Science.gov

Sample records for intrusion detection system

  1. Interior intrusion detection systems

    SciTech Connect

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Intrusion detection: systems and models

    NASA Technical Reports Server (NTRS)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  3. Passive intrusion detection system

    NASA Technical Reports Server (NTRS)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  4. Evaluation of Intrusion Detection Systems

    PubMed Central

    Ulvila, Jacob W.; Gaffney, John E.

    2003-01-01

    This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs. PMID:27413623

  5. Evaluation of Intrusion Detection Systems.

    PubMed

    Ulvila, Jacob W; Gaffney, John E

    2003-01-01

    This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination of two IDSs. The method is illustrated for: 1) determining the best operating point for a single and double IDS based on the costs of mistakes and the hostility of the operating environment as represented in the prior probability of intrusion and 2) evaluating single and double IDSs on the basis of expected cost. A method is also described for representing a compound IDS as an equivalent single IDS. Results are presented from the point of view of a system administrator, but they apply equally to designers of IDSs.

  6. Association rule mining in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Zhao, Dong; Lu, Yan-sheng

    2004-04-01

    In a modern computer system, intrusion detection has become an essential and critical component. Data mining generally refers to the process of extracting models from large stores of data. The intrusion detection system first apply data mining programs to audit data to compute frequent patterns, extract features, and then use classification algorithms to compute detection models. The most important step of this process is to determine relations between fields in the database records to construct features. The standard association rules have not enough expressiveness. Intrusion detection system can extract the association rule with negations and with varying support thresholds to get better performance rather than extract the standard association rule.

  7. A Radiating Cable Intrusion Detection System

    DTIC Science & Technology

    1980-06-01

    RtADC-Th40O1"ř June 1930 A RADIATING CABLE INTRUSION 0 DETECTION SYSTEM Northeastern University Spencer d. Rochefort Raimundas Sukys Norman C...J.7[ochefortF168R. Raimundas/ Sukys SADDROSSAMfELEMENT,.PROJECT. TASK Electronics Research Labe.*&tory 11. CONTROLLING OFFICE NAME AND ADDRESS Hanscom...stable threshold levels. -a- -22- REFERENCES 1. Rochefort, J.S., Sukys , R. and Poirier, N.C. (1978), "An Area Intrusion Detection and Alarm System

  8. A system for distributed intrusion detection

    SciTech Connect

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. . Div. of Computer Science); Grance, T. ); Mansur, D.L.; Pon, K.L. ); Smaha, S.E. )

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  9. An automatically tuning intrusion detection system.

    PubMed

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  10. Intrusion Detection System Visualization of Network Alerts

    DTIC Science & Technology

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  11. Dynamic immune intrusion detection system for IPv6

    NASA Astrophysics Data System (ADS)

    Yao, Li; Li, Zhi-tang; Hao, Tu

    2005-03-01

    We have set up a project aimed at developing a dynamical immune intrusion detection system for IPv6 and protecting the next generation Internet from intrusion. We focus on investigating immunelogical principles in designing a dynamic multi-agent system for intrusion detection in IPv6 environment, instead of attempting to describe all that is intrusion in the network try and describe what is normal use and define "non-self" as intrusion. The proposed intrusion detection system is designed as flexible, extendible, and adaptable in order to meet the needs and preferences of network administrators for IPv6 environment.

  12. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  13. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    SciTech Connect

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  14. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  15. The architecture of a network level intrusion detection system

    SciTech Connect

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  16. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  17. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  18. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  19. In-situ trainable intrusion detection system

    DOEpatents

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  20. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  1. AINIDS: an immune-based network intrusion detection system

    NASA Astrophysics Data System (ADS)

    Yan, Qiao; Yu, Jianping

    2006-04-01

    Intrusion detection can be looked as a problem of pattern classification. Since intrusion detection has some intrinsic characteristic such as high dimensional feature spaces, linearity non-differentiation, severe unevenness of normal pattern and anomaly pattern, it is very difficult to detection intrusions directly by use of classical pattern recognition method. Nature immune system is a self-adaptive and self-learning classifier, which can accomplish recognition and classification by learning, remembrance and association. First we use four-tuple to define nature immune system and intrusion detection system, then we give the mathematic formalization description of performance index of intrusion detection system. Finally we design and develop an immune-based network intrusion detection system-- AINIDS, which includes a data collector component, a packet head parser and feature extraction component, antibody generation and antigen detection component, co-stimulation and report component and rule optimization component. The antibody generation and antigen detection component is the key module of AINIDS. In the component the passive immune antibodies and the automatic immune antibodies that include memory automatic immune antibodies and fuzzy automatic immune antibodies are proposed by analogy with natural immune system. The passive immune antibodies inherit available rules and can detect known intrusion rapidly. The automatic immune antibodies integrate statistic method with fuzzy reasoning system to improve the detection performance and can discover novel attacks. AINIDS is tested by the data that we collect from our LANs and by the data from 1999 DARPA intrusion detection evaluation data sets. Both experiments prove AINIDS has good detection rate for old and novel attacks.

  2. An expert system application for network intrusion detection

    SciTech Connect

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  3. Configurable Middleware-Level Intrusion Detection for Embedded Systems

    SciTech Connect

    Naess, Eivind; Frincke, Deborah A.; McKinnon, A. D.; Bakken, David E.

    2005-06-20

    Embedded systems have become integral parts of a diverse range of systems from automobiles to critical infrastructure applications such as gas and electric power distribution. Unfortunately, research on computer security in general and intrusion detection in particular, has not kept pace. Furthermore, embedded systems, by their very nature, are application specific and therefore frameworks for developing application-specific intrusion detection systems for distributed embedded systems must be researched, designed, and implemented. In this paper, we present a configurable middleware-based intrusion detection framework. In particular, this paper presents a system model and a concrete implementation of a highly configurable intrusion detection framework that is integrated into MicroQoSCORBA, a highly configurable middleware framework developed for embedded systems. By exploiting the application-specific logic available to a middleware framework (e.g., object interfaces and method signatures), our integrated framework is able to autogenerate application-specific intrusion detection systems. Next, a set of configurable intrusion detection mechanisms suitable for embedded systems is presented. A performance evaluation of these mechanisms, run on two hardware platforms, is presented at the end of the paper.

  4. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    PubMed

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  5. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  6. Designing and Implementing a Family of Intrusion Detection Systems

    DTIC Science & Technology

    2004-11-01

    Designing and Implementing a Family of Intrusion Detection Systems Richard A. Kemmerer Reliable Software Group Department of Computer Science ...Reliable Software Group Department of Computer Science University of California, Santa Barbara Santa Barbara, CA 93106 USA 8. PERFORMING ORGANIZATION...Systems Richard A. Kemmerer Reliable Software Group Computer Science Department University of California Santa Barbara, CA 93106, USA http

  7. Implementing a Patternless Intrusion Detection System; A Methodology for Zippo

    DTIC Science & Technology

    2005-09-01

    A methodology for the implementation of Zippo, a patternless intrusion detection system is presented in this thesis. This methodology approaches the...... based on those of Therminator and understanding the ideas of buckets and balls, thermal canyons and towers, decision trees, slidelength and windowlength

  8. Anomaly-based intrusion detection for SCADA systems

    SciTech Connect

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  9. Enterprise network intrusion detection and prevention system (ENIDPS)

    NASA Astrophysics Data System (ADS)

    Akujuobi, C. M.; Ampah, N. K.

    2007-04-01

    Securing enterprise networks comes under two broad topics: Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The right combination of selected algorithms/techniques under both topics produces better security for a given network. This approach leads to using layers of physical, administrative, electronic, and encrypted systems to protect valuable resources. So far, there is no algorithm, which guarantees absolute protection for a given network from intruders. Intrusion Prevention Systems like IPSec, Firewall, Sender ID, Domain Keys Identified Mail (DKIM) etc. do not guarantee absolute security just like existing Intrusion Detection Systems. Our approach focuses on developing an IDS, which will detect all intruders that bypass the IPS and at the same time will be used in updating the IPS, since the IPS fail to prevent some intruders from entering a given network. The new IDS will employ both signature-based detection and anomaly detection as its analysis strategy. It should therefore be able to detect known and unknown intruders or attacks and further isolate those sources of attack within the network. Both real-time and off-line IDS predictions will be applied under the analysis and response stages. The basic IDS architecture will involve both centralized and distributed/heterogeneous architecture to ensure effective detection. Pro-active responses and corrective responses will be employed. The new security system, which will be made up of both IDS and IPS, should be less expensive to implement compared to existing ones. Finally, limitations of existing security systems have to be eliminated with the introduction of the new security system.

  10. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    PubMed Central

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  11. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  12. Adaptive critic design for computer intrusion detection system

    NASA Astrophysics Data System (ADS)

    Novokhodko, Alexander; Wunsch, Donald C., II; Dagli, Cihan H.

    2001-03-01

    This paper summarizes ongoing research. A neural network is used to detect a computer system intrusion basing on data from the system audit trail generated by Solaris Basic Security Module. The data have been provided by Lincoln Labs, MIT. The system alerts the human operator, when it encounters suspicious activity logged in the audit trail. To reduce the false alarm rate and accommodate the temporal indefiniteness of moment of attack a reinforcement learning approach is chosen to train the network.

  13. An artificial bioindicator system for network intrusion detection.

    PubMed

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  14. Using Unix system auditing for detecting network intrusions

    SciTech Connect

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators know what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.

  15. Developing a Cooperative Intrusion Detection System for Wireless Sensor Networks

    DTIC Science & Technology

    2010-11-01

    in a variety of application areas. However, they are highly susceptible to attacks and it is very probable that an intruder catches already existing...to attacks . Intrusion detection systems (IDS) act as a second line of defence when an intruder might deceive the other security solutions. In this...paper, we explain the approach we have followed to develop the AWISSENET [1] distributed IDS. 1.2 Attackers Goals and Security Requirements The

  16. Detecting Signs of Intrusion.

    DTIC Science & Technology

    1997-08-01

    your systems, you should investigate any warnings they sound. Although monitors are not fool- proof, they can be part of an effective early warning ...Carnegie Mellon University Software Engineering Institute Detecting Signs of Intrusion Robert Firth Gary Ford Barbara Fräser John Kochmar...1997 Detecting Signs of Intrusion Robert Firth Gary Ford Barbara Fräser John Kochmar Suresh Konda John Richael Derek Simmel Networked Systems

  17. MIDAS, the Mobile Intrusion Detection and Assessment System

    SciTech Connect

    Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

    1990-01-01

    MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

  18. Hybrid feature selection for supporting lightweight intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  19. Usefulness of DARPA dataset for intrusion detection system evaluation

    NASA Astrophysics Data System (ADS)

    Thomas, Ciza; Sharma, Vishwas; Balakrishnan, N.

    2008-03-01

    The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.

  20. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  1. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  2. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect

    Vigil, J.T.

    1994-03-01

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  3. Efficient pattern matching on GPUs for intrusion detection systems

    SciTech Connect

    Villa, Oreste; Tumeo, Antonino; Sciuto, Donatella

    2010-05-17

    Pattern matching is at the core of many security applications, like Network Intrusion Detection Systems (NIDS), spam filters and virus scanner. The always growing traffic on networks requires the ability to recognize potentially malicious signatures effectively, fastly and possibly in real time, without afftecting the performance and the latencies of the connections. Unfortunately, pattern matching is a computationally intensive procedure which poses significant challenges on current software and hardware implementations. Graphic Processing Units (GPU) have become an interesting target for such high-througput applications, but the algorithms and the data structures need to be redesigned to be parallelized and adapted to the underlining hardware, coping with the limitations imposed by these architectures. In this paper we present an efficient implementation of the Aho-Corasick pattern matching algorithm on GPU, showing how we progressively redesigned the algorithm and the data structures to fit on the architecture and comparing it with equivalent implementations on the CPU and with previous work. We show that with realistic TCP-IP workloads and signatures, our implementation obtains a speedup of 6.5 with respect to CPU implementations and of two times when compared to previous GPU solutions.

  4. Optimization of detection sensitivity for a Fiber Optic Intrusion Detection System (FOIDS) using design of experiments.

    SciTech Connect

    Miller, Larry D.; Mack, Thomas Kimball; Mitchiner, Kim W.; Varoz, Carmella A.

    2010-06-01

    The Fiber Optic Intrusion Detection System (FOIDS)1 is a physical security sensor deployed on fence lines to detect climb or cut intrusions by adversaries. Calibration of detection sensitivity can be time consuming because, for example, the FiberSenSys FD-332 has 32 settings that can be adjusted independently to provide a balance between a high probability of detection and a low nuisance alarm rate. Therefore, an efficient method of calibrating the FOIDS in the field, other than by trial and error, was needed. This study was conducted to: x Identify the most significant settings for controlling detection x Develop a way of predicting detection sensitivity for given settings x Develop a set of optimal settings for validation The Design of Experiments (DoE) 2-4 methodology was used to generate small, planned test matrixes, which could be statistically analyzed to yield more information from the test data. Design of Experiments is a statistical methodology for quickly optimizing performance of systems with measurable input and output variables. DoE was used to design custom screening experiments based on 11 FOIDS settings believed to have the most affect on WKH types of fence perimeter intrusions were evaluated: simulated cut intrusions and actual climb intrusions. Two slightly different two-level randomized fractional factorial designed experiment matrixes consisting of 16 unique experiments were performed in the field for each type of intrusion. Three repetitions were conducted for every cut test; two repetitions were conducted for every climb test. Total number of cut tests analyzed was 51; the total number of climb tests was 38. This paper discusses the results and benefits of using Design of Experiments (DoE) to calibrate and optimize the settings for a FOIDS sensor

  5. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  6. Network intrusion detection by the coevolutionary immune algorithm of artificial immune systems with clonal selection

    NASA Astrophysics Data System (ADS)

    Salamatova, T.; Zhukov, V.

    2017-02-01

    The paper presents the application of the artificial immune systems apparatus as a heuristic method of network intrusion detection for algorithmic provision of intrusion detection systems. The coevolutionary immune algorithm of artificial immune systems with clonal selection was elaborated. In testing different datasets the empirical results of evaluation of the algorithm effectiveness were achieved. To identify the degree of efficiency the algorithm was compared with analogs. The fundamental rules based of solutions generated by this algorithm are described in the article.

  7. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  8. A distributed signature detection method for detecting intrusions in sensor systems.

    PubMed

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  9. Implementation of an intrusion detection system based on wireless positioning

    NASA Astrophysics Data System (ADS)

    Akopian, David; Chen, Philip; Gunturu, Maheedhar; Sagiraju, Phani K.

    2008-04-01

    WLAN networks are widely deployed and can be used for testbed and application developments in academic environments. This paper presents wireless positioning testbed and a related application implementation methodology as a case study. Nowadays state-of-the-art WLAN positioning systems achieve high location estimation accuracy. In designated areas the signal profile map can be designed and used for such a positioning. Coverage of WLAN networks is typically wider than the authorized areas and there might be network intrusion attempts from the vicinity areas such as parking lots, cafeterias, etc. In addition to conventional verification and authorization methods, the network can locate the user, verify if his location is in the authorized area and apply additional checks to find the violators.

  10. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    DTIC Science & Technology

    2012-03-01

    HLLW.Raleka.A, Alasrou.A, Kassbot, Shelp.A, Blaster, Francette) • E-mail worms – 9 instances (5 variants of w32.Netsky and 4 variants of w32. Beagle ...For instance, the Beagle worm drops itself into the system folder, and then it e-mails its dropper. However, our prototype system 56

  11. Technical evaluation of rapid deployment and re-deployable intrusion detection systems (RDIDS/RIDS)

    SciTech Connect

    Birch, A. )

    1991-01-01

    This paper reports on ECSI-EAG International's Pulsed Infrared Perimeter Intrusion Detection System (IPID) which was originally designed for permanent pole mounted installations and tripod mounted Rapid Deployment applications for NATO military forces. Subsequently, IPID has been upgraded to meet present Rapid Deployment Intrusion Detection System (RDIDS) and Redeployable Intrusion Detection System (RIDS) requirements. Both the RDIDS and RIDS are available in self-contained, wireless, conduitless configurations. The active, pulsed infrared system is integrated with a Radio Frequency (RF) transmitter operating in the VHF and UHF frequencies and powered by a battery backup photovoltaic energy system. The enhancements offer extensive flexibility and cash savings since the RDIDS and RIDS systems can be operational in 1/20 the time of conventional installations.

  12. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  13. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks

    PubMed Central

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the “Internet of things”. By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  14. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  15. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  16. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  17. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  18. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  19. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  20. A Multilevel Secure Constrained Intrusion Detection System Prototype

    DTIC Science & Technology

    2010-12-01

    components consist of a packet classifier, an IP defragmenter and a TCP reassembler, a portscan processor and a detection engine [9]. The packet... portscan processor watches for portscans and the detection engine performs protocol normalization, rule matching, and other detection functions to

  1. Evaluating Machine Learning Classifiers for Hybrid Network Intrusion Detection Systems

    DTIC Science & Technology

    2015-03-26

    evaluator to weight known and unknown threat detection by alert classification , classifier selection is optimized to evaluator values for this application...Traffic Classification . . . . . . . . . . . . . . . . . . . . . . . 19 2.4.2 Network Threat Detection Classification ...67 4.1 Chapter Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 4.2 Classification

  2. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  3. Design and implementation of an intrusion detection system based on IPv6 protocol

    NASA Astrophysics Data System (ADS)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  4. A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation

    NASA Astrophysics Data System (ADS)

    Phit, Thyda; Abe, Kôki

    We propose an architecture of Intrusion Detection System (IDS) for VoIP using a protocol specification-based detection method to monitor the network traffics and alert administrator for further analysis of and response to suspicious activities. The protocol behaviors and their interactions are described by state machines. Traffic that behaves differently from the standard specifications are considered to be suspicious. The IDS has been implemented and simulated using OPNET Modeler, and verified to detect attacks. It was found that our system can detect typical attacks within a reasonable amount of delay time.

  5. Resilient Control and Intrusion Detection for SCADA Systems

    DTIC Science & Technology

    2014-05-01

    50 6.2 The recursive operation of the Kalman Filter: a combination of the high-level diagram in Fig.6.1 and the formulations in...section 6.2.2 . . . . . . . . . . . . . 51 6.3 Block Diagram of Robust Outlier Detection and Resilient Estimation . . . . . . 56 6.4 Tracking Error...and are widely involved in the constitutions of vital enterprises such as pipelines, manufacturing plants and building climate control. Remote

  6. An Intelligent Tutor for Intrusion Detection on Computer Systems.

    ERIC Educational Resources Information Center

    Rowe, Neil C.; Schiavo, Sandra

    1998-01-01

    Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…

  7. Implementing an Intrusion Detection System in the Mysea Architecture

    DTIC Science & Technology

    2008-06-01

    33 B. CONCEPT OF OPERATION.............................................................. 33 1. Multiple IDSes...Architecture [24] ............................................................... 18 Figure 5: Concept of Operations...environment. Proving the concepts will first take place by conducting experiments on Linux systems that are similar to the XTS400 system [3]. These

  8. An Intelligent Tutor for Intrusion Detection on Computer Systems.

    ERIC Educational Resources Information Center

    Rowe, Neil C.; Schiavo, Sandra

    1998-01-01

    Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…

  9. A Multi Agent System for Flow-Based Intrusion Detection

    DTIC Science & Technology

    2013-03-01

    training and online testing execution paths . . . . . . . . . . 106 3.13 Add and Del Mutations...The basis of a centralized approach is the same as that of online rating systems employed for shopping [147]. Following an interaction, a witness...allow the centralized evaluator to determine the resulting reputation. This reputation can then be used as a criterion by which other agents or online

  10. Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization

    NASA Astrophysics Data System (ADS)

    Kim, Dong Seong; Park, Jong Sou

    Previous approaches for modeling Intrusion Detection System (IDS) have been on twofold: improving detection model(s) in terms of (i) feature selection of audit data through wrapper and filter methods and (ii) parameters optimization of detection model design, based on classification, clustering algorithms, etc. In this paper, we present three approaches to model IDS in the context of feature selection and parameters optimization: First, we present Fusion of Genetic Algorithm (GA) and Support Vector Machines (SVM) (FuGAS), which employs combinations of GA and SVM through genetic operation and it is capable of building an optimal detection model with only selected important features and optimal parameters value. Second, we present Correlation-based Hybrid Feature Selection (CoHyFS), which utilizes a filter method in conjunction of GA for feature selection in order to reduce long training time. Third, we present Simultaneous Intrinsic Model Identification (SIMI), which adopts Random Forest (RF) and shows better intrusion detection rates and feature selection results, along with no additional computational overheads. We show the experimental results and analysis of three approaches on KDD 1999 intrusion detection datasets.

  11. Adapting safety requirements analysis to intrusion detection

    NASA Technical Reports Server (NTRS)

    Lutz, R.

    2001-01-01

    Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety techique for Intrusion Detection Systems is hazard analysis.

  12. Adapting safety requirements analysis to intrusion detection

    NASA Technical Reports Server (NTRS)

    Lutz, R.

    2001-01-01

    Several requirements analysis techniques widely used in safety-critical systems are being adapted to support the analysis of secure systems. Perhaps the most relevant system safety techique for Intrusion Detection Systems is hazard analysis.

  13. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  14. Visualization Techniques for Intrusion Detection

    DTIC Science & Technology

    2004-04-01

    interactive animated 2D and 3D graphics in an Intrusion Detection (ID) Analysts Workbench prototype. Visualization techniques allow people to see and...Through the use of various types of detection tools and techniques , including signature based network intrusion detection, anomaly based network

  15. MFIRE-2: A Multi Agent System for Flow-Based Intrusion Detection Using Stochastic Search

    DTIC Science & Technology

    2012-03-01

    environments are naturally modeled as societies of agents, either cooperating with each other to solve complex prob- lems, or else competing with one-another...the intrusion detection problem are encouraging [42]. 2.6 Multiagent Systems A common design question for any IDS is how to maximize the benefits and...developed [25, 96, 79, 74, 43]. In all cases, electronics personas are created, which reflect the specific forum under evaluation ( ecommerce , social

  16. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  17. Integrated Scalable Parallel Firewall and Intrusion Detection System for High-Speed Networks

    SciTech Connect

    Fulp, Errin W; Anderson, Robert E; Ahn, David K

    2009-08-31

    This project developed a new scalable network firewall and Intrusion Protection System (IPS) that can manage increasing traffic loads, higher network speeds, and strict Quality of Service (QoS) requirements. This new approach provides a strong foundation for next-generation network security technologies and products that address growing and unmet needs in the government and corporate sectors by delivering Optimal Network Security. Controlling access is an essential task for securing networks that are vital to private industry, government agencies, and the military. This access can be granted or denied based on the packet header or payload contents. For example, a simple network firewall enforces a security policy by inspecting and filtering the packet headers. As a complement to the firewall, an Intrusion Detection System (IDS) inspects the packet payload for known threat signatures; for example, virus or worm. Similar to a firewall policy, IDS policies consist of multiple rules that specify an action for matching packets. Each rule can specify different items, such as the signature contents and the signature location within the payload. When the firewall and IDS are merged into one device, the resulting system is referred to as an Intrusion Protection System (IPS), which provides both packet header and payload inspections. Having both types of inspections is very desirable and more manageable in a single device.

  18. A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Sainani, Varsha

    The increasing number of network security related incidents have made it necessary for the organizations to actively protect their sensitive data with network intrusion detection systems (IDSs). IDSs are expected to analyze a large volume of data while not placing a significantly added load on the monitoring systems and networks. This requires good data mining strategies which take less time and give accurate results. In this study, a novel data mining assisted multiagent-based intrusion detection system (DMAS-IDS) is proposed, particularly with the support of multiclass supervised classification. These agents can detect and take predefined actions against malicious activities, and data mining techniques can help detect them. Our proposed DMAS-IDS shows superior performance compared to central sniffing IDS techniques, and saves network resources compared to other distributed IDS with mobile agents that activate too many sniffers causing bottlenecks in the network. This is one of the major motivations to use a distributed model based on multiagent platform along with a supervised classification technique.

  19. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    PubMed Central

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  20. An intrusion detection system for the protection of railway assets using Fiber Bragg Grating sensors.

    PubMed

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-09-29

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  1. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  2. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect

    Chen, Yan

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  3. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.

    PubMed

    Sivasamy, Aneetha Avalappampatty; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T(2) method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T(2) statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

  4. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  5. A Hypergraph and Arithmetic Residue-based Probabilistic Neural Network for classification in Intrusion Detection Systems.

    PubMed

    Raman, M R Gauthama; Somu, Nivethitha; Kirthivasan, Kannan; Sriram, V S Shankar

    2017-08-01

    Over the past few decades, the design of an intelligent Intrusion Detection System (IDS) remains an open challenge to the research community. Continuous efforts by the researchers have resulted in the development of several learning models based on Artificial Neural Network (ANN) to improve the performance of the IDSs. However, there exists a tradeoff with respect to the stability of ANN architecture and the detection rate for less frequent attacks. This paper presents a novel approach based on Helly property of Hypergraph and Arithmetic Residue-based Probabilistic Neural Network (HG AR-PNN) to address the classification problem in IDS. The Helly property of Hypergraph was exploited for the identification of the optimal feature subset and the arithmetic residue of the optimal feature subset was used to train the PNN. The performance of HG AR-PNN was evaluated using KDD CUP 1999 intrusion dataset. Experimental results prove the dominance of HG AR-PNN classifier over the existing classifiers with respect to the stability and improved detection rate for less frequent attacks. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  7. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    PubMed Central

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  8. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  9. TAD2: the first truly non-intrusive lie detection system deployed in real crime cases

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Somboonkaew, Armote

    2010-11-01

    Interrogation is an important step for seeking truth from the suspect. With the limit of the intrusive nature of the current polygraph, we show here a highly-sought-after non-intrusive lie detection system with a user-friendly interface called TAD2. The key idea behind our TAD2 is based on the analysis of far-infrared data obtained remotely from the periorbital and nostril areas of the suspect during the interrogation. In this way, measured change in skin temperature around two periorbital areas is converted to a relative blood flow velocity while a respiration pattern is simultaneously determined from the measured change in temperature around the nostril region. In addition, TAD2 is embedded with our automatic baseline assignment that is used for distinguishing the subject's response into normal or abnormal stage. In our TAD2, the officer can choose to perform one of the three standard lie detection tests, namely, a modified zone comparison test, a modified general question test, and an irrelevant & relevant test. Field test results from suspects in real crime cases are discussed.

  10. Wireless Intrusion Detection

    DTIC Science & Technology

    2007-03-01

    LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Frequency Error (kHz) Figure 3-8 Frequency error Distributions...0.40 0.45 Linksys/CIAMPIAJ1 Linksys/LEO with Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Received Power (dBm) Figure 3-10...Belkin/ Libra spoofing N or m al iz ed O cc ur re nc es Rise-Time (samples) Figure 3-12 Packet Rise-Time Distributions During Intrusion

  11. Alerts Analysis and Visualization in Network-based Intrusion Detection Systems

    SciTech Connect

    Yang, Dr. Li

    2010-08-01

    The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short time frame. This work describes how the visualization of raw IDS alert data assists network administrators in understanding the current state of a network and quickens the process of reviewing and responding to intrusion attempts. The project presented in this work consists of three primary components. The first component provides a visual mapping of the network topology that allows the end-user to easily browse clustered alerts. The second component is based on the flocking behavior of birds such that birds tend to follow other birds with similar behaviors. This component allows the end-user to see the clustering process and provides an efficient means for reviewing alert data. The third component discovers and visualizes patterns of multistage attacks by profiling the attacker s behaviors.

  12. A computerized, pictorial representation of sensor status for intrusion detection systems

    SciTech Connect

    Perkins, D.R.

    1991-07-01

    Computerized intrusion detection systems, called the Alarm Monitoring System (AMS), have been in place at multiple Hanford Sites for approximately 10 years. These systems can monitor more than one thousand individual or group data points. The data points are arranged into logical areas called zones. The software for the AMS has the ability to define up to 400 zones. Physical changes to the data points and their locations, buildings, and surrounding areas during the life of the systems make it necessary to update the displays and the maps attached to the systems. The Alarm Display Map (ADM) project is the first of the planned updates. The ADM project provides a cost-effective, state-of-the-art enhancement and replacement for the static display colored LED maps and for obsolete display monitor subsystems. It consists of multiple color monitors connected to a signal dedicated processor (Apple Macintosh IIfx, Figure 1). The displays include an aerial photograph overlaid dynamically with pertinent alarm data along with interchangeable displays of sensor status, alarm zones, and building floor-level details. The system combines object-oriented concepts and intrinsic Macintosh system functions to provide a maintenance environment that nonprogrammers may use. The ADM is a stand-alone display subsystem, easily integrated into any other monitoring application by changing map and sensor designations and adjusting the message protocol. The system is programming maintenance free and adaptable as a display subsystem to almost any existing detection system. 6 figs.

  13. Benefits of wide-area intrusion detection systems using FMCW radar

    NASA Astrophysics Data System (ADS)

    Butler, Walker; Poitevin, Pierre; Bjornholt, John

    2008-04-01

    The history of perimeter protection is based on building fences. That basic concept evolved into detecting activity along fences using a variety of sensors. Today a wide variety of fiber and wire-based sensors are available to mount on a fence, and many different types of IR, radar, optical, seismic and acoustic sensors to place along the fence line. Generally some camera support is provided, with the cameras programmed to point to pre-set locations along the fence. A more robust perimeter protection would consist of wide area sensors with the capability to look out beyond the fence to detect potential intrusion and track intruders. In looking beyond the perimeter, wide area sensors can provide precious time to plan and initiate the appropriate response. In addition, because they sweep a 360-degree circle, the sensors can provide continued tracking of the intrusion, greatly enhancing the effectiveness and safety of the response team. The new wide-area concept consists of using modern radar technology for wide area detection of objects which are moving, and then using the precise location information from the radar to point a camera for assessment. Without having to continually stare at a bank of video monitors, the operator is presented with the location, direction of travel and identification and number of potential intruders, all in a matter of seconds. This paper presents the features of this new wide area system, followed by an overview of radar technology. It closes with a discussion on the benefits of the FMCW topology over Pulse Doppler in security and surveillance applications.

  14. Implementation of Multipattern String Matching Accelerated with GPU for Intrusion Detection System

    NASA Astrophysics Data System (ADS)

    Nehemia, Rangga; Lim, Charles; Galinium, Maulahikmah; Rinaldi Widianto, Ahmad

    2017-04-01

    As Internet-related security threats continue to increase in terms of volume and sophistication, existing Intrusion Detection System is also being challenged to cope with the current Internet development. Multi Pattern String Matching algorithm accelerated with Graphical Processing Unit is being utilized to improve the packet scanning performance of the IDS. This paper implements a Multi Pattern String Matching algorithm, also called Parallel Failureless Aho Corasick accelerated with GPU to improve the performance of IDS. OpenCL library is used to allow the IDS to support various GPU, including popular GPU such as NVIDIA and AMD, used in our research. The experiment result shows that the application of Multi Pattern String Matching using GPU accelerated platform provides a speed up, by up to 141% in term of throughput compared to the previous research.

  15. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  16. Non-Intrusive Magneto-Optic Detecting System for Investigations of Air Switching Arcs

    NASA Astrophysics Data System (ADS)

    Zhang, Pengfei; Zhang, Guogang; Dong, Jinlong; Liu, Wanying; Geng, Yingsan

    2014-07-01

    In current investigations of electric arc plasmas, experiments based on modern testing technology play an important role. To enrich the testing methods and contribute to the understanding and grasping of the inherent mechanism of air switching arcs, in this paper, a non-intrusive detecting system is described that combines the magneto-optic imaging (MOI) technique with the solution to inverse electromagnetic problems. The detecting system works in a sequence of main steps as follows: MOI of the variation of the arc flux density over a plane, magnetic field information extracted from the magneto-optic (MO) images, arc current density distribution and spatial pattern reconstruction by inverting the resulting field data. Correspondingly, in the system, an MOI set-up is designed based on the Faraday effect and the polarization properties of light, and an intelligent inversion algorithm is proposed that involves simulated annealing (SA). Experiments were carried out for high current (2 kA RMS) discharge cases in a typical low-voltage switchgear. The results show that the MO detection system possesses the advantages of visualization, high resolution and response, and electrical insulation, which provides a novel diagnostics tool for further studies of the arc.

  17. Environment-Sensitive Intrusion Detection

    DTIC Science & Technology

    2006-01-01

    Sophia Antipolis , France, Sept. 2004. 2. E. M. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample-guided abstraction refinement. In...Advances in Intrusion Detection, Sophia Antipolis , France, Sept. 2004. 15. S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan

  18. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect

    Smith, Cathy L.

    2013-04-28

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  19. A harmful-intrusion detection method based on background reconstruction and two-dimensional K-S test in an optical fiber pre-warning system

    NASA Astrophysics Data System (ADS)

    Bi, Fukun; Zheng, Tong; Qu, Hongquan; Pang, Liping

    2016-06-01

    The key technology and main difficulty for optical fiber intrusion pre-warning systems (OFIPS) is the extraction of harmful-intrusion signals. After being processed by a phase-sensitive optical time-domain reflectometer (Φ-OTDR), vibration signals can be preliminarily extracted. Generally, these include noises and intrusions. Here, intrusions can be divided into harmful and harmless intrusions. With respect to the close study of signal characteristics, an effective extraction method of harmful intrusion is proposed in the paper. Firstly, in the part of the background reconstruction, all intrusion signals are first detected by a constant false alarm rate (CFAR). We then reconstruct the backgrounds by extracting two-part information of alarm points, time and amplitude. This ensures that the detection background consists of intrusion signals. Secondly, in the part of the two-dimensional Kolmogorov-Smirnov (K-S) test, in order to extract harmful ones from all extracted intrusions, we design a separation method. It is based on the signal characteristics of harmful intrusion, which are shorter time interval and higher amplitude. In the actual OFIPS, the detection method is used in some typical scenes, which includes a lot of harmless intrusions, for example construction sites and busy roads. Results show that we can effectively extract harmful intrusions.

  20. Optimal sensor placement for detecting organophosphate intrusions into water distribution systems.

    PubMed

    Ohar, Ziv; Lahav, Ori; Ostfeld, Avi

    2015-04-15

    Placement of water quality sensors in a water distribution system is a common approach for minimizing contamination intrusion risks. This study incorporates detailed chemistry of organophosphate contaminations into the problem of sensor placement and links quantitative measures of the affected population as a result of such intrusions. The suggested methodology utilizes the stoichiometry and kinetics of the reactions between organophosphate contaminants and free chlorine for predicting the number of affected consumers. This is accomplished through linking a multi-species water quality model and a statistical dose-response model. Three organophosphates (chlorpyrifos, malathion, and parathion) are tested as possible contaminants. Their corresponding by-products were modeled and accounted for in the affected consumers impact calculations. The methodology incorporates a series of randomly generated intrusion events linked to a genetic algorithm for minimizing the contaminants impact through a sensors system. Three example applications are explored for demonstrating the model capabilities through base runs and sensitivity analyses.

  1. Multi-pattern string matching algorithms comparison for intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hasan, Awsan A.; Rashid, Nur'Aini Abdul; Abdulrazzaq, Atheer A.

    2014-12-01

    Computer networks are developing exponentially and running at high speeds. With the increasing number of Internet users, computers have become the preferred target for complex attacks that require complex analyses to be detected. The Intrusion detection system (IDS) is created and turned into an important part of any modern network to protect the network from attacks. The IDS relies on string matching algorithms to identify network attacks, but these string matching algorithms consume a considerable amount of IDS processing time, thereby slows down the IDS performance. A new algorithm that can overcome the weakness of the IDS needs to be developed. Improving the multi-pattern matching algorithm ensure that an IDS can work properly and the limitations can be overcome. In this paper, we perform a comparison between our three multi-pattern matching algorithms; MP-KR, MPHQS and MPH-BMH with their corresponding original algorithms Kr, QS and BMH respectively. The experiments show that MPH-QS performs best among the proposed algorithms, followed by MPH-BMH, and MP-KR is the slowest. MPH-QS detects a large number of signature patterns in short time compared to other two algorithms. This finding can prove that the multi-pattern matching algorithms are more efficient in high-speed networks.

