at the frequency of the signal source. By filter means, this signal is distinguished from those responsive to sunlight, darkness, or 120 Hz artificial light. In this fashion, the presence of an object is positively established.

  4. Planetary system detection by POINTS

    NASA Technical Reports Server (NTRS)

    Reasenberg, Robert D.

    1993-01-01

    The final report and semiannual reports 1, 2, and 3 in response to the study of 'Planetary System Detection by POINTS' is presented. The grant covered the period from 15 Jun. 1988 through 31 Dec. 1989. The work during that period comprised the further development and refinement of the POINTS concept. The status of the POINTS development at the end of the Grant period was described by Reasenberg in a paper given at the JPL Workshop on Space Interferometry, 12-13 Mar. 1990, and distributed as CfA Preprint 3138. That paper, 'POINTS: a Small Astrometric Interferometer,' follows as Appendix-A. Our proposal P2276-7-09, dated July 1990, included a more detailed description of the state of the development of POINTS at the end of the tenure of Grant NAGW-1355. That proposal, which resulted in Grant NAGW-2497, is included by reference.

  5. Assessment of Mitigation Systems on Vapor Intrusion: Temporal Trends, Attenuation Factors, and Contaminant Migration Routes under Mitigated and Non-mitigated Conditions

    EPA Science Inventory

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor ...

  6. neu-VISION: an explosives detection system for transportation security

    NASA Astrophysics Data System (ADS)

    Warman, Kieffer; Penn, David

    2008-04-01

    Terrorists were targeting commercial airliners long before the 9/11 attacks on the World Trade Center and the Pentagon. Despite heightened security measures, commercial airliners remain an attractive target for terrorists, as evidenced by the August 2006 terrorist plot to destroy as many as ten aircraft in mid-flight from the United Kingdom to the United States. As a response to the security threat air carriers are now required to screen 100-percent of all checked baggage for explosives. The scale of this task is enormous and the Transportation Security Administration has deployed thousands of detection systems. Although this has resulted in improved security, the performance of the installed systems is not ideal. Further improvements are needed and can only be made with new technologies that ensure a flexible Concept of Operations and provide superior detection along with low false alarm rates and excellent dependability. To address security needs Applied Signal Technology, Inc. is developing an innovative and practical solution to meet the performance demands of aviation security. The neu-VISION TM system is expected to provide explosives detection performance for checked baggage that both complements and surpasses currently deployed performance. The neu-VISION TM system leverages a 5 year R&D program developing the Associated Particle Imaging (API) technique; a neutron based non-intrusive material identification and imaging technique. The superior performance afforded by this neutron interrogation technique delivers false alarm rates much lower than deployed technologies and "sees through" dense, heavy materials. Small quantities of explosive material are identified even in the cluttered environments.

  7. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  8. Gravity-driven intrusions in stratified fluids

    NASA Astrophysics Data System (ADS)

    Maurer, Benjamin Dudley

    All natural fluids stratify. Stable stratifications, in which isobars and isopycnals are parallel, are capable of supporting internal wave motion. Unstable stratification, in which density and pressure gradients are not aligned, results in gravity-driven flow. Gravity currents are a subset of these flows in which horizontal density gradients sharpen and propagate horizontally, transporting mass, momentum, and energy. If the density of the gravity current is within the density extrema of the stably stratified ambient fluid, it propagates as an intrusion at an intermediate height. Through laboratory experiments and numerical simulations, this dissertation explores the influence of stratification on the dynamics of gravity-driven intrusions. Intrusions require stable stratification in the ambient fluid, which is capable of transporting momentum and energy away from the current in the form of internal waves. We investigate the constant velocity propagation of well-mixed intrusions propagating into a linearly stratified ambient fluid. Varying the level of neutral buoyancy, we quantify the corresponding variation in structure, momentum, and energy of the upstream wave field. Adjacent stable stratifications of differing vertical density structure necessarily entail horizontal density gradients. These gradients determine the hydrostatic pressure differences driving the ensuing gravity current. We examine the mid-depth, constant velocity propagation of one linearly stratified fluid into another more strongly linearly stratified fluid. Working from the available potential energy of the system and measurements of the intrusion thickness, we develop an energy model to describe the speed of the intrusion in terms of the ratio of the two buoyancy frequencies. Distinct from adjacent linear stratifications, adjacent discrete stratifications may create flow consisting of interleaving intrusions. Single intrusions into a two-layer ambient fluid are well understood. Limiting our

  9. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  10. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  11. Convective, intrusive geothermal plays: what about tectonics?

    NASA Astrophysics Data System (ADS)

    Santilano, A.; Manzella, A.; Gianelli, G.; Donato, A.; Gola, G.; Nardini, I.; Trumpy, E.; Botteghi, S.

    2015-09-01

    We revised the concept of convective, intrusive geothermal plays, considering that the tectonic setting is not, in our opinion, a discriminant parameter suitable for a classification. We analysed and compared four case studies: (i) Larderello (Italy), (ii) Mt Amiata (Italy), (iii) The Geysers (USA) and (iv) Kizildere (Turkey). The tectonic settings of these geothermal systems are different and a matter of debate, so it is hard to use this parameter, and the results of classification are ambiguous. We suggest a classification based on the age and nature of the heat source and the related hydrothermal circulation. Finally we propose to distinguish the convective geothermal plays as volcanic, young intrusive and amagmatic.

  12. CAXSS: an intelligent threat-detection system

    NASA Astrophysics Data System (ADS)

    Feather, Thomas; Guan, Ling; Lee-Kwen, Adrian; Paranjape, Raman B.

    1993-04-01

    Array Systems Computing Inc. (ASC) is developing a prototype Computer Assisted X-ray Screening System (CAXSS) which uses state-of-the-art image processing and computer vision technology to detect threats seen in x-ray images of passenger carry-on luggage at national and international airports. This system is successful in detecting weapons including guns, knives, grenades, aerosol cans, etc. Currently, bomb detection is also being implemented; preliminary results using this bomb detector are promising.

  13. Vulnerbility of production wells in the Potomac-Raritan-Magothy aquifer system to saltwater intrusion from the Delaware River in Camden, Gloucester, and Salem Counties, New Jersey

    USGS Publications Warehouse

    Navoy, Anthony S.; Voronin, Lois M.; Modica, Edward

    2005-01-01

    The Potomac-Raritan-Magothy aquifer system is hydraulically connected to the Delaware River in parts of Camden and Gloucester Counties, New Jersey, and has more limited contact with the river in Salem County, New Jersey. The aquifer system is used widely for water supply, and 122 production wells that are permitted by the New Jersey Department of Environmental Protection to pump more than 100,000 gallons per year in the three counties are within 2 miles of the river. During drought, saltwater may encroach upstream from the Atlantic Ocean and Delaware Bay to areas where the aquifer system is recharged by induced infiltration through the Delaware River streambed. During the drought of the mid-1960's, water with a chloride concentration in excess of potability standards (250 mg/L (milligrams per liter)) encroached into the reach of the river that recharges the aquifer system. The vulnerability of the major production wells in the area to similar saltwater encroachment in the future is a concern to water managers. This vulnerability was evaluated by investigating two scenarios: (1) a one-time recurrence of the conditions approximating those that occurred in the1960's, and (2) the recurrence of those same conditions on an annual basis. Results of ground-water-flow simulation in conjunction with particle tracking and one-dimensional transport analysis indicate that the wells that are most vulnerable to saltwater intrusion are those in the Morris and Delair well fields in Camden County. A single 30-day event during which the concentration of dissolved chloride or sodium exceeds 2,098 mg/L or 407 mg/L, respectively, in the Delaware River would threaten the potability of water from these wells, given New Jersey drinking-water standards of 250 mg/L for dissolved chloride and 50 mg/L for dissolved sodium. This chloride concentration is about six times that observed in the river during the 1960's drought. An annually occurring 1-month event during which the concentrations of

  14. Non-intrusive speed sensor

    NASA Technical Reports Server (NTRS)

    Wyett, L.

    1986-01-01

    In Phase I of the Non-Intrusive Speed Sensor program, a computerized literature search was performed to identify candidate technologies for remote, non-intrusive speed sensing applications in Space Shuttle Main Engine (SSME) turbopumps. The three most promising technologies were subjected to experimental evaluation to quantify their performance characteristics under the harsh environmental requirements within the turbopumps. Although the infrared and microwave approaches demonstrated excellent cavitation immunity in laboratory tests, the variable-source magnetic speed sensor emerged as the most viable approach. Preliminary design of this speed sensor encountered no technical obstacles and resulted in viable and feasible speed nut, sensor housing, and sensor coil designs. Phase II of this program developed the variable-source magnetic speed sensor through the detailed design task and guided the design into breadboard fabrication. The speed sensor and its integral speed nut were evaluated at both unit and system level testing. The final room-temperature and cryogenic spin testing of the hardware demonstrated that the sensor was capable of generating sufficient output signal to enable remote speed sensing from 1500 to 40000 rpm over a speed nut/sensor separation of 3.5 inches.

  15. Processing of GPR data from NIITEK landmine detection system

    NASA Astrophysics Data System (ADS)

    Legarsky, Justin J.; Broach, J. T.; Bishop, Steven S.

    2003-09-01

    In this paper, a signal processing approach for wide-bandwidth ground-penetrating-radar imagery from Non-Intrusive Inspection Technology, Incorporated (NIITEK) vehicle-mounted landmine detection sensor is investigated. The approach consists of a sequence of processing steps, which include signal filtering, image enhancement and detection. Filtering strategies before detection aid in image visualization by reducing ground bounce, systematic effects and redundant signals. Post-filter image processing helps by enhancing landmine signatures in the NIITEK radar imagery. Study results from applying this signal processing approach are presented for test minefield lane data, which were collected during 2002 from an Army test site.

  16. Discriminating ultrasonic proximity detection system

    DOEpatents

    Annala, Wayne C.

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  17. Airborne change detection system for the detection of route mines

    NASA Astrophysics Data System (ADS)

    Donzelli, Thomas P.; Jackson, Larry; Yeshnik, Mark; Petty, Thomas E.

    2003-09-01

    The US Army is interested in technologies that will enable it to maintain the free flow of traffic along routes such as Main Supply Routes (MSRs). Mines emplaced in the road by enemy forces under cover of darkness represent a major threat to maintaining a rapid Operational Tempo (OPTEMPO) along such routes. One technique that shows promise for detecting enemy mining activity is Airborne Change Detection, which allows an operator to detect suspicious day-to-day changes in and around the road that may be indicative of enemy mining. This paper presents an Airborne Change Detection that is currently under development at the US Army Night Vision and Electronic Sensors Directorate (NVESD). The system has been tested using a longwave infrared (LWIR) sensor on a vertical take-off and landing unmanned aerial vehicle (VTOL UAV) and a midwave infrared (MWIR) sensor on a fixed wing aircraft. The system is described and results of the various tests conducted to date are presented.

  18. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  19. Thermal systems for landmine detection

    NASA Astrophysics Data System (ADS)

    D'Angelo, Marco; Del Vecchio, Luca; Esposito, Salvatore; Balsi, Marco; Jankowski, Stanislaw

    2009-06-01

    This paper presents new techniques of landmine detection and localization using thermal methods. Described methods use both dynamical and static analysis. The work is based on datasets obtained from the Humanitarian Demining Laboratory of Università La Sapienza di Roma, Italy.

  20. Forward Obstacle Detection System by Stereo Vision

    NASA Astrophysics Data System (ADS)

    Iwata, Hiroaki; Saneyoshi, Keiji

    Forward obstacle detection is needed to prevent car accidents. We have developed forward obstacle detection system which has good detectability and the accuracy of distance only by using stereo vision. The system runs in real time by using a stereo processing system based on a Field-Programmable Gate Array (FPGA). Road surfaces are detected and the space to drive can be limited. A smoothing filter is also used. Owing to these, the accuracy of distance is improved. In the experiments, this system could detect forward obstacles 100 m away. Its error of distance up to 80 m was less than 1.5 m. It could immediately detect cutting-in objects.

  1. Toward detecting deception in intelligent systems

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Johnson, Gregory, Jr.

    2004-08-01

    Contemporary decision makers often must choose a course of action using knowledge from several sources. Knowledge may be provided from many diverse sources including electronic sources such as knowledge-based diagnostic or decision support systems or through data mining techniques. As the decision maker becomes more dependent on these electronic information sources, detecting deceptive information from these sources becomes vital to making a correct, or at least more informed, decision. This applies to unintentional disinformation as well as intentional misinformation. Our ongoing research focuses on employing models of deception and deception detection from the fields of psychology and cognitive science to these systems as well as implementing deception detection algorithms for probabilistic intelligent systems. The deception detection algorithms are used to detect, classify and correct attempts at deception. Algorithms for detecting unexpected information rely upon a prediction algorithm from the collaborative filtering domain to predict agent responses in a multi-agent system.

  2. Hydrogen Fire Detection System Features Sharp Discrimination

    NASA Technical Reports Server (NTRS)

    Bright, C. S.

    1966-01-01

    Hydrogen fire detection system discovers fires by detecting the flickering ultraviolet radiation emitted by the OH molecule, a short-lived intermediate combustion product found in hydrogen-air flames. In a space application, the system discriminates against false signals from sunlight and rocket engine exhaust plume radiation.

  3. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  4. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  5. Magma rheology variation in sheet intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    Magee, C.; O'Driscoll, B.; Petronis, M. S.; Stevenson, C.

    2013-12-01

    The rheology of magma fundamentally controls igneous intrusion style as well as the explosivity and type of volcanic eruptions. Importantly, the dynamic interplay between the viscosity of magma and other processes active during intrusion (e.g., crystallisation, magma mixing, assimilation of crystal mushes and/or xenolith entrainment) will likely bear an influence on the temporal variation of magma rheology. Constraining the timing of rheological changes during magma transit therefore plays an important role in understanding the nuances of volcanic systems. However, the rheological evolution of actively emplacing igneous intrusions cannot be directly studied. While significant advances have been made via experimental modelling and analysis of lava flows, how these findings relate to intruding magma remains unclear. This has led to an increasing number of studies that analyse various characteristics of fully crystallised intrusions in an attempt to ';back-out' the rheological conditions governing emplacement. For example, it has long been known that crystallinity affects the rheology and, consequently, the velocity of intruding magma. This means that quantitative textural analysis of crystal populations (e.g., crystal size distribution; CSD) used to elucidate crystallinity at different stages of emplacement can provide insights into magma rheology. Similarly, methods that measure flow-related fabrics (e.g., anisotropy of magnetic susceptibility; AMS) can be used to discern velocity profiles, a potential proxy for the magma rheology. To illustrate these ideas, we present an integrated AMS and petrological study of several sheet intrusions located within the Ardnamurchan Central Complex, NW Scotland. We focus on the entrainment and transport dynamics of gabbroic inclusions that were infiltrated by the host magma upon entrainment. Importantly, groundmass magnetic fabrics within and external to these inclusions are coaxial. This implies that a deviatoric stress was

  6. Scientific drilling to study the roots of active hydrothermal systems related to young magmatic intrusions. [Abstract only

    SciTech Connect

    Muffler, L.J.P.

    1983-03-01

    At present, hydrothermal-magma processes can be studied only inferentially, using observations on hot springs and volcanic rocks, data from shallow- and intermediate-depth drill holes, analogies with exhumed fossil systems, and extrapolation of laboratory investigations. The Thermal Regimes Panel of the Continental Scientific Drilling Committee in a draft report concludes that an understanding of active hydrothermal-magma systems requires drill-hole investigations of deeper and hotter levels than have been drilled and studied to date. The Panel groups hydrothermal-magma systems in the United States into five classes: (1) dominantly andesitic centers, (2) spreading ridges, (3) basaltic fields, (4) evolved basaltic centers, and (5) silicic caldera complexes. Application of eight scientific criteria and three social criteria leads to the conclusion that silicic caldera complexes should be the first target of a focused drilling program to investigate the hydrothermal-magma interface at depths of 5 to 7 km. Primary targets are the three young, silicic caldera systems in the western conterminous United States: Yellowstone (Wyoming), Valles (New Mexico), and Long Valley (California). Scientific drilling of these active hydrothermal-magma systems complements scientific drilling proposed for fossil systems such as Creede (Colorado). In addition, the roots of the Salton Sea geothermal system (California) present an opportunity for add-on deep drilling and scientific experiments to supplement geothermal drilling by industry in this active spreading-ridge environment.

  7. Mafic intrusions triggering eruptions in Iceland

    NASA Astrophysics Data System (ADS)

    Sigmarsson, O.

