Science.gov

Sample records for intrusion detection system

  1. Interior intrusion detection systems

    SciTech Connect

    Rodriguez, J.R.; Matter, J.C. ); Dry, B. )

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  2. Bro Intrusion Detection System

    SciTech Connect

    Paxson, Vern; Campbell, Scott; leres, Craig; Lee, Jason

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or access to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.

  3. Bro Intrusion Detection System

    2006-01-25

    Bro is a Unix-based Network Intrusion Detection System (IDS). Bro monitors network traffic and detects intrusion attempts based on the traffic characteristics and content. Bro detects intrusions by comparing network traffic against rules describing events that are deemed troublesome. These rules might describe activities (e.g., certain hosts connecting to certain services), what activities are worth alerting (e.g., attempts to a given number of different hosts constitutes a "scan"), or signatures describing known attacks or accessmore » to known vulnerabilities. If Bro detects something of interest, it can be instructed to either issue a log entry or initiate the execution of an operating system command. Bro targets high-speed (Gbps), high-volume intrusion detection. By judiciously leveraging packet filtering techniques, Bro is able to achieve the performance necessary to do so while running on commercially available PC hardware, and thus can serve as a cost effective means of monitoring a site’s Internet connection.« less

  4. Rapid deployment intrusion detection system

    SciTech Connect

    Graham, R.H.

    1997-08-01

    A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs.

  5. Association rule mining in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Zhao, Dong; Lu, Yan-sheng

    2004-04-01

    In a modern computer system, intrusion detection has become an essential and critical component. Data mining generally refers to the process of extracting models from large stores of data. The intrusion detection system first apply data mining programs to audit data to compute frequent patterns, extract features, and then use classification algorithms to compute detection models. The most important step of this process is to determine relations between fields in the database records to construct features. The standard association rules have not enough expressiveness. Intrusion detection system can extract the association rule with negations and with varying support thresholds to get better performance rather than extract the standard association rule.

  6. A system for distributed intrusion detection

    SciTech Connect

    Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. . Div. of Computer Science); Grance, T. ); Mansur, D.L.; Pon, K.L. ); Smaha, S.E. )

    1991-01-01

    The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

  7. Research on IPv6 intrusion detection system Snort-based

    NASA Astrophysics Data System (ADS)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  8. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    SciTech Connect

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  9. Characterizing and Improving Distributed Intrusion Detection Systems.

    SciTech Connect

    Hurd, Steven A; Proebstel, Elliot P.

    2007-11-01

    Due to ever-increasing quantities of information traversing networks, network administrators are developing greater reliance upon statistically sampled packet information as the source for their intrusion detection systems (IDS). Our research is aimed at understanding IDS performance when statistical packet sampling is used. Using the Snort IDS and a variety of data sets, we compared IDS results when an entire data set is used to the results when a statistically sampled subset of the data set is used. Generally speaking, IDS performance with statistically sampled information was shown to drop considerably even under fairly high sampling rates (such as 1:5). Characterizing and Improving Distributed Intrusion Detection Systems4AcknowledgementsThe authors wish to extend our gratitude to Matt Bishop and Chen-Nee Chuah of UC Davis for their guidance and support on this work. Our thanks are also extended to Jianning Mai of UC Davis and Tao Ye of Sprint Advanced Technology Labs for their generous assistance.We would also like to acknowledge our dataset sources, CRAWDAD and CAIDA, without which this work would not have been possible. Support for OC48 data collection is provided by DARPA, NSF, DHS, Cisco and CAIDA members.

  10. The architecture of a network level intrusion detection system

    SciTech Connect

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M.

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  11. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  12. Intrusion Detection in Control Systems using Sequence Characteristics

    NASA Astrophysics Data System (ADS)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  13. An expert system application for network intrusion detection

    SciTech Connect

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  14. Configurable Middleware-Level Intrusion Detection for Embedded Systems

    SciTech Connect

    Naess, Eivind; Frincke, Deborah A.; McKinnon, A. D.; Bakken, David E.

    2005-06-20

    Embedded systems have become integral parts of a diverse range of systems from automobiles to critical infrastructure applications such as gas and electric power distribution. Unfortunately, research on computer security in general and intrusion detection in particular, has not kept pace. Furthermore, embedded systems, by their very nature, are application specific and therefore frameworks for developing application-specific intrusion detection systems for distributed embedded systems must be researched, designed, and implemented. In this paper, we present a configurable middleware-based intrusion detection framework. In particular, this paper presents a system model and a concrete implementation of a highly configurable intrusion detection framework that is integrated into MicroQoSCORBA, a highly configurable middleware framework developed for embedded systems. By exploiting the application-specific logic available to a middleware framework (e.g., object interfaces and method signatures), our integrated framework is able to autogenerate application-specific intrusion detection systems. Next, a set of configurable intrusion detection mechanisms suitable for embedded systems is presented. A performance evaluation of these mechanisms, run on two hardware platforms, is presented at the end of the paper.

  15. Distributed intrusion detection system based on fuzzy rules

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Su, Jie; Liu, Yahui

    2006-04-01

    Computational Intelligence is the theory and method solving problems by simulating the intelligence of human using computer and it is the development of Artificial Intelligence. Fuzzy Technique is one of the most important theories of computational Intelligence. Genetic Fuzzy Technique and Neuro-Fuzzy Technique are the combination of Fuzzy Technique and novel techniques. This paper gives a distributed intrusion detection system based on fuzzy rules that has the characters of distributed parallel processing, self-organization, self-learning and self-adaptation by the using of Neuro-Fuzzy Technique and Genetic Fuzzy Technique. Specially, fuzzy decision technique can be used to reduce false detection. The results of the simulation experiment show that this intrusion detection system model has the characteristics of distributed, error tolerance, dynamic learning, and adaptation. It solves the problem of low identifying rate to new attacks and hidden attacks. The false detection rate is low. This approach is efficient to the distributed intrusion detection.

  16. Anomaly-based intrusion detection for SCADA systems

    SciTech Connect

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-07-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  17. Enterprise network intrusion detection and prevention system (ENIDPS)

    NASA Astrophysics Data System (ADS)

    Akujuobi, C. M.; Ampah, N. K.

    2007-04-01

    Securing enterprise networks comes under two broad topics: Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). The right combination of selected algorithms/techniques under both topics produces better security for a given network. This approach leads to using layers of physical, administrative, electronic, and encrypted systems to protect valuable resources. So far, there is no algorithm, which guarantees absolute protection for a given network from intruders. Intrusion Prevention Systems like IPSec, Firewall, Sender ID, Domain Keys Identified Mail (DKIM) etc. do not guarantee absolute security just like existing Intrusion Detection Systems. Our approach focuses on developing an IDS, which will detect all intruders that bypass the IPS and at the same time will be used in updating the IPS, since the IPS fail to prevent some intruders from entering a given network. The new IDS will employ both signature-based detection and anomaly detection as its analysis strategy. It should therefore be able to detect known and unknown intruders or attacks and further isolate those sources of attack within the network. Both real-time and off-line IDS predictions will be applied under the analysis and response stages. The basic IDS architecture will involve both centralized and distributed/heterogeneous architecture to ensure effective detection. Pro-active responses and corrective responses will be employed. The new security system, which will be made up of both IDS and IPS, should be less expensive to implement compared to existing ones. Finally, limitations of existing security systems have to be eliminated with the introduction of the new security system.

  18. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    PubMed Central

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  19. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  20. Adaptive critic design for computer intrusion detection system

    NASA Astrophysics Data System (ADS)

    Novokhodko, Alexander; Wunsch, Donald C., II; Dagli, Cihan H.

    2001-03-01

    This paper summarizes ongoing research. A neural network is used to detect a computer system intrusion basing on data from the system audit trail generated by Solaris Basic Security Module. The data have been provided by Lincoln Labs, MIT. The system alerts the human operator, when it encounters suspicious activity logged in the audit trail. To reduce the false alarm rate and accommodate the temporal indefiniteness of moment of attack a reinforcement learning approach is chosen to train the network.

  1. The Mobile Intrusion Detection and Assessment System (MIDAS)

    SciTech Connect

    Arlowe, H.D.; Coleman, D.E.

    1990-01-01

    This paper describes MIDAS, the Mobile Intrusion Detection and Assessment System. MIDAS is a security system that can be quickly deployed to provide wide area coverage for a mobile asset. MIDAS uses two passive infrared imaging sensors, one for intruder detection and one for assessment. Detected targets are tracked while assessment cameras are directed to view the intruder location for operator observation and assessment. The dual sensor design allows simultaneous detection, assessment, and tracking. Control and status information is provided to an operator using a color graphics terminal, touch panel driven menus, and a joystick for control of the assessment sensor pan and tilt. 1 ref., 5 figs.

  2. Using Unix system auditing for detecting network intrusions

    SciTech Connect

    Christensen, M.J.

    1993-03-01

    Intrusion Detection Systems (IDSs) are designed to detect actions of individuals who use computer resources without authorization as well as legitimate users who exceed their privileges. This paper describes a novel approach to IDS research, namely a decision aiding approach to intrusion detection. The introduction of a decision tree represents the logical steps necessary to distinguish and identify different types of attacks. This tool, the Intrusion Decision Aiding Tool (IDAT), utilizes IDS-based attack models and standard Unix audit data. Since attacks have certain characteristics and are based on already developed signature attack models, experienced and knowledgeable Unix system administrators know what to look for in system audit logs to determine if a system has been attacked. Others, however, are usually less able to recognize common signatures of unauthorized access. Users can traverse the tree using available audit data displayed by IDAT and general knowledge they possess to reach a conclusion regarding suspicious activity. IDAT is an easy-to-use window based application that gathers, analyzes, and displays pertinent system data according to Unix attack characteristics. IDAT offers a more practical approach and allows the user to make an informed decision regarding suspicious activity.

  3. A model for anomaly classification in intrusion detection systems

    NASA Astrophysics Data System (ADS)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  4. MIDAS, the Mobile Intrusion Detection and Assessment System

    SciTech Connect

    Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

    1990-01-01

    MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

  5. Operational tips for improving intrusion detection system performance

    SciTech Connect

    Adams, D.G.

    1996-09-01

    The installation of a new intrusion detection system (IDS) is, of course, expected to improve site security. However, depending upon the way the system is used, it can, over time, actually degrade security. Proper use, control, and maintenance of the IDS is critical if site security is to be maintained. This paper discusses several operational issues that should be addressed in order to use an IDS effectively. Several anecdotes from the author`s experience are given to illustrate proper and improper use of an IDS. Improper operational use of an IDS can render it ineffective. Applying these tips can help keep the IDS operating at peak performance.

  6. Operational tips for improving intrusion detection system performance

    SciTech Connect

    Adams, D.G.

    1996-12-31

    The installation of a new intrusion detection system (IDS) is, of course, expected to improve site security. However, depending upon the way the system is used, it can, over time, actually degrade security. Proper use, control, and maintenance of the IDS is critical if site security is to be maintained. This paper discusses several operational issues that should be addressed in order to use an IDS effectively. Several anecdotes from the author`s experience are given to illustrate proper and improper use of an IDS. Improper operational use of an IDS can render it ineffective. Applying these tips can help keep the IDS operating at peak performance.

  7. A Survey of Artificial Immune System Based Intrusion Detection

    PubMed Central

    Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  8. A survey of artificial immune system based intrusion detection.

    PubMed

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted. PMID:24790549

  9. An evaluation of fiber optic intrusion detection systems in interior applications

    SciTech Connect

    Vigil, J.T.

    1994-03-01

    This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

  10. Hybrid network intrusion detection

    NASA Astrophysics Data System (ADS)

    Tahmoush, David

    2014-05-01

    We report on a machine learning classifier that can be used to discover the patterns hidden within large networking data flows. It utilizes an existing intrusion detection system (IDS) as an oracle to learn a faster, less resource intensive normalcy classifier as a front-end to a hybrid network IDS. This system has the capability to recognize new attacks that are similar to known attack signatures. It is also more highly scalable and distributable than the signature-based IDS. The new hybrid design also allows distributed updates and retraining of the normalcy classifier to stay up-to-date with current threats.

  11. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks.

    PubMed

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  12. An Intrusion Detection System Based on Multi-Level Clustering for Hierarchical Wireless Sensor Networks

    PubMed Central

    Butun, Ismail; Ra, In-Ho; Sankar, Ravi

    2015-01-01

    In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) “downward-IDS (D-IDS)” to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) “upward-IDS (U-IDS)” to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented. PMID:26593915

  13. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    PubMed Central

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-01-01

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors. PMID:23529146

  14. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components.

  15. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks.

    PubMed

    Amin, Syed Obaid; Siddiqui, Muhammad Shoaib; Hong, Choong Seon; Lee, Sungwon

    2009-01-01

    The IP-based Ubiquitous Sensor Network (IP-USN) is an effort to build the "Internet of things". By utilizing IP for low power networks, we can benefit from existing well established tools and technologies of IP networks. Along with many other unresolved issues, securing IP-USN is of great concern for researchers so that future market satisfaction and demands can be met. Without proper security measures, both reactive and proactive, it is hard to envisage an IP-USN realm. In this paper we present a design of an IDS (Intrusion Detection System) called RIDES (Robust Intrusion DEtection System) for IP-USN. RIDES is a hybrid intrusion detection system, which incorporates both Signature and Anomaly based intrusion detection components. For signature based intrusion detection this paper only discusses the implementation of distributed pattern matching algorithm with the help of signature-code, a dynamically created attack-signature identifier. Other aspects, such as creation of rules are not discussed. On the other hand, for anomaly based detection we propose a scoring classifier based on the SPC (Statistical Process Control) technique called CUSUM charts. We also investigate the settings and their effects on the performance of related parameters for both of the components. PMID:22412321

  16. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    SciTech Connect

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J.

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  17. Implementing and testing a fiber-optic polarization-based intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hajj, Rasha El; MacDonald, Gregory; Verma, Pramode; Huck, Robert

    2015-09-01

    We describe a layer-1-based intrusion detection system for fiber-optic-based networks. Layer-1-based intrusion detection represents a significant elevation in security as it prohibits an adversary from obtaining information in the first place (no cryptanalysis is possible). We describe the experimental setup of the intrusion detection system, which is based on monitoring the behavior of certain attributes of light both in unperturbed and perturbed optical fiber links. The system was tested with optical fiber links of various lengths and types, under different environmental conditions, and under changes in fiber geometry similar to what is experienced during tapping activity. Comparison of the results for perturbed and unperturbed links has shown that the state of polarization is more sensitive to intrusion activity than the degree of polarization or power of the received light. The testing was conducted in a simulated telecommunication network environment that included both underground and aerial links. The links were monitored for intrusion activity. Attempts to tap the link were easily detected with no apparent degradation in the visual quality of the real-time surveillance video.

  18. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  19. Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM

    PubMed Central

    Ganapathy, S.; Yogesh, P.; Kannan, A.

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. PMID:23056036

  20. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.

    PubMed

    Ganapathy, S; Yogesh, P; Kannan, A

    2012-01-01

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set.

  1. Creating a two-layered augmented artificial immune system for application to computer network intrusion detection

    NASA Astrophysics Data System (ADS)

    Judge, Matthew G.; Lamont, Gary B.

    2009-05-01

    Computer network security has become a very serious concern of commercial, industrial, and military organizations due to the increasing number of network threats such as outsider intrusions and insider covert activities. An important security element of course is network intrusion detection which is a difficult real world problem that has been addressed through many different solution attempts. Using an artificial immune system has been shown to be one of the most promising results. By enhancing jREMISA, a multi-objective evolutionary algorithm inspired artificial immune system, with a secondary defense layer; we produce improved accuracy of intrusion classification and a flexibility in responsiveness. This responsiveness can be leveraged to provide a much more powerful and accurate system, through the use of increased processing time and dedicated hardware which has the flexibility of being located out of band.

  2. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  3. Comparative study of adaptive-noise-cancellation algorithms for intrusion detection systems

    SciTech Connect

    Claassen, J.P.; Patterson, M.M.

    1981-01-01

    Some intrusion detection systems are susceptible to nonstationary noise resulting in frequent nuisance alarms and poor detection when the noise is present. Adaptive inverse filtering for single channel systems and adaptive noise cancellation for two channel systems have both demonstrated good potential in removing correlated noise components prior detection. For such noise susceptible systems the suitability of a noise reduction algorithm must be established in a trade-off study weighing algorithm complexity against performance. The performance characteristics of several distinct classes of algorithms are established through comparative computer studies using real signals. The relative merits of the different algorithms are discussed in the light of the nature of intruder and noise signals.

  4. An Intelligent Tutor for Intrusion Detection on Computer Systems.

    ERIC Educational Resources Information Center

    Rowe, Neil C.; Schiavo, Sandra

    1998-01-01

    Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…

  5. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

    SciTech Connect

    Jared Verba; Michael Milvich

    2008-05-01

    Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

  6. Intrusion detection sensor testing tools

    SciTech Connect

    Hayward, D.R.

    1994-08-01

    Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

  7. Integrated Scalable Parallel Firewall and Intrusion Detection System for High-Speed Networks

    SciTech Connect

    Fulp, Errin W; Anderson, Robert E; Ahn, David K

    2009-08-31

    This project developed a new scalable network firewall and Intrusion Protection System (IPS) that can manage increasing traffic loads, higher network speeds, and strict Quality of Service (QoS) requirements. This new approach provides a strong foundation for next-generation network security technologies and products that address growing and unmet needs in the government and corporate sectors by delivering Optimal Network Security. Controlling access is an essential task for securing networks that are vital to private industry, government agencies, and the military. This access can be granted or denied based on the packet header or payload contents. For example, a simple network firewall enforces a security policy by inspecting and filtering the packet headers. As a complement to the firewall, an Intrusion Detection System (IDS) inspects the packet payload for known threat signatures; for example, virus or worm. Similar to a firewall policy, IDS policies consist of multiple rules that specify an action for matching packets. Each rule can specify different items, such as the signature contents and the signature location within the payload. When the firewall and IDS are merged into one device, the resulting system is referred to as an Intrusion Protection System (IPS), which provides both packet header and payload inspections. Having both types of inspections is very desirable and more manageable in a single device.

  8. An intrusion detection system for the protection of railway assets using Fiber Bragg Grating sensors.

    PubMed

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-09-29

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology.

  9. An Intrusion Detection System for the Protection of Railway Assets Using Fiber Bragg Grating Sensors

    PubMed Central

    Catalano, Angelo; Bruno, Francesco Antonio; Pisco, Marco; Cutolo, Antonello; Cusano, Andrea

    2014-01-01

    We demonstrate the ability of Fiber Bragg Gratings (FBGs) sensors to protect large areas from unauthorized activities in railway scenarios such as stations or tunnels. We report on the technological strategy adopted to protect a specific depot, representative of a common scenario for security applications in the railway environment. One of the concerns in the protection of a railway area centers on the presence of rail-tracks, which cannot be obstructed with physical barriers. We propose an integrated optical fiber system composed of FBG strain sensors that can detect human intrusion for protection of the perimeter combined with FBG accelerometer sensors for protection of rail-track access. Several trials were carried out in indoor and outdoor environments. The results demonstrate that FBG strain sensors bonded under a ribbed rubber mat enable the detection of intruder break-in via the pressure induced on the mat, whereas the FBG accelerometers installed under the rails enable the detection of intruders walking close to the railroad tracks via the acoustic surface waves generated by footsteps. Based on a single enabling technology, this integrated system represents a valuable intrusion detection system for railway security and could be integrated with other sensing functionalities in the railway field using fiber optic technology. PMID:25268920

  10. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System

    SciTech Connect

    Chen, Yan

    2013-12-05

    Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

  11. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments

    PubMed Central

    Avalappampatty Sivasamy, Aneetha; Sundan, Bose

    2015-01-01

    The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better. PMID:26357668

  12. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    PubMed Central

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  13. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  14. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    PubMed

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  15. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  16. Advanced technologies for perimeter intrusion detection sensors

    SciTech Connect

    Williams, J.D.

    1995-03-01

    The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

  17. TAD2: the first truly non-intrusive lie detection system deployed in real crime cases

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Somboonkaew, Armote

    2010-11-01

    Interrogation is an important step for seeking truth from the suspect. With the limit of the intrusive nature of the current polygraph, we show here a highly-sought-after non-intrusive lie detection system with a user-friendly interface called TAD2. The key idea behind our TAD2 is based on the analysis of far-infrared data obtained remotely from the periorbital and nostril areas of the suspect during the interrogation. In this way, measured change in skin temperature around two periorbital areas is converted to a relative blood flow velocity while a respiration pattern is simultaneously determined from the measured change in temperature around the nostril region. In addition, TAD2 is embedded with our automatic baseline assignment that is used for distinguishing the subject's response into normal or abnormal stage. In our TAD2, the officer can choose to perform one of the three standard lie detection tests, namely, a modified zone comparison test, a modified general question test, and an irrelevant & relevant test. Field test results from suspects in real crime cases are discussed.

  18. Data Mining for Intrusion Detection

    NASA Astrophysics Data System (ADS)

    Singhal, Anoop; Jajodia, Sushil

    Data Mining Techniques have been successfully applied in many different fields including marketing, manufacturing, fraud detection and network management. Over the past years there is a lot of interest in security technologies such as intrusion detection, cryptography, authentication and firewalls. This chapter discusses the application of Data Mining techniques to computer security. Conclusions are drawn and directions for future research are suggested.

  19. Alerts Analysis and Visualization in Network-based Intrusion Detection Systems

    SciTech Connect

    Yang, Dr. Li

    2010-08-01

    The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short time frame. This work describes how the visualization of raw IDS alert data assists network administrators in understanding the current state of a network and quickens the process of reviewing and responding to intrusion attempts. The project presented in this work consists of three primary components. The first component provides a visual mapping of the network topology that allows the end-user to easily browse clustered alerts. The second component is based on the flocking behavior of birds such that birds tend to follow other birds with similar behaviors. This component allows the end-user to see the clustering process and provides an efficient means for reviewing alert data. The third component discovers and visualizes patterns of multistage attacks by profiling the attacker s behaviors.

  20. Autonomous Rule Creation for Intrusion Detection

    SciTech Connect

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  1. AIDE - Advanced Intrusion Detection Environment

    SciTech Connect

    Smith, Cathy L.

    2013-04-28

    Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

  2. An Intrusion Detection Algorithm Based On NFPA

    NASA Astrophysics Data System (ADS)

    Anming, Zhong

    A process oriented intrusion detection algorithm based on Probabilistic Automaton with No Final probabilities (NFPA) is introduced, system call sequence of process is used as the source data. By using information in system call sequence of normal process and system call sequence of anomaly process, the anomaly detection and the misuse detection are efficiently combined. Experiments show better performance of our algorithm compared to the classical algorithm in this field.

  3. Multi-pattern string matching algorithms comparison for intrusion detection system

    NASA Astrophysics Data System (ADS)

    Hasan, Awsan A.; Rashid, Nur'Aini Abdul; Abdulrazzaq, Atheer A.

    2014-12-01

    Computer networks are developing exponentially and running at high speeds. With the increasing number of Internet users, computers have become the preferred target for complex attacks that require complex analyses to be detected. The Intrusion detection system (IDS) is created and turned into an important part of any modern network to protect the network from attacks. The IDS relies on string matching algorithms to identify network attacks, but these string matching algorithms consume a considerable amount of IDS processing time, thereby slows down the IDS performance. A new algorithm that can overcome the weakness of the IDS needs to be developed. Improving the multi-pattern matching algorithm ensure that an IDS can work properly and the limitations can be overcome. In this paper, we perform a comparison between our three multi-pattern matching algorithms; MP-KR, MPHQS and MPH-BMH with their corresponding original algorithms Kr, QS and BMH respectively. The experiments show that MPH-QS performs best among the proposed algorithms, followed by MPH-BMH, and MP-KR is the slowest. MPH-QS detects a large number of signature patterns in short time compared to other two algorithms. This finding can prove that the multi-pattern matching algorithms are more efficient in high-speed networks.

  4. A harmful-intrusion detection method based on background reconstruction and two-dimensional K-S test in an optical fiber pre-warning system

    NASA Astrophysics Data System (ADS)

    Bi, Fukun; Zheng, Tong; Qu, Hongquan; Pang, Liping

    2016-06-01

    The key technology and main difficulty for optical fiber intrusion pre-warning systems (OFIPS) is the extraction of harmful-intrusion signals. After being processed by a phase-sensitive optical time-domain reflectometer (Φ-OTDR), vibration signals can be preliminarily extracted. Generally, these include noises and intrusions. Here, intrusions can be divided into harmful and harmless intrusions. With respect to the close study of signal characteristics, an effective extraction method of harmful intrusion is proposed in the paper. Firstly, in the part of the background reconstruction, all intrusion signals are first detected by a constant false alarm rate (CFAR). We then reconstruct the backgrounds by extracting two-part information of alarm points, time and amplitude. This ensures that the detection background consists of intrusion signals. Secondly, in the part of the two-dimensional Kolmogorov-Smirnov (K-S) test, in order to extract harmful ones from all extracted intrusions, we design a separation method. It is based on the signal characteristics of harmful intrusion, which are shorter time interval and higher amplitude. In the actual OFIPS, the detection method is used in some typical scenes, which includes a lot of harmless intrusions, for example construction sites and busy roads. Results show that we can effectively extract harmful intrusions.

  5. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems.

    PubMed

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  6. Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems

    PubMed Central

    Laftah Al-Yaseen, Wathiq; Ali Othman, Zulaiha; Ahmad Nazri, Mohd Zakree

    2015-01-01

    Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. However, this paper aims at proposing a hybrid of modified K-means with C4.5 intrusion detection system in a multiagent system (MAS-IDS). The MAS-IDS consists of three agents, namely, coordinator, analysis, and communication agent. The basic concept underpinning the utilized MAS is dividing the large captured network dataset into a number of subsets and distributing these to a number of agents depending on the data network size and core CPU availability. KDD Cup 1999 dataset is used for evaluation. The proposed hybrid modified K-means with C4.5 classification in MAS is developed in JADE platform. The results show that compared to the current methods, the MAS-IDS reduces the IDS processing time by up to 70%, while improving the detection accuracy. PMID:26161437

  7. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  8. A Survey on Intrusion Detection in MANETs.

    NASA Astrophysics Data System (ADS)

    BakeyaLakshmi, P.; Santhi, K.

    2012-10-01

    A mobile ad hoc network is an infrastructureless network that changes its links dynamically, which makes routing in MANET a difficult process. As Mobile Ad-Hoc Network (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a vital role in the data analysis process. PCA is used to analyze the selected features. This is because, redundant and irrelevant features often reduce performance of the intrusion detection system. It performs better in increasing speed and predictive accuracy. This survey aims to select and analyze the network features using principal component analysis. While performing various experiments, normal and attack states are simulated and the results for the selected features are analyzed.

  9. Intrusion detection using pattern recognition methods

    NASA Astrophysics Data System (ADS)

    Jiang, Nan; Yu, Li

    2007-09-01

    Today, cyber attacks such as worms, scanning, active attackers are pervasive in Internet. A number of security approaches are proposed to address this problem, among which the intrusion detection system (IDS) appears to be one of the major and most effective solutions for defending against malicious users. Essentially, intrusion detection problem can be generalized as a classification problem, whose goal is to distinguish normal behaviors and anomalies. There are many well-known pattern recognition algorithms for classification purpose. In this paper we describe the details of applying pattern recognition methods to the intrusion detection research field. Experimenting on the KDDCUP 99 data set, we first use information gain metric to reduce the dimensionality of the original feature space. Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications. In addition, three unsupervised methods, Single-Linkage, K-Means, and CLIQUE, are also implemented and evaluated in the paper. The low computational complexity reveals their application in initial data reduction process.

  10. From Intrusion Detection to Self Protection

    SciTech Connect

    Frincke, Deb; Wespi, Andreas; Zamboni, Diego

    2007-04-11

    Modern computer systems have become so complex and interdependent that the traditional model of system defense, utilizing layers and including an intrusion detection system that provides alerts to a human who responds to them, is becoming unfeasible. Effective human-guided real-time responses are no longer a reasonable expectation for large scale systems--this is particularly troublesome because a failure to respond correctly and rapidly can have disastrous consequences. In an ideal world, our systems would automatically detect and respond to threats of all kinds, including but not limited to automated attacks, human-guided attacks, and the constant onslaught of unsolicited email (spam). Traditionally, these threats have been dealt with by separate communities--the anti-virus community, the intrusion-detection/firewall community, and the anti-spam community. Today however, we see an increasing need for integrating different technologies toward achieving a common goal. In this special issue, we surveyed the research community with the intent of identifying novel, multidisciplinary and integrated approaches to system defense that contribute towards development of true self-protecting and self-healing systems. The result is reflected in the articles we selected.

  11. A novel interacting multiple model based network intrusion detection scheme

    NASA Astrophysics Data System (ADS)

    Xin, Ruichi; Venkatasubramanian, Vijay; Leung, Henry

    2006-04-01

    In today's information age, information and network security are of primary importance to any organization. Network intrusion is a serious threat to security of computers and data networks. In internet protocol (IP) based network, intrusions originate in different kinds of packets/messages contained in the open system interconnection (OSI) layer 3 or higher layers. Network intrusion detection and prevention systems observe the layer 3 packets (or layer 4 to 7 messages) to screen for intrusions and security threats. Signature based methods use a pre-existing database that document intrusion patterns as perceived in the layer 3 to 7 protocol traffics and match the incoming traffic for potential intrusion attacks. Alternately, network traffic data can be modeled and any huge anomaly from the established traffic pattern can be detected as network intrusion. The latter method, also known as anomaly based detection is gaining popularity for its versatility in learning new patterns and discovering new attacks. It is apparent that for a reliable performance, an accurate model of the network data needs to be established. In this paper, we illustrate using collected data that network traffic is seldom stationary. We propose the use of multiple models to accurately represent the traffic data. The improvement in reliability of the proposed model is verified by measuring the detection and false alarm rates on several datasets.

  12. Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection

    ERIC Educational Resources Information Center

    Koc, Levent

    2013-01-01

    With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…

  13. Adaptive Intrusion Data System (AIDS)

    SciTech Connect

    Corlis, N. E.

    1980-05-01

    The adaptive intrusion data system (AIDS) was developed to collect data from intrusion alarm sensors as part of an evaluation system to improve sensor performance. AIDS is a unique data system which uses computer controlled data systems, video cameras and recorders, analog-to-digital conversion, environmental sensors, and digital recorders to collect sensor data. The data can be viewed either manually or with a special computerized data-reduction system which adds new data to a data base stored on a magnetic disc recorder. This report provides a synoptic account of the AIDS as it presently exists. Modifications to the purchased subsystems are described, and references are made to publications which describe the Sandia-designed subsystems.

  14. An improved real time image detection system for elephant intrusion along the forest border areas.

    PubMed

    Sugumar, S J; Jayaparvathy, R

    2014-01-01

    Human-elephant conflict is a major problem leading to crop damage, human death and injuries caused by elephants, and elephants being killed by humans. In this paper, we propose an automated unsupervised elephant image detection system (EIDS) as a solution to human-elephant conflict in the context of elephant conservation. The elephant's image is captured in the forest border areas and is sent to a base station via an RF network. The received image is decomposed using Haar wavelet to obtain multilevel wavelet coefficients, with which we perform image feature extraction and similarity match between the elephant query image and the database image using image vision algorithms. A GSM message is sent to the forest officials indicating that an elephant has been detected in the forest border and is approaching human habitat. We propose an optimized distance metric to improve the image retrieval time from the database. We compare the optimized distance metric with the popular Euclidean and Manhattan distance methods. The proposed optimized distance metric retrieves more images with lesser retrieval time than the other distance metrics which makes the optimized distance method more efficient and reliable.

  15. An Improved Real Time Image Detection System for Elephant Intrusion along the Forest Border Areas

    PubMed Central

    Sugumar, S. J.; Jayaparvathy, R.

    2014-01-01

    Human-elephant conflict is a major problem leading to crop damage, human death and injuries caused by elephants, and elephants being killed by humans. In this paper, we propose an automated unsupervised elephant image detection system (EIDS) as a solution to human-elephant conflict in the context of elephant conservation. The elephant's image is captured in the forest border areas and is sent to a base station via an RF network. The received image is decomposed using Haar wavelet to obtain multilevel wavelet coefficients, with which we perform image feature extraction and similarity match between the elephant query image and the database image using image vision algorithms. A GSM message is sent to the forest officials indicating that an elephant has been detected in the forest border and is approaching human habitat. We propose an optimized distance metric to improve the image retrieval time from the database. We compare the optimized distance metric with the popular Euclidean and Manhattan distance methods. The proposed optimized distance metric retrieves more images with lesser retrieval time than the other distance metrics which makes the optimized distance method more efficient and reliable. PMID:24574886

  16. A New Intrusion Detection Method Based on Antibody Concentration

    NASA Astrophysics Data System (ADS)

    Zeng, Jie; Li, Tao; Li, Guiyang; Li, Haibo

    Antibody is one kind of protein that fights against the harmful antigen in human immune system. In modern medical examination, the health status of a human body can be diagnosed by detecting the intrusion intensity of a specific antigen and the concentration indicator of corresponding antibody from human body’s serum. In this paper, inspired by the principle of antigen-antibody reactions, we present a New Intrusion Detection Method Based on Antibody Concentration (NIDMBAC) to reduce false alarm rate without affecting detection rate. In our proposed method, the basic definitions of self, nonself, antigen and detector in the intrusion detection domain are given. Then, according to the antigen intrusion intensity, the change of antibody number is recorded from the process of clone proliferation for detectors based on the antigen classified recognition. Finally, building upon the above works, a probabilistic calculation method for the intrusion alarm production, which is based on the correlation between the antigen intrusion intensity and the antibody concen-tration, is proposed. Our theoretical analysis and experimental results show that our proposed method has a better performance than traditional methods.

  17. Seismic intrusion detector system

    DOEpatents

    Hawk, Hervey L.; Hawley, James G.; Portlock, John M.; Scheibner, James E.

    1976-01-01

    A system for monitoring man-associated seismic movements within a control area including a geophone for generating an electrical signal in response to seismic movement, a bandpass amplifier and threshold detector for eliminating unwanted signals, pulse counting system for counting and storing the number of seismic movements within the area, and a monitoring system operable on command having a variable frequency oscillator generating an audio frequency signal proportional to the number of said seismic movements.

  18. Sandia Network Intrusion Detection Assessment Version 1.0

    SciTech Connect

    Bauer, Keith C.; Volkmer, Greg

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusion detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a complete

  19. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    PubMed Central

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2009-01-01

    Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm. PMID:22454568

  20. Intrusion detection using rough set classification.

    PubMed

    Zhang, Lian-hua; Zhang, Guan-hua; Zhang, Jie; Bai, Ying-cai

    2004-09-01

    Recently machine learning-based intrusion detection approaches have been subjected to extensive researches because they can detect both misuse and anomaly. In this paper, rough set classification (RSC), a modern learning algorithm, is used to rank the features extracted for detecting intrusions and generate intrusion detection models. Feature ranking is a very critical step when building the model. RSC performs feature ranking before generating rules, and converts the feature ranking to minimal hitting set problem addressed by using genetic algorithm (GA). This is done in classical approaches using Support Vector Machine (SVM) by executing many iterations, each of which removes one useless feature. Compared with those methods, our method can avoid many iterations. In addition, a hybrid genetic algorithm is proposed to increase the convergence speed and decrease the training time of RSC. The models generated by RSC take the form of "IF-THEN" rules, which have the advantage of explication. Tests and comparison of RSC with SVM on DARPA benchmark data showed that for Probe and DoS attacks both RSC and SVM yielded highly accurate results (greater than 99% accuracy on testing set).

  1. Power-Aware Intrusion Detection in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Şen, Sevil; Clark, John A.; Tapiador, Juan E.

    Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.

  2. Alerts Visualization and Clustering in Network-based Intrusion Detection

    SciTech Connect

    Yang, Dr. Li; Gasior, Wade C; Dasireddy, Swetha

    2010-04-01

    Today's Intrusion detection systems when deployed on a busy network overload the network with huge number of alerts. This behavior of producing too much raw information makes it less effective. We propose a system which takes both raw data and Snort alerts to visualize and analyze possible intrusions in a network. Then we present with two models for the visualization of clustered alerts. Our first model gives the network administrator with the logical topology of the network and detailed information of each node that involves its associated alerts and connections. In the second model, flocking model, presents the network administrator with the visual representation of IDS data in which each alert is represented in different color and the alerts with maximum similarity move together. This gives network administrator with the idea of detecting various of intrusions through visualizing the alert patterns.

  3. Misuse and intrusion detection at Los Alamos National Laboratory

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1995-04-01

    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in system audit records, in system vulnerability postures, and in other evidence found through active system testing. Since 1989 we have implemented a misuse and intrusion detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter, or NADIR. NADIR currently audits a Kerberos distributed authentication system, file activity on a mass, storage system, and four Cray supercomputers that run the UNICOS operating system. NADIR summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations, As NADIR is constantly evolving, this paper reports its development to date.

  4. Distributed fiber optic moisture intrusion sensing system

    DOEpatents

    Weiss, Jonathan D.

    2003-06-24

    Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

  5. Magmatic intrusions and hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Gulick, Virginia Claire

    1993-01-01

    This dissertation investigates the possible role of hydrothermally driven ground-water outflow in the formation of fluvial valleys on Mars. Although these landforms have often been cited as evidence for a past warmer climate and denser atmosphere, recent theoretical modeling precludes such climatic conditions on early Mars when most fluvial valleys formed. Because fluvial valleys continued to form throughout Mars' geological history and the most Earth-like stream valleys on Mars formed well after the decline of the early putative Earth-like climate, it may be unnecessary to invoke drastically different climatic conditions for the formation of the earliest stream valleys. The morphology of most Martian fluvial valleys indicates formation by ground-water sapping which is consistent with a subsurface origin. Additionally, many Martian fluvial valleys formed on volcanoes, impact craters, near fractures, or adjacent to terrains interpreted as igneous intrusions; all are possible locales of vigorous, geologically long-lived hydrothermal circulation. Comparison of Martian valley morphology to similar features on Earth constrains valley genesis scenarios. Volumes of measured Martian fluvial valleys range from 1010 to 1013 m3. Based on terrestrial analogs, total water volumes required to erode these valleys range from approximately 1010 to 1015 m3. The clustered distribution of Martian valleys within a given terrain type, the sapping dominated morphology, and the general lack of associated runoff valleys all indicate the importance of localized ground-water outflow in the formation of these fluvial systems. An analytic model of a conductively cooling cylindrical intrusion is coupled with the U.S. Geological Survey's numerical ground-water computer code SUTRA to evaluate the magnitude of ground-water outflow expected from magmatically-driven hydrothermal systems on Mars. Results indicate that magmatic intrusions of several 102 km3 or larger can provide sufficient ground

  6. Data mining approach to web application intrusions detection

    NASA Astrophysics Data System (ADS)

    Kalicki, Arkadiusz

    2011-10-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application script languages and frameworks together with careless development results in high number of web application vulnerabilities and high number of attacks performed. There are several types of attacks possible because of improper input validation: SQL injection Cross-site scripting, Cross-Site Request Forgery (CSRF), web spam in blogs and others. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. This paper presents data mining based algorithm for anomaly detection. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Previously presented detection method was rewritten and improved. Some tests show that the software catches malicious requests, especially long attack sequences, results quite good with medium length sequences, for short length sequences must be complemented with other methods.