  2. Applying Fast String Matching to Intrusion Detection

    SciTech Connect

    Fisk, M. E.; Varghese G.

    2001-01-01

    The performance of signature-based network intrusion detection tools is dominated by the string matching of packets against many signatures. In this paper we study how the popular intrusion detecton system Snort can be best optimized to utilize different string matching algorithms. We analyze the performance of Snort's current string matching algorithm, Boyer-Moore, and several alternate algorithms. We show that no single algorithm is fastest in the context of a real Snort rule set. Instead, we develop a hybrid system that utilizes three different search algorithms, including one new algorithm presented in this paper. The result is a system that matches many common packets 5 times faster with an average speedup of 50%. While the context of our analysis is intrusion detection, other problem domains such as virus scanning, firewalls, and layer seven switches benefit from our work.

  3. Intrusion Detection Technology Research Based on Apriori Algorithm

    NASA Astrophysics Data System (ADS)

    Hanguang, Li; Yu, Ni

    Intrusion Detection is one of the important parts of the security system. The research has been carried out at home.and abroad for decades in the regard. However, with a variety of new method of attack, the demand of the Intrusion.Detection methods and algorithms have also been asked to improve. By analyzing the technology of Intrusion.Detection System and Data mining in this paper, the author uses Apriori algorithm which is the classic of association.rules in Web-based Intrusion Detection System and applies the rule base generated by the Apriori algorithm to.identify a variety of attacks, improves the overall performance of the detection system.

  4. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems

    PubMed Central

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  5. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems.

    PubMed

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy.

  6. A system for the non-intrusive detection of damage in underground power cables: Damage modeling and sensor system design

    NASA Astrophysics Data System (ADS)

    Gorgen, Marvin Alexander

    A system for non-intrusive sensing of underground power cable impedance is presented. The impedance sensor is used for the detection of damage to underground power cables. The system is capable of taking measurements without the need to interrupt power service. To isolate the impedance measurement from the effects of customer loading, a blocking unit is proposed which presents an open circuit to the impedance sensor in the transmission line at the point where the blocker is clamped onto the cable. Both of the proposed devices are prototyped and evaluated. The impedance sensor is demonstrated to be capable of accurate impedance measurements within a 2% error over a range from 50 to 1000 Ohms. The blocker is demonstrated to provide approximately 30 dB of attenuation over the designed ranged of measurement frequencies. The system can detect impedance changes resulting from corrosion or damage in underground power cables.

  7. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model

    NASA Astrophysics Data System (ADS)

    Tong, Xiaojun; Wang, Zhu; Yu, Haining

    2009-10-01

    A hybrid RBF/Elman neural network model that can be employed for both anomaly detection and misuse detection is presented in this paper. The IDSs using the hybrid neural network can detect temporally dispersed and collaborative attacks effectively because of its memory of past events. The RBF network is employed as a real-time pattern classification and the Elman network is employed to restore the memory of past events. The IDSs using the hybrid neural network are evaluated against the intrusion detection evaluation data sponsored by U.S. Defense Advanced Research Projects Agency (DARPA). Experimental results are presented in ROC curves. Experiments show that the IDSs using this hybrid neural network improve the detection rate and decrease the false positive rate effectively.

  8. Harmful intrusion detection algorithm of optical fiber pre-warning system based on correlation of orthogonal polarization signals

    NASA Astrophysics Data System (ADS)

    Bi, Fukun; Feng, Chong; Qu, Hongquan; Zheng, Tong; Wang, Chonglei

    2017-09-01

    At present, advanced researches of optical fiber intrusion measurement are based on the constant false alarm rate (CFAR) algorithm. Although these conventional methods overcome the interference of non-stationary random signals, there are still a large number of false alarms in practical applications. This is because there is no specific study on orthogonal polarization signals of false alarm and intrusion. In order to further reduce false alarms, we analyze the correlation of optical fiber signals using birefringence of single-mode fiber. This paper proposes the harmful intrusion detection algorithm based on the correlation of two orthogonal polarization signals. The proposed method uses correlation coefficient to distinguish false alarms and intrusions, which can decrease false alarms. Experiments on real data, which are collected from the practical environment, demonstrate that the difference in correlation is a robust feature. Furthermore, the results show that the proposed algorithm can reduce the false alarms and ensure the detection performance when it is used in optical fiber pre-warning system (OFPS).

  9. A new search algorithm based on probability in intrusion detection

    NASA Astrophysics Data System (ADS)

    Sun, Jianhua; Jin, Hai; Han, Zongfen; Chen, Hao; Yang, Yanping

    2004-04-01

    Detection rate is vital to intrusion detection. We propose a new search algorithm base on probability to speed up the process rate for a novel compound intrusion detection system (CIDS). We employ an improved Bayesian decision theorem to build this compound model. The improved Bayesian decision theorem brings four profits to this model. The first is to eliminate the flaws of a narrow definition for normal patterns and intrusion patterns. The second is to extend the known intrusions patterns to novel intrusions patterns. The third is to reduce risks that detecting intrusion brings to system. The last is to offer a method to build a compound intrusion detection model that integrates misuse intrusion detection system (MIDS) and anomaly intrusion detection system (AIDS). During the experiment of this model, we find that different system calls sequences have different probabilities. So the sequences with high probabilities are compared prior to an observed sequence, which is the foundation of our new search algorithm. We evaluate the performance of the new algorithm using numerical results, and the results show this new algorithm increases the detection rate.

  10. Design of an Acoustic Target Intrusion Detection System Based on Small-Aperture Microphone Array.

    PubMed

    Zu, Xingshui; Guo, Feng; Huang, Jingchang; Zhao, Qin; Liu, Huawei; Li, Baoqing; Yuan, Xiaobing

    2017-03-04

    Automated surveillance of remote locations in a wireless sensor network is dominated by the detection algorithm because actual intrusions in such locations are a rare event. Therefore, a detection method with low power consumption is crucial for persistent surveillance to ensure longevity of the sensor networks. A simple and effective two-stage algorithm composed of energy detector (ED) and delay detector (DD) with all its operations in time-domain using small-aperture microphone array (SAMA) is proposed. The algorithm analyzes the quite different velocities between wind noise and sound waves to improve the detection capability of ED in the surveillance area. Experiments in four different fields with three types of vehicles show that the algorithm is robust to wind noise and the probability of detection and false alarm are 96.67% and 2.857%, respectively.

  11. Design of an Acoustic Target Intrusion Detection System Based on Small-Aperture Microphone Array

    PubMed Central

    Zu, Xingshui; Guo, Feng; Huang, Jingchang; Zhao, Qin; Liu, Huawei; Li, Baoqing; Yuan, Xiaobing

    2017-01-01

    Automated surveillance of remote locations in a wireless sensor network is dominated by the detection algorithm because actual intrusions in such locations are a rare event. Therefore, a detection method with low power consumption is crucial for persistent surveillance to ensure longevity of the sensor networks. A simple and effective two-stage algorithm composed of energy detector (ED) and delay detector (DD) with all its operations in time-domain using small-aperture microphone array (SAMA) is proposed. The algorithm analyzes the quite different velocities between wind noise and sound waves to improve the detection capability of ED in the surveillance area. Experiments in four different fields with three types of vehicles show that the algorithm is robust to wind noise and the probability of detection and false alarm are 96.67% and 2.857%, respectively. PMID:28273838

  12. Detection of DoS attacks using intrusion detection sensors

    NASA Astrophysics Data System (ADS)

    Ramakrishna, Pathmenanthan; Maarof, Mohd A.

    2002-09-01

    Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where they run (sometimes even requiring a dedicated system) and are subject to tampering or disabling by an intruder. Additionally, intrusion detection systems have usually obtained information about host behavior through indirect means, such as audit trails or network packet traces. This potentially allows intruders to modify the information before the intrusion detection system obtains it and slows down the detection and prevention of DoS attacks, making it possible for an intruder to hide his activities. In this paper we propose work that will attempt to show that it is possible to perform intrusion detection mechanism of DoS attacks using small sensors embedded in a computer system. These sensors will look for signs of specific intrusions. They will perform target monitoring by observing the behavior of the through an audit trail or other indirect means in real time while the Snort IDS running. Furthermore, by being built into the computer system it could provide a flexible alert sensor which may not impose a considerable extra load on the host they monitor.

  13. Leaky cable intrusion detection sensors

    SciTech Connect

    Hansen, R.W.

    1986-01-01

    Buried Line Field Disturbance Sensors used for the purpose of outdoor perimeter intrusion detection are unique in the sense that they are covert and terrain following. Considerable effort has been spent in recent years to develop an effective Buried Line Sensor using leaky (or ported) cable technology. To date, a modular CW (Continuous Wave) approach to designing such a sensor has proven to be the most effective compromise in terms of cost, performance and installation. Proper design of a leaky cable sensor requires an in-depth knowledge of the coupling performance and attenuation characteristics of the sensor cable to be used. The ''Forward Wave'' (codirectional) method of detection is discussed. This paper contains theoretical and experimental expressions developed to demonstrate operation in terms of cost, performance and ease of installation.

  14. On-line detection of Escherichia coli intrusion in a pilot-scale drinking water distribution system.

    PubMed

    Ikonen, Jenni; Pitkänen, Tarja; Kosse, Pascal; Ciszek, Robert; Kolehmainen, Mikko; Miettinen, Ilkka T

    2017-08-01

    Improvements in microbial drinking water quality monitoring are needed for the better control of drinking water distribution systems and for public health protection. Conventional water quality monitoring programmes are not always able to detect a microbial contamination of drinking water. In the drinking water production chain, in addition to the vulnerability of source waters, the distribution networks are prone to contamination. In this study, a pilot-scale drinking-water distribution network with an on-line monitoring system was utilized for detecting bacterial intrusion. During the experimental Escherichia coli intrusions, the contaminant was measured by applying a set of on-line sensors for electric conductivity (EC), pH, temperature (T), turbidity, UV-absorbance at 254 nm (UVAS SC) and with a device for particle counting. Monitored parameters were compared with the measured E. coli counts using the integral calculations of the detected peaks. EC measurement gave the strongest signal compared with the measured baseline during the E. coli intrusion. Integral calculations showed that the peaks in the EC, pH, T, turbidity and UVAS SC data were detected corresponding to the time predicted. However, the pH and temperature peaks detected were barely above the measured baseline and could easily be mixed with the background noise. The results indicate that on-line monitoring can be utilized for the rapid detection of microbial contaminants in the drinking water distribution system although the peak interpretation has to be performed carefully to avoid being mixed up with normal variations in the measurement data. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  16. A Survey on Intrusion Detection in MANETs.

    NASA Astrophysics Data System (ADS)

    BakeyaLakshmi, P.; Santhi, K.

    2012-10-01

    A mobile ad hoc network is an infrastructureless network that changes its links dynamically, which makes routing in MANET a difficult process. As Mobile Ad-Hoc Network (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a vital role in the data analysis process. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the intrusion detection system. It performs better in increasing speed and predictive accuracy. This survey aims to select and analyze the network features using principal component analysis. While performing various experiments, normal and attack states are simulated and the results for the selected features are analyzed.

  17. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    NASA Astrophysics Data System (ADS)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  18. From Intrusion Detection to Self Protection

    SciTech Connect

    Frincke, Deb; Wespi, Andreas; Zamboni, Diego

    2007-04-11

    Modern computer systems have become so complex and interdependent that the traditional model of system defense, utilizing layers and including an intrusion detection system that provides alerts to a human who responds to them, is becoming unfeasible. Effective human-guided real-time responses are no longer a reasonable expectation for large scale systems--this is particularly troublesome because a failure to respond correctly and rapidly can have disastrous consequences. In an ideal world, our systems would automatically detect and respond to threats of all kinds, including but not limited to automated attacks, human-guided attacks, and the constant onslaught of unsolicited email (spam). Traditionally, these threats have been dealt with by separate communities--the anti-virus community, the intrusion-detection/firewall community, and the anti-spam community. Today however, we see an increasing need for integrating different technologies toward achieving a common goal. In this special issue, we surveyed the research community with the intent of identifying novel, multidisciplinary and integrated approaches to system defense that contribute towards development of true self-protecting and self-healing systems. The result is reflected in the articles we selected.

  19. Intelligent detection and identification in fiber-optical perimeter intrusion monitoring system based on the FBG sensor network

    NASA Astrophysics Data System (ADS)

    Wu, Huijuan; Qian, Ya; Zhang, Wei; Li, Hanyu; Xie, Xin

    2015-12-01

    A real-time intelligent fiber-optic perimeter intrusion detection system (PIDS) based on the fiber Bragg grating (FBG) sensor network is presented in this paper. To distinguish the effects of different intrusion events, a novel real-time behavior impact classification method is proposed based on the essential statistical characteristics of signal's profile in the time domain. The features are extracted by the principal component analysis (PCA), which are then used to identify the event with a K-nearest neighbor classifier. Simulation and field tests are both carried out to validate its effectiveness. The average identification rate (IR) for five sample signals in the simulation test is as high as 96.67%, and the recognition rate for eight typical signals in the field test can also be achieved up to 96.52%, which includes both the fence-mounted and the ground-buried sensing signals. Besides, critically high detection rate (DR) and low false alarm rate (FAR) can be simultaneously obtained based on the autocorrelation characteristics analysis and a hierarchical detection and identification flow.

  20. An improved unsupervised clustering-based intrusion detection method

    NASA Astrophysics Data System (ADS)

    Hai, Yong J.; Wu, Yu; Wang, Guo Y.

    2005-03-01

    Practical Intrusion Detection Systems (IDSs) based on data mining are facing two key problems, discovering intrusion knowledge from real-time network data, and automatically updating them when new intrusions appear. Most data mining algorithms work on labeled data. In order to set up basic data set for mining, huge volumes of network data need to be collected and labeled manually. In fact, it is rather difficult and impractical to label intrusions, which has been a big restrict for current IDSs and has led to limited ability of identifying all kinds of intrusion types. An improved unsupervised clustering-based intrusion model working on unlabeled training data is introduced. In this model, center of a cluster is defined and used as substitution of this cluster. Then all cluster centers are adopted to detect intrusions. Testing on data sets of KDDCUP"99, experimental results demonstrate that our method has good performance in detection rate. Furthermore, the incremental-learning method is adopted to detect those unknown-type intrusions and it decreases false positive rate.

  1. IDDM: Intrusion Detection Using Data Mining Techniques

    DTIC Science & Technology

    2001-05-01

    The IDDM project aims to determine the feasibility and effectiveness of data mining techniques in real-time intrusion detection and produce solutions...for this purpose. Traditionally, data mining is designed to operate on large off-line data sets. Previous attempts to apply the discipline in real...time environments met with varying success. In this paper, we overview earlier attempts to employ data mining principles in intrusion detection and

  2. Security with the 360-degree television-intrusion detection surveillance system

    NASA Astrophysics Data System (ADS)

    Feldman, Sidney; Barton, George G.

    1997-01-01

    A unique, versatile, non-mechanical, non-rotating 360 degrees imaging system has been developed and field-tested successively with conventional black and white, color television, 35-mm, motion picture cameras to prove that intruders, vehicles, radiation can be detected and recognized from any direction using one camera. The system consists of a low-cost, unique first surface reflective conical mirror with special computer programmed aspheric surfaces in operation with conventional narrow field of view (FOV) cameras and objective lenses. The cameras are converted to the 360 degree horizontal FOV and flexibility in conical mirror design provides variable elevation FOV to fit the security application. The wide, efficient spectral reflectance of the conical mirror means that UV, LLLTV, far IR thermal TV cameras can be converted, as well, to 360 degree imaging. The TV real-time 360 degree circular image can be processed electronically and presented on the TV monitor as a typical linear undistorted 360 degree rectangular scene or stacked rectangular scenes and also processed to provide analog to digital real-time motion detection and audible alarm to alert security personnel. For the 360 degree imaging systems or any television systems, the motion detection electronics has been designed to function effectively with image digital memory requirements reduced by magnitudes, thereby, increasing computer speed, but reducing computer costs. The 360 degree TV real-time intruder detection systems can operate in internal and external locations. For external locations, optical filtering and electronic processing has been designed to minimize motion detection false alarms caused by the changing illumination, cloud motion, sun glitter, etc. of the outdoor land or marine environment. The versatile 360 degree TV imaging systems objectives are to replace several narrow FOV cameras for an instantaneous 360 degree sweep, accordingly to reduce number of motion detection accessories, to

  3. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  4. Host-Based Multivariate Statistical Computer Operating Process Anomaly Intrusion Detection System (PAIDS)

    DTIC Science & Technology

    2009-03-01

    Jeffrey W. Humphries , Lt Col, PhD, USAF (Reader) Date iv AFIT/GOR/ENS/09-15 Abstract Most intrusion...Linear Discriminant Analysis (LDA) developed by Sir Ronald A. Fisher, in The Use of Multiple Measurements in Taxonomic Problems (1936) finds a...Agency. National Institue of Standards and Technology. Merkle, L. D., Carlisle, M. C., Humphries , J. W., & Lopez, D. W. (2002). EA-Based Approach for

  5. A Micro-Computer Computational Unit for an IR-CCD Intrusion Detection System.

    DTIC Science & Technology

    1980-10-01

    1 AD-A091 630 PURDUE UNIV LAFAYETTE IN SCHOOL OF ELECTRICAL ENGINEERING F/S 15/3 M RICRO-COMPUTER COMPUTATIONAL UNIT FOR AN IR-CCD INTRUSION DET--ETC...I 4 " I * -. *~s ’.IN’ 1 ~ 6 DISCLAIMER NOTICE THIS DOCUMENT IS BEST QUALITY PRACTICABLE. THE COPY FURNISHED TO DTIC CONTAINED A SIGNIFICANT NUMBER OF...OTTEEN GRoN IhI, Repot Apprloeddfrpbieelaelitiuto niie : 1 ~ ~ R- I. UALnaYNOE RADC ProjectIN ERGNgZAINr NA yn AN .ADESkli (ESRORMEE)M ROETTS Schsicl

  6. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  7. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  8. Seismic intrusion detector system

    DOEpatents

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  9. Data Mining Approaches for Intrusion Detection

    DTIC Science & Technology

    2000-10-12

    In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to use data mining techniques...two general data mining algorithms that we have implemented: the association rules algorithm and the frequent episodes algorithm. These algorithms can

  10. High Order Non-Stationary Markov Models and Anomaly Propagation Analysis in Intrusion Detection System (IDS)

    DTIC Science & Technology

    2007-02-01

    true alarms from false positives . At the host-level, a new anomaly detection mechanism operating that employs non-stationary Markov models is proposed....mitigate false positives, network based correlation of collected anomalies from different hosts is suggested, as well as a new means of host-based anomaly ... detection . The concept of anomaly propagation is based on the premise that false alarms do not propagate within the network. Unless anomaly

  11. Cold Regions Performance of Optical-Fiber and Pulsed Near-Infrared Intrusion Detection Systems

    DTIC Science & Technology

    1994-05-01

    8 Doc 1992 were a direct consequence of (29 Jun). flu P011)6 reliably detected a Fperonr cross- the gravel layer being harri -furozn Once the ice ing...was the poter - FOLDS alarms is wind-induced motion of the ply- tial for twice as many alarms to occur as were re- wood panel to which the enclosure

  12. Sandia Network Intrusion Detection Assessment Version 1.0

    SciTech Connect

    Bauer, Keith C.; Volkmer, Greg

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusion detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a complete

  13. Characterizing and Managing Intrusion Detection System (IDS) Alerts with Multi-Server/Multi-Priority Queuing Theory

    DTIC Science & Technology

    2014-12-26

    sojourn time of a customer, W (Sigman) Or simply, = Using Little’s law as a foundation, governing equations can be derived for many...operates more efficiently (i.e. with reduced sojourn time through the system and thus less wait time in the queue) than multiple servers each fed by...System sojourn time, W, is calculated for each priority

  14. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    1999-06-01

    Mailbomb R-a-Deny(Administrative) .................................................................44 6.5 SYN Flood ( Neptune ) R-a-Deny(Temporary...a system which is actually a trojan horse containing malicious code that gives the attacker system access. Implementation Bug: Bugs in trusted...including many forms of malicious code such as trojan horses, viruses, attacks that take advantage of race conditions, and attacks that take advantage

  15. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  16. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  17. Alerts Visualization and Clustering in Network-based Intrusion Detection

    SciTech Connect

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  18. Extremely Lightweight Intrusion Detection (ELIDe)

    DTIC Science & Technology

    2013-12-01

    conventional computing platform (Dell Inspiron 15N laptop running Mint Maya as the operating system, dual-core Core i5 CPU, 8 GB RAM ), Snort exhibited a peak... RAM usage of approximately 1.2 GB as measured by the Massif memory profiler within the Valgrind suite (3). While this is very reasonable for...equipped with only 512 MB of RAM and would, therefore, be overwhelmed by the runtime demands of Snort. Consequently, any packet analysis solution in the

  19. Industrial Control System Process-Oriented Intrusion Detection (iPoid) Algorithm

    DTIC Science & Technology

    2016-08-01

    system. This report describes the iPoid algorithm and how its software functions, how to write the analysis rules, and how to test the software. 15... write inspection rules. To test iPoid, we simulated a PLC using software (see the Appendix for the unit test procedures). 2. iPoid Modbus Packet...function rule may be used to alert the security analyst if a threat actor is enumerating a PLC or is sending write commands to change setpoints, which

  20. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  1. Misuse and intrusion detection at Los Alamos National Laboratory

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  2. Subsurface Intrusion Detection System

    DTIC Science & Technology

    2014-02-25

    vibrations with a first sensor positioned at a first depth relative to a surface of the earth to generate a first signal and receiving vibrations...with a second sensor positioned at a second depth relative to the surface of the earth to generate a second signal. The second depth is greater than...to measure vibrations of the earth . The plurality of vibration sensors comprise at least an upper sensor and lower sensor at a location. Each signal

  3. Magmatic intrusions and hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Gulick, Virginia Claire

    1993-01-01

    This dissertation investigates the possible role of hydrothermally driven ground-water outflow in the formation of fluvial valleys on Mars. Although these landforms have often been cited as evidence for a past warmer climate and denser atmosphere, recent theoretical modeling precludes such climatic conditions on early Mars when most fluvial valleys formed. Because fluvial valleys continued to form throughout Mars' geological history and the most Earth-like stream valleys on Mars formed well after the decline of the early putative Earth-like climate, it may be unnecessary to invoke drastically different climatic conditions for the formation of the earliest stream valleys. The morphology of most Martian fluvial valleys indicates formation by ground-water sapping which is consistent with a subsurface origin. Additionally, many Martian fluvial valleys formed on volcanoes, impact craters, near fractures, or adjacent to terrains interpreted as igneous intrusions; all are possible locales of vigorous, geologically long-lived hydrothermal circulation. Comparison of Martian valley morphology to similar features on Earth constrains valley genesis scenarios. Volumes of measured Martian fluvial valleys range from 1010 to 1013 m3. Based on terrestrial analogs, total water volumes required to erode these valleys range from approximately 1010 to 1015 m3. The clustered distribution of Martian valleys within a given terrain type, the sapping dominated morphology, and the general lack of associated runoff valleys all indicate the importance of localized ground-water outflow in the formation of these fluvial systems. An analytic model of a conductively cooling cylindrical intrusion is coupled with the U.S. Geological Survey's numerical ground-water computer code SUTRA to evaluate the magnitude of ground-water outflow expected from magmatically-driven hydrothermal systems on Mars. Results indicate that magmatic intrusions of several 102 km3 or larger can provide sufficient ground

  4. A Data Mining approach for building cost-sensitive and light intrusion detection models

    DTIC Science & Technology

    2004-03-01

    AFRL-IF-RS-TR-2004-84 Final Technical Report March 2004 A DATA MINING APPROACH FOR BUILDING COST-SENSITIVE AND LIGHT INTRUSION...4. TITLE AND SUBTITLE A DATA MINING APPROACH FOR BUILDING COST-SENSITIVE AND LIGHT INTRUSION DETECTION MODELS 6. AUTHOR(S) Wenke Lee...NUMBER OF PAGES 31 14. SUBJECT TERMS Intrusion Detection System, IDS, Data Mining , Anomaly Detection Algorithms, Alert Correlation, Light-Weight

  5. Data mining approach to web application intrusions detection

    NASA Astrophysics Data System (ADS)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  6. Real Time Data Mining-Based Intrusion Detection

    DTIC Science & Technology

    2001-06-01

    In this paper, we present an overview of our research in real time data mining -based intrusion detection systems (IDSs). We focus on issues related...to deploying a data mining -based IDS in a real time environment. We describe our approaches to address three types of issues: accuracy, efficiency, and...usability. To improve accuracy, data mining programs are used to analyze audit data and extract features that can distinguish normal activities from

  7. Intrusion Detection With Quantum Mechanics: A Photonic Quantum Fence

    DTIC Science & Technology

    2008-12-01

    computing and quantum key distribution (QKD). Some of the most remarkable examples include quantum teleportation for the non-local transfer of...1 INTRUSION DETECTION WITH QUANTUM MECHANICS: A PHOTONIC QUANTUM FENCE T. S. Humble*, R. S. Bennink, and W. P. Grice Oak Ridge National...use of quantum -mechanically entangled photons for sensing intrusions across a physical perimeter. Our approach to intrusion detection uses the no

  8. Use of behavioral biometrics in intrusion detection and online gaming

    NASA Astrophysics Data System (ADS)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2006-04-01

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game server administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

  9. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types.

  10. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data.

  11. An integrated pattern recognition approach for intrusion detection.

    PubMed

    Pandit, Amod; Stanley, R Joe; McMillin, Bruce

    2002-01-01

    Intrusion detection systems (IDS) attempt to address the vulnerability of computer-based systems for abuse by insiders and to penetration by outsiders. An IDS is required to examine an enormous amount of data generated by computer networks to assist in the abuse detection process. Thus, there is a need to develop automated tools that address these requirements to assist system operators in the detection of violations of existing security policies. In this research, an automated IDS is proposed for insider threats in a distributed system. The proposed IDS functions as an anomaly detector for insider system operations based on the analysis of the system's log files. The approach integrates dynamic programming and adaptive resonance theory (ART1) clustering. The integrated approach aligns sequences of log events with prototypical sequences of events for performing tasks and classifies the aligned sequences for intrusion detection. The system examined for this research is a Boots System for controlling the movement of boots from one place to another under specific security restrictions related to the boot orders. We present the proposed model, the results achieved and the analysis of an implemented prototype.

  12. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  13. Organizational coevolutionary classifiers with fuzzy logic used in intrusion detection

    NASA Astrophysics Data System (ADS)

    Chen, Zhenguo

    2009-07-01

    Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. To solve the intrusion detection question, we introduce the fuzzy logic into Organization CoEvolutionary algorithm [1] and present the algorithm of Organization CoEvolutionary Classification with Fuzzy Logic. In this paper, we give an intrusion detection models based on Organization CoEvolutionary Classification with Fuzzy Logic. After illustrating our model with a representative dataset and applying it to the real-world network datasets KDD Cup 1999. The experimental result shown that the intrusion detection based on Organizational Coevolutionary Classifiers with Fuzzy Logic can give higher recognition accuracy than the general method.

  14. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT.

    PubMed

    Lopez-Martin, Manuel; Carro, Belen; Sanchez-Esguevillas, Antonio; Lloret, Jaime

    2017-08-26

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery.

  15. Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT

    PubMed Central

    Carro, Belen; Sanchez-Esguevillas, Antonio

    2017-01-01

    The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host’s network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an intrusion detection system will be critical as its economic importance continues to grow, making it the focus of future intrusion attacks. In this work, we propose a new network intrusion detection method that is appropriate for an Internet of Things network. The proposed method is based on a conditional variational autoencoder with a specific architecture that integrates the intrusion labels inside the decoder layers. The proposed method is less complex than other unsupervised methods based on a variational autoencoder and it provides better classification results than other familiar classifiers. More important, the method can perform feature reconstruction, that is, it is able to recover missing features from incomplete training datasets. We demonstrate that the reconstruction accuracy is very high, even for categorical features with a high number of distinct values. This work is unique in the network intrusion detection field, presenting the first application of a conditional variational autoencoder and providing the first algorithm to perform feature recovery. PMID:28846608

  16. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  17. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  18. WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion System

    NASA Astrophysics Data System (ADS)

    Rahman, Ahmedur; Ezeife, C. I.; Aggarwal, A. K.

    Intrusion detection in wireless networks has become a vital part in wireless network security systems with wide spread use of Wireless Local Area Networks (WLAN). Currently, almost all devices are Wi-Fi (Wireless Fidelity) capable and can access WLAN. This paper proposes an Intrusion Detection System, WiFi Miner, which applies an infrequent pattern association rule mining Apriori technique to wireless network packets captured through hardware sensors for purposes of real time detection of intrusive or anomalous packets. Contributions of the proposed system includes effectively adapting an efficient data mining association rule technique to important problem of intrusion detection in a wireless network environment using hardware sensors, providing a solution that eliminates the need for hard-to-obtain training data in this environment, providing increased intrusion detection rate and reduction of false alarms.

  19. Non-intrusive cooling system

    DOEpatents

    Morrison, Edward F.; Bergman, John W.

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  20. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  1. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  2. Intrusion Correlation Using Ontologies and Multi-agent Systems

    NASA Astrophysics Data System (ADS)

    Isaza, Gustavo; Castillo, Andrés; López, Marcelo; Castillo, Luis; López, Manuel

    This paper proposes an ontology model for representing intrusion detection events and prevention rules, integrating multiagent systems based on unsupervised and supervised techniques for classification, correlation and pattern recognition. The semantic model describes attacks signatures, reaction tasks, axioms with alerts communication and correlation; nevertheless we have developed the prevention architecture integrated with another security tools. This article focuses on the approach to incorporate semantic operations that facilitate alerts correlation process and providing the inference and reasoning to the ontology model.

  3. Anomaly detection enhanced classification in computer intrusion detection

    SciTech Connect

    Fugate, M. L.; Gattiker, J. R.

    2002-01-01

    This report describes work with the goal of enhancing capabilities in computer intrusion detection. The work builds upon a study of classification performance, that compared various methods of classifying information derived from computer network packets into attack versus normal categories, based on a labeled training dataset. This previous work validates our classification methods, and clears the ground for studying whether and how anomaly detection can be used to enhance this performance, The DARPA project that initiated the dataset used here concluded that anomaly detection should be examined to boost the performance of machine learning in the computer intrusion detection task. This report investigates the data set for aspects that will be valuable for anomaly detection application, and supports these results with models constructed from the data. In this report, the term anomaly detection means learning a model from unlabeled data, and using this to make some inference about future data. Our data is a feature vector derived from network packets: an 'example' or 'sample'. On the other hand, classification means building a model from labeled data, and using that model to classify unlabeled (future) examples. There is some precedent in the literature for combining these methods. One approach is to stage the two techniques, using anomaly detection to segment data into two sets for classification. An interpretation of this is a method to combat nonstationarity in the data. In our previous work, we demonstrated that the data has substantial temporal nonstationarity. With classification methods that can be thought of as learning a decision surface between two statistical distributions, performance is expected to degrade significantly when classifying examples that are from regions not well represented in the training set. Anomaly detection can be seen as a problem of learning the density (landscape) or the support (boundary) of a statistical distribution so that

  4. Non-intrusive practitioner pupil detection for unmodified microscope oculars.

    PubMed

    Fuhl, Wolfgang; Santini, Thiago; Reichert, Carsten; Claus, Daniel; Herkommer, Alois; Bahmani, Hamed; Rifai, Katharina; Wahl, Siegfried; Kasneci, Enkelejda

    2016-12-01

    Modern microsurgery is a long and complex task requiring the surgeon to handle multiple microscope controls while performing the surgery. Eye tracking provides an additional means of interaction for the surgeon that could be used to alleviate this situation, diminishing surgeon fatigue and surgery time, thus decreasing risks of infection and human error. In this paper, we introduce a novel algorithm for pupil detection tailored for eye images acquired through an unmodified microscope ocular. The proposed approach, the Hough transform, and six state-of-the-art pupil detection algorithms were evaluated on over 4000 hand-labeled images acquired from a digital operating microscope with a non-intrusive monitoring system for the surgeon eyes integrated. Our results show that the proposed method reaches detection rates up to 71% for an error of ≈3% w.r.t the input image diagonal; none of the state-of-the-art pupil detection algorithms performed satisfactorily. The algorithm and hand-labeled data set can be downloaded at:: www.ti.uni-tuebingen.de/perception.

  5. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  6. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  7. An ethernet/IP security review with intrusion detection applications

    SciTech Connect

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  8. Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time

    NASA Astrophysics Data System (ADS)

    Pham, Congduc

    This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle of view and those with very small angle of view. We show by simulation how a dynamic criticality management scheme can provide fast event detection for mission-critical surveillance applications by increasing the network lifetime and providing low stealth time of intrusions.

  9. Digital Signal Processing Leveraged for Intrusion Detection

    DTIC Science & Technology

    2008-03-27

    threats including, but not limited to, pre-packaged or scripted attacks delivered by readily available tools such as Metasploit , WinNuke and others...The metasploit project, 2008. [Rob04] Michael J. Roberts. Signals and systems :analysis using transform methods and MATLAB. McGrawHill, Dubuque, Iowa

  10. Dynamic Probing for Intrusion Detection under Resource Constraints

    DTIC Science & Technology

    2013-06-01

    performance measure of regret, defined as the performance loss compared to that of a genie who knows the entire attack processes a priori and probes...performance as that of the omniscient genie . Index Terms—Intrusion detection, dynamic probing, non- stochastic multi-armed bandit, regret. I...dynamic probing strategy under the performance measure of regret, de ned as the performance loss compared to that of a genie who knows the entire attack

  11. Software Decoys: Intrusion Detection and Countermeasures

    DTIC Science & Technology

    2002-06-01

    TCP is a fre- quently called component and known to be susceptible to certain types of attacks, such as that of the “ Cheese ” worm [7] that attempts...calls resulting from the shell commands, the events at other components may need to be instrumented; this is the case for the Cheese worm . Some of...haviors of components of the Unix operating system with the Morris Internet worm . More recent worms , such as “Code Red” and “ Cheese ,” are variants of the

  12. Evaluation of Two Host-Based Intrusion Prevention Systems

    DTIC Science & Technology

    2005-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. AN EVALUATION OF TWO...HOST BASED INTRUSION PREVENTION SYSTEMS by Keith Labbe June 2005 Thesis Advisors: Neil Rowe J.D. Fulp...AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Evaluation of Two Host-Based Intrusion Prevention Systems 6. AUTHOR(S) Keith Labbe 5

  13. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  14. Preventing Point-of-Sale System Intrusions

    DTIC Science & Technology

    2014-06-01

    month Crimina l intent may be more focused on identity theft than payme nt card fraud 37 Unknown Zero day or custom keylogger TBD TBD 4...Several major United States retailers have suffered large-scale thefts of payment card information as the result of intrusions against point-of-sale...ABSTRACT Several major United States retailers have suffered large-scale thefts of payment card information as the result of intrusions against point

  15. Assessment of Mitigation Systems on Vapor Intrusion ...

    EPA Pesticide Factsheets

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor environments are often negatively pressurized with respect to outdoor air and soil gas (for example, from exhaust fans or the stack effect), and this pressure difference allows soil gas containing subsurface vapors to flow into indoor air through advection. In addition, concentration differentials cause VOCs and radon to migrate from areas of higher to lower concentrations through diffusion, which is another cause of vapor intrusion. Current practice for evaluating the vapor intrusion pathway involves a multiple line of evidence approach based on direct measurements in groundwater, external soil gas, subslab soil gas, and/or indoor air. No single line of evidence is considered definitive, and direct measurements of vapor intrusion can be costly, especially where significant spatial and temporal variability require repeated measurements at multiple locations to accurately assess the chronic risks of long-term exposure to volatile organic compounds (VOCs) like chloroform, perchloroethylene (PCE), and trichloroethylene (TCE).