    2012-04-01

    The last two eruptions in Iceland, Eyjafjallajökull 2010 and Grímsvötn 2011, were both provoked by an intrusion of more mafic magma into pre-existing magmatic system. Injection into the latter volcano, which is located in the main rift-zone of the island, above the presumed centre of the mantle plume and is the most active volcano of Iceland, has been gradual since the last eruption in 2004. In contrast, at Eyjafjallajökull volcano, one of the least active volcano in Iceland and located at the southern part of a propagating rift-zone where extensional tectonics are poorly developed, mafic magma intrusion occurred over less than a year. Beneath Eyjafjallajökull, a silicic intrusion at approximately 6 km depth was recharged with mantle derived alkali basalt that was injected into residual rhyolite from the penultimate eruption in the years 1821-23. The resulting magma mingIing process was highly complex, but careful sampling of tephra during the entire eruption allows the dynamics of the mingling process to be unravelled. Short-lived disequilibria between the gaseous nuclide 210Po and the much less volatile nuclide 210Pb, suggest that basalt accumulated beneath the silicic intrusion over approximately 100 days, or from early January 2010 until the onset of the explosive summit eruption on 14 April. Due to the degassing, crystal fractionation modified the composition of the injected mafic magma producing evolved Fe-and Ti-rich basalt, similar in composition to that of the nearby Katla volcano. This evolved basalt was intruded into the liquid part of the silicic intrusion only a few hours before the onset of the explosive summit eruption. The short time between intrusion and eruption led to the production of very heterogeneous (of basaltic, intermediate and silicic composition) and fine-grained tephra during the first days of explosive eruption. The fine grained tephra resulted from combined effects of magma fragmentation due to degassing of stiff magma rich in

  8. TV system for detection of latent fingerprints

    NASA Astrophysics Data System (ADS)

    Li, Ping; Ban, Xianfu; Liu, Shaowu; Ding, Zhenfang

    1993-04-01

    A fingerprint is reliable evidence for recognizing criminals in detecting cases. There are many conventional chemical and physical methods in detecting fingerprints. In this paper, a newly developed portable TV system for detecting a latent fingerprint is described. This system is suited for field reconnaissance of cases as well as for laboratory testing. It can display a latent fingerprint, which is hard to identify and even cannot be displayed by conventional methods, and it can detect prints or stamps which are faded, altered, or falsified, etc.

  9. Development of an in-line filter to prevent intrusion of NO2 toxic vapors into A/C systems

    NASA Technical Reports Server (NTRS)

    Meneghelli, Barry; Mcnulty, R. J.; Springer, Mike; Lueck, Dale E.

    1995-01-01

    The hypergolic propellant nitrogen tetroxide (N2O4 or NTO) is routinely used in spacecraft launched at Kennedy Space Center (KSC) and Cape Canaveral Air Station (CCAS). In the case of a catastrophic failure of the spacecraft, there would be a release of the unspent propellant in the form of a toxic cloud. Inhalation of this material at downwind concentrations which may be as high as 20 parts per million (ppm) for 30 minutes in duration, may produce irritation to the eyes, nose and respiratory tract. Studies at both KSC and CCAS have shown that the indoor concentrations of N2O4 during a toxic release may range from 1 to 15 ppm and depend on the air change rate (ACR) for a particular building and whether or not the air conditioning (A/C) system has been shut down or left in an operating mode. This project was initiated in order to assess how current A/C systems could be easily modified to prevent personnel from being exposed to toxic vapors. A sample system has been constructed to test the ability of several types of filter material to capture the N2O4 vapors prior to their infiltration into the A/C system. Test results will be presented which compare the efficiencies of standard A/C filters, water wash systems, and chemically impregnated filter material in taking toxic vapors out of the incoming air stream.

  10. Inertial navigation sensor integrated obstacle detection system

    NASA Technical Reports Server (NTRS)

    Bhanu, Bir (Inventor); Roberts, Barry A. (Inventor)

    1992-01-01

    A system that incorporates inertial sensor information into optical flow computations to detect obstacles and to provide alternative navigational paths free from obstacles. The system is a maximally passive obstacle detection system that makes selective use of an active sensor. The active detection typically utilizes a laser. Passive sensor suite includes binocular stereo, motion stereo and variable fields-of-view. Optical flow computations involve extraction, derotation and matching of interest points from sequential frames of imagery, for range interpolation of the sensed scene, which in turn provides obstacle information for purposes of safe navigation.

  11. Voice activity detection for speaker verification systems

    NASA Astrophysics Data System (ADS)

    Borowski, Filip

    2008-01-01

    Complex algorithm for speech activity detection was presented in this article. It is based on speech enhancement, features extraction and final detection algorithm. The first one was published in ETSI standard as a module of "Advanced front-end feature extraction algorithm" in distributed speech recognition system. It consists of two main parts, noise estimatiom and Wiener filtering. For the final detection modified linear prediction coefficients and spectral entropy features are extracted form denoised signal.

  12. Driver fatigue detection system based on DSP

    NASA Astrophysics Data System (ADS)

    Wang, Qian; Yu, Fu liang; Song, Lixin

    2012-01-01

    To detect driver fatigue states effectively and in real time, a driver fatigue detection system was built, which take ICETEK-DM6347 module as system core, near-infrared LED as light source, and CCD camera as picture gathering device. An improved PER-NORFACE detection method combined several simple and efficient image processing algorithms was proposed, which based on principle of PERCLOS method and take the human face location as the main detection target. To ensure the ability of real-time processing, the algorithms on the DM6437 DaVinci processor were optimized. Experiments show that the system could complete the driver fatigue states detection accurately and in real time.

  13. Multisensor cargo bay fire detection system

    NASA Astrophysics Data System (ADS)

    Snyder, Brian L.; Anderson, Kaare J.; Renken, Christopher H.; Socha, David M.; Miller, Mark S.

    2004-08-01

    Current aircraft cargo bay fire detection systems are generally based on smoke detection. Smoke detectors in modern aircraft are predominately photoelectric particle detectors that reliably detect smoke, but also detect dust, fog, and most other small particles. False alarms caused by these contaminants can be very costly to the airlines because they can cause flights to be diverted needlessly. To minimize these expenses, a new approach to cargo bay fire detection is needed. This paper describes a novel fire detection system developed by the Goodrich Advanced Sensors Technical Center. The system uses multiple sensors of different technologies to provide a way of discriminating between real fire events and false triggers. The system uses infrared imaging along with multiple, distributed chemical sensors and smoke detectors, all feeding data to a digital signal processor. The processor merges data from the chemical sensors, smoke detectors, and processed images to determine if a fire (or potential fire) is present. Decision algorithms look at all this data in real-time and make the final decision about whether a fire is present. In the paper, we present a short background of the problem we are solving, the reasons for choosing the technologies used, the design of the system, the signal processing methods and results from extensive system testing. We will also show that multiple sensing technologies are crucial to reducing false alarms in such systems.

  14. Computer systems for automatic earthquake detection

    USGS Publications Warehouse

    Stewart, S.W.

    1974-01-01

    U.S Geological Survey seismologists in Menlo park, California, are utilizing the speed, reliability, and efficiency of minicomputers to monitor seismograph stations and to automatically detect earthquakes. An earthquake detection computer system, believed to be the only one of its kind in operation, automatically reports about 90 percent of all local earthquakes recorded by a network of over 100 central California seismograph stations. The system also monitors the stations for signs of malfunction or abnormal operation. Before the automatic system was put in operation, all of the earthquakes recorded had to be detected by manually searching the records, a time-consuming process. With the automatic detection system, the stations are efficiently monitored continuously. 

  15. Real-time distributed fiber optic sensor for security systems: Performance, event classification and nuisance mitigation

    NASA Astrophysics Data System (ADS)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-09-01

    The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.

  16. RADIATION DETECTING AND TELEMETERING SYSTEM

    DOEpatents

    Richards, H.K.

    1959-12-15

    A system is presented for measuring ionizing radiation at several remote stations and transmitting the measured information by radio to a central station. At each remote station a signal proportioned to the counting rate is applied across an electrical condenser made of ferroelectric material. The voltage across the condenser will vary as a function of the incident radiation and the capacitance of the condenser will vary accordingly. This change in capacitance is used to change the frequency of a crystalcontrolled oscillator. The output of the oscillator is coupled to an antenna for transmitting a signal proportional to the incident radiation.

  17. Multispectral imaging system for contaminant detection

    NASA Technical Reports Server (NTRS)

    Poole, Gavin H. (Inventor)

    2003-01-01

    An automated inspection system for detecting digestive contaminants on food items as they are being processed for consumption includes a conveyor for transporting the food items, a light sealed enclosure which surrounds a portion of the conveyor, with a light source and a multispectral or hyperspectral digital imaging camera disposed within the enclosure. Operation of the conveyor, light source and camera are controlled by a central computer unit. Light reflected by the food items within the enclosure is detected in predetermined wavelength bands, and detected intensity values are analyzed to detect the presence of digestive contamination.

  18. Detecting data anomalies methods in distributed systems

    NASA Astrophysics Data System (ADS)

    Mosiej, Lukasz

    2009-06-01

    Distributed systems became most popular systems in big companies. Nowadays many telecommunications companies want to hold large volumes of data about all customers. Obviously, those data cannot be stored in single database because of many technical difficulties, such as data access efficiency, security reasons, etc. On the other hand there is no need to hold all data in one place, because companies already have dedicated systems to perform specific tasks. In the distributed systems there is a redundancy of data and each system holds only interesting data in appropriate form. Data updated in one system should be also updated in the rest of systems, which hold that data. There are technical problems to update those data in all systems in transactional way. This article is about data anomalies in distributed systems. Avail data anomalies detection methods are shown. Furthermore, a new initial concept of new data anomalies detection methods is described on the last section.

  19. A national drilling program to study the roots of active hydrothermal systems related to young magmatic intrusions

    SciTech Connect

    Not Available

    1984-01-01

    The importance of studies of active hydrothermal-magma systems as part of a national continental scientific drilling program has been emphasized in numerous workshops and symposia. The present report, prepared by the Panel on Thermal Regimes of the Continental Scientific Drilling Committee, both reinforces and expands on earlier recommendations. The US Geodynamics Committee 1979 report of the Los Almos workshop, Continental Scientific Drilling Program, placed major emphasis on maximizing the scientific value of current and planned drilling by industry and government, supplementing these efforts with holes drilled solely for scientific purposes. Although the present report notes the importance of opportunities for scientific investigations that may be added on to current, mission-oriented drilling activities, the Panel on Thermal Regimes recognizes that such opportunities are limited and thus focused its study on holes dedicated to broad scientific objectives. 16 refs., 2 figs., 4 tabs.

  20. Health-related intrusive thoughts.

    PubMed

    Freeston, M H; Gagnon, F; Ladouceur, R; Thibodeau, N; Letarte, H; Rhéaume, J

    1994-04-01

    Two studies address the prevalence, concomitants, and appraisal of health-related intrusive thoughts. Eighty-three percent of adults (N = 658) in waiting rooms of two general hospitals reported at least one intrusive thought during the preceding month and 75.0% of patients and 55.5% of people accompanying them reported a health-related intrusive thought in the same period. The intrusions were associated with anxious and depressive symptoms. Health related intrusive thoughts were reported by 61% of a sample of university students (N = 608) and were the most frequent intrusive thought among 19.9% of the students. First, triggering stimuli reported by the subjects were significant predictors of thought frequency, worry, removal difficulty, and effort used in removing the thought. Second, appraisals of high probability were significant predictors of high frequency, worry, and especially difficulty in removing the thought. Finally, perceived responsibility and disapproval of the thought were also significant predictors of thought frequency, worry, removal difficulty, effort used in removing the thought, and guilt. These data support the position that cognitive appraisal of intrusive thoughts is closely linked to the subjective experience of the thought: more extreme appraisals were associated with more troublesome thoughts. The clinical implications of these studies are discussed in terms of current models of hypochondriasis and health anxiety. PMID:8027960

  1. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  2. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  3. Data Fusion to Develop a Driver Drowsiness Detection System with Robustness to Signal Loss

    PubMed Central

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-01-01

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs. PMID:25256113

  4. Data fusion to develop a driver drowsiness detection system with robustness to signal loss.

    PubMed

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-01-01

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs. PMID:25256113

  5. Stratospheric Ozone Intrusions Over The Eastern Mediterranean Studied Using A Ground-based Lidar System and Ozonesondes

    NASA Astrophysics Data System (ADS)

    Galani, E.; Zanis, P.; Zerefos, C.; Balis, D.; Papayannis, A.; Wernli, H.

    In the framework of the European STACCATO Project (Influence of stratosphere- troposphere exchange in a changing climate on atmospheric transport and oxidation capacity) and in order to cover a substantial amount of Stratosphere-Troposphere Ex- change (STE) events, coordinated measurements were carried out, based on 3-D tra- jectories calculated daily with ECMWF forecast data. In the framework of the STAC- CATO project the AUTH tropospheric ozone Differential Absorption Lidar (DIAL) system at Thessaloniki (23o E, 40.5o N), Greece, has been providing vertical profiles of ozone in the free troposphere, for the investigation of STE events over the Eastern Mediterranean region, since March 2000. Two selected case studies are described, dur- ing which stratospheric air was coherently transported into the troposphere. Although the episodes were not extraordinarily strong events, the rapid descent of ozone-rich air with stratospheric origin into the troposphere is being well documented, for the first time by the use of ozone lidar measurements in this geographical region. The study of the STE events was supported by supplementary vertical profile measurements, such as ozone and radio soundings, and also by the use of 3-D air mass back trajectories, vertical cross sections of potential vorticity, relative humidity and ozone, as well as total ozone maps.

  6. Automated Hydrogen Gas Leak Detection System

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The Gencorp Aerojet Automated Hydrogen Gas Leak Detection System was developed through the cooperation of industry, academia, and the Government. Although the original purpose of the system was to detect leaks in the main engine of the space shuttle while on the launch pad, it also has significant commercial potential in applications for which there are no existing commercial systems. With high sensitivity, the system can detect hydrogen leaks at low concentrations in inert environments. The sensors are integrated with hardware and software to form a complete system. Several of these systems have already been purchased for use on the Ford Motor Company assembly line for natural gas vehicles. This system to detect trace hydrogen gas leaks from pressurized systems consists of a microprocessor-based control unit that operates a network of sensors. The sensors can be deployed around pipes, connectors, flanges, and tanks of pressurized systems where leaks may occur. The control unit monitors the sensors and provides the operator with a visual representation of the magnitude and locations of the leak as a function of time. The system can be customized to fit the user's needs; for example, it can monitor and display the condition of the flanges and fittings associated with the tank of a natural gas vehicle.

  7. Flat Surface Damage Detection System (FSDDS)

    NASA Technical Reports Server (NTRS)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  8. Experimental modelling of ground deformation associated with shallow magma intrusions

    NASA Astrophysics Data System (ADS)

    Galland, Olivier

    2012-02-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this paper, I present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in the analyses of ground deformation patterns on volcanoes.

  9. Experimental modelling of ground deformation associated with shallow magma intrusions

    NASA Astrophysics Data System (ADS)

    Galland, O.

    2012-04-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this contribution, I will present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored in 3D. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in analyses of ground deformation patterns on volcanoes.

  10. Detection probability of EBPSK-MODEM system

    NASA Astrophysics Data System (ADS)

    Yao, Yu; Wu, Lenan

    2016-07-01

    Since the impacting filter-based receiver is able to transform phase modulation into amplitude peak, a simple threshold decision can detect the Extend-Binary Phase Shift Keying (EBPSK) modulated ranging signal in noise environment. In this paper, an analysis of the EBPSK-MODEM system output gives the probability density function for EBPSK modulated signals plus noise. The equation of detection probability (pd) for fluctuating and non-fluctuating targets has been deduced. Also, a comparison of the pd for the EBPSK-MODEM system and pulse radar receiver is made, and some results are plotted. Moreover, the probability curves of such system with several modulation parameters are analysed. When modulation parameter is not smaller than 6, the detection performance of EBPSK-MODEM system is more excellent than traditional radar system. In addition to theoretical considerations, computer simulations are provided for illustrating the performance.

  11. Windshear detection and avoidance - Airborne systems survey

    NASA Technical Reports Server (NTRS)

    Bowles, Roland L.

    1990-01-01

    Functional requirements for airborne windshear detection and warning systems are discussed in terms of the threat posed to civil aircraft operations. A preliminary set of performance criteria for predictive windshear detection and warning systems is defined. Candidate airborne remote sensor technologies based on microwave Doppler radar, Doppler laser radar (lidar), and infrared radiometric techniques are discussed in the context of overall system requirements, and the performance of each sensor is assessed for representative microburst environments and ground clutter conditions. Preliminary simulation results demonstrate that all three sensors show potential for detecting windshear, and provide adequate warning time to allow flight crews to avoid the affected area or escape from the encounter. Radar simulation and analysis show that by using bin-to-bin automatic gain control, clutter filtering, limited detection range, and suitable antenna tilt management, windshear from wet microbursts can be accurately detected. Although a performance improvement can be obtained at higher radar frequency, the baseline X-band system also detected the presence of windshear hazard for a dry microburst. Simulation results of end-to-end performance for competing coherent lidar systems are presented.

  12. Seismic Interpretation of Igneous Intrusions and Their Implications for an Unconventional Petroleum System in Southeastern Parnaiba Basin, Northeastern Brazil.

    NASA Astrophysics Data System (ADS)

    Porto, A. L.; Pereira, E.