  7. AdaBoost-based algorithm for network intrusion detection.

    PubMed

    Hu, Weiming; Hu, Wei; Maybank, Steve

    2008-04-01

    Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security system. Due to the variety of network behaviors and the rapid development of attack fashions, it is necessary to develop fast machine-learning-based intrusion detection algorithms with high detection rates and low false-alarm rates. In this correspondence, we propose an intrusion detection algorithm based on the AdaBoost algorithm. In the algorithm, decision stumps are used as weak classifiers. The decision rules are provided for both categorical and continuous features. By combining the weak classifiers for continuous features and the weak classifiers for categorical features into a strong classifier, the relations between these two different types of features are handled naturally, without any forced conversions between continuous and categorical features. Adaptable initial weights and a simple strategy for avoiding overfitting are adopted to improve the performance of the algorithm. Experimental results show that our algorithm has low computational complexity and error rates, as compared with algorithms of higher computational complexity, as tested on the benchmark sample data. PMID:18348941

  8. Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection.

    PubMed

    Hu, Weiming; Gao, Jun; Wang, Yanguo; Wu, Ou; Maybank, Stephen

    2014-01-01

    Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based intrusion detection algorithms. In the first algorithm, a traditional online Adaboost process is used where decision stumps are used as weak classifiers. In the second algorithm, an improved online Adaboost process is proposed, and online Gaussian mixture models (GMMs) are used as weak classifiers. We further propose a distributed intrusion detection framework, in which a local parameterized detection model is constructed in each node using the online Adaboost algorithm. A global detection model is constructed in each node by combining the local parametric models using a small number of samples in the node. This combination is achieved using an algorithm based on particle swarm optimization (PSO) and support vector machines. The global model in each node is used to detect intrusions. Experimental results show that the improved online Adaboost process with GMMs obtains a higher detection rate and a lower false alarm rate than the traditional online Adaboost process that uses decision stumps. Both the algorithms outperform existing intrusion detection algorithms. It is also shown that our PSO, and SVM-based algorithm effectively combines the local detection models into the global model in each node; the global model in a node can handle the intrusion types that are found in other nodes, without sharing the samples of these intrusion types. PMID:23757534

  9. Experiments on Adaptive Techniques for Host-Based Intrusion Detection

    SciTech Connect

    DRAELOS, TIMOTHY J.; COLLINS, MICHAEL J.; DUGGAN, DAVID P.; THOMAS, EDWARD V.; WUNSCH, DONALD

    2001-09-01

    This research explores four experiments of adaptive host-based intrusion detection (ID) techniques in an attempt to develop systems that can detect novel exploits. The technique considered to have the most potential is adaptive critic designs (ACDs) because of their utilization of reinforcement learning, which allows learning exploits that are difficult to pinpoint in sensor data. Preliminary results of ID using an ACD, an Elman recurrent neural network, and a statistical anomaly detection technique demonstrate an ability to learn to distinguish between clean and exploit data. We used the Solaris Basic Security Module (BSM) as a data source and performed considerable preprocessing on the raw data. A detection approach called generalized signature-based ID is recommended as a middle ground between signature-based ID, which has an inability to detect novel exploits, and anomaly detection, which detects too many events including events that are not exploits. The primary results of the ID experiments demonstrate the use of custom data for generalized signature-based intrusion detection and the ability of neural network-based systems to learn in this application environment.

  10. Sandia Network Intrusion Detection Assessment Version 1.0

    2002-09-20

    SNIDE Assess is a general-purpose software package for matching network event notifications from specialized sensors against on or more attack templattes. If a pattern of events matches an attack template, then SNIDE Assess can be configured to initate responses. SNIDE Assess provides a graphical user interface for configuring attack templates, and provides the required flexibility to define new event notification messages and responses. In general, SNIDE Assess is designed for event correlation for network intrusionmore » detection systems. This version of SNIDE Assess is configured specifically for detection of control plane intrusions on Asynchronous Transfer Mode (ATM) networks. The SNIDE Assessment Engine is written in C. The SNIDE Assessment engine is a piece of the software that is responsible for receiving incoming messages from sensors, assimilating the information from the tripped sensors, and determining if the messages received constitute and intrusion, based on the rules specified by the system administrator. If it has been determined that a possible intrusion has occurred, the SNIDE Assessment engine will send a message to one or more response components to perform the action specified in the rule. The SNIDE Assessment engine is rule driven, that is, it's behavior is determined by specifying a set of text based rules. To provide flexibility, the definition of what constitutes an intrusion is left to the intrusion detection system administrator. a graphical rule editor is provided to allow the administrator to define what type of intrusions are to be monitored. The rules consist of combinations of sensors with boolean operators and filters. SNIDE Assessment rules can be made arbitrarily compled by using Operators and Filters. Operators allow for logic constructs to be created that combine incoming Sensor Notification events. When grouped together, they are referred to as solution sets. Each operator defnes on logic operation that is satisfied when a

  11. An integrated pattern recognition approach for intrusion detection.

    PubMed

    Pandit, Amod; Stanley, R Joe; McMillin, Bruce

    2002-01-01

    Intrusion detection systems (IDS) attempt to address the vulnerability of computer-based systems for abuse by insiders and to penetration by outsiders. An IDS is required to examine an enormous amount of data generated by computer networks to assist in the abuse detection process. Thus, there is a need to develop automated tools that address these requirements to assist system operators in the detection of violations of existing security policies. In this research, an automated IDS is proposed for insider threats in a distributed system. The proposed IDS functions as an anomaly detector for insider system operations based on the analysis of the system's log files. The approach integrates dynamic programming and adaptive resonance theory (ART1) clustering. The integrated approach aligns sequences of log events with prototypical sequences of events for performing tasks and classifies the aligned sequences for intrusion detection. The system examined for this research is a Boots System for controlling the movement of boots from one place to another under specific security restrictions related to the boot orders. We present the proposed model, the results achieved and the analysis of an implemented prototype.

  12. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  13. Organizational coevolutionary classifiers with fuzzy logic used in intrusion detection

    NASA Astrophysics Data System (ADS)

    Chen, Zhenguo

    2009-07-01

    Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. To solve the intrusion detection question, we introduce the fuzzy logic into Organization CoEvolutionary algorithm [1] and present the algorithm of Organization CoEvolutionary Classification with Fuzzy Logic. In this paper, we give an intrusion detection models based on Organization CoEvolutionary Classification with Fuzzy Logic. After illustrating our model with a representative dataset and applying it to the real-world network datasets KDD Cup 1999. The experimental result shown that the intrusion detection based on Organizational Coevolutionary Classifiers with Fuzzy Logic can give higher recognition accuracy than the general method.

  14. Appliance of Independent Component Analysis to System Intrusion Analysis

    NASA Astrophysics Data System (ADS)

    Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji

    In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.

  15. Visual behavior characterization for intrusion and misuse detection

    NASA Astrophysics Data System (ADS)

    Erbacher, Robert F.; Frincke, Deborah

    2001-05-01

    As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.

  16. Non-intrusive cooling system

    DOEpatents

    Morrison, Edward F.; Bergman, John W.

    2001-05-22

    A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

  17. Anomaly detection enhanced classification in computer intrusion detection

    SciTech Connect

    Fugate, M. L.; Gattiker, J. R.

    2002-01-01

    This report describes work with the goal of enhancing capabilities in computer intrusion detection. The work builds upon a study of classification performance, that compared various methods of classifying information derived from computer network packets into attack versus normal categories, based on a labeled training dataset. This previous work validates our classification methods, and clears the ground for studying whether and how anomaly detection can be used to enhance this performance, The DARPA project that initiated the dataset used here concluded that anomaly detection should be examined to boost the performance of machine learning in the computer intrusion detection task. This report investigates the data set for aspects that will be valuable for anomaly detection application, and supports these results with models constructed from the data. In this report, the term anomaly detection means learning a model from unlabeled data, and using this to make some inference about future data. Our data is a feature vector derived from network packets: an 'example' or 'sample'. On the other hand, classification means building a model from labeled data, and using that model to classify unlabeled (future) examples. There is some precedent in the literature for combining these methods. One approach is to stage the two techniques, using anomaly detection to segment data into two sets for classification. An interpretation of this is a method to combat nonstationarity in the data. In our previous work, we demonstrated that the data has substantial temporal nonstationarity. With classification methods that can be thought of as learning a decision surface between two statistical distributions, performance is expected to degrade significantly when classifying examples that are from regions not well represented in the training set. Anomaly detection can be seen as a problem of learning the density (landscape) or the support (boundary) of a statistical distribution so that

  18. Design of an Evolutionary Approach for Intrusion Detection

    PubMed Central

    2013-01-01

    A novel evolutionary approach is proposed for effective intrusion detection based on benchmark datasets. The proposed approach can generate a pool of noninferior individual solutions and ensemble solutions thereof. The generated ensembles can be used to detect the intrusions accurately. For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. The proposed approach can generate a pool of noninferior solutions and ensembles thereof having optimized trade-offs values of multiple conflicting objectives. In this paper, a three-phase, approach is proposed to generate solutions to a simple chromosome design in the first phase. In the first phase, a Pareto front of noninferior individual solutions is approximated. In the second phase of the proposed approach, the entire solution set is further refined to determine effective ensemble solutions considering solution interaction. In this phase, another improved Pareto front of ensemble solutions over that of individual solutions is approximated. The ensemble solutions in improved Pareto front reported improved detection results based on benchmark datasets for intrusion detection. In the third phase, a combination method like majority voting method is used to fuse the predictions of individual solutions for determining prediction of ensemble solution. Benchmark datasets, namely, KDD cup 1999 and ISCX 2012 dataset, are used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover individual solutions and ensemble solutions thereof with a good support and a detection rate from benchmark datasets (in comparison with well-known ensemble methods like bagging and boosting). In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting

  19. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  20. Analytic sequential methods for detecting network intrusions

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2014-05-01

    In this paper, we propose an analytic sequential methods for detecting port-scan attackers which routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. In addition to rigorously control the probability of falsely implicating benign remote hosts as malicious, our method performs significantly faster than other current solutions. We have developed explicit formulae for quick determination of the parameters of the new detection algorithm.

  1. Adaptive sequential methods for detecting network intrusions

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2013-06-01

    In this paper, we propose new sequential methods for detecting port-scan attackers which routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. In addition to rigorously control the probability of falsely implicating benign remote hosts as malicious, our method performs significantly faster than other current solutions. Moreover, our method guarantees that the maximum amount of observational time is bounded. In contrast to the previous most effective method, Threshold Random Walk Algorithm, which is explicit and analytical in nature, our proposed algorithm involve parameters to be determined by numerical methods. We have introduced computational techniques such as iterative minimax optimization for quick determination of the parameters of the new detection algorithm. A framework of multi-valued decision for detecting portscanners and DoS attacks is also proposed.

  2. Towards Reliable Evaluation of Anomaly-Based Intrusion Detection Performance

    NASA Technical Reports Server (NTRS)

    Viswanathan, Arun

    2012-01-01

    This report describes the results of research into the effects of environment-induced noise on the evaluation process for anomaly detectors in the cyber security domain. This research was conducted during a 10-week summer internship program from the 19th of August, 2012 to the 23rd of August, 2012 at the Jet Propulsion Laboratory in Pasadena, California. The research performed lies within the larger context of the Los Angeles Department of Water and Power (LADWP) Smart Grid cyber security project, a Department of Energy (DoE) funded effort involving the Jet Propulsion Laboratory, California Institute of Technology and the University of Southern California/ Information Sciences Institute. The results of the present effort constitute an important contribution towards building more rigorous evaluation paradigms for anomaly-based intrusion detectors in complex cyber physical systems such as the Smart Grid. Anomaly detection is a key strategy for cyber intrusion detection and operates by identifying deviations from profiles of nominal behavior and are thus conceptually appealing for detecting "novel" attacks. Evaluating the performance of such a detector requires assessing: (a) how well it captures the model of nominal behavior, and (b) how well it detects attacks (deviations from normality). Current evaluation methods produce results that give insufficient insight into the operation of a detector, inevitably resulting in a significantly poor characterization of a detectors performance. In this work, we first describe a preliminary taxonomy of key evaluation constructs that are necessary for establishing rigor in the evaluation regime of an anomaly detector. We then focus on clarifying the impact of the operational environment on the manifestation of attacks in monitored data. We show how dynamic and evolving environments can introduce high variability into the data stream perturbing detector performance. Prior research has focused on understanding the impact of this

  3. An ethernet/IP security review with intrusion detection applications

    SciTech Connect

    Laughter, S. A.; Williams, R. D.

    2006-07-01

    Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

  4. Scheduling Randomly-Deployed Heterogeneous Video Sensor Nodes for Reduced Intrusion Detection Time

    NASA Astrophysics Data System (ADS)

    Pham, Congduc

    This paper proposes to use video sensor nodes to provide an efficient intrusion detection system. We use a scheduling mechanism that takes into account the criticality of the surveillance application and present a performance study of various cover set construction strategies that take into account cameras with heterogeneous angle of view and those with very small angle of view. We show by simulation how a dynamic criticality management scheme can provide fast event detection for mission-critical surveillance applications by increasing the network lifetime and providing low stealth time of intrusions.

  5. Nuclear-power-plant perimeter-intrusion alarm systems

    SciTech Connect

    Halsey, D.J.

    1982-04-01

    Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

  6. Performance of Neural Networks Methods In Intrusion Detection

    SciTech Connect

    Dao, V N; Vemuri, R

    2001-07-09

    By accurately profiling the users via their unique attributes, it is possible to view the intrusion detection problem as a classification of authorized users and intruders. This paper demonstrates that artificial neural network (ANN) techniques can be used to solve this classification problem. Furthermore, the paper compares the performance of three neural networks methods in classifying authorized users and intruders using synthetically generated data. The three methods are the gradient descent back propagation (BP) with momentum, the conjugate gradient BP, and the quasi-Newton BP.

  7. Phase-sensitive optical time domain reflectometer for distributed fence-perimeter intrusion detection

    NASA Astrophysics Data System (ADS)

    Yu, Xuhui; Zhou, Deliang; Lu, Bin; Liu, Sufang; Pan, Ming

    2015-10-01

    In this paper, we demonstrate a distributed fence-perimeter intrusion detection system using a phase-sensitive optical time domain reflectometer (Φ-OTDR) with several advantages, such as high spatial resolution, large detection range, single-end measurement and immunity from electromagnetic interference. By the effort of generating a high-extinction-ratio optical pulse, optimizing the incident optical power and utilizing a differential algorithm, a home-made Φ-OTDR system, as a distributed vibration sensor, is implemented with a spatial resolution of 10 meter. Nowadays, a fence-perimeter intrusion detection system is desired for the security monitor. We set up a fence perimeter using a fiber cable containing only one fiber and a field experiment is carried out based on our Φ-OTDR system. Various vibration events are recorded and analyzed, including wind blowing, personal climbing and knocking. The experiment results reveal unique vibration characteristics of different events in the frequency domain and confirm the effectiveness of the homemade Φ-OTDR system in the application of the distributed fence-perimeter intrusion detection.

  8. A study on intrusion detection model based on hybrid classifier

    NASA Astrophysics Data System (ADS)

    Liu, Kewen; Yang, Qingbo

    2013-03-01

    In order to improve the accuracy of classification problem in intrusion detection, a hybrid classifier which was composed by KPCA, BPNN and QGA, has been proposed in this paper. In the hybrid classifier, KPCA was used to reduce dimensions, and then QGA was used to search the best parameters for BPNN. BPNN which has been got the best weights matrix and thresholds by QGA, was used to train classification model. The main core factors of original dataset can be preserved by KPCA, and greatly reduced the computations. The weakness of BPNN, which was usually easy to get stuck in local minimum, can be solved by QGA. Finally, the effectiveness of hybrid classifier was proved by experiments. Compared with traditional methods, the hybrid classifier has better performance in reducing the classify errors.

  9. Smart container UWB sensor system for situational awareness of intrusion alarms

    DOEpatents

    Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

    2013-06-11

    An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

  10. Investigation of novel spectral and wavelet statistics for UGS-based intrusion detection

    NASA Astrophysics Data System (ADS)

    Narayanaswami, Ranga; Gandhe, Avinash; Tyurina, Anastasia; McComas, Michael; Mehra, Raman K.

    2012-06-01

    Seismic Unattended Ground Sensors (UGS) are low cost and covert, making them a suitable candidate for border patrol. Current seismic UGS systems use cadence-based intrusion detection algorithms and are easily confused between humans and animals. The poor discrimination ability between humans and animals results in missed detections as well as higher false (nuisance) alarm rates. In order for seismic UGS systems to be deployed successfully, new signal processing algorithms with better discrimination ability between humans and animals are needed. We have characterized the seismic signals using frequency domain and time-frequency domain statistics, which improve the discrimination between humans, animals and vehicles.

  11. Detecting Aseismic Fault Slip and Magmatic Intrusion From Seismicity Data

    NASA Astrophysics Data System (ADS)

    Llenos, A. L.; McGuire, J. J.

    2007-12-01

    Seismicity triggered by aseismic deformation, such as magmatic intrusions or afterslip, can be used to detect the occurrence of these otherwise difficult to observe processes. Recent studies suggest that aseismic deformation can trigger large amounts of seismicity in a variety of plate tectonic settings. We have developed a new technique that takes advantage of this triggered seismicity to estimate the time-history of aseismic stressing rate on a fault- zone by combining the rate and state dependent friction and the Epidemic Type Aftershock Sequence (ETAS) models of seismicity-rate [ Dieterich, 1994; Ogata, 1988]. In the rate-state model, the integration of an observed seismicity rate results in an estimate of the stress rate acting in a given space-time window. However, the seismicity rate observed in any catalog comes from 3 primary sources: coseismically-triggered seismicity (aftershocks), tectonically-triggered seismicity (i.e., from long-term tectonic loading), and aseismically-triggered seismicity (e.g., from dike intrusion, aseismic slip transients, or fluid migration). In catalogs dominated by directly triggered aftershocks (i.e., ETAS branching ratios >~0.7), the coseismically-triggered seismicity rate will be much larger than the aseismically-triggered rate and will dominate the estimate of stressing-rate, obscuring the aseismic transient of interest if the rate-state method is applied directly. The challenge therefore lies in isolating the aseismically-triggered seismicity rate from the coseismically-triggered seismicity rate. The ETAS model [ Ogata, 1988] provides a natural way to separate the aseismic and coseismic seismicity rates, as the ETAS parameter μ essentially reflects the aseismically-triggered rate (as well as the background tectonically-triggered rate). To develop a method that can resolve the magnitude and time history of aseismic stress transients even in high branching ratio regions, we combine the rate-state and ETAS models into a

  12. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.

  13. Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.

    PubMed

    Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo

    2016-08-01

    Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree. PMID:26540724

  14. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.

    PubMed

    Amudha, P; Karthik, S; Sivakumari, S

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  15. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features

    PubMed Central

    Amudha, P.; Karthik, S.; Sivakumari, S.

    2015-01-01

    Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony (MABC) with Enhanced Particle Swarm Optimization (EPSO) to predict the intrusion detection problem. The algorithms are combined together to find out better optimization results and the classification accuracies are obtained by 10-fold cross-validation method. The purpose of this paper is to select the most relevant features that can represent the pattern of the network traffic and test its effect on the success of the proposed hybrid classification algorithm. To investigate the performance of the proposed method, intrusion detection KDDCup'99 benchmark dataset from the UCI Machine Learning repository is used. The performance of the proposed method is compared with the other machine learning algorithms and found to be significantly different. PMID:26221625

  16. Mobile agent and multilayer integrated distributed intrusion detection model for clustering ad hoc networks

    NASA Astrophysics Data System (ADS)

    Feng, Jianxin; Wang, Guangxing

    2004-04-01

    Ad hoc networks do not depend on any predefined infrastructure or centralized administration to operate. Their security characters require more complex security preventions. As the second line of defense, Intrusion detection is the necessary means of getting the high survivability. In this paper the security characters of ad hoc networks and the related contents of intrusion detection are discussed. Mobile Agent and Multi-layer Integrated Distributed Intrusion Detection Model (MAMIDIDM) and a heuristic global detection algorithm are proposed tentatively by combining the mobile agent technology with the multi-layer conception. This heuristic global detection algorithm combines the mobile agent detection engine with the multi-layer detection engines and analyzes the results obtained by the corresponding detection engines. MAMIDIDM has the better flexibility and extensibility, can execute the intrusion detection in clustering ad hoc networks effectively.

  17. Nuclear data for non-intrusive inspection systems

    SciTech Connect

    Bendahan, J.; Loveman, R.; Gozani, T.

    1994-12-31

    Non-intrusive inspection systems based on nuclear techniques utilize the interaction of neutrons and gamma rays to determine the elemental constituents of the inspected object. The Thermal Neutron Analysis System has been used to detect explosives and narcotics concealed in passenger luggage and small objects. More recently the Pulsed Fast Neutron Analysis technique is being used to detect contraband in large cargo containers and has been proposed for the characterization of waste drums. The design of these systems requires the utilization of simulation codes where the accuracy of the results depends largely on the nuclear libraries. Several nuclear data evaluations were reviewed and compared with existing data to identify the most accurate ones. Large discrepancies were found among the various nuclear libraries, mainly in the production cross sections and angular distributions of gamma rays, stimulated by neutron interactions. An experimental program was carried out to correct and complement the required data. Evaluations of gamma-ray production cross sections for carbon, oxygen and chlorine are reviewed and compared with existing and new experimental data.

  18. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  19. Probabilistic monitoring in intrusion detection module for energy efficiency in mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    De Rango, Floriano; Lupia, Andrea

    2016-05-01

    MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.

  20. DETECTION OR WARNING SYSTEM

    DOEpatents

    Tillman, J E

    1953-10-20

    This patent application describes a sensitive detection or protective system capable of giving an alarm or warning upon the entrance or intrusion of any body into a defined area or zone protected by a radiation field of suitable direction or extent.

  1. Unsupervised algorithms for intrusion detection and identification in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2009-05-01

    In previous work by the author, parameters across network protocol layers were selected as features in supervised algorithms that detect and identify certain intrusion attacks on wireless ad hoc sensor networks (WSNs) carrying multisensor data. The algorithms improved the residual performance of the intrusion prevention measures provided by any dynamic key-management schemes and trust models implemented among network nodes. The approach of this paper does not train algorithms on the signature of known attack traffic, but, instead, the approach is based on unsupervised anomaly detection techniques that learn the signature of normal network traffic. Unsupervised learning does not require the data to be labeled or to be purely of one type, i.e., normal or attack traffic. The approach can be augmented to add any security attributes and quantified trust levels, established during data exchanges among nodes, to the set of cross-layer features from the WSN protocols. A two-stage framework is introduced for the security algorithms to overcome the problems of input size and resource constraints. The first stage is an unsupervised clustering algorithm which reduces the payload of network data packets to a tractable size. The second stage is a traditional anomaly detection algorithm based on a variation of support vector machines (SVMs), whose efficiency is improved by the availability of data in the packet payload. In the first stage, selected algorithms are adapted to WSN platforms to meet system requirements for simple parallel distributed computation, distributed storage and data robustness. A set of mobile software agents, acting like an ant colony in securing the WSN, are distributed at the nodes to implement the algorithms. The agents move among the layers involved in the network response to the intrusions at each active node and trustworthy neighborhood, collecting parametric values and executing assigned decision tasks. This minimizes the need to move large amounts

  2. Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

    NASA Astrophysics Data System (ADS)

    Zhou, Mian; Lang, Sheau-Dong

    2005-03-01

    While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.

  3. Detection of stratospheric ozone intrusions by windprofiler radars.

    PubMed

    Hocking, W K; Carey-Smith, T; Tarasick, D W; Argall, P S; Strong, K; Rochon, Y; Zawadzki, I; Taylor, P A

    2007-11-01

    Stratospheric ozone attenuates harmful ultraviolet radiation and protects the Earth's biosphere. Ozone is also of fundamental importance for the chemistry of the lowermost part of the atmosphere, the troposphere. At ground level, ozone is an important by-product of anthropogenic pollution, damaging forests and crops, and negatively affecting human health. Ozone is critical to the chemical and thermal balance of the troposphere because, via the formation of hydroxyl radicals, it controls the capacity of tropospheric air to oxidize and remove other pollutants. Moreover, ozone is an important greenhouse gas, particularly in the upper troposphere. Although photochemistry in the lower troposphere is the major source of tropospheric ozone, the stratosphere-troposphere transport of ozone is important to the overall climatology, budget and long-term trends of tropospheric ozone. Stratospheric intrusion events, however, are still poorly understood. Here we introduce the use of modern windprofiler radars to assist in such transport investigations. By hourly monitoring the radar-derived tropopause height in combination with a series of frequent ozonesonde balloon launches, we find numerous intrusions of ozone from the stratosphere into the troposphere in southeastern Canada. On some occasions, ozone is dispersed at altitudes of two to four kilometres, but on other occasions it reaches the ground, where it can dominate the ozone density variability. We observe rapid changes in radar tropopause height immediately preceding these intrusion events. Such changes therefore serve as a valuable diagnostic for the occurrence of ozone intrusion events. Our studies emphasize the impact that stratospheric ozone can have on tropospheric ozone, and show that windprofiler data can be used to infer the possibility of ozone intrusions, as well as better represent tropopause motions in association with stratosphere-troposphere transport.

  4. Evaluation and analysis of non-intrusive techniques for detecting illicit substances

    SciTech Connect

    Micklich, B.J.; Roche, C.T.; Fink, C.L.; Yule, T.J.; Demirgian, J.C.; Kunz, T.D.; Ulvick, S.J.; Cui, J.

    1995-12-31

    Argonne National Laboratory (ANL) and the Houston Advanced Research Center (HARC) have been tasked by the Counterdrug Technology Assessment Center of the Office of National Drug Control Policy to conduct evaluations and analyses of technologies for the non-intrusive inspection of containers for illicit substances. These technologies span the range of nuclear, X-ray, and chemical techniques used in nondestructive sample analysis. ANL has performed assessments of nuclear and X-ray inspection concepts and undertaken site visits with developers to understand the capabilities and the range of applicability of candidate systems. ANL and HARC have provided support to law enforcement agencies (LEAs), including participation in numerous field studies. Both labs have provided staff to assist in the Narcotics Detection Technology Assessment (NDTA) program for evaluating drug detection systems. Also, the two labs are performing studies of drug contamination of currency. HARC has directed technical evaluations of automated ballistics imaging and identification systems under consideration by law enforcement agencies. ANL and HARC have sponsored workshops and a symposium, and are participating in a Non-Intrusive Inspection Study being led by Dynamics Technology, Incorporated.

  5. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  6. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET

    PubMed Central

    N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146

  7. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    PubMed

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  8. Application of covert illumination to intrusion surveillance, assessment, and detection

    NASA Astrophysics Data System (ADS)

    Maki, Melvin C.; Scherbarth, Stefan

    1995-05-01

    Covert illumination is an important element in providing surveillance, detection, and assessment for security applications. IR illumination is increasingly providing this function; however, conventional filament-based illuminators have limited performance and life. A new variety of light emitting diode (LED) illuminators is described that provides long life at low power. A further advance is to use a planar array of LED's with lenses to optimize the uniformity of scene illumination and maximize the illumination range. Modern CCD cameras have an inherently high IR sensitivity so are well matched to work with this illumination. Further enhancements are to integrate the combination of low-light camera and LED illuminator in a discrete column type package to make the overall illumination and assessment system unobtrusive. Finally, these components can be further combined with automated assessment aids to turn the surveillance device into a true detection sensor that can operate stand-alone without active personnel monitoring. A review of the major IR design considerations is included, along with several examples of systems to illustrate potential applications.

  9. Laser spectroscopy for totally non-intrusive detection of oxygen in modified atmosphere food packages

    NASA Astrophysics Data System (ADS)

    Cocola, L.; Fedel, M.; Poletto, L.; Tondello, G.

    2015-04-01

    A device for measuring the oxygen concentration inside packages in modified atmosphere working in a completely non-intrusive way has been developed and tested. The device uses tunable diode laser spectroscopy in a geometry similar to a short distance LIDAR: A laser beam is sent through the top film of a food package, and the absorption is measured by detecting the light scattered by the bottom of the container or by a portion of the food herein contained. The device can operate completely in a contactless way from the package, and the distances of absorption both outside and inside the package are measured with a triangulation system. The performances of the device have been tested for various types of containers, and absolute values for the oxygen concentration have been compared with standard albeit destructive measurements.

  10. Verifying the secure setup of Unix client/servers and detection of network intrusion

    SciTech Connect

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

    1995-07-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  11. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network

    PubMed Central

    Sun, Xuemei; Yan, Bo; Zhang, Xinzhong; Rong, Chuitian

    2015-01-01

    Considering wireless sensor network characteristics, this paper combines anomaly and mis-use detection and proposes an integrated detection model of cluster-based wireless sensor network, aiming at enhancing detection rate and reducing false rate. Adaboost algorithm with hierarchical structures is used for anomaly detection of sensor nodes, cluster-head nodes and Sink nodes. Cultural-Algorithm and Artificial-Fish–Swarm-Algorithm optimized Back Propagation is applied to mis-use detection of Sink node. Plenty of simulation demonstrates that this integrated model has a strong performance of intrusion detection. PMID:26447696

  12. Vulnerability of water distribution systems to pathogen intrusion: how effective is a disinfectant residual?

    PubMed

    Propato, Marco; Uber, James G

    2004-07-01

    Can the spread of infectious disease through water distribution systems be halted by a disinfectant residual? This question is overdue for an answer. Regulatory agencies and water utilities have long been concerned about accidental intrusions of pathogens into distribution system pipelines (i.e., cross-connections) and are increasingly concerned about deliberate pathogen contamination. Here, a simulation framework is developed and used to assess the vulnerability of a water system to microbiological contamination. The risk of delivering contaminated water to consumers is quantified by a network water quality model that includes disinfectant decay and disinfection kinetics. The framework is applied to two example networks under a worst-case deliberate intrusion scenario. Results show that the risk of consumer exposure is affected by the residual maintenance strategy employed. The common regulation that demands a "detectable" disinfectant residual may not provide effective consumer protection against microbial contamination. A chloramine residual, instead of free chlorine, may significantly weaken this final barrier against pathogen intrusions. Moreover, the addition of a booster station at storage tanks may improve consumer protection without requiring excessive disinfectant.

  13. An Optimal Method for Detecting Internal and External Intrusion in MANET

    NASA Astrophysics Data System (ADS)

    Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.

    Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.

  14. Detection of Dry Intrusion on Water Vapor Images Over Central Europe - June 2010 TO September 2011

    NASA Astrophysics Data System (ADS)

    Novotny, J.; Dejmal, K.; Hudec, F.; Kolar, P.

    2016-06-01

    The knowledge of evaluation of the intensity of cyclogenesis which could be connected with the weather having a significant impact on Earth's surface is quite useful. If, as one of the basic assumptions, the existence of connection between dry intrusions, dry bands, tropopause height and warm dark areas distribution on water vapor images (WV images) is considered, it is possible to set up a method of detecting dry intrusions on searching and tracking areas with higher brightness temperature compared with the surrounding environment. This paper covers the period between June 2010 and September 2011 over Central Europe. The ISIS method (Instrument de Suivi dans I'Imagerie satellitaire), originally developed for detection of cold cloud tops, was used as an initial ideological point. Subsequently, this method was modified by Michel and Bouttier for usage on WV images. Some of the applied criteria and parameters were chosen with reference to the results published by Michel and Bouttier as well as by Novotny. The procedure can be divided into two steps: detection of warm areas and their tracking. Cases of detection of areas not evidently connected with dry intrusions can be solved by filtering off based on the connection between detected warm areas to the cyclonic side of jet streams and significant lowering of the tropopause.

  15. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors

    PubMed Central

    Choi, Minho; Jeong, Jae Jin; Kim, Seung Hun; Kim, Sang Woo

    2016-01-01

    Non-intrusive electrocardiogram (ECG) monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs) to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements. PMID:27196910

  16. Reduction of Motion Artifacts and Improvement of R Peak Detecting Accuracy Using Adjacent Non-Intrusive ECG Sensors.

    PubMed

    Choi, Minho; Jeong, Jae Jin; Kim, Seung Hun; Kim, Sang Woo

    2016-01-01

    Non-intrusive electrocardiogram (ECG) monitoring has many advantages: easy to measure and apply in daily life. However, motion noise in the measured signal is the major problem of non-intrusive measurement. This paper proposes a method to reduce the noise and to detect the R peaks of ECG in a stable manner in a sitting arrangement using non-intrusive sensors. The method utilizes two capacitive ECG sensors (cECGs) to measure ECG, and another two cECGs located adjacent to the sensors for ECG are added to obtain the information on motion. Then, active noise cancellation technique and the motion information are used to reduce motion noise. To verify the proposed method, ECG was measured indoors and during driving, and the accuracy of the detected R peaks was compared. After applying the method, the sum of sensitivity and positive predictivity increased 8.39% on average and 26.26% maximally in the data. Based on the results, it was confirmed that the motion noise was reduced and that more reliable R peak positions could be obtained by the proposed method. The robustness of the new ECG measurement method will elicit benefits to various health care systems that require noninvasive heart rate or heart rate variability measurements. PMID:27196910

  17. An artificial immune system for securing mobile ad hoc networks against intrusion attacks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-08-01

    To mitigate the problem of intrusion attacks by malicious nodes in mobile ad hoc networks (MANETs), security attributes and quantifiable trust levels, unique to the MANET's transient, self-organizing topology, augment or replace traditional protocol metrics of throughput, packet delay and hop-count in the ad hoc route discovery procedures. The new features are unique to the candidate security protocol, which views security as a quality metric to improve the relevance of the routes discovered by established reactive ad hoc routing protocols. Attributes of a secure route are identified in order to define the appropriate metrics to quantify the "level of security" associated with the protocol messaging and the detection of malicious activities by some intrusive nodes. A state vector of features and metrics based on the published Secure Routing Protocol (SRP) for MANETs is constructed to encode network security characteristics. This route discovery protocol mitigates the detrimental effects of various malicious behaviors to provide trustworthy connectivity information. The protocol ensures that fabricated, compromised, or replayed route replies would either be rejected or never reach the querying source node. In this paper, the pattern of values, taken by the state vector of the SRP features in the route request, discovery and reply operations, are analyzed to detect evidence of intrusion attacks by malicious nodes that could lead to denial of service and network shutdown. The pattern analysis applies a technique based on negative selection found in natural immune systems that can detect extraneous patterns in the (nonself) space that is the complement of vector values associated with correct route discovery and route maintenance. The immune system is well-suited to the distributed nature of the MANET. It does not rely on a central controller, but instead uses a distributed detection and response mechanism in order to respond to foreign invaders, mirroring the

  18. Improved location algorithm for multiple intrusions in distributed Sagnac fiber sensing system.

    PubMed

    Wang, He; Sun, Qizhen; Li, Xiaolei; Wo, Jianghai; Shum, Perry Ping; Liu, Deming

    2014-04-01

    An improved algorithm named "twice-FFT" for multi-point intrusion location in distributed Sagnac sensing system is proposed and demonstrated. To find the null-frequencies more accurately and efficiently, a second FFT is applied to the frequency spectrum of the phase signal caused by intrusion. After Gaussian fitting and searching the peak response frequency in the twice-FFT curve, the intrusion position could be calculated out stably. Meanwhile, the twice-FFT algorithm could solve the problem of multi-point intrusion location. Based on the experiment with twice-FFT algorithm, the location error less than 100m for single intrusion is achieved at any position along the total length of 41km, and the locating ability for two or three intrusions occurring simultaneously is also demonstrated. PMID:24718133

  19. Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques

    NASA Astrophysics Data System (ADS)

    Ozyer, Tansel; Alhajj, Reda; Barker, Ken

    2005-03-01

    This paper proposes an intelligent intrusion detection system (IDS) which is an integrated approach that employs fuzziness and two of the well-known data mining techniques: namely classification and association rule mining. By using these two techniques, we adopted the idea of using an iterative rule learning that extracts out rules from the data set. Our final intention is to predict different behaviors in networked computers. To achieve this, we propose to use a fuzzy rule based genetic classifier. Our approach has two main stages. First, fuzzy association rule mining is applied and a large number of candidate rules are generated for each class. Then the rules pass through pre-screening mechanism in order to reduce the fuzzy rule search space. Candidate rules obtained after pre-screening are used in genetic fuzzy classifier to generate rules for the specified classes. Classes are defined as Normal, PRB-probe, DOS-denial of service, U2R-user to root and R2L- remote to local. Second, an iterative rule learning mechanism is employed for each class to find its fuzzy rules required to classify data each time a fuzzy rule is extracted and included in the system. A Boosting mechanism evaluates the weight of each data item in order to help the rule extraction mechanism focus more on data having relatively higher weight. Finally, extracted fuzzy rules having the corresponding weight values are aggregated on class basis to find the vote of each class label for each data item.

  20. PLC backplane analyzer for field forensics and intrusion detection

    SciTech Connect

    Mulder, John; Schwartz, Moses Daniel; Berg, Michael; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Trent, Jason; Depoy, Jennifer M; Jacob, Joshua

    2015-05-12

    The various technologies presented herein relate to the determination of unexpected and/or malicious activity occurring between components communicatively coupled across a backplane. Control data, etc., can be intercepted at a backplane where the backplane facilitates communication between a controller and at least one device in an automation process. During interception of the control data, etc., a copy of the control data can be made, e.g., the original control data can be replicated to generate a copy of the original control data. The original control data can continue on to its destination, while the control data copy can be forwarded to an analyzer system to determine whether the control data contains a data anomaly. The content of the copy of the control data can be compared with a previously captured baseline data content, where the baseline data can be captured for a same operational state as the subsequently captured control data.