  16. Phase-sensitive optical time domain reflectometer for distributed fence-perimeter intrusion detection

    NASA Astrophysics Data System (ADS)

    Yu, Xuhui; Zhou, Deliang; Lu, Bin; Liu, Sufang; Pan, Ming

    2015-10-01

    In this paper, we demonstrate a distributed fence-perimeter intrusion detection system using a phase-sensitive optical time domain reflectometer (Φ-OTDR) with several advantages, such as high spatial resolution, large detection range, single-end measurement and immunity from electromagnetic interference. By the effort of generating a high-extinction-ratio optical pulse, optimizing the incident optical power and utilizing a differential algorithm, a home-made Φ-OTDR system, as a distributed vibration sensor, is implemented with a spatial resolution of 10 meter. Nowadays, a fence-perimeter intrusion detection system is desired for the security monitor. We set up a fence perimeter using a fiber cable containing only one fiber and a field experiment is carried out based on our Φ-OTDR system. Various vibration events are recorded and analyzed, including wind blowing, personal climbing and knocking. The experiment results reveal unique vibration characteristics of different events in the frequency domain and confirm the effectiveness of the homemade Φ-OTDR system in the application of the distributed fence-perimeter intrusion detection.

  17. Detection of deep stratospheric intrusions by cosmogenic 35S.

    PubMed

    Lin, Mang; Su, Lin; Shaheen, Robina; Fung, Jimmy C H; Thiemens, Mark H

    2016-10-04

    The extent to which stratospheric intrusions on synoptic scales influence the tropospheric ozone (O3) levels remains poorly understood, because quantitative detection of stratospheric air has been challenging. Cosmogenic (35)S mainly produced in the stratosphere has the potential to identify stratospheric air masses at ground level, but this approach has not yet been unambiguously shown. Here, we report unusually high (35)S concentrations (7,390 atoms m(-3); ∼16 times greater than annual average) in fine sulfate aerosols (aerodynamic diameter less than 0.95 µm) collected at a coastal site in southern California on May 3, 2014, when ground-level O3 mixing ratios at air quality monitoring stations across southern California (43 of 85) exceeded the recently revised US National Ambient Air Quality Standard (daily maximum 8-h average: 70 parts per billion by volume). The stratospheric origin of the significantly enhanced (35)S level is supported by in situ measurements of air pollutants and meteorological variables, satellite observations, meteorological analysis, and box model calculations. The deep stratospheric intrusion event was driven by the coupling between midlatitude cyclones and Santa Ana winds, and it was responsible for the regional O3 pollution episode. These results provide direct field-based evidence that (35)S is an additional sensitive and unambiguous tracer in detecting stratospheric air in the boundary layer and offer the potential for resolving the stratospheric influences on the tropospheric O3 level.

  18. Detection of deep stratospheric intrusions by cosmogenic 35S

    PubMed Central

    Su, Lin; Shaheen, Robina; Fung, Jimmy C. H.; Thiemens, Mark H.

    2016-01-01

    The extent to which stratospheric intrusions on synoptic scales influence the tropospheric ozone (O3) levels remains poorly understood, because quantitative detection of stratospheric air has been challenging. Cosmogenic 35S mainly produced in the stratosphere has the potential to identify stratospheric air masses at ground level, but this approach has not yet been unambiguously shown. Here, we report unusually high 35S concentrations (7,390 atoms m−3; ∼16 times greater than annual average) in fine sulfate aerosols (aerodynamic diameter less than 0.95 µm) collected at a coastal site in southern California on May 3, 2014, when ground-level O3 mixing ratios at air quality monitoring stations across southern California (43 of 85) exceeded the recently revised US National Ambient Air Quality Standard (daily maximum 8-h average: 70 parts per billion by volume). The stratospheric origin of the significantly enhanced 35S level is supported by in situ measurements of air pollutants and meteorological variables, satellite observations, meteorological analysis, and box model calculations. The deep stratospheric intrusion event was driven by the coupling between midlatitude cyclones and Santa Ana winds, and it was responsible for the regional O3 pollution episode. These results provide direct field-based evidence that 35S is an additional sensitive and unambiguous tracer in detecting stratospheric air in the boundary layer and offer the potential for resolving the stratospheric influences on the tropospheric O3 level. PMID:27655890

  19. Detection of deep stratospheric intrusions by cosmogenic 35S

    NASA Astrophysics Data System (ADS)

    Lin, Mang; Su, Lin; Shaheen, Robina; Fung, Jimmy C. H.; Thiemens, Mark H.

    2016-10-01

    The extent to which stratospheric intrusions on synoptic scales influence the tropospheric ozone (O3) levels remains poorly understood, because quantitative detection of stratospheric air has been challenging. Cosmogenic 35S mainly produced in the stratosphere has the potential to identify stratospheric air masses at ground level, but this approach has not yet been unambiguously shown. Here, we report unusually high 35S concentrations (7,390 atoms m-3; ˜16 times greater than annual average) in fine sulfate aerosols (aerodynamic diameter less than 0.95 µm) collected at a coastal site in southern California on May 3, 2014, when ground-level O3 mixing ratios at air quality monitoring stations across southern California (43 of 85) exceeded the recently revised US National Ambient Air Quality Standard (daily maximum 8-h average: 70 parts per billion by volume). The stratospheric origin of the significantly enhanced 35S level is supported by in situ measurements of air pollutants and meteorological variables, satellite observations, meteorological analysis, and box model calculations. The deep stratospheric intrusion event was driven by the coupling between midlatitude cyclones and Santa Ana winds, and it was responsible for the regional O3 pollution episode. These results provide direct field-based evidence that 35S is an additional sensitive and unambiguous tracer in detecting stratospheric air in the boundary layer and offer the potential for resolving the stratospheric influences on the tropospheric O3 level.

  20. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks.

    PubMed

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-10-13

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks.

  1. A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks

    PubMed Central

    Ma, Tao; Wang, Fen; Cheng, Jianjun; Yu, Yang; Chen, Xiaoyun

    2016-01-01

    The development of intrusion detection systems (IDS) that are adapted to allow routers and network defence systems to detect malicious network traffic disguised as network protocols or normal access is a critical challenge. This paper proposes a novel approach called SCDNN, which combines spectral clustering (SC) and deep neural network (DNN) algorithms. First, the dataset is divided into k subsets based on sample similarity using cluster centres, as in SC. Next, the distance between data points in a testing set and the training set is measured based on similarity features and is fed into the deep neural network algorithm for intrusion detection. Six KDD-Cup99 and NSL-KDD datasets and a sensor network dataset were employed to test the performance of the model. These experimental results indicate that the SCDNN classifier not only performs better than backpropagation neural network (BPNN), support vector machine (SVM), random forest (RF) and Bayes tree models in detection accuracy and the types of abnormal attacks found. It also provides an effective tool of study and analysis of intrusion detection in large networks. PMID:27754380

  2. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOEpatents

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  3. Detecting Aseismic Fault Slip and Magmatic Intrusion From Seismicity Data

    NASA Astrophysics Data System (ADS)

    Llenos, A. L.; McGuire, J. J.

    2007-12-01

    Seismicity triggered by aseismic deformation, such as magmatic intrusions or afterslip, can be used to detect the occurrence of these otherwise difficult to observe processes. Recent studies suggest that aseismic deformation can trigger large amounts of seismicity in a variety of plate tectonic settings. We have developed a new technique that takes advantage of this triggered seismicity to estimate the time-history of aseismic stressing rate on a fault- zone by combining the rate and state dependent friction and the Epidemic Type Aftershock Sequence (ETAS) models of seismicity-rate [ Dieterich, 1994; Ogata, 1988]. In the rate-state model, the integration of an observed seismicity rate results in an estimate of the stress rate acting in a given space-time window. However, the seismicity rate observed in any catalog comes from 3 primary sources: coseismically-triggered seismicity (aftershocks), tectonically-triggered seismicity (i.e., from long-term tectonic loading), and aseismically-triggered seismicity (e.g., from dike intrusion, aseismic slip transients, or fluid migration). In catalogs dominated by directly triggered aftershocks (i.e., ETAS branching ratios >~0.7), the coseismically-triggered seismicity rate will be much larger than the aseismically-triggered rate and will dominate the estimate of stressing-rate, obscuring the aseismic transient of interest if the rate-state method is applied directly. The challenge therefore lies in isolating the aseismically-triggered seismicity rate from the coseismically-triggered seismicity rate. The ETAS model [ Ogata, 1988] provides a natural way to separate the aseismic and coseismic seismicity rates, as the ETAS parameter μ essentially reflects the aseismically-triggered rate (as well as the background tectonically-triggered rate). To develop a method that can resolve the magnitude and time history of aseismic stress transients even in high branching ratio regions, we combine the rate-state and ETAS models into a

  4. Hybrid TDM/WDM based fiber-optic sensor network for perimeter intrusion detection

    NASA Astrophysics Data System (ADS)

    Li, Xiaolei; Sun, Qizhen; Sun, Zhifeng; Wo, Jianghai; Zhang, Manliang; Liu, Deming

    2011-05-01

    A distributed fiber-optic sensor system is proposed and demonstrated for long-distance intrusion-detection, which employs the hybrid time/wavelength division multiplexing (TDM/WDM) architecture. By utilizing 20 time zones and 6 wavelengths, the system contains up to 120 fiber sensing units (OSU), of which the distributed sensing distance is from 0 to 500m. So the whole sensing distance of this system could reach 60 km. The system has been demonstrated to run stably exceed six months with the false alarm rate of less than 4%.

  5. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  6. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  7. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different.

  8. Nuclear data for non-intrusive inspection systems

    SciTech Connect

    Bendahan, J.; Loveman, R.; Gozani, T.

    1994-12-31

    Non-intrusive inspection systems based on nuclear techniques utilize the interaction of neutrons and gamma rays to determine the elemental constituents of the inspected object. The Thermal Neutron Analysis System has been used to detect explosives and narcotics concealed in passenger luggage and small objects. More recently the Pulsed Fast Neutron Analysis technique is being used to detect contraband in large cargo containers and has been proposed for the characterization of waste drums. The design of these systems requires the utilization of simulation codes where the accuracy of the results depends largely on the nuclear libraries. Several nuclear data evaluations were reviewed and compared with existing data to identify the most accurate ones. Large discrepancies were found among the various nuclear libraries, mainly in the production cross sections and angular distributions of gamma rays, stimulated by neutron interactions. An experimental program was carried out to correct and complement the required data. Evaluations of gamma-ray production cross sections for carbon, oxygen and chlorine are reviewed and compared with existing and new experimental data.

  9. Scanning seismic intrusion detection method and apparatus. [monitoring unwanted subterranean entry and departure

    NASA Technical Reports Server (NTRS)

    Lee, R. D. (Inventor)

    1983-01-01

    An intrusion monitoring system includes an array of seismic sensors, such as geophones, arranged along a perimeter to be monitored for unauthorized intrusion as by surface movement or tunneling. Two wires lead from each sensor to a central monitoring station. The central monitoring station has three modes of operation. In a first mode of operation, the output of all of the seismic sensors is summed into a receiver for amplification and detection. When the amplitude of the summed signals exceeds a certain predetermined threshold value an alarm is sounded. In a second mode of operation, the individual output signals from the sensors are multiplexed into the receiver for sequentially interrogating each of the sensors.

  10. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  11. Integration of Self-Organizing Map (SOM) and Kernel Density Estimation (KDE) for network intrusion detection

    NASA Astrophysics Data System (ADS)

    Cao, Yuan; He, Haibo; Man, Hong; Shen, Xiaoping

    2009-09-01

    This paper proposes an approach to integrate the self-organizing map (SOM) and kernel density estimation (KDE) techniques for the anomaly-based network intrusion detection (ABNID) system to monitor the network traffic and capture potential abnormal behaviors. With the continuous development of network technology, information security has become a major concern for the cyber system research. In the modern net-centric and tactical warfare networks, the situation is more critical to provide real-time protection for the availability, confidentiality, and integrity of the networked information. To this end, in this work we propose to explore the learning capabilities of SOM, and integrate it with KDE for the network intrusion detection. KDE is used to estimate the distributions of the observed random variables that describe the network system and determine whether the network traffic is normal or abnormal. Meanwhile, the learning and clustering capabilities of SOM are employed to obtain well-defined data clusters to reduce the computational cost of the KDE. The principle of learning in SOM is to self-organize the network of neurons to seek similar properties for certain input patterns. Therefore, SOM can form an approximation of the distribution of input space in a compact fashion, reduce the number of terms in a kernel density estimator, and thus improve the efficiency for the intrusion detection. We test the proposed algorithm over the real-world data sets obtained from the Integrated Network Based Ohio University's Network Detective Service (INBOUNDS) system to show the effectiveness and efficiency of this method.

  12. Distributed Streams-Based Data-Mining for Application Intrusion Detection

    DTIC Science & Technology

    2004-06-17

    This investigation considered the challenge of real-time, distributed data mining across high-level TCP/IP protocols for application layer intrusion...approach to real-time data mining appears to be a useful in many areas including; security monitoring, intrusion detection and sensor networks.

  13. Intrusion Detection Systems with Live Knowledge System

    DTIC Science & Technology

    2016-05-31

    classification using cue phrases, in AI 2003: Advances in Artificial Intelligence . 2003, Springer. p. 759-771 DISTRIBUTION A. Approved for public...for Phishing Prediction”, 14th Pacific Rim International Conference on Artificial Intelligence , 2016 (Accepted) [5] Han, SC and BH Kang...for Phishing Prediction”, 14th Pacific Rim International Conference on Artificial Intelligence Han, Soyeon Caren and Byeong Ho Kang. (2016, Submitted

  14. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  15. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2011-11-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  16. An armored-cable-based fiber Bragg grating sensor array for perimeter fence intrusion detection

    NASA Astrophysics Data System (ADS)

    Hao, Jianzhong; Dong, Bo; Varghese, Paulose; Phua, Jiliang; Foo, Siang Fook

    2012-01-01

    In this paper, an armored-cable-based optical fiber Bragg grating (FBG) sensor array, for perimeter fence intrusion detection, is demonstrated and some of the field trial results are reported. The field trial was conducted at a critical local installation in Singapore in December 2010. The sensor array was put through a series of both simulated and live intrusion scenarios to test the stability and suitability of operation in the local environmental conditions and to determine its capabilities in detecting and reporting these intrusions accurately to the control station. Such a sensor array can provide perimeter intrusion detection with fine granularity and preset pin-pointing accuracy. The various types of intrusions included aided or unaided climbs, tampering and cutting of the fence, etc. The unique sensor packaging structure provides high sensitivity, crush resistance and protection against rodents. It is also capable of resolving nuisance events such as rain, birds sitting on the fence or seismic vibrations. These sensors are extremely sensitive with a response time of a few seconds. They can be customized for a desired spatial resolution and pre-determined sensitivity. Furthermore, it is easy to cascade a series of such sensors to monitor and detect intrusion events over a long stretch of fence line. Such sensors can be applied to real-time intrusion detection for perimeter security, pipeline security and communications link security.

  17. DETECTION OR WARNING SYSTEM

    DOEpatents

    Tillman, J E

    1953-10-20

    This patent application describes a sensitive detection or protective system capable of giving an alarm or warning upon the entrance or intrusion of any body into a defined area or zone protected by a radiation field of suitable direction or extent.

  18. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  19. Network Intrusion Dataset Assessment

    DTIC Science & Technology

    2013-03-01

    and Manuel Correia. “Tunable immune detectors for behaviour-based network intrusion detection.” In Artificial Immune Systems, volume 6825 of Lecture...Norbik Bashah Idris. “Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks.” In International...ISBN 978-3-642-24999-0. [26] Ji, Zhou and Dipankar Dasgupta. “Estimating the detector coverage in a negative selection algorithm”. Proceedings of the

  20. Research on artificial neural network intrusion detection photochemistry based on the improved wavelet analysis and transformation

    NASA Astrophysics Data System (ADS)

    Li, Hong; Ding, Xue

    2017-03-01

    This paper combines wavelet analysis and wavelet transform theory with artificial neural network, through the pretreatment on point feature attributes before in intrusion detection, to make them suitable for improvement of wavelet neural network. The whole intrusion classification model gets the better adaptability, self-learning ability, greatly enhances the wavelet neural network for solving the problem of field detection invasion, reduces storage space, contributes to improve the performance of the constructed neural network, and reduces the training time. Finally the results of the KDDCup99 data set simulation experiment shows that, this method reduces the complexity of constructing wavelet neural network, but also ensures the accuracy of the intrusion classification.

  1. Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

    NASA Astrophysics Data System (ADS)

    Zhou, Mian; Lang, Sheau-Dong

    2005-03-01

    While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.

  2. A new physical barrier system for seawater intrusion control

    NASA Astrophysics Data System (ADS)

    Abdoulhalik, Antoifi; Ahmed, Ashraf; Hamill, G. A.

    2017-06-01

    The construction of subsurface physical barriers is one of various methods used to control seawater intrusion (SWI) in coastal aquifers. This study proposes the mixed physical barrier (MPB) as a new barrier system for seawater intrusion control, which combines an impermeable cutoff wall and a semi-permeable subsurface dam. The effect of the traditionally-used physical barriers on transient saltwater wedge dynamics was first explored for various hydraulic gradients, and the workability of the MPB was thereafter thoroughly analysed. A newly developed automated image analysis based on light-concentration conversion was used in the experiments, which were completed in a porous media tank. The numerical code SEAWAT was used to assess the consistency of the experimental data and examine the sensitivity of the performance of the barriers to various key parameters. The results show that the MPB induced a visible lifting of the dense saline flux upward towards the outlet by the light freshwater. This saltwater lifting mechanism, observed for the first time, induced significant reduction to the saline water intrusion length. The use of the MPB yielded up to 62% and 42% more reduction of the saltwater intrusion length than the semi-permeable dam and the cutoff wall, respectively. The performance achieved by the MPB with a wall depth of 40% of the aquifer thickness was greater than that of a single cutoff wall with a penetration depth of 90% of the aquifer thickness (about 13% extra reduction). This means that the MPB could produce better seawater intrusion reduction than the traditionally used barriers at even lower cost.

  3. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    SciTech Connect

    Micklich, B.J.; Roche, C.T.; Fink, C.L.; Yule, T.J.; Demirgian, J.C.; Kunz, T.D.; Ulvick, S.J.; Cui, J.

    1995-12-31

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), including participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.

  4. Evolving optimised decision rules for intrusion detection using particle swarm paradigm

    NASA Astrophysics Data System (ADS)

    Sivatha Sindhu, Siva S.; Geetha, S.; Kannan, A.

    2012-12-01

    The aim of this article is to construct a practical intrusion detection system (IDS) that properly analyses the statistics of network traffic pattern and classify them as normal or anomalous class. The objective of this article is to prove that the choice of effective network traffic features and a proficient machine-learning paradigm enhances the detection accuracy of IDS. In this article, a rule-based approach with a family of six decision tree classifiers, namely Decision Stump, C4.5, Naive Baye's Tree, Random Forest, Random Tree and Representative Tree model to perform the detection of anomalous network pattern is introduced. In particular, the proposed swarm optimisation-based approach selects instances that compose training set and optimised decision tree operate over this trained set producing classification rules with improved coverage, classification capability and generalisation ability. Experiment with the Knowledge Discovery and Data mining (KDD) data set which have information on traffic pattern, during normal and intrusive behaviour shows that the proposed algorithm produces optimised decision rules and outperforms other machine-learning algorithm.

  5. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  6. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  7. Long-distance fiber optic sensing solutions for pipeline leakage, intrusion, and ground movement detection

    NASA Astrophysics Data System (ADS)

    Nikles, Marc

    2009-05-01

    An increasing number of pipelines are constructed in remote regions affected by harsh environmental conditions where pipeline routes often cross mountain areas which are characterized by unstable grounds and where soil texture changes between winter and summer increase the probability of hazards. Third party intentional interference or accidental intrusions are a major cause of pipeline failures leading to large leaks or even explosions. Due to the long distances to be monitored and the linear nature of pipelines, distributed fiber optic sensing techniques offer significant advantages and the capability to detect and localize pipeline disturbance with great precision. Furthermore pipeline owner/operators lay fiber optic cable parallel to transmission pipelines for telecommunication purposes and at minimum additional cost monitoring capabilities can be added to the communication system. The Brillouin-based Omnisens DITEST monitoring system has been used in several long distance pipeline projects. The technique is capable of measuring strain and temperature over 100's kilometers with meter spatial resolution. Dedicated fiber optic cables have been developed for continuous strain and temperature monitoring and their deployment along the pipeline has enabled permanent and continuous pipeline ground movement, intrusion and leak detection. This paper presents a description of the fiber optic Brillouin-based DITEST sensing technique, its measurement performance and limits, while addressing future perspectives for pipeline monitoring. The description is supported by case studies and illustrated by field data.

  8. APHID: Anomaly Processor in Hardware for Intrusion Detection

    DTIC Science & Technology

    2007-03-01

    turn them into zombies ). The average home user would never know of this intrusion and can be an unwitting pawn in the schemes of attackers. Recent...Chapter III presents the theoretical APHID architecture and testing models. Where possible , implementation specific details are omitted to keep the...model as flexible as possible . Chapter IV presents our implementation of APHID and discusses the process taken to arrive at that implementation. Chapter

  9. Detection and Classification of Network Intrusions Using Hidden Markov Models

    DTIC Science & Technology

    2002-01-01

    system was able to detect buffer overflows, ftp-write attack, warez attack, guess telnet, guest and HTTPtunnel attacks. They claim that no false...already known attack that has been altered or a completely new attack. 95 Bibliography [1] Stuart McClure et. al “ Hacking Exposed: Network Security

  10. Fully networked remote intrusion detection sensors for border monitoring and protection

    NASA Astrophysics Data System (ADS)

    Jones, Barry; McQuiddy, John; McQuiddy, Brian

    2006-05-01

    Protection of the Nation's borders in the post-911 era has taken on increased importance while it has become more technically challenging due to dramatic increases in the number of illegal aliens attempting unauthorized border crossings. Unattended ground sensors, used in large numbers, have been a key element of the US Border Patrol's inventory of sensing systems that are deployed along the borders to alert agents to intrusions. The legacy sensors are based upon decades old technology and limited in their ability to be networked and integrated into a cohesive web that can provide timely information that can be readily integrated into the Border Patrol and DHS information networks. This paper presents an introduction to a system developed by McQ for border monitoring and intrusion detection that provides full networked capability, from the sensor to the display. The paper also includes results of testing and integration with DHS information systems. The significance of Internet protocol based information generation at the sensor level and real time distribution of data is emphasized, including resource and infrastructure sharing and scalability to nationwide scope will also be discussed.

  11. Studying bio-inspired coalition formation of robots for detecting intrusions using game theory.

    PubMed

    Liang, Xiannuan; Xiao, Yang

    2010-06-01

    In this paper, inspired by the society of animals, we study the coalition formation of robots for detecting intrusions using game theory. We consider coalition formation in a group of three robots that detect and capture intrusions in a closed curve loop. In our analytical model, individuals seek alliances if they think that their detect regions are too short to gain an intrusion capturing probability larger than their own. We assume that coalition seeking has an investment cost and that the formation of a coalition determines the outcomes of parities, with the detect length of a coalition simply being the sum of those of separate coalition members. We derive that, for any cost, always detecting alone is an evolutionarily stable strategy (ESS), and that, if the cost is below a threshold, always trying to form a coalition is an ESS (thus a three-way coalition arises).

  12. Group psychotherapy reduces illness intrusiveness in systemic lupus erythematosus.

    PubMed

    Edworthy, Steven M; Dobkin, Patricia L; Clarke, Ann E; Da Costa, Deborah; Dritsa, Maria; Fortin, Paul R; Barr, Susan; Ensworth, Stephanie; Esdaile, John M; Beaulieu, André; Zummer, Michael; Senécal, Jean-Luc; Goulet, Jean-Richard; Choquette, Denis; Rich, Eric; Smith, Doug; Cividino, Alfred; Gladman, Dafna; Devins, Gerald M

    2003-05-01

    We investigated whether brief supportive-expressive group psychotherapy might reduce illness-induced interference with valued activities and interests (i.e., illness intrusiveness) among women with systemic lupus erythematosus (SLE) in relation to 3 life domains: (1) relationships and personal development (family relationships, other social relationships, self-expression), (2) intimacy (relationship with spouse, sex life), and/or (3) instrumental life (work, finances, active recreation). Women with SLE recruited from 9 rheumatology centers were randomly assigned to receive either usual care (n = 66) or a 12 week brief supportive-expressive group psychotherapy followed by 3 monthly booster sessions (n = 58). Standard instruments assessed disease activity and damage, illness intrusiveness, and psychological distress at 4 measurement occasions: (1) pretreatment, (2) posttreatment, (3) 6 month followup, and (4) 12 month followup. Analysis of covariance, controlling for disease activity and household income, indicated that women who received brief supportive-expressive group psychotherapy experienced significant reductions in illness intrusiveness for 2 of 3 domains: (1) relationships and personal development and (2) intimacy. Benefits were evident at 6 and 12 month followups. Brief supportive-expressive group psychotherapy facilitates adaptation to SLE by assisting women in reducing illness-induced disruptions into important domains of life experience.

  13. Searching System Call Information for Clues: The Effects of Intrusions on Processes

    DTIC Science & Technology

    2003-03-01

    executed, their intrusion detection system can determine the particular user operations performed. This is a prime example of how 2-13 internal...re-seeded with the system’s time every one hundred samples to address any issues with sequence repetitiveness. The Mersenne Twister [Mats02] was also...World Wide Web Site, URL http://www.ll.mit.edu/ IST/ideval/. [Mats02] Matsumoto, Makoto, “ Mersenne Twister Home Page.” World Wide Web, 2002

  14. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

    DTIC Science & Technology

    1998-01-01

    of order. Behavior Tested Can the subject IDS handle basic out-of-order IP fragmentation reassembly? Tqet Validity Valid 4G N,rm,r frav-4 I...each product: but rather to highlight specific.characteristics about them. 8.1 Specific Results The systems we tested were Internet Securit ,y...Bra: A System for Detecting Network Intruders in Real-Time,” In 7th Annual USENIX Securit ?/ Sym~posiwn, .lnnnary 1998. [l’s] v. Paxson, “End-to

  15. Intrusion detection capabilities of smart video: Collaborative efforts to improve remote monitoring for safeguards surveillance

    SciTech Connect

    Kadner, S.P.; Ondrik, M.; Reisman, A.

    1996-12-31

    Collaborative efforts between the International Projects Division (IPD) of the Department of Advanced Technology at Brookhaven National Laboratory, Aquila Technologies Group, Inc. (Aquila), and the General Physics Institute (GPI) in Moscow have developed object recognition technologies to provide real-time intrusion detection capabilities for Aquila`s GEMINI Digital Surveillance System. The research, development and testing for integrating enhanced surveillance capabilities into Aquila`s GEMINI system will receive support from the US Industry Coalition (USIC), an initiative funded by the Initiatives for Proliferation Prevention (IPP), in the coming year. Oversight of the research and development effort is being provided by the IPD staff to ensure that the technical standards of safeguards systems for use by the International Atomic Energy Agency (IAEA) are met. The scientific expertise at GPI is providing breakthroughs in the realm of motion detection for surveillance. Aquila`s contribution to the project focuses on the integration of authenticated digital camera technology for front-end detection. This project illustrates how the application of technology can increase efficiency and reliability of remote monitoring, as well as the timely detection of Safeguards-significant events.

  16. A time-frequency approach for event detection in non-intrusive load monitoring

    NASA Astrophysics Data System (ADS)

    Jin, Yuanwei; Tebekaemi, Eniye; Berges, Mario; Soibelman, Lucio

    2011-06-01

    Non-intrusive load monitoring is an emerging signal processing and analysis technology that aims to identify individual appliance in residential or commercial buildings or to diagnose shipboard electro-mechanical systems through continuous monitoring of the change of On and Off status of various loads. In this paper, we develop a joint time-frequency approach for appliance event detection based on the time varying power signals obtained from the measured aggregated current and voltage waveforms. The short-time Fourier transform is performed to obtain the spectral components of the non-stationary aggregated power signals of appliances. The proposed event detector utilizes a goodness-of-fit Chi-squared test for detecting load activities using the calculated average power followed by a change point detector for estimating the change point of the transient signals using the first harmonic component of the power signals. Unlike the conventional detectors such as the generalized likelihood ratio test, the proposed event detector allows a closed form calculation of the decision threshold and provides a guideline for choosing the size of the detection data window, thus eliminating the need for extensive training for determining the detection threshold while providing robust detection performance against dynamic load activities. Using the real-world power data collected in two residential building testbeds, we demonstrate the superior performance of the proposed algorithm compared to the conventional generalized likelihood ratio detector.

  17. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  18. Vulnerability of water distribution systems to pathogen intrusion: how effective is a disinfectant residual?

    PubMed

    Propato, Marco; Uber, James G

    2004-07-01

    Can the spread of infectious disease through water distribution systems be halted by a disinfectant residual? This question is overdue for an answer. Regulatory agencies and water utilities have long been concerned about accidental intrusions of pathogens into distribution system pipelines (i.e., cross-connections) and are increasingly concerned about deliberate pathogen contamination. Here, a simulation framework is developed and used to assess the vulnerability of a water system to microbiological contamination. The risk of delivering contaminated water to consumers is quantified by a network water quality model that includes disinfectant decay and disinfection kinetics. The framework is applied to two example networks under a worst-case deliberate intrusion scenario. Results show that the risk of consumer exposure is affected by the residual maintenance strategy employed. The common regulation that demands a "detectable" disinfectant residual may not provide effective consumer protection against microbial contamination. A chloramine residual, instead of free chlorine, may significantly weaken this final barrier against pathogen intrusions. Moreover, the addition of a booster station at storage tanks may improve consumer protection without requiring excessive disinfectant.

  19. Temporal Development of Repeated Intrusive Events in a South Iceland Volcanic System, Inferred From InSAR Measurements

    NASA Astrophysics Data System (ADS)

    Pedersen, R.; Sigmundsson, F.

    2002-12-01

    We present measurements of volcano deformation from a series of 18 interferograms spanning the years 1993-2000. The detected deformation originates from repeated intrusions in the Eyjafjallaj”kull system, an icecap covered stratovolcano situated in, what is considered to be, a propagating rift zone in southern Iceland. The volcano erupts infrequently, with only two known eruptions in historic time (last 1100 years). The eruptive products are alkaline in composition, with only small volumes produced in recent eruptions. In spite of the apparent silence of this system two intrusive episodes have been detected within the last decade, causing major concern in the local community. In 1994, and again in 1999, seismic unrest associated with magmatic intrusions occurred in the system. Crustal deformation associated with the events was detected by dry-tilt, GPS and interferometry. During the 1994 episode, the center of deformation was situated underneath the icecap, and the area experiencing maximum uplift was therefore within the zone of decorrelation. The deformation shows an oval fringe pattern, which reaches well beyond the icecap, covering more than 300 km2 in total. Up to 15 cm of LOS ("line of sight") displacement is observed. The temporal resolution of the InSAR images during the 1999 intrusive episode is better and it is possible to follow the development of the intrusive event through time. The center of deformation does not coincide with the center from the 1994 event, but is situated just south of the icecap. The deformation during this event amounts to about 20 cm of LOS. Several of the interferograms cover the whole time-span of the 1999 intrusion, but three interferograms cover different periods of the intrusive event. The data set enables us to follow the temporal development of the crustal deformation created by the intrusion, and hence the growth of the intrusion itself through time. A previous study based on forward modeling of GPS and tilt data

  20. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

    PubMed Central

    Yan, Jing; Li, Xiaolei; Luo, Xiaoyuan; Guan, Xinping

    2017-01-01

    Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods. PMID:28531127

  1. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks.

    PubMed

    Yan, Jing; Li, Xiaolei; Luo, Xiaoyuan; Guan, Xinping

    2017-05-20

    Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods.

  2. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.

    PubMed

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish-Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection.

  3. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

    PubMed Central

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  4. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  5. Non-intrusive ground-contacting vibrometer for acoustic/ seismic landmine detection

    NASA Astrophysics Data System (ADS)

    Martin, James S.; Larson, Gregg D.; Scott, Waymond R.

    2005-04-01

    The detection of buried landmines using seismic waves and full wave-field measurements has been demonstrated. The technique requires a sensor that is non-intrusive with sufficient fidelity, reproducibility, and noise immunity for imaging processes. This has been accomplished in the past with non-contact techniques. For reasons of cost and scalability in large arrays, ground-contacting sensors are currently of interest as an alternative to these. A ground-contacting sensor configuration was studied in which an accelerometer was coupled to the ground through a viscoelastic layer with a bias force provided by a soft coil spring. This sensor was found to meet the noise, fidelity, and reproducibility requirements of a seismic landmine detection system operating in a laboratory experimental model. The fidelity of this sensor was found to vary with the bias force because of the nonlinear stiffness of the soil surrogate in the model. This dependence was sufficiently weak that no feedback of the bias force was necessary to reproducibly couple the sensor over a flat surface. The sensor offers the potential benefit of information that was not available from non-contact measurements regarding the in-plane motion of the soil surface. This data may provide additional cues for the detection of buried mines. [Work supported by ONR.

  6. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors

    PubMed Central

    Choi, Minho; Jeong, Jae Jin; Kim, Seung Hun; Kim, Sang Woo

    2016-01-01

    Non-intrusive electrocardiogram (ECG) monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs) to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements. PMID:27196910

  7. How Intrusion Detection Can Improve Software Decoy Applications

    DTIC Science & Technology

    2003-03-01

    processes and uses a security kernel. Additionally, LIDS has a built-in portscan detector, which can be used to alert users to the warning signs of a...several useful ways, such as in IP defragmentation, TCP stream assembly, portscan detection, and web-traffic normalization. The preprocessor can...HIDS can see a portscan , but a NIDS can see the similar attacks on other sites that happened first. 22 SNORT LIDS NIDS AlarmsLog Files HIDS

  8. Components for Cooperative Intrusion Detection in Dynamic Coalition Environments

    DTIC Science & Technology

    2004-04-20

    IWS Before it is possible to design and build a robust and effective IWS for CE scenarios, several issues are to be solved. Some of these issues...during the measurement period. Those graphs can be partitioned into subgraphs using graph clustering algorithms. The clustering of the graph...reported as warning messages. The comparison measures used for anomaly detection in network traffic structures can be used in this domain as well. When

  9. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    PubMed Central

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O.

    2017-01-01

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. PMID:28555023

  10. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.

    PubMed

    Wang, Jian; Jiang, Shuai; Fapojuwo, Abraham O

    2017-05-27

    This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  11. Detection of Dry Intrusion on Water Vapor Images Over Central Europe - June 2010 TO September 2011

    NASA Astrophysics Data System (ADS)

    Novotny, J.; Dejmal, K.; Hudec, F.; Kolar, P.

    2016-06-01

    The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth's surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images) is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I'Imagerie satellitaire), originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  12. On the Feasibility of Intrusion Detection Inside Workstation Disks

    DTIC Science & Technology

    2003-12-01

    The Other Honeypot. Security Focus, 21 July, 2003. http://www.securityfocus.com/infocus/1713. [Card94a] Rémy Card, Theodore Ts’o, and Stephen Tweedie...February 1994. [Ko97a] Calvin Ko, Manfred Ruschitzka, and Karl Levitt . Execution monitoring of security- critical programs in distributed systems: a

  13. Research on regional intrusion prevention and control system based on target tracking

    NASA Astrophysics Data System (ADS)

    Liu, Yanfei; Wang, Jieling; Jiang, Ke; He, Yanhui; Wu, Zhilin

    2017-08-01

    In view of the fact that China’s border is very long and the border prevention and control measures are single, we designed a regional intrusion prevention and control system which based on target-tracking. The system consists of four parts: solar panel, radar, electro-optical equipment, unmanned aerial vehicle and intelligent tracking platform. The solar panel provides independent power for the entire system. The radar detects the target in real time and realizes the high precision positioning of suspicious targets, then through the linkage of electro-optical equipment, it can achieve full-time automatic precise tracking of targets. When the target appears within the range of detection, the drone will be launched to continue the tracking. The system is mainly to realize the full time, full coverage, whole process integration and active realtime control of the border area.