    2014-12-01

    After almost two decades of little exploratory effort in the Parnaiba Basin, recent gas discoveries have revived the economic interest in this region. A new exploratory play was successfully tested, confirming the efficiency of the igneous sills triggering the thermal effect on source rocks maturation, and also playing an important role as unconventional trap and seal. Parnaiba Basin was affected by two magmatic events: the Mosquito Formation (Average Age: 178 Ma) and the Sardinha Formation (Average Age: 124 Ma), both characterized by basic magmatic rocks. Ten 2D seismic lines, located in the southeastern Parnaiba Basin, were systematically interpreted in order to identify the main diabase sills geometry, some possible emplacement controls and further implications for an unconventional petroleum system. The identified sills were classified in three types: A, B, and C, according to their dominant geometries and the stratigraphic position of their host rocks. From base to top, Type A sills intrude the Pre-Silurian Sequence, that fills in graben structures of the basement. They have short lateral continuity and saucer-shaped geometry. The main graben faults seem to control the steeper sills, which seem to feed upper sills. Type B sills intrude mainly the Silurian Sequence and have a very long lateral continuity when intruding the shales of Tiangua Formation, in which they are mainly horizontal tabular. Type C sills intrude the top of the Devonian Sequence and have two main geometries: saucer-shaped and horizontal tabular. By correlation to the surface geology of the area, Type C sills are interpreted as Sardinha Formation (Lower Cretaceous). Considering an unconventional hydrocarbon play in the area, some potential trap features associated with sill geometry, were identified, using analogous plays successfully tested in recent discoveries. These traps are associated to a specific sill geometry locally known as "inverted saucer-shaped sill". This shape consists into a

  13. Force protection demining system (FPDS) detection subsystem

    NASA Astrophysics Data System (ADS)

    Zachery, Karen N.; Schultz, Gregory M.; Collins, Leslie M.

    2005-06-01

    This study describes the U.S. Army Force Protection Demining System (FPDS); a remotely-operated, multisensor platform developed for reliable detection and neutralization of both anti-tank and anti-personnel landmines. The ongoing development of the prototype multisensor detection subsystem is presented, which integrates an advanced electromagnetic pulsed-induction array and ground penetrating synthetic aperture radar array on a single standoff platform. The FPDS detection subsystem is mounted on a robotic rubber-tracked vehicle and incorporates an accurate and precise navigation/positioning module making it well suited for operation in varied and irregular terrains. Detection sensors are optimally configured to minimize interference without loss in sensitivity or performance. Mine lane test data acquired from the prototype sensors are processed to extract signal- and image-based features for automatic target recognition. Preliminary results using optimal feature and classifier selection indicate the potential of the system to achieve high probabilities of detection while minimizing false alarms. The FPDS detection software system also exploits modern multi-sensor data fusion algorithms to provide real-time detection and discrimination information to the user.

  14. Capacitive system detects and locates fluid leaks

    NASA Technical Reports Server (NTRS)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  15. An analogue study of intrusions.

    PubMed

    Laposa, Judith M; Alden, Lynn E

    2006-07-01

    According to cognitive theorists, intrusive trauma memories have their origin in how information during the event is processed. Two studies investigated functional cognitive strategies during medical crises that might protect against intrusions. In Study 1, interviews with health-care professionals were used to identify cognitive strategies judged to be effective in controlling emotions and dealing with medical crises. Study 2 systematically manipulated the use of those strategies in a trauma analogue film paradigm. Experimental participants reported fewer intrusions, and less fear and avoidance of film-related stimuli during the subsequent week than controls. The manipulation did not affect anxiety during the film or memory disorganization. Implications for cognitive theories of intrusion development are discussed. PMID:16125135

  16. Advanced Atmospheric Water Vapor DIAL Detection System

    NASA Technical Reports Server (NTRS)

    Refaat, Tamer F.; Elsayed-Ali, Hani E.; DeYoung, Russell J. (Technical Monitor)

    2000-01-01

    Measurement of atmospheric water vapor is very important for understanding the Earth's climate and water cycle. The remote sensing Differential Absorption Lidar (DIAL) technique is a powerful method to perform such measurement from aircraft and space. This thesis describes a new advanced detection system, which incorporates major improvements regarding sensitivity and size. These improvements include a low noise advanced avalanche photodiode detector, a custom analog circuit, a 14-bit digitizer, a microcontroller for on board averaging and finally a fast computer interface. This thesis describes the design and validation of this new water vapor DIAL detection system which was integrated onto a small Printed Circuit Board (PCB) with minimal weight and power consumption. Comparing its measurements to an existing DIAL system for aerosol and water vapor profiling validated the detection system.

  17. A cable detection lidar system for helicopters

    NASA Technical Reports Server (NTRS)

    Grossmann, Benoist; Capbern, Alain; Defour, Martin; Fertala, Remi

    1992-01-01

    Helicopters in low-level flight are endangered by power lines or telephone wires, especially when flying at night and under poor visibility conditions. In order to prevent 'wire strike', Thomson has developed a lidar system consisting of a pulsed diode laser emitting in the near infrared region (lambda = 0.9 microns). The HOWARD (Helicopter Obstacle Warning and Detection) System utilizes a high repetition rate diode laser (PRE = 20 KHz) along with counter-rotating prisms for laser beam deflection with a total field of view of 30 degrees. This system was successfully field tested in 1991. HOWARD can detect one inch wires at ranges up to 200 meters. We are presently in the process of developing a flyable compact lidar system capable of detection ranges in the order of 400 meters.

  18. A review of seawater intrusion and its management in Australia

    NASA Astrophysics Data System (ADS)

    Werner, Adrian D.

    2010-02-01

    Extended periods of below-average rainfall combined with a rising population density in the Australian coastal margin have led to higher stresses on coastal water resources, and the risk of seawater intrusion has increased. Despite reports of seawater intrusion in the majority of states and evidence that some Australian coastal aquifers are seriously depleted, comprehensive seawater intrusion investigations have only been completed for coastal systems in Queensland and to a lesser degree in Western Australia and South Australia. The degree of assessment appears to be linked to the perceived economic value of the groundwater resource. The most detailed studies include those of the Pioneer Valley and Burnett basins in Queensland, for which conceptual and mathematical models have been developed at the regional scale, and have been used to underpin trigger-level management approaches to protect against further seawater intrusion. Historical responses to seawater intrusion include the establishment of artificial recharge schemes; the most prominent being that of the Lower Burdekin aquifers in Queensland. Recommendations for future solutions include enhanced fit-for-purpose seawater intrusion monitoring, continuing research into investigation methods, and improved knowledge-sharing through education programs and the development of national guidelines for seawater intrusion assessment and management.

  19. Gas intrusion into SPR caverns

    SciTech Connect

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T.; Giles, H.N.

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  20. Coal-shale interface detection system

    NASA Technical Reports Server (NTRS)

    Campbell, R. A.; Hudgins, J. L.; Morris, P. W.; Reid, H., Jr.; Zimmerman, J. E. (Inventor)

    1979-01-01

    A coal-shale interface detection system for use with coal cutting equipment consists of a reciprocating hammer on which an accelerometer is mounted to measure the impact of the hammer as it penetrates the ceiling or floor surface of a mine. A pair of reflectometers simultaneously view the same surface. The outputs of the accelerometer and reflectometers are detected and jointly registered to determine when an interface between coal and shale is being cut through.

  1. Distributed fiber optic fuel leak detection system

    NASA Astrophysics Data System (ADS)

    Mendoza, Edgar; Kempen, C.; Esterkin, Yan; Sun, Sonjian

    2013-05-01

    With the increase worldwide demand for hydrocarbon fuels and the vast development of new fuel production and delivery infrastructure installations around the world, there is a growing need for reliable fuel leak detection technologies to provide safety and reduce environmental risks. Hydrocarbon leaks (gas or liquid) pose an extreme danger and need to be detected very quickly to avoid potential disasters. Gas leaks have the greatest potential for causing damage due to the explosion risk from the dispersion of gas clouds. This paper describes progress towards the development of a fast response, high sensitivity, distributed fiber optic fuel leak detection (HySenseTM) system based on the use of an optical fiber that uses a hydrocarbon sensitive fluorescent coating to detect the presence of fuel leaks present in close proximity along the length of the sensor fiber. The HySenseTM system operates in two modes, leak detection and leak localization, and will trigger an alarm within seconds of exposure contact. The fast and accurate response of the sensor provides reliable fluid leak detection for pipelines, tanks, airports, pumps, and valves to detect and minimize any potential catastrophic damage.

  2. Distributed fiber optic fuel leak detection system

    NASA Astrophysics Data System (ADS)

    Mendoza, Edgar; Kempen, C.; Esterkin, Yan; Sun, Sunjian

    2013-05-01

    With the increase worldwide demand for hydrocarbon fuels and the vast development of new fuel production and delivery infrastructure installations around the world, there is a growing need for reliable fuel leak detection technologies to provide safety and reduce environmental risks. Hydrocarbon leaks (gas or liquid) pose an extreme danger and need to be detected very quickly to avoid potential disasters. Gas leaks have the greatest potential for causing damage due to the explosion risk from the dispersion of gas clouds. This paper describes progress towards the development of a fast response, high sensitivity, distributed fiber optic fuel leak detection (HySensTM) system based on the use of an optical fiber that uses a hydrocarbon sensitive fluorescent coating to detect the presence of fuel leaks present in close proximity along the length of the sensor fiber. The HySenseTM system operates in two modes, leak detection and leak localization, and will trigger an alarm within seconds of exposure contact. The fast and accurate response of the sensor provides reliable fluid leak detection for pipelines, tanks, airports, pumps, and valves to detect and minimize any potential catastrophic damage.

  3. Automated macromolecular crystal detection system and method

    DOEpatents

    Christian, Allen T.; Segelke, Brent; Rupp, Bernard; Toppani, Dominique

    2007-06-05

    An automated macromolecular method and system for detecting crystals in two-dimensional images, such as light microscopy images obtained from an array of crystallization screens. Edges are detected from the images by identifying local maxima of a phase congruency-based function associated with each image. The detected edges are segmented into discrete line segments, which are subsequently geometrically evaluated with respect to each other to identify any crystal-like qualities such as, for example, parallel lines, facing each other, similarity in length, and relative proximity. And from the evaluation a determination is made as to whether crystals are present in each image.

  4. Edge detection techniques for iris recognition system

    NASA Astrophysics Data System (ADS)

    Tania, U. T.; Motakabber, S. M. A.; Ibrahimy, M. I.

    2013-12-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate.

  5. Statistical Fault Detection & Diagnosis Expert System

    SciTech Connect

    Wegerich, Stephan

    1996-12-18

    STATMON is an expert system that performs real-time fault detection and diagnosis of redundant sensors in any industrial process requiring high reliability. After a training period performed during normal operation, the expert system monitors the statistical properties of the incoming signals using a pattern recognition test. If the test determines that statistical properties of the signals have changed, the expert system performs a sequence of logical steps to determine which sensor or machine component has degraded.

  6. Optoelectronic system for NO2 detection

    NASA Astrophysics Data System (ADS)

    Bielecki, Zbigniew; Pregowski, Piotr; Wojtas, Jacek

    2005-10-01

    This paper presents application of Cavity Ring-Down Spectroscopy (CRDS) and Cavity Enhanced Spectroscopic (CEAS) techniques with blue laser diodes-based system for nitrogen dioxide (NO2) detection. CES technique bases on integration of the light from a resonator. Since the integrated intensity is proportional to the decay time, the experimental signal can be related to the absorption process. The minimum detectable concentration of the absorber for a specific transition is inversely proportional to the effective sample-path length, and directly proportional to the minimum intensity fluctuation detected by a receiving system. In the presented system, the blue laser diode was mounted in a temperature-controlled housing. The light transmitted through the cavity was focused onto a PMT of H5783-03 type. The detector signal enters a lock-in amplifier and next a computer with a 16-bit data acquisition board.

  7. Damage detection in initially nonlinear systems

    SciTech Connect

    Bornn, Luke; Farrar, Charles; Park, Gyuhae

    2009-01-01

    The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

  8. Fault detection and diagnosis of HVAC systems

    SciTech Connect

    Han, C.Y.; Xiao, Y.; Ruther, C.J.

    1999-07-01

    This paper presents a model-based fault detection and diagnosis (FDD) system for building heating, ventilating, and air conditioning (HVAC). Model-based fault detection is based on the strategy of determining the difference or the residuals between the normal and the existing patterns. Their approach was to attack the problem on many levels of abstraction: from the signal level, controller programming level, and system component, all the way up to the information and knowledge processing level. The various issues of real implementation of the system and the processing of real-time on-line data in actual systems of campus buildings using the proven technology and off-the-shelf commercial tools are discussed. The research was based on input and output points and software control programs found in typical direct digital control systems used for variable-air-volume air handlers and VAV cooling and hot water reheat terminal units.

  9. System for detection of hazardous events

    DOEpatents

    Kulesz, James J.; Worley, Brian A.

    2006-05-23

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  10. System For Detection Of Hazardous Events

    DOEpatents

    Kulesz, James J [Oak Ridge, TN; Worley, Brian A [Knoxville, TN

    2005-08-16

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  11. Position Sensitive Detection System for Charged Particles

    SciTech Connect

    Coello, E. A.; Favela, F.; Curiel, Q.; Chavez, E; Huerta, A.; Varela, A.; Shapira, Dan

    2012-01-01

    The position sensitive detection system presented in this work employs the Anger logic algorithm to determine the position of the light spark produced by the passage of charged particles on a 170 x 170 x 10 mm3 scintillator material (PILOT-U). The detection system consists of a matrix of nine photomultipliers, covering a fraction of the back area of the scintillators. Tests made with a non-collimated alpha particle source together with a Monte Carlo simulation that reproduces the data, suggest an intrinsic position resolution of up to 6 mm is achieved.

  12. System for particle concentration and detection

    DOEpatents

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  13. Idaho Explosives Detection System: Development and Enhancements

    SciTech Connect

    Edward L Reber; Larry G. Blackwood; Andrew J. Edwards; Ann E. Egger; Paul J. Petersen

    2007-12-01

    The Idaho Explosives Detection System (IEDS) was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks carrying bulk explosives into military bases. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of sodium iodide (NaI) detectors. The two neutron generators are pulsed and synchronized. A computer connects to the system by Ethernet and is able to control the system remotely. The system was developed to detect bulk explosives in a medium size truck within a 5-minute measurement time. In 2004, a full-scale prototype IEDS system was built for testing and continued development. System performance was successfully tested using different types of real explosives with a variety of cargo at the INL from November 2005 through February 2006. Recently, the first deployable prototype system was constructed and shipped to Wright-Patterson Air Force Base in Ohio and will be in operation by March 2007. The capability of passively detecting radiological material within a delivery truck has also been added.

  14. Network Anomaly Detection Based on Wavelet Analysis

    NASA Astrophysics Data System (ADS)

    Lu, Wei; Ghorbani, Ali A.

    2008-12-01

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal modelling technique for detecting network anomalies, combining the wavelet approximation and system identification theory. In order to characterize network traffic behaviors, we present fifteen features and use them as the input signals in our system. We then evaluate our approach with the 1999 DARPA intrusion detection dataset and conduct a comprehensive analysis of the intrusions in the dataset. Evaluation results show that the approach achieves high-detection rates in terms of both attack instances and attack types. Furthermore, we conduct a full day's evaluation in a real large-scale WiFi ISP network where five attack types are successfully detected from over 30 millions flows.

  15. Performance Evaluation of Hyperspectral Chemical Detection Systems

    NASA Astrophysics Data System (ADS)

    Truslow, Eric

    Remote sensing of chemical vapor plumes is a difficult but important task with many military and civilian applications. Hyperspectral sensors operating in the long wave infrared (LWIR) regime have well demonstrated detection capabilities. However, the identification of a plume's chemical constituents, based on a chemical library, is a multiple hypothesis-testing problem that standard detection metrics do not fully describe. Our approach partitions and weights a confusion matrix to develop both the standard detection metrics and an identification metric based on the Dice index. Using the developed metrics, we demonstrate that using a detector bank followed by an identifier can achieve superior performance relative to either algorithm individually. Performance of the cascaded system relies on the first pass reliably detecting the plume. However, detection performance is severely hampered by the inclusion of plume pixels in estimates of background quantities. We demonstrate that this problem, known as contamination, can be mitigated by iteratively applying a spatial filter to the detected pixels. Multiple detection and filtering passes can remove nearly all contamination from the background estimates, a vast improvement over single-pass techniques.

  16. Spark discharge trace element detection system

    DOEpatents

    Adler-Golden, Steven; Bernstein, Lawrence S.; Bien, Fritz

    1988-01-01

    A spark discharge trace element detection system is provided which includes a spark chamber including a pair of electrodes for receiving a sample of gas to be analyzed at no greater than atmospheric pressure. A voltage is provided across the electrodes for generating a spark in the sample. The intensity of the emitted radiation in at least one primary selected narrow band of the radiation is detected. Each primary band corresponds to an element to be detected in the gas. The intensity of the emission in each detected primary band is integrated during the afterglow time interval of the spark emission and a signal representative of the integrated intensity of the emission in each selected primary bond is utilized to determine the concentration of the corresponding element in the gas.

  17. Spark discharge trace element detection system

    DOEpatents

    Adler-Golden, S.; Bernstein, L.S.; Bien, F.