  1. Non-intrusive parallelization of multibody system dynamic simulations

    NASA Astrophysics Data System (ADS)

    González, Francisco; Luaces, Alberto; Lugrís, Urbano; González, Manuel

    2009-09-01

    This paper evaluates two non-intrusive parallelization techniques for multibody system dynamics: parallel sparse linear equation solvers and OpenMP. Both techniques can be applied to existing simulation software with minimal changes in the code structure; this is a major advantage over Message Passing Interface, the standard parallelization method in multibody dynamics. Both techniques have been applied to parallelize a starting sequential implementation of a global index-3 augmented Lagrangian formulation combined with the trapezoidal rule as numerical integrator, in order to solve the forward dynamics of a variable-loop four-bar mechanism. Numerical experiments have been performed to measure the efficiency as a function of problem size and matrix filling. Results show that the best parallel solver (Pardiso) performs better than the best sequential solver (CHOLMOD) for multibody problems of large and medium sizes leading to matrix fillings above 10. OpenMP also proved to be advantageous even for problems of small sizes. Both techniques delivered speedups above 70% of the maximum theoretical values for a wide range of multibody problems.

  2. A Non-Intrusive GMA Welding Process Quality Monitoring System Using Acoustic Sensing

    PubMed Central

    Cayo, Eber Huanca; Alfaro, Sadek Crisostomo Absi

    2009-01-01

    Most of the inspection methods used for detection and localization of welding disturbances are based on the evaluation of some direct measurements of welding parameters. This direct measurement requires an insertion of sensors during the welding process which could somehow alter the behavior of the metallic transference. An inspection method that evaluates the GMA welding process evolution using a non-intrusive process sensing would allow not only the identification of disturbances during welding runs and thus reduce inspection time, but would also reduce the interference on the process caused by the direct sensing. In this paper a nonintrusive method for weld disturbance detection and localization for weld quality evaluation is demonstrated. The system is based on the acoustic sensing of the welding electrical arc. During repetitive tests in welds without disturbances, the stability acoustic parameters were calculated and used as comparison references for the detection and location of disturbances during the weld runs. PMID:22399990

  3. Distributed intrusion monitoring system with fiber link backup and on-line fault diagnosis functions

    NASA Astrophysics Data System (ADS)

    Xu, Jiwei; Wu, Huijuan; Xiao, Shunkun

    2014-12-01

    A novel multi-channel distributed optical fiber intrusion monitoring system with smart fiber link backup and on-line fault diagnosis functions was proposed. A 1× N optical switch was intelligently controlled by a peripheral interface controller (PIC) to expand the fiber link from one channel to several ones to lower the cost of the long or ultra-long distance intrusion monitoring system and also to strengthen the intelligent monitoring link backup function. At the same time, a sliding window auto-correlation method was presented to identify and locate the broken or fault point of the cable. The experimental results showed that the proposed multi-channel system performed well especially whenever any a broken cable was detected. It could locate the broken or fault point by itself accurately and switch to its backup sensing link immediately to ensure the security system to operate stably without a minute idling. And it was successfully applied in a field test for security monitoring of the 220-km-length national borderline in China.

  4. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware

    SciTech Connect

    Tierney, Brian L; Vallentin, Matthias; Sommer, Robin; Lee, Jason; Leres, Craig; Paxson, Vern; Tierney, Brian

    2007-09-19

    In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addresses three challenges: (i) distributing traffic evenly across an extensible set of analysis nodes in a fashion that minimizes the communication required for coordination, (ii) adapting the NIDS's operation to support coordinating its low-level analysis rather than just aggregating alerts; and (iii) validating that the cluster produces sound results. Prototypes of our NIDS cluster now operate at the Lawrence Berkeley National Laboratory and the University of California at Berkeley. In both environments the clusters greatly enhance the power of the network security monitoring.

  5. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  6. Composite synvolcanic intrusions associated with Precambrian VMS-related hydrothermal systems

    NASA Astrophysics Data System (ADS)

    Galley, Alan G.

    2003-06-01

    trondhjemite phases. The trondhjemite phases contain numerous internal contacts indicating emplacement as composite sills. Common structural features of the composite intrusions include early xenolith phases, abundant small comagmatic dikes, fractures and veins and, in places, columnar jointing. Internal phases may differ greatly in texture from fine- to coarse-grained, aphyric and granophyric through seriate to porphyritic. Mineralogical and isotopic evidence indicates that early phases of each composite intrusion are affected by pervasive to fracture-controlled high-temperature (350-450 °C) alteration reflecting seawater-rock interaction. Trondhjemite phases contain hydrothermal-magmatic alteration assemblages within miarolitic cavities, hydrothermal breccias and veins. This hydrothermal-magmatic alteration may, in part, be inherited from previously altered wall rocks. Two of the four intrusions are host to Cu-Mo-rich intrusive breccias and porphyry-type mineralization which formed as much as 14 Ma after the main subvolcanic magmatic activity. The recognition of these Precambrian, subvolcanic composite intrusions is important for greenfields VMS exploration, as they define the location of thermal corridors within extensional oceanic-arc regimes which have the greatest potential for significant VMS mineralization. The VMS mineralization may occur for 2,000 m above the intrusions. In some cases, VMS mineralization has been truncated or enveloped by late trondhjemite phases of the composite intrusions. Evidence that much of the trondhjemitic magmatism postdates the principal VMS activity is a critical factor when developing heat and fluid flow models for these subseafloor magmatic-hydrothermal systems.

  7. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    PubMed

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity.

  8. Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection

    SciTech Connect

    Soldan, D. L.; Ahmed, N.; Stearns, S. D.

    1980-01-01

    The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

  9. Time-resolved seismic tomography detects magma intrusions at Mount Etna.

    PubMed

    Patanè, D; Barberi, G; Cocina, O; De Gori, P; Chiarabba, C

    2006-08-11

    The continuous volcanic and seismic activity at Mount Etna makes this volcano an important laboratory for seismological and geophysical studies. We used repeated three-dimensional tomography to detect variations in elastic parameters during different volcanic cycles, before and during the October 2002-January 2003 flank eruption. Well-defined anomalous low P- to S-wave velocity ratio volumes were revealed. Absent during the pre-eruptive period, the anomalies trace the intrusion of volatile-rich (>/=4 weight percent) basaltic magma, most of which rose up only a few months before the onset of eruption. The observed time changes of velocity anomalies suggest that four-dimensional tomography provides a basis for more efficient volcano monitoring and short- and midterm eruption forecasting of explosive activity. PMID:16902133

  10. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    SciTech Connect

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

  11. Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems

    DOE PAGES

    Najm, Habib N.; Valorani, Mauro

    2014-04-12

    We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-flymore » during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. Lastly, the filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.« less

  12. A Non-Intrusive Pressure Sensor by Detecting Multiple Longitudinal Waves.

    PubMed

    Zhou, Hongliang; Lin, Weibin; Ge, Xiaocheng; Zhou, Jian

    2016-01-01

    Pressure vessels are widely used in industrial fields, and some of them are safety-critical components in the system-for example, those which contain flammable or explosive material. Therefore, the pressure of these vessels becomes one of the critical measurements for operational management. In the paper, we introduce a new approach to the design of non-intrusive pressure sensors, based on ultrasonic waves. The model of this sensor is built based upon the travel-time change of the critically refracted longitudinal wave (LCR wave) and the reflected longitudinal waves with the pressure. To evaluate the model, experiments are carried out to compare the proposed model with other existing models. The results show that the proposed model can improve the accuracy compared to models based on a single wave. PMID:27527183

  13. A Non-Intrusive Pressure Sensor by Detecting Multiple Longitudinal Waves.

    PubMed

    Zhou, Hongliang; Lin, Weibin; Ge, Xiaocheng; Zhou, Jian

    2016-08-05

    Pressure vessels are widely used in industrial fields, and some of them are safety-critical components in the system-for example, those which contain flammable or explosive material. Therefore, the pressure of these vessels becomes one of the critical measurements for operational management. In the paper, we introduce a new approach to the design of non-intrusive pressure sensors, based on ultrasonic waves. The model of this sensor is built based upon the travel-time change of the critically refracted longitudinal wave (LCR wave) and the reflected longitudinal waves with the pressure. To evaluate the model, experiments are carried out to compare the proposed model with other existing models. The results show that the proposed model can improve the accuracy compared to models based on a single wave.

  14. Non-intrusive tunable resonant microwave cavity for optical detected magnetic resonance of NV centres in nanodiamonds

    NASA Astrophysics Data System (ADS)

    Le Floch, Jean-Michel; Bradac, Carlo; Volz, Thomas; Tobar, Michael E.; Castelletto, Stefania

    2013-12-01

    Optically detected magnetic resonance (ODMR) in nanodiamond nitrogen-vacancy (NV) centres is usually achieved by applying a microwave field delivered by micron-size wires, strips or antennas directly positioned in very close proximity (~ μm) of the nanodiamond crystals. The microwave field couples evanescently with the ground state spin transition of the NV centre (2.87 GHz at zero magnetic field), which results in a reduction of the centre photoluminescence. We propose an alternative approach based on the construction of a dielectric resonator. We show that such a resonator allows for the efficient detection of NV spins in nanodiamonds without the constraints associated to the laborious positioning of the microwave antenna next to the nanodiamonds, providing therefore improved flexibility. The resonator is based on a tunable Transverse Electric Mode in a dielectric-loaded cavity, and we demonstrate that the resonator can detect single NV centre spins in nanodiamonds using less microwave power than alternative techniques in a non-intrusive manner. This method can achieve higher precision measurement of ODMR of paramagnetic defects spin transition in the micro to millimetre-wave frequency domain. Our approach would permit the tracking of NV centres in biological solutions rather than simply on the surface, which is desirable in light of the recently proposed applications of using nanodiamonds containing NV centres for spin labelling in biological systems with single spin and single particle resolution.

  15. Conjunctive Management of Multi-Aquifer System for Saltwater Intrusion Mitigation

    NASA Astrophysics Data System (ADS)

    Tsai, F. T. C.; Pham, H. V.

    2015-12-01

    Due to excessive groundwater withdrawals, many water wells in Baton Rouge, Louisiana experience undesirable chloride concentration because of saltwater intrusion. The study goal is to develop a conjunctive management framework that takes advantage of the Baton Rouge multi-aquifer system to mitigate saltwater intrusion. The conjunctive management framework utilizes several hydraulic control techniques to mitigate saltwater encroachment. These hydraulic control approaches include pumping well relocation, freshwater injection, saltwater scavenging, and their combinations. Specific objectives of the study are: (1) constructing scientific geologic architectures of the "800-foot" sand, the "1,000-foot" sand, the "1,200-foot" sand, the "1,500-foot" sand, the "1,700-foot" sand, and the "2,000-foot" sand, (2) developing scientific saltwater intrusion models for these sands. (3) using connector wells to draw native groundwater from one sand and inject to another sand to create hydraulic barriers to halt saltwater intrusion, (4) using scavenger wells or well couples to impede saltwater intrusion progress and reduce chloride concentration in pumping wells, and (5) reducing cones of depression by relocating and dispersing pumping wells to different sands. The study utilizes optimization techniques and newest LSU high performance computing (HPC) facilities to derive solutions. The conjunctive management framework serves as a scientific tool to assist policy makers to solve the urgent saltwater encroachment issue in the Baton Rouge area. The research results will help water companies as well as industries in East Baton Rouge Parish and neighboring parishes by reducing their saltwater intrusion threats, which in turn would sustain Capital Area economic development.

  16. Department of Defense counterdrug technology development of non-intrusive inspection systems

    NASA Astrophysics Data System (ADS)

    Pennella, John J.

    1997-02-01

    The Naval Surface Warfare Center Dahlgren Division serves as the executive agent for the DoD's Contraband Detection and Cargo Container Inspection Technology Development Program. The goal of the DoD non-intrusive inspection (NII) program is to develop prototype equipment that can be used to inspect containers and vehicles, quickly and in large numbers without unnecessary delays in the movement of legitimate cargo. This paper summaries the past accomplishments of the program, current status, and future plans.

  17. Ad Duwayhi, Saudi Arabia: Geology and geochronology of a neoproterozoic intrusion-related gold system in the Arabian shield

    USGS Publications Warehouse

    Doebrich, Jeff L.; Zahony, S.G.; Leavitt, J.D.; Portacio, J.S.; Siddiqui, A.A.; Wooden, Joseph L.; Fleck, Robert J.; Stein, Holly J.

    2004-01-01

    In light of our findings at Ad Duwayhi, a reassessment of similar intrusion-hosted deposits in the Arabian shield is warranted, and areas of late- to postorogenic plutonism, particularly in the Afif composite terrane, should be considered prospective for intrusion-related gold systems.

  18. Detection of ethene and other hydrocarbons in gas turbine engine exhaust using non-intrusive FTIR spectroscopy

    NASA Astrophysics Data System (ADS)

    Arrigone, Giovanni M.; Welch, Michael A.; Hilton, Moira; Miller, Michael N.; Wilson, Christopher W.

    2003-04-01

    As part of the EU funded project AEROJET2, a number of gas turbine engine tests were performed in different facilities around Europe. At Farnborough, UK a Spey engine was used to test a suite of prototype optically based instrumentation designed to measure exhaust gas emissions without using extractive probe systems. In addition to the AEROJET 2 prototype instrumentation, a Bruker Equinox 55 Fourier transform infrared (FTIR) spectrometer was used to obtain infrared spectra of the exhaust plume both in emission and absorption mode. The Bruker FTIR spectrometer was fitted with a periscope system so that different lines of sight could be monitored in the plume in a vertical plane 25 cm downstream from the nozzle exit and 20 cm upstream of the center line of sight of the AEROJET 2 prototype instrumentation. DERA (now QinetiQ) provided exhaust gas analysis data for different engine running conditions using samples extracted from the plume with an intrusive probe. The probe sampled along a horizontal plane across the centerline of the engine 45 cm downstream of the nozzle exit. The Bruker spectrometer used both InSb (indium antimonide) and MCT (mercury-cadmium-telluride) detectors to maximize the sensitivity across the IR range 600-4000 cm-1. Typically, CO2 and H2O IR signatures dominate the observed spectra of the plume. However, the engine tests showed that at low power engine conditions spectral features associated with CO around 2147 cm-1 and with hydrocarbons could be observed at around 3000 cm-1. In particular the presence of ethene (C2H2) was detected from observation of its characteristic in and out of plane vibration mode at 949 cm-1. At high engine powers the presence of NO was detected at 1900.3 cm-1. Species concentrations were calculated using a slab model for each line of sight compared against reference spectra. The engine plume was assumed to be symmetric about the centerline. On this basis, data from the extractive sampling gas analysis that had been

  19. Non-intrusive load monitoring systems: Considerations for use and potential applications

    SciTech Connect

    Sharp, T.R.

    1994-12-31

    The value of measured energy performance data and the desire to acquire them without the cost, complexity, and intrusiveness of standard submetering techniques have led to recent research on non-intrusive load monitoring systems. These systems offer installation simplicity and the ability to discriminate important load changes through high-resolution, higher-speed sampling at a central monitoring point such as a building`s electrical service entrance. Important hardware and installation considerations learned from Oak Ridge National Laboratory`s (ORNL) experience with these systems are reviewed. In addition, the ability to discern important load changes in residential and commercial buildings using these systems is discussed based on recent ORNL experiments in two buildings. Potential applications, with examples, are also discussed. Using a non-intrusive load monitoring system, an experienced user can collect valuable building power profiles that provide insight into building operations, energy use, demand, and building systems problems easily and at low cost. These systems, when available, could be valuable to DSM and energy management professionals, utilities, researchers, building management firms, energy service companies, and others.

  20. Petrogenesis of the Ni-Cu-PGE sulfide-bearing Tamarack Intrusive Complex, Midcontinent Rift System, Minnesota

    NASA Astrophysics Data System (ADS)

    Taranovic, Valentina; Ripley, Edward M.; Li, Chusi; Rossell, Dean

    2015-01-01

    The Tamarack Intrusive Complex (TIC, 1105.6 ± 1.2 Ma) in NE Minnesota, was emplaced during the early stages of the development of the Midcontinent Rift System (MRS, "Early Stage": 1110-1106 Ma). Country rocks of the TIC are those of the Paleoproterozoic Thomson Formation, part of the Animikie Group including sulfide-bearing metasedimentary black shale. The magmatic system is composed of at least two principal mafic-ultramafic intrusive sequences: the sulfide-barren Bowl Intrusion in the south and the "dike" area intrusions in the north which host Ni-Cu-Platinum Group Elements (PGE) mineralization with up to 2.33% Ni, 1.24% Cu, 0.34 g/t Pt, 0.23 g/t Pd and 0.18 g/t Au. Two distinct intrusive units in the "dike" area are the CGO (coarse-grained olivine-bearing) Intrusion, a sub-vertical dike-like body, and the overlying sub-horizontal FGO (fine-grained olivine-bearing) Intrusion. Both intrusions comprise peridotite, feldspathic peridotite, feldspathic pyroxenite, melatroctolite and melagabbro. Massive sulfides are volumetrically minor and mainly occur as lenses emplaced into the country rocks associated with both intrusions. Semi-massive (net-textured) sulfides are distributed at the core of the CGO Intrusion, surrounded by a halo of the disseminated sulfides. Disseminated sulfides also occur in lenses along the base of the FGO Intrusion. Olivine compositions in the CGO Intrusion are between Fo89 and Fo82 and in the FGO Intrusion from Fo84 to Fo82. TIC intrusions have more primitive olivine compositions than that of olivine in the sheet-like intrusions in the Duluth Complex (below Fo70), as well as olivine from the smaller, conduit-related, Eagle and East Eagle Intrusions in Northern Michigan (Fo86 to Fo75). The FeO/MgO ratios of the CGO and FGO Intrusion parental magmas, inferred from olivine compositions, are similar to those of picritic basalts erupted during the early stages of the MRS formation. Trace element ratios differ slightly from other intrusions in the

  1. An analysis of security system for intrusion in Smartphone environment.

    PubMed

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. PMID:25165754

  2. An Analysis of Security System for Intrusion in Smartphone Environment

    PubMed Central

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. PMID:25165754

  3. An analysis of security system for intrusion in Smartphone environment.

    PubMed

    Louk, Maya; Lim, Hyotaek; Lee, HoonJae

    2014-01-01

    There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone--whether for business or personal use--may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.

  4. Force Protection Joint Experiment (FPJE) Battlefield Anti-Intrusion System (BAIS) sensors data analysis and filtering metrics

    NASA Astrophysics Data System (ADS)

    Barngrover, C. M.; Laird, R. T.; Kramer, T. A.; Cruickshanks, J. R.; Cutler, S. H.

    2009-04-01

    The FPJE was an experiment to consider the best way to develop and evaluate a system of systems approach to Force Protection. It was sponsored by Physical Security Equipment Action Group (PSEAG) and Joint Program Manager - Guardian (JPM-G), and was managed by the Product Manager - Force Protection Systems (PM-FPS). The experiment was an effort to utilize existing technical solutions from all branches of the military in order to provide more efficient and effective force protection. The FPJE consisted of four separate Integration Assessments (IA), which were intended as opportunities to assess the status of integration, automation and fusion efforts, and the effectiveness of the current configuration and "system" components. The underlying goal of the FPJE was to increase integration, automation, and fusion of the many different sensors and their data to provide enhanced situational awareness and a common operational picture. One such sensor system is the Battlefield Anti-Intrusion System (BAIS), which is a system of seismic and acoustic unmanned ground sensors. These sensors were originally designed for employment by infantry soldiers at the platoon level to provide early warning of personnel and vehicle intrusion in austere environments. However, when employed around airfields and high traffic areas, the sensitivity of these sensors can cause an excessive number of detections. During the second FPJE-IA all of the BAIS detections and the locations of all Opposing Forces were logged and analyzed to determine the accuracy rate of the sensors. This analysis revealed that with minimal filtering of detections, the number of false positives and false negatives could be reduced substantially to manageable levels while using the sensors within extreme operational acoustic and seismic noise conditions that are beyond the design requirements.

  5. iSSH v. Auditd: Intrusion Detection in High Performance Computing

    SciTech Connect

    Karns, David M.; Protin, Kathryn S.; Wolf, Justin G.

    2012-07-30

    The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks

  6. Implementation of Karp-Rabin string matching algorithm in reconfigurable hardware for network intrusion prevention system

    NASA Astrophysics Data System (ADS)

    Botwicz, Jakub; Buciak, Piotr; Sapiecha, Piotr

    2006-03-01

    Intrusion Prevention Systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. The essential feature of network IPSs is searching through network packets and matching multiple strings, that are fingerprints of known attacks. String matching is highly resource consuming and also the most significant bottleneck of IPSs. In this article an extension of the classical Karp-Rabin algorithm and its implementation architectures were examined. The result is a software, which generates a source code of a string matching module in hardware description language, that could be easily used to create an Intrusion Prevention System implemented in reconfigurable hardware. The prepared module matches the complete set of Snort IPS signatures achieving throughput of over 2 Gbps on an Altera Stratix I1 evaluation board. The most significant advantage of the proposed architecture is that the update of the patterns database does not require reconfiguration of the circuitry.

  7. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  8. Numerical modeling of seawater intrusion into endorheic hydrological systems

    NASA Astrophysics Data System (ADS)

    Kafri, U.; Shalev, E.; Lyakhovsky, V.; Wollman, S.; Yechieli, Y.

    2013-08-01

    Several groundwater endorheic base levels are known in different parts of the world. Some of them allow seawater encroachment into them. Two examples of such groundwater systems, at Lake Asal in the Afar Depression of East Africa and Lago Enriquillo in the Dominican Republic, have been modeled using FEFLOW. The simulated flow pattern reproduces the seawater encroachment all the way from the sea to the endorheic base level. When the water in that base level undergoes concentration to brine through evaporation, the dense brine starts to flow below the encroaching seawater body in the opposite direction toward the sea. These processes reach steady-state conditions in a relatively short time of several hundred years.

  9. The Patuki intrusive suite: closed-system fractionation beneath a slow-spreading ridge

    NASA Astrophysics Data System (ADS)

    Sivell, W. J.; Waterhouse, J. B.

    A wide range of mafic and ultramafic rock types, together with cogenetic silicic plagiogranites, form a structurally coherent intrusive sequence within the Patuki Volcanics at south D'Urville Island, New Zealand. In addition, gabbroic rocks comprise abundant tectonic inclusions in highly-sheared, concordant serpentinite bands which intrude the Patuki suite. Chemical evidence suggests many of the gabbros, including those in which recrystallization has obliterated original textures, represent magmatic cumulates and indicates extensive closed-system fractionation analogous to that known to occur beneath slow-spreading mid-oceanic ridges. Dyke intrusion occurred throughout the generation of the suite. An early stage of spreading is suggested by the anomalously low thickness of the sequence, the non-sheeted nature of the dyke suite and chemical characteristics of the lavas which comprise the extrusive component of the ophiolite.

  10. Non-intrusive rattle noise detection in non-stationary conditions by an angle/time cyclostationary approach

    NASA Astrophysics Data System (ADS)

    Baudin, Sophie; Rémond, Didier; Antoni, Jérôme; Sauvage, Olivier

    2016-03-01

    This work proposes an original non-intrusive approach to detect and quantify rattle noise in automotive gearboxes operating under non-stationary conditions by means of vibration or instantaneous angular speed measurements. Rattle noise is produced by vibro impacts between teeth of unloaded gears excited by the engine acyclism. It appears during acceleration or deceleration phases and its detection requires the analysis of non-stationary signals. In order to take advantage of the repetitive nature of the impacts, an angle/time cyclostationary approach is introduced. Rattle noise is thus characterized through the angle/time duality: the cyclic frequency expressed in events per revolution is directly linked to the periodicity of the impacts while their frequency content is expressed in Hertz. The proposed detection method uses an order/frequency spectral coherence and may be applied either on vibration signals or instantaneous angular speed signals. For validation purposes, a specific instrumentation of a gearbox is set up. The relative speed of the unloaded meshing gears is observed by means of optical encoders to directly detect the instants of impact which then serve as a basis for validation of the non-intrusive detection method proposed in this paper.

  11. Network Intrusion Detection Based on a General Regression Neural Network Optimized by an Improved Artificial Immune Algorithm

    PubMed Central

    Wu, Jianfa; Peng, Dahao; Li, Zhuping; Zhao, Li; Ling, Huanzhang

    2015-01-01

    To effectively and accurately detect and classify network intrusion data, this paper introduces a general regression neural network (GRNN) based on the artificial immune algorithm with elitist strategies (AIAE). The elitist archive and elitist crossover were combined with the artificial immune algorithm (AIA) to produce the AIAE-GRNN algorithm, with the aim of improving its adaptivity and accuracy. In this paper, the mean square errors (MSEs) were considered the affinity function. The AIAE was used to optimize the smooth factors of the GRNN; then, the optimal smooth factor was solved and substituted into the trained GRNN. Thus, the intrusive data were classified. The paper selected a GRNN that was separately optimized using a genetic algorithm (GA), particle swarm optimization (PSO), and fuzzy C-mean clustering (FCM) to enable a comparison of these approaches. As shown in the results, the AIAE-GRNN achieves a higher classification accuracy than PSO-GRNN, but the running time of AIAE-GRNN is long, which was proved first. FCM and GA-GRNN were eliminated because of their deficiencies in terms of accuracy and convergence. To improve the running speed, the paper adopted principal component analysis (PCA) to reduce the dimensions of the intrusive data. With the reduction in dimensionality, the PCA-AIAE-GRNN decreases in accuracy less and has better convergence than the PCA-PSO-GRNN, and the running speed of the PCA-AIAE-GRNN was relatively improved. The experimental results show that the AIAE-GRNN has a higher robustness and accuracy than the other algorithms considered and can thus be used to classify the intrusive data. PMID:25807466

  12. Three-dimensional hydrostratigraphical modelling to support evaluation of recharge and saltwater intrusion in a coastal groundwater system in Vietnam

    NASA Astrophysics Data System (ADS)

    Tam, Vu Thanh; Batelaan, Okke; Le, Tran Thanh; Nhan, Pham Quy

    2014-12-01

    Saltwater intrusion is generally related to seawater-level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface plays an important role in (non-)intrusion as well. Local hydrogeological conditions for recharge and saltwater intrusion are studied in a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A three-dimensional (3D) hydrostratigraphical solid model of the study area is constructed by way of a recursive classification procedure. The procedure includes a cluster analysis which uses as parameters geological formation, lithological composition, distribution depth and thickness of each lithologically distinctive drilling interval of 47 boreholes, to distinguish and map well-log intervals of similar lithological properties in different geological formations. A 3D hydrostratigraphical fence diagram is then generated from the constructed solid model and is used as a tool to evaluate recharge paths and saltwater intrusion to the groundwater system. Groundwater level and chemistry, and geophysical direct current (DC) resistivity measurements, are used to support the hydrostratigraphical model. Results of this research contribute to the explanation of why the aquifer system of the study area is almost uninfluenced by saltwater intrusion, which is otherwise relatively common in coastal aquifers of Vietnam.

  13. An evaluation of interior video motion detection systems

    SciTech Connect

    Vigil, J.T.

    1993-02-01

    This report discusses the testing and evaluation of five commercially available interior video emotion detection (VMD) systems. Three digital VMDs and two analog VMDs were tested. The report focuses on nuisance alarm data and on intrusion detection results. Tests were conducted in a high-bay (warehouse) location and in an office.

  14. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  15. Bald Mountain gold mining district, Nevada: A Jurassic reduced intrusion-related gold system

    USGS Publications Warehouse

    Nutt, C.J.; Hofstra, A.H.

    2007-01-01

    The Bald Mountain mining district has produced about 2 million ounces (Moz) of An. Geologic mapping, field relationships, geochemical data, petrographic observations, fluid inclusion characteristics, and Pb, S, O, and H isotope data indicate that An mineralization was associated with a reduced Jurassic intrusion. Gold deposits are localized within and surrounding a Jurassic (159 Ma) quartz monzonite porphyry pluton and dike complex that intrudes Cambrian to Mississippian carbonate and clastic rocks. The pluton, associated dikes, and An mineralization were controlled by a crustal-scale northwest-trending structure named the Bida trend. Gold deposits are localized by fracture networks in the pluton and the contact metamorphic aureole, dike margins, high-angle faults, and certain strata or shale-limestone contacts in sedimentary rocks. Gold mineralization was accompanied by silicification and phyllic alteration, ??argillic alteration at shallow levels. Although An is typically present throughout, the system exhibits a classic concentric geochemical zonation pattern with Mo, W, Bi, and Cu near the center, Ag, Pb, and Zn at intermediate distances, and As and Sb peripheral to the intrusion. Near the center of the system, micron-sized native An occurs with base metal sulfides and sulfosalts. In peripheral deposits and in later stages of mineralization, Au is typically submicron in size and resides in pyrite or arsenopyrite. Electron microprobe and laser ablation ICP-MS analyses show that arsenopyrite, pyrite, and Bi sulfide minerals contain 10s to 1,000s of ppm Au. Ore-forming fluids were aqueous and carbonic at deep levels and episodically hypersaline at shallow levels due to boiling. The isotopic compositions of H and O in quartz and sericite and S and Pb in sulfides are indicative of magmatic ore fluids with sedimentary sulfur. Together, the evidence suggests that Au was introduced by reduced S-bearing magmatic fluids derived from a reduced intrusion. The reduced

  16. Design of no blind area perimeter intrusion recognition system based on fisheye lens

    NASA Astrophysics Data System (ADS)

    Dai, Jun-jian; Han, Wen-bo

    2013-08-01

    The Perimeter intrusion recognition technology has slowly become an indispensable function in the intelligent video surveillance system. The existed always use the multiple video acquisition nodes to respectively control a monitoring area and each node alarm independently. However, the existed solutions are difficult to avoid the existence of monitoring blind area, and can't suitable for the perimeter environment with irregular outline, and at the same time, because of the too many nodes, it inevitably decreased the overall accuracy of intrusion recognition system and increased the cost of system. To avoid the above defects, this paper mainly talks about the following three aspects. Firstly, we used the fisheye lens as the optical system of video acquisition node, and it evidently enhances each node's information acquisition ability. And in this way, we just need to decorate a small amount of video acquisition node to get no blind area environmental information of the perimeter when against a larger monitoring situation. Secondly, due to the inexistence of blind area, the system will have enough video image information to generate the 360 degree panoramic image for monitoring environment, and finally the system server collected the wide-angle image information to splice into the panoramic video image. Finally, the system will use the panoramic image to complete the intrusion behavior recognition, thus we can effectively avoid the parallel computation in many nodes independently invasion of recognition, and this can greatly reduces the dependence for the multiple CPU operation platform and enhances the reliability of the system. The field test results show that, with the help of this paper's solution, the perimeter of the invasion of recognition system can effectively avoids the recognition of blind area. In the same recognition algorithm and same level delay premise, it greatly reduces the monitoring system server configuration requirements, especially for the

  17. Reactive and multiphase modelling for the identification of monitoring parameters to detect CO2 intrusion into freshwater aquifers

    NASA Astrophysics Data System (ADS)

    Fahrner, S.; Schaefer, D.; Wiegers, C.; Köber, R.; Dahmke, A.

    2011-12-01

    A monitoring at geological CO2 storage sites has to meet environmental, regulative, financial and public demands and thus has to enable the detection of CO2 leakages. Current monitoring concepts for the detection of CO2 intrusion into freshwater aquifers located above saline storage formations in course of leakage events lack the identification of monitoring parameters. Their response to CO2 intrusion still has to be enlightened. Scenario simulations of CO2 intrusion in virtual synthetic aquifers are performed using the simulators PhreeqC and TOUGH2 to reveal relevant CO2-water-mineral interactions and multiphase behaviour on potential monitoring parameters. The focus is set on pH, total dissolved inorganic carbon (TIC) and the hydroelectric conductivity (EC). The study aims at identifying at which conditions the parameters react rapidly, durable and in a measurable degree. The depth of the aquifer, the mineralogy, the intrusion rates, the sorption specification and capacities, and groundwater flow velocities are varied in the course of the scenario modelling. All three parameters have been found suited in most scenarios. However, in case of a lack of calcite combined with low saturation of the water with respect to CO2 and shallow conditions, changes are close to the measurement resolution. Predicted changes in EC result from the interplay between carbonic acid production and its dissociation, and pH buffering by mineral dissolution. The formation of a discrete gas phase in cases of full saturation of the groundwater in confined aquifers illustrates the potential bipartite resistivity response: An increased hydroelectric conductivity at locations with dissolved CO2, and a high resistivity where the gas phase dominates the pore volume occupation. Increased hydrostatic pressure with depth and enhanced groundwater flow velocities enforce gas dissolution and diminish the formation of a discrete gas phase. Based on the results, a monitoring strategy is proposed which

  18. An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems

    NASA Astrophysics Data System (ADS)

    Hieb, Jeffrey; Graham, James; Guan, Jian

    This paper presents an ontological framework that permits formal representations of process control systems, including elements of the process being controlled and the control system itself. A fault diagnosis algorithm based on the ontological model is also presented. The algorithm can identify traditional process elements as well as control system elements (e.g., IP network and SCADA protocol) as fault sources. When these elements are identified as a likely fault source, the possibility exists that the process fault is induced by a cyber intrusion. A laboratory-scale distillation column is used to illustrate the model and the algorithm. Coupled with a well-defined statistical process model, this fault diagnosis approach provides cyber security enhanced fault diagnosis information to plant operators and can help identify that a cyber attack is underway before a major process failure is experienced.

  19. Cyber-intrusion Auto-response and Policy Management System (CAPMS)

    SciTech Connect

    Lusk, Steve; Lawrence, David; Suvana, Prakash

    2015-11-11

    The Cyber-intrusion Auto-response and Policy Management System (CAPMS) project was funded by a grant from the US Department of Energy (DOE) Cybersecurity for Energy Delivery Systems (CEDS) program with contributions from two partner electric utilities: Southern California Edison (SCE) and Duke Energy. The goal of the project was to demonstrate protecting smart grid assets from a cyber attack in a way that “does not impede critical energy delivery functions.” This report summarizes project goals and activities for the CAPMS project and explores what did and did not work as expected. It concludes with an assessment of possible benefits and value of the system for the future.

  20. A Non-Intrusive Pressure Sensor by Detecting Multiple Longitudinal Waves

    PubMed Central

    Zhou, Hongliang; Lin, Weibin; Ge, Xiaocheng; Zhou, Jian

    2016-01-01

    Pressure vessels are widely used in industrial fields, and some of them are safety-critical components in the system—for example, those which contain flammable or explosive material. Therefore, the pressure of these vessels becomes one of the critical measurements for operational management. In the paper, we introduce a new approach to the design of non-intrusive pressure sensors, based on ultrasonic waves. The model of this sensor is built based upon the travel-time change of the critically refracted longitudinal wave (LCR wave) and the reflected longitudinal waves with the pressure. To evaluate the model, experiments are carried out to compare the proposed model with other existing models. The results show that the proposed model can improve the accuracy compared to models based on a single wave. PMID:27527183

  1. Monitoring and Assessment of Saltwater Intrusion using Geographic Information Systems (GIS), Remote Sensing and Geophysical measurements of Guimaras Island, Philippines

    NASA Astrophysics Data System (ADS)

    Hernandez, B. C. B.

    2015-12-01

    Degrading groundwater quality due to saltwater intrusion is one of the key challenges affecting many island aquifers. These islands hold limited capacity for groundwater storage and highly dependent on recharge due to precipitation. But its ease of use, natural storage and accessibility make it more vulnerable to exploitation and more susceptible to encroachment from its surrounding oceanic waters. Estimating the extent of saltwater intrusion and the state of groundwater resources are important in predicting and managing water supply options for the community. In Guimaras island, central Philippines, increasing settlements, agriculture and tourism are causing stresses on its groundwater resource. Indications of saltwater intrusion have already been found at various coastal areas in the island. A Geographic Information Systems (GIS)-based approach using the GALDIT index was carried out. This includes six parameters assessing the seawater intrusion vulnerability of each hydrogeologic setting: Groundwater occurrence, Aquifer hydraulic conductivity, Groundwater Level above sea, Distance to shore, Impact of existing intrusion and Thickness of Aquifer. To further determine the extent of intrusion, Landsat images of various thematic layers were stacked and processed for unsupervised classification and electrical resistivity tomography using a 28-electrode system with array lengths of 150 and 300 meters was conducted. The GIS index showed where the vulnerable areas are located, while the geophysical measurements and images revealed extent of seawater encroachment along the monitoring wells. These results are further confirmed by the measurements collected from the monitoring wells. This study presents baseline information on the state of groundwater resources and increase understanding of saltwater intrusion dynamics in island ecosystems by providing a guideline for better water resource management in the Philippines.

  2. Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse

    SciTech Connect

    Czejdo, Bogdan; Ferragut, Erik M; Goodall, John R; Laska, Jason A

    2012-01-01

    The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

  3. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  4. The potential for health risks from intrusion of contaminants into the distribution system from pressure transients.

    PubMed

    LeChevallier, Mark W; Gullick, Richard W; Karim, Mohammad R; Friedman, Melinda; Funk, James E

    2003-03-01

    The potential for public health risks associated with intrusion of contaminants into water supply distribution systems resulting from transient low or negative pressures is assessed. It is shown that transient pressure events occur in distribution systems; that during these negative pressure events pipeline leaks provide a potential portal for entry of groundwater into treated drinking water; and that faecal indicators and culturable human viruses are present in the soil and water exterior to the distribution system. To date, all observed negative pressure events have been related to power outages or other pump shutdowns. Although there are insufficient data to indicate whether pressure transients are a substantial source of risk to water quality in the distribution system, mitigation techniques can be implemented, principally the maintenance of an effective disinfectant residual throughout the distribution system, leak control, redesign of air relief venting, and more rigorous application of existing engineering standards. Use of high-speed pressure data loggers and surge modelling may have some merit, but more research is needed. PMID:15384268

  5. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    ERIC Educational Resources Information Center

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  6. Future Volcanism at Yucca Mountain - Statistical Insights from the Non-Detection of Basalt Intrusions in the Potential Repository

    NASA Astrophysics Data System (ADS)

    Coleman, N.; Abramson, L.