  14. A Spread Spectrum Approach to Next Generation Intrusion Detection

    DTIC Science & Technology

    2005-06-01

    14. SUBJECT TERMS Spread-Spectrum Message Embedding Capacity, Distortion, Spread Spectrum Steganography , Digital Watermarking 16. PRICE CODE 17...message) in another digital signal (image or audio ) called “cover” or “host.” Two applications of watermarking are a) image/ audio authentication and b... steganography , which is an attempt to establish covert communication between trusting parties. The first step in the design of a watermarking system

  15. Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques

    NASA Astrophysics Data System (ADS)

    Ozyer, Tansel; Alhajj, Reda; Barker, Ken

    2005-03-01

    This paper proposes an intelligent intrusion detection system (IDS) which is an integrated approach that employs fuzziness and two of the well-known data mining techniques: namely classification and association rule mining. By using these two techniques, we adopted the idea of using an iterative rule learning that extracts out rules from the data set. Our final intention is to predict different behaviors in networked computers. To achieve this, we propose to use a fuzzy rule based genetic classifier. Our approach has two main stages. First, fuzzy association rule mining is applied and a large number of candidate rules are generated for each class. Then the rules pass through pre-screening mechanism in order to reduce the fuzzy rule search space. Candidate rules obtained after pre-screening are used in genetic fuzzy classifier to generate rules for the specified classes. Classes are defined as Normal, PRB-probe, DOS-denial of service, U2R-user to root and R2L- remote to local. Second, an iterative rule learning mechanism is employed for each class to find its fuzzy rules required to classify data each time a fuzzy rule is extracted and included in the system. A Boosting mechanism evaluates the weight of each data item in order to help the rule extraction mechanism focus more on data having relatively higher weight. Finally, extracted fuzzy rules having the corresponding weight values are aggregated on class basis to find the vote of each class label for each data item.

  16. Report on the NS/EP Implications of Intrusion Detection Technology Research and Development

    DTIC Science & Technology

    1997-12-01

    component&ignaling System 7 ( SS7 ), Signal Transfer Points (STPs), and Synchronous Optical Network (SONET)-that if attacked or exploited could...potential use of electronic intrusion techniques to exploit , degrade, or deny service to key information systems. As a result of considering new terms of...As other critical infrastructures seek to exploit information technologies and migrate to more open systems, their control networks may be similarly

  17. PLC backplane analyzer for field forensics and intrusion detection

    DOEpatents

    Mulder, John; Schwartz, Moses Daniel; Berg, Michael; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Trent, Jason; Depoy, Jennifer M; Jacob, Joshua

    2015-05-12

    The various technologies presented herein relate to the determination of unexpected and/or malicious activity occurring between components communicatively coupled across a backplane. Control data, etc., can be intercepted at a backplane where the backplane facilitates communication between a controller and at least one device in an automation process. During interception of the control data, etc., a copy of the control data can be made, e.g., the original control data can be replicated to generate a copy of the original control data. The original control data can continue on to its destination, while the control data copy can be forwarded to an analyzer system to determine whether the control data contains a data anomaly. The content of the copy of the control data can be compared with a previously captured baseline data content, where the baseline data can be captured for a same operational state as the subsequently captured control data.

  18. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing

    PubMed Central

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs. PMID:22399990

  19. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing.

    PubMed

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs.

  20. Tracking salinity intrusions in a coastal forested freshwater wetland system

    Treesearch

    Anand D. Jayakaran; Thomas M. Williams; William H. Conner

    2016-01-01

    Coastal forested freshwater wetlands are sentinel sites for salinity intrusions associated with large, tidally influenced, storm-driven or drought-induced incursions of estuarine waters into freshwater ecosystems. These incursions may also be exacerbated by rising sea levels associated with climate change.

  1. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  2. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Galley, Alan G.

    2003-06-01

    trondhjemite phases. The trondhjemite phases contain numerous internal contacts indicating emplacement as composite sills. Common structural features of the composite intrusions include early xenolith phases, abundant small comagmatic dikes, fractures and veins and, in places, columnar jointing. Internal phases may differ greatly in texture from fine- to coarse-grained, aphyric and granophyric through seriate to porphyritic. Mineralogical and isotopic evidence indicates that early phases of each composite intrusion are affected by pervasive to fracture-controlled high-temperature (350-450 °C) alteration reflecting seawater-rock interaction. Trondhjemite phases contain hydrothermal-magmatic alteration assemblages within miarolitic cavities, hydrothermal breccias and veins. This hydrothermal-magmatic alteration may, in part, be inherited from previously altered wall rocks. Two of the four intrusions are host to Cu-Mo-rich intrusive breccias and porphyry-type mineralization which formed as much as 14 Ma after the main subvolcanic magmatic activity. The recognition of these Precambrian, subvolcanic composite intrusions is important for greenfields VMS exploration, as they define the location of thermal corridors within extensional oceanic-arc regimes which have the greatest potential for significant VMS mineralization. The VMS mineralization may occur for 2,000 m above the intrusions. In some cases, VMS mineralization has been truncated or enveloped by late trondhjemite phases of the composite intrusions. Evidence that much of the trondhjemitic magmatism postdates the principal VMS activity is a critical factor when developing heat and fluid flow models for these subseafloor magmatic-hydrothermal systems.

  3. Application of graph-based semi-supervised learning for development of cyber COP and network intrusion detection

    NASA Astrophysics Data System (ADS)

    Levchuk, Georgiy; Colonna-Romano, John; Eslami, Mohammed

    2017-05-01

    The United States increasingly relies on cyber-physical systems to conduct military and commercial operations. Attacks on these systems have increased dramatically around the globe. The attackers constantly change their methods, making state-of-the-art commercial and military intrusion detection systems ineffective. In this paper, we present a model to identify functional behavior of network devices from netflow traces. Our model includes two innovations. First, we define novel features for a host IP using detection of application graph patterns in IP's host graph constructed from 5-min aggregated packet flows. Second, we present the first application, to the best of our knowledge, of Graph Semi-Supervised Learning (GSSL) to the space of IP behavior classification. Using a cyber-attack dataset collected from NetFlow packet traces, we show that GSSL trained with only 20% of the data achieves higher attack detection rates than Support Vector Machines (SVM) and Naïve Bayes (NB) classifiers trained with 80% of data points. We also show how to improve detection quality by filtering out web browsing data, and conclude with discussion of future research directions.

  4. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    PubMed

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity.

  5. Multi-Centrality Graph Spectral Decompositions and Their Application to Cyber Intrusion Detection

    SciTech Connect

    Chen, Pin-Yu; Choudhury, Sutanay; Hero, Alfred

    2016-03-01

    Many modern datasets can be represented as graphs and hence spectral decompositions such as graph principal component analysis (PCA) can be useful. Distinct from previous graph decomposition approaches based on subspace projection of a single topological feature, e.g., the centered graph adjacency matrix (graph Laplacian), we propose spectral decomposition approaches to graph PCA and graph dictionary learning that integrate multiple features, including graph walk statistics, centrality measures and graph distances to reference nodes. In this paper we propose a new PCA method for single graph analysis, called multi-centrality graph PCA (MC-GPCA), and a new dictionary learning method for ensembles of graphs, called multi-centrality graph dictionary learning (MC-GDL), both based on spectral decomposition of multi-centrality matrices. As an application to cyber intrusion detection, MC-GPCA can be an effective indicator of anomalous connectivity pattern and MC-GDL can provide discriminative basis for attack classification.

  6. EPA Seeks Public Comments on Addition of Subsurface Intrusion Component to the Superfund Hazard Ranking System

    EPA Pesticide Factsheets

    WASHINGTON -- The U.S. Environmental Protection Agency (EPA) is seeking public comment on the proposed addition of a subsurface intrusion (SsI) component to the Superfund Hazard Ranking System (HRS). The HRS is a scoring system EPA uses to identify

  7. Intrusion detection on oil pipeline right of way using monogenic signal representation

    NASA Astrophysics Data System (ADS)

    Nair, Binu M.; Santhaseelan, Varun; Cui, Chen; Asari, Vijayan K.

    2013-05-01

    We present an object detection algorithm to automatically detect and identify possible intrusions such as construction vehicles and equipment on the regions designated as the pipeline right-of-way (ROW) from high resolution aerial imagery. The pipeline industry has buried millions of miles of oil pipelines throughout the country and these regions are under constant threat of unauthorized construction activities. We propose a multi-stage framework which uses a pyramidal template matching scheme in the local phase domain by taking a single high resolution training image to classify a construction vehicle. The proposed detection algorithm makes use of the monogenic signal representation to extract the local phase information. Computing the monogenic signal from a two dimensional object region enables us to separate out the local phase information (structural details) from the local energy (contrast) thereby achieving illumination invariance. The first stage involves the local phase based template matching using only a single high resolution training image in a local region at multiple scales. Then, using the local phase histogram matching, the orientation of the detected region is determined and a voting scheme gives a certain weightage to the resulting clusters. The final stage involves the selection of clusters based on the number of votes attained and using the histogram of oriented phase feature descriptor, the object is located at the correct orientation and scale. The algorithm is successfully tested on four different datasets containing imagery with varying image resolution and object orientation.

  8. Non-intrusive detection of methanol in gas phase using infrared degenerate four-wave mixing

    NASA Astrophysics Data System (ADS)

    Zhou, J.; Sahlberg, A. L.; Nilsson, H.; Lundgren, E.; Zetterberg, J.

    2015-11-01

    Sensitive and non-intrusive detection of gas-phase methanol with high spatial and temporal resolution has for the first time been reported using mid-infrared degenerate four-wave mixing (IR-DFWM). IR-DFWM spectra of methanol have been successfully recorded in nitrogen-diluted gas flows at room temperature and at 300 °C, by probing ro-vibrational transitions belonging to the fundamental C-H stretching modes, ν 2 and ν 9, and the O-H stretching mode, ν 1. The detection limit of methanol vapor at room temperature and atmospheric pressure is estimated to be 250 ppm with the present setup. Potential interference from CH4 and CO2 is discussed from recorded IR-DFWM spectra of CH4 and CO2, and it was found that detection of methanol free from CH4 and CO2 interference is possible. These results show the potential of the detection of methanol with IR-DFWM for applications in both combustion and catalytic environments, such as CO2 hydrogenation and CH4 oxidation.

  9. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  10. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  11. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    NASA Astrophysics Data System (ADS)

    Najm, Habib N.; Valorani, Mauro

    2014-08-01

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  12. Robotic perimeter detection system

    NASA Astrophysics Data System (ADS)

    Lewis, Christopher L.; Feddema, John T.; Klarer, Paul

    1999-01-01

    Sandia National Labs is developing and testing a robotic perimeter detection system for small unit operations (small groups of warfighters). The objective is to demonstrate the feasibility of using a cooperative team of robotic sentry vehicles to assist the warfighter in guarding military assets. Eight 'Roving All Terrain Lunar Explorer Rovers' (RATLERs) have been built at Sandia and are being used as the test platform. A radio frequency receiver on each of the RATLERs alerts the sentry vehicles of alarms from hidden miniature intrusion detection sensors (MIDS). The MIDS currently deployed include seismic, magnetometer, passive and beam-break infrared sensor. Each RATTLER keeps an internal state representation of each of the MIDS and of the other vehicles' locations. This representation is updated several times per second as the vehicles broadcast their current state and any alarms received. When an alarm is received, each vehicle looks at this state information and decides whether it should investigate the alarm based on the proximity of itself and the other vehicles to the alarm. As one vehicle attends an alarm, the other vehicles adjust their position around the perimeter to better prepare for another alarm. This cooperative team concept can significantly reduce the workload and increase the effectiveness of a single warfighter in the battlefield. Using robot vehicles makes the perimeter detection system easily mobilized for redeployment.

  13. Using fiber optics to detect moisture intrusion into a landfill cap consisting of a vegetative soil barrier.

    PubMed

    Weiss, Jonathan D

    2003-09-01

    The intrusion of moisture into landfills can pose a health hazard because of the possibility that the moisture will carry harmful substances into the groundwater. Early detection of moisture anywhere within these landfills is essential if corrective action is to be taken well before an occurrence of this kind. This paper presents the results of a field-scale simulation test of the use of fiber optics to detect the presence of moisture within landfill covers, using a detection method based on the thermal response of soils as a function of their moisture content. By sending electrical current through an embedded stainless-steel tube, soils of varying moisture content were heated and time-dependent temperature measurements were obtained with a fiber-optic distributed temperature sensor system. The optical fiber itself lay within the tube, but its temperature was a function of how rapidly heat was conducted into the surrounding medium. The results of this experiment, which are in agreement with those obtained using more traditional "point" sampling and laboratory analysis, are presented along with the strengths and limitations of the thermal-response method of detecting moisture.

  14. Managing risks from virus intrusion into water distribution systems due to pressure transients.

    PubMed

    Yang, Jian; LeChevallier, Mark W; Teunis, Peter F M; Xu, Minhua

    2011-06-01

    Low or negative pressure transients in water distribution systems, caused by unexpected events (e.g. power outages) or routine operation/maintenance activities, are usually brief and thus are rarely monitored or alarmed. Previous studies have shown connections between negative pressure events in water distribution systems and potential public health consequences. Using a quantitative microbial risk assessment (QMRA) model previously developed, various factors driving the risk of viral infection from intrusion were evaluated, including virus concentrations external to the distribution system, maintenance of a disinfectant residual, leak orifice sizes, the duration and the number of nodes drawing negative pressures. The most sensitive factors were the duration and the number of nodes drawing negative pressures, indicating that mitigation practices should be targeted to alleviate the severity of low/negative pressure transients. Maintaining a free chlorine residual of 0.2 mg/L or above is the last defense against the risk of viral infection due to negative pressure transients. Maintaining a chloramine residual did not appear to significantly reduce the risk. The effectiveness of ensuring separation distances from sewer mains to reduce the risk of infection may be system-specific. Leak detection/repair and cross-connection control should be prioritized in areas vulnerable to negative pressure transients.

  15. Responding to Intrusions.

    DTIC Science & Technology

    1999-02-01

    stored and archived for later viewing. Intruders com- monly use sniffers to capture user id and password data that are passed in clear text over a... store information about the source of any message, the destination, and characteristics of connections such as the amount of data transferred. Using...information required to verify the integrity of your systems and data ," in Preparing to Detect Signs of Intrusion [Kochmar 98]. Possessing detailed

  16. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  17. Intrusion Detection: Generics and State-of-the-Art (la Detection de l’intrusion: Modeles generiques et etat de l’art)

    DTIC Science & Technology

    2002-01-01

    involves communicating with the IDSs via e.g. a graphical user interface that visualises possible intrusions. Furthermore it can involve manual analysis...speed with which the IDS manufacturer updates the underlying signature database. However most IDSs allow manual creation and updating of rules as well...Rules can be generated automatically from audit data, or entered manually , to express policies and expert information. Creating a good rule-set is

  18. Non-intrusive tunable resonant microwave cavity for optical detected magnetic resonance of NV centres in nanodiamonds

    NASA Astrophysics Data System (ADS)

    Le Floch, Jean-Michel; Bradac, Carlo; Volz, Thomas; Tobar, Michael E.; Castelletto, Stefania

    2013-12-01

    Optically detected magnetic resonance (ODMR) in nanodiamond nitrogen-vacancy (NV) centres is usually achieved by applying a microwave field delivered by micron-size wires, strips or antennas directly positioned in very close proximity (~ μm) of the nanodiamond crystals. The microwave field couples evanescently with the ground state spin transition of the NV centre (2.87 GHz at zero magnetic field), which results in a reduction of the centre photoluminescence. We propose an alternative approach based on the construction of a dielectric resonator. We show that such a resonator allows for the efficient detection of NV spins in nanodiamonds without the constraints associated to the laborious positioning of the microwave antenna next to the nanodiamonds, providing therefore improved flexibility. The resonator is based on a tunable Transverse Electric Mode in a dielectric-loaded cavity, and we demonstrate that the resonator can detect single NV centre spins in nanodiamonds using less microwave power than alternative techniques in a non-intrusive manner. This method can achieve higher precision measurement of ODMR of paramagnetic defects spin transition in the micro to millimetre-wave frequency domain. Our approach would permit the tracking of NV centres in biological solutions rather than simply on the surface, which is desirable in light of the recently proposed applications of using nanodiamonds containing NV centres for spin labelling in biological systems with single spin and single particle resolution.

  19. Department of Defense counterdrug technology development of non-intrusive inspection systems

    NASA Astrophysics Data System (ADS)

    Pennella, John J.

    1997-02-01

    The Naval Surface Warfare Center Dahlgren Division serves as the executive agent for the DoD's Contraband Detection and Cargo Container Inspection Technology Development Program. The goal of the DoD non-intrusive inspection (NII) program is to develop prototype equipment that can be used to inspect containers and vehicles, quickly and in large numbers without unnecessary delays in the movement of legitimate cargo. This paper summaries the past accomplishments of the program, current status, and future plans.

  20. Ad Duwayhi, Saudi Arabia: Geology and geochronology of a neoproterozoic intrusion-related gold system in the Arabian shield

    USGS Publications Warehouse

    Doebrich, Jeff L.; Zahony, S.G.; Leavitt, J.D.; Portacio, J.S.; Siddiqui, A.A.; Wooden, Joseph L.; Fleck, Robert J.; Stein, Holly J.

    2004-01-01

    In light of our findings at Ad Duwayhi, a reassessment of similar intrusion-hosted deposits in the Arabian shield is warranted, and areas of late- to postorogenic plutonism, particularly in the Afif composite terrane, should be considered prospective for intrusion-related gold systems.

  1. Non-intrusive detection of rotating stall in pump-turbines

    NASA Astrophysics Data System (ADS)

    Botero, F.; Hasmatuchi, V.; Roth, S.; Farhat, M.

    2014-10-01

    When operated far from their optimum conditions, pump-turbines may exhibit strong hydrodynamic instabilities, often called rotating stall, which lead to substantial increase of vibration and risk of mechanical failure. In the present study, we have investigated the flow filed in a model of radial pump-turbine with the help of tuft visualization, wall pressure measurement and structure-borne noise monitoring. As the rotation speed is increased, the machine is brought from its optimum operation to runaway with zero torque on the shaft. The runaway operation is characterized by a significant increase of pressure fluctuation at the rotor-stator interaction frequency. As the speed is further increased, the flow exhibits sub-synchronous instability, which rotates at 70% of the rotation frequency. Tuft visualization clearly shows that, as the instability evolves, the flow in a given distributor channel suddenly stalls and switches to reverse pumping mode in periodic way. We have also investigated the monitoring of the rotating stall with the help of vibration signals. A specific signal processing method, based on amplitude demodulation, was developed. The use of 2 accelerometers allows for the identification of the optimum carrier frequency by computing the cyclic coherence of vibration signals. This non-intrusive method is proved to be efficient in detecting the rotating stall instability and the number of stall cells. We strongly believe that it could be implemented in full scale pump-turbines.

  2. Shipboard Fluid System Diagnostics Using Non-Intrusive Load Monitoring

    DTIC Science & Technology

    2007-06-01

    funding Officers and Crew of the USCGC Escanaba Officers and Crew of the USCGC Seneca Professor Robert Cox for his enthusiasm, assistance, and...45 Figure 3-18: Seneca RO Unit Membrane Seal Failure Detection...Table 2-2: RC7000 Plus RO Unit Component Details ................................................................ 19 Table 2-3: Seneca NILM Setup

  3. Non-intrusive load monitoring systems: Considerations for use and potential applications

    SciTech Connect

    Sharp, T.R.

    1994-12-31

    The value of measured energy performance data and the desire to acquire them without the cost, complexity, and intrusiveness of standard submetering techniques have led to recent research on non-intrusive load monitoring systems. These systems offer installation simplicity and the ability to discriminate important load changes through high-resolution, higher-speed sampling at a central monitoring point such as a building`s electrical service entrance. Important hardware and installation considerations learned from Oak Ridge National Laboratory`s (ORNL) experience with these systems are reviewed. In addition, the ability to discern important load changes in residential and commercial buildings using these systems is discussed based on recent ORNL experiments in two buildings. Potential applications, with examples, are also discussed. Using a non-intrusive load monitoring system, an experienced user can collect valuable building power profiles that provide insight into building operations, energy use, demand, and building systems problems easily and at low cost. These systems, when available, could be valuable to DSM and energy management professionals, utilities, researchers, building management firms, energy service companies, and others.

  4. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  5. Non-Intrusive Electric Appliances Load Monitoring System-Experiment for Real Household-

    NASA Astrophysics Data System (ADS)

    Murata, Hiroshi; Onoda, Takashi; Yoshimoto, Katsuhisa; Nakano, Yukio; Kondo, Syuhei

    This paper presents applying results of four estimation algorithms of non-intrusive monitoring system for real household. We conclude that all algorithms have practicable ability. 1) support vector machine(SVM): SVM was used to estimate ON/OFF states for fluorescent and refrigerator. SVM has the performance equivalent to best performance of sigmoid function networks(SFN). However, SVM has high estimating ability constantly. 2) RBF networks(RBFN): RBFN was used to estimate power consumption for air conditioner. RBFN has the performance equivalent to best performance of SFN. However, RBFN has high estimating ability constantly. 3) step change detection method(SCD): SCD was used to estimate ON/OFF states and power consumption for IH cooking range. SCD does not need the necessary learning process for SFN and has higher estimating ability than SFN. 4) spectrum reference method(SRM): SRM was used to estimate working conditions for rice cocker and washing machine. SRM is able to estimate these working conditions that cannot be estimated by earlier methods.

  6. New device to measure dynamic intrusion/extrusion cycles of lyophobic heterogeneous systems

    NASA Astrophysics Data System (ADS)

    Guillemot, Ludivine; Galarneau, Anne; Vigier, Gérard; Abensur, Thierry; Charlaix, Élisabeth

    2012-10-01

    Lyophobic heterogeneous systems (LHS) are made of mesoporous materials immersed in a non-wetting liquid. One application of LHS is the nonlinear damping of high frequency vibrations. The behaviour of LHS is characterized by P - ΔV cycles, where P is the pressure applied to the system, and ΔV its volume change due to the intrusion of the liquid into the pores of the material, or its extrusion out of the pores. Very few dynamic studies of LHS have been performed until now. We describe here a new apparatus that allows us to carry out dynamic intrusion/extrusion cycles with various liquid/porous material systems, controlling the temperature from ambient to 120 °C and the frequency from 0.01 to 20 Hz. We show that for two LHS: water/MTS and Galinstan/CPG, the energy dissipated during one cycle depends very weakly on the cycle frequency, in strong contrast to conventional dampers.

  7. Distributed fiber optic intrusion sensor system for monitoring long perimeters

    NASA Astrophysics Data System (ADS)

    Juarez, Juan C.; Taylor, Henry F.

    2005-05-01

    The use of an optical fiber as a distributed sensor for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer (Φ-OTDR). Light pulses from a cw laser operating in a single longitudinal mode and with low (MHz/min range) frequency drift are injected into one end of the single mode fiber, and the backscattered light is monitored with a photodetector. In laboratory tests with 12 km of fiber on reels, the effects of localized phase perturbations induced by a piezoelectric fiber stretcher on Φ-OTDR traces were characterized. In field tests in which the sensing element is a single mode fiber in a 3-mm diameter cable buried in a 20-46 cm deep, 10 cm wide trench in clay soil, detection of intruders on foot up to 4.6 m from the cable line was achieved. In desert terrain field tests in which the sensing fiber is in a 4.5-mm diameter cable buried in a 30 cm deep, 75 cm wide trench filled with loose sand, high sensitivity and consistent detection of intruders on foot and of vehicles traveling down a road near the cable line was realized over a cable length of 8.5 km and a total fiber path of 19 km. Based on these results, this technology may be regarded as a candidate for providing low-cost perimeter security for nuclear power plants, electrical power distribution centers, storage facilities for fuel and volatile chemicals, communication hubs, airports, government offices, military bases, embassies, and national borders.

  8. An analysis of security system for intrusion in Smartphone environment.

    PubMed

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  9. An Analysis of Security System for Intrusion in Smartphone Environment

    PubMed Central

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. PMID:25165754

  10. Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems

    NASA Astrophysics Data System (ADS)

    Tryoen, J.; Le Maître, O.; Ndjinga, M.; Ern, A.

    2010-09-01

    This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

  11. Implementation of Karp-Rabin string matching algorithm in reconfigurable hardware for network intrusion prevention system

    NASA Astrophysics Data System (ADS)

    Botwicz, Jakub; Buciak, Piotr; Sapiecha, Piotr

    2006-03-01

    Intrusion Prevention Systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. The essential feature of network IPSs is searching through network packets and matching multiple strings, that are fingerprints of known attacks. String matching is highly resource consuming and also the most significant bottleneck of IPSs. In this article an extension of the classical Karp-Rabin algorithm and its implementation architectures were examined. The result is a software, which generates a source code of a string matching module in hardware description language, that could be easily used to create an Intrusion Prevention System implemented in reconfigurable hardware. The prepared module matches the complete set of Snort IPS signatures achieving throughput of over 2 Gbps on an Altera Stratix I1 evaluation board. The most significant advantage of the proposed architecture is that the update of the patterns database does not require reconfiguration of the circuitry.

  12. Force Protection Joint Experiment (FPJE) Battlefield Anti-Intrusion System (BAIS) sensors data analysis and filtering metrics

    NASA Astrophysics Data System (ADS)

    Barngrover, C. M.; Laird, R. T.; Kramer, T. A.; Cruickshanks, J. R.; Cutler, S. H.

    2009-04-01

    The FPJE was an experiment to consider the best way to develop and evaluate a system of systems approach to Force Protection. It was sponsored by Physical Security Equipment Action Group (PSEAG) and Joint Program Manager - Guardian (JPM-G), and was managed by the Product Manager - Force Protection Systems (PM-FPS). The experiment was an effort to utilize existing technical solutions from all branches of the military in order to provide more efficient and effective force protection. The FPJE consisted of four separate Integration Assessments (IA), which were intended as opportunities to assess the status of integration, automation and fusion efforts, and the effectiveness of the current configuration and "system" components. The underlying goal of the FPJE was to increase integration, automation, and fusion of the many different sensors and their data to provide enhanced situational awareness and a common operational picture. One such sensor system is the Battlefield Anti-Intrusion System (BAIS), which is a system of seismic and acoustic unmanned ground sensors. These sensors were originally designed for employment by infantry soldiers at the platoon level to provide early warning of personnel and vehicle intrusion in austere environments. However, when employed around airfields and high traffic areas, the sensitivity of these sensors can cause an excessive number of detections. During the second FPJE-IA all of the BAIS detections and the locations of all Opposing Forces were logged and analyzed to determine the accuracy rate of the sensors. This analysis revealed that with minimal filtering of detections, the number of false positives and false negatives could be reduced substantially to manageable levels while using the sensors within extreme operational acoustic and seismic noise conditions that are beyond the design requirements.

  13. iSSH v. Auditd: Intrusion Detection in High Performance Computing

    SciTech Connect

    Karns, David M.; Protin, Kathryn S.; Wolf, Justin G.

    2012-07-30

    The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks

  14. Numerical modeling of seawater intrusion into endorheic hydrological systems

    NASA Astrophysics Data System (ADS)

    Kafri, U.; Shalev, E.; Lyakhovsky, V.; Wollman, S.; Yechieli, Y.

    2013-08-01

    Several groundwater endorheic base levels are known in different parts of the world. Some of them allow seawater encroachment into them. Two examples of such groundwater systems, at Lake Asal in the Afar Depression of East Africa and Lago Enriquillo in the Dominican Republic, have been modeled using FEFLOW. The simulated flow pattern reproduces the seawater encroachment all the way from the sea to the endorheic base level. When the water in that base level undergoes concentration to brine through evaporation, the dense brine starts to flow below the encroaching seawater body in the opposite direction toward the sea. These processes reach steady-state conditions in a relatively short time of several hundred years.

  15. Lead and cadmium associated with saltwater intrusion in a New Jersey aquifer system

    SciTech Connect

    Pucci, A.A. Jr.; Gordon, A. ); Harriman, D.A. ); Ervin, E.M. ); Bratton, L. )

    1989-12-01

    The US Geological Survey collected ground-water samples from the upper and middle aquifers of the Potomac-Raritan-Magothy aquifer system in a 400-square-mile are of New Jersey from 1984 through 1986. Concentrations of lead were greater than the US Environmental Protection Agency maximum contaminant level (MCL) of 50 micrograms per liter in water from 16 to 239 wells. The concentrations of cadmium were greater than the MCL of 10 micrograms per liter in water from 10 to 241 wells. One-half of the wells that exceeded the lead MCL were in known areas of saltwater intrusion, as were all 10 wells that exceeded the cadmium MCL. The association of elevated concentrations of these metals with elevated concentrations of chloride indicates a mechanism related to saltwater intrusion.

  16. Lead and cadmium associated with saltwater intrusion in a New Jersey aquifer system

    USGS Publications Warehouse

    Pucci, Amleto A.; Harriman, Douglas A.; Ervin, Elisabeth M.; Bratton, Lisa; Gordon, Alison

    1989-01-01

    The U.S. Geological Survey collected ground-water samples from the upper and middle aquifers of the Potomac-Raritan-Magothy aquifer system in a 400-square-mile area of New Jersey from 1984 through 1986. Concentrations of lead were greater than the U.S. Environmental Protection Agency maximum contaminant level (MCL) of 50 micrograms per liter in water from 16 to 239 wells. The concentrations of cadmium were greater than the MCL of 10 micrograms per liter in water from 10 to 241 wells. One-half of the wells that exceeded the lead MCL were in known areas of saltwater intrusion, as were all 10 wells that exceeded the cadmium MCL. The association of elevated concentrations of these metals with elevated concentrations of chloride indicates a mechanism related to saltwater intrusion.

  17. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  18. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  19. Non-intrusive schemes for speed and axle identification in bridge-weigh-in-motion systems

    NASA Astrophysics Data System (ADS)

    Kalhori, Hamed; Makki Alamdari, Mehrisadat; Zhu, Xinqun; Samali, Bijan; Mustapha, Samir

    2017-02-01

    Bridge weigh-in-motion (BWIM) is an approach through which the axle and gross weight of trucks travelling at normal highway speed are identified using the response of an instrumented bridge. The vehicle speed, the number of axles, and the axle spacing are crucial parameters, and are required to be determined in the majority of BWIM algorithms. Nothing-on-the-road (NOR) strategy suggests using the strain signals measured at some particular positions underneath the deck or girders of a bridge to obtain this information. The objective of this research is to present a concise overview of the challenges of the current non-intrusive schemes for speed and axle determination through bending-strain and shear-strain based approaches. The problem associated with the global bending-strain responses measured at quarter points of span is discussed and a new sensor arrangement is proposed as an alternative. As for measurement of local responses rather than the global responses, the advantage of shear strains over bending strains is presented. However, it is illustrated that shear strains at quarter points of span can only provide accurate speed estimation but fail to detect the correct number of axles. As a remedy, it is demonstrated that, even for closely-spaced axles, the shear strain at the beginning of the bridge is capable of reliably identifying the number of axles. In order to provide a fully automated speed and axle identification system, appropriate signal processing including low-pass filtering and wavelet transforms are applied to the raw time signals. As case studies, the results of experimental testing in laboratory and on a real bridge are presented.

  20. Network intrusion detection based on a general regression neural network optimized by an improved artificial immune algorithm.

    PubMed

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data.

  1. Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm

    PubMed Central

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data. PMID:25807466

  2. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    USGS Publications Warehouse

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  3. Design of no blind area perimeter intrusion recognition system based on fisheye lens

    NASA Astrophysics Data System (ADS)

    Dai, Jun-jian; Han, Wen-bo

    2013-08-01

    The Perimeter intrusion recognition technology has slowly become an indispensable function in the intelligent video surveillance system. The existed always use the multiple video acquisition nodes to respectively control a monitoring area and each node alarm independently. However, the existed solutions are difficult to avoid the existence of monitoring blind area, and can't suitable for the perimeter environment with irregular outline, and at the same time, because of the too many nodes, it inevitably decreased the overall accuracy of intrusion recognition system and increased the cost of system. To avoid the above defects, this paper mainly talks about the following three aspects. Firstly, we used the fisheye lens as the optical system of video acquisition node, and it evidently enhances each node's information acquisition ability. And in this way, we just need to decorate a small amount of video acquisition node to get no blind area environmental information of the perimeter when against a larger monitoring situation. Secondly, due to the inexistence of blind area, the system will have enough video image information to generate the 360 degree panoramic image for monitoring environment, and finally the system server collected the wide-angle image information to splice into the panoramic video image. Finally, the system will use the panoramic image to complete the intrusion behavior recognition, thus we can effectively avoid the parallel computation in many nodes independently invasion of recognition, and this can greatly reduces the dependence for the multiple CPU operation platform and enhances the reliability of the system. The field test results show that, with the help of this paper's solution, the perimeter of the invasion of recognition system can effectively avoids the recognition of blind area. In the same recognition algorithm and same level delay premise, it greatly reduces the monitoring system server configuration requirements, especially for the

  4. Thutmose - Investigation of Machine Learning-Based Intrusion Detection Systems

    DTIC Science & Technology

    2016-06-01

    a sliding window to extract n- grams from these byte strings, and uses these n- grams as the feature set to train its models. In an effort to increase...malicious assuming that the byte distribution of a malicious payload differs from that of a normal payload. McPAD uses a 2 nu- gram analysis of the...is an approximation of the n- gram analysis commonly used in text-classification. A 2 nu- gram consists of two bytes from the packet payload byte

  5. The Unexplored Impact of IPv6 on Intrusion Detection Systems

    DTIC Science & Technology

    2012-03-01

    of defense (dod) internet protocol version 6(ipv6) transition plan , where it is today, and where it needs to be by the year 2008,” Master’s thesis...Standard), Oct. 1999. Updated by RFCs 3590, 3810. [52] R. Vida and L. Costa, “Multicast Listener Discovery Version 2 (MLDv2) for IPv6.” RFC 3810...28 St Sauver, J. 1, 2 Staniford, S. 28 Symantec 50 The Bro Project 19, 22, 23 Thomson, S. 16 Tuladhar, S. 9, 26, 30, 34, 35 Vida , R. 47 Vyncke, E. 2

  6. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  7. Sensitivity analysis on chaotic dynamical systems by Non-Intrusive Least Squares Shadowing (NILSS)

    NASA Astrophysics Data System (ADS)

    Ni, Angxiu; Wang, Qiqi

    2017-10-01

    This paper develops the Non-Intrusive Least Squares Shadowing (NILSS) method, which computes the sensitivity for long-time averaged objectives in chaotic dynamical systems. In NILSS, we represent a tangent solution by a linear combination of one inhomogeneous tangent solution and several homogeneous tangent solutions. Next, we solve a least squares problem using this representation; thus, the resulting solution can be used for computing sensitivities. NILSS is easy to implement with existing solvers. In addition, for chaotic systems with many degrees of freedom but few unstable modes, NILSS has a low computational cost. NILSS is applied to two chaotic PDE systems: the Lorenz 63 system and a CFD simulation of flow over a backward-facing step. In both cases, the sensitivities computed by NILSS reflect the trends in the long-time averaged objectives of dynamical systems.

  8. An evaluation of interior video motion detection systems

    SciTech Connect

    Vigil, J.T.

    1993-02-01

    This report discusses the testing and evaluation of five commercially available interior video emotion detection (VMD) systems. Three digital VMDs and two analog VMDs were tested. The report focuses on nuisance alarm data and on intrusion detection results. Tests were conducted in a high-bay (warehouse) location and in an office.

  9. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    NASA Astrophysics Data System (ADS)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  10. Cyber-intrusion Auto-response and Policy Management System (CAPMS)

    SciTech Connect

    Lusk, Steve; Lawrence, David; Suvana, Prakash

    2015-11-11

    The Cyber-intrusion Auto-response and Policy Management System (CAPMS) project was funded by a grant from the US Department of Energy (DOE) Cybersecurity for Energy Delivery Systems (CEDS) program with contributions from two partner electric utilities: Southern California Edison (SCE) and Duke Energy. The goal of the project was to demonstrate protecting smart grid assets from a cyber attack in a way that “does not impede critical energy delivery functions.” This report summarizes project goals and activities for the CAPMS project and explores what did and did not work as expected. It concludes with an assessment of possible benefits and value of the system for the future.