    1988-08-23

    A spark discharge trace element detection system is provided which includes a spark chamber including a pair of electrodes for receiving a sample of gas to be analyzed at no greater than atmospheric pressure. A voltage is provided across the electrodes for generating a spark in the sample. The intensity of the emitted radiation in at least one primary selected narrow band of the radiation is detected. Each primary band corresponds to an element to be detected in the gas. The intensity of the emission in each detected primary band is integrated during the afterglow time interval of the spark emission and a signal representative of the integrated intensity of the emission in each selected primary bond is utilized to determine the concentration of the corresponding element in the gas. 12 figs.

  18. Materiel requirements for airborne minefield detection system

    NASA Astrophysics Data System (ADS)

    Bertsche, Karl A.; Huegle, Helmut

    1997-07-01

    Within the concept study, Material Requirements for an airborne minefield detection systems (AMiDS) the following topics were investigated: (i) concept concerning airborne minefield detection technique sand equipment, (ii) verification analysis of the AMiDS requirements using simulation models and (iii) application concept of AMiDS with regard o tactics and military operations. In a first approach the problems concerning unmanned airborne minefield detection techniques within a well-defined area were considered. The complexity of unmanned airborne minefield detection is a result of the following parameters: mine types, mine deployment methods, tactical requirements, topography, weather conditions, and the size of the area to be searched. In order to perform the analysis, a simulation model was developed to analyze the usability of the proposed remote controlled air carriers. The basic flight patterns for the proposed air carriers, as well as the preparation efforts of military operations and benefits of such a system during combat support missions were investigated. The results of the conceptual study showed that a proposed remote controlled helicopter drone could meet the stated German MOD scanning requirements of mine barriers. Fixed wing air carriers were at a definite disadvantage because of their inherently large turning loops. By implementing a mine detection system like AMiDS minefields can be reconnoitered before an attack. It is therefore possible either to plan, how the minefields can be circumvented or where precisely breaching lanes through the mine barriers are to be cleared for the advancing force.

  19. Occurrence of seawater intrusion overshoot

    NASA Astrophysics Data System (ADS)

    Morgan, Leanne K.; Bakker, Mark; Werner, Adrian D.

    2015-04-01

    A number of numerical modeling studies of transient sea level rise (SLR) and seawater intrusion (SI) in flux-controlled aquifer systems have reported an overshoot phenomenon, whereby the freshwater-saltwater interface temporarily extends further inland than the eventual steady state position. Recently, physical sand-tank modeling has shown overshoot to be a physical process. In this paper, we have carried out numerical modeling of SLR-SI to demonstrate that overshoot can occur at the field scale within unconfined aquifers. This result is contrary to previous conclusions drawn from a restricted number of cases. In addition, we show that SI overshoot is plausible under scenarios of gradual sea level rise that are consistent with conditions predicted by the Intergovernmental Panel for Climate Change. Overshoot was found to be largest in flux-controlled unconfined aquifers characterized by low freshwater flux, high specific yield, and large inland extent. These conditions result in longer timeframes for the aquifer to reach new steady state conditions following SLR, and the extended period prior to reequilibration of the groundwater flow field produces more extensive overshoot.

  20. Immunity-Based Aircraft Fault Detection System

    NASA Technical Reports Server (NTRS)

    Dasgupta, D.; KrishnaKumar, K.; Wong, D.; Berry, M.

    2004-01-01

    In the study reported in this paper, we have developed and applied an Artificial Immune System (AIS) algorithm for aircraft fault detection, as an extension to a previous work on intelligent flight control (IFC). Though the prior studies had established the benefits of IFC, one area of weakness that needed to be strengthened was the control dead band induced by commanding a failed surface. Since the IFC approach uses fault accommodation with no detection, the dead band, although it reduces over time due to learning, is present and causes degradation in handling qualities. If the failure can be identified, this dead band can be further A ed to ensure rapid fault accommodation and better handling qualities. The paper describes the application of an immunity-based approach that can detect a broad spectrum of known and unforeseen failures. The approach incorporates the knowledge of the normal operational behavior of the aircraft from sensory data, and probabilistically generates a set of pattern detectors that can detect any abnormalities (including faults) in the behavior pattern indicating unsafe in-flight operation. We developed a tool called MILD (Multi-level Immune Learning Detection) based on a real-valued negative selection algorithm that can generate a small number of specialized detectors (as signatures of known failure conditions) and a larger set of generalized detectors for unknown (or possible) fault conditions. Once the fault is detected and identified, an adaptive control system would use this detection information to stabilize the aircraft by utilizing available resources (control surfaces). We experimented with data sets collected under normal and various simulated failure conditions using a piloted motion-base simulation facility. The reported results are from a collection of test cases that reflect the performance of the proposed immunity-based fault detection algorithm.

  1. DCE Bio Detection System Final Report

    SciTech Connect

    Lind, Michael A.; Batishko, Charles R.; Morgen, Gerald P.; Owsley, Stanley L.; Dunham, Glen C.; Warner, Marvin G.; Willett, Jesse A.

    2007-12-01

    The DCE (DNA Capture Element) Bio-Detection System (Biohound) was conceived, designed, built and tested by PNNL under a MIPR for the US Air Force under the technical direction of Dr. Johnathan Kiel and his team at Brooks City Base in San Antonio Texas. The project was directed toward building a measurement device to take advantage of a unique aptamer based assay developed by the Air Force for detecting biological agents. The assay uses narrow band quantum dots fluorophores, high efficiency fluorescence quenchers, magnetic micro-beads beads and selected aptamers to perform high specificity, high sensitivity detection of targeted biological materials in minutes. This final report summarizes and documents the final configuration of the system delivered to the Air Force in December 2008

  2. A Web Based Cardiovascular Disease Detection System.

    PubMed

    Alshraideh, Hussam; Otoom, Mwaffaq; Al-Araida, Aseel; Bawaneh, Haneen; Bravo, José

    2015-10-01

    Cardiovascular Disease (CVD) is one of the most catastrophic and life threatening health issue nowadays. Early detection of CVD is an important solution to reduce its devastating effects on health. In this paper, an efficient CVD detection algorithm is identified. The algorithm uses patient demographic data as inputs, along with several ECG signal features extracted automatically through signal processing techniques. Cross-validation results show a 98.29 % accuracy for the decision tree classification algorithm. The algorithm has been integrated into a web based system that can be used at anytime by patients to check their heart health status. At one end of the system is the ECG sensor attached to the patient's body, while at the other end is the detection algorithm. Communication between the two ends is done through an Android application. PMID:26293754

  3. Methods and systems for detection of radionuclides

    DOEpatents

    Coates, Jr., John T.; DeVol, Timothy A.

    2010-05-25

    Disclosed are materials and systems useful in determining the existence of radionuclides in an aqueous sample. The materials provide the dual function of both extraction and scintillation to the systems. The systems can be both portable and simple to use, and as such can beneficially be utilized to determine presence and optionally concentration of radionuclide contamination in an aqueous sample at any desired location and according to a relatively simple process without the necessity of complicated sample handling techniques. The disclosed systems include a one-step process, providing simultaneous extraction and detection capability, and a two-step process, providing a first extraction step that can be carried out in a remote field location, followed by a second detection step that can be carried out in a different location.

  4. Digital radiographic systems detect boiler tube cracks

    SciTech Connect

    Walker, S.

    2008-06-15

    Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

  5. Detection of abrupt changes in dynamic systems

    NASA Technical Reports Server (NTRS)

    Willsky, A. S.

    1984-01-01

    Some of the basic ideas associated with the detection of abrupt changes in dynamic systems are presented. Multiple filter-based techniques and residual-based method and the multiple model and generalized likelihood ratio methods are considered. Issues such as the effect of unknown onset time on algorithm complexity and structure and robustness to model uncertainty are discussed.

  6. Portable light detection system for the blind

    NASA Technical Reports Server (NTRS)

    Wilber, R. L.; Carpenter, B. L.

    1973-01-01

    System can be used to detect "ready" light on automatic cooking device, to tell if lights are on for visitors, or to tell whether it is daylight or dark outside. Device is actuated like flashlight. Light impinging on photo cell activates transistor which energizes buzzer to indicate presence of light.

  7. Nuclear resonance fluorescence imaging in non-intrusive cargo inspection

    NASA Astrophysics Data System (ADS)

    Bertozzi, William; Ledoux, Robert J.

    2005-12-01

    Nuclear resonance fluorescence is able to non-intrusively interrogate a region space and measure the isotopic content of the material in that space for any element with atomic number greater than that of helium. The technique involves exposing material to a continuous energy distribution of photons and detecting the scattered photons that have a discrete energy distribution unique to an isotope. The interrogating photons, which range from 2 to 8 MeV, are the most penetrating probes and can "see" through many inches of steel. Determination of the chemical components of the material occupying a region of space greatly enhances the identification of threats such as explosives, fissile materials, toxic materials and weapons of mass destruction. Systems can be designed to involve minimal operator intervention, to minimize dose to the sample, and to provide high throughput at commercial seaports, airports and other entry points.

  8. Landmine detection by 3D GPR system

    NASA Astrophysics Data System (ADS)

    Sato, Motoyuki; Yokota, Yuya; Takahashi, Kazunori; Grasmueck, Mark

    2012-06-01

    In order to demonstrate the possibility of Ground Penetrating Radar (GPR) for detection of small buried objects such as landmine and UXO, conducted demonstration tests by using the 3DGPR system, which is a GPR system combined with high accuracy positing system using a commercial laser positioning system (iGPS). iGPS can provide absolute and better than centimetre precise x,y,z coordinates to multiple mine sensors at the same time. The developed " 3DGPR" system is efficient and capable of high-resolution 3D shallow subsurface scanning of larger areas (25 m2 to thousands of square meters) with irregular topography . Field test by using a 500MHz GPR system equipped with 3DGPR system was conducted. PMN-2 and Type-72 mine models have been buried at the depth of 5-20cm in sand. We could demonstrate that the 3DGPR can visualize each of these buried land mines very clearly.

  9. Network intrusion detector: NID user`s guide V 1.0

    SciTech Connect

    Palasek, R.

    1994-04-01

    The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

  10. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...) Each fire detection system must be divided into zones to limit the area covered by any particular...

  11. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...) Each fire detection system must be divided into zones to limit the area covered by any particular...

  12. A Sensor System for Automatic Detection of Food Intake Through Non-Invasive Monitoring of Chewing

    PubMed Central

    Sazonov, Edward S.; Fontana, Juan M.

    2012-01-01

    Objective and automatic sensor systems to monitor ingestive behavior of individuals arise as a potential solution to replace inaccurate method of self-report. This paper presents a simple sensor system and related signal processing and pattern recognition methodologies to detect periods of food intake based on non-invasive monitoring of chewing. A piezoelectric strain gauge sensor was used to capture movement of the lower jaw from 20 volunteers during periods of quiet sitting, talking and food consumption. These signals were segmented into non-overlapping epochs of fixed length and processed to extract a set of 250 time and frequency domain features for each epoch. A forward feature selection procedure was implemented to choose the most relevant features, identifying from 4 to 11 features most critical for food intake detection. Support vector machine classifiers were trained to create food intake detection models. Twenty-fold cross-validation demonstrated per-epoch classification accuracy of 80.98% and a fine time resolution of 30 s. The simplicity of the chewing strain sensor may result in a less intrusive and simpler way to detect food intake. The proposed methodology could lead to the development of a wearable sensor system to assess eating behaviors of individuals. PMID:22675270

  13. APDS: The Autonomous Pathogen Detection System

    SciTech Connect

    Hindson, B; Makarewicz, A; Setlur, U; Henderer, B; McBride, M; Dzenitis, J

    2004-10-04

    We have developed and tested a fully autonomous pathogen detection system (APDS) capable of continuously monitoring the environment for airborne biological threat agents. The system was developed to provide early warning to civilians in the event of a bioterrorism incident and can be used at high profile events for short-term, intensive monitoring or in major public buildings or transportation nodes for long-term monitoring. The APDS is completely automated, offering continuous aerosol sampling, in-line sample preparation fluidics, multiplexed detection and identification immunoassays, and nucleic-acid based polymerase chain reaction (PCR) amplification and detection. Highly multiplexed antibody-based and duplex nucleic acid-based assays are combined to reduce false positives to a very low level, lower reagent costs, and significantly expand the detection capabilities of this biosensor. This article provides an overview of the current design and operation of the APDS. Certain sub-components of the ADPS are described in detail, including the aerosol collector, the automated sample preparation module that performs multiplexed immunoassays with confirmatory PCR, and the data monitoring and communications system. Data obtained from an APDS that operated continuously for seven days in a major U.S. transportation hub is reported.

  14. APDS: the autonomous pathogen detection system.

    PubMed

    Hindson, Benjamin J; Makarewicz, Anthony J; Setlur, Ujwal S; Henderer, Bruce D; McBride, Mary T; Dzenitis, John M

    2005-04-15

    We have developed and tested a fully autonomous pathogen detection system (APDS) capable of continuously monitoring the environment for airborne biological threat agents. The system was developed to provide early warning to civilians in the event of a bioterrorism incident and can be used at high profile events for short-term, intensive monitoring or in major public buildings or transportation nodes for long-term monitoring. The APDS is completely automated, offering continuous aerosol sampling, in-line sample preparation fluidics, multiplexed detection and identification immunoassays, and nucleic acid-based polymerase chain reaction (PCR) amplification and detection. Highly multiplexed antibody-based and duplex nucleic acid-based assays are combined to reduce false positives to a very low level, lower reagent costs, and significantly expand the detection capabilities of this biosensor. This article provides an overview of the current design and operation of the APDS. Certain sub-components of the ADPS are described in detail, including the aerosol collector, the automated sample preparation module that performs multiplexed immunoassays with confirmatory PCR, and the data monitoring and communications system. Data obtained from an APDS that operated continuously for 7 days in a major U.S. transportation hub is reported. PMID:15741059

  15. Laser Schlieren System Detects Sounds Of Leaks

    NASA Technical Reports Server (NTRS)

    Shakkottai, Parthasarathy P.; Alwar, A. Vijayaragavan

    1990-01-01

    Hostile environments monitored safely and noninvasively. Modified laser schlieren system acts as microphone to detect sounds of leaks remotely. Sensitive to acoustical frequencies above audible range and especially suited for monitoring leaks of high-pressure steam from boilers or chemical vapors from processing equipment. Does not require placement of delicate equipment in harsh environment monitored, and no contact needed with boiler or other unit being monitored. Detects sound waves via variation of index of refraction of air at acoustical frequencies. Used to monitor sound frequencies beyond range of human hearing.

  16. Portable chemical detection system with intergrated preconcentrator

    DOEpatents

    Baumann, Mark J.; Brusseau, Charles A.; Hannum, David W.; Linker, Kevin L.

    2005-12-27

    A portable system for the detection of chemical particles such as explosive residue utilizes a metal fiber substrate that may either be swiped over a subject or placed in a holder in a collection module which can shoot a jet of gas at the subject to dislodge residue, and then draw the air containing the residue into the substrate. The holder is then placed in a detection module, which resistively heats the substrate to evolve the particles, and provides a gas flow to move the particles to a miniature detector in the module.

  17. Method and system for detecting an explosive

    DOEpatents

    Reber, Edward L.; Rohde, Kenneth W.; Blackwood, Larry G.

    2010-12-07

    A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

  18. Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts

    NASA Astrophysics Data System (ADS)

    Chen, Siyue; Leung, Henry; Dondo, Maxwell

    2014-05-01

    As computer network security threats increase, many organizations implement multiple Network Intrusion Detection Systems (NIDS) to maximize the likelihood of intrusion detection and provide a comprehensive understanding of intrusion activities. However, NIDS trigger a massive number of alerts on a daily basis. This can be overwhelming for computer network security analysts since it is a slow and tedious process to manually analyse each alert produced. Thus, automated and intelligent clustering of alerts is important to reveal the structural correlation of events by grouping alerts with common features. As the nature of computer network attacks, and therefore alerts, is not known in advance, unsupervised alert clustering is a promising approach to achieve this goal. We propose a joint optimization technique for feature selection and clustering to aggregate similar alerts and to reduce the number of alerts that analysts have to handle individually. More precisely, each identified feature is assigned a binary value, which reflects the feature's saliency. This value is treated as a hidden variable and incorporated into a likelihood function for clustering. Since computing the optimal solution of the likelihood function directly is analytically intractable, we use the Expectation-Maximisation (EM) algorithm to iteratively update the hidden variable and use it to maximize the expected likelihood. Our empirical results, using a labelled Defense Advanced Research Projects Agency (DARPA) 2000 reference dataset, show that the proposed method gives better results than the EM clustering without feature selection in terms of the clustering accuracy.

  19. The Mount Rainier Lahar Detection System

    NASA Astrophysics Data System (ADS)

    Lockhart, A. B.; Murray, T. L.