    2004-05-01

    Yucca Mt. (YM) is a potential repository site for high-level radioactive waste and spent fuel. One issue is the potential for future igneous activity to intersect the repository. If the event probability is <1E-8/yr, it need not be considered in licensing. Plio-Quaternary volcanos and older basalts occur near YM. Connor et al (JGR, 2000) estimate a probability of 1E-8/yr to 1E-7/yr for a basaltic dike to intersect the potential repository. Based on aeromagnetic data, Hill and Stamatakos (CNWRA, 2002) propose that additional volcanos may lie buried in nearby basins. They suggest if these volcanos are part of temporal-clustered volcanic activity, the probability of an intrusion may be as high as 1E-6/yr. We examine whether recurrence probabilities >2E-7/yr are realistic given that no dikes have been found in or above the 1.3E7 yr-old potential repository block. For 2E-7/yr (or 1E-6/yr), the expected number of penetrating dikes is 2.6 (respectively, 13), and the probability of at least one penetration is 0.93 (0.999). These results are not consistent with the exploration evidence. YM is one of the most intensively studied places on Earth. Over 20 yrs of studies have included surface and subsurface mapping, geophysical surveys, construction of 10+ km of tunnels in the mountain, drilling of many boreholes, and construction of many pits (DOE, Site Recommendation, 2002). It seems unlikely that multiple dikes could exist within the proposed repository footprint and escape detection. A dike complex dated 11.7 Ma (Smith et al, UNLV, 1997) or 10 Ma (Carr and Parrish, 1985) does exist NW of YM and west of the main Solitario Canyon Fault. These basalts intruded the Tiva Canyon Tuff (12.7 Ma) in an epoch of caldera-forming pyroclastic eruptions that ended millions of yrs ago. We would conclude that basaltic volcanism related to Miocene silicic volcanism may also have ended. Given the nondetection of dikes in the potential repository, we can use a Poisson model to estimate an

  7. Scanning Seismic Intrusion Detector

    NASA Technical Reports Server (NTRS)

    Lee, R. D.

    1982-01-01

    Scanning seismic intrusion detector employs array of automatically or manually scanned sensors to determine approximate location of intruder. Automatic-scanning feature enables one operator to tend system of many sensors. Typical sensors used with new system are moving-coil seismic pickups. Detector finds uses in industrial security systems.

  8. Geophysical characterization of hydrothermal systems and intrusive bodies, El Chichón volcano (Mexico)

    NASA Astrophysics Data System (ADS)

    Jutzeler, Martin; Varley, Nick; Roach, Michael

    2011-04-01

    The 1982 explosive eruptions of El Chichón volcano (Chiapas, Mexico) destroyed the inner dome and created a 1-km-wide and 180-m-deep crater within the somma crater. A shallow hydrothermal system was exposed to the surface of the new crater floor and is characterized by an acid crater lake, a geyser-like Cl-rich spring (soap pool), and numerous fumarole fields. Multiple geophysical surveys were performed to define the internal structure of the volcanic edifice and its hydrothermal system. We carried out a high-resolution ground-based geomagnetic survey in the 1982 crater and its surroundings and 38 very low frequency (VLF) transects around the crater lake. A 3-D inversion of the ground-based magnetic data set highlighted three high-susceptibility isosurfaces, interpreted as highly magnetized bodies beneath the 1982 crater floor. Inversion of a digitized regional aeromagnetic map highlighted four major deeply rooted cryptodomes, corresponding to major topographic highs and massive lava dome outcrops outside and on the somma rim. The intracrater magnetic bodies correspond closely to the active hydrothermal vents and their modeled maximum basal depth matches the elevation of the springs on the flanks of the volcano. Position, dip, and vertical extent of active and extinct hydrothermal vents identified by VLF-EM surveys match the magnetic data set. We interpret the shallow lake spring hydrothermal system to be mostly associated with buried remnants of the 550 BP dome, but the Cl-rich soap pool may be connected to a small intrusion emplaced at shallow depth during the 1982 eruption.

  9. A non-intrusive oil temperature measurement method of hydraulic system.

    PubMed

    Cai, Wei; Yang, Zhi-Yong; Xu, Wen-Hua; Dai, Min-Qiang

    2014-12-01

    This paper proposed a simple non-intrusive oil temperature measurement method to overcome the shortcomings of the traditional intrusive one. The heat transmission model between outer and inner tube wall, the temperature distribution model of oil near the inner tube wall, and the temperature distribution model of oil in tube were established, respectively, based on the energy conservation principle. With the constructed models, we can measure the temperature of oil in tube by surveying the temperature of outer tube wall and the temperature of air around the tube. An oil temperature measurement apparatus was designed to demonstrate the new method. We measured the temperature of No. 46 antiwear hydraulic oil under 5 MPa, 15 MPa, and 25 MPa, respectively. Comparative results with traditional intrusive oil temperature measurement method show that the measurement error of the presented method is less than 1 °C, and thus implies its superiority.

  10. A surrogate model for simulation-optimization of aquifer systems subjected to seawater intrusion

    NASA Astrophysics Data System (ADS)

    Hussain, Mohammed S.; Javadi, Akbar A.; Ahangar-Asr, Alireza; Farmani, Raziyeh

    2015-04-01

    This study presents the application of Evolutionary Polynomial Regression (EPR) as a pattern recognition system to predicate the behavior of nonlinear and computationally complex aquifer systems subjected to seawater intrusion (SWI). The developed EPR models are integrated with a multi objective genetic algorithm to examine the efficiency of different arrangements of hydraulic barriers in controlling SWI. The objective of the optimization is to minimize the economic and environmental costs. The developed EPR model is trained and tested for different control scenarios, on sets of data including different pumping patterns as inputs and the corresponding set of numerically calculated outputs. The results are compared with those obtained by direct linking of the numerical simulation model with the optimization tool. The results of the two above-mentioned simulation-optimization (S/O) strategies are in excellent agreement. Three management scenarios are considered involving simultaneous use of abstraction and recharge to control SWI. Minimization of cost of the management process and the salinity levels in the aquifer are the two objective functions used for evaluating the efficiency of each management scenario. By considering the effects of the unsaturated zone, a subsurface pond is used to collect the water and artificially recharge the aquifer. The distinguished feature of EPR emerges in its application as the metamodel in the S/O process where it significantly reduces the overall computational complexity and time. The results also suggest that the application of other sources of water such as treated waste water (TWW) and/or storm water, coupled with continuous abstraction of brackish water and its desalination and use is the most cost effective method to control SWI. A sensitivity analysis is conducted to investigate the effects of different external sources of recharge water and different recovery ratios of desalination plant on the optimal results.

  11. Acoustic leak detection system

    SciTech Connect

    Peacock, M.J.

    1993-08-03

    An acoustic leak detection system is described for determining the location of leaks in storage tanks, comprising: (a) sensor means for detecting a leak signal; (b) data acquisition means for digitizing and storing leak signals meeting preset criterion; and (c) analysis means for analyzing the digitized signals and computing the location of the source of the leak signals.

  12. Estimation of preferential recharge and saltwater intrusion to a coastal groundwater system in central Vietnam by means of 3D stratigraphic modeling

    NASA Astrophysics Data System (ADS)

    Thanh Tam, Vu; Batelaan, Okke; Thanh Le, Tran

    2013-04-01

    Saltwater intrusion is worldwide regarded as a major threat to groundwater resources. Mostly, saltwater intrusion problems are related to sea water level rise or induced intrusion due to excessive groundwater extraction in coastal aquifers. However, the hydrogeological heterogeneity of the subsurface might play an important role in (non-)intrusion as well. We study local (hydro)geological conditions for preferential recharge as well as saltwater intrusion to a coastal groundwater system in Vietnam where geological formations exhibit highly heterogeneous lithologies. A cluster analysis technique combined with a chronographic marker is used to distinguish and map well-log intervals of similar lithological properties in different geological formations. The cluster analysis is carried out on lithological composition, distribution depth and thickness of each lithological distinctive drilling interval of well-logs of 43 groundwater investigation boreholes carried out within the study area. The chronographic marker is a layer of clay originated from weathered basalt rocks, whose color and lithological properties can be distinguished from the other formations. Detailed to coarse 3D stratigraphic models, based on the above analysis, are constructed and used as a tool to estimate preferential recharge paths and saltwater intrusion to the groundwater system under study. Chemical analysis of groundwater water samples is also used to support the estimation. Result of this research work contributes to the interpretation of why the aquifer system of the study area is almost uninfluenced by saltwater intrusion which is relatively common in coastal aquifers of Vietnam.

  13. Idaho Explosive Detection System

    ScienceCinema

    Klinger, Jeff

    2016-07-12

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  14. Idaho Explosive Detection System

    SciTech Connect

    Klinger, Jeff

    2011-01-01

    Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

  15. Underwater laser detection system

    NASA Astrophysics Data System (ADS)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  16. The Eagle and East Eagle sulfide ore-bearing mafic-ultramafic intrusions in the Midcontinent Rift System, upper Michigan: Geochronology and petrologic evolution

    NASA Astrophysics Data System (ADS)

    Ding, Xin; Li, Chusi; Ripley, Edward M.; Rossell, Dean; Kamo, Sandra

    2010-03-01

    The Eagle and East Eagle intrusions are small, subvertical dike-like mafic-ultramafic bodies that cut Proterozoic sedimentary strata in the Baraga Basin in northern Michigan. The Eagle intrusion hosts a newly discovered magmatic Ni-Cu-PGE deposit. The nearby East Eagle intrusion also contains sulfide mineralization, but the extent of this mineralization has yet to be determined by further drilling. Both intrusions contain olivine-bearing rocks such as feldspathic peridotite, melatroctolite, and olivine melagabbro. Sulfide accumulations range from disseminated at both Eagle and East Eagle to semimassive and massive at Eagle. U-Pb baddeleyite dating gives a crystallization age of 1107.2 ± 5.7 Ma for the Eagle intrusion, coeval with eruption of picritic basalts at the base of the volcanic succession in the Midcontinent Rift System (MRS). The Fo contents of olivine cores in the Eagle and East Eagle intrusions vary between 75 and 85 mol %, higher than those of olivine in larger layered intrusions in the MRS such as the Duluth Complex. The FeO/MgO ratios and Al2O3 contents of the parental magmas for the Eagle and East Eagle intrusions inferred from olivine and spinel compositions are similar to those of picritic basalts in the base of the MRS volcanic succession. These petrochemical data suggest that the Eagle and East Eagle intrusions are the intrusive equivalents of high-MgO basalts that erupted in the early stages of continental magmatism associated with the development of the rift. Variations in mineral compositions and incompatible trace element ratios suggest that at least three major pulses of magmas were involved in the formation of low-sulfide rocks in the Eagle intrusion. Lower Fo contents of olivine associated with semimassive sulfides as compared to that of olivine in low-sulfide rocks suggest that the magma associated with the semimassive sulfide was more fractionated than the parental magmas of the low-sulfide rocks in the Eagle intrusion. Accumulation of

  17. Portable pathogen detection system

    SciTech Connect

    Colston, Billy W.; Everett, Matthew; Milanovich, Fred P.; Brown, Steve B.; Vendateswaran, Kodumudi; Simon, Jonathan N.

    2005-06-14

    A portable pathogen detection system that accomplishes on-site multiplex detection of targets in biological samples. The system includes: microbead specific reagents, incubation/mixing chambers, a disposable microbead capture substrate, and an optical measurement and decoding arrangement. The basis of this system is a highly flexible Liquid Array that utilizes optically encoded microbeads as the templates for biological assays. Target biological samples are optically labeled and captured on the microbeads, which are in turn captured on an ordered array or disordered array disposable capture substrate and then optically read.

  18. Solar system fault detection

    NASA Astrophysics Data System (ADS)

    Farrington, R. B.; Pruett, J. C., Jr.

    1984-05-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combing the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  19. Solar system fault detection

    DOEpatents

    Farrington, Robert B.; Pruett, Jr., James C.

    1986-01-01

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  20. Solar system fault detection

    DOEpatents

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  1. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    NASA Astrophysics Data System (ADS)

    McEvoy, Thomas Richard; Wolthusen, Stephen D.

    Recent research on intrusion detection in supervisory data acquisition and control (SCADA) and DCS systems has focused on anomaly detection at protocol level based on the well-defined nature of traffic on such networks. Here, we consider attacks which compromise sensors or actuators (including physical manipulation), where intrusion may not be readily apparent as data and computational states can be controlled to give an appearance of normality, and sensor and control systems have limited accuracy. To counter these, we propose to consider indirect relations between sensor readings to detect such attacks through concurrent observations as determined by control laws and constraints.

  2. Idaho Explosives Detection System

    SciTech Connect

    Edward L. Reber; J. Keith Jewell; Larry G. Blackwood; Andrew J. Edwards; Kenneth W. Rohde; Edward H. Seabury

    2004-10-01

    The Idaho Explosives Detection System (IEDS) was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-minute measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

  3. Minimally Intrusive and Nonintrusive Supersonic Injectors for LANTR and RBCC/Scramjet Propulsion Systems

    NASA Astrophysics Data System (ADS)

    Buggele, Alvin E.; Gallagher, John R.

    2002-10-01

    A family of supersonic injectors for use on spaceplanes, rockets and missiles and the like is disclosed and claimed. Each injector maintains a specific constant (uniform) Mach number along its length when used while being minimally intrusive at significantly higher injectant pressure than combuster freestream total pressure. Each injector is substantially non-intrusive when it is not being used. The injectors may be used individually or in a group. Different orientations of the injectors in a group promotes greater penetration and mixing of fuel or oxidizer into a supersonic combustor. The injectors can be made from single piece of Aluminum, investment cast metal, or ceramic or they can be made from starboard and port blocks strapped together to accurately control the throat area. Each injector includes an elongated body having an opening which in cross section is an hour glass (venturi shaped) and the opening diverges in width and depth from the bow section to the stem section of the opening.

  4. The behavior of double-diffusive intrusion in a rotating system

    SciTech Connect

    Yoshida, J. ); Nagashima, H. ); Niino, H. )

    1989-04-15

    The effects of Earth's rotation on the stability of a thermohaline front of finite width are studied by means of a linear theory. It is found that when the rotation is present, two different types of unstable modes are possible. When the front is narrow and a Rossby radius of deformation based on Ruddick and Turner's (1979) vertical scale is large in comparison with the width of the front, the fastest growing intrusion is nearly two dimensional (nonrotational mode), and its vertical scale is given by Ruddick and Turner's scale. When the Rossby radius becomes small, in addition to the nonrotational mode there appears another unstable mode (the rotational mode) which has a smaller vertical wave number than the nonrotational mode. With the introduction of rotation, the fastest growing mode has nonzero along-frontal wave number; that is, the intrusion becomes tilted in the along-frontal direction. When the Rossby radius of deformation is sufficiently small in comparison with the width of the front, transition from the nonrotational mode to the rotational one occurs. The transition from nonrotational to rotational mode becomes less pronounced when the width of the front is increased for fixed horizontal density-compensating gradients of temperature and salinity. For a wide front the growth rate and vertical wave number for both modes becomes similar, which agrees with the results of previous studies for infinite fronts that rotation does not modify the behavior of the intrusion except for the occurrence of along-frontal tilt.

  5. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J.

    1975-01-01

    A monitoring system developed to test the capability of a water recovery system to reject the passage of viruses into the recovered water is described. A nonpathogenic marker virus, bacteriophage F2, is fed into the process stream before the recovery unit and the reclaimed water is assayed for its presence. Detection of the marker virus consists of two major components, concentration and isolation of the marker virus, and detection of the marker virus. The concentration system involves adsorption of virus to cellulose acetate filters in the presence of trivalent cations and low pH with subsequent desorption of the virus using volumes of high pH buffer. The detection of the virus is performed by a passive immune agglutination test utilizing specially prepared polystyrene particles. An engineering preliminary design was performed as a parallel effort to the laboratory development of the marker virus test system. Engineering schematics and drawings of a fully functional laboratory prototype capable of zero-G operation are presented. The instrument consists of reagent pump/metering system, reagent storage containers, a filter concentrator, an incubation/detector system, and an electronic readout and control system.

  6. Sills as Piecemeal Emplacements of a Layered Intrusion: The Ferrar Magmatic System, Dry Valleys, Antarctica

    NASA Astrophysics Data System (ADS)

    Marsh, B. D.

    2007-12-01

    exclusively in the tongue over a vast region (~104 km3). The Opx Tongue thickness decreases radially throughout the region from Bull Pass. Everywhere within the Tongue, and only within the Tongue, are pervasive signs of crystal sorting and layering. Local ponding in a deeper recess has formed a small (~600 m thick), well-defined, layered body with many of the sorting features of large layered bodies. This is the Dais Intrusion. Rapid cooling over ~2,000 yrs. has preserved diagnostic textural relations that are annealed out in much larger layered bodies. The next highest sill, Peneplain Sill, also shows layering and the incipient development of an Opx Tongue near Bull Pass, but the other upper two sills each show no Tongue and are progressively poorer in MgO. The overall package shows strong differentiation radially and vertically. The lesson: were these same injections to form a single chambered magma, following the enumerated emplacement sequence, beginning with phenocryst-free tholeiites and concluding with heavy inputs of opx-rich ultramafics, the final result would most likely be a major layered body. (Continual stretching with intermittent injection would mimic an ocean ridge system.) Slow cooling would promote an extensive annealing to sharpen and accentuate the initial modal layering and enhance the initial cryptic layering. Initial conditions are exceedingly difficult to uncover, but their importance is fundamental to understanding the final product.

  7. Intrusive STM imaging

    NASA Astrophysics Data System (ADS)

    Boulanger-Lewandowski, Nicolas; Rochefort, Alain

    2011-03-01

    An interactive scanning tunneling microscopy (STM) simulator has been designed to efficiently compute the effects of chemical and structural modifications of adsorbed species on resulting STM images. Our general approach is based on first-order perturbation theory that takes into account different tip geometries. In our intrusive STM imaging strategy, we consider small variations such as substitutions, vacancies, functionalizations, and molecular reorganizations from a reference system. First, we show that our perturbation theory approach can provide STM images that are qualitatively similar to those of a more rigorous electron scattering technique based on the Landauer-Büttiker formalism for the case of adsorbed tetracyanoethylene on a Cu(100) single crystal. Second, we demonstrate that the efficiency of Bardeen and Tersoff-Hamann approaches to generate STM images can be substantially improved by exploiting different algorithms to evaluate the tunnel current and to deal with large-scale eigenvalue problems. Following our general intrusive strategy, we have reduced the computing time to generate an STM image of a modified system by about an order of magnitude with respect to the reference image. The shape and position of the contrasts of the STM image evaluated in the context of intrusion are virtually identical to an image computed without intrusive features but within a considerably smaller computing time.

  8. Acoustic emission intrusion detector

    DOEpatents

    Carver, Donald W.; Whittaker, Jerry W.

    1980-01-01

    An intrusion detector is provided for detecting a forcible entry into a secured structure while minimizing false alarms. The detector uses a piezoelectric crystal transducer to sense acoustic emissions. The transducer output is amplified by a selectable gain amplifier to control the sensitivity. The rectified output of the amplifier is applied to a Schmitt trigger circuit having a preselected threshold level to provide amplitude discrimination. Timing circuitry is provided which is activated by successive pulses from the Schmitt trigger which lie within a selected time frame for frequency discrimination. Detected signals having proper amplitude and frequency trigger an alarm within the first complete cycle time of a detected acoustical disturbance signal.

  9. Radiation detection system

    DOEpatents

    Nelson, Melvin A.; Davies, Terence J.; Morton, III, John R.

    1976-01-01

    A radiation detection system which utilizes the generation of Cerenkov light in and the transmission of that light longitudinally through fiber optic wave guides in order to transmit intelligence relating to the radiation to a remote location. The wave guides are aligned with respect to charged particle radiation so that the Cerenkov light, which is generated at an angle to the radiation, is accepted by the fiber for transmission therethrough. The Cerenkov radiation is detected, recorded, and analyzed at the other end of the fiber.

  10. Rapid dike intrusion into Sakurajima volcano on August 15, 2015, as detected by multi-parameter ground deformation observations

    NASA Astrophysics Data System (ADS)

    Hotta, Kohei; Iguchi, Masato; Tameguri, Takeshi

    2016-04-01

    We present observations of ground deformation at Sakurajima in August 2015 and model the deformation using a combination of GNSS, tilt and strain data in order to interpret a rapid deformation event on August 15, 2015. The pattern of horizontal displacement during the period from August 14 to 16, 2015, shows a WNW-ESE extension, which suggests the opening of a dike. Using a genetic algorithm, we obtained the position, dip, strike length, width and opening of a dislocation source based on the combined data. A nearly vertical dike with a NNE-SSW strike was found at a depth of 1.0 km below sea level beneath the Showa crater. The length and width are 2.3 and 0.6 km, respectively, and a dike opening of 1.97 m yields a volume increase of 2.7 × 106 m3. 887 volcano-tectonic (VT) earthquakes beside the dike suggest that the rapid opening of the dike caused an accumulation of strain in the surrounding rocks, and the VT earthquakes were generated to release this strain. Half of the total amount of deformation was concentrated between 10:27 and 11:54 on August 15. It is estimated that the magma intrusion rate was 1 × 106 m3/h during this period. This is 200 times larger than the magma intrusion rate prior to one of the biggest eruptions at the summit crater of Minami-dake on July 24, 2012, and 2200 times larger than the average magma intrusion rate during the period from October 2011 to March 2012. The previous Mogi-type ground deformation is considered to be a process of magma accumulation in preexisting spherical reservoirs. Conversely, the August 2015 event was a dike intrusion and occurred in a different location to the preexisting reservoirs. The direction of the opening of the dike coincides with the T-axes and direction of faults creating a graben structure.

  11. 75 FR 43709 - Privacy Act of 1974; New and Revised Systems of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... circuit television monitoring and intrusion detection systems. Magnetic tape and magnetic disk: Computer... security officers, closed circuit ] television monitoring and intrusion detection systems. Magnetic tape... hours. Building has 24 hour on-site security officers, closed circuit television monitoring...

  12. Water system virus detection

    NASA Technical Reports Server (NTRS)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J. (Inventor)

    1978-01-01

    The performance of a waste water reclamation system is monitored by introducing a non-pathogenic marker virus, bacteriophage F2, into the waste-water prior to treatment and, thereafter, testing the reclaimed water for the presence of the marker virus. A test sample is first concentrated by absorbing any marker virus onto a cellulose acetate filter in the presence of a trivalent cation at low pH and then flushing the filter with a limited quantity of a glycine buffer solution to desorb any marker virus present on the filter. Photo-optical detection of indirect passive immune agglutination by polystyrene beads indicates the performance of the water reclamation system in removing the marker virus. A closed system provides for concentrating any marker virus, initiating and monitoring the passive immune agglutination reaction, and then flushing the system to prepare for another sample.

  13. Ultrasonic Leak Detection System

    NASA Technical Reports Server (NTRS)

    Youngquist, Robert C. (Inventor); Moerk, J. Steven (Inventor)

    1998-01-01

    A system for detecting ultrasonic vibrations. such as those generated by a small leak in a pressurized container. vessel. pipe. or the like. comprises an ultrasonic transducer assembly and a processing circuit for converting transducer signals into an audio frequency range signal. The audio frequency range signal can be used to drive a pair of headphones worn by an operator. A diode rectifier based mixing circuit provides a simple, inexpensive way to mix the transducer signal with a square wave signal generated by an oscillator, and thereby generate the audio frequency signal. The sensitivity of the system is greatly increased through proper selection and matching of the system components. and the use of noise rejection filters and elements. In addition, a parabolic collecting horn is preferably employed which is mounted on the transducer assembly housing. The collecting horn increases sensitivity of the system by amplifying the received signals. and provides directionality which facilitates easier location of an ultrasonic vibration source.

  14. Universal explosive detection system for homeland security applications

    NASA Astrophysics Data System (ADS)

    Lee, Vincent Y.; Bromberg, Edward E. A.

    2010-04-01

    L-3 Communications CyTerra Corporation has developed a high throughput universal explosive detection system (PassPort) to automatically screen the passengers in airports without requiring them to remove their shoes. The technical approach is based on the patented energetic material detection (EMD) technology. By analyzing the results of sample heating with an infrared camera, one can distinguish the deflagration or decomposition of an energetic material from other clutters such as flammables and general background substances. This becomes the basis of a universal explosive detection system that does not require a library and is capable of detecting trace levels of explosives with a low false alarm rate. The PassPort is a simple turnstile type device and integrates a non-intrusive aerodynamic sampling scheme that has been shown capable of detecting trace levels of explosives on shoes. A detailed description of the detection theory and the automated sampling techniques, as well as the field test results, will be presented.

  15. Mechanical response of the south flank of kilauea volcano, hawaii, to intrusive events along the rift systems

    USGS Publications Warehouse

    Dvorak, J.J.; Okamura, A.T.; English, T.T.; Koyanagi, R.Y.; Nakata, J.S.; Sako, M.K.; Tanigawa, W.T.; Yamashita, K.M.

    1986-01-01

    Increased earthquake activity and compression of the south flank of Kilauea volcano, Hawaii, have been recognized by previous investigators to accompany rift intrusions. We further detail the temporal and spatial changes in earthquake rates and ground strain along the south flank induced by six major rift intrusions which occurred between December 1971 and January 1981. The seismic response of the south flank to individual rift intrusions is immediate; the increased rate of earthquake activity lasts from 1 to 4 weeks. Horizontal strain measurements indicate that compression of the south flank usually accompanies rift intrusions and eruptions. Emplacement of an intrusion at a depth greater than about 4 km, such as the June 1982 southwest rift intrusion, however, results in a slight extension of the subaerial portion of the south flank. Horizontal strain measurements along the south flank are used to locate the January 1983 east-rift intrusion, which resulted in eruptive activity. The intrusion is modeled as a vertical rectangular sheet with constant displacement perpendicular to the plane of the sheet. This model suggests that the intrusive body that compressed the south flank in January 1983 extended from the surface to about 2.4 km depth, and was aligned along a strike of N66??E. The intrusion is approximately 11 km in length, extended beyond the January 1983 eruptive fissures, which are 8 km in length and is contained within the 14-km-long region of shallow rift earthquakes. ?? 1986.

  16. Arc fault detection system

    DOEpatents

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  17. Arc fault detection system

    DOEpatents

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  18. A Weld Defects Detection System Based on a Spectrometer

    PubMed Central

    Bebiano, Daniel; Alfaro, Sadek C. A.

    2009-01-01

    Improved product quality and production methods, and decreased production costs are important objectives of industries. Welding processes are part of this goal. There are many studies about monitoring and controlling welding process. This work presents a non-intrusive on-line monitoriment system and some algorithms capable of detecting GTAW weld defects. Some experiments were made to simulate weld defects by disturbing the electric arc. The data comes from a spectrometer which captures perturbations on the electric arc by the radiation emission of chosen lines. Algorithms based on change detection methods are used to indicate the presence and localization of those defects. PMID:22574049

  19. An automated computer misuse detection system for UNICOS

    SciTech Connect

    Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.; Stallings, C.A.; Thompson, J.L.; Christoph, G.G.

    1994-09-27

    An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configuration in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.

  20. Real-Time, Non-Intrusive Detection of Liquid Nitrogen in Liquid Oxygen at High Pressure and High Flow

    NASA Technical Reports Server (NTRS)

    Singh, Jagdish P.; Yueh, Fang-Yu; Kalluru, Rajamohan R.; Harrison, Louie

    2012-01-01

    An integrated fiber-optic Raman sensor has been designed for real-time, nonintrusive detection of liquid nitrogen in liquid oxygen (LOX) at high pressures and high flow rates in order to monitor the quality of LOX used during rocket engine ground testing. The integrated sensor employs a high-power (3-W) Melles Griot diode-pumped, solid-state (DPSS), frequency-doubled Nd:YAG 532- nm laser; a modified Raman probe that has built-in Raman signal filter optics; two high-resolution spectrometers; and photomultiplier tubes (PMTs) with selected bandpass filters to collect both N2 and O2 Raman signals. The PMT detection units are interfaced with National Instruments Lab- VIEW for fast data acquisition. Studies of sensor performance with different detection systems (i.e., spectrometer and PMT) were carried out. The concentration ratio of N2 and O2 can be inferred by comparing the intensities of the N2 and O2 Raman signals. The final system was fabricated to measure N2 and O2 gas mixtures as well as mixtures of liquid N2 and LOX

  1. Unified Mars detection system. [life detection

    NASA Technical Reports Server (NTRS)

    Martin, J. P.; Kok, B.; Radmer, R.; Johnson, R. D.

    1976-01-01

    A life-detection system is described which is designed to detect and characterize possible Martian biota and to gather information about the chemical environment of Mars, especially the water and amino acid contents of the soil. The system is organized around a central mass spectrometer that can sensitively analyze trace gases from a variety of different experiments. Some biological assays and soil-chemistry tests that have been performed in the laboratory as typical experiment candidates for the system are discussed, including tests for soil-organism metabolism, measurements of soil carbon contents, and determinations of primary aliphatic amines (amino acids and protein) in soils. Two possible test strategies are outlined, and the operational concept of the detection system is illustrated. Detailed descriptions are given for the mass spectrometer, gas inlet, incubation box, test cell modules, seal drive mechanism, soil distribution assembly, and electronic control system.

  2. Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation

    SciTech Connect

    Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

    2005-09-27

    The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

  3. Neonatal Jaundice Detection System.

    PubMed

    Aydın, Mustafa; Hardalaç, Fırat; Ural, Berkan; Karap, Serhat

    2016-07-01

    Neonatal jaundice is a common condition that occurs in newborn infants in the first week of life. Today, techniques used for detection are required blood samples and other clinical testing with special equipment. The aim of this study is creating a non-invasive system to control and to detect the jaundice periodically and helping doctors for early diagnosis. In this work, first, a patient group which is consisted from jaundiced babies and a control group which is consisted from healthy babies are prepared, then between 24 and 48 h after birth, 40 jaundiced and 40 healthy newborns are chosen. Second, advanced image processing techniques are used on the images which are taken with a standard smartphone and the color calibration card. Segmentation, pixel similarity and white balancing methods are used as image processing techniques and RGB values and pixels' important information are obtained exactly. Third, during feature extraction stage, with using colormap transformations and feature calculation, comparisons are done in RGB plane between color change values and the 8-color calibration card which is specially designed. Finally, in the bilirubin level estimation stage, kNN and SVR machine learning regressions are used on the dataset which are obtained from feature extraction. At the end of the process, when the control group is based on for comparisons, jaundice is succesfully detected for 40 jaundiced infants and the success rate is 85 %. Obtained bilirubin estimation results are consisted with bilirubin results which are obtained from the standard blood test and the compliance rate is 85 %. PMID:27229489

  4. Electrical Resistivity Imaging of Seawater Intrusion into the Monterey Bay Aquifer System.

    PubMed

    Pidlisecky, A; Moran, T; Hansen, B; Knight, R

    2016-03-01

    We use electrical resistivity tomography to obtain a 6.8-km electrical resistivity image to a depth of approximately 150 m.b.s.l. along the coast of Monterey Bay. The resulting image is used to determine the subsurface distribution of saltwater- and freshwater-saturated sediments and the geologic controls on fluid distributions in the region. Data acquisition took place over two field seasons in 2011 and 2012. To maximize our ability to image both vertical and horizontal variations in the subsurface, a combination of dipole-dipole, Wenner, Wenner-gamma, and gradient measurements were made, resulting in a large final dataset of approximately 139,000 data points. The resulting resistivity section extends to a depth of 150 m.b.s.l., and is used, in conjunction with the gamma logs from four coastal monitoring wells to identify four dominant lithologic units. From these data, we are able to infer the existence of a contiguous clay layer in the southern portion of our transect, which prevents downward migration of the saltwater observed in the upper 25 m of the subsurface to the underlying freshwater aquifer. The saltwater and brackish water in the northern portion of the transect introduce the potential for seawater intrusion into the hydraulically connected freshwater aquifer to the south, not just from the ocean, but also laterally from north to south. PMID:26085452

  5. Reconciling Volatile Outputs with Heat Flow and Magma Intrusion Rates at the Yellowstone Magma-Hydrothermal System

    NASA Astrophysics Data System (ADS)

    Lowenstern, J. B.; Hurwitz, S.

    2012-12-01

    The Yellowstone hydrothermal system releases hundreds of millions of liters of water on a daily basis. Gigawatts of heat and kilotons of magmatic volatiles (CO2, S, Cl, F and He) are discharged by these waters. By quantifying the relative contributions of crustal, meteoric, and mantle-derived components, we can estimate the rate at which magma is fed to the crust from below (1). Combining isotopic studies with mass discharge rates of geothermal gases and aqueous dissolved solids, we recognize that over 20,000 tons of CO2 is released from basaltic magmas ponding beneath any silicic magma reservoir in the mid to shallow crust (1,2). In contrast, silicic magma provides significantly less volatiles than what emerges from the hydrothermal system. Estimates of heat flow range from ~3 to 8 GW (1,3,4), derived from satellite, surface geophysics and geochemical methods. Such values, combined with estimates from gas flux, imply prolific basalt intrusion rates between 0.05 and 0.3 cubic kilometers per year (1). Over the history of the Yellowstone Plateau Volcanic Field, a picture emerges where the lower crust is converted from Precambrian metasediments and silicic intrusions into a thick gabbroic batholith similar to that envisioned by some to reside beneath the Snake River Plain along the ancestral track of the Yellowstone Hot Spot (5). (1) Lowenstern and Hurwitz, 2008, Elements 4: 35-40. (2) Werner and Brantley, 2003, G-Cubed 4;7: 1061 (3) Vaughan and others, 2012, JVGR 233-234: 72-89. (4) Hurwitz and others, in press, JGR (5) Shervais and others, 2006, Geology 34:365-368.

  6. Intrusive images and intrusive thoughts as different phenomena: two experimental studies.

    PubMed

    Hagenaars, Muriel A; Brewin, Chris R; van Minnen, Agnes; Holmes, Emily A; Hoogduin, Kees A L

    2010-01-01

    According to the dual representation theory of PTSD, intrusive trauma images and intrusive verbal thoughts are produced by separate memory systems. In a previous article it was shown that after watching an aversive film, participants in non-movement conditions reported more intrusive images than participants in a free-to-move control condition (Hagenaars, Van Minnen, Holmes, Brewin, & Hoogduin, 2008). The present study investigates whether the experimental conditions of the Hagenaars et al. study had a different effect on intrusive thoughts than on intrusive images. Experiment 2 further investigated the image-thoughts distinction by manipulating stimulus valence (trauma film versus neutral film) and assessing the subsequent development of intrusive images and thoughts. In addition, both experiments studied the impact of peri-traumatic emotions on subsequent intrusive images and thoughts frequency across conditions. Results showed that experimental manipulations (non-movement and trauma film) caused higher levels of intrusive images relative to control conditions (free movement and neutral film) but they did not affect intrusive thoughts. Peri-traumatic anxiety and horror were associated with subsequent higher levels of intrusive images, but not intrusive thoughts. Correlations were inconclusive for anger and sadness. The results suggest intrusive images and thoughts can be manipulated independently and as such can be considered different phenomena. PMID:20391178

  7. Intelligent Leak Detection System

    SciTech Connect

    Mohaghegh, Shahab D.

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or near surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift and noise

  8. Intelligent Leak Detection System

    2014-10-27

    apability of underground carbon dioxide storage to confine and sustain injected CO2 for a very long time is the main concern for geologic CO2 sequestration. If a leakage from a geological CO2 sequestration site occurs, it is crucial to find the approximate amount and the location of the leak in order to implement proper remediation activity. An overwhelming majority of research and development for storage site monitoring has been concentrated on atmospheric, surface or nearmore » surface monitoring of the sequestered CO2. This study aims to monitor the integrity of CO2 storage at the reservoir level. This work proposes developing in-situ CO2 Monitoring and Verification technology based on the implementation of Permanent Down-hole Gauges (PDG) or “Smart Wells” along with Artificial Intelligence and Data Mining (AI&DM). The technology attempts to identify the characteristics of the CO2 leakage by de-convolving the pressure signals collected from Permanent Down-hole Gauges (PDG). Citronelle field, a saline aquifer reservoir, located in the U.S. was considered for this study. A reservoir simulation model for CO2 sequestration in the Citronelle field was developed and history matched. The presence of the PDGs were considered in the reservoir model at the injection well and an observation well. High frequency pressure data from sensors were collected based on different synthetic CO2 leakage scenarios in the model. Due to complexity of the pressure signal behaviors, a Machine Learning-based technology was introduced to build an Intelligent Leakage Detection System (ILDS). The ILDS was able to detect leakage characteristics in a short period of time (less than a day) demonstrating the capability of the system in quantifying leakage characteristics subject to complex rate behaviors. The performance of ILDS was examined under different conditions such as multiple well leakages, cap rock leakage, availability of an additional monitoring well, presence of pressure drift

  9. Incipient fire detection system

    DOEpatents

    Brooks, Jr., William K.

    1999-01-01

    A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

  10. Mineralogical and fluid inclusion constraints on the evolution of the Plaka intrusion-related ore system, Lavrion, Greece

    NASA Astrophysics Data System (ADS)

    Voudouris, P.; Melfos, V.; Spry, P. G.; Bonsall, T.; Tarkian, M.; Economou-Eliopoulos, M.