  11. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    NASA Astrophysics Data System (ADS)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  12. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  13. Sensitivity analysis of some critical factors affecting simulated intrusion volumes during a low pressure transient event in a full-scale water distribution system.

    PubMed

    Ebacher, G; Besner, M C; Clément, B; Prévost, M

    2012-09-01

    Intrusion events caused by transient low pressures may result in the contamination of a water distribution system (DS). This work aims at estimating the range of potential intrusion volumes that could result from a real downsurge event caused by a momentary pump shutdown. A model calibrated with transient low pressure recordings was used to simulate total intrusion volumes through leakage orifices and submerged air vacuum valves (AVVs). Four critical factors influencing intrusion volumes were varied: the external head of (untreated) water on leakage orifices, the external head of (untreated) water on submerged air vacuum valves, the leakage rate, and the diameter of AVVs' outlet orifice (represented by a multiplicative factor). Leakage orifices' head and AVVs' orifice head levels were assessed through fieldwork. Two sets of runs were generated as part of two statistically designed experiments. A first set of 81 runs was based on a complete factorial design in which each factor was varied over 3 levels. A second set of 40 runs was based on a latin hypercube design, better suited for experimental runs on a computer model. The simulations were conducted using commercially available transient analysis software. Responses, measured by total intrusion volumes, ranged from 10 to 366 L. A second degree polynomial was used to analyze the total intrusion volumes. Sensitivity analyses of both designs revealed that the relationship between the total intrusion volume and the four contributing factors is not monotonic, with the AVVs' orifice head being the most influential factor. When intrusion through both pathways occurs concurrently, interactions between the intrusion flows through leakage orifices and submerged AVVs influence intrusion volumes. When only intrusion through leakage orifices is considered, the total intrusion volume is more largely influenced by the leakage rate than by the leakage orifices' head. The latter mainly impacts the extent of the area affected by

  14. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  15. Vapor Intrusion

    EPA Pesticide Factsheets

    Vapor intrusion occurs when there is a migration of volatile chemicals from contaminated groundwater or soil into an overlying building. Volatile chemicals can emit vapors that may migrate through subsurface soils and into indoor air spaces.

  16. The potential for health risks from intrusion of contaminants into the distribution system from pressure transients.

    PubMed

    LeChevallier, Mark W; Gullick, Richard W; Karim, Mohammad R; Friedman, Melinda; Funk, James E

    2003-03-01

    The potential for public health risks associated with intrusion of contaminants into water supply distribution systems resulting from transient low or negative pressures is assessed. It is shown that transient pressure events occur in distribution systems; that during these negative pressure events pipeline leaks provide a potential portal for entry of groundwater into treated drinking water; and that faecal indicators and culturable human viruses are present in the soil and water exterior to the distribution system. To date, all observed negative pressure events have been related to power outages or other pump shutdowns. Although there are insufficient data to indicate whether pressure transients are a substantial source of risk to water quality in the distribution system, mitigation techniques can be implemented, principally the maintenance of an effective disinfectant residual throughout the distribution system, leak control, redesign of air relief venting, and more rigorous application of existing engineering standards. Use of high-speed pressure data loggers and surge modelling may have some merit, but more research is needed.

  17. Portable modular detection system

    DOEpatents

    Brennan, James S.; Singh, Anup; Throckmorton, Daniel J.; Stamps, James F.

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  18. Effects of maxillary molar intrusion with zygomatic anchorage on the stomatognathic system in anterior open bite patients.

    PubMed

    Akan, Seden; Kocadereli, Ilken; Aktas, Alper; Taşar, Ferda

    2013-02-01

    The aim of this study was to evaluate the effects of intrusion of the maxillary posterior teeth with zygomatic anchorage on the dentofacial system, on electromyographic (EMG) activity of the masticatory muscles, and on vibration of the temporomandibular joint. The study sample consisted of 19 subjects (13 females, 6 males) with a mean age of 17.7 years. Lateral cephalometric and posteroanterior (PA) radiographs, EMG, and electrovibratographic (EVG) records were obtained before (T0) and after (T1) intrusion. Paired t- and Wilcoxon signed ranks tests were used for statistical evaluation. Maxillary molar intrusion of 3.37 ± 1.21 mm was obtained with a force of 400 g in an average period of 6.84 ± 1.64 months. At T1, all measurements showed that facial growth direction, ANB angle, convexity, and overjet were decreased (P < 0.05). SNB angle, facial depth, and overbite were significantly increased (P < 0.05). Upper lip-E plane distance was increased (P < 0.05). Evaluation of the PA radiographs showed that the right and left molar reference angles were unchanged. EMG and EVG analysis showed that the stomatognathic system at T0 was maintained at T1. Intrusion of the maxillary posterior teeth with zygomatic anchorage is an effective treatment alternative for anterior open bite correction.

  19. Extracting Features from an Electrical Signal of a Non-Intrusive Load Monitoring System

    NASA Astrophysics Data System (ADS)

    Figueiredo, Marisa B.; de Almeida, Ana; Ribeiro, Bernardete; Martins, António

    Improving energy efficiency by monitoring household electrical consumption is of significant importance with the present-day climate change concerns. A solution for the electrical consumption management problem is the use of a non-intrusive load monitoring system (NILM). This system captures the signals from the aggregate consumption, extracts the features from these signals and classifies the extracted features in order to identify the switched on appliances. An effective device identification (ID) requires a signature to be assigned for each appliance. Moreover, to specify an ID for each device, signal processing techniques are needed for extracting the relevant features. This paper describes a technique for the steady-states recognition in an electrical digital signal as the first stage for the implementation of an innovative NILM. Furthermore, the final goal is to develop an intelligent system for the identification of the appliances by automated learning. The proposed approach is based on the ratio value between rectangular areas defined by the signal samples. The computational experiments show the method effectiveness for the accurate steady-states identification in the electrical input signals.

  20. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  1. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  2. Driver drowsiness detection based on non-intrusive metrics considering individual specifics.

    PubMed

    Wang, Xuesong; Xu, Chuan

    2016-10-01

    Drowsy driving is a serious highway safety problem. If drivers could be warned before they became too drowsy to drive safely, some drowsiness-related crashes could be prevented. The presentation of timely warnings, however, depends on reliable detection. To date, the effectiveness of drowsiness detection methods has been limited by their failure to consider individual differences. The present study sought to develop a drowsiness detection model that accommodates the varying individual effects of drowsiness on driving performance. Nineteen driving behavior variables and four eye feature variables were measured as participants drove a fixed road course in a high fidelity motion-based driving simulator after having worked an 8-h night shift. During the test, participants were asked to report their drowsiness level using the Karolinska Sleepiness Scale at the midpoint of each of the six rounds through the road course. A multilevel ordered logit (MOL) model, an ordered logit model, and an artificial neural network model were used to determine drowsiness. The MOL had the highest drowsiness detection accuracy, which shows that consideration of individual differences improves the models' ability to detect drowsiness. According to the results, percentage of eyelid closure, average pupil diameter, standard deviation of lateral position and steering wheel reversals was the most important of the 23 variables. The consideration of individual differences on a drowsiness detection model would increase the accuracy of the model's detection accuracy. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Present and future challenges of urban systems affected by seawater and its intrusion: the case of Venice, Italy

    NASA Astrophysics Data System (ADS)

    di Sipio, Eloisa; Zezza, Fulvio

    2011-11-01

    In lagoonal and marine environments, both historic monuments and recent buildings suffer from severe salt damage caused by sea flooding, sea-level rise and frequent storm events. Salt-water contamination of groundwater systems, a widespread phenomenon typical of coastal areas, can lead to a deterioration not only of the quality of fresh groundwater resources, but also of building materials in urban settlements. A general overview is given of the hydrogeological configuration of the subsoil of Venice (Italy), with particular reference to the shallow groundwater circulation. The relationship between the seawater in the subsoil and salt decay processes, due to salt crystallization, is highlighted. These processes affect civil constructions in Venice's historic center. Perched aquifers, influenced by tide variations and characterized by salt-water intrusion, favor the transport of salts within masonry walls through the action of rising damp. In fact, foundations, in direct contact with the aquifers, may become a preferential vehicle for the transportation of salt within buildings. Decay patterns of different building materials can be detected through non-destructive techniques, which can identify sea-salt damage and therefore assist in the preservation of cultural heritage in coastal areas.

  4. Future Volcanism at Yucca Mountain - Statistical Insights from the Non-Detection of Basalt Intrusions in the Potential Repository

    NASA Astrophysics Data System (ADS)

    Coleman, N.; Abramson, L.

    2004-05-01

    Yucca Mt. (YM) is a potential repository site for high-level radioactive waste and spent fuel. One issue is the potential for future igneous activity to intersect the repository. If the event probability is <1E-8/yr, it need not be considered in licensing. Plio-Quaternary volcanos and older basalts occur near YM. Connor et al (JGR, 2000) estimate a probability of 1E-8/yr to 1E-7/yr for a basaltic dike to intersect the potential repository. Based on aeromagnetic data, Hill and Stamatakos (CNWRA, 2002) propose that additional volcanos may lie buried in nearby basins. They suggest if these volcanos are part of temporal-clustered volcanic activity, the probability of an intrusion may be as high as 1E-6/yr. We examine whether recurrence probabilities >2E-7/yr are realistic given that no dikes have been found in or above the 1.3E7 yr-old potential repository block. For 2E-7/yr (or 1E-6/yr), the expected number of penetrating dikes is 2.6 (respectively, 13), and the probability of at least one penetration is 0.93 (0.999). These results are not consistent with the exploration evidence. YM is one of the most intensively studied places on Earth. Over 20 yrs of studies have included surface and subsurface mapping, geophysical surveys, construction of 10+ km of tunnels in the mountain, drilling of many boreholes, and construction of many pits (DOE, Site Recommendation, 2002). It seems unlikely that multiple dikes could exist within the proposed repository footprint and escape detection. A dike complex dated 11.7 Ma (Smith et al, UNLV, 1997) or 10 Ma (Carr and Parrish, 1985) does exist NW of YM and west of the main Solitario Canyon Fault. These basalts intruded the Tiva Canyon Tuff (12.7 Ma) in an epoch of caldera-forming pyroclastic eruptions that ended millions of yrs ago. We would conclude that basaltic volcanism related to Miocene silicic volcanism may also have ended. Given the nondetection of dikes in the potential repository, we can use a Poisson model to estimate an

  5. Coastal aquifer groundwater dynamics and salt intrusion: Monitoring system of river Neretva delta

    NASA Astrophysics Data System (ADS)

    Srzić, Veljko; Vranješ, Mijo; Deković, Jure; Romić, Davor; Zovko, Monika; Milin, Marin

    2017-04-01

    River Neretva delta is located in southern part of Croatia and creates a complex surface- groundwater system influenced by tidal forces characteristic for Adriatic Sea and river Neretva whose discharge varies from 70 - 2700 m3/s over the year. From agricultural point of view, area is used widely for fruit production which implies existence and functionality of complex drainage system consisted of a net of lateral channels and pumping station plants with the capacity of app. 25 m3/s. Area of interest covers app 3500 ha and is bounded by river Neretva from North and Adriatic sea from West. Southern and eastern boundaries are dominantly karstic hills. Lover aquifer is confined with app depth of 65 m, made of fine gravel. Aquitard is a 15 m height layer of clay. Upper aquifer in unconfined with depth of app 10-20 m. Inside the area of interest there are 8 wells installed (each aquifer 4) measuring piezometric head on hourly/daily temporal scale. Sea level measurements are also made capturing for long term tidal oscillations. Discharge measurements are made few km downstream from hydropower plant Mostar (Bosnia and Herzegovina), while three meteorological stations for rainfall measurements are located at the area boundaries. Salt water concentration, pH and resistivity values have been measured locally, app 6 times per year for last 10 years. Results imply confined aquifer is dominantly influenced by the sea level while tidal effects are noticed 9 km upstream the river Neretva with delay of 9-12 minutes compared to sea level. Salt water cline inside the river is related to tidal effects and river discharge, with potential presence at distances of more than 15 km upstream from the sea. Salt water intrusion dominantly occurs through confined aquifer while vertical transport of salt is supposed to be enhanced by the effects of drainage system.

  6. Geophysical characterization of hydrothermal systems and intrusive bodies, El Chichón volcano (Mexico)

    NASA Astrophysics Data System (ADS)

    Jutzeler, Martin; Varley, Nick; Roach, Michael

    2011-04-01

    The 1982 explosive eruptions of El Chichón volcano (Chiapas, Mexico) destroyed the inner dome and created a 1-km-wide and 180-m-deep crater within the somma crater. A shallow hydrothermal system was exposed to the surface of the new crater floor and is characterized by an acid crater lake, a geyser-like Cl-rich spring (soap pool), and numerous fumarole fields. Multiple geophysical surveys were performed to define the internal structure of the volcanic edifice and its hydrothermal system. We carried out a high-resolution ground-based geomagnetic survey in the 1982 crater and its surroundings and 38 very low frequency (VLF) transects around the crater lake. A 3-D inversion of the ground-based magnetic data set highlighted three high-susceptibility isosurfaces, interpreted as highly magnetized bodies beneath the 1982 crater floor. Inversion of a digitized regional aeromagnetic map highlighted four major deeply rooted cryptodomes, corresponding to major topographic highs and massive lava dome outcrops outside and on the somma rim. The intracrater magnetic bodies correspond closely to the active hydrothermal vents and their modeled maximum basal depth matches the elevation of the springs on the flanks of the volcano. Position, dip, and vertical extent of active and extinct hydrothermal vents identified by VLF-EM surveys match the magnetic data set. We interpret the shallow lake spring hydrothermal system to be mostly associated with buried remnants of the 550 BP dome, but the Cl-rich soap pool may be connected to a small intrusion emplaced at shallow depth during the 1982 eruption.

  7. Non-intrusive optical detection of delaminations between a Ni electroplate on a Ti substrate

    NASA Astrophysics Data System (ADS)

    Brenan, C.; Waksberg, A.

    1989-03-01

    Nonintrusive and noncontact detection of delaminations between a Ni electroplate and a Ti substrate is demonstrated using the photothermal effect. The Ni layer is heated on absorption of energy from a pulsed ruby laser beam. The resultant thermomechanical surface deformation serves as a source of mechanical energy to drive low frequency damped transverse vibrations in the Ti substrate. The vibration amplitude is monitored with a coincident HeNe laser beam from an optical heterodyne interferometer. As the sample is scanned with the two laser beams, delamination edges are signaled as changes in the induced vibration amplitude as the defect boundary is crossed. To verify the technique, a test sample was prepared in which delaminations of known dimensions were implanted. The positions of the known delaminations, in addition to regions of suspect plating adherence, were identified. Microscopic examination and comparison of cross sections from suspect and well-bonded regions confirmed the lack of Ni electroplate adherence in the suspect regions. These results indicate the photothermal effect has potential for NDE of Ni electroplate on Ti substrates.

  8. Sample Entropy and Random Forests: A Methodology for Anomaly-based Intrusion Detection and Classification of Low-bandwidth Malware Attacks

    DTIC Science & Technology

    2006-09-01

    ICASSP 2006, I-1149; I-1152. JIAN YIN , GANG ZHANG, YI-QUN CHEN AND XIAN-LI FAN . 2004. Multi-events analysis for anomaly intrusion detection...are then returned from the procedure.[ Arthur , et al. 2006] 3. Hierarchical Agglomerative Algorithm The hierarchical agglomerative procedure...traffic as a key metric.[Duan, et al. 2005, Hong Han, et al. 2002, Jaroszewicz, et al. 2005, Jian Yin , et al. 2004, Julisch, et al. 2002, Khanna, et

  9. Life detection systems.

    NASA Technical Reports Server (NTRS)

    Mitz, M. A.

    1972-01-01

    Some promising newer approaches for detecting microorganisms are discussed, giving particular attention to the integration of different methods into a single instrument. Life detection methods may be divided into biological, chemical, and cytological methods. Biological methods are based on the biological properties of assimilation, metabolism, and growth. Devices for the detection of organic materials are considered, taking into account an instrument which volatilizes, separates, and analyzes a sample sequentially. Other instrumental systems described make use of a microscope and the cytochemical staining principle.

  10. Geochronological and geochemical study of the Pan African intrusive rocks along the Najd Fault system in El Wajh area, Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Hassan, Mahmoud; Abu-Alam, Tamer; Hauzenberger, Christoph; Stüwe, Kurt; Tiepolo, Massimo

    2014-05-01

    In the active tectonic regions, shear zones play an important role to re-configure the structure of the lithosphere. One of the largest shear zones on the Earth is the Najd Fault system of the Arabian-Nubian Shield. Literature data record the main active phase of this shear zone during the last stages of the Pan-African Orogeny (ca. 650-550 Ma). Compilation of new geochronological and geochemical data in addition to field relation is used to figure the tectonic history of the Najd Fault system. Different relationships between igneous intrusions and the Najd Fault System are observed. Some igneous bodies predate the activity of the shear zone, others intruded during the shearing process and a later phase intruded after the activity of the Najd Fault system ceased. The intrusive rocks in the study area show a geochemical and compositional diversity. Intrusives with dioritic composition were derived from a metaluminous tholeiitic magma around 700 Ma, and granodiorite-tonalite intrusions have calcalkaline characters and display a metaluminous to peraluminous character (ca. 740 and 660 Ma) then the magmatic activity terminated with peraluminous calcalkaline intrusives which formed granitic rocks with intrusion ages of 605-580 Ma. These magmatic events are identical for the Arabian-Nubian Shield but contamination from the crust or different rates of fractionation are recorded in our samples which are responsible for variations in the geochemical signature of the intrusive rocks. Based on field observations and contact relations, the intrusive rocks within the Ajjaj shear zone were studied in details in order to determine the age and the tectonic history of this shear zone that marks the termination of the Najd System against the eastern margin of the Red Sea. The provided zircon U-Pb dating by LA-ICP-MS and field relationships confine the activation age of the Ajjaj shear zone in limited period between 605 Ma and 580 Ma.

  11. Idaho Explosive Detection System

    ScienceCinema

    Klinger, Jeff

    2016-07-12

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  12. Idaho Explosive Detection System

    SciTech Connect

    Klinger, Jeff

    2011-01-01

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  13. Minimally Intrusive and Nonintrusive Supersonic Injectors for LANTR and RBCC/Scramjet Propulsion Systems

    NASA Astrophysics Data System (ADS)

    Buggele, Alvin E.; Gallagher, John R.

    2002-10-01

    A family of supersonic injectors for use on spaceplanes, rockets and missiles and the like is disclosed and claimed. Each injector maintains a specific constant (uniform) Mach number along its length when used while being minimally intrusive at significantly higher injectant pressure than combuster freestream total pressure. Each injector is substantially non-intrusive when it is not being used. The injectors may be used individually or in a group. Different orientations of the injectors in a group promotes greater penetration and mixing of fuel or oxidizer into a supersonic combustor. The injectors can be made from single piece of Aluminum, investment cast metal, or ceramic or they can be made from starboard and port blocks strapped together to accurately control the throat area. Each injector includes an elongated body having an opening which in cross section is an hour glass (venturi shaped) and the opening diverges in width and depth from the bow section to the stem section of the opening.

  14. Automatic infection detection system.

    PubMed

    Granberg, Ove; Bellika, Johan Gustav; Arsand, Eirik; Hartvigsen, Gunnar

    2007-01-01

    An infected person may be contagious already before the first symptoms appear. This person can, in the period of disease evolution, infect several associated citizens before consulting a general practitioner (GP). Early detection of contagion is therefore important to prevent spreading of diseases. The Automatic Infection Detection (AID) System faces this problem through investigating the hypothesis that the blood glucose (BG) level increases when a person is infected. The first objective of the prototyped version of the AID system was to identify possible BG elevations in the incubation time that could be related to the spread of infectious diseases. To do this, we monitored two groups of people, with and without diabetes mellitus. The AID system analyzed the results and we were able to detect two cases of infection during the study period. The time of detection occurred simultaneous or near the time of onset of symptoms. The detection did not occur earlier for a number of reasons. The most likely one is that the evolution process of an infectious disease is both complicated and involves the immune system and several organs in the body. The investigation with regard to isolating the key relations is therefore considered as a very complex study. Nevertheless, the AID system managed to detect the infection much earlier than what is possible with today's early warning systems for infectious diseases.

  15. The behavior of double-diffusive intrusion in a rotating system

    SciTech Connect

    Yoshida, J. ); Nagashima, H. ); Niino, H. )

    1989-04-15

    The effects of Earth's rotation on the stability of a thermohaline front of finite width are studied by means of a linear theory. It is found that when the rotation is present, two different types of unstable modes are possible. When the front is narrow and a Rossby radius of deformation based on Ruddick and Turner's (1979) vertical scale is large in comparison with the width of the front, the fastest growing intrusion is nearly two dimensional (nonrotational mode), and its vertical scale is given by Ruddick and Turner's scale. When the Rossby radius becomes small, in addition to the nonrotational mode there appears another unstable mode (the rotational mode) which has a smaller vertical wave number than the nonrotational mode. With the introduction of rotation, the fastest growing mode has nonzero along-frontal wave number; that is, the intrusion becomes tilted in the along-frontal direction. When the Rossby radius of deformation is sufficiently small in comparison with the width of the front, transition from the nonrotational mode to the rotational one occurs. The transition from nonrotational to rotational mode becomes less pronounced when the width of the front is increased for fixed horizontal density-compensating gradients of temperature and salinity. For a wide front the growth rate and vertical wave number for both modes becomes similar, which agrees with the results of previous studies for infinite fronts that rotation does not modify the behavior of the intrusion except for the occurrence of along-frontal tilt.

  16. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  17. Underwater laser detection system

    NASA Astrophysics Data System (ADS)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  18. Development and evaluation of a decision-supporting model for identifying the source location of microbial intrusions in real gravity sewer systems.

    PubMed

    Kim, Minyoung; Choi, Christopher Y; Gerba, Charles P

    2013-09-01

    Assuming a scenario of a hypothetical pathogenic outbreak, we aimed this study at developing a decision-support model for identifying the location of the pathogenic intrusion as a means of facilitating rapid detection and efficient containment. The developed model was applied to a real sewer system (the Campbell wash basin in Tucson, AZ) in order to validate its feasibility. The basin under investigation was divided into 14 sub-basins. The geometric information associated with the sewer network was digitized using GIS (Geological Information System) and imported into an urban sewer network simulation model to generate microbial breakthrough curves at the outlet. A pre-defined amount of Escherichia coli (E. coli), which is an indicator of fecal coliform bacteria, was hypothetically introduced into 56 manholes (four in each sub-basin, chosen at random), and a total of 56 breakthrough curves of E. coli were generated using the simulation model at the outlet. Transport patterns were classified depending upon the location of the injection site (manhole), various known characteristics (peak concentration and time, pipe length, travel time, etc.) extracted from each E. coli breakthrough curve and the layout of sewer network. Using this information, we back-predicted the injection location once an E. coli intrusion was detected at a monitoring site using Artificial Neural Networks (ANNs). The results showed that ANNs identified the location of the injection sites with 57% accuracy; ANNs correctly recognized eight out of fourteen expressions with relying on data from a single detection sensor. Increasing the available sensors within the basin significantly improved the accuracy of the simulation results (from 57% to 100%). Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Intruder detection system

    NASA Technical Reports Server (NTRS)

    Lee, R. D. (Inventor)

    1973-01-01

    An intruder detection system is described. The system contains a transmitter which sends a frequency modulated and amplitude modulated signal to a remote receiver in response to a geophone detector which responds to seismic impulses created by the intruder. The signal makes it possible for an operator to determine the number of intruders and the manner of movement.

  20. Radiation detection system

    DOEpatents

    Franks, Larry A.; Lutz, Stephen S.; Lyons, Peter B.

    1981-01-01

    A radiation detection system including a radiation-to-light converter and fiber optic wave guides to transmit the light to a remote location for processing. The system utilizes fluors particularly developed for use with optical fibers emitting at wavelengths greater than about 500 nm and having decay times less than about 10 ns.

  1. Portable pathogen detection system

    DOEpatents

    Colston, Billy W.; Everett, Matthew; Milanovich, Fred P.; Brown, Steve B.; Vendateswaran, Kodumudi; Simon, Jonathan N.

    2005-06-14

    A portable pathogen detection system that accomplishes on-site multiplex detection of targets in biological samples. The system includes: microbead specific reagents, incubation/mixing chambers, a disposable microbead capture substrate, and an optical measurement and decoding arrangement. The basis of this system is a highly flexible Liquid Array that utilizes optically encoded microbeads as the templates for biological assays. Target biological samples are optically labeled and captured on the microbeads, which are in turn captured on an ordered array or disordered array disposable capture substrate and then optically read.

  2. Solar system fault detection

    DOEpatents

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  3. Solar system fault detection

    DOEpatents

    Farrington, Robert B.; Pruett, Jr., James C.

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  4. Calculation notes that support accident scenario and consequence development for the steam intrusion from interfacing systems accident

    SciTech Connect

    Van Vleet, R.J.; Ryan, G.W.; Crowe, R.D.; Lindberg, S.E., Fluor Daniel Hanford

    1997-03-04

    This document supports the development and presentation of the following accident scenario in the TWRS Final Safety Analysis Report (FSAR): Steam Intrusion From Interfacing Systems. The calculations needed to quantify the risk associated with this accident scenario are included in the following sections to aid in the understanding of this accident scenario. Information validation forms citing assumptions that were approved for use specifically in this analysis are included in Appendix A. Copies of these forms are also on file with TWRS Project Files. Calculations performed in this document, in general, are expressed in traditional (English) units to aid understanding of the accident scenario and related parameters.

  5. Idaho Explosives Detection System

    SciTech Connect

    Edward L. Reber; J. Keith Jewell; Larry G. Blackwood; Andrew J. Edwards; Kenneth W. Rohde; Edward H. Seabury

    2004-10-01

    The Idaho Explosives Detection System (IEDS) was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-minute measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  6. Idaho Explosives Detection System

    SciTech Connect

    Edward L. Reber; Larry G. Blackwood; Andrew J. Edwards; J. Keith Jewell; Kenneth W. Rohde; Edward H. Seabury; Jeffery B. Klinger

    2005-12-01

    The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  7. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  8. SHRIMP U-Pb zircon geochronology and thermal modeling of multilayer granitoid intrusions. Implications for the building and thermal evolution of the Central System batholith, Iberian Massif, Spain

    NASA Astrophysics Data System (ADS)

    Díaz Alvarado, Juan; Fernández, Carlos; Castro, Antonio; Moreno-Ventas, Ignacio

    2013-08-01

    This work shows the results of a U-Pb SHRIMP zircon geochronological study of the central part of the Gredos massif (Spanish Central System batholith). The studied batholith is composed of several granodiorite and monzogranite tabular bodies, around 1 km thick each, intruded into partially molten pelitic metasediments. Granodiorites and monzogranites, belonging to three distinct intrusive bodies, and samples of anatectic leucogranites have been selected for SHRIMP U-Pb zircon geochronology. Distinct age groups, separated by up to 20 Ma, have been distinguished in each sample. Important age differences have also been determined among the most representative age groups of the three analyzed granitoid bodies: 312.6 ± 2.8 Ma for the Circo de Gredos Bt-granodiorites (floor intrusive layer), 306.9 ± 1.5 Ma for the Barbellido-Plataforma granitoids (top intrusive layer) and 303.5 ± 2.8 Ma for Las Pozas Crd-monzogranites (middle intrusive layer). These age differences are interpreted in terms of sequential emplacement of the three intrusive bodies, contemporary with the Late Paleozoic D3 deformation phase. The anatectic leucogranites are coeval to slightly younger than the adjacent intrusive granodiorites and monzogranites (305.4 ± 1.6 Ma for Refugio del Rey leucogranites and 303 ± 2 Ma for migmatitic hornfelses). It is suggested that these anatectic magmas were generated in response to the thermal effects of granodiorite intrusions. Thermal modeling with COMSOL Multiphysics® reveals that sequential emplacement was able to keep the thermal conditions of the batholith around the temperature of zircon crystallization in granitic melts (around 750 °C) for several million of years, favoring the partial melting of host rocks and the existence of large magma chambers composed of crystal mush prone to be rejuvenated after new intrusions.

  9. Superfund Vapor Intrusion

    EPA Pesticide Factsheets

    In addition to basic information about vapor intrusion, the site contains technical and policy documents, tools and other resources to support vapor intrusion environmental investigations and mitigation activities.

  10. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J.

    1975-01-01

    A monitoring system developed to test the capability of a water recovery system to reject the passage of viruses into the recovered water is described. A nonpathogenic marker virus, bacteriophage F2, is fed into the process stream before the recovery unit and the reclaimed water is assayed for its presence. Detection of the marker virus consists of two major components, concentration and isolation of the marker virus, and detection of the marker virus. The concentration system involves adsorption of virus to cellulose acetate filters in the presence of trivalent cations and low pH with subsequent desorption of the virus using volumes of high pH buffer. The detection of the virus is performed by a passive immune agglutination test utilizing specially prepared polystyrene particles. An engineering preliminary design was performed as a parallel effort to the laboratory development of the marker virus test system. Engineering schematics and drawings of a fully functional laboratory prototype capable of zero-G operation are presented. The instrument consists of reagent pump/metering system, reagent storage containers, a filter concentrator, an incubation/detector system, and an electronic readout and control system.

  11. Intruder detection system

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1970-01-01

    Moving coil geophones are utilized to develop a small, rugged, battery operated system capable of detecting seismic disturbances caused by intruders. Seismic disturbances sensed by each geophone are converted into electrical signals, amplified, and transmitted to remote receiver which provides listener with aural signal.

  12. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  13. Radiation detection system

    DOEpatents

    Nelson, Melvin A.; Davies, Terence J.; Morton, III, John R.

    1976-01-01

    A radiation detection system which utilizes the generation of Cerenkov light in and the transmission of that light longitudinally through fiber optic wave guides in order to transmit intelligence relating to the radiation to a remote location. The wave guides are aligned with respect to charged particle radiation so that the Cerenkov light, which is generated at an angle to the radiation, is accepted by the fiber for transmission therethrough. The Cerenkov radiation is detected, recorded, and analyzed at the other end of the fiber.

  14. Non-intrusive generalized polynomial chaos for the robust stability analysis of uncertain nonlinear dynamic friction systems

    NASA Astrophysics Data System (ADS)

    Nechak, Lyes; Berger, Sébastien; Aubry, Evelyne

    2013-03-01

    This paper is devoted to the stability analysis of uncertain nonlinear dynamic dry friction systems. The stability property of dry friction systems is known to be very sensitive to the variations of friction laws. Moreover, the friction coefficient admits dispersions due to the manufacturing processes. Therefore, it becomes necessary to take this uncertainty into account in the stability analysis of dry friction systems to ensure robust predictions of stable and instable behaviors. The generalized polynomial chaos formalism is proposed to deal with this challenging problem treated in most cases with the prohibitive Monte Carlo based techniques. Two equivalent methods presented here combine the non-intrusive generalized polynomial chaos with the indirect Lyapunov method. Both methods are shown to be efficient in the estimation of the stability and instability regions with high accuracy and high confidence levels and at lower cost compared with the classic Monte Carlo based method.

  15. High Temperature Metamorphism In The Conductive Boundary Layer Of An Intrusion Of Rhyolite Magma In The Krafla Geothermal System, Iceland

    NASA Astrophysics Data System (ADS)

    Schiffman, P.; Zierenberg, R. A.; Fridleifsson, G. O.; Elders, W. A.; Mortensen, A. K.

    2011-12-01

    A rhyolite magma body within the Krafla geothermal system- encountered at a depth of 2.1 km during drilling of the Iceland Deep Drilling Project's IDDP-1 borehole - is producing high temperature metamorphism within adjacent country rocks. Cuttings recovered during drilling within a few meters of the intrusive contact are undergoing recrystallization into granoblastic, pyroxene hornfelses. In mafic rocks, clinopyroxene-orthopyroxene-plagioclase-magnetite-ilmenite assemblages record temperatures in the range of 800-950°C. Silicic lithologies - mainly older felsitic intrusions -contain pockets of rhyolite melt, quenched to glass during drilling, amongst alkali feldspar, plagioclase, quartz, clinopyroxene, and magnetite. Curiously, no lower grade metamorphic assemblages have been identified in the drill cuttings, and country rocks at distances beyond 30 m of the contact are essentially unaltered. These findings suggest that the intruding rhyolite magma body has created a thin conductive boundary layer above it, but that a contact metamorphic aureole has not as yet developed beyond this. The heat flow across the boundary layer is calculated to be a minimum of 23 W m-2. This flux is capable of supplying steam to a geothermal power plant that can produce approximately 40 MW of electrical generation from a single well that has a measured well-head temperature of up to 415°C.

  16. Universal explosive detection system for homeland security applications

    NASA Astrophysics Data System (ADS)

    Lee, Vincent Y.; Bromberg, Edward E. A.

    2010-04-01

    L-3 Communications CyTerra Corporation has developed a high throughput universal explosive detection system (PassPort) to automatically screen the passengers in airports without requiring them to remove their shoes. The technical approach is based on the patented energetic material detection (EMD) technology. By analyzing the results of sample heating with an infrared camera, one can distinguish the deflagration or decomposition of an energetic material from other clutters such as flammables and general background substances. This becomes the basis of a universal explosive detection system that does not require a library and is capable of detecting trace levels of explosives with a low false alarm rate. The PassPort is a simple turnstile type device and integrates a non-intrusive aerodynamic sampling scheme that has been shown capable of detecting trace levels of explosives on shoes. A detailed description of the detection theory and the automated sampling techniques, as well as the field test results, will be presented.

  17. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J. (Inventor)

    1978-01-01

    The performance of a waste water reclamation system is monitored by introducing a non-pathogenic marker virus, bacteriophage F2, into the waste-water prior to treatment and, thereafter, testing the reclaimed water for the presence of the marker virus. A test sample is first concentrated by absorbing any marker virus onto a cellulose acetate filter in the presence of a trivalent cation at low pH and then flushing the filter with a limited quantity of a glycine buffer solution to desorb any marker virus present on the filter. Photo-optical detection of indirect passive immune agglutination by polystyrene beads indicates the performance of the water reclamation system in removing the marker virus. A closed system provides for concentrating any marker virus, initiating and monitoring the passive immune agglutination reaction, and then flushing the system to prepare for another sample.

  18. Ultrasonic Leak Detection System

    NASA Technical Reports Server (NTRS)

    Youngquist, Robert C. (Inventor); Moerk, J. Steven (Inventor)

    1998-01-01

    A system for detecting ultrasonic vibrations. such as those generated by a small leak in a pressurized container. vessel. pipe. or the like. comprises an ultrasonic transducer assembly and a processing circuit for converting transducer signals into an audio frequency range signal. The audio frequency range signal can be used to drive a pair of headphones worn by an operator. A diode rectifier based mixing circuit provides a simple, inexpensive way to mix the transducer signal with a square wave signal generated by an oscillator, and thereby generate the audio frequency signal. The sensitivity of the system is greatly increased through proper selection and matching of the system components. and the use of noise rejection filters and elements. In addition, a parabolic collecting horn is preferably employed which is mounted on the transducer assembly housing. The collecting horn increases sensitivity of the system by amplifying the received signals. and provides directionality which facilitates easier location of an ultrasonic vibration source.