    2003-12-01

    To mitigate the risk of unheralded lahars from Mount Rainier, the U.S. Geological Survey, in cooperation with Pierce County, Washington, installed a lahar-detection system on the Puyallup and Carbon rivers that originate on Mount Rainier's western slopes. The system, installed in 1998, is designed to automatically detect the passage of lahars large enough to potentially affect populated areas downstream (approximate volume threshold 40 million cubic meters), while ignoring small lahars, earthquakes, extreme weather and floods. Along each river valley upstream, arrays of independent lahar-monitoring stations equipped with geophones and short tripwires telemeter data to a pair of redundant computer base stations located in and near Tacoma at existing public safety facilities that are staffed around the clock. Monitored data consist of ground-vibration levels, tripwire status, and transmissions at regular intervals. The base stations automatically evaluate these data to determine if a dangerous lahar is passing through the station array. The detection algorithm requires significant ground vibration to occur at those stations in the array that are above the anticipated level of inundation, while lower level `deadman' stations, inundated by the flow, experience tripwire breakage or are destroyed. Once a base station detects a lahar, it alerts staff who execute a call-down of public-safety officials and schools, initiating evacuation of areas potentially at risk. Because the system's risk-mitigation task imposes high standards of reliability on all components, it has been under test for several years. To date, the system has operated reliably and without false alarms, including during the nearby M6.8 Nisqually Earthquake on February 28, 2001. The system is being turned over to Pierce County, and activated as part of their lahar warning system.

  20. Antigenemia detected by radioimmunoassay in systemic aspergillosis

    SciTech Connect

    Weiner, M.H.

    1980-06-01

    Because of difficulties in antemortem diagnosis of systemic aspergillosis, a radioimmunoassay to an Aspergillus fumigatus carbohydrate was developed and evaluated in patients with mycotic or bacterial infections. Antigenemia was detected in sera obtained antemortem from four of seven patients with systemic aspergillosis and in pleural fluid from an Aspergillus empyema but not in control sera or pleural fluid from 43 patients or 27 normal donors. When characterized with reference to onset of disease, antigenemia was an early sign of infection. This study shows the usefulness of the Aspergillus antigen radioimmunoassay for early, specific immunodiagnosis of systemic aspergillosis.

  1. Statistical Fault Detection & Diagnosis Expert System

    Energy Science and Technology Software Center (ESTSC)

    1996-12-18

    STATMON is an expert system that performs real-time fault detection and diagnosis of redundant sensors in any industrial process requiring high reliability. After a training period performed during normal operation, the expert system monitors the statistical properties of the incoming signals using a pattern recognition test. If the test determines that statistical properties of the signals have changed, the expert system performs a sequence of logical steps to determine which sensor or machine component hasmore » degraded.« less

  2. Deformation monitoring of the 2014 dyke intrusion and eruption within the Bárðarbunga volcanic system, and associated stress triggering at neighbouring volcanoes

    NASA Astrophysics Data System (ADS)

    Parks, Michelle; Árnadóttir, Thóra; Dumont, Stéphanie; Sigmundsson, Freysteinn; Hooper, Andrew; Drouin, Vincent; Ófeigsson, Benedikt; María Friðriksdóttir, Hildur; Hreinsdóttir, Sigrún; Rafn Heimisson, Elías; Vogfjörd, Kristín; Jónsdóttir, Kristín; Hensch, Martin; Guðmundsson, Gunnar; Magnússon, Eyjólfur; Einarsson, Páll; Rut Hjartardóttir, Ásta; Pedersen, Rikke

    2015-04-01

    The recent unrest and activity within the Bárðarbunga volcanic system, Iceland was initially identified by the onset of an intense earthquake swarm on the 16th August 2014 and concurrent movement registered at several nearby continuous GPS (cGPS) sites. Over the following weeks additional cGPS stations were installed, campaign sites were reoccupied and interferograms formed using X-band satellite images. Data were analysed in near real-time and used to map ground displacements associated with the initial dyke emplacement and propagation (NE of Bárðarbunga), responsible for the sudden unrest. On the 29th August 2014, a small fissure opened up just a few kilometers to the north of the Vatnajökull ice cap, at Holuhraun. The eruption lasted only a few hours, but was followed on 31st August by the onset of a fissure eruption, characterised by lava fountaining and the extrusion of extensive lava flows. The eruption continues at the time of writing (January 2015). We demonstrate how Interferometric Synthetic Aperture Radar (InSAR) analysis, in conjunction with GPS measurements and earthquake seismicity, has been instrumental in the continued monitoring of Bárðarbunga volcanic system since the onset of unrest. We also investigate how changes in the local stress field induced by the dyke intrusion and concurrent magma withdrawal may trigger seismicity and potentially renewed activity at neighbouring volcanoes. InSAR analysis has systematically been used throughout the eruption to monitor co-eruptive displacement in the vicinity of both the dyke and the eruption site, along with major co-eruptive subsidence occurring beneath the Bárðarbunga caldera - the latter is believed to have commenced shortly after the onset of the unrest and is associated with magma withdrawal beneath the central volcano, feeding the dyke and the ongoing eruption. We use Persistent Scatterer Interferometric Synthetic Aperture Radar (PS-InSAR) techniques to generate a time series of

  3. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  4. Detecting Anomalous Insiders in Collaborative Information Systems

    PubMed Central

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients’ records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients’ diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent. PMID:24489520

  5. An Automated Flying-Insect-Detection System

    NASA Technical Reports Server (NTRS)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2005-01-01

    An automated flying-insect-detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect's wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing beat signatures are preprocessed (Fourier transformed) in real-time to display a periodic signal. These signals are sent to the end user where they are graphically displayed. All AFIDS data are pre-processed in the field with the use of a laptop computer equipped with LABVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation.

  6. Detection and characterization of transient forcing episodes affecting earthquake activity in the Aleutian Arc system

    NASA Astrophysics Data System (ADS)

    Reverso, T.; Marsan, D.; Helmstetter, A.

    2015-02-01

    Crustal, slow deformation transients can be caused by fluid or magmatic intrusions, and by slow slip on faults. They can affect earthquake dynamics, if they occur close to or within seismically active zones. We here further develop, and test, a statistical method for detecting and characterizing seismicity anomalies that is only based on earthquake occurrence times and locations. We make use of this method to analyze the 2004-2013 seismicity at mc = 3.5 in the Aleutian subduction system, to find six statistically significant anomalies, with typical 1 day duration and 30 to 50 km size, that are likely related to slow deformation transients. They tend to be located in zones characterized by intermediate seismic coupling, and to mark the termination of past large to mega-thrust earthquakes. These anomalies account for a non-negligible (9%) part of the total activity, proving that non-stationary aseismic loading plays an important role in the dynamics of crustal deformation.

  7. Saltwater intrusion in coastal regions of North America

    NASA Astrophysics Data System (ADS)

    Barlow, Paul M.; Reichard, Eric G.

    2010-02-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  8. Tsunami Detection Systems for International Requirements

    NASA Astrophysics Data System (ADS)

    Lawson, R. A.

    2007-12-01

    Results are presented regarding the first commercially available, fully operational, tsunami detection system to have passed stringent U.S. government testing requirements and to have successfully demonstrated its ability to detect an actual tsunami at sea. Spurred by the devastation of the December 26, 2004, Indian Ocean tsunami that killed more than 230,000 people, the private sector actively supported the Intergovernmental Oceanographic Commission's (IOC"s) efforts to develop a tsunami warning system and mitigation plan for the Indian Ocean region. As each country in the region developed its requirements, SAIC recognized that many of these underdeveloped countries would need significant technical assistance to fully execute their plans. With the original focus on data fusion, consequence assessment tools, and warning center architecture, it was quickly realized that the cornerstone of any tsunami warning system would be reliable tsunami detection buoys that could meet very stringent operational standards. Our goal was to leverage extensive experience in underwater surveillance and oceanographic sensing to produce an enhanced and reliable deep water sensor that could meet emerging international requirements. Like the NOAA Deep-ocean Assessment and Recording of Tsunamis (DART TM ) buoy, the SAIC Tsunami Buoy (STB) system consists of three subsystems: a surfaccommunications buoy subsystem, a bottom pressure recorder subsystem, and a buoy mooring subsystem. With the operational success that DART has demonstrated, SAIC decided to build and test to the same high standards. The tsunami detection buoy system measures small changes in the depth of the deep ocean caused by tsunami waves as they propagate past the sensor. This is accomplished by using an extremely sensitive bottom pressure sensor/recorder to measure very small changes in pressure as the waves move past the buoy system. The bottom pressure recorder component includes a processor with algorithms that

  9. Multimodal imaging system for dental caries detection

    NASA Astrophysics Data System (ADS)

    Liang, Rongguang; Wong, Victor; Marcus, Michael; Burns, Peter; McLaughlin, Paul

    2007-02-01

    Dental caries is a disease in which minerals of the tooth are dissolved by surrounding bacterial plaques. A caries process present for some time may result in a caries lesion. However, if it is detected early enough, the dentist and dental professionals can implement measures to reverse and control caries. Several optical, nonionized methods have been investigated and used to detect dental caries in early stages. However, there is not a method that can singly detect the caries process with both high sensitivity and high specificity. In this paper, we present a multimodal imaging system that combines visible reflectance, fluorescence, and Optical Coherence Tomography (OCT) imaging. This imaging system is designed to obtain one or more two-dimensional images of the tooth (reflectance and fluorescence images) and a three-dimensional OCT image providing depth and size information of the caries. The combination of two- and three-dimensional images of the tooth has the potential for highly sensitive and specific detection of dental caries.

  10. The synchronous active neutron detection assay system

    SciTech Connect

    Pickrell, M.M.; Kendall, P.K.

    1994-08-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ``lock-in`` amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design.

  11. Gaseous hydrogen leakage optical fibre detection system

    NASA Astrophysics Data System (ADS)

    Trouillet, Alain; Veillas, Colette; Sigronde, E.; Gagnaire, Henri; Clement, Michel

    2004-06-01

    Liquid hydrogen has been intensively used in aerospace applications during the past forty years and is of great interest for fuel cells technologies and future automotive applications. Following upon major explosive risks due to the use of hydrogen in air, previous studies were carried out in our laboratory in order to develop optical fiber sensors for the detection of hydrogen leakage. This communication is aimed towards a prototype optical fiber system designed for the detection of gaseous hydrogen leakage near the conecting flanges of the liquid hydrogen pipes on the test bench of the engine Vulcain of the rocket ARIANE V. Depending on the configuration, the prototype sensor provides a two-level alarm signal and the detection of gaseous hydrogen leakage is possible for concentrations lower than the lower explosive limit in air (between 0.1 and 4%) with alarm response times lower than 10 seconds in a wide range of temperatures between -35°C and 300°C. The sensing principle based on palladium-hydrogen interaction is presented as well as the detection system composed of an optical fiber probe and an optoelectronic device.

  12. A System for Traffic Violation Detection

    PubMed Central

    Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio

    2014-01-01

    This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations. PMID:25421737

  13. In-Situ Wire Damage Detection System

    NASA Technical Reports Server (NTRS)

    Williams, Martha; Roberson, Luke; Tate, Lanetra; Smith, Trent; Gibson, Tracy; Medelius, Pedro; Jolley, Scott

    2012-01-01

    An In-Situ Wire Damage Detection System (ISWDDS) has been developed that is capable of detecting damage to a wire insulation, or a wire conductor, or to both. The system will allow for realtime, continuous monitoring of wiring health/integrity and reduce the number of false negatives and false positives while being smaller, lighter in weight, and more robust than current systems. The technology allows for improved safety and significant reduction in maintenance hours for aircraft, space vehicles, satellites, and other critical high-performance wiring systems for industries such as energy production and mining. The integrated ISWDDS is comprised of two main components: (1) a wire with an innermost core conductor, an inner insulation film, a conductive layer or inherently conductive polymer (ICP) covering the inner insulation film, an outermost insulation jacket; and (2) smart connectors and electronics capable of producing and detecting electronic signals, and a central processing unit (CPU) for data collection and analysis. The wire is constructed by applying the inner insulation films to the conductor, followed by the outer insulation jacket. The conductive layer or ICP is on the outer surface of the inner insulation film. One or more wires are connected to the CPU using the smart connectors, and up to 64 wires can be monitored in real-time. The ISWDDS uses time domain reflectometry for damage detection. A fast-risetime pulse is injected into either the core conductor or conductive layer and referenced against the other conductor, producing transmission line behavior. If either conductor is damaged, then the signal is reflected. By knowing the speed of propagation of the pulse, and the time it takes to reflect, one can calculate the distance to and location of the damage.

  14. An Automated Flying-Insect Detection System

    NASA Technical Reports Server (NTRS)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2007-01-01

    An automated flying-insect detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland-security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect s wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing-beat signatures are preprocessed (Fourier transformed) in real time to display a periodic signal. These signals are sent to the end user where they are graphically. All AFIDS data are preprocessed in the field with the use of a laptop computer equipped with LabVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al-GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing-beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation. Preliminary data indicate that AFIDS has

  15. Intrusion detection and monitoring for wireless networks.

    SciTech Connect

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  16. System and method for detecting gas

    SciTech Connect

    Chow, Oscar Ken; Moulthrop, Lawrence Clinton; Dreier, Ken Wayne; Miller, Jacob Andrew

    2010-03-16

    A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

  17. In-Situ Wire Damage Detection System

    NASA Technical Reports Server (NTRS)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  18. Microwave System for Detecting Ice on Aircraft

    NASA Technical Reports Server (NTRS)

    Joseph, Philip J.; Glynn, Dennis P., Jr.; Joseph, John C.

    2004-01-01

    A microwave-based system has been developed as a means of detecting ice on aircraft surfaces, with enough sensitivity to provide a warning before the ice accretes to a dangerous thickness. The system can measure the thickness of ice from a few mils (1 mil = 0.0254 mm) to about 1/4 in. (.6 mm) and can distinguish among (1) ice, (2) water (or deicing fluid), and (3) a mixture of ice and water (or deicing fluid). Sensors have been ruggedized to withstand the rain erosion environment.

  19. Research of laser ignition detection system

    NASA Astrophysics Data System (ADS)

    Yang, Feng; Zhao, Dong; Xu, Qie; Ai, Xin

    2010-10-01

    Laser ignition is an important means of detonation but the accuracy and security is requested strictly. Based on the above, two points were considered in the design: achieve ignition-Fiber-optical health monitoring in the condition of low-intensity light (ensure the safety of gunpowder); observant the explosive imaging. In the paper, the laser ignition equipment was designed with optical detection and inner optical imaging system for the real-time monitoring to the optical fiber and the process of ignition. This design greatly improved the reliability and the safety of laser ignition system and provided the guarantee for usage and industrialization.

  20. The synchronous active neutron detection assay system

    SciTech Connect

    Pickrell, M.M.; Kendall, P.K.

    1994-09-01

    The authors have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. They are using a Schlumberger neutron generator for the direct measurement of the fissile material content in spent fuel, in place of the indirect measures used at present. The technique they are investigating is termed synchronous active neutron detection (SAND). It closely follows a method that has been used routinely in other branches of physics for the detection of very small signals in the presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ``lock-in`` amplifiers. They have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The results to data are preliminary but quite promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly. It also appears to be quite resilient to background neutron interference.

  1. Global ionospheric flare detection system (GIFDS)

    NASA Astrophysics Data System (ADS)

    Wenzel, Daniela; Jakowski, Norbert; Berdermann, Jens; Mayer, Christoph; Valladares, Cesar; Heber, Bernd

    2016-02-01

    The Global Ionospheric Flare Detection System (GIFDS) is currently under development at the German Aerospace Center as a ground based detector for continuous monitoring of the solar flare activity in order to provide real time warnings on solar X-ray events. GIFDS is using Very Low Frequency (VLF) radio transmissions in the northern hemisphere which respond to enhanced ionization in the bottomside ionosphere caused by X-ray flares. Since solar flares can only be detected during daytime, VLF receivers have to be installed around the globe to guarantee continuous records at the dayside sector. GIFDS consists of a network of Perseus SDR (Software Defined Radio) receivers equipped with a MiniWhip antenna each. Reliable detection of solar flares is ensured by recording multiple frequency channels ranging from 0 to 500 kHz. The applicability of the system is demonstrated in a first analysis by comparing VLF measurements with GOES's (Geostationary Operational Environmental Satellite) X-ray flux data. The high potential of GIFDS for a permanent monitoring of solar flares in near real time is discussed.

  2. Advanced kick detection systems improve HPHT operations

    SciTech Connect

    Harris, T.W.R.; Hendriks, P.; Surewaard, J.H.G.

    1995-09-01

    Many high-pressure, high-temperature (HPHT) wells are often characterized by the small margins that can exist between pore pressure and formation strength. Therefore, it is not surprising that kicks are far more likely to occur in HPHT wells and that a greater risk of internal blowout exists. The development and application of advanced kick detection systems for HPHT wells can help manage risks and improve drilling efficiency. Such systems enable earlier well shut-in, minimizing both the influx volume and the subsequent well bore pressures. This in turn lowers the risk, time and cost required for well control operations. Carefully considered application of these systems can also justify favorable economic benefits by optimization of the HPHT preliminary casing design. Minimizing kick volume can be important for the critical HPHT hole sections, where a reduced operating margin between pore pressure and fracture gradient exists, defining small design kick tolerance limits to permit safe drilling ahead to reach specified objectives. Kick detection for HPHT wells equivalent to less than 5 bbl of gas influx are often necessary to adequately minimize the risk of internal blowout and obtain the same levels of safety which are applied to conventional wells. This paper reviews these systems for both on-shore and off-shore operations.