    2008-05-01

    The intrusion-centered, polymetallic Plaka ore system, Lavrion, Greece, is genetically related to the emplacement of a Miocene biotite ± hornblende granodioritic body and granodiorite porphyry dikes/sills within metamorphic Mesozoic rocks of the Attic-Cycladic Crystalline Belt. The ore system includes porphyry, breccia-type, skarn, skarn-free carbonate replacement and vein-type ores enriched in Mo, W, Pb, Zn, Cu, As, Sb, Bi and Ag. Early pyrite-molybdenite (±chalcopyrite ± pyrrhotite) mineralization was deposited in multidirectional and sheeted quartz veins within the silicically and sericitically altered granodiorite intrusive. The emplacement of granodiorite porphyry dikes/sills was followed by the introduction of base metal sulphides during hydrothermal brecciation of the porphyritic rocks. Skarn- and skarn-free carbonate replacement ores developed contemporaneously with these magmatic-hydrothermal events and are characterized by the presence of pyrrhotite, pyrite, Fe-rich sphalerite and Bi-Ag-rich galena. A late Pb-As-Sb-Cu-Ag-rich banded vein (Filoni 80) is composed of pyrrhotite, chalcopyrite, arsenopyrite, sphalerite (both Fe-rich and Fe-poor), löllingite, argentian tetrahedrite, bournonite, pyrargyrite, miargyrite, native arsenic, semseyite, heteromorphite, veenite, falkmanite and fluorite, quartz and siderite. The ore mineralogy of the Plaka deposit is generally consistent with reducing and low sulphidation fluid conditions during metal deposition. Fluid inclusion data indicate that molybdenite deposition was associated with boiling between 270 and 360 °C and at a pressure of 50-200 bars, corresponding to a depth of approximately 1 km. Dilution of a saline fluid by mixing with less saline water resulted in the formation of a moderately saline (14-18 wt% NaCl equiv.), low-temperature (190-220 °C) fluid and the precipitation of sulphides and sulphosalts in the Filoni 80 vein. The evolution from early porphyry-style mineralization to the later vein ores

  11. Modelling of paleo-saltwater intrusion in the northern part of the Nubian Aquifer System, Northeast Africa

    NASA Astrophysics Data System (ADS)

    Gossel, Wolfgang; Sefelnasr, Ahmed; Wycisk, Peter

    2010-09-01

    A numerical groundwater model of the Nubian Aquifer System was established to prove the influence of rising seawater levels on the groundwater salinity in northern Egypt over the last 140,000 years. In addition, the impact of a groundwater recharge scenario for these 140,000 years, involving climatic change, on the saltwater/freshwater interface was investigated. Saltwater intrusion induced by rising water levels of the Mediterranean Sea led to salinisation from the Mediterranean Sea to the Qattara depression. This modeling approach was supported by a density-driven model setup and calculation. The modelled saltwater/freshwater interfaces partially fitted the observed ones, especially in the southern half of the Qattara depression. In other parts of the northern Nubian Aquifer System, the ingression of salt water was modelled adequately, but in the west, small regions of the measured interface were not. The development in the Qattara depression (Egypt) and Sirte basin (Libya) were investigated in more detail. The different behaviour in the Sirte basin may be due to high evapotranspiration rates in some former periods, salt solutions from the pre-Quaternary layers or saltwater infiltration from sabkha-like recent salt-bearing sediments.

  12. Size and Spatial Distribution of VMS Deposits Produced by Hydrothermal Systems Driven by the Convective Cooling of Sill Intrusions

    NASA Astrophysics Data System (ADS)

    Carr, P. M.; Cathles, L. M.; Barrie, C. T.

    2009-05-01

    VMS districts are typically ˜40 km in diameter and contain about a dozen regularly spaced Cu-Zn orebodies, one or two of which contain more than half of the district's resources. We numerically investigate this deposit size and spatial distribution through two-dimensional finite element modeling of the convection in systems driven by a sill of a simple geometry and the system above the Bell River sill in the Matagami district, Quebec. In the heuristic models, convection is strongest at the edge, and the edge convection induces a subsequent progression of convection cells towards the center. The Matagami simulations are based on a sill that tapes from 6.5 to 0 km thickness over a distance of 30 km. The zinc transport across the seafloor is dominated by those hydrothermal plumes driven by the strong horizontal gradient in temperature alongside the vertical portion of the retreating 350°C isotherm of the edges of the cooling intrusion. Convection occurs both above the sill and along its underside, and metal is extracted from both sides of the cooling sill.

  13. Hand held explosives detection system

    DOEpatents

    Conrad, Frank J.

    1992-01-01

    The present invention is directed to a sensitive hand-held explosives detection device capable of detecting the presence of extremely low quantities of high explosives molecules, and which is applicable to sampling vapors from personnel, baggage, cargo, etc., as part of an explosives detection system.

  14. Hydrodynamic behavior of the Cape Fear River and estuarine system: A synthesis and observational investigation of discharge-salinity intrusion relationships

    NASA Astrophysics Data System (ADS)

    Becker, May Ling; Luettich, Richard A., Jr.; Mallin, Michael A.

    2010-07-01

    Transport of constituents in partially mixed estuaries depends on the relative strengths of dominant forcing mechanisms which may include tides, river input, and wind. In this study, we investigated the major physical mechanisms that influence the salinity structure in the Cape Fear River Estuary (CFRE), a partially mixed estuary that is representative of river-dominated estuaries along the southeast Atlantic coast of the U.S. Based on analysis of observed hydrographic and hydrodynamic data, we first describe differences in velocity, salinity, and stratification at along-channel sections of the estuary for relatively low-flow conditions. We then investigate the influence of river inflow on the salinity intrusion (defined by the 1-salinity contour near the bottom), based on six methods of choosing discharge in order to identify an appropriate means of incorporating flow history into the discharge value. Our analyses indicate: 1) 92 percent of the variability in the length of the salinity intrusion over a five-year period can be explained based on the Hydrologic Flood Method identified in this work, 2) the salinity intrusion depends more weakly on discharge than predicted by classic analytical relationships for exchange-dominated systems in which the intrusion varies with discharge to the power of (-1/3), and 3) intra-tidal and tidal-range differences based on a 29-day modulation significantly influence the salinity structure. Our results suggest that the salinity intrusion location is dependent upon the hydrologic "flood," defined by a peak in the river-discharge hydrograph. The analysis indicates that the new method used to determine discharge in the CFRE can more accurately explain river inflow-salinity relationships than previously investigated methods. In river-estuary systems in which hydrologic flood peaks are large relative to base flow, we hypothesize the hydrologic flood model offers a useful tool for predicting the estuarine salinity response to river

  15. Potential effects of deepening the St. Johns River navigation channel on saltwater intrusion in the surficial aquifer system, Jacksonville, Florida

    USGS Publications Warehouse

    Bellino, Jason C.; Spechler, Rick M.

    2013-01-01

    The U.S. Army Corps of Engineers (USACE) has proposed dredging a 13-mile reach of the St. Johns River navigation channel in Jacksonville, Florida, deepening it to depths between 50 and 54 feet below North American Vertical Datum of 1988. The dredging operation will remove about 10 feet of sediments from the surficial aquifer system, including limestone in some locations. The limestone unit, which is in the lowermost part of the surficial aquifer system, supplies water to domestic wells in the Jacksonville area. Because of density-driven hydrodynamics of the St. Johns River, saline water from the Atlantic Ocean travels upstream as a saltwater “wedge” along the bottom of the channel, where the limestone is most likely to be exposed by the proposed dredging. A study was conducted to determine the potential effects of navigation channel deepening in the St. Johns River on salinity in the adjacent surficial aquifer system. Simulations were performed with each of four cross-sectional, variable-density groundwater-flow models, developed using SEAWAT, to simulate hypothetical changes in salinity in the surficial aquifer system as a result of dredging. The cross-sectional models were designed to incorporate a range of hydrogeologic conceptualizations to estimate the effect of uncertainty in hydrogeologic properties. The cross-sectional models developed in this study do not necessarily simulate actual projected conditions; instead, the models were used to examine the potential effects of deepening the navigation channel on saltwater intrusion in the surficial aquifer system under a range of plausible hypothetical conditions. Simulated results for modeled conditions indicate that dredging will have little to no effect on salinity variations in areas upstream of currently proposed dredging activities. Results also indicate little to no effect in any part of the surficial aquifer system along the cross section near River Mile 11 or in the water-table unit along the cross

  16. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  17. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  18. A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features

    NASA Astrophysics Data System (ADS)

    Ren, Shangping; Chen, Nianen; Yu, Yue; Poirot, Pierre; Kwiat, Kevin; Tsai, Jeffrey J. P.

    Trust is cast as a continuous re-evaluation: a system’s reliability and security are scrutinized, not just prior to, but during its deployment. This approach to maintaining trust is specifically applied to distributed and embedded control systems. Unlike general purpose systems, distributed and embedded control systems, such as power grid control systems and water treatment systems, etc., generally have a 24x7 availability requirement. Hence, upgrading or adding new cyber protection features into these systems in order to sustain them when faults caused by cyber attacks occur, is often difficult to achieve and inhibits the evolution of these systems into a cyber environment. In this chapter, we present a solution for extending the capabilities of existing systems while simultaneously maintaining the stability of the current systems. An externalized survivability management scheme based on the observe-reason-modify paradigm is applied, which decomposes the cyber attack protection process into three orthogonal subtasks: observation, evaluation and protection. This architecture provides greater flexibility and has a resolvability attribute- it can utilize emerging techniques; yet requires either minimal modifications or even no modifications whatsoever to the controlled infrastructures. The approach itself is general and can be applied to a broad class of observable systems.

  19. Antigen detection systems

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Infectious agents or their constituent parts (antigens or nucleic acids) can be detected in fresh, frozen, or fixed tissues or other specimens, using a variety of direct or indirect assays. The assays can be modified to yield the greatest sensitivity and specificity but in most cases a particular m...

  20. Petrogenesis of postcollisional magmatism at Scheelite Dome, Yukon, Canada: Evidence for a lithospheric mantle source for magmas associated with intrusion-related gold systems

    USGS Publications Warehouse

    Mair, John L.; Farmer, G. Lang; Groves, David I.; Hart, Craig J.R.; Goldfarb, Richard J.

    2011-01-01

    The type examples for the class of deposits termed intrusion-related gold systems occur in the Tombstone-Tungsten belt of Alaska and Yukon, on the eastern side of the Tintina gold province. In this part of the northern Cordillera, extensive mid-Cretaceous postcollisional plutonism took place following the accretion of exotic terranes to the continental margin. The most cratonward of the resulting plutonic belts comprises small isolated intrusive centers, with compositionally diverse, dominantly potassic rocks, as exemplified at Scheelite Dome, located in central Yukon. Similar to other spatially and temporally related intrusive centers, the Scheelite Dome intrusions are genetically associated with intrusion-related gold deposits. Intrusions have exceptional variability, ranging from volumetrically dominant clinopyroxene-bearing monzogranites, to calc-alkaline minettes and spessartites, with an intervening range of intermediate to felsic stocks and dikes, including leucominettes, quartz monzonites, quartz monzodiorites, and granodiorites. All rock types are potassic, are strongly enriched in LILEs and LREEs, and feature high LILE/HFSE ratios. Clinopyroxene is common to all rock types and ranges from salite in felsic rocks to high Mg augite and Cr-rich diopside in lamprophyres. Less common, calcic amphibole ranges from actinolitic hornblende to pargasite. The rocks have strongly radiogenic Sr (initial 87Sr/86Sr from 0.711-0.714) and Pb isotope ratios (206Pb/204Pb from 19.2-19.7), and negative initial εNd values (-8.06 to -11.26). Whole-rock major and trace element, radiogenic isotope, and mineralogical data suggest that the felsic to intermediate rocks were derived from mafic potassic magmas sourced from the lithospheric mantle via fractional crystallization and minor assimilation of metasedimentary crust. Mainly unmodified minettes and spessartites represent the most primitive and final phases emplaced. Metasomatic enrichments in the underlying lithospheric mantle

  1. Geochemical signature variation of pre-, syn-, and post-shearing intrusives within the Najd Fault System of western Saudi Arabia

    NASA Astrophysics Data System (ADS)

    Hassan, M.; Abu-Alam, T. S.; Hauzenberger, C.; Stüwe, K.

    2016-10-01

    Late Precambrian intrusive rocks in the Arabian-Nubian Shield emplaced within and around the Najd Fault System of Saudi Arabia feature a great compositional diversity and a variety of degrees of deformation (i.e. pre-shearing deformed, sheared mylonitized, and post-shearing undeformed) that allows placing them into a relative time order. It is shown here that the degree of deformation is related to compositional variations where early, usually pre-shearing deformed rocks are of dioritic, tonalitic to granodioritic, and later, mainly post-shearing undeformed rocks are mostly of granitic composition. Correlation of the geochemical signature and time of emplacement is interpreted in terms of changes in the source region of the produced melts due to the change of the stress regime during the tectonic evolution of the Arabian-Nubian Shield. The magma of the pre-shearing rocks has tholeiitic and calc-alkaline affinity indicating island arc or continental arc affinity. In contrast, the syn- and post-shearing rocks are mainly potassium rich peraluminous granites which are typically associated with post-orogenic uplift and collapse. This variation in geochemical signature is interpreted to reflect the change of the tectonic regime from a compressional volcanic arc nature to extensional within-plate setting of the Arabian-Nubian Shield. Within the context of published geochronological data, this change is likely to have occurred around 605-580 Ma.

  2. Petrogenetic connections between volcanic rocks and intrusive suites in the California arc - toward an integrated model for upper-crustal magma system evolution

    NASA Astrophysics Data System (ADS)

    Barth, A. P.; Riggs, N.; Walker, J. D.; Andrew, J.; Jacobson, C. E.; Miller, D. M.; Robert, J.

    2014-12-01

    Volcanic and clastic sedimentary rocks in deeply eroded, predominantly plutonic arcs provide records of arc development and the links between volcanic and plutonic processes. We are analyzing existing and new geochronologic and petrologic data from volcanic breccias, ignimbrites and intrusive suites in the Sierra Nevada and Mojave Desert sectors of the Mesozoic California arc, in an effort to construct an integrated volcano-plutonic model for silicic magmatism in arc upper crust. SIMS and TIMS U-Pb zircon ages, immobile element abundances in whole rocks, and trace element abundances in zircons allow us to interpret the magmatic heritage of ignimbrites and components of underlying granodioritic to granitic intrusive suites. Preliminary results suggest several conclusions: (1) first-order magma production was episodic, with plutonic, forearc and retro-arc detrital zircons defining three magmatic pulses of ~40-60 m.y. duration that are largely mimicked by the more limited record of zircons in ignimbrites; (2) in the Triassic and Jurassic, second-order pulses on 2-10 m.y. time scales are recorded in both the intrusive and ignimbrite records, suggesting that eruption of ignimbrites was synchronous at the shortest resolvable time scales with assembly of underlying incrementally emplaced intrusive suites; (3) ignimbrites range from dacite to rhyolite in bulk composition, and are petrographically similar to modern "monotonous intermediate" dacite or phenocryst-poor low-silica rhyolite; (4) these tuffs are as fractionated as intrusive rocks, and commonly, though not always, contain zircons with similarly complex, multi-stage growth histories. Thus ignimbrites and felsic granodiorites in this arc are complementary elements recording lengthy and episodic evolutionary histories in cool and hydrous upper-crustal arc magma systems.

  3. Protein detection system

    DOEpatents

    Fruetel, Julie A.; Fiechtner, Gregory J.; Kliner, Dahv A. V.; McIlroy, Andrew

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  4. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1- dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 ppbv, as cited in Method TO-15, to much lower concentrations. R...

  5. SUPPLEMENT TO EPA COMPENDIUM METHOD TO-15 - REDUCTION OF METHOD DETECTION LIMITS TO MEET VAPOR INTRUSION MONITORING NEEDS

    EPA Science Inventory

    The Supplement to EPA Compendium Method TO-15 provides guidance for reducing the method detection limit (MDL) for the compound 1,1-dichloroethene (1,1-DCE) and for other volatile organic compounds (VOCs) from 0.5 parts per billion by volume (ppbv), as cited in Method TO-15, to ...

  6. Particle detection systems and methods

    DOEpatents

    Morris, Christopher L.; Makela, Mark F.

    2010-05-11

    Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

  7. Randomness fault detection system

    NASA Technical Reports Server (NTRS)

    Russell, B. Don (Inventor); Aucoin, B. Michael (Inventor); Benner, Carl L. (Inventor)

    1996-01-01

    A method and apparatus are provided for detecting a fault on a power line carrying a line parameter such as a load current. The apparatus monitors and analyzes the load current to obtain an energy value. The energy value is compared to a threshold value stored in a buffer. If the energy value is greater than the threshold value a counter is incremented. If the energy value is greater than a high value threshold or less than a low value threshold then a second counter is incremented. If the difference between two subsequent energy values is greater than a constant then a third counter is incremented. A fault signal is issued if the counter is greater than a counter limit value and either the second counter is greater than a second limit value or the third counter is greater than a third limit value.

  8. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    PubMed

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  9. Thermal neutron detection system

    DOEpatents

    Peurrung, Anthony J.; Stromswold, David C.

    2000-01-01

    According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

  10. Centrifugal unbalance detection system

    DOEpatents

    Cordaro, Joseph V.; Reeves, George; Mets, Michael

    2002-01-01

    A system consisting of an accelerometer sensor attached to a centrifuge enclosure for sensing vibrations and outputting a signal in the form of a sine wave with an amplitude and frequency that is passed through a pre-amp to convert it to a voltage signal, a low pass filter for removing extraneous noise, an A/D converter and a processor and algorithm for operating on the signal, whereby the algorithm interprets the amplitude and frequency associated with the signal and once an amplitude threshold has been exceeded the algorithm begins to count cycles during a predetermined time period and if a given number of complete cycles exceeds the frequency threshold during the predetermined time period, the system shuts down the centrifuge.

  11. Power line detection system

    DOEpatents

    Latorre, Victor R.; Watwood, Donald B.

    1994-01-01

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

  12. Power line detection system

    DOEpatents

    Latorre, V.R.; Watwood, D.B.

    1994-09-27

    A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

  13. Radiation detection system

    DOEpatents

    Whited, R.C.

    A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI/sub 2/, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

  14. APDS: Autonomous Pathogen Detection System

    SciTech Connect

    Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

    2002-02-14

    An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

  15. Diversified transmission multichannel detection system

    SciTech Connect

    Tournois, P.; Engelhard, P.

    1984-07-03

    A detection system for imaging by sonar or radar signals. The system associates diversified transmissions with an interferometric base. This base provides an angular channel formation means and each signal formed in this way is processed by matched filtering in a circuit containing copy signals characterizing the space coloring obtained by the diversified transmission means. The invention is particularly applicable to side or front looking detection sonars.

  16. Magma plumbing systems deduced from comparison of multiple dike intrusions in an incipientseafloor spreading segment in Afar, Ethiopia

    NASA Astrophysics Data System (ADS)

    Belachew, M.; Ebinger, C. J.; Cote, D. M.; Keir, D.; Rowland, J. V.; Hammond, J. O.; Ayele, A.

    2010-12-01

    Oceanic crust is accreted through the emplacement of dikes at spreading ridges, but the role of dike intrusion in plate boundary deformation during continental rupture remains poorly understood. Since September 2005 the ~70 km-long Dabbahu-Manda Hararo rift segment in Afar, Ethiopia has experienced 14 large volume dike intrusions, including 3 fissural eruptions and a small volume silicic eruption. We present comparisons of 9 dike intrusions recorded by two temporary seismic networks between 2006 and 2009, set within the context of new 3D crustal velocity models of the region. All of the migrating swarms of earthquakes which are interpreted as caused by the dike intrusions and graben formation above the dike started from an ~5 km-radius and > 6 km-deep zone at the middle of the rift segment. The earthquake swarms migrated either to the south or north along the rift. Small magnitude earthquakes associated with the margins of the propagating dike tips are followed by the largest magnitude, mostly low-frequency earthquakes (< 2 Hz) interpreted as slow-slip and/or graben formation above the dike. The seismic moment distributions show > 80% of energy is released during the propagation phase of the dikes with minimal seismic energy release after the dikes ceased to propagate. Thus, for most of the dikes, faulting and graben formation above the dikes occurs hours after the passage of the crack tip, and while the dike continues to lengthen. The dikes that propagated to the north had faster average velocities (0.4 - 0.6m/s) compared to the ones that propagated to the south (0.15 - 0.3 m/s). The propagation velocities of each of the dikes follow a decaying exponential, suggesting pressure drops in the dike feeder zone limit dike volume/length. The small changes in intervals between dike intrusions, and the lack of a decrease in dike length with time both suggest that the magma chamber was regularly recharged over the 4-year period since the onset of the rifting episode in

  17. Comparison and Characterization of Android-Based Fall Detection Systems

    PubMed Central

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  18. Comparison and characterization of Android-based fall detection systems.

    PubMed

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-10-08

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems.

  19. Comparison and characterization of Android-based fall detection systems.

    PubMed

    Luque, Rafael; Casilari, Eduardo; Morón, María-José; Redondo, Gema

    2014-01-01

    Falls are a foremost source of injuries and hospitalization for seniors. The adoption of automatic fall detection mechanisms can noticeably reduce the response time of the medical staff or caregivers when a fall takes place. Smartphones are being increasingly proposed as wearable, cost-effective and not-intrusive systems for fall detection. The exploitation of smartphones' potential (and in particular, the Android Operating System) can benefit from the wide implantation, the growing computational capabilities and the diversity of communication interfaces and embedded sensors of these personal devices. After revising the state-of-the-art on this matter, this study develops an experimental testbed to assess the performance of different fall detection algorithms that ground their decisions on the analysis of the inertial data registered by the accelerometer of the smartphone. Results obtained in a real testbed with diverse individuals indicate that the accuracy of the accelerometry-based techniques to identify the falls depends strongly on the fall pattern. The performed tests also show the difficulty to set detection acceleration thresholds that allow achieving a good trade-off between false negatives (falls that remain unnoticed) and false positives (conventional movements that are erroneously classified as falls). In any case, the study of the evolution of the battery drain reveals that the extra power consumption introduced by the Android monitoring applications cannot be neglected when evaluating the autonomy and even the viability of fall detection systems. PMID:25299953

  20. Alert Confidence Fusion in Intrusion Detection Systems with Extended Dempster- Shafer Theory

    SciTech Connect

    Yu, Dong; Frincke, Deborah A.

    2005-03-01

    Extend Dempster-Shafer Theory of Evidence to include differential weightings of alerts drawn from multiple sources. The intent is to support automated (and manual) response to threat by producing more realistic confidence ratings for IDS alerts than is currently available.

  1. Hearing aid malfunction detection system

    NASA Technical Reports Server (NTRS)

    Kessinger, R. L. (Inventor)

    1977-01-01

    A malfunction detection system for detecting malfunctions in electrical signal processing circuits is disclosed. Malfunctions of a hearing aid in the form of frequency distortion and/or inadequate amplification by the hearing aid amplifier, as well as weakening of the hearing aid power supply are detectable. A test signal is generated and a timed switching circuit periodically applies the test signal to the input of the hearing aid amplifier in place of the input signal from the microphone. The resulting amplifier output is compared with the input test signal used as a reference signal. The hearing aid battery voltage is also periodically compared to a reference voltage. Deviations from the references beyond preset limits cause a warning system to operate.

  2. Portable Microleak-Detection System

    NASA Technical Reports Server (NTRS)

    Rivers, H. Kevin; Sikora, Joseph G.; Sankaran, Sankara N.

    2007-01-01

    The figure schematically depicts a portable microleak-detection system that has been built especially for use in testing hydrogen tanks made of polymer-matrix composite materials. (As used here, microleak signifies a leak that is too small to be detectable by the simple soap-bubble technique.) The system can also be used to test for microleaks in tanks that are made of other materials and that contain gases other than hydrogen. Results of calibration tests have shown that measurement errors are less than 10 percent for leak rates ranging from 0.3 to 200 cm3/min. Like some other microleak-detection systems, this system includes a vacuum pump and associated plumbing for sampling the leaking gas, and a mass spectrometer for analyzing the molecular constituents of the gas. The system includes a flexible vacuum chamber that can be attached to the outer surface of a tank or other object of interest that is to be tested for leakage (hereafter denoted, simply, the test object). The gas used in a test can be the gas or vapor (e.g., hydrogen in the original application) to be contained by the test object. Alternatively, following common practice in leak testing, helium can be used as a test gas. In either case, the mass spectrometer can be used to verify that the gas measured by the system is the test gas rather than a different gas and, hence, that the leak is indeed from the test object.

  3. Semi autonomous mine detection system

    SciTech Connect

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  4. Semi autonomous mine detection system

    NASA Astrophysics Data System (ADS)

    Few, Doug; Versteeg, Roelof; Herman, Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude - from an autonomous robotic perspective - the rapid development and deployment of fieldable systems.

  5. Computer Intrusions and Attacks.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)

  6. Modeling Heat Transfer, Fluid Circulation and Permeability Alteration in Hydrothermal Systems with Loose Coupling to Magmatic Intrusion Modeling in the Lower Crust

    NASA Astrophysics Data System (ADS)

    Taron, J.; Karakas, O.; Mangan, M.; Dufek, J.; Ingebritsen, S.; Hickman, S. H.; Williams, C. F.

    2014-12-01

    The evolution of large scale hydrothermal systems entails spatially and temporally evolving permeability fields. During hydrothermal circulation, thermo-elastic stress and fluid pressure changes act upon partially open or hydrothermally altered fracture sets to modify permeability within the system, thereby shifting the patterns of circulation. To explore these interactions we are developing a thermo-hydromechanical (THM) simulator capable of coupling the dominant physics of the hydrothermal system and allowing flexibility in the use of monolithic or staggered numerical schemes. Permeability is allowed to evolve under several constitutive models tailored to both porous media and fractures, considering the influence of thermo-hydromechanical stress, creep, and elasto-plastic shear and dilation in a ubiquitously fractured medium. To expand our understanding of the long-term evolution of these systems, simulations incorporate information gleaned from the modeling of magmatic processes in the lower crust, where characteristics of the heat source are crucial in defining hydrothermal evolution. Results of a stochastic dike intrusion model are fed into the hydrothermal simulator to explore sensitivity relative to characteristics of the magmatic source. This is a first step to examining feedback mechanisms between heat transfer within geothermal fields and heat supply from the lower crust in a rigorous manner. We compare several simulations that elucidate the relative importance of magma intrusion rate and spatial distribution on overall heat transfer characteristics.

  7. Tape Cassette Bacteria Detection System

    NASA Technical Reports Server (NTRS)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  8. Microbial mine detection system (MMDS)

    NASA Astrophysics Data System (ADS)

    Fliermans, Carl B.; Lopez-de-Victoria, Geralyne

    1998-09-01

    The Savannah River Technology Center (SRTC) is developing the Microbial Mine Detection System (MMDS), a cost-effective, safe and reliable method to detect land mines using microorganisms as the primary biosensor detector. SRTC research has shown that various naturally occurring microbial species are stimulated by nitrogen, trinitrotoluene (TNT), dinitrotoluene (DNT), nitrates, nitrites, nitrous oxide, and the chemical components found in explosive materials. Several of the 10,000 indigenous bacteria already existing in the SRTC Subsurface Microbiology Culture Collection (SMCC) possess characteristics that would support discrete detection of land mines during metabolic activity or growth. SRTC scientists are screening and identifying bacteria residing in the SMCC, and other collections associated with specific land mines, for their attraction to explosive off-gasses. After contacting explosives or off-gasses, the micro-organisms will activate via bioluminescence and identify the location of the land mines. Once identified, down selected and mesocosmly defined, the micro-organisms can then be prepared for field deployment. This deployment process requires minimal user training and is envisioned to be administered in hand-held, vehicular mounted and airborne platforms. Microbial detection systems are a renewable resource, easy to preserve, inexpensive to maintain under field conditions, and provide a high-probability response recognition technology.

  9. Optimal design of saltwater intrusion control systems by Global Interactive Response Surfaces: the Nauru island case study

    NASA Astrophysics Data System (ADS)

    Alberti, Luca; Oberto, Gabriele; Pianosi, Francesca; Castelletti, Andrea

    2013-04-01

    Infiltration galleries and scavenger wells are often constructed to prevent saltwater intrusion in coastal aquifers. The optimal design of these infrastructures can be framed as a multi-objective optimization problem balancing availability of fresh water supply and installation/operation costs. High fidelity simulation models of the flow and transport processes can be used to link design parameters (e.g. wells location, size and pumping rates) to objective functions. However, the incorporation of these simulation models within an optimization-based planning framework is not straightforward because of the computational requirements of the model itself and the computational limitations of the optimization algorithms. In this study we investigate the potential for the Global Interactive Response Surface (GIRS) methodology to overcome these technical limitations. The GIRS methodology is used to recursively build a non-dynamic emulator of the process-based simulation model that maps design options into objectives values and can be used in place of the original model to more quickly explore the design space. The approach is used to plan infrastructural interventions for controlling saltwater intrusion and ensuring sustainable groundwater supply for Nauru, a Pacific island republic in Micronesia. GIRS is used to emulate a SEAWAT density driven groundwater flow-and-transport simulation model. Results show the potential applicability of the proposed approach for optimal planning of coastal aquifers.

  10. Blind Leak Detection for Closed Systems

    NASA Technical Reports Server (NTRS)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  11. The Autonomous Pathogen Detection System

    SciTech Connect

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  12. Detecting transition in agricultural systems

    NASA Technical Reports Server (NTRS)

    Neary, P. J.; Coiner, J. C.

    1979-01-01

    Remote sensing of agricultural phenomena has been largely concentrated on analysis of agriculture at the field level. Concern has been to identify crop status, crop condition, and crop distribution, all of which are spatially analyzed on a field-by-field basis. A more general level of abstraction is the agricultural system, or the complex of crops and other land cover that differentiate various agricultural economies. The paper reports on a methodology to assist in the analysis of the landscape elements of agricultural systems with Landsat digital data. The methodology involves tracing periods of photosynthetic activity for a fixed area. Change from one agricultural system to another is detected through shifts in the intensity and periodicity of photosynthetic activity as recorded in the radiometric return to Landsat. The Landsat-derived radiometric indicator of photosynthetic activity appears to provide the ability to differentiate agricultural systems from each other as well as from conterminous natural vegetation.

  13. Nucleic acid detection system and method for detecting influenza

    DOEpatents

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  14. Source and redox controls on metallogenic variations in intrusion-related ore systems, Tombstone-Tungsten Belt, Yukon Territory, Canada

    USGS Publications Warehouse

    Hart, C.J.R.; Mair, J.L.; Goldfarb, R.J.; Groves, D.I.

    2004-01-01

    The Tombstone, Mayo and Tungsten plutonic suites of granitic intrusions, collectively termed the Tombstone-Tungsten Belt, form three geographically, mineralogically, geochemically and metallogenically distinct plutonic suites. The granites (sensu lato) intruded the ancient North American continental margin of the northern Canadian Cordillera as part of a single magmatic episode in the mid-Cretaceous (96-90 Ma). The Tombstone Suite is alkalic, variably fractionated, slightly oxidised, contains magnetite and titanite, and has primary, but no xenocrystic, zircon. The Mayo Suite is sub-alkalic, metaluminous to weakly peraluminous, fractionated, but with early felsic and late mafic phases, moderately reduced with titanite dominant, and has xenocrystic zircon. The Tungsten Suite is peraluminous, entirely felsic, more highly fractionated, reduced with ilmenite dominant, and has abundant xenocrystic zircon. Each suite has a distinctive petrogenesis. The Tombstone Suite was derived from an enriched, previously depleted lithospheric mantle, the Tungsten Suite is from the continental crust including, but not dominated by, carbonaceous pelitic rocks, and the Mayo Suite is from a similar sedimentary crustal source, but is mixed with a distinct mafic component from an enriched mantle source. Each suite has a distinctive metallogeny that is related to the source and redox characteristics of the magma. The Tombstone Suite has a Au-Cu-Bi association that is characteristic of most oxidised and alkalic magmas, but also has associated, and enigmatic, U-Th-F mineralisation. The reduced Tungsten Suite intrusions are characterised by world-class tungsten skarn deposits with less significant Cu, Zn, Sn and Mo anomalies. The Mayo Suite intrusions are characteristically gold-enriched, with associated As, Bi, Te and W associations. All suites also have associated, but distal and lower temperature Ag-Pb-and Sb-rich mineral occurrences. Although processes such as fractionation, volatile

  15. Source and redox controls on metallogenic variations in intrusion-related ore systems, Tombstone-Tungsten Belt, Yukon Territory, Canada

    USGS Publications Warehouse

    Hart, C.J.R.; Mair, J.L.; Goldfarb, R.J.; Groves, D.I.

    2004-01-01

    The Tombstone, Mayo and Tungsten plutonic suites of granitic intrusions, collectively termed the Tombstone-Tungsten Belt, form three geographically, mineralogically, geochemically and metallogenically distinct plutonic suites. The granites (sensu lato) intruded the ancient North American continental margin of the northern Canadian Cordillera as part of a single magmatic episode in the mid-Cretaceous (96-90 Ma). The Tombstone Suite is alkalic, variably fractionated, slightly oxidised, contains magnetite and titanite, and has primary, but no xenocrystic, zircon. The Mayo Suite is sub-alkalic, metaluminous to weakly peraluminous, fractionated, but with early felsic and late mafic phases, moderately reduced with titanite dominant, and has xenocrystic zircon. The Tungsten Suite is peraluminous, entirely felsic, more highly fractionated, reduced with ilmenite dominant, and has abundant xenocrystic zircon. Each suite has a distinctive petrogenesis. The Tombstone Suite was derived from an enriched, previously depleted lithospheric mantle, the Tungsten Suite is from the continental crust including, but not dominated by, carbonaceous pelitic rocks, and the Mayo Suite is from a similar sedimentary crustal source, but is mixed with a distinct mafic component from an enriched mantle source. Each suite has a distinctive metallogeny that is related to the source and redox characteristics of the magma. The Tombstone Suite has a Au-Cu-Bi association that is characteristic of most oxidised and alkalic magmas, but also has associated, and enigmatic, U-Th-F mineralisation. The reduced Tungsten Suite intrusions are characterised by world-class tungsten skarn deposits with less significant Cu, Zn, Sn and Mo anomalies. The Mayo Suite intrusions are characteristically gold-enriched, with associated As, Bi, Te and W associations. All suites also have associated, but distal and lower temperature Ag-Pb- and Sb-rich mineral occurrences. Although processes such as fractionation, volatile

  16. Capillary Electrophoresis - Optical Detection Systems

    SciTech Connect

    Sepaniak, M. J.

    2001-08-06

    Molecular recognition systems are developed via molecular modeling and synthesis to enhance separation performance in capillary electrophoresis and optical detection methods for capillary electrophoresis. The underpinning theme of our work is the rational design and development of molecular recognition systems in chemical separations and analysis. There have been, however, some subtle and exciting shifts in our research paradigm during this period. Specifically, we have moved from mostly separations research to a good balance between separations and spectroscopic detection for separations. This shift is based on our perception that the pressing research challenges and needs in capillary electrophoresis and electrokinetic chromatography relate to the persistent detection and flow rate reproducibility limitations of these techniques (see page 1 of the accompanying Renewal Application for further discussion). In most of our work molecular recognition reagents are employed to provide selectivity and enhance performance. Also, an emerging trend is the use of these reagents with specially-prepared nano-scale materials. Although not part of our DOE BES-supported work, the modeling and synthesis of new receptors has indirectly supported the development of novel microcantilevers-based MEMS for the sensing of vapor and liquid phase analytes. This fortuitous overlap is briefly covered in this report. Several of the more significant publications that have resulted from our work are appended. To facilitate brevity we refer to these publications liberally in this progress report. Reference is also made to very recent work in the Background and Preliminary Studies Section of the Renewal Application.

  17. Compensated intruder-detection systems

    DOEpatents

    McNeilly, David R.; Miller, William R.

    1984-01-01

    Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

  18. Intrusion signature creation via clustering anomalies

    NASA Astrophysics Data System (ADS)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  19. Ionization detection system for aerosols

    DOEpatents

    Jacobs, Martin E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber.

  20. Layered intrusions as transitional chambers of magmatic systems of large igneous provinces: Evidence from the eastern Fennoscandian Shield

    NASA Astrophysics Data System (ADS)

    Sharkov, Evgenii; Bogina, Maria; Chistyakov, Alexey

    2013-04-01

    Large igneous provinces are usually formed by lava plateaus, dyke swarms, and intrusions. The rocks of these units show wide variations in composition. However, it is unclear which mechanisms and where produced such a compositional diversity. It is also important to understand whether these complexes are comagmatic or not? For this purpose, we studied the above mentioned volcanic and plutonic components of two Paleoproterozoic large igneous provinces in the eastern Fennoscandian Shield: (1) early Paleoproterozoic (2.5-2.35 Ga) province made up of siliceous high-Mg volcanics and layered dunite-harzburgite-bronzitite-norite-gabbronorite-anorthosite (Monchegorsky, Fedorovo-Pansky, Burakovsky, etc.) plutonic complexes, and (2) middle Paleoproterozoic (2.35-1.9 Ga) province made up of high- and low-Ti alkaline and tholeiite basalts and wehrlite-clinopyroxenite-gabbro-alkaline gabbros (Elet'ozero, Gremyakha-Vyrmes) plutonic complexes. It is known that layered intrusions were formed by replenishment of solidifying chambers accompanied by magma differentiation and contamination. Geochemical and isotope data showed that all rocks of these complexes are related in different degree and often close in composition to volcanics in lava plateaus, and can be considered as comagmatic in origin. So, we suggest that these layered complexes represent long-lived magmatic centers - transitional chambers - where melts derived from magma-generation zones were accumulated, subjected to crystallization differentiation, mixed with evolved and fresh magmas, and contaminated. It is highly possible that some batches of evolved magmas arrived to the surface, forming lava successions of different composition. This is consistent with the fact that all volcanics that compose the plateaus are represented by evolved derivatives that presumably formed in transitional chamber, whereas primary melts are practically missing.

  1. Autonomous pathogen detection system 2001

    SciTech Connect

    Langlois, R G; Wang, A; Colston, B; Masquelier, D; Jones, L; Venkateswaran, K S; Nasarabadi, S; Brown, S; Ramponi, A; Milanovich, F P

    2001-01-09

    The objective of this project is to design, fabricate and field-demonstrate a fully Autonomous Pathogen Detector (identifier) System (APDS). This will be accomplished by integrating a proven flow cytometer and real-time polymerase chain reaction (PCR) detector with sample collection, sample preparation and fluidics to provide a compact, autonomously operating instrument capable of simultaneously detecting multiple pathogens and/or toxins. The APDS will be designed to operate in fixed locations, where it continuously monitors air samples and automatically reports the presence of specific biological agents. The APDS will utilize both multiplex immuno and nucleic acid assays to provide ''quasi-orthogonal'', multiple agent detection approaches to minimize false positives and increase the reliability of identification. Technical advancements across several fronts must first be made in order to realize the full extent of the APDS. Commercialization will be accomplished through three progressive generations of instruments. The APDS is targeted for domestic applications in which (1) the public is at high risk of exposure to covert releases of bioagent such as in major subway systems and other transportation terminals, large office complexes, and convention centers; and (2) as part of a monitoring network of sensors integrated with command and control systems for wide area monitoring of urban areas and major gatherings (e.g., inaugurations, Olympics, etc.). In this latter application there is potential that a fully developed APDS could add value to Defense Department monitoring architectures.