  19. Gas Flow Detection System

    NASA Technical Reports Server (NTRS)

    Moss, Thomas; Ihlefeld, Curtis; Slack, Barry

    2010-01-01

    This system provides a portable means to detect gas flow through a thin-walled tube without breaking into the tubing system. The flow detection system was specifically designed to detect flow through two parallel branches of a manifold with only one inlet and outlet, and is a means for verifying a space shuttle program requirement that saves time and reduces the risk of flight hardware damage compared to the current means of requirement verification. The prototype Purge Vent and Drain Window Cavity Conditioning System (PVD WCCS) Flow Detection System consists of a heater and a temperature-sensing thermistor attached to a piece of Velcro to be attached to each branch of a WCCS manifold for the duration of the requirement verification test. The heaters and thermistors are connected to a shielded cable and then to an electronics enclosure, which contains the power supplies, relays, and circuit board to provide power, signal conditioning, and control. The electronics enclosure is then connected to a commercial data acquisition box to provide analog to digital conversion as well as digital control. This data acquisition box is then connected to a commercial laptop running a custom application created using National Instruments LabVIEW. The operation of the PVD WCCS Flow Detection System consists of first attaching a heater/thermistor assembly to each of the two branches of one manifold while there is no flow through the manifold. Next, the software application running on the laptop is used to turn on the heaters and to monitor the manifold branch temperatures. When the system has reached thermal equilibrium, the software application s graphical user interface (GUI) will indicate that the branch temperatures are stable. The operator can then physically open the flow control valve to initiate the test flow of gaseous nitrogen (GN2) through the manifold. Next, the software user interface will be monitored for stable temperature indications when the system is again at

  20. A Weld Defects Detection System Based on a Spectrometer

    PubMed Central

    Bebiano, Daniel; Alfaro, Sadek C. A.

    2009-01-01

    Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects. PMID:22574049

  1. A weld defects detection system based on a spectrometer.

    PubMed

    Bebiano, Daniel; Alfaro, Sadek C A

    2009-01-01

    Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects.

  2. Field test of a distributed fiber-optic intrusion sensor system for long perimeters.

    PubMed

    Juarez, Juan C; Taylor, Henry F

    2007-04-10

    Field tests in desert terrain of a distributed sensor system for detecting and locating intruders based on the phase-sensitive optical-time-domain reflectometer (phi-OTDR) are described. The sensing element is a single-mode telecommunications fiber in a 4.5 mm diameter cable buried in a trench filled with loose sand. Light pulses from a continuous-wave Er:fiber Fabry-Perot laser with a narrow (<3 kHz) instantaneous linewidth and low (few kilohertz per second) frequency drift are injected into one end of the fiber, and the orthogonal polarizations of the backscattered light are monitored with separate receivers. Localized phase changes in the optical carrier are sensed by subtracting a phi-OTDR trace from an earlier stored trace. High sensitivity and consistent detection of intruders on foot and of vehicles traveling down a road near the cable line was realized over a cable length of 8.5 km and a total fiber path of 19 km in real time.

  3. Polarization discrimination in a phase-sensitive optical time-domain reflectometer intrusion-sensor system.

    PubMed

    Juarez, Juan C; Taylor, Henry F

    2005-12-15

    A distributed sensor system for detecting and locating intruders based on a phase-sensitive optical time-domain reflectometer (phi-OTDR) that utilizes polarization discrimination is described. The sensing element is a single-mode telecommunications fiber in a 3 mm diameter cable buried along a monitored perimeter in a 20-46 cm deep, 10 cm wide trench in clay soil. Light pulses from a continuous-wave Er fiber Fabry-Perot laser with a narrow (< 3 kHz) instantaneous linewidth and low (a few Kilohertz per second) frequency drift are injected into one end of the fiber, and the orthogonal polarizations of the backscattered light are monitored with separate receivers. Localized phase changes in the optical carrier are sensed by subtraction of a phi-OTDR trace from an earlier stored trace. In field tests with a monitored length of 12 km, detection of intruders on foot as far as 4.5 m from the cable line was consistently achieved.

  4. An automated computer misuse detection system for UNICOS

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  5. Arc fault detection system

    DOEpatents

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  6. Arc fault detection system

    DOEpatents

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  7. Real-Time, Non-Intrusive Detection of Liquid Nitrogen in Liquid Oxygen at High Pressure and High Flow

    NASA Technical Reports Server (NTRS)

    Singh, Jagdish P.; Yueh, Fang-Yu; Kalluru, Rajamohan R.; Harrison, Louie

    2012-01-01

    An integrated fiber-optic Raman sensor has been designed for real-time, nonintrusive detection of liquid nitrogen in liquid oxygen (LOX) at high pressures and high flow rates in order to monitor the quality of LOX used during rocket engine ground testing. The integrated sensor employs a high-power (3-W) Melles Griot diode-pumped, solid-state (DPSS), frequency-doubled Nd:YAG 532- nm laser; a modified Raman probe that has built-in Raman signal filter optics; two high-resolution spectrometers; and photomultiplier tubes (PMTs) with selected bandpass filters to collect both N2 and O2 Raman signals. The PMT detection units are interfaced with National Instruments Lab- VIEW for fast data acquisition. Studies of sensor performance with different detection systems (i.e., spectrometer and PMT) were carried out. The concentration ratio of N2 and O2 can be inferred by comparing the intensities of the N2 and O2 Raman signals. The final system was fabricated to measure N2 and O2 gas mixtures as well as mixtures of liquid N2 and LOX

  8. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    PubMed

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south.

  9. Fragmentation of stratospheric intrusions

    NASA Astrophysics Data System (ADS)

    Appenzeller, C.; Davies, H. C.; Norton, W. A.

    1996-01-01

    Evidence is presented pointing to the existence of rich and coherent subsynoptic and mesoscale flow features at tropopause levels. These features are related to, and evolve from, the classical V-shaped intrusions of stratospheric air down to tropospheric elevations. It is shown that intrusions can develop into elongated (˜2000-3000 km) and slender (˜200 km) streamers, and that thereafter such a streamer can roll up to form a train of stalactite-shaped vortex subentities with an accompanying substantial thinning of the intervening filament. In addition there are indications that the vortices themselves can develop a spirallike interior structure of interleaved stratospheric and tropospheric air. These inferences are based upon two independent but complementary sources: analysis of the potential vorticity distribution on tropopause transcending isentropic surfaces derived from the analysis fields of the European Centre for Medium-Range Weather Forecasts either directly, or indirectly using a contour advection technique; and imagery from the water vapor channel of the European Space Agency Meteosat 4 satellite. Streamers were observed to occur with a frequency of approximately one per week over central and southern Europe during the winter of 1991-1992. The fragmentation is linked to the instability or self-development of a filament of enhanced potential vorticity and it can modify or instigate surface weather systems. Moreover, by inducing a substantial and rapid enlargement of the intrusion's surface area it greatly enhances the potential for local irreversible mixing of stratospheric and tropospheric air.

  10. Reconciling Volatile Outputs with Heat Flow and Magma Intrusion Rates at the Yellowstone Magma-Hydrothermal System

    NASA Astrophysics Data System (ADS)

    Lowenstern, J. B.; Hurwitz, S.

    2012-12-01

    The Yellowstone hydrothermal system releases hundreds of millions of liters of water on a daily basis. Gigawatts of heat and kilotons of magmatic volatiles (CO2, S, Cl, F and He) are discharged by these waters. By quantifying the relative contributions of crustal, meteoric, and mantle-derived components, we can estimate the rate at which magma is fed to the crust from below (1). Combining isotopic studies with mass discharge rates of geothermal gases and aqueous dissolved solids, we recognize that over 20,000 tons of CO2 is released from basaltic magmas ponding beneath any silicic magma reservoir in the mid to shallow crust (1,2). In contrast, silicic magma provides significantly less volatiles than what emerges from the hydrothermal system. Estimates of heat flow range from ~3 to 8 GW (1,3,4), derived from satellite, surface geophysics and geochemical methods. Such values, combined with estimates from gas flux, imply prolific basalt intrusion rates between 0.05 and 0.3 cubic kilometers per year (1). Over the history of the Yellowstone Plateau Volcanic Field, a picture emerges where the lower crust is converted from Precambrian metasediments and silicic intrusions into a thick gabbroic batholith similar to that envisioned by some to reside beneath the Snake River Plain along the ancestral track of the Yellowstone Hot Spot (5). (1) Lowenstern and Hurwitz, 2008, Elements 4: 35-40. (2) Werner and Brantley, 2003, G-Cubed 4;7: 1061 (3) Vaughan and others, 2012, JVGR 233-234: 72-89. (4) Hurwitz and others, in press, JGR (5) Shervais and others, 2006, Geology 34:365-368.

  11. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    SciTech Connect

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  12. Glycol leak detection system

    NASA Astrophysics Data System (ADS)

    Rabe, Paul; Browne, Keith; Brink, Janus; Coetzee, Christiaan J.

    2016-07-01

    MonoEthylene glycol coolant is used extensively on the Southern African Large Telescope to cool components inside the telescope chamber. To prevent coolant leaks from causing serious damage to electronics and optics, a Glycol Leak Detection System was designed to automatically shut off valves in affected areas. After two years of research and development the use of leaf wetness sensors proved to work best and is currently operational. These sensors are placed at various critical points within the instrument payload that would trigger the leak detector controller, which closes the valves, and alerts the building management system. In this paper we describe the research of an initial concept and the final accepted implementation and the test results thereof.

  13. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena.

  14. The use of data-mining techniques for developing effective decisionsupport systems: A case study of simulating the effects ofclimate change on coastal salinity intrusion

    USGS Publications Warehouse

    Conrads, Paul A.; Edwin Roehl, Jr.

    2017-01-01

    Natural-resource managers and stakeholders face difficult challenges when managing interactions between natural and societal systems. Potential changes in climate could alter interactions between environmental and societal systems and adversely affect the availability of water resources in many coastal communities. The availability of freshwater in coastal streams can be threatened by saltwater intrusion. Even though the collective interests and computer skills of the community of managers, scientists and other stakeholders are quite varied, there is an overarching need for equal access by all to the scientific knowledge needed to make the best possible decisions. This paper describes a decision support system, PRISM-2, developed to evaluate salinity intrusion due to potential climate change along the South Carolina coast in southeastern USA. The decision support system is disseminated as a spreadsheet application and integrates the output of global circulation models, watershed models and salinity intrusion models with real-time databases for simulation, graphical user interfaces, and streaming displays of results. The results from PRISM-2 showed that a 31-cm and 62-cm increase in sea level reduced the daily availability of freshwater supply to a coastal municipal intake by 4% and 12% of the time, respectively. Future climate change projections by a global circulation model showed a seasonal change in salinity intrusion events from the summer to the fall for the majority of events.

  15. A web-based non-intrusive ambient system to measure and classify activities of daily living.

    PubMed

    Stucki, Reto A; Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P; Nef, Tobias

    2014-07-21

    The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer's disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors' and caregivers' awareness of the patient's cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient's ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient's home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (e.g., via smartphone). We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient's attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. The components of this novel assistive technology system were wireless sensors distributed in every room of the participant's home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified. In this study, 10 healthy participants (6 women

  16. A Web-Based Non-Intrusive Ambient System to Measure and Classify Activities of Daily Living

    PubMed Central

    Urwyler, Prabitha; Rampa, Luca; Müri, René; Mosimann, Urs P

    2014-01-01

    Background The number of older adults in the global population is increasing. This demographic shift leads to an increasing prevalence of age-associated disorders, such as Alzheimer’s disease and other types of dementia. With the progression of the disease, the risk for institutional care increases, which contrasts with the desire of most patients to stay in their home environment. Despite doctors’ and caregivers’ awareness of the patient’s cognitive status, they are often uncertain about its consequences on activities of daily living (ADL). To provide effective care, they need to know how patients cope with ADL, in particular, the estimation of risks associated with the cognitive decline. The occurrence, performance, and duration of different ADL are important indicators of functional ability. The patient’s ability to cope with these activities is traditionally assessed with questionnaires, which has disadvantages (eg, lack of reliability and sensitivity). Several groups have proposed sensor-based systems to recognize and quantify these activities in the patient’s home. Combined with Web technology, these systems can inform caregivers about their patients in real-time (eg, via smartphone). Objective We hypothesize that a non-intrusive system, which does not use body-mounted sensors, video-based imaging, and microphone recordings would be better suited for use in dementia patients. Since it does not require patient’s attention and compliance, such a system might be well accepted by patients. We present a passive, Web-based, non-intrusive, assistive technology system that recognizes and classifies ADL. Methods The components of this novel assistive technology system were wireless sensors distributed in every room of the participant’s home and a central computer unit (CCU). The environmental data were acquired for 20 days (per participant) and then stored and processed on the CCU. In consultation with medical experts, eight ADL were classified

  17. Neonatal Jaundice Detection System.

    PubMed

    Aydın, Mustafa; Hardalaç, Fırat; Ural, Berkan; Karap, Serhat

    2016-07-01

    Neonatal jaundice is a common condition that occurs in newborn infants in the first week of life. Today, techniques used for detection are required blood samples and other clinical testing with special equipment. The aim of this study is creating a non-invasive system to control and to detect the jaundice periodically and helping doctors for early diagnosis. In this work, first, a patient group which is consisted from jaundiced babies and a control group which is consisted from healthy babies are prepared, then between 24 and 48 h after birth, 40 jaundiced and 40 healthy newborns are chosen. Second, advanced image processing techniques are used on the images which are taken with a standard smartphone and the color calibration card. Segmentation, pixel similarity and white balancing methods are used as image processing techniques and RGB values and pixels' important information are obtained exactly. Third, during feature extraction stage, with using colormap transformations and feature calculation, comparisons are done in RGB plane between color change values and the 8-color calibration card which is specially designed. Finally, in the bilirubin level estimation stage, kNN and SVR machine learning regressions are used on the dataset which are obtained from feature extraction. At the end of the process, when the control group is based on for comparisons, jaundice is succesfully detected for 40 jaundiced infants and the success rate is 85 %. Obtained bilirubin estimation results are consisted with bilirubin results which are obtained from the standard blood test and the compliance rate is 85 %.

  18. Saltwater intrusion in the Floridan aquifer system near downtown Brunswick, Georgia, 1957–2015

    USGS Publications Warehouse

    Cherry, Gregory S.; Peck, Michael

    2017-02-16

    IntroductionThe Floridan aquifer system (FAS) consists of the Upper Floridan aquifer (UFA), an intervening confining unit of highly variable properties, and the Lower Floridan aquifer (LFA). The UFA and LFA are primarily composed of Paleocene- to Oligocene-age carbonate rocks that include, locally, Upper Cretaceous rocks. The FAS extends from coastal areas in southeastern South Carolina and continues southward and westward across the coastal plain of Georgia and Alabama, and underlies all of Florida. The thickness of the FAS varies from less than 100 feet (ft) in aquifer outcrop areas of South Carolina to about 1,700 ft near the city of Brunswick, Georgia.Locally, in southeastern Georgia and the Brunswick– Glynn County area, the UFA consists of an upper water-bearing zone (UWBZ) and a lower water-bearing zone (LWBZ), as identified by Wait and Gregg (1973), with aquifer test data indicating the upper zone has higher productivity than the lower zone. Near the city of Brunswick, the LFA is composed of two permeable zones: an early middle Eocene-age upper permeable zone (UPZ) and a highly permeable lower zone of limestone (LPZ) of Paleocene and Late Cretaceous age that includes a deeply buried, cavernous, saline water-bearing unit known as the Fernandina permeable zone. Maslia and Prowell (1990) inferred the presence of major northeast–southwest trending faults through the downtown Brunswick area based on structural analysis of geophysical data, northeastward elongation of the potentiometric surface of the UFA, and breaches in the local confining unit that influence the area of chloride contamination. Pronounced horizontal and vertical hydraulic head gradients, caused by pumping in the UFA, allow saline water from the FPZ to migrate upward into the UFA through this system of faults and conduits.Saltwater was first detected in the FAS in wells completed in the UFA near the southern part of the city of Brunswick in late 1957. By the 1970s, a plume of groundwater

  19. Photoelectric detection system

    NASA Astrophysics Data System (ADS)

    Currie, J. R.; Schansman, R. R.

    1982-03-01

    A photoelectric beam system for the detection of the arrival of an object at a discrete station wherein artificial light, natural light, or no light may be present is described. A signal generator turns on and off a signal light at a selected frequency. When the object in question arrives on station, ambient light is blocked by the object, and the light from the signal light is reflected onto a photoelectric sensor which has a delayed electrical output but is of the frequency of the signal light. Outputs from both the signal source and the photoelectric sensor are fed to inputs of an exclusively OR detector which provides as an output the difference between them. The difference signal is a small width pulse occurring at the frequency of the signal source. By filter means, this signal is distinguished from those responsive to sunlight, darkness, or 120 Hz artificial light. In this fashion, the presence of an object is positively established.

  20. Coupling of hydrogeological models with hydrogeophysical data to characterize seawater intrusion and shallow geothermal systems

    NASA Astrophysics Data System (ADS)

    Beaujean, J.; Kemna, A.; Engesgaard, P. K.; Hermans, T.; Vandenbohede, A.; Nguyen, F.

    2013-12-01

    While coastal aquifers are being stressed due to climate changes and excessive groundwater withdrawals require characterizing efficiently seawater intrusion (SWI) dynamics, production of geothermal energy is increasingly being used to hinder global warming. To study these issues, we need both robust measuring technologies and reliable predictions based on numerical models. SWI models are currently calibrated using borehole observations. Similarly, geothermal models depend mainly on the temperature field at few locations. Electrical resistivity tomography (ERT) can be used to improve these models given its high sensitivity to TDS and temperature and its relatively high lateral resolution. Inherent geophysical limitations, such as the resolution loss, can affect the overall quality of the ERT images and also prevent the correct recovery of the desired hydrochemical property. We present an uncoupled and coupled hydrogeophysical inversion to calibrate SWI and thermohydrogeologic models using ERT. In the SWI models, we demonstrate with two synthetic benchmarks (homogeneous and heterogeneous coastal aquifers) the ability of cumulative sensitivity-filtered ERT images using surface-only data to recover the hydraulic conductivity. Filtering of ERT-derived data at depth, where resolution is poorer, and the model errors make the dispersivity more difficult to estimate. In the coupled approach, we showed that parameter estimation is significantly improved because regularization bias is replaced by forward modeling only. Our efforts are currently focusing on applying the uncoupled/coupled approaches on a real life case study using field data from the site of Almeria, SE Spain. In the thermohydrogeologic models, the most sensitive hydrologic parameters responsible for heat transport are estimated from surface ERT-derived temperatures and ERT resistance data. A real life geothermal experiment that took place on the Campus De Sterre of Ghent University, Belgium and a synthetic

  1. Petroleum Vapor Intrusion

    EPA Pesticide Factsheets

    One type of vapor intrusion is PVI, in which vapors from petroleum hydrocarbons such as gasoline, diesel, or jet fuel enter a building. Intrusion of contaminant vapors into indoor spaces is of concern.

  2. A new classification of transient seawater intrusion

    NASA Astrophysics Data System (ADS)

    Werner, A. D.

    2016-12-01

    The understanding of seawater intrusion is based largely on generic studies of steady-state conditions, including modified forms of the Henry problem, which has been used to decipher coastal aquifer groundwater age distributions, density and dispersive controls, heterogeneity effects and the relevant scaling factors (dimensionless numbers). The understanding of transient seawater intrusion, from the same generic sense, is incomplete. Among the most fundamental classifications of transient seawater intrusion is the notion of active and passive seawater intrusion, used widely in the literature. Active seawater intrusion occurs when the head gradient at the shoreline slopes away from the sea, whereas passive seawater intruson occurs despite a head gradient sloping towards the shoreline. In this presentation, the attributes of active and passive seawater intrusion are firstly presented, in terms of differences in the mixing zone behaviour. This includes an assessment of watertable salinisation, which is rarely considered as a consequence of seawater intrusion. Application of the controlling dimensionless numbers, derived from previous steady-state studies, are then proposed. A third type of seawater intrusion class is then defined: passive-active seawater intrusion. In this case, the head gradient slopes towards the sea at the shoreline (and therefore would be considered passive seawater intrusion based on previous definitions), but at some landward location above the seawater wedge, the head gradient slopes inland, drawing seawater towards the groundwater sinks creating the condition. The situations of passive, active and passive-active seawater intrusion are each characteristically different, in terms of time-scales for salinisation, shape and width of the interface, and the key controlling factors. On the premise that seawater intrusion is, literally, a transient process, this study concludes that a new classification system is needed to contextuarilse seawater

  3. Some Features of Pressure Evolution in Systems “Non-Wetting Liquid - Nanoporous Medium” at Impact Intrusion

    NASA Astrophysics Data System (ADS)

    Byrkin, V. A.; Belogorlov, A. A.; Paryohin, D. A.; Mitrofanova, A. S.

    2017-04-01

    The last few decades systems consisting of nanoporous medium dispersed in a non-wetting liquid cause an increased interest from both the practical and theoretical points of view. Non-wetting liquid can infiltrate into the porous medium only with an excess pressure. Liquid infiltration tends to increase the solid-liquid interfacial energy and the absorbed energy is proportional to the specific surface area of the medium. Therefore this energy for nanoporous media can reach several orders of magnitude superior to traditional damping materials and shape-memory materials. As a consequence, the prospects of using devices based on systems consisting of a nanoporous medium immersed in a non-wetting liquid associated mainly with the absorption of mechanical energy of impact or explosion. The paper presents the results of experimental studies of impact intrusion the systems of industrially produced hydrophobic silicas Fluka 100 C8 and Fluka 100 C18 with distilled water. With increasing the impact energies nontrivial pattern of pressure changes in the system over time is observed.

  4. Coupled human-water system dynamics of saltwater intrusion in the low coastal plain of the Po River, Ravenna, Italy

    NASA Astrophysics Data System (ADS)

    Lauriola, Ilaria; Ciriello, Valentina; Antonellini, Marco; Pande, Saket

    2017-04-01

    Human activities affect the whole hydrological cycle with possible severe consequences on ecosystem services. Human-water interaction follows complex dynamics that can't be addressed only through the analysis of water withdrawals and contamination processes. As such, comprehensive analysis strategies based on a socio-hydrology approach may allow to deeply understand the co-evolution of human and water systems. Here, we focus on the low coastal plain of the Po river in the south of Ravenna (Italy), which is adjacent to the North Adriatic sea. In particular, our study regards a basin characterized by a land reclamation drainage system, given the low topography which reaches in some places 1 m below sea level. In this area, the thin phreatic coastal aquifer is affected by a relevant salinization process and characterized by the presence of valuable water-dependent ecosystems such as pine forests and wetlands. Groundwater salinization is mainly caused by seawater intrusion due to the hydraulic gradient landwards that is enhanced by land subsidence, land use and drainage allowing for agriculture and settlements. Such a complex scenario involves environmental, social and economic interests. We study the intricate system of relationships occurring between a set of socio-hydrological state variables of interest based on the dynamic analysis of land use changes in the study area that mainly affect groundwater recharge and the availability of freshwater for ecosystem and agriculture activities.

  5. Intelligent Leak Detection System

    SciTech Connect

    Mohaghegh, Shahab D.

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or near surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise

  6. Incipient fire detection system

    DOEpatents

    Brooks, Jr., William K.

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  7. Hydrodynamic behavior of the Cape Fear River and estuarine system: A synthesis and observational investigation of discharge-salinity intrusion relationships

    NASA Astrophysics Data System (ADS)

    Becker, May Ling; Luettich, Richard A., Jr.; Mallin, Michael A.

    2010-07-01

    Transport of constituents in partially mixed estuaries depends on the relative strengths of dominant forcing mechanisms which may include tides, river input, and wind. In this study, we investigated the major physical mechanisms that influence the salinity structure in the Cape Fear River Estuary (CFRE), a partially mixed estuary that is representative of river-dominated estuaries along the southeast Atlantic coast of the U.S. Based on analysis of observed hydrographic and hydrodynamic data, we first describe differences in velocity, salinity, and stratification at along-channel sections of the estuary for relatively low-flow conditions. We then investigate the influence of river inflow on the salinity intrusion (defined by the 1-salinity contour near the bottom), based on six methods of choosing discharge in order to identify an appropriate means of incorporating flow history into the discharge value. Our analyses indicate: 1) 92 percent of the variability in the length of the salinity intrusion over a five-year period can be explained based on the Hydrologic Flood Method identified in this work, 2) the salinity intrusion depends more weakly on discharge than predicted by classic analytical relationships for exchange-dominated systems in which the intrusion varies with discharge to the power of (-1/3), and 3) intra-tidal and tidal-range differences based on a 29-day modulation significantly influence the salinity structure. Our results suggest that the salinity intrusion location is dependent upon the hydrologic "flood," defined by a peak in the river-discharge hydrograph. The analysis indicates that the new method used to determine discharge in the CFRE can more accurately explain river inflow-salinity relationships than previously investigated methods. In river-estuary systems in which hydrologic flood peaks are large relative to base flow, we hypothesize the hydrologic flood model offers a useful tool for predicting the estuarine salinity response to river

  8. Potential effects of deepening the St. Johns River navigation channel on saltwater intrusion in the surficial aquifer system, Jacksonville, Florida

    USGS Publications Warehouse

    Bellino, Jason C.; Spechler, Rick M.

    2013-01-01

    The U.S. Army Corps of Engineers (USACE) has proposed dredging a 13-mile reach of the St. Johns River navigation channel in Jacksonville, Florida, deepening it to depths between 50 and 54 feet below North American Vertical Datum of 1988. The dredging operation will remove about 10 feet of sediments from the surficial aquifer system, including limestone in some locations. The limestone unit, which is in the lowermost part of the surficial aquifer system, supplies water to domestic wells in the Jacksonville area. Because of density-driven hydrodynamics of the St. Johns River, saline water from the Atlantic Ocean travels upstream as a saltwater “wedge” along the bottom of the channel, where the limestone is most likely to be exposed by the proposed dredging. A study was conducted to determine the potential effects of navigation channel deepening in the St. Johns River on salinity in the adjacent surficial aquifer system. Simulations were performed with each of four cross-sectional, variable-density groundwater-flow models, developed using SEAWAT, to simulate hypothetical changes in salinity in the surficial aquifer system as a result of dredging. The cross-sectional models were designed to incorporate a range of hydrogeologic conceptualizations to estimate the effect of uncertainty in hydrogeologic properties. The cross-sectional models developed in this study do not necessarily simulate actual projected conditions; instead, the models were used to examine the potential effects of deepening the navigation channel on saltwater intrusion in the surficial aquifer system under a range of plausible hypothetical conditions. Simulated results for modeled conditions indicate that dredging will have little to no effect on salinity variations in areas upstream of currently proposed dredging activities. Results also indicate little to no effect in any part of the surficial aquifer system along the cross section near River Mile 11 or in the water-table unit along the cross

  9. Impedance spectroscopy as a tool for non-intrusive detection of extracellular mediators in microbial fuel cells.

    PubMed

    Ramasamy, Ramaraja P; Gadhamshetty, Venkataramana; Nadeau, Lloyd J; Johnson, Glenn R

    2009-12-01

    Endogenously produced, diffusible redox mediators can act as electron shuttles for bacterial respiration. Accordingly, the mediators also serve a critical role in microbial fuel cells (MFCs), as they assist extracellular electron transfer from the bacteria to the anode serving as the intermediate electron sink. Electrochemical impedance spectroscopy (EIS) may be a valuable tool for evaluating the role of mediators in an operating MFC. EIS offers distinct advantages over some conventional analytical methods for the investigation of MFC systems because EIS can elucidate the electrochemical properties of various charge transfer processes in the bio-energetic pathway. Preliminary investigations of Shewanella oneidensis DSP10-based MFCs revealved that even low quantities of extracellular mediators significantly influence the impedance behavior of MFCs. EIS results also suggested that for the model MFC studied, electron transfer from the mediator to the anode may be up to 15 times faster than the electron transfer from bacteria to the mediator. When a simple carbonate membrane separated the anode and cathode chambers, the extracellular mediators were also detected at the cathode, indicating diffusion from the anode under open circuit conditions. The findings demonstrated that EIS can be used as a tool to indicate presence of extracellular redox mediators produced by microorganisms and their participation in extracellular electron shuttling.

  10. Acquisition of an Integrated System for Laser-Assisted Non-Intrusive Experimentation and Data-Driven Reduced-Order Modeling

    DTIC Science & Technology

    2015-05-13

    SECURITY CLASSIFICATION OF: New Mexico State University (NMSU) proposed acquisition of equipment to establish an integrated system for laser-assisted...New Mexico State University PO Box 30002, MSC OGC Anderson Hall E1200, Espina and Stewart Streets Las Cruces, NM 88003 -8002 31-Jan-2015 ABSTRACT...Integrated System for Laser-Assisted Non-Intrusive Experimentation and Data- Driven Reduced-Order Modeling Report Title New Mexico State University (NMSU

  11. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    USGS Publications Warehouse

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  12. Genetic relationship between deformation and low-Ca content in olivine from magmatic systems: evidence from the Poyi ultramafic intrusion, NW China

    NASA Astrophysics Data System (ADS)

    Yao, Zhuo-sen; Qin, Ke-zhang; Xue, Sheng-chao

    2017-03-01

    The deformation features (e.g., undulose extinction and subgrain boundaries) and low Ca content (<1000 ppm) of high-Fo olivine have been widely used as indictors for the mantle origin of olivine in the past. However, grains with these characteristics are also found in some crustal intrusions, e.g., Duke Island and Bushveld complexes. Here, we study this type of olivine in the Poyi ultramafic intrusion, NW China, to trace the formation of these unusual features in magmatic systems. As a result of the possible Ca-depleted parental melt and low Ca olivine/melt partition coefficient, olivine from the Poyi intrusion is extremely depleted in Ca. On the other hand, it has been confirmed that trace elements with large ionic radii (e.g., Ca2+ and Al3+) are chemically segregated at the grain boundary of olivine, exerting a dragging influence on grain boundary processes (named as solute drag effect). In this regard, the low Ca content in olivine weakens the solute drag effect, and in doing so it enhances the rate and strength of grain deformation, which occurs to accommodate the stress derived by fast compaction of the crystal mush in Poyi intrusion. Therefore, there is a genetic relationship between the plastic deformation and low Ca content in olivines from magmatic cumulates, and this link is one of the reasons causing the widespread deformation observed in Ca-depleted olivine from Poyi and other intrusions. What is more important, this work fills the gaps in the interpretation of this type of olivine in volcanic rocks.

  13. Analytical and Numerical Investigation of the Time-scale associated with Seawater Intrusion and Retreat in a Flux-controlled Coastal Aquifer System

    NASA Astrophysics Data System (ADS)

    Rathore, S.; Luo, J.; Zhao, Y.; Lu, C.

    2016-12-01

    Quantification of the time-scale associated with the movement of saltwater-freshwater interface is necessary for the development of efficient and effective controls of saltwater intrusion. This study presents a novel approach to understand the dynamics controlling the time-scale of saltwater intrusion and retreat. We derived an analytical solution for the time-scales of saltwater intrusion and retreat, for a flux-controlled coastal aquifer system, based on an implicit solution for the transient freshwater outflow into the sea. The simple analytical solution was able to produce the results comparable in trends of time-scale variation with the changing boundary to that obtained from the numerical simulations. We identify the flow continuity and the hydrostatic equilibrium across interface as the two processes primarily governing the time-scales. Our theoretical analyses demonstrate how different hydrogeological parameters and boundary conditions affect the above mentioned processes and subsequently control the time-scales. It was found that higher porosity, hydraulic conductivity or aquifer depth values results in longer time-scales. We quantify the temporal asymmetry in the saltwater intrusion and retreat, in the form of ratio of time-scale of interface-advance to interface-retreat, and found this ratio to be heavily dependent on changing boundary conditions and weakly influenced by aquifer parameters. The solution also has the potential to be used for the prediction purpose. The analytical nature of the solution enables us to conveniently incorporate seawater intrusion or retreat time-scale as an objective or constraint in a multi-objective optimization model for coastal aquifer management plans.

  14. Geochemical signature variation of pre-, syn-, and post-shearing intrusives within the Najd Fault System of western Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Hassan, M.; Abu-Alam, T. S.; Hauzenberger, C.; Stüwe, K.

    2016-10-01

    Late Precambrian intrusive rocks in the Arabian-Nubian Shield emplaced within and around the Najd Fault System of Saudi Arabia feature a great compositional diversity and a variety of degrees of deformation (i.e. pre-shearing deformed, sheared mylonitized, and post-shearing undeformed) that allows placing them into a relative time order. It is shown here that the degree of deformation is related to compositional variations where early, usually pre-shearing deformed rocks are of dioritic, tonalitic to granodioritic, and later, mainly post-shearing undeformed rocks are mostly of granitic composition. Correlation of the geochemical signature and time of emplacement is interpreted in terms of changes in the source region of the produced melts due to the change of the stress regime during the tectonic evolution of the Arabian-Nubian Shield. The magma of the pre-shearing rocks has tholeiitic and calc-alkaline affinity indicating island arc or continental arc affinity. In contrast, the syn- and post-shearing rocks are mainly potassium rich peraluminous granites which are typically associated with post-orogenic uplift and collapse. This variation in geochemical signature is interpreted to reflect the change of the tectonic regime from a compressional volcanic arc nature to extensional within-plate setting of the Arabian-Nubian Shield. Within the context of published geochronological data, this change is likely to have occurred around 605-580 Ma.

  15. Tree root intrusion in sewer systems: A review of extent and costs

    Treesearch

    T.B. Randrup; E.G. McPherson; L.R. Costello

    2001-01-01

    Interference between trees and sewer systems is likely to occur in old systems and in cracked pipes. Factors that contribute to damage include old pipes with joints, shallow pipes, small-dimension pipes, and fast-growing tree species. Because roots are reported to cause >50% of all sewer blockages, costs associated with root removal from sewers is substantial. In...

  16. Development of Real Time Non-Intrusive Load Monitor for Shipboard Fluid Systems

    DTIC Science & Technology

    2008-06-01

    Osmotic System (Operation and Maintenance Manual for USCG Model RC7000 Plus Reverse Osmosis Desalination Plant, 2007) ........................ 20...the RC7000 Reverse Osmosis Desalination Plant, used on United States Coast Guard (USCG) medium endurance cutters, in order to enhance the overall...Model RC7000 Plus Reverse Osmosis Desalination Plant, 2007) 2.2 RC7000 Plus System Description The RC7000 Plus produced by Village Marine is the RO

  17. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  18. Non-Intrusive Device for Real-Time Circulatory System Assessment with Advanced Signal Processing Capabilities

    NASA Astrophysics Data System (ADS)

    Pinheiro, E.; Postolache, O.; Girão, P.

    2010-01-01

    This paper presents a device that uses three cardiography signals to characterize several important parameters of a subject's circulatory system. Using electrocardiogram, finger photoplethysmogram, and ballistocardiogram, three heart rate estimates are acquired from beat-to-beat time interval extraction. Furthermore, pre-ejection period, pulse transit time (PTT), and pulse arrival time (PAT) are computed, and their long-term evolution is analyzed. The system estimates heart rate variability (HRV) and blood pressure variability (BPV) from the heart rate and PAT time series, to infer the activity of the cardiac autonomic system. The software component of the device evaluates the frequency content of HRV and BPV, and also their fractal dimension and entropy, thus providing a detailed analysis of the time series' regularity and complexity evolution, to allow personalized subject evaluation.

  19. Hand held explosives detection system

    DOEpatents

    Conrad, Frank J.

    1992-01-01

    The present invention is directed to a sensitive hand-held explosives detection device capable of detecting the presence of extremely low quantities of high explosives molecules, and which is applicable to sampling vapors from personnel, baggage, cargo, etc., as part of an explosives detection system.

  20. Ferret Workflow Anomaly Detection System

    DTIC Science & Technology

    2005-02-28

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure...completed to accomplish a goal. Anomaly detection is the determination that a condition departs from the expected. The baseline behavior from which the

  1. Optical FIBer Intrusion LOCation Sensor System (FIBLOC) for Surface and Subsurface Perimeter Protection. Phase 2

    DTIC Science & Technology

    1994-01-01

    of Management and Wudget. Paperwork Reduction Project (0704-0188). Weenington. DC 20503 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3. REPORT...of construction attempted to mimic widely- used cable manufacturing procedures. It became apparent that specialized tooling and equipment were...used in the FIBLOC system. 7 i§ mU Figure 2-2. Schematic of mirrored fiber with coupler. 2.5 FIBLOC CABLE FABRICATION. The tools used to fabricate the

  2. Antigen detection systems

    USDA-ARS?s Scientific Manuscript database

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  3. Antigen detection systems

    USDA-ARS?s Scientific Manuscript database

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissue using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular methodology is chosen ...