  3. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and... alarm and an audible alarm in the pilothouse or at a normally manned control station for the system....

  4. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and... alarm and an audible alarm in the pilothouse or at a normally manned control station for the system....

  5. Arc burst pattern analysis fault detection system

    NASA Technical Reports Server (NTRS)

    Russell, B. Don (Inventor); Aucoin, B. Michael (Inventor); Benner, Carl L. (Inventor)

    1997-01-01

    A method and apparatus are provided for detecting an arcing fault on a power line carrying a load current. Parameters indicative of power flow and possible fault events on the line, such as voltage and load current, are monitored and analyzed for an arc burst pattern exhibited by arcing faults in a power system. These arcing faults are detected by identifying bursts of each half-cycle of the fundamental current. Bursts occurring at or near a voltage peak indicate arcing on that phase. Once a faulted phase line is identified, a comparison of the current and voltage reveals whether the fault is located in a downstream direction of power flow toward customers, or upstream toward a generation station. If the fault is located downstream, the line is de-energized, and if located upstream, the line may remain energized to prevent unnecessary power outages.

  6. Optical imaging module for astigmatic detection system.

    PubMed

    Wang, Wei-Min; Cheng, Chung-Hsiang; Molnar, Gabor; Hwang, Ing-Shouh; Huang, Kuang-Yuh; Danzebrink, Hans-Ulrich; Hwu, En-Te

    2016-05-01

    In this paper, an optical imaging module design for an astigmatic detection system (ADS) is presented. The module is based on a commercial optical pickup unit (OPU) and it contains a coaxial illuminant for illuminating a specimen. Furthermore, the imaging module facilitates viewing the specimen and the detection laser spot of the ADS with a lateral resolution of approximately 1 μm without requiring the removal of an element of the OPU. Two polarizers and one infrared filter are used to eliminate stray laser light in the OPU and stray light produced by the illuminant. Imaging modules designed for digital versatile disks (DVDs) and Blu-ray DVDs were demonstrated. Furthermore, the module can be used for imaging a small cantilever with approximate dimensions of 2 μm (width) × 5 μm (length), and therefore, it has the potential to be used in high-speed atomic force microscopy. PMID:27250434

  7. System and method for anomaly detection

    DOEpatents

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  8. Number of Waste Package Hit by Igneous Intrusion

    SciTech Connect

    M. Wallace

    2004-10-13

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios.

  9. Automated Microbiological Detection/Identification System

    PubMed Central

    Aldridge, C.; Jones, P. W.; Gibson, S.; Lanham, J.; Meyer, M.; Vannest, R.; Charles, R.

    1977-01-01

    An automated, computerized system, the AutoMicrobic System, has been developed for the detection, enumeration, and identification of bacteria and yeasts in clinical specimens. The biological basis for the system resides in lyophilized, highly selective and specific media enclosed in wells of a disposable plastic cuvette; introduction of a suitable specimen rehydrates and inoculates the media in the wells. An automated optical system monitors, and the computer interprets, changes in the media, with enumeration and identification results automatically obtained in 13 h. Sixteen different selective media were developed and tested with a variety of seeded (simulated) and clinical specimens. The AutoMicrobic System has been extensively tested with urine specimens, using a urine test kit (Identi-Pak) that contains selective media for Escherichia coli, Proteus species, Pseudomonas aeruginosa, Klebsiella-Enterobacter species, Serratia species, Citrobacter freundii, group D enterococci, Staphylococcus aureus, and yeasts (Candida species and Torulopsis glabrata). The system has been tested with 3,370 seeded urine specimens and 1,486 clinical urines. Agreement with simultaneous conventional (manual) cultures, at levels of 70,000 colony-forming units per ml (or more), was 92% or better for seeded specimens; clinical specimens yielded results of 93% or better for all organisms except P. aeruginosa, where agreement was 86%. System expansion in progress includes antibiotic susceptibility testing and compatibility with most types of clinical specimens. Images PMID:334798

  10. Supersensitive SQUID/magnetostrictor detecting system

    SciTech Connect

    Golovashkin, Aleksander I; Zherikhina, L N; Tskhovrebov, Andrei M; Izmailov, G N

    2012-12-31

    It is shown that using the state-of-the-art quantum interferometer (SQUID) with the resolution 10{sup -6} {Phi}{sub 0} Hz{sup -1/2} = 2.07 Multiplication-Sign 10{sup -21} Wb Hz{sup -1/2}, coupled to a magnetostrictor, playing the role of tensomagnetic transducer, it is possible to construct a system for detecting pressure variations with the ultimate sensitivity of 10{sup -13} Pa Hz{sup -1/2} and for measuring specific elongation with the sensitivity of 10{sup -24} Hz{sup -1/2}. The analysis of physical grounds of the inverse magnetostriction effect demonstrates concrete ways to essentially higher efficiency of tensomagnetic conversion. The estimates performed demonstrate the possibility of using the SQUID/magnetostrictor system as a detector of gravitational waves. Other possibilities of using this system for solving both fundamental and applied problems are also considered. (experimental techniques)

  11. Coherent detection in optical fiber systems.

    PubMed

    Ip, Ezra; Lau, Alan Pak Tao; Barros, Daniel J F; Kahn, Joseph M

    2008-01-21

    The drive for higher performance in optical fiber systems has renewed interest in coherent detection. We review detection methods, including noncoherent, differentially coherent, and coherent detection, as well as a hybrid method. We compare modulation methods encoding information in various degrees of freedom (DOF). Polarization-multiplexed quadrature-amplitude modulation maximizes spectral efficiency and power efficiency, by utilizing all four available DOF, the two field quadratures in the two polarizations. Dual-polarization homodyne or heterodyne downconversion are linear processes that can fully recover the received signal field in these four DOF. When downconverted signals are sampled at the Nyquist rate, compensation of transmission impairments can be performed using digital signal processing (DSP). Linear impairments, including chromatic dispersion and polarization-mode dispersion, can be compensated quasi-exactly using finite impulse response filters. Some nonlinear impairments, such as intra-channel four-wave mixing and nonlinear phase noise, can be compensated partially. Carrier phase recovery can be performed using feedforward methods, even when phase-locked loops may fail due to delay constraints. DSP-based compensation enables a receiver to adapt to time-varying impairments, and facilitates use of advanced forward-error-correction codes. We discuss both single- and multi-carrier system implementations. For a given modulation format, using coherent detection, they offer fundamentally the same spectral efficiency and power efficiency, but may differ in practice, because of different impairments and implementation details. With anticipated advances in analog-to-digital converters and integrated circuit technology, DSP-based coherent receivers at bit rates up to 100 Gbit/s should become practical within the next few years. PMID:18542153

  12. Bathroom watching using a breath detection system

    NASA Astrophysics Data System (ADS)

    Nishiura, Tomofumi; Nakajima, Masato

    2004-10-01

    Recently, domestic accidents have been increasing in Japan. These kinds of accidents occur in private areas such as bedrooms, toilets and bathrooms, and tend to be found too late. Accidents, particularly those occurring in the bathroom, can often result in death. Many systems which have been proposed or which are in use are designed to detect body motion in the bathroom, and determine that a bather has suddenly taken ill when movement ceases. However, the relaxed posture of a person bathing is actually very similar to that of a person who has passed out. It is therefore very difficult to differentiate between the two postures. We have developed a watching system for bathrooms. The new feature of this system lies in its ability to detect a person"s breathing by using an FG vision sensor. From the experiment, it was found that the false alarm rate is expected to reach less than 0.0001% when waiting time is set to 36.8 seconds.

  13. Detection of damage in axial (membrane) systems

    SciTech Connect

    Duffey, T.A.; Baker, W.E.; Farrar, C.R.; Rhee, W.H.

    1998-12-31

    In a recent paper, two methods of damage identification (Modified Damage Index and Change-in-Flexibility) were applied to detection of damage in an 8-DOF vibrating system. The goal of the work was to detect damage (reduction in stiffness of one or more of the elements) as well as to locate the particular damaged elements (S). However, the investigation was limited to numerical simulations only. In this paper, a physical, spring-mass model of a similar, degenerate 8-DOF system (7 normal modes plus a rigid-body mode) was constructed. Experiments were then performed and the modal properties of the system were determined in undamaged and damaged states. Excitation was provided either by an impact hammer or by an electromechanical shaker. Damage was induced by replacing one of the springs with a spring of lower stiffness. The Modified Damage Index method clearly isolated the location of damage for a variety of damage locations and levels of damage. The Change-in-Flexibility method, however, was found to be less reliable. The ability of the method to locate damage depended strongly on location and the level of damage as well as the number of modes included.

  14. WCEDS: A waveform correlation event detection system

    SciTech Connect

    Young, C.J.; Beiriger, J.I.; Trujillo, J.R.; Withers, M.M.; Aster, R.C.; Astiz, L.; Shearer, P.M.

    1995-08-01

    We have developed a working prototype of a grid-based global event detection system based on waveform correlation. The algorithm comes from a long-period detector but we have recast it in a full matrix formulation which can reduce the number of multiplications needed by better than two orders of magnitude for realistic monitoring scenarios. The reduction is made possible by eliminating redundant multiplications in the original formulation. All unique correlations for a given origin time are stored in a correlation matrix (C) which is formed by a full matrix product of a Master Image matrix (M) and a data matrix (D). The detector value at each grid point is calculated by following a different summation path through the correlation matrix. Master Images can be derived either empirically or synthetically. Our testing has used synthetic Master Images because their influence on the detector is easier to understand. We tested the system using the matrix formulation with continuous data from the IRIS (Incorporate Research Institutes for Seismology) broadband global network to monitor a 2 degree evenly spaced surface grid with a time discretization of 1 sps; we successfully detected the largest event in a two hour segment from October 1993. The output at the correct gridpoint was at least 33% larger than at adjacent grid points, and the output at the correct gridpoint at the correct origin time was more than 500% larger than the output at the same gridpoint immediately before or after. Analysis of the C matrix for the origin time of the event demonstrates that there are many significant ``false`` correlations of observed phases with incorrect predicted phases. These false correlations dull the sensitivity of the detector and so must be dealt with if our system is to attain detection thresholds consistent with a Comprehensive Test Ban Treaty (CTBT).

  15. Systems and methods for detecting and processing

    DOEpatents

    Johnson, Michael M.; Yoshimura, Ann S.

    2006-03-28

    Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

  16. Autonomous system for pathogen detection and identification

    NASA Astrophysics Data System (ADS)

    Belgrader, Philip; Benett, William J.; Bergman, Werner; Langlois, Richard G.; Mariella, Raymond P., Jr.; Milanovich, Fred P.; Miles, Robin R.; Venkateswaran, Kodumudi; Long, Gary; Nelson, William

    1999-01-01

    The purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world's leading, proven assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction for nucleic-acid based assays. With these assays, we must integrate the capability to: (1) collect samples form aerosols, water, or surface; (2) perform sample preparation prior to the assays; (3) incubate the prepared samples, if necessary, for a period of time; (4) transport the prepared, incubated samples to the assays; (5) perform the assays; (6) interpret and report the result of the assays. Issues such as reliability, sensitivity and accuracy, quantify of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify simulants for BW agents at concentrations of a few hundred colony- forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 1/min and concentrates the respirable particles into 1 ml of solution with 70 percent processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent- containing particle/liter of air.

  17. Autonomous system for pathogen detection and identification

    SciTech Connect

    Belgrader, P.; Benett, W.; Bergman, W.; Langlois, R.; Mariella, R.; Milanovich, F.; Miles, R.; Venkateswaran, K.; Long, G.; Nelson, W.

    1998-09-24

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world' s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify simulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air.

  18. System for Anomaly and Failure Detection (SAFD) system development

    NASA Technical Reports Server (NTRS)

    Oreilly, D.

    1993-01-01

    The System for Anomaly and Failure Detection (SAFD) algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failures as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient conditions. This task assignment originally specified developing a platform for executing the algorithm during hot fire tests at Technology Test Bed (TTB) and installing the SAFD algorithm on that platform. Two units were built and installed in the Hardware Simulation Lab and at the TTB in December 1991. Since that time, the task primarily entailed improvement and maintenance of the systems, additional testing to prove the feasibility of the algorithm, and support of hot fire testing. This document addresses the work done since the last report of June 1992. The work on the System for Anomaly and Failure Detection during this period included improving the platform and the algorithm, testing the algorithm against previous test data and in the Hardware Simulation Lab, installing other algorithms on the system, providing support for operations at the Technology Test Bed, and providing routine maintenance.

  19. Mammographic computer-aided detection systems.

    PubMed

    2003-04-01

    While mammography is regarded as the best means available to screen for breast cancer, reading mammograms is a tedious, error-prone task. Given the repetitiveness of the process and the fact that less than 1% of mammograms in the average screening population contain cancer, it's no wonder that a significant number of breast cancers--about 28%--are missed by radiologists. The fact that human error is such a significant obstacle makes mammography screening an ideal application for computer-aided detection (CAD) systems. CAD systems serve as a "second pair of eyes" to ensure that radiologists don't miss a suspect area on an image. They analyze patterns on a digitized mammographic image, identify regions that may contain an abnormality indicating cancer, and mark these regions. The marks are then inspected and classified by a radiologist. But CAD systems provide no diagnosis of any kind--it's up to the radiologist to analyze the marked area and decide if it shows cancer. In this Evaluation, we describe the challenges posed by screening mammography, the operating principles and overall efficacy of CAD systems, and the characteristics to consider when purchasing a system. We also compare the performance of two commercially available systems, iCAD's MammoReader and R2's ImageChecker. Because the two systems offer comparable sensitivity, our judgments are based on other performance characteristics, including their ease of use, the number of false marks they produce, the degree to which they can integrate with hospital information systems, and their processing speed. PMID:12760158

  20. A polarization system for persistent chemical detection

    NASA Astrophysics Data System (ADS)

    Craven-Jones, Julia; Appelhans, Leah; Couphos, Eric; Embree, Todd; Finnegan, Patrick; Goldstein, Dennis; Karelitz, David; LaCasse, Charles; Luk, Ting S.; Mahamat, Adoum; Massey, Lee; Tanbakuchi, Anthony; Washburn, Cody; Vigil, Steven

    2015-09-01

    We report on the development of a prototype polarization tag based system for detecting chemical vapors. The system primarily consists of two components, a chemically sensitive tag that experiences a change in its optical polarization properties when exposed to a specific chemical of interest, and an optical imaging polarimeter that is used to measure the polarization properties of the tags. Although the system concept could be extended to other chemicals, for the initial system prototype presented here the tags were developed to be sensitive to hydrogen fluoride (HF) vapors. HF is used in many industrial processes but is highly toxic and thus monitoring for its presence and concentration is often of interest for personnel and environmental safety. The tags are periodic multilayer structures that are produced using standard photolithographic processes. The polarimetric imager has been designed to measure the degree of linear polarization reflected from the tags in the short wave infrared. By monitoring the change in the reflected polarization signature from the tags, the polarimeter can be used to determine if the tag was exposed to HF gas. In this paper, a review of the system development effort and preliminary test results are presented and discussed, as well as our plan for future work.

  1. Method and system for detecting explosives

    DOEpatents

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  2. Threat detection system for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Pierowicz, John A.

    1998-01-01

    Calspan SRL Corporation is currently developing an on- vehicle threat detection system for intersection collision avoidance (ICA) as part of its ICA program with the National Highway Transportation Safety Administration. Crash scenarios were previously defined and an on-board radar sensor was designed. This paper describes recent efforts that include the development of a simulation of a multitarget tracker and collision avoidance algorithm used to predict system performance in a variety of target configurations in the various ICA crash scenarios. In addition, a current headway radar was mounted on the Calspan Instrumented Vehicle and in-traffic data were recorded for two limited crash scenarios. Warning functions were developed through the simulation and applied to the recorded data.