  2. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, Roswitha S.; Todd, Richard A.

    1987-01-01

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  3. Pulsed helium ionization detection system

    DOEpatents

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  4. Optical fibre gas detections systems

    NASA Astrophysics Data System (ADS)

    Culshaw, Brian

    2016-05-01

    This tutorial review covers the principles of and prospects for fibre optic sensor technology in gas detection. Many of the potential benefits common to fibre sensor technology also apply in the context of gas sensing - notably long distance - many km - access to multiple remote measurement points; invariably intrinsic safety; access to numerous important gas species and often uniquely high levels of selectivity and/or sensitivity. Furthermore, the range of fibre sensor network architectures - single point, multiple point and distributed - enable unprecedented flexibility in system implementation. Additionally, competitive technologies and regulatory issues contribute to final application potential.

  5. Infrared trace element detection system

    DOEpatents

    Bien, F.; Bernstein, L.S.; Matthew, M.W.

    1988-11-15

    An infrared trace element detection system includes an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined. 11 figs.

  6. Infrared trace element detection system

    DOEpatents

    Bien, Fritz; Bernstein, Lawrence S.; Matthew, Michael W.

    1988-01-01

    An infrared trace element detection system including an optical cell into which the sample fluid to be examined is introduced and removed. Also introduced into the optical cell is a sample beam of infrared radiation in a first wavelength band which is significantly absorbed by the trace element and a second wavelength band which is not significantly absorbed by the trace element for passage through the optical cell through the sample fluid. The output intensities of the sample beam of radiation are selectively detected in the first and second wavelength bands. The intensities of a reference beam of the radiation are similarly detected in the first and second wavelength bands. The sensed output intensity of the sample beam in one of the first and second wavelength bands is normalized with respect to the other and similarly, the intensity of the reference beam of radiation in one of the first and second wavelength bands is normalized with respect to the other. The normalized sample beam intensity and normalized reference beam intensity are then compared to provide a signal from which the amount of trace element in the sample fluid can be determined.

  7. Explosives detection system and method

    DOEpatents

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2007-12-11

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  8. Mafic intrusions triggering eruptions in Iceland

    NASA Astrophysics Data System (ADS)

    Sigmarsson, O.

    2012-04-01

    The last two eruptions in Iceland, Eyjafjallajökull 2010 and Grímsvötn 2011, were both provoked by an intrusion of more mafic magma into pre-existing magmatic system. Injection into the latter volcano, which is located in the main rift-zone of the island, above the presumed centre of the mantle plume and is the most active volcano of Iceland, has been gradual since the last eruption in 2004. In contrast, at Eyjafjallajökull volcano, one of the least active volcano in Iceland and located at the southern part of a propagating rift-zone where extensional tectonics are poorly developed, mafic magma intrusion occurred over less than a year. Beneath Eyjafjallajökull, a silicic intrusion at approximately 6 km depth was recharged with mantle derived alkali basalt that was injected into residual rhyolite from the penultimate eruption in the years 1821-23. The resulting magma mingIing process was highly complex, but careful sampling of tephra during the entire eruption allows the dynamics of the mingling process to be unravelled. Short-lived disequilibria between the gaseous nuclide 210Po and the much less volatile nuclide 210Pb, suggest that basalt accumulated beneath the silicic intrusion over approximately 100 days, or from early January 2010 until the onset of the explosive summit eruption on 14 April. Due to the degassing, crystal fractionation modified the composition of the injected mafic magma producing evolved Fe-and Ti-rich basalt, similar in composition to that of the nearby Katla volcano. This evolved basalt was intruded into the liquid part of the silicic intrusion only a few hours before the onset of the explosive summit eruption. The short time between intrusion and eruption led to the production of very heterogeneous (of basaltic, intermediate and silicic composition) and fine-grained tephra during the first days of explosive eruption. The fine grained tephra resulted from combined effects of magma fragmentation due to degassing of stiff magma rich in

  9. Recent advances in microfluidic detection systems

    PubMed Central

    Baker, Christopher A; Duong, Cindy T; Grimley, Alix; Roper, Michael G

    2009-01-01

    There are numerous detection methods available for methods are being put to use for detection on these miniaturized systems, with the analyte of interest driving the choice of detection method. In this article, we summarize microfluidic 2 years. More focus is given to unconventional approaches to detection routes and novel strategies for performing high-sensitivity detection. PMID:20414455

  10. Definition and means of maintaining the process vacuum liquid detection interlock systems portion of the PFP safety envelope

    SciTech Connect

    Thomas, R.J.

    1997-01-02

    The Process Vacuum Liquid Detection interlock systems prevent intrusion of process liquids into the HEPA filters downstream of demisters {number_sign}6 and {number_sign}7 during Process Vacuum System operation. This prevents liquid intrusion into the filters which could cause a criticality. The Safety Envelope (SE) includes the equipment which detects the presence of liquids in the vacuum headers; isolates the filters; shuts down the vacuum pumps; and alarms the condition. The presence of liquid in the HC-4, HC-7, and HC-227S glovebox vacuum traps or a high level of liquid in the 236-Z Tank 50 will isolate these portions of the vacuum system from the main headers. This report identifies the equipment in the SE; operating, maintenance, and surveillance procedures needed to maintain the SE equipment; and rationale for exclusion of some equipment and testing from the SE.

  11. A Portable Infrasonic Detection System

    NASA Technical Reports Server (NTRS)

    Shams, Qamar A.; Burkett, Cecil G.; Zuckerwar, Allan J.; Lawrenson, Christopher C.; Masterman, Michael

    2008-01-01

    During last couple of years, NASA Langley has designed and developed a portable infrasonic detection system which can be used to make useful infrasound measurements at a location where it was not possible previously. The system comprises an electret condenser microphone, having a 3-inch membrane diameter, and a small, compact windscreen. Electret-based technology offers the lowest possible background noise, because Johnson noise generated in the supporting electronics (preamplifier) is minimized. The microphone features a high membrane compliance with a large backchamber volume, a prepolarized backplane and a high impedance preamplifier located inside the backchamber. The windscreen, based on the high transmission coefficient of infrasound through matter, is made of a material having a low acoustic impedance and sufficiently thick wall to insure structural stability. Close-cell polyurethane foam has been found to serve the purpose well. In the proposed test, test parameters will be sensitivity, background noise, signal fidelity (harmonic distortion), and temporal stability. The design and results of the compact system, based upon laboratory and field experiments, will be presented.

  12. Photoelectric detection system. [manufacturing automation

    NASA Technical Reports Server (NTRS)

    Currie, J. R.; Schansman, R. R. (Inventor)

    1982-01-01

    A photoelectric beam system for the detection of the arrival of an object at a discrete station wherein artificial light, natural light, or no light may be present is described. A signal generator turns on and off a signal light at a selected frequency. When the object in question arrives on station, ambient light is blocked by the object, and the light from the signal light is reflected onto a photoelectric sensor which has a delayed electrical output but is of the frequency of the signal light. Outputs from both the signal source and the photoelectric sensor are fed to inputs of an exclusively OR detector which provides as an output the difference between them. The difference signal is a small width pulse occurring at the frequency of the signal source. By filter means, this signal is distinguished from those responsive to sunlight, darkness, or 120 Hz artificial light. In this fashion, the presence of an object is positively established.

  13. Planetary system detection by POINTS

    NASA Technical Reports Server (NTRS)

    Reasenberg, Robert D.

    1993-01-01

    The final report and semiannual reports 1, 2, and 3 in response to the study of 'Planetary System Detection by POINTS' is presented. The grant covered the period from 15 Jun. 1988 through 31 Dec. 1989. The work during that period comprised the further development and refinement of the POINTS concept. The status of the POINTS development at the end of the Grant period was described by Reasenberg in a paper given at the JPL Workshop on Space Interferometry, 12-13 Mar. 1990, and distributed as CfA Preprint 3138. That paper, 'POINTS: a Small Astrometric Interferometer,' follows as Appendix-A. Our proposal P2276-7-09, dated July 1990, included a more detailed description of the state of the development of POINTS at the end of the tenure of Grant NAGW-1355. That proposal, which resulted in Grant NAGW-2497, is included by reference.

  14. Assessment of Mitigation Systems on Vapor Intrusion: Temporal Trends, Attenuation Factors, and Contaminant Migration Routes under Mitigated and Non-mitigated Conditions

    EPA Science Inventory

    Vapor intrusion is the migration of subsurface vapors, including radon and volatile organic compounds (VOCs), in soil gas from the subsurface to indoor air. Vapor intrusion happens because there are pressure and concentration differentials between indoor air and soil gas. Indoor ...

  15. Intrusion tolerant model for spatial information networks based on defense-in-depth

    NASA Astrophysics Data System (ADS)

    Zhang, Juan; Qin, Zhihong; Wang, Junfeng

    2009-12-01

    The spatial information networks (SIN) plays a more and more important role in current communication networks, while its security problem is rigorous. To enhance the information survivability, based on the concept of defense-in-depth, this paper proposes an intrusion tolerant (IT) model which can be applied in SIN, analyzes it in detail on three-tier of intrusion defense, intrusion detection and intrusion tolerant. And some suggestions are made for each tier.

  16. An automatic LCD panel quality detection system

    NASA Astrophysics Data System (ADS)

    Guo, Bianfang; Hou, Wenguang; Ding, Mingyue

    2009-10-01

    Automatic detection using computer vision expands rapidly along with the development of image processing technology. In this paper, we developed a rapid LCD quality detection system for automobile instrument panel production, which has wide range of usage and good stability.Our automatic detection system consists of four parts: panel fixture, signal generator module, image acquisition module and image processing software. Experiments demonstrated that our system is feasible, efficient and fast compared to manual detection.

  17. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  18. neu-VISION: an explosives detection system for transportation security

    NASA Astrophysics Data System (ADS)

    Warman, Kieffer; Penn, David

    2008-04-01

    Terrorists were targeting commercial airliners long before the 9/11 attacks on the World Trade Center and the Pentagon. Despite heightened security measures, commercial airliners remain an attractive target for terrorists, as evidenced by the August 2006 terrorist plot to destroy as many as ten aircraft in mid-flight from the United Kingdom to the United States. As a response to the security threat air carriers are now required to screen 100-percent of all checked baggage for explosives. The scale of this task is enormous and the Transportation Security Administration has deployed thousands of detection systems. Although this has resulted in improved security, the performance of the installed systems is not ideal. Further improvements are needed and can only be made with new technologies that ensure a flexible Concept of Operations and provide superior detection along with low false alarm rates and excellent dependability. To address security needs Applied Signal Technology, Inc. is developing an innovative and practical solution to meet the performance demands of aviation security. The neu-VISION TM system is expected to provide explosives detection performance for checked baggage that both complements and surpasses currently deployed performance. The neu-VISION TM system leverages a 5 year R&D program developing the Associated Particle Imaging (API) technique; a neutron based non-intrusive material identification and imaging technique. The superior performance afforded by this neutron interrogation technique delivers false alarm rates much lower than deployed technologies and "sees through" dense, heavy materials. Small quantities of explosive material are identified even in the cluttered environments.

  19. Intrusive Images in Psychological Disorders

    PubMed Central

    Brewin, Chris R.; Gregory, James D.; Lipton, Michelle; Burgess, Neil

    2010-01-01

    Involuntary images and visual memories are prominent in many types of psychopathology. Patients with posttraumatic stress disorder, other anxiety disorders, depression, eating disorders, and psychosis frequently report repeated visual intrusions corresponding to a small number of real or imaginary events, usually extremely vivid, detailed, and with highly distressing content. Both memory and imagery appear to rely on common networks involving medial prefrontal regions, posterior regions in the medial and lateral parietal cortices, the lateral temporal cortex, and the medial temporal lobe. Evidence from cognitive psychology and neuroscience implies distinct neural bases to abstract, flexible, contextualized representations (C-reps) and to inflexible, sensory-bound representations (S-reps). We revise our previous dual representation theory of posttraumatic stress disorder to place it within a neural systems model of healthy memory and imagery. The revised model is used to explain how the different types of distressing visual intrusions associated with clinical disorders arise, in terms of the need for correct interaction between the neural systems supporting S-reps and C-reps via visuospatial working memory. Finally, we discuss the treatment implications of the new model and relate it to existing forms of psychological therapy. PMID:20063969

  20. Identification and Control of Pollution from Salt Water Intrusion.

    ERIC Educational Resources Information Center

    Environmental Protection Agency, Washington, DC. Office of Water Programs.

    This document contains informational guidelines for identifying and evaluating the nature and extent of pollution from salt water intrusion. The intent of these guidelines is to provide a basic framework for assessing salt water intrusion problems and their relationship to the total hydrologic system, and to provide assistance in developing…

  1. Damage-detection system for LNG carriers

    NASA Technical Reports Server (NTRS)

    Mastandrea, J. R.; Scherb, M. V.

    1978-01-01

    System utilizes array of acoustical transducers to detect cracks and leaks in liquefied natural gas (LNG) containers onboard ships. In addition to detecting leaks, device indicates location and leak rate.

  2. Convective, intrusive geothermal plays: what about tectonics?

    NASA Astrophysics Data System (ADS)

    Santilano, A.; Manzella, A.; Gianelli, G.; Donato, A.; Gola, G.; Nardini, I.; Trumpy, E.; Botteghi, S.

    2015-09-01

    We revised the concept of convective, intrusive geothermal plays, considering that the tectonic setting is not, in our opinion, a discriminant parameter suitable for a classification. We analysed and compared four case studies: (i) Larderello (Italy), (ii) Mt Amiata (Italy), (iii) The Geysers (USA) and (iv) Kizildere (Turkey). The tectonic settings of these geothermal systems are different and a matter of debate, so it is hard to use this parameter, and the results of classification are ambiguous. We suggest a classification based on the age and nature of the heat source and the related hydrothermal circulation. Finally we propose to distinguish the convective geothermal plays as volcanic, young intrusive and amagmatic.

  3. Vulnerbility of production wells in the Potomac-Raritan-Magothy aquifer system to saltwater intrusion from the Delaware River in Camden, Gloucester, and Salem Counties, New Jersey

    USGS Publications Warehouse

    Navoy, Anthony S.; Voronin, Lois M.; Modica, Edward

    2005-01-01

    The Potomac-Raritan-Magothy aquifer system is hydraulically connected to the Delaware River in parts of Camden and Gloucester Counties, New Jersey, and has more limited contact with the river in Salem County, New Jersey. The aquifer system is used widely for water supply, and 122 production wells that are permitted by the New Jersey Department of Environmental Protection to pump more than 100,000 gallons per year in the three counties are within 2 miles of the river. During drought, saltwater may encroach upstream from the Atlantic Ocean and Delaware Bay to areas where the aquifer system is recharged by induced infiltration through the Delaware River streambed. During the drought of the mid-1960's, water with a chloride concentration in excess of potability standards (250 mg/L (milligrams per liter)) encroached into the reach of the river that recharges the aquifer system. The vulnerability of the major production wells in the area to similar saltwater encroachment in the future is a concern to water managers. This vulnerability was evaluated by investigating two scenarios: (1) a one-time recurrence of the conditions approximating those that occurred in the1960's, and (2) the recurrence of those same conditions on an annual basis. Results of ground-water-flow simulation in conjunction with particle tracking and one-dimensional transport analysis indicate that the wells that are most vulnerable to saltwater intrusion are those in the Morris and Delair well fields in Camden County. A single 30-day event during which the concentration of dissolved chloride or sodium exceeds 2,098 mg/L or 407 mg/L, respectively, in the Delaware River would threaten the potability of water from these wells, given New Jersey drinking-water standards of 250 mg/L for dissolved chloride and 50 mg/L for dissolved sodium. This chloride concentration is about six times that observed in the river during the 1960's drought. An annually occurring 1-month event during which the concentrations of

  4. Non-intrusive speed sensor

    NASA Technical Reports Server (NTRS)

    Wyett, L.

    1986-01-01

    In Phase I of the Non-Intrusive Speed Sensor program, a computerized literature search was performed to identify candidate technologies for remote, non-intrusive speed sensing applications in Space Shuttle Main Engine (SSME) turbopumps. The three most promising technologies were subjected to experimental evaluation to quantify their performance characteristics under the harsh environmental requirements within the turbopumps. Although the infrared and microwave approaches demonstrated excellent cavitation immunity in laboratory tests, the variable-source magnetic speed sensor emerged as the most viable approach. Preliminary design of this speed sensor encountered no technical obstacles and resulted in viable and feasible speed nut, sensor housing, and sensor coil designs. Phase II of this program developed the variable-source magnetic speed sensor through the detailed design task and guided the design into breadboard fabrication. The speed sensor and its integral speed nut were evaluated at both unit and system level testing. The final room-temperature and cryogenic spin testing of the hardware demonstrated that the sensor was capable of generating sufficient output signal to enable remote speed sensing from 1500 to 40000 rpm over a speed nut/sensor separation of 3.5 inches.

  5. Volatiles in a peralkaline system: Abiogenic hydrocarbons and F Cl Br systematics in the naujaite of the Ilímaussaq intrusion, South Greenland

    NASA Astrophysics Data System (ADS)

    Krumrei, Thomas V.; Pernicka, Ernst; Kaliwoda, Melanie; Markl, Gregor

    2007-05-01

    Agpaitic rocks comprise most of the exposed part of the 1.16 Ga old, 8 × 17 km large and about 1700 m thick Ilímaussaq intrusion in South Greenland. Within these, more than 600 m thick sequence of sodalite-rich "naujaites" (mainly sodalite + arfvedsonite + alkali feldspar + nepheline + eudialyte + aenigmatite) are interpreted as a sodalite flotation cumulate. Sodalites show two to three different zones in cathodoluminescence (CL) and at least two zones in thin sections. The CL zones can be related to chemical differences detectable by electron microprobe, whereas relations with optical zonations are less obvious. Compositional trends in sodalite reflect trends in the evolution of volatile contents in the melt. The sodalite at Ilímaussaq is almost free of Ca and closely corresponds to the pure Na-Cl sodalite endmember with about 7 wt.% of Cl; S contents reach up to 0.9 wt.%. Cl/Br ratios range from 500 to 1700. Raman spectroscopy shows that S is present as [SO 4] 2- in sodalite, although sphalerite (ZnS) is a stable phase in naujaites. Peralkalinity and fO 2 conditions allow S 2- and [SO 4] 2- to be present contemporaneously. The whole naujaite sequence is divided into two parts, an upper part with low, homogeneous S contents and Cl/Br ratios in the sodalite cores, and a lower part with strongly variable and higher S contents and with Cl/Br ratios, which are decreasing downwards. The details of the S content and the Cl/Br ratio evolution show that sodalite strongly influences the halogen contents of the melt by scavenging Cl and Br. The naujaites were formed from a highly reduced, halogen-rich magma in equilibrium with magmatic methane at about 800 °C, which, upon ascent, cooling and fractionation, exsolved an aqueous fluid phase. Both fluids were trapped in separate inclusions indicating their immiscibility. Micrometer-sized aegirine crystals and primary hydrocarbon-bearing inclusions are abundant in the crystal cores. The inclusions were trapped at pressures

  6. Saltwater intrusion in the surficial aquifer system of the Big Cypress Basin, southwest Florida, and a proposed plan for improved salinity monitoring

    USGS Publications Warehouse

    Prinos, Scott T.

    2013-01-01

    The installation of drainage canals, poorly cased wells, and water-supply withdrawals have led to saltwater intrusion in the primary water-use aquifers in southwest Florida. Increasing population and water use have exacerbated this problem. Installation of water-control structures, well-plugging projects, and regulation of water use have slowed saltwater intrusion, but the chloride concentration of samples from some of the monitoring wells in this area indicates that saltwater intrusion continues to occur. In addition, rising sea level could increase the rate and extent of saltwater intrusion. The existing saltwater intrusion monitoring network was examined and found to lack the necessary organization, spatial distribution, and design to properly evaluate saltwater intrusion. The most recent hydrogeologic framework of southwest Florida indicates that some wells may be open to multiple aquifers or have an incorrect aquifer designation. Some of the sampling methods being used could result in poor-quality data. Some older wells are badly corroded, obstructed, or damaged and may not yield useable samples. Saltwater in some of the canals is in close proximity to coastal well fields. In some instances, saltwater occasionally occurs upstream from coastal salinity control structures. These factors lead to an incomplete understanding of the extent and threat of saltwater intrusion in southwest Florida. A proposed plan to improve the saltwater intrusion monitoring network in the South Florida Water Management District’s Big Cypress Basin describes improvements in (1) network management, (2) quality assurance, (3) documentation, (4) training, and (5) data accessibility. The plan describes improvements to hydrostratigraphic and geospatial network coverage that can be accomplished using additional monitoring, surface geophysical surveys, and borehole geophysical logging. Sampling methods and improvements to monitoring well design are described in detail. Geochemical analyses

  7. Discriminating ultrasonic proximity detection system

    DOEpatents

    Annala, Wayne C.

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  8. Airborne change detection system for the detection of route mines

    NASA Astrophysics Data System (ADS)

    Donzelli, Thomas P.; Jackson, Larry; Yeshnik, Mark; Petty, Thomas E.

    2003-09-01

    The US Army is interested in technologies that will enable it to maintain the free flow of traffic along routes such as Main Supply Routes (MSRs). Mines emplaced in the road by enemy forces under cover of darkness represent a major threat to maintaining a rapid Operational Tempo (OPTEMPO) along such routes. One technique that shows promise for detecting enemy mining activity is Airborne Change Detection, which allows an operator to detect suspicious day-to-day changes in and around the road that may be indicative of enemy mining. This paper presents an Airborne Change Detection that is currently under development at the US Army Night Vision and Electronic Sensors Directorate (NVESD). The system has been tested using a longwave infrared (LWIR) sensor on a vertical take-off and landing unmanned aerial vehicle (VTOL UAV) and a midwave infrared (MWIR) sensor on a fixed wing aircraft. The system is described and results of the various tests conducted to date are presented.

  9. Thermal systems for landmine detection

    NASA Astrophysics Data System (ADS)

    D'Angelo, Marco; Del Vecchio, Luca; Esposito, Salvatore; Balsi, Marco; Jankowski, Stanislaw

    2009-06-01

    This paper presents new techniques of landmine detection and localization using thermal methods. Described methods use both dynamical and static analysis. The work is based on datasets obtained from the Humanitarian Demining Laboratory of Università La Sapienza di Roma, Italy.

  10. Expandable coating cocoon leak detection system

    NASA Technical Reports Server (NTRS)

    Hauser, R. L.; Kochansky, M. C.

    1972-01-01

    Development of system and materials for detecting leaks in cocoon protective coatings are discussed. Method of applying materials for leak determination is presented. Pressurization of system following application of materials will cause formation of bubble if leak exists.

  11. Forward Obstacle Detection System by Stereo Vision

    NASA Astrophysics Data System (ADS)

    Iwata, Hiroaki; Saneyoshi, Keiji

    Forward obstacle detection is needed to prevent car accidents. We have developed forward obstacle detection system which has good detectability and the accuracy of distance only by using stereo vision. The system runs in real time by using a stereo processing system based on a Field-Programmable Gate Array (FPGA). Road surfaces are detected and the space to drive can be limited. A smoothing filter is also used. Owing to these, the accuracy of distance is improved. In the experiments, this system could detect forward obstacles 100 m away. Its error of distance up to 80 m was less than 1.5 m. It could immediately detect cutting-in objects.

  12. Toward detecting deception in intelligent systems

    NASA Astrophysics Data System (ADS)

    Santos, Eugene, Jr.; Johnson, Gregory, Jr.

    2004-08-01

    Contemporary decision makers often must choose a course of action using knowledge from several sources. Knowledge may be provided from many diverse sources including electronic sources such as knowledge-based diagnostic or decision support systems or through data mining techniques. As the decision maker becomes more dependent on these electronic information sources, detecting deceptive information from these sources becomes vital to making a correct, or at least more informed, decision. This applies to unintentional disinformation as well as intentional misinformation. Our ongoing research focuses on employing models of deception and deception detection from the fields of psychology and cognitive science to these systems as well as implementing deception detection algorithms for probabilistic intelligent systems. The deception detection algorithms are used to detect, classify and correct attempts at deception. Algorithms for detecting unexpected information rely upon a prediction algorithm from the collaborative filtering domain to predict agent responses in a multi-agent system.

  13. Flowthrough Bacteria-Detection System

    NASA Technical Reports Server (NTRS)

    Grana, D. C.; Wilkins, J. R.

    1983-01-01

    Online system allows repetitive cycling of sample intake, bacteria counting and sterilization. System measures bacteria count by using sample/incubate/ measure cycle. Steps in cycle are on/off operations to cycle automated easily.

  14. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, George W.; Kern, Jr., Edward C.; Schweppe, Fred C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  15. Non-intrusive appliance monitor apparatus

    DOEpatents

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  16. Canadian pipeline installs leak-detection system

    SciTech Connect

    Yoon, M.S.; Mensik, M.; Luk, W.Y.

    1988-05-30

    Site-acceptance tests for a recently installed leak-detection system on a pipeline in southern Alberta indicated that the system will reduce spillage because of leaks. The tests on the Porcupine Hills Pipeline also indicated that pipeline isolation and spill containment are enhanced by the use of the system. Covered here are the selection, design, and implementation of the real time leak-detection system and its extension to offshore and arctic applications.

  17. Hydrogen Fire Detection System Features Sharp Discrimination

    NASA Technical Reports Server (NTRS)

    Bright, C. S.

    1966-01-01

    Hydrogen fire detection system discovers fires by detecting the flickering ultraviolet radiation emitted by the OH molecule, a short-lived intermediate combustion product found in hydrogen-air flames. In a space application, the system discriminates against false signals from sunlight and rocket engine exhaust plume radiation.

  18. Development of an in-line filter to prevent intrusion of NO2 toxic vapors into A/C systems

    NASA Technical Reports Server (NTRS)

    Meneghelli, Barry; Mcnulty, R. J.; Springer, Mike; Lueck, Dale E.

    1995-01-01

    The hypergolic propellant nitrogen tetroxide (N2O4 or NTO) is routinely used in spacecraft launched at Kennedy Space Center (KSC) and Cape Canaveral Air Station (CCAS). In the case of a catastrophic failure of the spacecraft, there would be a release of the unspent propellant in the form of a toxic cloud. Inhalation of this material at downwind concentrations which may be as high as 20 parts per million (ppm) for 30 minutes in duration, may produce irritation to the eyes, nose and respiratory tract. Studies at both KSC and CCAS have shown that the indoor concentrations of N2O4 during a toxic release may range from 1 to 15 ppm and depend on the air change rate (ACR) for a particular building and whether or not the air conditioning (A/C) system has been shut down or left in an operating mode. This project was initiated in order to assess how current A/C systems could be easily modified to prevent personnel from being exposed to toxic vapors. A sample system has been constructed to test the ability of several types of filter material to capture the N2O4 vapors prior to their infiltration into the A/C system. Test results will be presented which compare the efficiencies of standard A/C filters, water wash systems, and chemically impregnated filter material in taking toxic vapors out of the incoming air stream.

  19. Multisensor system for mine detection

    NASA Astrophysics Data System (ADS)

    Duvoisin, Herbert A., III; Steinway, William J.; Tomassi, Mark S.; Thomas, James E.; Morris, Carl A.; Kahn, Barry A.; Stern, Peter H.; Krywick, Scott; Johnson, Kevin; Dennis, Kevin; Betts, George; Blood, Ben; Simoneaux, Wanda; Miller, John L.

    1998-10-01

    A multi-sensor approach to buried object discrimination has been developed by Coleman Research Corporation (CRC) as a practical successor to currently prevalent metal detectors. The CRC multi-sensor unit integrates with and complements standard metal detectors to enable the detection of low- metallic and non-metallic anti-tank and anti-personnel mines as well as the older metallic-jacketed mines. The added sensors include Ground Penetration Radar (GPR) and Infrared (IR). The GPR consists of a lightweight (less than 1 LB) snap on antenna unit, a belt attached electronics unit (less than 5 LB) and batteries. The IR consists of a lightweight (less than 3 LB) head mounted camera, a heads-up virtual display, and a belt attached processing unit (Figure 1.1). The output from Automatic Target Recognition algorithms provide the detection of metallic and non-metallic mines in real-time on the IR display and as an audio alert from the GPR and MD.

  20. Thermal and tectonic history of the Mineral Mountains intrusive complex

    SciTech Connect

    Evans, S.; Nielson, D.L.

    1982-10-01

    Study of the Mineral Mountains intrusive complex was undertaken to decipher interrelationships of intrusion, uplift rate and structural control as related to the Roosevelt Hot Springs geothermal system. Results of fission track and K-Ar dating show that different units of the intrusive complex underwent similar cooling histories. Uplift rates calculated for the north (0.25 mm/yr) and central (0.5 mm/yr) portions differ substantially. This difference in uplift rate may have accounted for the development of faulting which has been important as structural controls on the geothermal system.

  1. Inertial navigation sensor integrated obstacle detection system

    NASA Technical Reports Server (NTRS)

    Bhanu, Bir (Inventor); Roberts, Barry A. (Inventor)

    1992-01-01

    A system that incorporates inertial sensor information into optical flow computations to detect obstacles and to provide alternative navigational paths free from obstacles. The system is a maximally passive obstacle detection system that makes selective use of an active sensor. The active detection typically utilizes a laser. Passive sensor suite includes binocular stereo, motion stereo and variable fields-of-view. Optical flow computations involve extraction, derotation and matching of interest points from sequential frames of imagery, for range interpolation of the sensed scene, which in turn provides obstacle information for purposes of safe navigation.

  2. Voice activity detection for speaker verification systems

    NASA Astrophysics Data System (ADS)

    Borowski, Filip

    2008-01-01

    Complex algorithm for speech activity detection was presented in this article. It is based on speech enhancement, features extraction and final detection algorithm. The first one was published in ETSI standard as a module of "Advanced front-end feature extraction algorithm" in distributed speech recognition system. It consists of two main parts, noise estimatiom and Wiener filtering. For the final detection modified linear prediction coefficients and spectral entropy features are extracted form denoised signal.

  3. Non-intrusive refrigerant charge indicator

    DOEpatents

    Mei, Viung C.; Chen, Fang C.; Kweller, Esher

    2005-03-22

    A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

  4. A national drilling program to study the roots of active hydrothermal systems related to young magmatic intrusions

    SciTech Connect

    Not Available

    1984-01-01

    The importance of studies of active hydrothermal-magma systems as part of a national continental scientific drilling program has been emphasized in numerous workshops and symposia. The present report, prepared by the Panel on Thermal Regimes of the Continental Scientific Drilling Committee, both reinforces and expands on earlier recommendations. The US Geodynamics Committee 1979 report of the Los Almos workshop, Continental Scientific Drilling Program, placed major emphasis on maximizing the scientific value of current and planned drilling by industry and government, supplementing these efforts with holes drilled solely for scientific purposes. Although the present report notes the importance of opportunities for scientific investigations that may be added on to current, mission-oriented drilling activities, the Panel on Thermal Regimes recognizes that such opportunities are limited and thus focused its study on holes dedicated to broad scientific objectives. 16 refs., 2 figs., 4 tabs.

  5. Experimental modelling of ground deformation associated with shallow magma intrusions

    NASA Astrophysics Data System (ADS)

    Galland, O.

    2012-04-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this contribution, I will present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored in 3D. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in analyses of ground deformation patterns on volcanoes.

  6. Experimental modelling of ground deformation associated with shallow magma intrusions

    NASA Astrophysics Data System (ADS)

    Galland, Olivier

    2012-02-01

    Active volcanoes experience ground deformation as a response to the dynamics of underground magmatic systems. The analysis of ground deformation patterns may provide important constraints on the dynamics and shape of the underlying volcanic plumbing systems. Nevertheless, these analyses usually take into account simplistic shapes (sphere, dykes, sills) and the results cannot be verified as the modelled systems are buried. In this paper, I present new results from experimental models of magma intrusion, in which both the evolution of ground deformation during intrusion and the shape of the underlying intrusion are monitored. The models consisted of a molten vegetable oil, simulating low viscosity magma, injected into cohesive fine-grained silica flour, simulating the brittle upper crust; oil injection resulted is sheet intrusions (dykes, sills and cone sheets). The initial topography in the models was flat. While the oil was intruding, the surface of the models slightly lifted up to form a smooth relief, which was mapped through time. After an initial symmetrical development, the uplifted area developed asymmetrically; at the end of the experiments, the oil always erupted at the steepest edge of the uplifted area. After the experiment, the oil solidified, the intrusion was excavated and the shape of its top surface mapped. The comparison between the uplifted zone and the underlying intrusions showed that (1) the complex shapes of the uplifted areas reflected the complex shapes of the underlying intrusions, (2) the time evolution of the uplifted zone was correlated with the evolution of the underlying intrusion, and (3) the early asymmetrical evolution of the uplifted areas can be used to predict the location of the eruption of the oil. The experimental results also suggest that complex intrusion shapes (inclined sheet, cone sheet, complex sill) may have to be considered more systematically in the analyses of ground deformation patterns on volcanoes.

  7. Multisensor cargo bay fire detection system

    NASA Astrophysics Data System (ADS)

    Snyder, Brian L.; Anderson, Kaare J.; Renken, Christopher H.; Socha, David M.; Miller, Mark S.

    2004-08-01

    Current aircraft cargo bay fire detection systems are generally based on smoke detection. Smoke detectors in modern aircraft are predominately photoelectric particle detectors that reliably detect smoke, but also detect dust, fog, and most other small particles. False alarms caused by these contaminants can be very costly to the airlines because they can cause flights to be diverted needlessly. To minimize these expenses, a new approach to cargo bay fire detection is needed. This paper describes a novel fire detection system developed by the Goodrich Advanced Sensors Technical Center. The system uses multiple sensors of different technologies to provide a way of discriminating between real fire events and false triggers. The system uses infrared imaging along with multiple, distributed chemical sensors and smoke detectors, all feeding data to a digital signal processor. The processor merges data from the chemical sensors, smoke detectors, and processed images to determine if a fire (or potential fire) is present. Decision algorithms look at all this data in real-time and make the final decision about whether a fire is present. In the paper, we present a short background of the problem we are solving, the reasons for choosing the technologies used, the design of the system, the signal processing methods and results from extensive system testing. We will also show that multiple sensing technologies are crucial to reducing false alarms in such systems.

  8. Computer aided detection system for clustered microcalcifications

    PubMed Central

    Ge, Jun; Hadjiiski, Lubomir M.; Sahiner, Berkman; Wei, Jun; Helvie, Mark A.; Zhou, Chuan; Chan, Heang-Ping

    2009-01-01

    We have developed a computer-aided detection (CAD) system to detect clustered microcalcification automatically on full-field digital mammograms (FFDMs) and a CAD system for screen-film mammograms (SFMs). The two systems used the same computer vision algorithms but their false positive (FP) classifiers were trained separately with sample images of each modality. In this study, we compared the performance of the CAD systems for detection of clustered microcalcifications on pairs of FFDM and SFM obtained from the same patient. For case-based performance evaluation, the FFDM CAD system achieved detection sensitivities of 70%, 80%, and 90% at an average FP cluster rate of 0.07, 0.16, and 0.63 per image, compared with an average FP cluster rate of 0.15, 0.38, and 2.02 per image for the SFM CAD system. The difference was statistically significant with the alternative free-response receiver operating characteristic (AFROC) analysis. When evaluated on data sets negative for microcalcification clusters, the average FP cluster rates of the FFDM CAD system were 0.04, 0.11, and 0.33 per image at detection sensitivity level of 70%, 80%, and 90%, compared with an average FP cluster rate of 0.08, 0.14, and 0.50 per image for the SFM CAD system. When evaluated for malignant cases only, the difference of the performance of the two CAD systems was not statistically significant with AFROC analysis. PMID:17264365

  9. Computer systems for automatic earthquake detection

    USGS Publications Warehouse

    Stewart, S.W.

    1974-01-01

    U.S Geological Survey seismologists in Menlo park, California, are utilizing the speed, reliability, and efficiency of minicomputers to monitor seismograph stations and to automatically detect earthquakes. An earthquake detection computer system, believed to be the only one of its kind in operation, automatically reports about 90 percent of all local earthquakes recorded by a network of over 100 central California seismograph stations. The system also monitors the stations for signs of malfunction or abnormal operation. Before the automatic system was put in operation, all of the earthquakes recorded had to be detected by manually searching the records, a time-consuming process. With the automatic detection system, the stations are efficiently monitored continuously. 

  10. RADIATION DETECTING AND TELEMETERING SYSTEM

    DOEpatents

    Richards, H.K.

    1959-12-15

    A system is presented for measuring ionizing radiation at several remote stations and transmitting the measured information by radio to a central station. At each remote station a signal proportioned to the counting rate is applied across an electrical condenser made of ferroelectric material. The voltage across the condenser will vary as a function of the incident radiation and the capacitance of the condenser will vary accordingly. This change in capacitance is used to change the frequency of a crystalcontrolled oscillator. The output of the oscillator is coupled to an antenna for transmitting a signal proportional to the incident radiation.

  11. Detecting data anomalies methods in distributed systems

    NASA Astrophysics Data System (ADS)

    Mosiej, Lukasz

    2009-06-01

    Distributed systems became most popular systems in big companies. Nowadays many telecommunications companies want to hold large volumes of data about all customers. Obviously, those data cannot be stored in single database because of many technical difficulties, such as data access efficiency, security reasons, etc. On the other hand there is no need to hold all data in one place, because companies already have dedicated systems to perform specific tasks. In the distributed systems there is a redundancy of data and each system holds only interesting data in appropriate form. Data updated in one system should be also updated in the rest of systems, which hold that data. There are technical problems to update those data in all systems in transactional way. This article is about data anomalies in distributed systems. Avail data anomalies detection methods are shown. Furthermore, a new initial concept of new data anomalies detection methods is described on the last section.