  4. Lunar igneous intrusions.

    PubMed

    El-Baz, F

    1970-01-02

    Photographs taken from Apollo 10 and 11 reveal a number of probable igneous intrusions, including three probable dikes that crosscut the wall and floor of an unnamed 75-kilometer crater on the lunar farside. These intrusions are distinguished by their setting, textures, structures, and brightness relative to the surrounding materials. Recognition of these probable igneous intrusions in the lunar highlands slupports the indications of the heterogeneity of lunar materials and the plausibility of intrusive igneous activity, in addition to extrusive volcanism, on the moon.

  5. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1- dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 ppbv, as cited in Method TO-15, to much lower concentrations. R...

  6. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1-dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 parts per billion by volume (ppbv), as cited in Method TO-15, to ...

  7. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1-dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 parts per billion by volume (ppbv), as cited in Method TO-15, to ...

  8. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1- dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 ppbv, as cited in Method TO-15, to much lower concentrations. R...

  9. Protein detection system

    DOEpatents

    Fruetel, Julie A [Livermore, CA; Fiechtner, Gregory J [Bethesda, MD; Kliner, Dahv A. V. [San Ramon, CA; McIlroy, Andrew [Livermore, CA

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  10. Particle detection systems and methods

    DOEpatents

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  11. Randomness fault detection system

    NASA Technical Reports Server (NTRS)

    Russell, B. Don (Inventor); Aucoin, B. Michael (Inventor); Benner, Carl L. (Inventor)

    1996-01-01

    A method and apparatus are provided for detecting a fault on a power line carrying a line parameter such as a load current. The apparatus monitors and analyzes the load current to obtain an energy value. The energy value is compared to a threshold value stored in a buffer. If the energy value is greater than the threshold value a counter is incremented. If the energy value is greater than a high value threshold or less than a low value threshold then a second counter is incremented. If the difference between two subsequent energy values is greater than a constant then a third counter is incremented. A fault signal is issued if the counter is greater than a counter limit value and either the second counter is greater than a second limit value or the third counter is greater than a third limit value.

  12. Heterogeneous VM Replication: A New Approach to Intrusion Detection, Active Response and Recovery in Cloud Data Centers

    DTIC Science & Technology

    2015-08-17

    Scientific Progress * System Call Redirection: A Practical Approach to Meeting Real-world Virtual Machine Introspection Needs Existing VMI ...we developed ShadowContext, a system for close-to- realtime manual-effort-free VMI . ShadowContext can meet several important real-world VMI needs...which existing VMI techniques cannot. Compared to other automatic introspection tool generation techniques, ShadowContext has two merits: (1) Its

  13. Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile ad hoc Networks

    DTIC Science & Technology

    2016-04-05

    measure the lifetime of a GCS system under security attacks. We use the control message traffic generated for secure group communication as the...settings such that the system MTTSF is maximized while the total control message traffic incurred is minimized in the GCS. Fig. 1 shows the structure of...shall demonstrate that integratedmanagement yields higherMTTSF while producing lower control message traffic compared with separate deployment of

  14. Thermal neutron detection system

    DOEpatents

    Peurrung, Anthony J.; Stromswold, David C.

    2000-01-01

    According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

  15. NORSAR Detection Processing System.

    DTIC Science & Technology

    1987-05-31

    systems have been reliable. NTA/Lillestrom and Hamar will take a new initiative medio April regarding 04C. The line will be remeasured and if a certain...estimate of the ambient noise level at the site of the FINESA array, ground motion spectra were calculated for four time intervals. Two intervals were

  16. Remote Voice Detection System

    DTIC Science & Technology

    2007-06-25

    back to the laser Doppler vibrometer and the digital camera, respectively. Mechanical beam steering mirror modules, such as galvanometer steering...mirror module 43 in accordance with this invention. An appropriate galvanometer -based tracker system has been used for tracking eye motion during laser

  17. Centrifugal unbalance detection system

    DOEpatents

    Cordaro, Joseph V.; Reeves, George; Mets, Michael

    2002-01-01

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  18. Power line detection system

    DOEpatents

    Latorre, Victor R.; Watwood, Donald B.

    1994-01-01

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

  19. Power line detection system

    DOEpatents

    Latorre, V.R.; Watwood, D.B.

    1994-09-27

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

  20. Radiation detection system

    DOEpatents

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  1. APDS: Autonomous Pathogen Detection System

    SciTech Connect

    Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

    2002-02-14

    An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

  2. Exploring Cumulates in Small, Shallow Parts of a Large Mafic Magma System to Provide Baseline Models for Crystallization in Larger Intrusions

    NASA Astrophysics Data System (ADS)

    Srogi, L.; Willis, K. V.; Lutz, T. M.; Plank, T. A.; Pollock, M.; Connolly, B.; Wood, A. M.

    2016-12-01

    Small, shallow portions of large magmatic systems cool more rapidly and potentially have less subsolidus overprinting than large mafic intrusions, but it is unclear whether they are small-scale analogs for the same crystallization processes. The Morgantown-Jacksonwald magmatic system (MJS), western Newark Basin, Pennsylvania, is part of the 201-Ma Central Atlantic Magmatic Province (CAMP) formed during Pangean rifting. The MJS consists of several interconnected intrusions exposed in cross-section from the Jacksonwald basalt at the paleosurface to 6 km depth (<0.2 GPa). Mg-rich orthopyroxene (opx) phenocrysts form crystal accumulations in some dikes and in basal and roof zones of sills in the MJS, in many CAMP intrusions, and in younger Ferrar dolerites, Antarctica. Some samples with opx phenocrysts have dm-scale modal layering. Despite ubiquitous occurrence, the opx is little-studied and our work tests most previous authors' assumption that opx was brought in from deeper intrusions. Opx cores with Mg/(Mg+Fe) of 80-77% yield mid-crustal pressures of 0.4-0.6 GPa (using method of Putirka, 2008). LA-ICPMS was used to obtain trace element concentrations in mm-size phenocrysts in a chill margin within 0.5m of the basal contact and cm-size phenocrysts from cumulate about 10m above. REE concentrations are similar in both samples: LREE-depleted cores (normalized La/Sm = 0.05-0.1); variably LREE-enriched rims; some negative Eu anomalies. REE patterns calculated for liquids in equilibrium with opx using published Kd values are roughly parallel to but significantly higher than REE in host chill margin diabase. CSDs of opx and matrix plagioclase from several samples within 10m of the basal contact will be used to evaluate models of crystal growth vs. mechanical sorting. Modes and mineral compositions are not consistent with MELTS fractionation models: opx crystallizes in place of pigeonite; pyroxenes are zoned in Ca not Fe-Mg; late-crystallizing quartz and K-feldspar are

  3. Diversified transmission multichannel detection system

    SciTech Connect

    Tournois, P.; Engelhard, P.

    1984-07-03

    A detection system for imaging by sonar or radar signals. The system associates diversified transmissions with an interferometric base. This base provides an angular channel formation means and each signal formed in this way is processed by matched filtering in a circuit containing copy signals characterizing the space coloring obtained by the diversified transmission means. The invention is particularly applicable to side or front looking detection sonars.

  4. Comparison and characterization of Android-based fall detection systems.

    PubMed

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  5. Comparison and Characterization of Android-Based Fall Detection Systems

    PubMed Central

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  6. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  7. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  8. A Generic Software Architecture for Deception-Based Intrusion Detection and Response Systems

    DTIC Science & Technology

    2003-03-01

    known as Aikido [37]. Michael et al. [2] proposed a high-level architecture for software decoys, shown in Figure II.3. The architecture is based on...14, no.3, pp. 54-62, 1999. [37] Westbrook, A., Ratti, O., Aikido and the Dynamic Sphere, Charles E. Tuttle Co., September 1994. [38] Ellison, R.J

  9. A Multi Agent System for Flow-Based Intrusion Detection Using Reputation and Evolutionary Computation

    DTIC Science & Technology

    2011-03-01

    effectiveness [116]: 12. Constants, parameters, numbers (e.g. subsidies, taxes, standards) 11. The sizes of buffers and other stabilizing stocks , relative to...their flows 10. The structure of material stocks and flows (such as transport networks, popu- lation age structures) 9. The lengths of delays...combination of evolutionary raw material–a highly variable stock of information from which to select possible patterns–and a means for experimentation

  10. Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions

    DTIC Science & Technology

    2002-03-01

    5-8 5.2. DSniff Attack Data Files . . . . . . . . . . . . . . . . . . . . . . . . 5-9 5.3. Run Time Comparisons...crosschecking in an attempt to determine its potential use and value in catching such attacks as the DSniff MitM attack addressed in Chapter V, and the “Land...as the DSniff MitM attack discussed in Chapter V might be missed by these versions as they simply compare the same fields when creating a gene

  11. Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster- Shafer Theory

    SciTech Connect

    Yu, Dong; Frincke, Deborah A.

    2005-03-01

    Extend Dempster-Shafer Theory of Evidence to include differential weightings of alerts drawn from multiple sources. The intent is to support automated (and manual) response to threat by producing more realistic confidence ratings for IDS alerts than is currently available.

  12. A Comparative Analysis of the Snort and Suricata Intrusion-Detection Systems

    DTIC Science & Technology

    2011-09-01

    TESTING .......................................................................................41 ANNEX 2 EXAMPLE PYTBULL REPORTS FOR SURICATA AND...Called the HTP library and developed independently for the Suricata project by Ivan Ristic, it is an advanced HTTP parser developed for Suricata and...III, we will introduce and describe our testing methodology for our comparison of Suricata and Snort. We will discuss the setup of our experiments

  13. Developing Network Situational Awareness through Visualizations of Fused Intrusion Detection System Alerts

    DTIC Science & Technology

    2008-06-01

    Phishing with Plug and Play Exploit. In this attack, the at- tacker sets up a website offering the visitor free “ porn ” if they sign up. The user is allowed... porn alert so its unclear at the moment if 100.20.3.127 is compromised and if so, how it is compromised because there are no other alerts at this time...unauthorized porn website. The investigation would conclude that the attacker at 51.251.22.183 used the information gained from the website to open an

  14. Hearing aid malfunction detection system

    NASA Technical Reports Server (NTRS)

    Kessinger, R. L. (Inventor)

    1977-01-01

    A malfunction detection system for detecting malfunctions in electrical signal processing circuits is disclosed. Malfunctions of a hearing aid in the form of frequency distortion and/or inadequate amplification by the hearing aid amplifier, as well as weakening of the hearing aid power supply are detectable. A test signal is generated and a timed switching circuit periodically applies the test signal to the input of the hearing aid amplifier in place of the input signal from the microphone. The resulting amplifier output is compared with the input test signal used as a reference signal. The hearing aid battery voltage is also periodically compared to a reference voltage. Deviations from the references beyond preset limits cause a warning system to operate.

  15. Optimal design of saltwater intrusion control systems by Global Interactive Response Surfaces: the Nauru island case study

    NASA Astrophysics Data System (ADS)

    Alberti, Luca; Oberto, Gabriele; Pianosi, Francesca; Castelletti, Andrea

    2013-04-01

    Infiltration galleries and scavenger wells are often constructed to prevent saltwater intrusion in coastal aquifers. The optimal design of these infrastructures can be framed as a multi-objective optimization problem balancing availability of fresh water supply and installation/operation costs. High fidelity simulation models of the flow and transport processes can be used to link design parameters (e.g. wells location, size and pumping rates) to objective functions. However, the incorporation of these simulation models within an optimization-based planning framework is not straightforward because of the computational requirements of the model itself and the computational limitations of the optimization algorithms. In this study we investigate the potential for the Global Interactive Response Surface (GIRS) methodology to overcome these technical limitations. The GIRS methodology is used to recursively build a non-dynamic emulator of the process-based simulation model that maps design options into objectives values and can be used in place of the original model to more quickly explore the design space. The approach is used to plan infrastructural interventions for controlling saltwater intrusion and ensuring sustainable groundwater supply for Nauru, a Pacific island republic in Micronesia. GIRS is used to emulate a SEAWAT density driven groundwater flow-and-transport simulation model. Results show the potential applicability of the proposed approach for optimal planning of coastal aquifers.

  16. Portable Microleak-Detection System

    NASA Technical Reports Server (NTRS)

    Rivers, H. Kevin; Sikora, Joseph G.; Sankaran, Sankara N.

    2007-01-01

    The figure schematically depicts a portable microleak-detection system that has been built especially for use in testing hydrogen tanks made of polymer-matrix composite materials. (As used here, microleak signifies a leak that is too small to be detectable by the simple soap-bubble technique.) The system can also be used to test for microleaks in tanks that are made of other materials and that contain gases other than hydrogen. Results of calibration tests have shown that measurement errors are less than 10 percent for leak rates ranging from 0.3 to 200 cm3/min. Like some other microleak-detection systems, this system includes a vacuum pump and associated plumbing for sampling the leaking gas, and a mass spectrometer for analyzing the molecular constituents of the gas. The system includes a flexible vacuum chamber that can be attached to the outer surface of a tank or other object of interest that is to be tested for leakage (hereafter denoted, simply, the test object). The gas used in a test can be the gas or vapor (e.g., hydrogen in the original application) to be contained by the test object. Alternatively, following common practice in leak testing, helium can be used as a test gas. In either case, the mass spectrometer can be used to verify that the gas measured by the system is the test gas rather than a different gas and, hence, that the leak is indeed from the test object.

  17. Semi autonomous mine detection system

    NASA Astrophysics Data System (ADS)

    Few, Doug; Versteeg, Roelof; Herman, Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude - from an autonomous robotic perspective - the rapid development and deployment of fieldable systems.

  18. Semi autonomous mine detection system

    SciTech Connect

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  19. Lateral intrusion and vertical inflation of sills in the Trachyte Mesa intrusion, Henry Mountains, Utah

    NASA Astrophysics Data System (ADS)

    Wilson, Penelope; McCaffrey, Ken; Wilson, Robert; Jarvis, Ian; Holdsworth, Robert

    2017-04-01

    . Significant observations include: • deformation structures commonly parallel intrusion margins and, in some cases, magma flow directions; • deformation styles vary according to local intrusion geometry; • in stacked sill-sheet systems, insights into the order of stacking may be determined through the analysis of associated, emplacement-related, deformation structures; • deformation structures can be used to establish the growth mechanism of sill sheets; • magma tends to preferentially exploit reverse faults that develop at the periphery of sill sheets, initiating sill climbing; normal faults inhibit sill climbing; • deformation structures and sill tip geometries vary depending on the host-rock lithology. Consequently, even in areas where intrusion outcrop is not available, these observations can be applied to infer underlying intrusion geometries.

  20. Tape Cassette Bacteria Detection System

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  1. Source and redox controls on metallogenic variations in intrusion-related ore systems, Tombstone-Tungsten Belt, Yukon Territory, Canada

    USGS Publications Warehouse

    Hart, C.J.R.; Mair, J.L.; Goldfarb, R.J.; Groves, D.I.

    2004-01-01

    The Tombstone, Mayo and Tungsten plutonic suites of granitic intrusions, collectively termed the Tombstone-Tungsten Belt, form three geographically, mineralogically, geochemically and metallogenically distinct plutonic suites. The granites (sensu lato) intruded the ancient North American continental margin of the northern Canadian Cordillera as part of a single magmatic episode in the mid-Cretaceous (96-90 Ma). The Tombstone Suite is alkalic, variably fractionated, slightly oxidised, contains magnetite and titanite, and has primary, but no xenocrystic, zircon. The Mayo Suite is sub-alkalic, metaluminous to weakly peraluminous, fractionated, but with early felsic and late mafic phases, moderately reduced with titanite dominant, and has xenocrystic zircon. The Tungsten Suite is peraluminous, entirely felsic, more highly fractionated, reduced with ilmenite dominant, and has abundant xenocrystic zircon. Each suite has a distinctive petrogenesis. The Tombstone Suite was derived from an enriched, previously depleted lithospheric mantle, the Tungsten Suite is from the continental crust including, but not dominated by, carbonaceous pelitic rocks, and the Mayo Suite is from a similar sedimentary crustal source, but is mixed with a distinct mafic component from an enriched mantle source. Each suite has a distinctive metallogeny that is related to the source and redox characteristics of the magma. The Tombstone Suite has a Au-Cu-Bi association that is characteristic of most oxidised and alkalic magmas, but also has associated, and enigmatic, U-Th-F mineralisation. The reduced Tungsten Suite intrusions are characterised by world-class tungsten skarn deposits with less significant Cu, Zn, Sn and Mo anomalies. The Mayo Suite intrusions are characteristically gold-enriched, with associated As, Bi, Te and W associations. All suites also have associated, but distal and lower temperature Ag-Pb-and Sb-rich mineral occurrences. Although processes such as fractionation, volatile

  2. Source and redox controls on metallogenic variations in intrusion-related ore systems, Tombstone-Tungsten Belt, Yukon Territory, Canada

    USGS Publications Warehouse

    Hart, C.J.R.; Mair, J.L.; Goldfarb, R.J.; Groves, D.I.

    2004-01-01

    The Tombstone, Mayo and Tungsten plutonic suites of granitic intrusions, collectively termed the Tombstone-Tungsten Belt, form three geographically, mineralogically, geochemically and metallogenically distinct plutonic suites. The granites (sensu lato) intruded the ancient North American continental margin of the northern Canadian Cordillera as part of a single magmatic episode in the mid-Cretaceous (96-90 Ma). The Tombstone Suite is alkalic, variably fractionated, slightly oxidised, contains magnetite and titanite, and has primary, but no xenocrystic, zircon. The Mayo Suite is sub-alkalic, metaluminous to weakly peraluminous, fractionated, but with early felsic and late mafic phases, moderately reduced with titanite dominant, and has xenocrystic zircon. The Tungsten Suite is peraluminous, entirely felsic, more highly fractionated, reduced with ilmenite dominant, and has abundant xenocrystic zircon. Each suite has a distinctive petrogenesis. The Tombstone Suite was derived from an enriched, previously depleted lithospheric mantle, the Tungsten Suite is from the continental crust including, but not dominated by, carbonaceous pelitic rocks, and the Mayo Suite is from a similar sedimentary crustal source, but is mixed with a distinct mafic component from an enriched mantle source. Each suite has a distinctive metallogeny that is related to the source and redox characteristics of the magma. The Tombstone Suite has a Au-Cu-Bi association that is characteristic of most oxidised and alkalic magmas, but also has associated, and enigmatic, U-Th-F mineralisation. The reduced Tungsten Suite intrusions are characterised by world-class tungsten skarn deposits with less significant Cu, Zn, Sn and Mo anomalies. The Mayo Suite intrusions are characteristically gold-enriched, with associated As, Bi, Te and W associations. All suites also have associated, but distal and lower temperature Ag-Pb- and Sb-rich mineral occurrences. Although processes such as fractionation, volatile

  3. Zircon Recycling in Arc Intrusions

    NASA Astrophysics Data System (ADS)

    Miller, J.; Barth, A.; Matzel, J.; Wooden, J.; Burgess, S.

    2008-12-01

    Recycling of zircon has been well established in arc intrusions and arc volcanoes, but a better understanding of where and how zircons are recycled can help illuminate how arc magma systems are constructed. To that end, we are conducting age, trace element (including Ti-in-zircon temperatures; TzrnTi) and isotopic studies of zircons from the Late Cretaceous (95-85 Ma) Tuolumne Intrusive Suite (TIS) in the Sierra Nevada Batholith (CA). Within the TIS zircons inherited from ancient basement sources and/or distinctly older host rocks are uncommon, but recycled zircon antecrysts from earlier periods of TIS-related magmatism are common and conspicuous in the inner and two most voluminous units of the TIS, the Half Dome and Cathedral Peak Granodiorites. All TIS units have low bulk Zr ([Zr]<150 ppm) and thus low calculated zircon saturation temperatures (Tzrnsat). Within the Half Dome and Cathedral Peak, TzrnTi values are predominantly at or below average Tzrnsat, and there is no apparent correlation between age and TzrnTi. At temperatures appropriate for granodiorite/tonalite melt generation (at or above biotite dehydration; >825°C), [Zr] in the TIS is a factor of 2 to 3 lower than saturation values. Low [Zr] in TIS rocks might be attributed to a very limited supply of zircon in the source, by disequilibrium melting and rapid melt extraction [1], by melting reactions involving formation of other phases that can incorporate appreciable Zr [2], or by removal of zircon at an earlier stage of magma evolution. Based on a preliminary compilation of literature data, low [Zr] is common to Late Cretaceous N.A. Cordilleran granodioritic/tonalitic intrusions (typically <200 ppm and frequently 100-150 ppm for individual large intrusions or intrusive suites). We infer from this that [Zr] in anatectic melts is probably not limited by zircon supply and is primarily controlled by melting parameters. Comparison of the data from TIS with one of these intrusions, the smaller but otherwise

  4. Blind Leak Detection for Closed Systems

    NASA Technical Reports Server (NTRS)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  5. Blind Leak Detection for Closed Systems

    NASA Technical Reports Server (NTRS)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  6. Lightning Protection and Detection System

    NASA Technical Reports Server (NTRS)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  7. Gastric Cancer Regional Detection System.

    PubMed

    Ural, Berkan; Hardalaç, Fırat; Serhatlioğlu, Selami; İlhan, Mustafa Necmi

    2016-01-01

    In this study, a novel system was created to localize cancerous regions for stomach images which were taken with computed tomography(CT). The aim was to determine the coordinates of cancerous regions which spread in the stomach area in the color space with using this system. Also, to limit these areas with a high accuracy ratio and to feedback to the user of this system were the other objectives. This integration was performed with using energy mapping, analysis methods and multiple image processing methods and the system which was consisted from these advanced algorithms was appeared. For this work, in the range of 25-40 years and when gender discrimination was insignificant, 30 volunteer patients were chosen. During the formation of the system, to exalt the accuracy to the maximum level, 2 main stages were followed up. First, in the system, advanced image processing methods were processed between each other and obtained data were studied. Second, in the system, FFT and Log transformations were used respectively for the first two cases, then these transformations were used together for the third case. For totally three cases, energy distribution and DC energy intensity analysis were done and the performance of this system was investigated. Finally, with using the system's unique algorithms, a non-invasive method was achieved to detect the gastric cancer and when FFT and Log transformation were used together, the maximum success rate was obtained and this rate was calculated as 83,3119 %.

  8. The Autonomous Pathogen Detection System

    SciTech Connect

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  9. Detecting transition in agricultural systems

    NASA Technical Reports Server (NTRS)

    Neary, P. J.; Coiner, J. C.

    1979-01-01

    Remote sensing of agricultural phenomena has been largely concentrated on analysis of agriculture at the field level. Concern has been to identify crop status, crop condition, and crop distribution, all of which are spatially analyzed on a field-by-field basis. A more general level of abstraction is the agricultural system, or the complex of crops and other land cover that differentiate various agricultural economies. The paper reports on a methodology to assist in the analysis of the landscape elements of agricultural systems with Landsat digital data. The methodology involves tracing periods of photosynthetic activity for a fixed area. Change from one agricultural system to another is detected through shifts in the intensity and periodicity of photosynthetic activity as recorded in the radiometric return to Landsat. The Landsat-derived radiometric indicator of photosynthetic activity appears to provide the ability to differentiate agricultural systems from each other as well as from conterminous natural vegetation.

  10. Detecting transition in agricultural systems

    NASA Technical Reports Server (NTRS)

    Neary, P. J.; Coiner, J. C.

    1979-01-01

    Remote sensing of agricultural phenomena has been largely concentrated on analysis of agriculture at the field level. Concern has been to identify crop status, crop condition, and crop distribution, all of which are spatially analyzed on a field-by-field basis. A more general level of abstraction is the agricultural system, or the complex of crops and other land cover that differentiate various agricultural economies. The paper reports on a methodology to assist in the analysis of the landscape elements of agricultural systems with Landsat digital data. The methodology involves tracing periods of photosynthetic activity for a fixed area. Change from one agricultural system to another is detected through shifts in the intensity and periodicity of photosynthetic activity as recorded in the radiometric return to Landsat. The Landsat-derived radiometric indicator of photosynthetic activity appears to provide the ability to differentiate agricultural systems from each other as well as from conterminous natural vegetation.

  11. Design of DroDeASys (Drowsy Detection and Alarming System)

    NASA Astrophysics Data System (ADS)

    Juvale, Hrishikesh B.; Mahajan, Anant S.; Bhagwat, Ashwin A.; Badiger, Vishal T.; Bhutkar, Ganesh D.; Dhabe, Priyadarshan S.; Dhore, Manikrao L.

    The paper discusses the Drowsy Detection & Alarming System that has been developed, using a non-intrusive approach. The system is basically developed to detect drivers dozing at the wheel at night time driving. The system uses a small infra-red night vision camera that points directly towards the driver`s face and monitors the driver`s eyes in order to detect fatigue. In such a case when fatigue is detected, a warning signal is issued to alert the driver. This paper discusses the algorithms that have been used to detect drowsiness. The decision whether the driver is dozing or not is taken depending on whether the eyes are open for a specific number of frames. If the eyes are found to be closed for a certain number of consecutive frames then the driver is alerted with an alarm.

  12. Mafic intrusions triggering eruptions in Iceland

    NASA Astrophysics Data System (ADS)

    Sigmarsson, O.

    2012-04-01

    The last two eruptions in Iceland, Eyjafjallajökull 2010 and Grímsvötn 2011, were both provoked by an intrusion of more mafic magma into pre-existing magmatic system. Injection into the latter volcano, which is located in the main rift-zone of the island, above the presumed centre of the mantle plume and is the most active volcano of Iceland, has been gradual since the last eruption in 2004. In contrast, at Eyjafjallajökull volcano, one of the least active volcano in Iceland and located at the southern part of a propagating rift-zone where extensional tectonics are poorly developed, mafic magma intrusion occurred over less than a year. Beneath Eyjafjallajökull, a silicic intrusion at approximately 6 km depth was recharged with mantle derived alkali basalt that was injected into residual rhyolite from the penultimate eruption in the years 1821-23. The resulting magma mingIing process was highly complex, but careful sampling of tephra during the entire eruption allows the dynamics of the mingling process to be unravelled. Short-lived disequilibria between the gaseous nuclide 210Po and the much less volatile nuclide 210Pb, suggest that basalt accumulated beneath the silicic intrusion over approximately 100 days, or from early January 2010 until the onset of the explosive summit eruption on 14 April. Due to the degassing, crystal fractionation modified the composition of the injected mafic magma producing evolved Fe-and Ti-rich basalt, similar in composition to that of the nearby Katla volcano. This evolved basalt was intruded into the liquid part of the silicic intrusion only a few hours before the onset of the explosive summit eruption. The short time between intrusion and eruption led to the production of very heterogeneous (of basaltic, intermediate and silicic composition) and fine-grained tephra during the first days of explosive eruption. The fine grained tephra resulted from combined effects of magma fragmentation due to degassing of stiff magma rich in

  13. Nucleic acid detection system and method for detecting influenza

    DOEpatents

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  14. Compensated intruder-detection systems

    DOEpatents

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  15. Capillary Electrophoresis - Optical Detection Systems

    SciTech Connect

    Sepaniak, M. J.

    2001-08-06

    Molecular recognition systems are developed via molecular modeling and synthesis to enhance separation performance in capillary electrophoresis and optical detection methods for capillary electrophoresis. The underpinning theme of our work is the rational design and development of molecular recognition systems in chemical separations and analysis. There have been, however, some subtle and exciting shifts in our research paradigm during this period. Specifically, we have moved from mostly separations research to a good balance between separations and spectroscopic detection for separations. This shift is based on our perception that the pressing research challenges and needs in capillary electrophoresis and electrokinetic chromatography relate to the persistent detection and flow rate reproducibility limitations of these techniques (see page 1 of the accompanying Renewal Application for further discussion). In most of our work molecular recognition reagents are employed to provide selectivity and enhance performance. Also, an emerging trend is the use of these reagents with specially-prepared nano-scale materials. Although not part of our DOE BES-supported work, the modeling and synthesis of new receptors has indirectly supported the development of novel microcantilevers-based MEMS for the sensing of vapor and liquid phase analytes. This fortuitous overlap is briefly covered in this report. Several of the more significant publications that have resulted from our work are appended. To facilitate brevity we refer to these publications liberally in this progress report. Reference is also made to very recent work in the Background and Preliminary Studies Section of the Renewal Application.

  16. An arc fault detection system

    SciTech Connect

    Jha, Kamal N.

    1997-12-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn, opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  17. Ionization detection system for aerosols

    DOEpatents

    Jacobs, Martin E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber.

  18. Fish detection and classification system

    NASA Astrophysics Data System (ADS)

    Tidd, Richard A.; Wilder, Joseph

    2001-01-01

    Marine biologists traditionally determine the presence and quantities of different types of fish by dragging nets across the bottom, and examining their contents. This method, although accurate, kills the collected fish, damages their habitat, and consumes large quantities of resources. This paper presents an alternative, a machine vision system capable of determining the presence of fish species. Illumination presents a unique problem in this environment, and the design of an effective illumination system is discussed. The related issues of object orientation and measurement are also discussed and resolved. Capturing images of fish in murky water also presents challenges. An adaptive thresholding technique is required to appropriately segment the fish from the background in these images. Mode detection, and histogram analysis are useful tools in determining these localized thresholds. It is anticipated that this system, created in conjunction with the Rutgers Institute for Marine and Coastal Science, will effectively classify fish in the estuarine environment.

  19. Evaluating sensitivity of complex electrical methods for monitoring CO2 intrusion into a shallow groundwater system and associated geochemical transformations

    NASA Astrophysics Data System (ADS)

    Dafflon, B.; Wu, Y.; Hubbard, S. S.; Birkholzer, J. T.; Daley, T. M.; Pugh, J. D.; Peterson, J.; Trautz, R. C.

    2011-12-01

    A risk factor of CO2 storage in deep geological formations includes its potential to leak into shallow formations and impact groundwater geochemistry and quality. In particular, CO2 decreases groundwater pH, which can potentially mobilize naturally occurring trace metals and ions commonly absorbed to or contained in sediments. Here, geophysical studies (primarily complex electrical method) are being carried out at both laboratory and field scales to evaluate the sensitivity of geophysical methods for monitoring dissolved CO2 distribution and geochemical transformations that may impact water quality. Our research is performed in association with a field test that is exploring the effects of dissolved CO2 intrusion on groundwater geochemistry. Laboratory experiments using site sediments (silica sand and some fraction of clay minerals) and groundwater were initially conducted under field relevant CO2 partial pressures (pCO2). A significant pH drop was observed with inline sensors with concurrent changes in fluid conductivity caused by CO2 dissolution. Electrical resistivity and electrical phase responses correlated well with the CO2 dissolution process at various pCO2. Specifically, resistivity decreased initially at low pCO2 condition resulting from CO2 dissolution followed by a slight rebound because of the transition of bicarbonate into non-dissociated carbonic acid at lower pH slightly reducing the total concentration of dissociated species. Continuous electrical phase decreases were also observed, which are interpreted to be driven by the decrease of surface charge density (due to the decrease of pH, which approaches the PZC of the sediments). In general, laboratory experiments revealed the sensitivity of electrical signals to CO2 intrusion into groundwater formations and can be used to guide field data interpretation. Cross well complex electrical data are currently being collected periodically throughout a field experiment involving the controlled release of

  20. Autonomous pathogen detection system 2001

    SciTech Connect

    Langlois, R G; Wang, A; Colston, B; Masquelier, D; Jones, L; Venkateswaran, K S; Nasarabadi, S; Brown, S; Ramponi, A; Milanovich, F P

    2001-01-09

    The objective of this project is to design, fabricate and field-demonstrate a fully Autonomous Pathogen Detector (identifier) System (APDS). This will be accomplished by integrating a proven flow cytometer and real-time polymerase chain reaction (PCR) detector with sample collection, sample preparation and fluidics to provide a compact, autonomously operating instrument capable of simultaneously detecting multiple pathogens and/or toxins. The APDS will be designed to operate in fixed locations, where it continuously monitors air samples and automatically reports the presence of specific biological agents. The APDS will utilize both multiplex immuno and nucleic acid assays to provide ''quasi-orthogonal'', multiple agent detection approaches to minimize false positives and increase the reliability of identification. Technical advancements across several fronts must first be made in order to realize the full extent of the APDS. Commercialization will be accomplished through three progressive generations of instruments. The APDS is targeted for domestic applications in which (1) the public is at high risk of exposure to covert releases of bioagent such as in major subway systems and other transportation terminals, large office complexes, and convention centers; and (2) as part of a monitoring network of sensors integrated with command and control systems for wide area monitoring of urban areas and major gatherings (e.g., inaugurations, Olympics, etc.). In this latter application there is potential that a fully developed APDS could add value to Defense Department monitoring architectures.

  1. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  2. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, Roswitha S.; Todd, Richard A.

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  3. Optical fibre gas detections systems

    NASA Astrophysics Data System (ADS)

    Culshaw, Brian

    2016-05-01

    This tutorial review covers the principles of and prospects for fibre optic sensor technology in gas detection. Many of the potential benefits common to fibre sensor technology also apply in the context of gas sensing - notably long distance - many km - access to multiple remote measurement points; invariably intrinsic safety; access to numerous important gas species and often uniquely high levels of selectivity and/or sensitivity. Furthermore, the range of fibre sensor network architectures - single point, multiple point and distributed - enable unprecedented flexibility in system implementation. Additionally, competitive technologies and regulatory issues contribute to final application potential.

  4. Definition and means of maintaining the process vacuum liquid detection interlock systems portion of the PFP safety envelope

    SciTech Connect

    Thomas, R.J.

    1997-01-02

    The Process Vacuum Liquid Detection interlock systems prevent intrusion of process liquids into the HEPA filters downstream of demisters {number_sign}6 and {number_sign}7 during Process Vacuum System operation. This prevents liquid intrusion into the filters which could cause a criticality. The Safety Envelope (SE) includes the equipment which detects the presence of liquids in the vacuum headers; isolates the filters; shuts down the vacuum pumps; and alarms the condition. The presence of liquid in the HC-4, HC-7, and HC-227S glovebox vacuum traps or a high level of liquid in the 236-Z Tank 50 will isolate these portions of the vacuum system from the main headers. This report identifies the equipment in the SE; operating, maintenance, and surveillance procedures needed to maintain the SE equipment; and rationale for exclusion of some equipment and testing from the SE.

  5. Acoustic leak-detection system for railroad transportation security

    NASA Astrophysics Data System (ADS)

    Womble, P. C.; Spadaro, J.; Harrison, M. A.; Barzilov, A.; Harper, D.; Hopper, L.; Houchins, E.; Lemoff, B.; Martin, R.; McGrath, C.; Moore, R.; Novikov, I.; Paschal, J.; Rogers, S.

    2007-04-01

    Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. These gases, once released in the atmosphere, can wreak havoc with the environment and local populations. We developed a system which can non-intrusively and non-invasively detect and locate pinhole-sized leaks in pressurized rail tank cars using acoustic sensors. The sound waves from a leak are produced by turbulence from the gas leaking to the atmosphere. For example, a 500 μm hole in an air tank pressurized to 689 kPa produces a broad audio frequency spectrum with a peak near 40 kHz. This signal is detectable at 10 meters with a sound pressure level of 25 dB. We are able to locate a leak source using triangulation techniques. The prototype of the system consists of a network of acoustic sensors and is located approximately 10 meters from the center of the rail-line. The prototype has two types of acoustic sensors, each with different narrow frequency response band: 40 kHz and 80 kHz. The prototype is connected to the Internet using WiFi (802.11g) transceiver and can be remotely operated from anywhere in the world. The paper discusses the construction, operation and performance of the system.

  6. Infrared trace element detection system

    DOEpatents

    Bien, Fritz; Bernstein, Lawrence S.; Matthew, Michael W.

    1988-01-01

    An infrared trace element detection system including an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined.

  7. Infrared trace element detection system

    DOEpatents

    Bien, F.; Bernstein, L.S.; Matthew, M.W.

    1988-11-15

    An infrared trace element detection system includes an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined. 11 figs.

  8. Assessment of Mitigation Systems on Vapor Intrusion: Temporal Trends, Attenuation Factors, and Contaminant Migration Routes under Mitigated and Non-mitigated Conditions

    EPA Science Inventory

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor ...