  3. A complete low cost radon detection system.

    PubMed

    Bayrak, A; Barlas, E; Emirhan, E; Kutlu, Ç; Ozben, C S

    2013-08-01

    Monitoring the (222)Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. PMID:23583920

  4. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  5. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  6. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  7. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  8. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  9. Long-term pumping test to study the impact of an open-loop geothermal system on seawater intrusion in a coastal aquifer: the case study of Bari (Southern Italy)

    NASA Astrophysics Data System (ADS)

    Clementina Caputo, Maria; Masciale, Rita; Masciopinto, Costantino; De Carlo, Lorenzo

    2016-04-01

    The high cost and scarcity of fossil fuels have promoted the increased use of natural heat for a number of direct applications. Just as for fossil fuels, the exploitation of geothermal energy should consider its environmental impact and sustainability. Particular attention deserves the so-called open loop geothermal groundwater heat pump (GWHP) system, which uses groundwater as geothermal fluid. From an economic point of view, the implementation of this kind of geothermal system is particularly attractive in coastal areas, which have generally shallow aquifers. Anyway the potential problem of seawater intrusion has led to laws that restrict the use of groundwater. The scarcity of freshwater could be a major impediment for the utilization of geothermal resources. In this study a new methodology has been proposed. It was based on an experimental approach to characterize a coastal area in order to exploit the low-enthalpy geothermal resource. The coastal karst and fractured aquifer near Bari, in Southern Italy, was selected for this purpose. For the purpose of investigating the influence of an open-loop GWHP system on the seawater intrusion, a long-term pumping test was performed. The test simulated the effects of a prolonged withdrawal on the chemical-physical groundwater characteristics of the studied aquifer portion. The duration of the test was programmed in 16 days, and it was performed with a constant pumping flowrate of 50 m3/h. The extracted water was outflowed into an adjacent artificial channel, by means of a piping system. Water depth, temperature and electrical conductivity of the pumped water were monitored for 37 days, including also some days before and after the pumping duration. The monitored parameters, collected in the pumping and in five observation wells placed 160 m down-gradient with respect to the groundwater flow direction, have been used to estimate different scenarios of the impact of the GWHP system on the seawater intrusion by mean of a

  10. Doppler-corrected differential detection system

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1991-01-01

    Doppler in a communication system operating with a multiple differential phase-shift-keyed format (MDPSK) creates an adverse phase shift in an incoming signal. An open loop frequency estimation is derived from a Doppler-contaminated incoming signal. Based upon the recognition that, whereas the change in phase of the received signal over a full symbol contains both the differentially encoded data and the Doppler induced phase shift, the same change in phase over half a symbol (within a given symbol interval) contains only the Doppler induced phase shift, and the Doppler effect can be estimated and removed from the incoming signal. Doppler correction occurs prior to the receiver's final output of decoded data. A multiphase system can operate with two samplings per symbol interval at no penalty in signal-to-noise ratio provided that an ideal low pass pre-detection filter is employed, and two samples, at 1/4 and 3/4 of the symbol interval T sub s, are taken and summed together prior to incoming signal data detection.

  11. Periodontal changes following molar intrusion with miniscrews

    PubMed Central

    Bayani, Shahin; Heravi, Farzin; Radvar, Mehrdad; Anbiaee, Najmeh; Madani, Azam Sadat

    2015-01-01

    Background: With the introduction of skeletal anchorage system, recently it is possible to successfully intrude molar teeth. On the other hand, there have been concerns about periodontal changes associated with intrusion and there are few studies on this topic, especially for posterior teeth. Materials and Methods: Ten female patients were enrolled in this study. Maxillary molar intrusion was achieved by inserting two miniscrews and a 17 × 25 titanium molybdenum alloy spring. Crestal height changes were evaluated at three intervals including: Baseline (T0), end of active treatment (T1) and 6 months after retention (T2). Other variables including probing depth, gingival recession, attachment level and bleeding on probing were evaluated by clinical measurements in the three above mentioned intervals. One-sample Kolmogrov-Smirnov test ascertained the normality of the data. For all patients, the changes in tooth position and crestal height were evaluated using one-sample t-test. (P < 0.05) Results: Supra-erupted molars were successfully intruded a mean of 2.1 ± 0.9 mm during active treatment (T0-T1). A mean bone resorption of 0.9 ± 0.9 mm in mesial crest and 1 ± 0.8 mm in distal crest had occurred in total treatment (T0-T2). A mean of 0.6 ± 1.4 mm bone was deposited on mesial crest during the retention period (T1-T2) following tooth relapse. On average, 0.8 ± 0.4 mm attachment gain was obtained. Gingival margin coronalized a mean of 0.8 ± 0.6 mm throughout the entire treatment. Probing depth showed no significant change during treatment. Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height. PMID:26288629

  12. System for Anomaly and Failure Detection (SAFD) system development

    NASA Astrophysics Data System (ADS)

    Oreilly, D.

    1992-07-01

    This task specified developing the hardware and software necessary to implement the System for Anomaly and Failure Detection (SAFD) algorithm, developed under Technology Test Bed (TTB) Task 21, on the TTB engine stand. This effort involved building two units; one unit to be installed in the Block II Space Shuttle Main Engine (SSME) Hardware Simulation Lab (HSL) at Marshall Space Flight Center (MSFC), and one unit to be installed at the TTB engine stand. Rocketdyne personnel from the HSL performed the task. The SAFD algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failure as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient condition.

  13. System for Anomaly and Failure Detection (SAFD) system development

    NASA Technical Reports Server (NTRS)

    Oreilly, D.

    1992-01-01

    This task specified developing the hardware and software necessary to implement the System for Anomaly and Failure Detection (SAFD) algorithm, developed under Technology Test Bed (TTB) Task 21, on the TTB engine stand. This effort involved building two units; one unit to be installed in the Block II Space Shuttle Main Engine (SSME) Hardware Simulation Lab (HSL) at Marshall Space Flight Center (MSFC), and one unit to be installed at the TTB engine stand. Rocketdyne personnel from the HSL performed the task. The SAFD algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failure as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient condition.

  14. Quench detection system for twin coils HTS SMES

    NASA Astrophysics Data System (ADS)

    Badel, A.; Tixador, P.; Simiand, G.; Exchaw, O.

    2010-10-01

    The quench detection and protection system is a critical element in superconducting magnets. After a short summary of the quench detection and protection issues in HTS magnets, an original detection system is presented. The main feature of this system is an active protection of the detection electronics during the discharges, making it possible to use standard electronics even if the discharge voltage is very high. The design of the detection system is therefore easier and it can be made very sensitive. An implementation example is presented for a twin coil HTS SMES prototype, showing the improvements when compared to classical detection systems during operation.

  15. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    SciTech Connect

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  16. Non-intrusive head movement analysis of videotaped seizures of epileptic origin.

    PubMed

    Mandal, Bappaditya; Eng, How-Lung; Lu, Haiping; Chan, Derrick W S; Ng, Yen-Ling

    2012-01-01

    In this work we propose a non-intrusive video analytic system for patient's body parts movement analysis in Epilepsy Monitoring Unit. The system utilizes skin color modeling, head/face pose template matching and face detection to analyze and quantify the head movements. Epileptic patients' heads are analyzed holistically to infer seizure and normal random movements. The patient does not require to wear any special clothing, markers or sensors, hence it is totally non-intrusive. The user initializes the person-specific skin color and selects few face/head poses in the initial few frames. The system then tracks the head/face and extracts spatio-temporal features. Support vector machines are then used on these features to classify seizure-like movements from normal random movements. Experiments are performed on numerous long hour video sequences captured in an Epilepsy Monitoring Unit at a local hospital. The results demonstrate the feasibility of the proposed system in pediatric epilepsy monitoring and seizure detection. PMID:23367311

  17. Developments toward a Low-Cost Approach for Long-Term, Unattended Vapor Intrusion Monitoring

    PubMed Central

    Tolley, William K.

    2014-01-01

    There are over 450,000 sites contaminated by chemicals in the US. This large number of contaminated sites and the speed of subsurface migration of chemicals pose considerable risk to nearby residences and commercial buildings. The high costs for monitoring around these site stem from the labor involved in placing and replacing the passive sorbent vapor samplers and the resultant laboratory analysis. This monitoring produces sparse data sets that do not track temporal changes well. To substantially reduce costs and better track exposures, less costly, unattended systems for monitoring soil gases and vapor intrusion into homes and businesses are desirable to aid in the remediation of contaminated sites. This paper describes progress toward the development of an inexpensive system specifically for monitoring vapor intrusion; the system can operate repeatedly without user intervention with low detection limits (1 × 10−9, or 1 part-per-billion). Targeted analytes include chlorinated hydrocarbons (dichloroethylene, trichloroethane, trichloroethylene, and perchloroethylene) and benzene. The system consists of a trap-and-purge preconcentrator for vapor collection in conjunction with a compact gas chromatography instrument to separate individual compounds. Chemical detection is accomplished with an array of chemicapacitors and a metal-oxide semiconductor combustibles sensor. Both the preconcentrator and the chromatography column are resistively heated. All components are compatible with ambient air, which serves as the carrier gas for the gas chromatography and detectors. PMID:24903107

  18. Non-intrusive measurements in a rocket engine combustor

    NASA Technical Reports Server (NTRS)

    Farhangi, S.; Gylys, V. T.; Jensen, R. J.

    1993-01-01

    In recent years analytical tools to characterize combustor flow have been developed in order to support design. To facilitate anchoring of combustion related physical models and the CFD codes in which they are incorporated, considerable development and application of non-intrusive combustion diagnostic capabilities has occurred. Raman spectroscopy can be used to simultaneously detect all polyatomic molecules present in significant concentrations and to determine gas temperature. This is because all molecules possess a distinct temperature dependent Raman spectrum. A multi-point diagnostic system for non-intrusive temperature and species profiling in rocket engines has been developed at Rocketdyne. In the present effort, the system has been undergoing validation for application to rocket engine component testing. A 4 inch diameter windowed combustor with a coaxial gas-gas injector was chosen for this series of validation experiments. Initially an excimer-pumped tunable dye laser and later a solid state Nd-Yag laser served as excitation sources. The Raman signal was dispersed by a monochromator and detected by a gated, intensified Charged Coupled Device (CCD) array. Experiments were carried out prior to each series of hot fire tests to ensure that the Raman signal detected was due to a spontaneous rather than a stimulated Raman emission process. Over sixty hot fire tests were conducted during the first series of tests with the excimer/dye laser. All hot fire testing was at a mixture ratio of 0.5 and chamber pressures of approximately 100 and approximately 300 psia. The Raman spectra of hydrogen, water vapor and oxygen recorded during single element hot fire tests were reduced and analyzed. A significant achievement was the attainment of single shot Raman spectra in cold flow tests. Unfortunately, the single shot signal-to-noise ratio deteriorated to an unacceptable level during the hot fire testing. Attempts to obtain temperature data from the hydrogen Q1-branch

  19. Advanced Water Vapor Lidar Detection System

    NASA Technical Reports Server (NTRS)

    Elsayed-Ali, Hani

    1998-01-01

    In the present water vapor lidar system, the detected signal is sent over long cables to a waveform digitizer in a CAMAC crate. This has the disadvantage of transmitting analog signals for a relatively long distance, which is subjected to pickup noise, leading to a decrease in the signal to noise ratio. Generally, errors in the measurement of water vapor with the DIAL method arise from both random and systematic sources. Systematic errors in DIAL measurements are caused by both atmospheric and instrumentation effects. The selection of the on-line alexandrite laser with a narrow linewidth, suitable intensity and high spectral purity, and its operation at the center of the water vapor lines, ensures minimum influence in the DIAL measurement that are caused by the laser spectral distribution and avoid system overloads. Random errors are caused by noise in the detected signal. Variability of the photon statistics in the lidar return signal, noise resulting from detector dark current, and noise in the background signal are the main sources of random error. This type of error can be minimized by maximizing the signal to noise ratio. The increase in the signal to noise ratio can be achieved by several ways. One way is to increase the laser pulse energy, by increasing its amplitude or the pulse repetition rate. Another way, is to use a detector system with higher quantum efficiency and lower noise, on the other hand, the selection of a narrow band optical filter that rejects most of the day background light and retains high optical efficiency is an important issue. Following acquisition of the lidar data, we minimize random errors in the DIAL measurement by averaging the data, but this will result in the reduction of the vertical and horizontal resolutions. Thus, a trade off is necessary to achieve a balance between the spatial resolution and the measurement precision. Therefore, the main goal of this research effort is to increase the signal to noise ratio by a factor of

  20. Wireless Falling Detection System Based on Community.

    PubMed

    Xia, Yun; Wu, Yanqi; Zhang, Bobo; Li, Zhiyang; He, Nongyue; Li, Song

    2015-06-01

    The elderly are more likely to suffer the aches or pains from the accidental falls, and both the physiology and psychology of patients would subject to a long-term disturbance, especially when the emergency treatment was not given timely and properly. Although many methods and devices have been developed creatively and shown their efficiency in experiments, few of them are suitable for commercial applications routinely. Here, we design a wearable falling detector as a mobile terminal, and utilize the wireless technology to transfer and monitor the activity data of the host in a relatively small community. With the help of the accelerometer sensor and the Google Mapping service, information of the location and the activity data will be send to the remote server for the downstream processing. The experimental result has shown that SA (Sum-vector of all axes) value of 2.5 g is the threshold value to distinguish the falling from other activities. A three-stage detection algorithm was adopted to increase the accuracy of the real alarm, and the accuracy rate of our system was more than 95%. With the further improvement, the falling detecting device which is low-cost, accurate and user-friendly would become more and more common in everyday life. PMID:26369050

  1. Method and system for turbomachinery surge detection

    DOEpatents

    Faymon, David K.; Mays, Darrell C.; Xiong, Yufei

    2004-11-23

    A method and system for surge detection within a gas turbine engine, comprises: measuring the compressor discharge pressure (CDP) of the gas turbine over a period of time; determining a time derivative (CDP.sub.D ) of the measured (CDP) correcting the CDP.sub.D for altitude, (CDP.sub.DCOR); estimating a short-term average of CDP.sub.DCOR.sup.2 ; estimating a short-term average of CDP.sub.DCOR ; and determining a short-term variance of corrected CDP rate of change (CDP.sub.roc) based upon the short-term average of CDP.sub.DCOR and the short-term average of CDP.sub.DCOR.sup.2. The method and system then compares the short-term variance of corrected CDP rate of change with a pre-determined threshold (CDP.sub.proc) and signals an output when CDP.sub.roc >CDP.sub.proc. The method and system provides a signal of a surge within the gas turbine engine when CDP.sub.roc remains>CDP.sub.proc for pre-determined period of time.

  2. Automatic system for detecting pornographic images

    NASA Astrophysics Data System (ADS)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  3. System for detecting special nuclear materials

    SciTech Connect

    Jandel, Marian; Rusev, Gencho Yordanov; Taddeucci, Terry Nicholas

    2015-07-14

    The present disclosure includes a radiological material detector having a convertor material that emits one or more photons in response to a capture of a neutron emitted by a radiological material; a photon detector arranged around the convertor material and that produces an electrical signal in response to a receipt of a photon; and a processor connected to the photon detector, the processor configured to determine the presence of a radiological material in response to a predetermined signature of the electrical signal produced at the photon detector. One or more detectors described herein can be integrated into a detection system that is suited for use in port monitoring, treaty compliance, and radiological material management activities.

  4. Liquid chromatography detection unit, system, and method

    SciTech Connect

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  5. Systems and methods for detecting neutrons

    DOEpatents

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  6. Nucleic acid detection systems for enteroviruses.

    PubMed Central

    Rotbart, H A

    1991-01-01

    The enteroviruses comprise nearly 70 human pathogens responsible for a wide array of diseases including poliomyelitis, meningitis, myocarditis, and neonatal sepsis. Current diagnostic tests for the enteroviruses are limited in their use by the slow growth, or failure to grow, of certain serotypes in culture, the antigenic diversity among the serotypes, and the low titer of virus in certain clinical specimens. Within the past 6 years, applications of molecular cloning techniques, in vitro transcription vectors, automated nucleic acid synthesis, and the polymerase chain reaction have resulted in significant progress toward nucleic acid-based detection systems for the enteroviruses that take advantage of conserved genomic sequences across many, if not all, serotypes. Similar approaches to the study of enteroviral pathogenesis have already produced dramatic advances in our understanding of how these important viruses cause their diverse clinical spectra. PMID:1649002

  7. 46 CFR 154.1350 - Flammable gas detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... through 154.1015. (k) Each flammable gas detection system must have enough flame arrestors for all gas... 46 Shipping 5 2014-10-01 2014-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a...

  8. 46 CFR 154.1350 - Flammable gas detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... through 154.1015. (k) Each flammable gas detection system must have enough flame arrestors for all gas... 46 Shipping 5 2011-10-01 2011-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a...

  9. 46 CFR 154.1350 - Flammable gas detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... through 154.1015. (k) Each flammable gas detection system must have enough flame arrestors for all gas... 46 Shipping 5 2013-10-01 2013-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a...

  10. 46 CFR 154.1350 - Flammable gas detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... through 154.1015. (k) Each flammable gas detection system must have enough flame arrestors for all gas... 46 Shipping 5 2010-10-01 2010-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a...

  11. 46 CFR 154.1350 - Flammable gas detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... through 154.1015. (k) Each flammable gas detection system must have enough flame arrestors for all gas... 46 Shipping 5 2012-10-01 2012-10-01 false Flammable gas detection system. 154.1350 Section 154... Equipment Instrumentation § 154.1350 Flammable gas detection system. (a) The vessel must have a...

  12. PFNA-based measurements for non-intrusive waste characterization

    SciTech Connect

    Pentaleri, E.

    1994-12-31

    Pulsed Fast Neutron Analysis (PFNA) is a non-intrusive technique for inspecting bulk samples whose size may range from that of a suitcase to that of a commercial-cargo truck trailer. In an earlier paper, the authors discussed techniques for performing PFNA-based TRU assays on waste drums, and described why such measurements would yield improved accuracy, sensitivity, and throughput over existing instruments. Here they describe a set of non-intrusive measurements useful for further improving the accuracy of TRU assay results, certifying compliance with waste acceptance criteria, or enhancing the control of waste-treatment processes. In principle, these measurements, based mainly upon the analysis of inelastic-neutron-scattering and neutron-capture gamma rays, can be performed concurrently with TRU-assay measurements. Based on the measurements described, a single PFNA-based waste inspection system would allow substantially complete non-intrusive characterization of waste containers to be performed.