  12. Influence of seawater intrusion on microbial communities in groundwater.

    PubMed

    Unno, Tatsuya; Kim, Jungman; Kim, Yumi; Nguyen, Son G; Guevarra, Robin B; Kim, Gee Pyo; Lee, Ji-Hoon; Sadowsky, Michael J

    2015-11-01

    Groundwater is the sole source of potable water on Jeju Island in the Republic of (South) Korea. Groundwater is also used for irrigation and industrial purposes, and it is severely impacted by seawater intrusion in coastal areas. Consequently, monitoring the intrusion of seawater into groundwater on Jeju is very important for health and environmental reasons. A number of studies have used hydrological models to predict the deterioration of groundwater quality caused by seawater intrusion. However, there is conflicting evidence of intrusion due to complicated environmental influences on groundwater quality. Here we investigated the use of next generation sequencing (NGS)-based microbial community analysis as a way to monitor groundwater quality and detect seawater intrusion. Pristine groundwater, groundwater from three coastal areas, and seawater were compared. Analysis of the distribution of bacterial species clearly indicated that the high and low salinity groundwater differed significantly with respect to microbial composition. While members of the family Parvularculaceae were only identified in high salinity water samples, a greater percentage of the phylum Actinobacteria was predominantly observed in pristine groundwater. In addition, we identified 48 shared operational taxonomic units (OTUs) with seawater, among which the high salinity groundwater sample shared a greater number of bacterial species with seawater (6.7%). In contrast, other groundwater samples shared less than 0.5%. Our results suggest that NGS-based microbial community analysis of groundwater may be a useful tool for monitoring groundwater quality and detect seawater intrusion. This technology may also provide additional insights in understanding hydrological dynamics.

  13. Multispectral imaging system for contaminant detection

    NASA Technical Reports Server (NTRS)

    Poole, Gavin H. (Inventor)

    2003-01-01

    An automated inspection system for detecting digestive contaminants on food items as they are being processed for consumption includes a conveyor for transporting the food items, a light sealed enclosure which surrounds a portion of the conveyor, with a light source and a multispectral or hyperspectral digital imaging camera disposed within the enclosure. Operation of the conveyor, light source and camera are controlled by a central computer unit. Light reflected by the food items within the enclosure is detected in predetermined wavelength bands, and detected intensity values are analyzed to detect the presence of digestive contamination.

  14. Data fusion to develop a driver drowsiness detection system with robustness to signal loss.

    PubMed

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-09-25

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs.

  15. Data fusion to develop a driver drowsiness detection system with robustness to signal loss.

    PubMed

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-01-01

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs. PMID:25256113

  16. Data Fusion to Develop a Driver Drowsiness Detection System with Robustness to Signal Loss

    PubMed Central

    Samiee, Sajjad; Azadi, Shahram; Kazemi, Reza; Nahvi, Ali; Eichberger, Arno

    2014-01-01

    This study proposes a drowsiness detection approach based on the combination of several different detection methods, with robustness to the input signal loss. Hence, if one of the methods fails for any reason, the whole system continues to work properly. To choose correct combination of the available methods and to utilize the benefits of methods of different categories, an image processing-based technique as well as a method based on driver-vehicle interaction is used. In order to avoid driving distraction, any use of an intrusive method is prevented. A driving simulator is used to gather real data and then artificial neural networks are used in the structure of the designed system. Several tests were conducted on twelve volunteers while their sleeping situations during one day prior to the tests, were fully under control. Although the impact of the proposed system on the improvement of the detection accuracy is not remarkable, the results indicate the main advantages of the system are the reliability of the detections and robustness to the loss of the input signals. The high reliability of the drowsiness detection systems plays an important role to reduce drowsiness related road accidents and their associated costs. PMID:25256113

  17. Seismic Interpretation of Igneous Intrusions and Their Implications for an Unconventional Petroleum System in Southeastern Parnaiba Basin, Northeastern Brazil.

    NASA Astrophysics Data System (ADS)

    Porto, A. L.; Pereira, E.

    2014-12-01

    After almost two decades of little exploratory effort in the Parnaiba Basin, recent gas discoveries have revived the economic interest in this region. A new exploratory play was successfully tested, confirming the efficiency of the igneous sills triggering the thermal effect on source rocks maturation, and also playing an important role as unconventional trap and seal. Parnaiba Basin was affected by two magmatic events: the Mosquito Formation (Average Age: 178 Ma) and the Sardinha Formation (Average Age: 124 Ma), both characterized by basic magmatic rocks. Ten 2D seismic lines, located in the southeastern Parnaiba Basin, were systematically interpreted in order to identify the main diabase sills geometry, some possible emplacement controls and further implications for an unconventional petroleum system. The identified sills were classified in three types: A, B, and C, according to their dominant geometries and the stratigraphic position of their host rocks. From base to top, Type A sills intrude the Pre-Silurian Sequence, that fills in graben structures of the basement. They have short lateral continuity and saucer-shaped geometry. The main graben faults seem to control the steeper sills, which seem to feed upper sills. Type B sills intrude mainly the Silurian Sequence and have a very long lateral continuity when intruding the shales of Tiangua Formation, in which they are mainly horizontal tabular. Type C sills intrude the top of the Devonian Sequence and have two main geometries: saucer-shaped and horizontal tabular. By correlation to the surface geology of the area, Type C sills are interpreted as Sardinha Formation (Lower Cretaceous). Considering an unconventional hydrocarbon play in the area, some potential trap features associated with sill geometry, were identified, using analogous plays successfully tested in recent discoveries. These traps are associated to a specific sill geometry locally known as "inverted saucer-shaped sill". This shape consists into a

  18. DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA

    SciTech Connect

    SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

    2010-12-02

    Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

  19. Automated Hydrogen Gas Leak Detection System

    NASA Technical Reports Server (NTRS)

    1995-01-01

    The Gencorp Aerojet Automated Hydrogen Gas Leak Detection System was developed through the cooperation of industry, academia, and the Government. Although the original purpose of the system was to detect leaks in the main engine of the space shuttle while on the launch pad, it also has significant commercial potential in applications for which there are no existing commercial systems. With high sensitivity, the system can detect hydrogen leaks at low concentrations in inert environments. The sensors are integrated with hardware and software to form a complete system. Several of these systems have already been purchased for use on the Ford Motor Company assembly line for natural gas vehicles. This system to detect trace hydrogen gas leaks from pressurized systems consists of a microprocessor-based control unit that operates a network of sensors. The sensors can be deployed around pipes, connectors, flanges, and tanks of pressurized systems where leaks may occur. The control unit monitors the sensors and provides the operator with a visual representation of the magnitude and locations of the leak as a function of time. The system can be customized to fit the user's needs; for example, it can monitor and display the condition of the flanges and fittings associated with the tank of a natural gas vehicle.

  20. Flat Surface Damage Detection System (FSDDS)

    NASA Technical Reports Server (NTRS)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  1. Detection probability of EBPSK-MODEM system

    NASA Astrophysics Data System (ADS)

    Yao, Yu; Wu, Lenan

    2016-07-01

    Since the impacting filter-based receiver is able to transform phase modulation into amplitude peak, a simple threshold decision can detect the Extend-Binary Phase Shift Keying (EBPSK) modulated ranging signal in noise environment. In this paper, an analysis of the EBPSK-MODEM system output gives the probability density function for EBPSK modulated signals plus noise. The equation of detection probability (pd) for fluctuating and non-fluctuating targets has been deduced. Also, a comparison of the pd for the EBPSK-MODEM system and pulse radar receiver is made, and some results are plotted. Moreover, the probability curves of such system with several modulation parameters are analysed. When modulation parameter is not smaller than 6, the detection performance of EBPSK-MODEM system is more excellent than traditional radar system. In addition to theoretical considerations, computer simulations are provided for illustrating the performance.

  2. Human intrusion in geologic disposal

    SciTech Connect

    Not Available

    1993-12-31

    This report discusses the possibility of human intrusion into the WIPP facility, an undergound disposal facility for alpha-bearing wastes. The probability of exploratory drilling occurring at the site is described.

  3. Force protection demining system (FPDS) detection subsystem

    NASA Astrophysics Data System (ADS)

    Zachery, Karen N.; Schultz, Gregory M.; Collins, Leslie M.

    2005-06-01

    This study describes the U.S. Army Force Protection Demining System (FPDS); a remotely-operated, multisensor platform developed for reliable detection and neutralization of both anti-tank and anti-personnel landmines. The ongoing development of the prototype multisensor detection subsystem is presented, which integrates an advanced electromagnetic pulsed-induction array and ground penetrating synthetic aperture radar array on a single standoff platform. The FPDS detection subsystem is mounted on a robotic rubber-tracked vehicle and incorporates an accurate and precise navigation/positioning module making it well suited for operation in varied and irregular terrains. Detection sensors are optimally configured to minimize interference without loss in sensitivity or performance. Mine lane test data acquired from the prototype sensors are processed to extract signal- and image-based features for automatic target recognition. Preliminary results using optimal feature and classifier selection indicate the potential of the system to achieve high probabilities of detection while minimizing false alarms. The FPDS detection software system also exploits modern multi-sensor data fusion algorithms to provide real-time detection and discrimination information to the user.

  4. Gas intrusion into SPR caverns

    SciTech Connect

    Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T.; Giles, H.N.

    1995-12-01

    The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

  5. Expert System Detects Power-Distribution Faults

    NASA Technical Reports Server (NTRS)

    Walters, Jerry L.; Quinn, Todd M.

    1994-01-01

    Autonomous Power Expert (APEX) computer program is prototype expert-system program detecting faults in electrical-power-distribution system. Assists human operators in diagnosing faults and deciding what adjustments or repairs needed for immediate recovery from faults or for maintenance to correct initially nonthreatening conditions that could develop into faults. Written in Lisp.

  6. Advanced Atmospheric Water Vapor DIAL Detection System

    NASA Technical Reports Server (NTRS)

    Refaat, Tamer F.; Elsayed-Ali, Hani E.; DeYoung, Russell J. (Technical Monitor)

    2000-01-01

    Measurement of atmospheric water vapor is very important for understanding the Earth's climate and water cycle. The remote sensing Differential Absorption Lidar (DIAL) technique is a powerful method to perform such measurement from aircraft and space. This thesis describes a new advanced detection system, which incorporates major improvements regarding sensitivity and size. These improvements include a low noise advanced avalanche photodiode detector, a custom analog circuit, a 14-bit digitizer, a microcontroller for on board averaging and finally a fast computer interface. This thesis describes the design and validation of this new water vapor DIAL detection system which was integrated onto a small Printed Circuit Board (PCB) with minimal weight and power consumption. Comparing its measurements to an existing DIAL system for aerosol and water vapor profiling validated the detection system.

  7. A cable detection lidar system for helicopters

    NASA Technical Reports Server (NTRS)

    Grossmann, Benoist; Capbern, Alain; Defour, Martin; Fertala, Remi

    1992-01-01

    Helicopters in low-level flight are endangered by power lines or telephone wires, especially when flying at night and under poor visibility conditions. In order to prevent 'wire strike', Thomson has developed a lidar system consisting of a pulsed diode laser emitting in the near infrared region (lambda = 0.9 microns). The HOWARD (Helicopter Obstacle Warning and Detection) System utilizes a high repetition rate diode laser (PRE = 20 KHz) along with counter-rotating prisms for laser beam deflection with a total field of view of 30 degrees. This system was successfully field tested in 1991. HOWARD can detect one inch wires at ranges up to 200 meters. We are presently in the process of developing a flyable compact lidar system capable of detection ranges in the order of 400 meters.

  8. Boomerang mobile counter shooter detection system

    NASA Astrophysics Data System (ADS)

    Mazurek, Jeffrey A.; Barger, James E.; Brinn, Marshall; Mullen, Richard J.; Price, David; Ritter, Scott E.; Schmitt, Dave

    2005-05-01

    Boomerang is an acoustic system installed on military vehicles that is designed to detect relative shooter azimuth/range/elevation from incoming small arms fire. It performs passive acoustic detection and computer-based signal processing. Aural and visual alerts are used to 1) inform vehicle occupants that a bullet has passed within close proximity to the vehicle and 2) indicate the position of the shooter relative to the vehicle"s direction of travel. Boomerang operates when the vehicle is stationary or moving (no motion compensation) using a single, compact, mast-mounted array of microphones. The system is calibrated to detect infantry small arms. This calibration, however, does not preclude the system from detecting larger and smaller supersonic rounds. In this paper, we discuss the design, development, testing and production of 50 Boomerang I systems over a 65-day period in late 2003/early 2004. These systems were deployed during Operation Iraqi Freedom II with Marine and Army units. Feedback from operational units identified specific deficiencies and desired improvements that were incorporated into a system re-design effort, Boomerang II. The Boomerang II system has been extensively tested for performance and environmental fitness regarding RF compatibility with tactical radios (SINCGARS), heat, cold, shock and vibration. The US Army Aberdeen Proving Grounds conducted successful RF compatibility tests, road tests and 'live fire' testing. Summary results of open field 'live fire' static tests are presented as well as performance results on a remote-controlled HMMWV operating at 45 MPH.

  9. Distributed fiber optic fuel leak detection system

    NASA Astrophysics Data System (ADS)

    Mendoza, Edgar; Kempen, C.; Esterkin, Yan; Sun, Sunjian

    2013-05-01

    With the increase worldwide demand for hydrocarbon fuels and the vast development of new fuel production and delivery infrastructure installations around the world, there is a growing need for reliable fuel leak detection technologies to provide safety and reduce environmental risks. Hydrocarbon leaks (gas or liquid) pose an extreme danger and need to be detected very quickly to avoid potential disasters. Gas leaks have the greatest potential for causing damage due to the explosion risk from the dispersion of gas clouds. This paper describes progress towards the development of a fast response, high sensitivity, distributed fiber optic fuel leak detection (HySensTM) system based on the use of an optical fiber that uses a hydrocarbon sensitive fluorescent coating to detect the presence of fuel leaks present in close proximity along the length of the sensor fiber. The HySenseTM system operates in two modes, leak detection and leak localization, and will trigger an alarm within seconds of exposure contact. The fast and accurate response of the sensor provides reliable fluid leak detection for pipelines, tanks, airports, pumps, and valves to detect and minimize any potential catastrophic damage.

  10. Distributed fiber optic fuel leak detection system

    NASA Astrophysics Data System (ADS)

    Mendoza, Edgar; Kempen, C.; Esterkin, Yan; Sun, Sonjian

    2013-05-01

    With the increase worldwide demand for hydrocarbon fuels and the vast development of new fuel production and delivery infrastructure installations around the world, there is a growing need for reliable fuel leak detection technologies to provide safety and reduce environmental risks. Hydrocarbon leaks (gas or liquid) pose an extreme danger and need to be detected very quickly to avoid potential disasters. Gas leaks have the greatest potential for causing damage due to the explosion risk from the dispersion of gas clouds. This paper describes progress towards the development of a fast response, high sensitivity, distributed fiber optic fuel leak detection (HySenseTM) system based on the use of an optical fiber that uses a hydrocarbon sensitive fluorescent coating to detect the presence of fuel leaks present in close proximity along the length of the sensor fiber. The HySenseTM system operates in two modes, leak detection and leak localization, and will trigger an alarm within seconds of exposure contact. The fast and accurate response of the sensor provides reliable fluid leak detection for pipelines, tanks, airports, pumps, and valves to detect and minimize any potential catastrophic damage.

  11. Automated macromolecular crystal detection system and method

    DOEpatents

    Christian, Allen T.; Segelke, Brent; Rupp, Bernard; Toppani, Dominique

    2007-06-05

    An automated macromolecular method and system for detecting crystals in two-dimensional images, such as light microscopy images obtained from an array of crystallization screens. Edges are detected from the images by identifying local maxima of a phase congruency-based function associated with each image. The detected edges are segmented into discrete line segments, which are subsequently geometrically evaluated with respect to each other to identify any crystal-like qualities such as, for example, parallel lines, facing each other, similarity in length, and relative proximity. And from the evaluation a determination is made as to whether crystals are present in each image.

  12. Edge detection techniques for iris recognition system

    NASA Astrophysics Data System (ADS)

    Tania, U. T.; Motakabber, S. M. A.; Ibrahimy, M. I.

    2013-12-01

    Nowadays security and authentication are the major parts of our daily life. Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. Between the Sobel and the Canny edge detection techniques, the experimental result shows that the Canny's technique has better ability to detect points in a digital image where image gray level changes even at slow rate.

  13. An enhanced stream mining approach for network anomaly detection

    NASA Astrophysics Data System (ADS)

    Bellaachia, Abdelghani; Bhatt, Rajat

    2005-03-01

    Network anomaly detection is one of the hot topics in the market today. Currently, researchers are trying to find a way in which machines could automatically learn both normal and anomalous behavior and thus detect anomalies if and when they occur. Most important applications which could spring out of these systems is intrusion detection and spam mail detection. In this paper, the primary focus on the problem and solution of "real time" network intrusion detection although the underlying theory discussed may be used for other applications of anomaly detection (like spam detection or spy-ware detection) too. Since a machine needs a learning process on its own, data mining has been chosen as a preferred technique. The object of this paper is to present a real time clustering system; we call Enhanced Stream Mining (ESM) which could analyze packet information (headers, and data) to determine intrusions.

  14. The interaction between reaction forces and stabilization systems during intrusion of the anterior teeth and its effect on the posterior unit.

    PubMed

    Van den Bulcke, M M; Dermaut, L R

    1990-11-01

    The aim of this research is to attain a better understanding of the initial reaction forces induced by an intrusion mechanism (acting on the anterior teeth) on the posterior unit and to examine how these forces can be neutralized. The experiments were performed on the dentition of a dry human skull and initial tooth displacements were registered by means of two laser measuring techniques, namely holographic interferometry and the laser reflection technique. It was established that of all reaction forces induced by the intrusion arch, distal tipping of the first molars is the most pronounced. A transpalatal bar connecting the teeth does not counteract this movement. The stabilization of the posterior unit with a transpalatal bar, buccal sectionals, and high-pull headgear proved to be the most effective technique.

  15. Maximum Temperature Detection System for Integrated Circuits

    NASA Astrophysics Data System (ADS)

    Frankiewicz, Maciej; Kos, Andrzej

    2015-03-01

    The paper describes structure and measurement results of the system detecting present maximum temperature on the surface of an integrated circuit. The system consists of the set of proportional to absolute temperature sensors, temperature processing path and a digital part designed in VHDL. Analogue parts of the circuit where designed with full-custom technique. The system is a part of temperature-controlled oscillator circuit - a power management system based on dynamic frequency scaling method. The oscillator cooperates with microprocessor dedicated for thermal experiments. The whole system is implemented in UMC CMOS 0.18 μm (1.8 V) technology.

  16. Novel systems for corrosion detection in piping

    SciTech Connect

    Raad, J.A. de; Fingerhut, M.P.

    1995-12-31

    Predictive maintenance requires accurate quantitative information. Nondestructive testing (NDT) tools have been able provide the necessary information, economically. Examination of the full surface of components is often required, which is contrary to the more typical spot location measurements. In addition, predictive maintenance inspection often requires the examination of hot and or insulated components. These challenges have been satisfied by recent developments in NDT and are applicable to a broad range of facility types such as tank terminals and pulp and paper plants. For non-insulated and above ground piping systems magnetic flux leakage (MFL) tools have recently been introduced into the marketplace. These tools allow very quick and reliable detection of local and extensive general corrosion, in carbon steel pipes or vessel walls, with nominal wall thicknesses of up to 15 mm. A relatively new method for detection of corrosion under insulated components is the RTD-Incotest, pulse eddy current (PEC) system. This system can also provide the components remaining wall thickness at general corrosion locations. Demand for corrosion detection under insulation on piping has also been satisfied by new dynamic Real-Time-Radiography systems. These systems are relatively fast, but the concept itself and its weight require close human access to the pipe, hence, some method of accessing above ground piping is required. Nevertheless, the systems satisfy a market demand. Time-of-flight-Diffraction (TOFD) for detection and sizing of weld root corrosion as well as coherent color enhanced thickness mapping will also be introduced.

  17. Expert system structures for fault detection in spaceborne power systems

    NASA Technical Reports Server (NTRS)

    Watson, Karan; Russell, B. Don; Hackler, Irene

    1988-01-01

    This paper presents an architecture for an expert system structure suitable for use with power system fault detection algorithms. The system described is not for the purpose of reacting to faults which have occurred, but rather for the purpose of performing on-line diagnostics and parameter evaluation to determine potential or incipient fault conditions. The system is also designed to detect high impedance or arcing faults which cannot be detected by conventional protection devices. This system is part of an overall monitoring computer hierarchy which would provide a full evaluation of the status of the power system and react to both incipient and catastrophic faults. An approximate hardware structure is suggested and software requirements are discussed. Modifications to CLIPS software, to capitalize on features offered by expert systems, are presented. It is suggested that such a system would have significant advantages over existing protection philosophy.

  18. Damage detection in initially nonlinear systems

    SciTech Connect

    Bornn, Luke; Farrar, Charles; Park, Gyuhae

    2009-01-01

    The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

  19. System for particle concentration and detection

    DOEpatents

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  20. System for detection of hazardous events

    DOEpatents

    Kulesz, James J.; Worley, Brian A.

    2006-05-23

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  1. System For Detection Of Hazardous Events

    DOEpatents

    Kulesz, James J [Oak Ridge, TN; Worley, Brian A [Knoxville, TN

    2005-08-16

    A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

  2. Position Sensitive Detection System for Charged Particles

    SciTech Connect

    Coello, E. A.; Favela, F.; Curiel, Q.; Chavez, E; Huerta, A.; Varela, A.; Shapira, Dan

    2012-01-01

    The position sensitive detection system presented in this work employs the Anger logic algorithm to determine the position of the light spark produced by the passage of charged particles on a 170 x 170 x 10 mm3 scintillator material (PILOT-U). The detection system consists of a matrix of nine photomultipliers, covering a fraction of the back area of the scintillators. Tests made with a non-collimated alpha particle source together with a Monte Carlo simulation that reproduces the data, suggest an intrinsic position resolution of up to 6 mm is achieved.

  3. Nuclear resonance fluorescence imaging in non-intrusive cargo inspection

    NASA Astrophysics Data System (ADS)

    Bertozzi, William; Ledoux, Robert J.

    2005-12-01

    Nuclear resonance fluorescence is able to non-intrusively interrogate a region space and measure the isotopic content of the material in that space for any element with atomic number greater than that of helium. The technique involves exposing material to a continuous energy distribution of photons and detecting the scattered photons that have a discrete energy distribution unique to an isotope. The interrogating photons, which range from 2 to 8 MeV, are the most penetrating probes and can "see" through many inches of steel. Determination of the chemical components of the material occupying a region of space greatly enhances the identification of threats such as explosives, fissile materials, toxic materials and weapons of mass destruction. Systems can be designed to involve minimal operator intervention, to minimize dose to the sample, and to provide high throughput at commercial seaports, airports and other entry points.

  4. Spark discharge trace element detection system

    DOEpatents

    Adler-Golden, S.; Bernstein, L.S.; Bien, F.

    1988-08-23

    A spark discharge trace element detection system is provided which includes a spark chamber including a pair of electrodes for receiving a sample of gas to be analyzed at no greater than atmospheric pressure. A voltage is provided across the electrodes for generating a spark in the sample. The intensity of the emitted radiation in at least one primary selected narrow band of the radiation is detected. Each primary band corresponds to an element to be detected in the gas. The intensity of the emission in each detected primary band is integrated during the afterglow time interval of the spark emission and a signal representative of the integrated intensity of the emission in each selected primary bond is utilized to determine the concentration of the corresponding element in the gas. 12 figs.

  5. Spark discharge trace element detection system

    DOEpatents

    Adler-Golden, Steven; Bernstein, Lawrence S.; Bien, Fritz

    1988-01-01

    A spark discharge trace element detection system is provided which includes a spark chamber including a pair of electrodes for receiving a sample of gas to be analyzed at no greater than atmospheric pressure. A voltage is provided across the electrodes for generating a spark in the sample. The intensity of the emitted radiation in at least one primary selected narrow band of the radiation is detected. Each primary band corresponds to an element to be detected in the gas. The intensity of the emission in each detected primary band is integrated during the afterglow time interval of the spark emission and a signal representative of the integrated intensity of the emission in each selected primary bond is utilized to determine the concentration of the corresponding element in the gas.

  6. Immunity-Based Aircraft Fault Detection System

    NASA Technical Reports Server (NTRS)

    Dasgupta, D.; KrishnaKumar, K.; Wong, D.; Berry, M.

    2004-01-01

    In the study reported in this paper, we have developed and applied an Artificial Immune System (AIS) algorithm for aircraft fault detection, as an extension to a previous work on intelligent flight control (IFC). Though the prior studies had established the benefits of IFC, one area of weakness that needed to be strengthened was the control dead band induced by commanding a failed surface. Since the IFC approach uses fault accommodation with no detection, the dead band, although it reduces over time due to learning, is present and causes degradation in handling qualities. If the failure can be identified, this dead band can be further A ed to ensure rapid fault accommodation and better handling qualities. The paper describes the application of an immunity-based approach that can detect a broad spectrum of known and unforeseen failures. The approach incorporates the knowledge of the normal operational behavior of the aircraft from sensory data, and probabilistically generates a set of pattern detectors that can detect any abnormalities (including faults) in the behavior pattern indicating unsafe in-flight operation. We developed a tool called MILD (Multi-level Immune Learning Detection) based on a real-valued negative selection algorithm that can generate a small number of specialized detectors (as signatures of known failure conditions) and a larger set of generalized detectors for unknown (or possible) fault conditions. Once the fault is detected and identified, an adaptive control system would use this detection information to stabilize the aircraft by utilizing available resources (control surfaces). We experimented with data sets collected under normal and various simulated failure conditions using a piloted motion-base simulation facility. The reported results are from a collection of test cases that reflect the performance of the proposed immunity-based fault detection algorithm.

  7. DCE Bio Detection System Final Report

    SciTech Connect

    Lind, Michael A.; Batishko, Charles R.; Morgen, Gerald P.; Owsley, Stanley L.; Dunham, Glen C.; Warner, Marvin G.; Willett, Jesse A.

    2007-12-01

    The DCE (DNA Capture Element) Bio-Detection System (Biohound) was conceived, designed, built and tested by PNNL under a MIPR for the US Air Force under the technical direction of Dr. Johnathan Kiel and his team at Brooks City Base in San Antonio Texas. The project was directed toward building a measurement device to take advantage of a unique aptamer based assay developed by the Air Force for detecting biological agents. The assay uses narrow band quantum dots fluorophores, high efficiency fluorescence quenchers, magnetic micro-beads beads and selected aptamers to perform high specificity, high sensitivity detection of targeted biological materials in minutes. This final report summarizes and documents the final configuration of the system delivered to the Air Force in December 2008

  8. Digital radiographic systems detect boiler tube cracks

    SciTech Connect

    Walker, S.

    2008-06-15

    Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

  9. Detection of abrupt changes in dynamic systems

    NASA Technical Reports Server (NTRS)

    Willsky, A. S.

    1984-01-01

    Some of the basic ideas associated with the detection of abrupt changes in dynamic systems are presented. Multiple filter-based techniques and residual-based method and the multiple model and generalized likelihood ratio methods are considered. Issues such as the effect of unknown onset time on algorithm complexity and structure and robustness to model uncertainty are discussed.

  10. Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts

    NASA Astrophysics Data System (ADS)

    Chen, Siyue; Leung, Henry; Dondo, Maxwell

    2014-05-01

    As computer network security threats increase, many organizations implement multiple Network Intrusion Detection Systems (NIDS) to maximize the likelihood of intrusion detection and provide a comprehensive understanding of intrusion activities. However, NIDS trigger a massive number of alerts on a daily basis. This can be overwhelming for computer network security analysts since it is a slow and tedious process to manually analyse each alert produced. Thus, automated and intelligent clustering of alerts is important to reveal the structural correlation of events by grouping alerts with common features. As the nature of computer network attacks, and therefore alerts, is not known in advance, unsupervised alert clustering is a promising approach to achieve this goal. We propose a joint optimization technique for feature selection and clustering to aggregate similar alerts and to reduce the number of alerts that analysts have to handle individually. More precisely, each identified feature is assigned a binary value, which reflects the feature's saliency. This value is treated as a hidden variable and incorporated into a likelihood function for clustering. Since computing the optimal solution of the likelihood function directly is analytically intractable, we use the Expectation-Maximisation (EM) algorithm to iteratively update the hidden variable and use it to maximize the expected likelihood. Our empirical results, using a labelled Defense Advanced Research Projects Agency (DARPA) 2000 reference dataset, show that the proposed method gives better results than the EM clustering without feature selection in terms of the clustering accuracy.

  11. Optical Detection System for Ultrasonic Surface Displacements.

    NASA Astrophysics Data System (ADS)

    Godfrey, Martin William

    Available from UMI in association with The British Library. The work was carried out with the aim of developing an optical interferometric detection system. This was to be applied to the quantitative measurement of low amplitude, high frequency surface displacements (<1nm at several MHz). Two forms of interferometric detector are investigated. The performance and limitations in particular measurement situations are assessed for both types of interferometer. The first type of detector investigated is a miniature stabilised interferometer. The design of a stabilisation system is given, along with ways in which it can be optimised for a particular environment. The second type of detector studied is a quadrature interferometer. Various methods of processing the two channels of information from this device are discussed. The design of a new method of processing the signals is given, and its performance determined. The interferometric sensor is combined with a waveform digitiser and microcomputer to form an integrated detection system. Analysis of the waveforms obtained is performed by a system of Pascal programs developed for this purpose. The detection system is applied to tasks such as the calibration of other forms of transducer and the characterisation of artificial sources of acoustic emission. The results of experimental studies are given and the applications of such a system discussed.

  12. Hydrogeologic conditions and saline-water intrusion, Cape Coral, Florida, 1978-81

    USGS Publications Warehouse

    Fitzpatrick, D.J.

    1986-01-01

    The upper limestone unit of the intermediate aquifer system, locally called the upper Hawthorn aquifer, is the principal source of freshwater for Cape Coral, Florida. The aquifer has been contaminated with saline water by downward intrusion from the surficial aquifer system and by upward intrusion from the Floridan aquifer system. Much of the intrusion has occurred through open wellbores where steel casings are short or where casings have collapsed because of corrosion. Saline-water contamination of the upper limestone unit due to downward intrusion from the surficial aquifer is most severe in the southern and eastern parts of Cape Coral; contamination due to upward intrusion has occurred in many areas throughout Cape Coral. Intrusion is amplified in areas of heavy water withdrawals and large water-level declines. (USGS)

  13. Protecting against cyber threats in networked information systems

    NASA Astrophysics Data System (ADS)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  14. A Sensor System for Automatic Detection of Food Intake Through Non-Invasive Monitoring of Chewing

    PubMed Central

    Sazonov, Edward S.; Fontana, Juan M.

    2012-01-01

    Objective and automatic sensor systems to monitor ingestive behavior of individuals arise as a potential solution to replace inaccurate method of self-report. This paper presents a simple sensor system and related signal processing and pattern recognition methodologies to detect periods of food intake based on non-invasive monitoring of chewing. A piezoelectric strain gauge sensor was used to capture movement of the lower jaw from 20 volunteers during periods of quiet sitting, talking and food consumption. These signals were segmented into non-overlapping epochs of fixed length and processed to extract a set of 250 time and frequency domain features for each epoch. A forward feature selection procedure was implemented to choose the most relevant features, identifying from 4 to 11 features most critical for food intake detection. Support vector machine classifiers were trained to create food intake detection models. Twenty-fold cross-validation demonstrated per-epoch classification accuracy of 80.98% and a fine time resolution of 30 s. The simplicity of the chewing strain sensor may result in a less intrusive and simpler way to detect food intake. The proposed methodology could lead to the development of a wearable sensor system to assess eating behaviors of individuals. PMID:22675270

  15. Deformation monitoring of the 2014 dyke intrusion and eruption within the Bárðarbunga volcanic system, and associated stress triggering at neighbouring volcanoes

    NASA Astrophysics Data System (ADS)

    Parks, Michelle; Árnadóttir, Thóra; Dumont, Stéphanie; Sigmundsson, Freysteinn; Hooper, Andrew; Drouin, Vincent; Ófeigsson, Benedikt; María Friðriksdóttir, Hildur; Hreinsdóttir, Sigrún; Rafn Heimisson, Elías; Vogfjörd, Kristín; Jónsdóttir, Kristín; Hensch, Martin; Guðmundsson, Gunnar; Magnússon, Eyjólfur; Einarsson, Páll; Rut Hjartardóttir, Ásta; Pedersen, Rikke

    2015-04-01

    The recent unrest and activity within the Bárðarbunga volcanic system, Iceland was initially identified by the onset of an intense earthquake swarm on the 16th August 2014 and concurrent movement registered at several nearby continuous GPS (cGPS) sites. Over the following weeks additional cGPS stations were installed, campaign sites were reoccupied and interferograms formed using X-band satellite images. Data were analysed in near real-time and used to map ground displacements associated with the initial dyke emplacement and propagation (NE of Bárðarbunga), responsible for the sudden unrest. On the 29th August 2014, a small fissure opened up just a few kilometers to the north of the Vatnajökull ice cap, at Holuhraun. The eruption lasted only a few hours, but was followed on 31st August by the onset of a fissure eruption, characterised by lava fountaining and the extrusion of extensive lava flows. The eruption continues at the time of writing (January 2015). We demonstrate how Interferometric Synthetic Aperture Radar (InSAR) analysis, in conjunction with GPS measurements and earthquake seismicity, has been instrumental in the continued monitoring of Bárðarbunga volcanic system since the onset of unrest. We also investigate how changes in the local stress field induced by the dyke intrusion and concurrent magma withdrawal may trigger seismicity and potentially renewed activity at neighbouring volcanoes. InSAR analysis has systematically been used throughout the eruption to monitor co-eruptive displacement in the vicinity of both the dyke and the eruption site, along with major co-eruptive subsidence occurring beneath the Bárðarbunga caldera - the latter is believed to have commenced shortly after the onset of the unrest and is associated with magma withdrawal beneath the central volcano, feeding the dyke and the ongoing eruption. We use Persistent Scatterer Interferometric Synthetic Aperture Radar (PS-InSAR) techniques to generate a time series of

  16. Saltwater intrusion in coastal regions of North America

    NASA Astrophysics Data System (ADS)

    Barlow, Paul M.; Reichard, Eric G.

    2010-02-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  17. Saltwater intrusion in coastal regions of North America

    USGS Publications Warehouse

    Barlow, Paul M.; Reichard, Eric G.

    2010-01-01

    Saltwater has intruded into many of the coastal aquifers of the United States, Mexico, and Canada, but the extent of saltwater intrusion varies widely among localities and hydrogeologic settings. In many instances, the area contaminated by saltwater is limited to small parts of an aquifer and to specific wells and has had little or no effect on overall groundwater supplies; in other instances, saltwater contamination is of regional extent and has resulted in the closure of many groundwater supply wells. The variability of hydrogeologic settings, three-dimensional distribution of saline water, and history of groundwater withdrawals and freshwater drainage has resulted in a variety of modes of saltwater intrusion into coastal aquifers. These include lateral intrusion from the ocean; upward intrusion from deeper, more saline zones of a groundwater system; and downward intrusion from coastal waters. Saltwater contamination also has occurred along open boreholes and within abandoned, improperly constructed, or corroded wells that provide pathways for vertical migration across interconnected aquifers. Communities within the coastal regions of North America are taking actions to manage and prevent saltwater intrusion to ensure a sustainable source of groundwater for the future. These actions can be grouped broadly into scientific monitoring and assessment, engineering techniques, and regulatory approaches.

  18. Fuzzy system for detecting microcalcifications in mammograms

    NASA Astrophysics Data System (ADS)

    Strickland, Robin N.; Theodosiou, Theodosis

    1998-10-01

    We present a fuzzy classifier for detecting microcalcification sin digitized mammograms. The classifier post-processes the output form a wavelets-based multiscale correlation filter. Each local peak in the correlation filter output is represented by a set of five features describing the shape, size and definition of the peak. These features are used in linguistic rules by a fuzzy system that is trained to distinguish between microcalcification sand normal mammogram texture. In borderline cases where microcalcifications are buried in dense tissue or appear only faintly, simply drawing a straight threshold across the feature vector values will likely not produce the correct classification. the fuzzy system allows the effective 'threshold' to be drawn across ranges of features values depending upon how they interact with one another. Compared to wavelet processing alone, the fuzzy detection system produces a significant increase in true positive fraction when tested on a public domain mammogram database.

  19. APDS: The Autonomous Pathogen Detection System

    SciTech Connect

    Hindson, B; Makarewicz, A; Setlur, U; Henderer, B; McBride, M; Dzenitis, J

    2004-10-04

    We have developed and tested a fully autonomous pathogen detection system (APDS) capable of continuously monitoring the environment for airborne biological threat agents. The system was developed to provide early warning to civilians in the event of a bioterrorism incident and can be used at high profile events for short-term, intensive monitoring or in major public buildings or transportation nodes for long-term monitoring. The APDS is completely automated, offering continuous aerosol sampling, in-line sample preparation fluidics, multiplexed detection and identification immunoassays, and nucleic-acid based polymerase chain reaction (PCR) amplification and detection. Highly multiplexed antibody-based and duplex nucleic acid-based assays are combined to reduce false positives to a very low level, lower reagent costs, and significantly expand the detection capabilities of this biosensor. This article provides an overview of the current design and operation of the APDS. Certain sub-components of the ADPS are described in detail, including the aerosol collector, the automated sample preparation module that performs multiplexed immunoassays with confirmatory PCR, and the data monitoring and communications system. Data obtained from an APDS that operated continuously for seven days in a major U.S. transportation hub is reported.

  20. APDS: the autonomous pathogen detection system.

    PubMed

    Hindson, Benjamin J; Makarewicz, Anthony J; Setlur, Ujwal S; Henderer, Bruce D; McBride, Mary T; Dzenitis, John M

    2005-04-15

    We have developed and tested a fully autonomous pathogen detection system (APDS) capable of continuously monitoring the environment for airborne biological threat agents. The system was developed to provide early warning to civilians in the event of a bioterrorism incident and can be used at high profile events for short-term, intensive monitoring or in major public buildings or transportation nodes for long-term monitoring. The APDS is completely automated, offering continuous aerosol sampling, in-line sample preparation fluidics, multiplexed detection and identification immunoassays, and nucleic acid-based polymerase chain reaction (PCR) amplification and detection. Highly multiplexed antibody-based and duplex nucleic acid-based assays are combined to reduce false positives to a very low level, lower reagent costs, and significantly expand the detection capabilities of this biosensor. This article provides an overview of the current design and operation of the APDS. Certain sub-components of the ADPS are described in detail, including the aerosol collector, the automated sample preparation module that performs multiplexed immunoassays with confirmatory PCR, and the data monitoring and communications system. Data obtained from an APDS that operated continuously for 7 days in a major U.S. transportation hub is reported.