  9. Assessment of Mitigation Systems on Vapor Intrusion: Temporal Trends, Attenuation Factors, and Contaminant Migration Routes under Mitigated and Non-mitigated Conditions

    EPA Science Inventory

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor ...

  10. Explosives detection system and method

    DOEpatents

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  11. The impact of river water intrusion on trace metal cycling in karst aquifers: an example from the Floridan aquifer system at Madison Blue Spring, Florida

    NASA Astrophysics Data System (ADS)

    Brown, A. L.; Martin, J. B.; Screaton, E.; Spellman, P.; Gulley, J.

    2011-12-01

    Springs located adjacent to rivers can serve as recharge points for aquifers when allogenic runoff increases river stage above the hydraulic head of the spring, forcing river water into the spring vent. Depending on relative compositions of the recharged water and groundwater, the recharged river water could be a source of dissolved trace metals to the aquifer, could mobilize solid phases such as metal oxide coatings, or both. Whether metals are mobilized or precipitated should depend on changes in redox and pH conditions as dissolved oxygen and organic carbon react following intrusion of the river water. To assess how river intrusion events affect metal cycling in springs, we monitored a small recharge event in April 2011 into Madison Blue Spring, which discharges to the Withlacoochee River in north-central Florida. Madison Blue Spring is the entrance to a phreatic cave system that includes over 7.8 km of surveyed conduits. During the event, river stage increased over base flow conditions for approximately 25 days by a maximum of 8%. Intrusion of the river water was monitored with conductivity, temperature and depth sensors that were installed within the cave system and adjacent wells. Decreased specific conductivity within the cave system occurred for approximately 20 days, reflecting the length of time that river water was present in the cave system. During this time, grab samples were collected seven times over a period of 34 days for measurements of major ion and trace metal concentrations at the spring vent and at Martz sink, a karst window connected to the conduit system approximately 150 meters from the spring vent. Relative fractions of surface water and groundwater were estimated based on Cl concentrations of the samples, assuming conservative two end-member mixing during the event. This mixing model indicates that maximum river water contribution to the groundwater system was approximately 20%. River water had concentrations of iron, manganese, and other

  12. Recent advances in microfluidic detection systems

    PubMed Central

    Baker, Christopher A; Duong, Cindy T; Grimley, Alix; Roper, Michael G

    2009-01-01

    There are numerous detection methods available for methods are being put to use for detection on these miniaturized systems, with the analyte of interest driving the choice of detection method. In this article, we summarize microfluidic 2 years. More focus is given to unconventional approaches to detection routes and novel strategies for performing high-sensitivity detection. PMID:20414455

  13. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  14. A Portable Infrasonic Detection System

    NASA Technical Reports Server (NTRS)

    Shams, Qamar A.; Burkett, Cecil G.; Zuckerwar, Allan J.; Lawrenson, Christopher C.; Masterman, Michael

    2008-01-01

    During last couple of years, NASA Langley has designed and developed a portable infrasonic detection system which can be used to make useful infrasound measurements at a location where it was not possible previously. The system comprises an electret condenser microphone, having a 3-inch membrane diameter, and a small, compact windscreen. Electret-based technology offers the lowest possible background noise, because Johnson noise generated in the supporting electronics (preamplifier) is minimized. The microphone features a high membrane compliance with a large backchamber volume, a prepolarized backplane and a high impedance preamplifier located inside the backchamber. The windscreen, based on the high transmission coefficient of infrasound through matter, is made of a material having a low acoustic impedance and sufficiently thick wall to insure structural stability. Close-cell polyurethane foam has been found to serve the purpose well. In the proposed test, test parameters will be sensitivity, background noise, signal fidelity (harmonic distortion), and temporal stability. The design and results of the compact system, based upon laboratory and field experiments, will be presented.

  15. A 3D imaging system for the non-intrusive in-flight measurement of the deformation of an aircraft propeller and a helicopter rotor

    NASA Astrophysics Data System (ADS)

    Stasicki, Bolesław; Boden, Fritz; Ludwikowski, Krzysztof

    2017-02-01

    The non-intrusive in-flight deformation measurement and the resulting local pitch of an aircraft propeller or helicopter rotor blade is a demanding task. The idea of an imaging system integrated and rotating with the air-craft propeller has already been presented at the 30th International Congress on High-Speed Imaging and Photonics (ICHSIP30) in 2012. Since then this system has been designed, constructed and tested in the laboratory as well as in-flight on the Cobra VUT100 of Evektor Aerotechnik, Kunovice (CZ). The major aim of the EU FP7 project AIM2 ("Advanced In-flight Measurement techniques 2" - contract No. 266107) was to ascertain the feasibility of this technique under extreme conditions - vibration and large centrifugal forces - to real flight testing. Based on the gained experience a new rotating system for the application on helicopter rotors has recently been constructed and tested on the whirl tower of Airbus Helicopters, Donauwoerth (D). In this paper the principle of the applied Image Pattern Correlation Technique (IPCT), a specialized type of Digital Image Correlation (DIC), is outlined and the construction of both rotating 3D image acquisition systems dedicated to the in-flight deformation measurement of the aircraft propeller and helicopter rotor are described. Furthermore, the results of the ground and in-flight tests of these systems will be shown and discussed. The obtained results will be helpful for manufacturers in the design of their future aircrafts.

  16. Planetary system detection by POINTS

    NASA Technical Reports Server (NTRS)

    Reasenberg, Robert D.

    1993-01-01

    The final report and semiannual reports 1, 2, and 3 in response to the study of 'Planetary System Detection by POINTS' is presented. The grant covered the period from 15 Jun. 1988 through 31 Dec. 1989. The work during that period comprised the further development and refinement of the POINTS concept. The status of the POINTS development at the end of the Grant period was described by Reasenberg in a paper given at the JPL Workshop on Space Interferometry, 12-13 Mar. 1990, and distributed as CfA Preprint 3138. That paper, 'POINTS: a Small Astrometric Interferometer,' follows as Appendix-A. Our proposal P2276-7-09, dated July 1990, included a more detailed description of the state of the development of POINTS at the end of the tenure of Grant NAGW-1355. That proposal, which resulted in Grant NAGW-2497, is included by reference.

  17. Photoelectric detection system. [manufacturing automation

    NASA Technical Reports Server (NTRS)

    Currie, J. R.; Schansman, R. R. (Inventor)

    1982-01-01

    A photoelectric beam system for the detection of the arrival of an object at a discrete station wherein artificial light, natural light, or no light may be present is described. A signal generator turns on and off a signal light at a selected frequency. When the object in question arrives on station, ambient light is blocked by the object, and the light from the signal light is reflected onto a photoelectric sensor which has a delayed electrical output but is of the frequency of the signal light. Outputs from both the signal source and the photoelectric sensor are fed to inputs of an exclusively OR detector which provides as an output the difference between them. The difference signal is a small width pulse occurring at the frequency of the signal source. By filter means, this signal is distinguished from those responsive to sunlight, darkness, or 120 Hz artificial light. In this fashion, the presence of an object is positively established.

  18. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  19. Boiling and condensation of saline geothermal fluids above magmatic intrusions

    NASA Astrophysics Data System (ADS)

    Scott, Samuel; Driesner, Thomas; Weis, Philipp

    2017-02-01

    Numerical simulation of subaerial, magma-driven, saline hydrothermal systems reveals that fluid phase separation near the intrusion is a first-order control on the dynamics and efficiency of heat and mass transfer. Above shallow intrusions emplaced at <2.5 km depth, phase separation through boiling of saline liquid leads to accumulation of low-mobility hypersaline brines and halite precipitation, thereby reducing the efficiency of heat and mass transfer. Above deeper intrusions (>4 km), where fluid pressure is >30 MPa, phase separation occurs by condensation of hypersaline brine from a saline intermediate-density fluid. The fraction of brine remains small, and advective, vapor-dominated mass and heat fluxes are maximized. We thus hypothesize that, in contrast to pure water systems, for which shallow intrusions make better targets for supercritical resource exploitation, the optimal targets in saline systems are located above deeper intrusions.

  20. Convective, intrusive geothermal plays: what about tectonics?

    NASA Astrophysics Data System (ADS)

    Santilano, A.; Manzella, A.; Gianelli, G.; Donato, A.; Gola, G.; Nardini, I.; Trumpy, E.; Botteghi, S.

    2015-09-01

    We revised the concept of convective, intrusive geothermal plays, considering that the tectonic setting is not, in our opinion, a discriminant parameter suitable for a classification. We analysed and compared four case studies: (i) Larderello (Italy), (ii) Mt Amiata (Italy), (iii) The Geysers (USA) and (iv) Kizildere (Turkey). The tectonic settings of these geothermal systems are different and a matter of debate, so it is hard to use this parameter, and the results of classification are ambiguous. We suggest a classification based on the age and nature of the heat source and the related hydrothermal circulation. Finally we propose to distinguish the convective geothermal plays as volcanic, young intrusive and amagmatic.

  1. Vulnerbility of production wells in the Potomac-Raritan-Magothy aquifer system to saltwater intrusion from the Delaware River in Camden, Gloucester, and Salem Counties, New Jersey

    USGS Publications Warehouse

    Navoy, Anthony S.; Voronin, Lois M.; Modica, Edward

    2005-01-01

    The Potomac-Raritan-Magothy aquifer system is hydraulically connected to the Delaware River in parts of Camden and Gloucester Counties, New Jersey, and has more limited contact with the river in Salem County, New Jersey. The aquifer system is used widely for water supply, and 122 production wells that are permitted by the New Jersey Department of Environmental Protection to pump more than 100,000 gallons per year in the three counties are within 2 miles of the river. During drought, saltwater may encroach upstream from the Atlantic Ocean and Delaware Bay to areas where the aquifer system is recharged by induced infiltration through the Delaware River streambed. During the drought of the mid-1960's, water with a chloride concentration in excess of potability standards (250 mg/L (milligrams per liter)) encroached into the reach of the river that recharges the aquifer system. The vulnerability of the major production wells in the area to similar saltwater encroachment in the future is a concern to water managers. This vulnerability was evaluated by investigating two scenarios: (1) a one-time recurrence of the conditions approximating those that occurred in the1960's, and (2) the recurrence of those same conditions on an annual basis. Results of ground-water-flow simulation in conjunction with particle tracking and one-dimensional transport analysis indicate that the wells that are most vulnerable to saltwater intrusion are those in the Morris and Delair well fields in Camden County. A single 30-day event during which the concentration of dissolved chloride or sodium exceeds 2,098 mg/L or 407 mg/L, respectively, in the Delaware River would threaten the potability of water from these wells, given New Jersey drinking-water standards of 250 mg/L for dissolved chloride and 50 mg/L for dissolved sodium. This chloride concentration is about six times that observed in the river during the 1960's drought. An annually occurring 1-month event during which the concentrations of

  2. Non-intrusive speed sensor

    NASA Technical Reports Server (NTRS)

    Wyett, L.

    1986-01-01

    In Phase I of the Non-Intrusive Speed Sensor program, a computerized literature search was performed to identify candidate technologies for remote, non-intrusive speed sensing applications in Space Shuttle Main Engine (SSME) turbopumps. The three most promising technologies were subjected to experimental evaluation to quantify their performance characteristics under the harsh environmental requirements within the turbopumps. Although the infrared and microwave approaches demonstrated excellent cavitation immunity in laboratory tests, the variable-source magnetic speed sensor emerged as the most viable approach. Preliminary design of this speed sensor encountered no technical obstacles and resulted in viable and feasible speed nut, sensor housing, and sensor coil designs. Phase II of this program developed the variable-source magnetic speed sensor through the detailed design task and guided the design into breadboard fabrication. The speed sensor and its integral speed nut were evaluated at both unit and system level testing. The final room-temperature and cryogenic spin testing of the hardware demonstrated that the sensor was capable of generating sufficient output signal to enable remote speed sensing from 1500 to 40000 rpm over a speed nut/sensor separation of 3.5 inches.

  3. Generalized Detectability for Discrete Event Systems

    PubMed Central

    Shu, Shaolong; Lin, Feng

    2011-01-01

    In our previous work, we investigated detectability of discrete event systems, which is defined as the ability to determine the current and subsequent states of a system based on observation. For different applications, we defined four types of detectabilities: (weak) detectability, strong detectability, (weak) periodic detectability, and strong periodic detectability. In this paper, we extend our results in three aspects. (1) We extend detectability from deterministic systems to nondeterministic systems. Such a generalization is necessary because there are many systems that need to be modeled as nondeterministic discrete event systems. (2) We develop polynomial algorithms to check strong detectability. The previous algorithms are based on observer whose construction is of exponential complexity, while the new algorithms are based on a new automaton called detector. (3) We extend detectability to D-detectability. While detectability requires determining the exact state of a system, D-detectability relaxes this requirement by asking only to distinguish certain pairs of states. With these extensions, the theory on detectability of discrete event systems becomes more applicable in solving many practical problems. PMID:21691432

  4. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  5. Detection of Abrupt Changes in Dynamic Systems,

    DTIC Science & Technology

    1984-01-01

    the detection of abrupt chnages in dynamic systems. These efforts have been motivated by a wide variety of applications includinq the detection of...34Failure Detection in Dynimic Systems," AGARD Lecture Series No. 109 on Fault Tolerance Design and Redundancy Management Technqiues, Athens, Rome, and

  6. Detection and handling of occlusion in an object detection system

    NASA Astrophysics Data System (ADS)

    Op het Veld, R. M. G.; Wijnhoven, R. G. J.; Bondarev, Y.; de With, Peter H. N.

    2015-03-01

    Object detection is an important technique for video surveillance applications. Although different detection algorithms were proposed, they all have problems in detecting occluded objects. In this paper, we propose a novel system for occlusion handling and integrate this in a sliding-window detection framework using HOG features and linear classification. The occlusion handling is obtained by applying multiple classifiers, each covering a different level of occlusion and focusing on the non-occluded object parts. Experiments show that our approach based on 17 classifiers, obtains an increase of 8% in detection performance. To limit computational complexity, we propose a cascaded implementation that only increases the computational cost by 3.4%. Although the paper presents results for pedestrian detection, our approach is not limited to this object class. Finally, our system does not need an additional dataset for training, covering all possible types of occlusions.

  7. Damage-detection system for LNG carriers

    NASA Technical Reports Server (NTRS)

    Mastandrea, J. R.; Scherb, M. V.

    1978-01-01

    System utilizes array of acoustical transducers to detect cracks and leaks in liquefied natural gas (LNG) containers onboard ships. In addition to detecting leaks, device indicates location and leak rate.

  8. Magma rheology variation in sheet intrusions (Invited)

    NASA Astrophysics Data System (ADS)

    Magee, C.; O'Driscoll, B.; Petronis, M. S.; Stevenson, C.

    2013-12-01

    The rheology of magma fundamentally controls igneous intrusion style as well as the explosivity and type of volcanic eruptions. Importantly, the dynamic interplay between the viscosity of magma and other processes active during intrusion (e.g., crystallisation, magma mixing, assimilation of crystal mushes and/or xenolith entrainment) will likely bear an influence on the temporal variation of magma rheology. Constraining the timing of rheological changes during magma transit therefore plays an important role in understanding the nuances of volcanic systems. However, the rheological evolution of actively emplacing igneous intrusions cannot be directly studied. While significant advances have been made via experimental modelling and analysis of lava flows, how these findings relate to intruding magma remains unclear. This has led to an increasing number of studies that analyse various characteristics of fully crystallised intrusions in an attempt to ';back-out' the rheological conditions governing emplacement. For example, it has long been known that crystallinity affects the rheology and, consequently, the velocity of intruding magma. This means that quantitative textural analysis of crystal populations (e.g., crystal size distribution; CSD) used to elucidate crystallinity at different stages of emplacement can provide insights into magma rheology. Similarly, methods that measure flow-related fabrics (e.g., anisotropy of magnetic susceptibility; AMS) can be used to discern velocity profiles, a potential proxy for the magma rheology. To illustrate these ideas, we present an integrated AMS and petrological study of several sheet intrusions located within the Ardnamurchan Central Complex, NW Scotland. We focus on the entrainment and transport dynamics of gabbroic inclusions that were infiltrated by the host magma upon entrainment. Importantly, groundmass magnetic fabrics within and external to these inclusions are coaxial. This implies that a deviatoric stress was

  9. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  10. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  11. Scientific drilling to study the roots of active hydrothermal systems related to young magmatic intrusions. [Abstract only

    SciTech Connect

    Muffler, L.J.P.

    1983-03-01

    At present, hydrothermal-magma processes can be studied only inferentially, using observations on hot springs and volcanic rocks, data from shallow- and intermediate-depth drill holes, analogies with exhumed fossil systems, and extrapolation of laboratory investigations. The Thermal Regimes Panel of the Continental Scientific Drilling Committee in a draft report concludes that an understanding of active hydrothermal-magma systems requires drill-hole investigations of deeper and hotter levels than have been drilled and studied to date. The Panel groups hydrothermal-magma systems in the United States into five classes: (1) dominantly andesitic centers, (2) spreading ridges, (3) basaltic fields, (4) evolved basaltic centers, and (5) silicic caldera complexes. Application of eight scientific criteria and three social criteria leads to the conclusion that silicic caldera complexes should be the first target of a focused drilling program to investigate the hydrothermal-magma interface at depths of 5 to 7 km. Primary targets are the three young, silicic caldera systems in the western conterminous United States: Yellowstone (Wyoming), Valles (New Mexico), and Long Valley (California). Scientific drilling of these active hydrothermal-magma systems complements scientific drilling proposed for fossil systems such as Creede (Colorado). In addition, the roots of the Salton Sea geothermal system (California) present an opportunity for add-on deep drilling and scientific experiments to supplement geothermal drilling by industry in this active spreading-ridge environment.

  12. Continuous monitoring of residual chlorine concentrations in response to controlled microbial intrusions in a laboratory-scale distribution system.

    PubMed

    Helbling, Damian E; Vanbriesen, Jeanne M

    2008-06-01

    The objective of this work was to evaluate the efficacy of deploying free chlorine sensors as surrogate monitors for bacterial contamination events in drinking water distribution systems. An on-line sensor integral with a laboratory-scale distribution system (LDS) was shown to respond rapidly to changes in residual free chlorine concentrations induced by injected loads of Escherichia coli suspended in a chlorine demand free buffer. The magnitude of the residual response was proportional to the injected cell concentration, the background free chlorine concentration in the LDS, and the contact time between the chlorine residual and the injected suspension, consistent with previous results in batch reactors. The magnitude of the residual response was predicted when kinetic models developed from reaction kinetics between free chlorine and E. coli determined in batch systems were evaluated at contact times determined from LDS hydraulics. This result highlights the suitability of using batch kinetics when modeling contaminant-induced chlorine decay in the distribution system. Modeling the propagation of chlorine demand signals generated by specific pathogens could aid in the assessment of distribution system vulnerability.

  13. Development of an in-line filter to prevent intrusion of NO2 toxic vapors into A/C systems

    NASA Technical Reports Server (NTRS)

    Meneghelli, Barry; Mcnulty, R. J.; Springer, Mike; Lueck, Dale E.

    1995-01-01

    The hypergolic propellant nitrogen tetroxide (N2O4 or NTO) is routinely used in spacecraft launched at Kennedy Space Center (KSC) and Cape Canaveral Air Station (CCAS). In the case of a catastrophic failure of the spacecraft, there would be a release of the unspent propellant in the form of a toxic cloud. Inhalation of this material at downwind concentrations which may be as high as 20 parts per million (ppm) for 30 minutes in duration, may produce irritation to the eyes, nose and respiratory tract. Studies at both KSC and CCAS have shown that the indoor concentrations of N2O4 during a toxic release may range from 1 to 15 ppm and depend on the air change rate (ACR) for a particular building and whether or not the air conditioning (A/C) system has been shut down or left in an operating mode. This project was initiated in order to assess how current A/C systems could be easily modified to prevent personnel from being exposed to toxic vapors. A sample system has been constructed to test the ability of several types of filter material to capture the N2O4 vapors prior to their infiltration into the A/C system. Test results will be presented which compare the efficiencies of standard A/C filters, water wash systems, and chemically impregnated filter material in taking toxic vapors out of the incoming air stream.

  14. Discriminating ultrasonic proximity detection system

    DOEpatents

    Annala, Wayne C.

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  15. Flowthrough Bacteria-Detection System

    NASA Technical Reports Server (NTRS)

    Grana, D. C.; Wilkins, J. R.

    1983-01-01

    Online system allows repetitive cycling of sample intake, bacteria counting and sterilization. System measures bacteria count by using sample/incubate/ measure cycle. Steps in cycle are on/off operations to cycle automated easily.

  16. Expandable coating cocoon leak detection system

    NASA Technical Reports Server (NTRS)

    Hauser, R. L.; Kochansky, M. C.

    1972-01-01

    Development of system and materials for detecting leaks in cocoon protective coatings are discussed. Method of applying materials for leak determination is presented. Pressurization of system following application of materials will cause formation of bubble if leak exists.

  17. Airborne change detection system for the detection of route mines

    NASA Astrophysics Data System (ADS)

    Donzelli, Thomas P.; Jackson, Larry; Yeshnik, Mark; Petty, Thomas E.

    2003-09-01

    The US Army is interested in technologies that will enable it to maintain the free flow of traffic along routes such as Main Supply Routes (MSRs). Mines emplaced in the road by enemy forces under cover of darkness represent a major threat to maintaining a rapid Operational Tempo (OPTEMPO) along such routes. One technique that shows promise for detecting enemy mining activity is Airborne Change Detection, which allows an operator to detect suspicious day-to-day changes in and around the road that may be indicative of enemy mining. This paper presents an Airborne Change Detection that is currently under development at the US Army Night Vision and Electronic Sensors Directorate (NVESD). The system has been tested using a longwave infrared (LWIR) sensor on a vertical take-off and landing unmanned aerial vehicle (VTOL UAV) and a midwave infrared (MWIR) sensor on a fixed wing aircraft. The system is described and results of the various tests conducted to date are presented.

  18. Toward detecting deception in intelligent systems

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Johnson, Gregory, Jr.

    2004-08-01

    Contemporary decision makers often must choose a course of action using knowledge from several sources. Knowledge may be provided from many diverse sources including electronic sources such as knowledge-based diagnostic or decision support systems or through data mining techniques. As the decision maker becomes more dependent on these electronic information sources, detecting deceptive information from these sources becomes vital to making a correct, or at least more informed, decision. This applies to unintentional disinformation as well as intentional misinformation. Our ongoing research focuses on employing models of deception and deception detection from the fields of psychology and cognitive science to these systems as well as implementing deception detection algorithms for probabilistic intelligent systems. The deception detection algorithms are used to detect, classify and correct attempts at deception. Algorithms for detecting unexpected information rely upon a prediction algorithm from the collaborative filtering domain to predict agent responses in a multi-agent system.

  19. Forward Obstacle Detection System by Stereo Vision

    NASA Astrophysics Data System (ADS)

    Iwata, Hiroaki; Saneyoshi, Keiji

    Forward obstacle detection is needed to prevent car accidents. We have developed forward obstacle detection system which has good detectability and the accuracy of distance only by using stereo vision. The system runs in real time by using a stereo processing system based on a Field-Programmable Gate Array (FPGA). Road surfaces are detected and the space to drive can be limited. A smoothing filter is also used. Owing to these, the accuracy of distance is improved. In the experiments, this system could detect forward obstacles 100 m away. Its error of distance up to 80 m was less than 1.5 m. It could immediately detect cutting-in objects.

  20. Real-time distributed fiber optic sensor for security systems: Performance, event classification and nuisance mitigation

    NASA Astrophysics Data System (ADS)

    Mahmoud, Seedahmed S.; Visagathilagar, Yuvaraja; Katsifolis, Jim

    2012-09-01

    The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100 mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.

  1. Hydrogen Fire Detection System Features Sharp Discrimination

    NASA Technical Reports Server (NTRS)

    Bright, C. S.

    1966-01-01

    Hydrogen fire detection system discovers fires by detecting the flickering ultraviolet radiation emitted by the OH molecule, a short-lived intermediate combustion product found in hydrogen-air flames. In a space application, the system discriminates against false signals from sunlight and rocket engine exhaust plume radiation.

  2. Environmentally Adaptive UXO Detection and Classification Systems

    DTIC Science & Technology

    2016-04-01

    data used in this study. 3 Environmentally Adaptive UXO Detection and Classification Systems 1 Abstract This final report addresses the problem of...FINAL REPORT Environmentally Adaptive UXO Detection and Classification Systems SERDP Project MR-2417 APRIL 2016 Dr. Nick Klausner Information...Defense Strategic Environmental Research and Development Program (SERDP). The publication of this report does not indicate endorsement by the

  3. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  4. A national drilling program to study the roots of active hydrothermal systems related to young magmatic intrusions

    SciTech Connect

    Not Available

    1984-01-01

    The importance of studies of active hydrothermal-magma systems as part of a national continental scientific drilling program has been emphasized in numerous workshops and symposia. The present report, prepared by the Panel on Thermal Regimes of the Continental Scientific Drilling Committee, both reinforces and expands on earlier recommendations. The US Geodynamics Committee 1979 report of the Los Almos workshop, Continental Scientific Drilling Program, placed major emphasis on maximizing the scientific value of current and planned drilling by industry and government, supplementing these efforts with holes drilled solely for scientific purposes. Although the present report notes the importance of opportunities for scientific investigations that may be added on to current, mission-oriented drilling activities, the Panel on Thermal Regimes recognizes that such opportunities are limited and thus focused its study on holes dedicated to broad scientific objectives. 16 refs., 2 figs., 4 tabs.

  5. Influence of seawater intrusion on microbial communities in groundwater.

    PubMed

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics.

  6. Deep Water Munitions Detection System

    DTIC Science & Technology

    2010-03-01

    UXO unexploded ordnance GPS global positioning system MTA marine towed array TG towed gradiometer Mag magnetic nT nanotesla rms root mean square...other sites were used which had been surveyed with Geometrics Towed Gradiometer (TG) systems. In both of the gradiometer based surveys the data from...the individual magnetometers that made up the gradiometer were available. Magnetic anomalies from each site were reanalyzed to produce uniform target

  7. Protection of children in forward-facing child restraint systems during oblique side impact sled tests: Intrusion and tether effects.

    PubMed

    Hauschild, Hans W; Humm, John R; Pintar, Frank A; Yoganandan, Narayan; Kaufman, Bruce; Kim, Jinyong; Maltese, Matthew R; Arbogast, Kristy B

    2016-09-01

    Testing was conducted to quantify the kinematics, potential for head impact, and influence on head injury metrics for a center-seated Q3s in a forward-facing child restraint system (FFCRS) in oblique impacts. The influences of a tether and intruded door on these measures were explored. Nine lateral oblique sled tests were conducted on a convertible forward-facing child restraint seat (FFCRS). The FFCRSs were secured to a bench seat from a popular production small SUV at the center seating position utilizing the lower anchor and tether for children (LATCH). The vehicle seat was fixed on the sled carriage at 60° and 80° from full frontal (30° and 10° forward rotation from pure lateral) providing an oblique lateral acceleration to the Q3s and FFCRS. A structure simulating an intruded door was mounted to the near (left) side of vehicle seat. The sled input acceleration was the proposed FMVSS 213 lateral pulse scaled to a 35 km/h delta-V. Tests were conducted with and without the tether attached to the FFCRS. Results indicate the influence of the tether on kinematics and injury measures in oblique side impact crashes for a center- or far-side-seated child occupant. All tests without a tether resulted in head contact with the simulated door, and 2 tests at the less oblique angle (80°) with a tether also resulted in head contact. No head-to-door contact was observed in 2 tests utilizing a tether. High-speed video analysis showed that the head moved beyond the CRS head side wings and made contact with the simulated intruded door. Head injury criterion (HIC) 15 median values were 589 without the tether vs. 332 with the tether attached. Tests utilizing a tether had less lateral head excursion than tests without a tether (median 400 vs. 442 mm). These tests demonstrate the important role of the tether in controlling head excursion for center- or far-side-seated child occupants in oblique side impact crashes and limiting the head injury potential with an intruded door

  8. Seismic Interpretation of Igneous Intrusions and Their Implications for an Unconventional Petroleum System in Southeastern Parnaiba Basin, Northeastern Brazil.

    NASA Astrophysics Data System (ADS)

    Porto, A. L.; Pereira, E.

    2014-12-01

    After almost two decades of little exploratory effort in the Parnaiba Basin, recent gas discoveries have revived the economic interest in this region. A new exploratory play was successfully tested, confirming the efficiency of the igneous sills triggering the thermal effect on source rocks maturation, and also playing an important role as unconventional trap and seal. Parnaiba Basin was affected by two magmatic events: the Mosquito Formation (Average Age: 178 Ma) and the Sardinha Formation (Average Age: 124 Ma), both characterized by basic magmatic rocks. Ten 2D seismic lines, located in the southeastern Parnaiba Basin, were systematically interpreted in order to identify the main diabase sills geometry, some possible emplacement controls and further implications for an unconventional petroleum system. The identified sills were classified in three types: A, B, and C, according to their dominant geometries and the stratigraphic position of their host rocks. From base to top, Type A sills intrude the Pre-Silurian Sequence, that fills in graben structures of the basement. They have short lateral continuity and saucer-shaped geometry. The main graben faults seem to control the steeper sills, which seem to feed upper sills. Type B sills intrude mainly the Silurian Sequence and have a very long lateral continuity when intruding the shales of Tiangua Formation, in which they are mainly horizontal tabular. Type C sills intrude the top of the Devonian Sequence and have two main geometries: saucer-shaped and horizontal tabular. By correlation to the surface geology of the area, Type C sills are interpreted as Sardinha Formation (Lower Cretaceous). Considering an unconventional hydrocarbon play in the area, some potential trap features associated with sill geometry, were identified, using analogous plays successfully tested in recent discoveries. These traps are associated to a specific sill geometry locally known as "inverted saucer-shaped sill". This shape consists into a

  9. Inertial navigation sensor integrated obstacle detection system

    NASA Technical Reports Server (NTRS)

    Bhanu, Bir (Inventor); Roberts, Barry A. (Inventor)

    1992-01-01

    A system that incorporates inertial sensor information into optical flow computations to detect obstacles and to provide alternative navigational paths free from obstacles. The system is a maximally passive obstacle detection system that makes selective use of an active sensor. The active detection typically utilizes a laser. Passive sensor suite includes binocular stereo, motion stereo and variable fields-of-view. Optical flow computations involve extraction, derotation and matching of interest points from sequential frames of imagery, for range interpolation of the sensed scene, which in turn provides obstacle information for purposes of safe navigation.

  10. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  11. Gas intrusion into SPR caverns

    SciTech Connect

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T.; Giles, H.N.

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  12. On Deadlock Detection in Distributed Computing Systems.

    DTIC Science & Technology

    1983-04-01

    With the advent of distributed computing systems, the problem of deadlock, which has been essentially solved for centralized computing systems, has...reappeared. Existing centralized deadlock detection techniques are either too expensive or they do not work correctly in distributed computing systems

  13. Data fusion to develop a driver drowsiness detection system with robustness to signal loss.

    PubMed

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-09-25

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs.

  14. Data Fusion to Develop a Driver Drowsiness Detection System with Robustness to Signal Loss

    PubMed Central

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-01-01

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs. PMID:25256113

  15. Intrusive multi-probe system

    SciTech Connect

    Green, R.A.; Hester, L.R.; Bouchillon, C.W.

    1995-02-01

    The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

  16. Multisensor cargo bay fire detection system

    NASA Astrophysics Data System (ADS)

    Snyder, Brian L.; Anderson, Kaare J.; Renken, Christopher H.; Socha, David M.; Miller, Mark S.

    2004-08-01

    Current aircraft cargo bay fire detection systems are generally based on smoke detection. Smoke detectors in modern aircraft are predominately photoelectric particle detectors that reliably detect smoke, but also detect dust, fog, and most other small particles. False alarms caused by these contaminants can be very costly to the airlines because they can cause flights to be diverted needlessly. To minimize these expenses, a new approach to cargo bay fire detection is needed. This paper describes a novel fire detection system developed by the Goodrich Advanced Sensors Technical Center. The system uses multiple sensors of different technologies to provide a way of discriminating between real fire events and false triggers. The system uses infrared imaging along with multiple, distributed chemical sensors and smoke detectors, all feeding data to a digital signal processor. The processor merges data from the chemical sensors, smoke detectors, and processed images to determine if a fire (or potential fire) is present. Decision algorithms look at all this data in real-time and make the final decision about whether a fire is present. In the paper, we present a short background of the problem we are solving, the reasons for choosing the technologies used, the design of the system, the signal processing methods and results from extensive system testing. We will also show that multiple sensing technologies are crucial to reducing false alarms in such systems.

  17. Identifying seawater intrusion in coastal areas by means of 1D and quasi-2D joint inversion of TDEM and VES data

    NASA Astrophysics Data System (ADS)

    Martínez-Moreno, F. J.; Monteiro-Santos, F. A.; Bernardo, I.; Farzamian, M.; Nascimento, C.; Fernandes, J.; Casal, B.; Ribeiro, J. A.

    2017-09-01

    Seawater intrusion is an increasingly widespread problem in coastal aquifers caused by climate changes -sea-level rise, extreme phenomena like flooding and droughts- and groundwater depletion near to the coastline. To evaluate and mitigate the environmental risks of this phenomenon it is necessary to characterize the coastal aquifer and the salt intrusion. Geophysical methods are the most appropriate tool to address these researches. Among all geophysical techniques, electrical methods are able to detect seawater intrusions due to the high resistivity contrast between saltwater, freshwater and geological layers. The combination of two or more geophysical methods is recommended and they are more efficient when both data are inverted jointly because the final model encompasses the physical properties measured for each methods. In this investigation, joint inversion of vertical electric and time domain soundings has been performed to examine seawater intrusion in an area within the Ferragudo-Albufeira aquifer system (Algarve, South of Portugal). For this purpose two profiles combining electrical resistivity tomography (ERT) and time domain electromagnetic (TDEM) methods were measured and the results were compared with the information obtained from exploration drilling. Three different inversions have been carried out: single inversion of the ERT and TDEM data, 1D joint inversion and quasi-2D joint inversion. Single inversion results identify seawater intrusion, although the sedimentary layers detected in exploration drilling were not well differentiated. The models obtained with 1D joint inversion improve the previous inversion due to better detection of sedimentary layer and the seawater intrusion appear to be better defined. Finally, the quasi-2D joint inversion reveals a more realistic shape of the seawater intrusion and it is able to distinguish more sedimentary layers recognised in the exploration drilling. This study demonstrates that the quasi-2D joint

  18. RADIATION DETECTING AND TELEMETERING SYSTEM

    DOEpatents

    Richards, H.K.

    1959-12-15

    A system is presented for measuring ionizing radiation at several remote stations and transmitting the measured information by radio to a central station. At each remote station a signal proportioned to the counting rate is applied across an electrical condenser made of ferroelectric material. The voltage across the condenser will vary as a function of the incident radiation and the capacitance of the condenser will vary accordingly. This change in capacitance is used to change the frequency of a crystalcontrolled oscillator. The output of the oscillator is coupled to an antenna for transmitting a signal proportional to the incident radiation.

  19. Fail-safe fire detection system

    NASA Technical Reports Server (NTRS)

    Bloam, E. T.

    1974-01-01

    Fire detection control system continually monitors its own integrity, automatically signals any malfunction, and separately signals fire in any zone being monitored. Should be of interest in fields of chemical and petroleum processing, power generation, equipment testing, and building protection.

  20. Computer systems for automatic earthquake detection

    USGS Publications Warehouse

    Stewart, S.W.

    1974-01-01

    U.S Geological Survey seismologists in Menlo park, California, are utilizing the speed, reliability, and efficiency of minicomputers to monitor seismograph stations and to automatically detect earthquakes. An earthquake detection computer system, believed to be the only one of its kind in operation, automatically reports about 90 percent of all local earthquakes recorded by a network of over 100 central California seismograph stations. The system also monitors the stations for signs of malfunction or abnormal operation. Before the automatic system was put in operation, all of the earthquakes recorded had to be detected by manually searching the records, a time-consuming process. With the automatic detection system, the stations are efficiently monitored continuously.