  13. The questa magmatic system: Petrologic, chemical and isotopic variations in cogenetic volcanic and plutonic rocks of the latir volcanic field and associated intrusives, northern New Mexico

    SciTech Connect

    Johnson, C.M.

    1986-01-01

    Field, chemical and isotopic data demonstrate that nearly all igneous rocks at Questa resulted from interactions between mantle-derived parental magmas and the crust. Strontium, neodymium and lead isotope ratios of early andesites to rhyolites (28 to 26 Ma) indicate that these magmas assimilated > 25% lower crust. Injection of basaltic magmas extensively modified the strontium and neodymium but not the lead isotope compositions of the lower crust. Eruption of comendite magmas and the peralkaline Amalia Tuff 26 Ma is correlated with inception of regional extension. Lead isotope ratios identify different sources for the metaluminous granites and the peralkaline rocks. 26 Ma metaluminous granite to granodiorite intrusions have chemical and isotopic compositions to those of the precaldera intermediate-composition rocks, and are interpreted as representing the solidified equivalents of the precaldera magmatic episode. However, both conventional and ion-microprobe isotopic data prohibit significant assimilation of crustal rocks at the level of exposure, suggesting that the plutons were emplaced a relatively crystal-rich mushes which did not have sufficient heat to assimilate country rocks. This suggest that in some cases plutonic rocks are better than volcanic rocks in representing the isotopic compositions of their source regions, because the assimilation potential of crystal-rich magmas is significantly less than that of largely liquid magmas.

  14. VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration

    SciTech Connect

    Pritchard, D.A.

    1987-05-01

    It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

  15. The Autonomous Pathogen Detection System (APDS)

    SciTech Connect

    Morris, J; Dzenitis, J

    2004-09-22

    Shaped like a mailbox on wheels, it's been called a bioterrorism ''smoke detector.'' It can be found in transportation hubs such as airports and subways, and it may be coming to a location near you. Formally known as the Autonomous Pathogen Detection System, or APDS, this latest tool in the war on bioterrorism was developed at Lawrence Livermore National Laboratory to continuously sniff the air for airborne pathogens and toxins such as anthrax or plague. The APDS is the modern day equivalent of the canaries miners took underground with them to test for deadly carbon dioxide gas. But this canary can test for numerous bacteria, viruses, and toxins simultaneously, report results every hour, and confirm positive samples and guard against false positive results by using two different tests. The fully automated system collects and prepares air samples around the clock, does the analysis, and interprets the results. It requires no servicing or human intervention for an entire week. Unlike its feathered counterpart, when an APDS unit encounters something deadly in the air, that's when it begins singing, quietly. The APDS unit transmits a silent alert and sends detailed data to public health authorities, who can order evacuation and begin treatment of anyone exposed to toxic or biological agents. It is the latest in a series of biodefense detectors developed at DOE/NNSA national laboratories. The manual predecessor to APDS, called BASIS (for Biological Aerosol Sentry and Information System), was developed jointly by Los Alamos and Lawrence Livermore national laboratories. That system was modified to become BioWatch, the Department of Homeland Security's biological urban monitoring program. A related laboratory instrument, the Handheld Advanced Nucleic Acid Analyzer (HANAA), was first tested successfully at LLNL in September 1997. Successful partnering with private industry has been a key factor in the rapid advancement and deployment of biodefense instruments such as these

  16. Chaotic system detection of weak seismic signals

    NASA Astrophysics Data System (ADS)

    Li, Y.; Yang, B. J.; Badal, J.; Zhao, X. P.; Lin, H. B.; Li, R. L.

    2009-09-01

    When the signal-to-noise (S/N) ratio is less than -3 dB or even 0 dB, seismic events are generally difficult to identify from a common shot record. To overcome this type of problem we present a method to detect weak seismic signals based on the oscillations described by a chaotic dynamic system in phase space. The basic idea is that a non-linear chaotic oscillator is strongly immune to noise. Such a dynamic system is less influenced by noise, but it is more sensitive to periodic signals, changing from a chaotic state to a large-scale periodic phase state when excited by a weak signal. With the purpose of checking the possible contamination of the signal by noise, we have performed a numerical experiment with an oscillator controlled by the Duffing-Holmes equation, taking a distorted Ricker wavelet sequence as input signal. In doing so, we prove that the oscillator system is able to reach a large-scale periodic phase state in a strong noise environment. In the case of a common shot record with low S/N ratio, the onsets reflected from a same interface are similar to one other and can be put on a single trace with a common reference time and the periodicity of the so-generated signal follows as a consequence of moveout at a particular scanning velocity. This operation, which is called `horizontal dynamic correction' and leads to a nearly periodic signal, is implemented on synthetic wavelet sequences taking various sampling arrival times and scanning velocities. Thereafter, two tests, both in a noisy ambient of -3.7 dB, are done using a chaotic oscillator: the first demonstrates the capability of the method to really detect a weak seismic signal; the second takes care of the fundamental weakness of the dynamic correction coming from the use of a particular scanning velocity, which is investigated from the effect caused by near-surface lateral velocity variation on the periodicity of the reconstructed seismic signal. Finally, we have developed an application of the

  17. Non-intrusive temperature measurement using microscale visualization techniques

    NASA Astrophysics Data System (ADS)

    Chamarthy, Pramod; Garimella, Suresh V.; Wereley, Steven T.

    2009-07-01

    μPIV is a widely accepted tool for making accurate measurements in microscale flows. The particles that are used to seed the flow, due to their small size, undergo Brownian motion which adds a random noise component to the measurements. Brownian motion introduces an undesirable error in the velocity measurements, but also contains valuable temperature information. A PIV algorithm which detects both the location and broadening of the correlation peak can measure velocity as well as temperature simultaneously using the same set of images. The approach presented in this work eliminates the use of the calibration constant used in the literature (Hohreiter et al. in Meas Sci Technol 13(7):1072-1078, 2002), making the method system-independent, and reducing the uncertainty involved in the technique. The temperature in a stationary fluid was experimentally measured using this technique and compared to that obtained using the particle tracking thermometry method and a novel method, low image density PIV. The method of cross-correlation PIV was modified to measure the temperature of a moving fluid. A standard epi-fluorescence μPIV system was used for all the measurements. The experiments were conducted using spherical fluorescent polystyrene-latex particles suspended in water. Temperatures ranging from 20 to 80°C were measured. This method allows simultaneous non-intrusive temperature and velocity measurements in integrated cooling systems and lab-on-a-chip devices.

  18. Detection of contamination of municipal water distribution systems

    DOEpatents

    Cooper, John F.

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  19. Integration of the TDWR and LLWAS wind shear detection system

    NASA Technical Reports Server (NTRS)

    Cornman, Larry

    1991-01-01

    Operational demonstrations of a prototype TDWR/LLWAS (Terminal Doppler Weather Radar/Low Level Wind shear Alarm System) integrated wind shear detection system were conducted. The integration of wind shear detection systems is needed to provide end-users with a single, consensus source of information. A properly implemented integrated system provides wind shear warnings of a higher quality than stand-alone LLWAS or TDWR systems. The algorithmic concept used to generate the TDWR/LLWAS integrated products and several case studies are discussed, indicating the viability and potential of integrated wind shear detection systems. Implications for integrating ground and airborne wind shear detection systems are briefly examined.

  20. Early Alert: Academic Achievement as the Focus of Intrusive Counseling.

    ERIC Educational Resources Information Center

    Martinez, P. Roberto L.

    At Santa Fe Community College (SFCC), a proactive, "intrusive" approach to counseling has been developed to identify students who may be at the point of dropping out of classes due to anxiety and frustration. Under this approach, termed the Early Alert Referral System, the advisor takes responsibility for establishing contact with the students and…

  1. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. PMID:27347649

  2. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    NASA Astrophysics Data System (ADS)

    Trickl, Thomas; Vogelmann, Hannes; Fix, Andreas; Schäfler, Andreas; Wirth, Martin; Calpini, Bertrand; Levrat, Gilbert; Romanens, Gonzague; Apituley, Arnoud; Wilson, Keith M.; Begbie, Robert; Reichardt, Jens; Vömel, Holger; Sprenger, Michael

    2016-07-01

    A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison). The measurements were carried out at four observational sites: Payerne (Switzerland), Bilthoven (the Netherlands), Lindenberg (north-eastern Germany), and the Zugspitze mountain (Garmisch-Partenkichen, German Alps), and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg). The dryness hardens the findings of a preceding study ("Part 1", Trickl et al., 2014) that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in "Part 1" from the Zugspitze CO observations. The trajectories qualitatively explain

  3. Development of Fall Detection System Using Ultrasound Sensors

    NASA Astrophysics Data System (ADS)

    Tajima, Takuya; Abe, Takehiko; Kimura, Haruhiko

    This paper proposes a sensing system for detecting bather's fall. The fall detection system uses ultrasound sensors installed on the ceiling of bathroom to measure the distance between sensor and a bather. The merits of utilizing ultrasound sensor are easy installation and easy use. Moreover the apparatus has an advantage of enhancing the privacy of bathers and having robustness against humidity. In order to detect bather's fall, the proposed system uses the following two methods: status detection and behavior detection. The function of status detection is to estimate bather's postures such as standing and sitting by monitoring the highest part of bather's body. Meanwhile, the function of behavior detection is to grasp the speed of bather's vertical movement by monitoring the change of distance between sensor and the bather. The system estimates the occurrence of bather's fall when the distance changes suddenly. As a result of experiment with some subjects, the system was possible to detect bather's falling behavior with high accuracy.

  4. 46 CFR 76.05-1 - Fire detecting systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 3 2011-10-01 2011-10-01 false Fire detecting systems. 76.05-1 Section 76.05-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS FIRE PROTECTION EQUIPMENT Fire Detecting and Extinguishing Equipment, Where Required § 76.05-1 Fire detecting systems....

  5. 49 CFR 1544.213 - Use of explosives detection systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a) Use of explosive detection equipment. If TSA so requires by an amendment to an aircraft...

  6. 49 CFR 1544.213 - Use of explosives detection systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Use of explosives detection systems. 1544.213...: AIR CARRIERS AND COMMERCIAL OPERATORS Operations § 1544.213 Use of explosives detection systems. (a) Use of explosive detection equipment. If TSA so requires by an amendment to an aircraft...

  7. BacT/Alert: an automated colorimetric microbial detection system.

    PubMed Central

    Thorpe, T C; Wilson, M L; Turner, J E; DiGuiseppi, J L; Willert, M; Mirrett, S; Reller, L B

    1990-01-01

    BacT/Alert (Organon Teknika Corp., Durham, N.C.) is an automated microbial detection system based on the colorimetric detection of CO2 produced by growing microorganisms. Results of an evaluation of the media, sensor, detection system, and detection algorithm indicate that the system reliably grows and detects a wide variety of bacteria and fungi. Results of a limited pilot clinical trial with a prototype research instrument indicate that the system is comparable to the radiometric BACTEC 460 system in its ability to grow and detect microorganisms in blood. On the basis of these initial findings, large-scale clinical trials comparing BacT/Alert with other commercial microbial detection systems appear warranted. PMID:2116451

  8. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    SciTech Connect

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  9. Analyzing and Detecting Problems in Systems of Systems

    NASA Technical Reports Server (NTRS)

    Lindvall, Mikael; Ackermann, Christopher; Stratton, William C.; Sibol, Deane E.; Godfrey, Sally

    2008-01-01

    Many software systems are evolving complex system of systems (SoS) for which inter-system communication is mission-critical. Evidence indicates that transmission failures and performance issues are not uncommon occurrences. In a NASA-supported Software Assurance Research Program (SARP) project, we are researching a new approach addressing such problems. In this paper, we are presenting an approach for analyzing inter-system communications with the goal to uncover both transmission errors and performance problems. Our approach consists of a visualization and an evaluation component. While the visualization of the observed communication aims to facilitate understanding, the evaluation component automatically checks the conformance of an observed communication (actual) to a desired one (planned). The actual and the planned are represented as sequence diagrams. The evaluation algorithm checks the conformance of the actual to the planned diagram. We have applied our approach to the communication of aerospace systems and were successful in detecting and resolving even subtle and long existing transmission problems.

  10. Detecting Planets Outside The Solar System

    NASA Technical Reports Server (NTRS)

    Pravdo, Steven H.; Terrile, Richard J.; Ftaclas, Christ; Gatewood, George

    1993-01-01

    Report describes proposed Astrometric Imaging Telescope, used to detect planets in orbit around distant stars. Includes executive summary and statement of scientific objectives of Astrometric Imaging Telescope program.

  11. Non-intrusive method of measuring PCV blowby constituents

    SciTech Connect

    Crane, M.E.; Ariga, S.; Boulard, R.; Lindamood, B.

    1994-10-01

    A technique is presented that has been successfully demonstrated to non-intrusively and quickly sample gases typically found in PCV systems. Color Detection Tubes (CDTs) were used with a simple sampling arrangement to monitor CO{sub 2}, NO{sub x}, O{sub 2}, and H{sub 2}O(g) at the closure line, crankcase, and PCV line. Measurements were accurate and could be made instantaneously. Short Path Thermal Desorbtion Tubes (SPTDTs) were used at the same engine locations for the characterization of fuel- and oil-derived hydrocarbon (HC) fractions and required only 50 cc samples. High engine loads caused pushover of blowby vapors as indicated by increased concentrations of CO{sub 2}, NO{sub x}, H{sub 2}O(g), and fuel HCs in the engines` fresh air inlets during WOT operation. Peak concentrations of blowby vapors were measured in the crankcase under no load and part throttle conditions. Oxygen concentrations always opposed the trends of CO{sub 2}, NO{sub x}, and H{sub 2}O(g). SPTDT data revealed that the PCV system consumes approximately 100-200 times more fuel vapors than oil vapors, on a mass basis; however, PCV-derived oil consumption represented almost 12 percent of total engine oil consumption under no load conditions. 8 refs., 17 figs.

  12. Life Detection System DTIVA for Monitoring Parameter in Fossilization Process

    NASA Astrophysics Data System (ADS)

    Gómez, F.; Garcia-Descalzo, L.; Cockell, C. S.; Schwendner, P.; Rettberg, P.; Beblo-Vranesevic, K.; Bohmeier, M.; Rabbow, E.; Westall, F.; Gaboyer, F.; Walter, N.; Moissl-Eichinger, M.; Perras, A.; Amils, R.; Malki, M.; Ehrenfreund, P.; Monaghan, E.; Marteinsson, V.; Vannier, P.

    2016-05-01

    Using Life Detection System LDS we followed the physicochemical parameter in a growth culture under fossilization/mineralization-induced process with the objectives of biomarkers detection. Biomarkers study is crucial for the search for life on Mars.

  13. Evaluating Detection and Diagnostic Decision Support Systems for Bioterrorism Response

    PubMed Central

    Sundaram, Vandana; McDonald, Kathryn M.; Smith, Wendy M.; Szeto, Herbert; Schleinitz, Mark D.; Owens, Douglas K.

    2004-01-01

    We evaluated the usefulness of detection systems and diagnostic decision support systems for bioterrorism response. We performed a systematic review by searching relevant databases (e.g., MEDLINE) and Web sites for reports of detection systems and diagnostic decision support systems that could be used during bioterrorism responses. We reviewed over 24,000 citations and identified 55 detection systems and 23 diagnostic decision support systems. Only 35 systems have been evaluated: 4 reported both sensitivity and specificity, 13 were compared to a reference standard, and 31 were evaluated for their timeliness. Most evaluations of detection systems and some evaluations of diagnostic systems for bioterrorism responses are critically deficient. Because false-positive and false-negative rates are unknown for most systems, decision making on the basis of these systems is seriously compromised. We describe a framework for the design of future evaluations of such systems. PMID:15078604

  14. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    NASA Technical Reports Server (NTRS)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  15. System and method for detecting cells or components thereof

    DOEpatents

    Porter, Marc D.; Lipert, Robert J.; Doyle, Robert T.; Grubisha, Desiree S.; Rahman, Salma

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  16. Emotional and Behavioral Reaction to Intrusive Thoughts

    ERIC Educational Resources Information Center

    Berry, Lisa-Marie; May, Jon; Andrade, Jackie; Kavanagh, David

    2010-01-01

    A self-report measure of the emotional and behavioral reactions to intrusive thoughts was developed. The article presents data that confirm the stability, reliability, and validity of the new seven-item measure. Emotional and behavioral reactions to intrusions emerged as separate factors on the Emotional and Behavioral Reactions to Intrusions…

  17. Legal Vs. Psychological Aspects of Intrusiveness.

    ERIC Educational Resources Information Center

    Binder, Virginia L.

    Court decisions stressing the rights of mental patients have necessitated a radical revision in the management of behavioral treatment programs. The client's rights to the least intrusive procedures to achieve treatment goals have become important in case law. Factors which identify intrusiveness include: (1) the extent to which the "new mental…

  18. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  19. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  20. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...