  1. Method and system for detecting an explosive

    DOEpatents

    Reber, Edward L.; Rohde, Kenneth W.; Blackwood, Larry G.

    2010-12-07

    A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

  2. Portable chemical detection system with intergrated preconcentrator

    DOEpatents

    Baumann, Mark J.; Brusseau, Charles A.; Hannum, David W.; Linker, Kevin L.

    2005-12-27

    A portable system for the detection of chemical particles such as explosive residue utilizes a metal fiber substrate that may either be swiped over a subject or placed in a holder in a collection module which can shoot a jet of gas at the subject to dislodge residue, and then draw the air containing the residue into the substrate. The holder is then placed in a detection module, which resistively heats the substrate to evolve the particles, and provides a gas flow to move the particles to a miniature detector in the module.

  3. Laser Schlieren System Detects Sounds Of Leaks

    NASA Technical Reports Server (NTRS)

    Shakkottai, Parthasarathy P.; Alwar, A. Vijayaragavan

    1990-01-01

    Hostile environments monitored safely and noninvasively. Modified laser schlieren system acts as microphone to detect sounds of leaks remotely. Sensitive to acoustical frequencies above audible range and especially suited for monitoring leaks of high-pressure steam from boilers or chemical vapors from processing equipment. Does not require placement of delicate equipment in harsh environment monitored, and no contact needed with boiler or other unit being monitored. Detects sound waves via variation of index of refraction of air at acoustical frequencies. Used to monitor sound frequencies beyond range of human hearing.

  4. Statistical Fault Detection & Diagnosis Expert System

    1996-12-18

    STATMON is an expert system that performs real-time fault detection and diagnosis of redundant sensors in any industrial process requiring high reliability. After a training period performed during normal operation, the expert system monitors the statistical properties of the incoming signals using a pattern recognition test. If the test determines that statistical properties of the signals have changed, the expert system performs a sequence of logical steps to determine which sensor or machine component hasmore » degraded.« less

  5. Antigenemia detected by radioimmunoassay in systemic aspergillosis

    SciTech Connect

    Weiner, M.H.

    1980-06-01

    Because of difficulties in antemortem diagnosis of systemic aspergillosis, a radioimmunoassay to an Aspergillus fumigatus carbohydrate was developed and evaluated in patients with mycotic or bacterial infections. Antigenemia was detected in sera obtained antemortem from four of seven patients with systemic aspergillosis and in pleural fluid from an Aspergillus empyema but not in control sera or pleural fluid from 43 patients or 27 normal donors. When characterized with reference to onset of disease, antigenemia was an early sign of infection. This study shows the usefulness of the Aspergillus antigen radioimmunoassay for early, specific immunodiagnosis of systemic aspergillosis.

  6. Wireless Application in Intravenous Infiltration Detection System

    PubMed Central

    Alley, Matthew S.; Naramore, William J.; Chou, Nee-Yin; Winchester, Leonard W.

    2008-01-01

    The IrDA wireless protocol has been applied to a fiber optics based point-of-care system for the detection of intravenous infiltration. The system is used for monitoring patients under infusion therapy. It is optimized for portability by incorporating a battery source and wireless communication. The IrDA protocol provides secure data communication between the electronic module of the system and the PDAs carried by the nurses. The PDA is used for initiating the actions of the electronic module and for data transfer. Security is provided by specially designed software and hardware. PMID:19162821

  7. Wireless application in intravenous infiltration detection system.

    PubMed

    Alley, Matthew S; Naramore, William J; Chou, Nee-Yin; Winchester, Leonard W

    2008-01-01

    The IrDA wireless protocol has been applied to a fiber optics based point-of-care system for the detection of intravenous infiltration. The system is used for monitoring patients under infusion therapy. It is optimized for portability by incorporating a battery source and wireless communication. The IrDA protocol provides secure data communication between the electronic module of the system and the PDAs carried by the nurses. The PDA is used for initiating the actions of the electronic module and for data transfer. Security is provided by specially designed software and hardware.

  8. GIDL: Generalized Interference Detection and Localization System

    NASA Astrophysics Data System (ADS)

    Gromov, Konstantin Gennadievich

    The Local Area Augmentation System (LAAS) and the Wide Area Augmentation System (WAAS) are being developed by the U.S. Federal Aviation Administration (FAA) to provide satellite navigation performance compliant with the stringent requirements for aircraft precision approach and landing. A primary design goal of both systems is to insure that signal-in-space failures are detected by ground facilities and to exclude the affected measurements before differential corrections are broadcast to users. One such failure is unintentional interference or intentional jamming in the GPS frequency band. To protect integrity, LAAS and WAAS ground facilities must quickly detect the presence of any hazardous interference falling within the restricted band used by GPS. To protect availability, ground personnel must be able to quickly locate and deactivate the interference source. In order to serve this purpose, the prototype Generalized Interference Detection and Localization System (GIDL) has been developed. This prototype includes four antennae and RF sections slaved to a common clock to allow detection and determination of a three-dimensional interference location. Measurements of differential signal propagation delays across the multiple baselines between the GIDL antennae are combined to estimate the location of the undesired interference transmitter. The GIDL system can be implemented in parallel with a three- or four-receiver LAAS ground facility (sharing components with the LAAS reference receivers and processors) or as a separate installation to support nearby LAAS and WAAS sites. This dissertation describes the GIDL theory and GIDL receiver design and derives theoretical predictions of the ability of the GIDL to accurately locate interference sources. The GIDL System has been successfully demonstrated to the Federal Aviation Administration (FAA).

  9. The Mount Rainier Lahar Detection System

    NASA Astrophysics Data System (ADS)

    Lockhart, A. B.; Murray, T. L.

    2003-12-01

    To mitigate the risk of unheralded lahars from Mount Rainier, the U.S. Geological Survey, in cooperation with Pierce County, Washington, installed a lahar-detection system on the Puyallup and Carbon rivers that originate on Mount Rainier's western slopes. The system, installed in 1998, is designed to automatically detect the passage of lahars large enough to potentially affect populated areas downstream (approximate volume threshold 40 million cubic meters), while ignoring small lahars, earthquakes, extreme weather and floods. Along each river valley upstream, arrays of independent lahar-monitoring stations equipped with geophones and short tripwires telemeter data to a pair of redundant computer base stations located in and near Tacoma at existing public safety facilities that are staffed around the clock. Monitored data consist of ground-vibration levels, tripwire status, and transmissions at regular intervals. The base stations automatically evaluate these data to determine if a dangerous lahar is passing through the station array. The detection algorithm requires significant ground vibration to occur at those stations in the array that are above the anticipated level of inundation, while lower level `deadman' stations, inundated by the flow, experience tripwire breakage or are destroyed. Once a base station detects a lahar, it alerts staff who execute a call-down of public-safety officials and schools, initiating evacuation of areas potentially at risk. Because the system's risk-mitigation task imposes high standards of reliability on all components, it has been under test for several years. To date, the system has operated reliably and without false alarms, including during the nearby M6.8 Nisqually Earthquake on February 28, 2001. The system is being turned over to Pierce County, and activated as part of their lahar warning system.

  10. Rotor acoustic monitoring system (RAMS): a fatigue crack detection system

    NASA Astrophysics Data System (ADS)

    Schoess, Jeffrey N.

    1996-05-01

    The Rotor Acoustic Monitoring System (RAMS) is an embedded structural health monitoring system to demonstrate the ability to detect rotor head fatigue cracks and provide early warning of propagating fatigue cracks in rotor components of Navy helicopters. The concept definition effort was performed to assess the feasibility of detecting rotor head fatigue cracks using bulk- wave wide-bandwidth acoustic emission technology. A wireless piezo-based transducer system is being designed to capture rotor fatigue data in real time and perform acoustic emission (AE) event detection, feature extraction, and classification. A flight test effort will be performed to characterize rotor acoustic background noise and flight environment characteristics. The long- term payoff of the RAMS technology includes structural integrity verification and leak detection for large industrial tanks, and nuclear plant cooling towers could be performed using the RAMS AE technology. A summary of the RAMS concept, bench-level AE fatigue testing, and results are presented.

  11. Real-time head motion detection system

    NASA Astrophysics Data System (ADS)

    Mase, Kenji; Watanabe, Yasuhiko; Suenaga, Yasuhito

    1990-01-01

    We present a three-dimensional head motion detection system called a realtime headreader. This headreader analyzes the head motion picture sequences taken by a TV-camera, and extracts the motion parameters in realtime, i.e. 3-d rotations and translations. We used a simple but very fast algorithm, which exploits the contrast of hair and face to recognize face orientation. The system extracts the head and face area, then estimates the head motion parameters from the change in position of each area's centroids. The head motion is computed at nearly 10 frames per second on a SUN4 workstation and the motion parameters are sent to an IRIS workstation at a 2.5 Kbps. The IRIS generates a head motion sequence that duplicates the original head motion. The entire motion detection program is written in C language. No special image processing hardware is used, except for a video digitizer. Our head motion detection system will enhance man-machine interactions by providing a new visual eue. An operator will be able to point to a target by just looking at it thus a mouse or 3-d tracking device is not needed. The eventual goal of this research is to build an intelligent video communication system that codes the information in terms of high level language rather than compressed video signals.

  12. Detecting Anomalous Insiders in Collaborative Information Systems

    PubMed Central

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients’ records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients’ diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent. PMID:24489520

  13. Detecting Anomalous Insiders in Collaborative Information Systems.

    PubMed

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-05-01

    Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed (e.g., patients' records viewed by healthcare providers). CADS consists of two components: 1) relational pattern extraction, which derives community structures and 2) anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities. We further extend CADS into MetaCADS to account for the semantics of subjects (e.g., patients' diagnoses). To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, MetaCADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent.

  14. An Automated Flying-Insect-Detection System

    NASA Technical Reports Server (NTRS)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2005-01-01

    An automated flying-insect-detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect's wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing beat signatures are preprocessed (Fourier transformed) in real-time to display a periodic signal. These signals are sent to the end user where they are graphically displayed. All AFIDS data are pre-processed in the field with the use of a laptop computer equipped with LABVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation.

  15. Tsunami Detection Systems for International Requirements

    NASA Astrophysics Data System (ADS)

    Lawson, R. A.

    2007-12-01

    Results are presented regarding the first commercially available, fully operational, tsunami detection system to have passed stringent U.S. government testing requirements and to have successfully demonstrated its ability to detect an actual tsunami at sea. Spurred by the devastation of the December 26, 2004, Indian Ocean tsunami that killed more than 230,000 people, the private sector actively supported the Intergovernmental Oceanographic Commission's (IOC"s) efforts to develop a tsunami warning system and mitigation plan for the Indian Ocean region. As each country in the region developed its requirements, SAIC recognized that many of these underdeveloped countries would need significant technical assistance to fully execute their plans. With the original focus on data fusion, consequence assessment tools, and warning center architecture, it was quickly realized that the cornerstone of any tsunami warning system would be reliable tsunami detection buoys that could meet very stringent operational standards. Our goal was to leverage extensive experience in underwater surveillance and oceanographic sensing to produce an enhanced and reliable deep water sensor that could meet emerging international requirements. Like the NOAA Deep-ocean Assessment and Recording of Tsunamis (DART TM ) buoy, the SAIC Tsunami Buoy (STB) system consists of three subsystems: a surfaccommunications buoy subsystem, a bottom pressure recorder subsystem, and a buoy mooring subsystem. With the operational success that DART has demonstrated, SAIC decided to build and test to the same high standards. The tsunami detection buoy system measures small changes in the depth of the deep ocean caused by tsunami waves as they propagate past the sensor. This is accomplished by using an extremely sensitive bottom pressure sensor/recorder to measure very small changes in pressure as the waves move past the buoy system. The bottom pressure recorder component includes a processor with algorithms that

  16. Crank angle detecting system for engines

    SciTech Connect

    Yuzawa, H.; Nishiyama, M.; Nakamura, K.; Ishigami, K.

    1987-04-14

    A crank angle detecting system is described for a multicylinder engine having at least three cylinders classified as groups, which comprises: (a) a disc connected for rotation with a crankshaft and formed with a first slit group having a large number of slits for detecting crankshaft angular positions and a second slit group having a small number of slits for detecting each predetermined piston stroke of each of at least three cylinders, the slits of the second group having at least three widths which are different from each other; (b) sensing means responsive to the slits on the disc for continuously detecting crankshaft angular positions by sensing the first group of slits and producing crank angle signals corresponding to the slits of the first group and for detecting each predetermined piston stroke of each engine cylinder by sensing the second group of slits and producing piston stroke signals representing the piston strokes, each piston stroke signal having a duration which corresponds to one of the different widths; and (c) means for identifying the piston stroke signals based on the duration thereof by counting crank angle signals occurring during the duration of each piston stroke signal and classifying the piston stroke signals based on the counted crank angle signals.

  17. Multimodal imaging system for dental caries detection

    NASA Astrophysics Data System (ADS)

    Liang, Rongguang; Wong, Victor; Marcus, Michael; Burns, Peter; McLaughlin, Paul

    2007-02-01

    Dental caries is a disease in which minerals of the tooth are dissolved by surrounding bacterial plaques. A caries process present for some time may result in a caries lesion. However, if it is detected early enough, the dentist and dental professionals can implement measures to reverse and control caries. Several optical, nonionized methods have been investigated and used to detect dental caries in early stages. However, there is not a method that can singly detect the caries process with both high sensitivity and high specificity. In this paper, we present a multimodal imaging system that combines visible reflectance, fluorescence, and Optical Coherence Tomography (OCT) imaging. This imaging system is designed to obtain one or more two-dimensional images of the tooth (reflectance and fluorescence images) and a three-dimensional OCT image providing depth and size information of the caries. The combination of two- and three-dimensional images of the tooth has the potential for highly sensitive and specific detection of dental caries.

  18. VETA-1 x ray detection system

    NASA Technical Reports Server (NTRS)

    Podgorski, W. A.; Flanagan, Kathy A.; Freeman, Mark D.; Goddard, R. G.; Kellogg, Edwin M.; Norton, T. J.; Ouellette, J. P.; Roy, A. G.; Schwartz, Daniel A.

    1992-01-01

    The alignment and X-ray imaging performance of the Advanced X-ray Astrophysics Facility (AXAF) Verification Engineering Test Article-I (VETA-I) was measured by the VETA-I X-Ray Detection System (VXDS). The VXDS was based on the X-ray detection system utilized in the AXAF Technology Mirror Assembly (TMA) program, upgraded to meet the more stringent requirements of the VETA-I test program. The VXDS includes two types of X-ray detectors: (1) a High Resolution Imager (HRI) which provides X-ray imaging capabilities, and (2) sealed and flow proportional counters which, in conjunction with apertures of various types and precision translation stages, provide the most accurate measurement of VETA-I performance. Herein we give an overview of the VXDS hardware including X-ray detectors, translation stages, apertures, proportional counters and flow counter gas supply system and associated electronics. We also describe the installation of the VXDS into the Marshall Space Flight Center (MSFC) X-Ray Calibration Facility (XRCF). We discuss in detail the design and performance of those elements of the VXDS which have not been discussed elsewhere; translation systems, flow counter gas supply system, apertures and thermal monitoring system.

  19. A System for Traffic Violation Detection

    PubMed Central

    Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio

    2014-01-01

    This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations. PMID:25421737

  20. A system for traffic violation detection.

    PubMed

    Aliane, Nourdine; Fernandez, Javier; Mata, Mario; Bemposta, Sergio

    2014-01-01

    This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS) aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR) for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations.

  1. Intrusion detection and monitoring for wireless networks.

    SciTech Connect

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda; Tabriz, Parisa; Pelon, Kristen; McCoy, Damon (University of Colorado, Boulder); Lodato, Mark; Hemingway, Franklin; Custer, Ryan P.; Averin, Dimitry; Franklin, Jason; Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

  2. In-Situ Wire Damage Detection System

    NASA Technical Reports Server (NTRS)

    Williams, Martha; Roberson, Luke; Tate, Lanetra; Smith, Trent; Gibson, Tracy; Medelius, Pedro; Jolley, Scott

    2012-01-01

    An In-Situ Wire Damage Detection System (ISWDDS) has been developed that is capable of detecting damage to a wire insulation, or a wire conductor, or to both. The system will allow for realtime, continuous monitoring of wiring health/integrity and reduce the number of false negatives and false positives while being smaller, lighter in weight, and more robust than current systems. The technology allows for improved safety and significant reduction in maintenance hours for aircraft, space vehicles, satellites, and other critical high-performance wiring systems for industries such as energy production and mining. The integrated ISWDDS is comprised of two main components: (1) a wire with an innermost core conductor, an inner insulation film, a conductive layer or inherently conductive polymer (ICP) covering the inner insulation film, an outermost insulation jacket; and (2) smart connectors and electronics capable of producing and detecting electronic signals, and a central processing unit (CPU) for data collection and analysis. The wire is constructed by applying the inner insulation films to the conductor, followed by the outer insulation jacket. The conductive layer or ICP is on the outer surface of the inner insulation film. One or more wires are connected to the CPU using the smart connectors, and up to 64 wires can be monitored in real-time. The ISWDDS uses time domain reflectometry for damage detection. A fast-risetime pulse is injected into either the core conductor or conductive layer and referenced against the other conductor, producing transmission line behavior. If either conductor is damaged, then the signal is reflected. By knowing the speed of propagation of the pulse, and the time it takes to reflect, one can calculate the distance to and location of the damage.

  3. An Automated Flying-Insect Detection System

    NASA Technical Reports Server (NTRS)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2007-01-01

    An automated flying-insect detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland-security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect s wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing-beat signatures are preprocessed (Fourier transformed) in real time to display a periodic signal. These signals are sent to the end user where they are graphically. All AFIDS data are preprocessed in the field with the use of a laptop computer equipped with LabVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al-GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing-beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation. Preliminary data indicate that AFIDS has

  4. Microwave System for Detecting Ice on Aircraft

    NASA Technical Reports Server (NTRS)

    Joseph, Philip J.; Glynn, Dennis P., Jr.; Joseph, John C.

    2004-01-01

    A microwave-based system has been developed as a means of detecting ice on aircraft surfaces, with enough sensitivity to provide a warning before the ice accretes to a dangerous thickness. The system can measure the thickness of ice from a few mils (1 mil = 0.0254 mm) to about 1/4 in. (.6 mm) and can distinguish among (1) ice, (2) water (or deicing fluid), and (3) a mixture of ice and water (or deicing fluid). Sensors have been ruggedized to withstand the rain erosion environment.

  5. Research of laser ignition detection system

    NASA Astrophysics Data System (ADS)

    Yang, Feng; Zhao, Dong; Xu, Qie; Ai, Xin

    2010-10-01

    Laser ignition is an important means of detonation but the accuracy and security is requested strictly. Based on the above, two points were considered in the design: achieve ignition-Fiber-optical health monitoring in the condition of low-intensity light (ensure the safety of gunpowder); observant the explosive imaging. In the paper, the laser ignition equipment was designed with optical detection and inner optical imaging system for the real-time monitoring to the optical fiber and the process of ignition. This design greatly improved the reliability and the safety of laser ignition system and provided the guarantee for usage and industrialization.

  6. In-Situ Wire Damage Detection System

    NASA Technical Reports Server (NTRS)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  7. Number of Waste Package Hit by Igneous Intrusion

    SciTech Connect

    M. Wallace

    2004-10-13

    The purpose of this scientific analysis report is to document calculations of the number of waste packages that could be damaged in a potential future igneous event through a repository at Yucca Mountain. The analyses include disruption from an intrusive igneous event and from an extrusive volcanic event. This analysis supports the evaluation of the potential consequences of future igneous activity as part of the total system performance assessment for the license application (TSPA-LA) for the Yucca Mountain Project (YMP). Igneous activity is a disruptive event that is included in the TSPA-LA analyses. Two igneous activity scenarios are considered: (1) The igneous intrusion groundwater release scenario (also called the igneous intrusion scenario) considers the in situ damage to waste packages or failure of waste packages that occurs if they are engulfed or otherwise affected by magma as a result of an igneous intrusion. (2) The volcanic eruption scenario depicts the direct release of radioactive waste due to an intrusion that intersects the repository followed by a volcanic eruption at the surface. An igneous intrusion is defined as the ascent of a basaltic dike or dike system (i.e., a set or swarm of multiple dikes comprising a single intrusive event) to repository level, where it intersects drifts. Magma that does reach the surface from igneous activity is an eruption (or extrusive activity) (Jackson 1997 [DIRS 109119], pp. 224, 333). The objective of this analysis is to develop a probabilistic measure of the number of waste packages that could be affected by each of the two scenarios.

  8. Deformation patters above intrusive complexes in strike-slip settings

    NASA Astrophysics Data System (ADS)

    Girard, G.; van Wyk de Vries, B.

    2003-04-01

    Long-lived intrusions below volcanic complexes are weak, ductile zones in the crust. In volcanic areas with strike-slip deformation pull-apart complexes are often associated with volcanoes, especially calderas. The Masaya-Las Sierras volcano in Nicaragua is a basaltic caldera complex situated in a developing pull-apart (Managua Graben). The pull-apart faults are responsible for highly damaging earthquakes (Managua 1931, 68, 72). We raise the hypothesis that pull-apart and caldera intrusive system are interrelated and that joint surveillance of faults and volcano could provide the best monitoring strategy. To test relationships between intrusive complex and tectonics we have run a series of ‘sand-box’ analogue models. Displacement is created by a motor on a basal discontinuity and computer-controlled. The models have a lower ductile crust (silicone layer), an upper brittle crust (sand and plaster), and an intrusion made of silicone or varying density and viscosity. Experiments show that a pull apart always forms around a ductile intrusion, irrespective of its density, however that a non-ductile intrusive complex has no significant influence. Whatever the shape of the intrusion, the fault pattern forms a typical rhombohedral pull-apart shape. Fault patterns spaying out from the models resemble closely the Managua fault pattern. With large displacements two zones of thrusting were observed in the system. Such deformation is not present at Masaya, but may be at other calderas with more active strike-slip activity. We provide one possible example in the Atacama, N Chile.

  9. Incipient fault detection and power system protection for spaceborne systems

    NASA Technical Reports Server (NTRS)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  10. GPS-Aided Tsunami Early Detection System

    NASA Astrophysics Data System (ADS)

    Song, Y. T.; Bar-Sever, Y. E.; Liu, Z.; Khachikyan, R.

    2015-12-01

    Most tsunami fatalities occur in near-field communities of earthquakes at offshore faults. Tsunami early warning is key for reducing the number of fatalities. Unfortunately, an earthquake's magnitude often does not gauge the resulting tsunami power. Here we show that real-time GPS stations along coastlines are able to detect seafloor motions due to big earthquakes, and that the detected seafloor displacements are able to determine tsunami energy and scales instantaneously for early warnings. Our method focuses on estimating tsunami energy directly from seafloor motions because a tsunami's potential or scale, no matter how it is defined, has to be proportional to the tsunami energy. Since seafloor motions are the only source of a tsunami, their estimation directly relates to the mechanism that generates tsunamis; therefore, it is a proper way of identifying earthquakes that are capable of triggering tsunamis, while being able to discriminate those particular earthquakes from false alarms. Examples of detecting the tsunami energy scales for the 2004 Sumatra M9.1 earthquake, the 2005 Nias M8.7 earthquake, the 2010 M8.8 Chilean earthquake, and the 2011 M9.0 Tohoku-Oki earthquake will be presented. The development of the Indo-Pacific GPS-Aided Tsunami Early Detection (GATED) system will be reported.

  11. The ITER Radial Neutron Camera Detection System

    SciTech Connect

    Marocco, D.; Belli, F.; Esposito, B.; Petrizzi, L.; Riva, M.; Bonheure, G.; Kaschuck, Y.

    2008-03-12

    A multichannel neutron detection system (Radial Neutron Camera, RNC) will be installed on the ITER equatorial port plug 1 for total neutron source strength, neutron emissivity/ion temperature profiles and n{sub t}/n{sub d} ratio measurements [1]. The system is composed by two fan shaped collimating structures: an ex-vessel structure, looking at the plasma core, containing tree sets of 12 collimators (each set lying on a different toroidal plane), and an in-vessel structure, containing 9 collimators, for plasma edge coverage. The RNC detecting system will work in a harsh environment (neutron fiux up to 10{sup 8}-10{sup 9} n/cm{sup 2} s, magnetic field >0.5 T or in-vessel detectors), should provide both counting and spectrometric information and should be flexible enough to cover the high neutron flux dynamic range expected during the different ITER operation phases. ENEA has been involved in several activities related to RNC design and optimization [2,3]. In the present paper the up-to-date design and the neutron emissivity reconstruction capabilities of the RNC will be described. Different options for detectors suitable for spectrometry and counting (e.g. scintillators and diamonds) focusing on the implications in terms of overall RNC performance will be discussed. The increase of the RNC capabilities offered by the use of new digital data acquisition systems will be also addressed.

  12. Global ionospheric flare detection system (GIFDS)

    NASA Astrophysics Data System (ADS)

    Wenzel, Daniela; Jakowski, Norbert; Berdermann, Jens; Mayer, Christoph; Valladares, Cesar; Heber, Bernd

    2016-02-01

    The Global Ionospheric Flare Detection System (GIFDS) is currently under development at the German Aerospace Center as a ground based detector for continuous monitoring of the solar flare activity in order to provide real time warnings on solar X-ray events. GIFDS is using Very Low Frequency (VLF) radio transmissions in the northern hemisphere which respond to enhanced ionization in the bottomside ionosphere caused by X-ray flares. Since solar flares can only be detected during daytime, VLF receivers have to be installed around the globe to guarantee continuous records at the dayside sector. GIFDS consists of a network of Perseus SDR (Software Defined Radio) receivers equipped with a MiniWhip antenna each. Reliable detection of solar flares is ensured by recording multiple frequency channels ranging from 0 to 500 kHz. The applicability of the system is demonstrated in a first analysis by comparing VLF measurements with GOES's (Geostationary Operational Environmental Satellite) X-ray flux data. The high potential of GIFDS for a permanent monitoring of solar flares in near real time is discussed.

  13. Arc burst pattern analysis fault detection system

    NASA Technical Reports Server (NTRS)

    Russell, B. Don (Inventor); Aucoin, B. Michael (Inventor); Benner, Carl L. (Inventor)

    1997-01-01

    A method and apparatus are provided for detecting an arcing fault on a power line carrying a load current. Parameters indicative of power flow and possible fault events on the line, such as voltage and load current, are monitored and analyzed for an arc burst pattern exhibited by arcing faults in a power system. These arcing faults are detected by identifying bursts of each half-cycle of the fundamental current. Bursts occurring at or near a voltage peak indicate arcing on that phase. Once a faulted phase line is identified, a comparison of the current and voltage reveals whether the fault is located in a downstream direction of power flow toward customers, or upstream toward a generation station. If the fault is located downstream, the line is de-energized, and if located upstream, the line may remain energized to prevent unnecessary power outages.

  14. Optical imaging module for astigmatic detection system.

    PubMed

    Wang, Wei-Min; Cheng, Chung-Hsiang; Molnar, Gabor; Hwang, Ing-Shouh; Huang, Kuang-Yuh; Danzebrink, Hans-Ulrich; Hwu, En-Te

    2016-05-01

    In this paper, an optical imaging module design for an astigmatic detection system (ADS) is presented. The module is based on a commercial optical pickup unit (OPU) and it contains a coaxial illuminant for illuminating a specimen. Furthermore, the imaging module facilitates viewing the specimen and the detection laser spot of the ADS with a lateral resolution of approximately 1 μm without requiring the removal of an element of the OPU. Two polarizers and one infrared filter are used to eliminate stray laser light in the OPU and stray light produced by the illuminant. Imaging modules designed for digital versatile disks (DVDs) and Blu-ray DVDs were demonstrated. Furthermore, the module can be used for imaging a small cantilever with approximate dimensions of 2 μm (width) × 5 μm (length), and therefore, it has the potential to be used in high-speed atomic force microscopy. PMID:27250434

  15. System and method for anomaly detection

    DOEpatents

    Scherrer, Chad

    2010-06-15

    A system and method for detecting one or more anomalies in a plurality of observations is provided. In one illustrative embodiment, the observations are real-time network observations collected from a stream of network traffic. The method includes performing a discrete decomposition of the observations, and introducing derived variables to increase storage and query efficiencies. A mathematical model, such as a conditional independence model, is then generated from the formatted data. The formatted data is also used to construct frequency tables which maintain an accurate count of specific variable occurrence as indicated by the model generation process. The formatted data is then applied to the mathematical model to generate scored data. The scored data is then analyzed to detect anomalies.

  16. Supersensitive SQUID/magnetostrictor detecting system

    SciTech Connect

    Golovashkin, Aleksander I; Zherikhina, L N; Tskhovrebov, Andrei M; Izmailov, G N

    2012-12-31

    It is shown that using the state-of-the-art quantum interferometer (SQUID) with the resolution 10{sup -6} {Phi}{sub 0} Hz{sup -1/2} = 2.07 Multiplication-Sign 10{sup -21} Wb Hz{sup -1/2}, coupled to a magnetostrictor, playing the role of tensomagnetic transducer, it is possible to construct a system for detecting pressure variations with the ultimate sensitivity of 10{sup -13} Pa Hz{sup -1/2} and for measuring specific elongation with the sensitivity of 10{sup -24} Hz{sup -1/2}. The analysis of physical grounds of the inverse magnetostriction effect demonstrates concrete ways to essentially higher efficiency of tensomagnetic conversion. The estimates performed demonstrate the possibility of using the SQUID/magnetostrictor system as a detector of gravitational waves. Other possibilities of using this system for solving both fundamental and applied problems are also considered. (experimental techniques)

  17. Fault detection and diagnosis of photovoltaic systems

    NASA Astrophysics Data System (ADS)

    Wu, Xing

    The rapid growth of the solar industry over the past several years has expanded the significance of photovoltaic (PV) systems. One of the primary aims of research in building-integrated PV systems is to improve the performance of the system's efficiency, availability, and reliability. Although much work has been done on technological design to increase a photovoltaic module's efficiency, there is little research so far on fault diagnosis for PV systems. Faults in a PV system, if not detected, may not only reduce power generation, but also threaten the availability and reliability, effectively the "security" of the whole system. In this paper, first a circuit-based simulation baseline model of a PV system with maximum power point tracking (MPPT) is developed using MATLAB software. MATLAB is one of the most popular tools for integrating computation, visualization and programming in an easy-to-use modeling environment. Second, data collection of a PV system at variable surface temperatures and insolation levels under normal operation is acquired. The developed simulation model of PV system is then calibrated and improved by comparing modeled I-V and P-V characteristics with measured I--V and P--V characteristics to make sure the simulated curves are close to those measured values from the experiments. Finally, based on the circuit-based simulation model, a PV model of various types of faults will be developed by changing conditions or inputs in the MATLAB model, and the I--V and P--V characteristic curves, and the time-dependent voltage and current characteristics of the fault modalities will be characterized for each type of fault. These will be developed as benchmark I-V or P-V, or prototype transient curves. If a fault occurs in a PV system, polling and comparing actual measured I--V and P--V characteristic curves with both normal operational curves and these baseline fault curves will aid in fault diagnosis.

  18. Bathroom watching using a breath detection system

    NASA Astrophysics Data System (ADS)

    Nishiura, Tomofumi; Nakajima, Masato

    2004-10-01

    Recently, domestic accidents have been increasing in Japan. These kinds of accidents occur in private areas such as bedrooms, toilets and bathrooms, and tend to be found too late. Accidents, particularly those occurring in the bathroom, can often result in death. Many systems which have been proposed or which are in use are designed to detect body motion in the bathroom, and determine that a bather has suddenly taken ill when movement ceases. However, the relaxed posture of a person bathing is actually very similar to that of a person who has passed out. It is therefore very difficult to differentiate between the two postures. We have developed a watching system for bathrooms. The new feature of this system lies in its ability to detect a person"s breathing by using an FG vision sensor. From the experiment, it was found that the false alarm rate is expected to reach less than 0.0001% when waiting time is set to 36.8 seconds.

  19. Long-term pumping test to study the impact of an open-loop geothermal system on seawater intrusion in a coastal aquifer: the case study of Bari (Southern Italy)

    NASA Astrophysics Data System (ADS)

    Clementina Caputo, Maria; Masciale, Rita; Masciopinto, Costantino; De Carlo, Lorenzo

    2016-04-01

    The high cost and scarcity of fossil fuels have promoted the increased use of natural heat for a number of direct applications. Just as for fossil fuels, the exploitation of geothermal energy should consider its environmental impact and sustainability. Particular attention deserves the so-called open loop geothermal groundwater heat pump (GWHP) system, which uses groundwater as geothermal fluid. From an economic point of view, the implementation of this kind of geothermal system is particularly attractive in coastal areas, which have generally shallow aquifers. Anyway the potential problem of seawater intrusion has led to laws that restrict the use of groundwater. The scarcity of freshwater could be a major impediment for the utilization of geothermal resources. In this study a new methodology has been proposed. It was based on an experimental approach to characterize a coastal area in order to exploit the low-enthalpy geothermal resource. The coastal karst and fractured aquifer near Bari, in Southern Italy, was selected for this purpose. For the purpose of investigating the influence of an open-loop GWHP system on the seawater intrusion, a long-term pumping test was performed. The test simulated the effects of a prolonged withdrawal on the chemical-physical groundwater characteristics of the studied aquifer portion. The duration of the test was programmed in 16 days, and it was performed with a constant pumping flowrate of 50 m3/h. The extracted water was outflowed into an adjacent artificial channel, by means of a piping system. Water depth, temperature and electrical conductivity of the pumped water were monitored for 37 days, including also some days before and after the pumping duration. The monitored parameters, collected in the pumping and in five observation wells placed 160 m down-gradient with respect to the groundwater flow direction, have been used to estimate different scenarios of the impact of the GWHP system on the seawater intrusion by mean of a

  20. Systems and methods for detecting and processing

    DOEpatents

    Johnson, Michael M.; Yoshimura, Ann S.

    2006-03-28

    Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

  1. System for Anomaly and Failure Detection (SAFD) system development

    NASA Technical Reports Server (NTRS)

    Oreilly, D.

    1993-01-01

    The System for Anomaly and Failure Detection (SAFD) algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failures as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient conditions. This task assignment originally specified developing a platform for executing the algorithm during hot fire tests at Technology Test Bed (TTB) and installing the SAFD algorithm on that platform. Two units were built and installed in the Hardware Simulation Lab and at the TTB in December 1991. Since that time, the task primarily entailed improvement and maintenance of the systems, additional testing to prove the feasibility of the algorithm, and support of hot fire testing. This document addresses the work done since the last report of June 1992. The work on the System for Anomaly and Failure Detection during this period included improving the platform and the algorithm, testing the algorithm against previous test data and in the Hardware Simulation Lab, installing other algorithms on the system, providing support for operations at the Technology Test Bed, and providing routine maintenance.

  2. Periodontal changes following molar intrusion with miniscrews

    PubMed Central

    Bayani, Shahin; Heravi, Farzin; Radvar, Mehrdad; Anbiaee, Najmeh; Madani, Azam Sadat

    2015-01-01

    Background: With the introduction of skeletal anchorage system, recently it is possible to successfully intrude molar teeth. On the other hand, there have been concerns about periodontal changes associated with intrusion and there are few studies on this topic, especially for posterior teeth. Materials and Methods: Ten female patients were enrolled in this study. Maxillary molar intrusion was achieved by inserting two miniscrews and a 17 × 25 titanium molybdenum alloy spring. Crestal height changes were evaluated at three intervals including: Baseline (T0), end of active treatment (T1) and 6 months after retention (T2). Other variables including probing depth, gingival recession, attachment level and bleeding on probing were evaluated by clinical measurements in the three above mentioned intervals. One-sample Kolmogrov-Smirnov test ascertained the normality of the data. For all patients, the changes in tooth position and crestal height were evaluated using one-sample t-test. (P < 0.05) Results: Supra-erupted molars were successfully intruded a mean of 2.1 ± 0.9 mm during active treatment (T0-T1). A mean bone resorption of 0.9 ± 0.9 mm in mesial crest and 1 ± 0.8 mm in distal crest had occurred in total treatment (T0-T2). A mean of 0.6 ± 1.4 mm bone was deposited on mesial crest during the retention period (T1-T2) following tooth relapse. On average, 0.8 ± 0.4 mm attachment gain was obtained. Gingival margin coronalized a mean of 0.8 ± 0.6 mm throughout the entire treatment. Probing depth showed no significant change during treatment. Conclusion: Within the limitations of this study, these results suggest that not only periodontal status was not negatively affected by intrusion, but also there were signs of periodontal improvement including attachment gain and shortening of clinical crown height. PMID:26288629

  3. Leak and Pipe Detection Method and System

    NASA Technical Reports Server (NTRS)

    Youngquist, Robert C. (Inventor)

    2003-01-01

    A method and system for locating leaks of conductive fluids from non-conductive pipes and other structures or for locat- ing non-conductive pipes or structures having conductive fluid contained therein, employ a charge generator to apply a time varying charge to the conductive fluid, and a capaci- tive type detector that can detect the variable charge that is induced in the fluid. The capacitive detector, which prefer- ably includes a handheld housing, employs a large conduc- tive pickup plate that is used to locate the pipe or leak by scanning the plate over the ground and detecting the induced charge that is generated when the plate comes in close proximity to the pipe or leak. If a leak is encountered, the resulting signal will appear over an area larger than expected for a buried pipe, assuming the leak provides an electrically conductive path between the flow and the wet surrounding ground. The detector uses any suitable type of indicator device, such as a pair of headphones that enable an operator to hear the detected signal as a chirping sound, for example.

  4. Autonomous system for pathogen detection and identification

    SciTech Connect

    Belgrader, P.; Benett, W.; Bergman, W.; Langlois, R.; Mariella, R.; Milanovich, F.; Miles, R.; Venkateswaran, K.; Long, G.; Nelson, W.

    1998-09-24

    This purpose of this project is to build a prototype instrument that will, running unattended, detect, identify, and quantify BW agents. In order to accomplish this, we have chosen to start with the world' s leading, proven, assays for pathogens: surface-molecular recognition assays, such as antibody-based assays, implemented on a high-performance, identification (ID)-capable flow cytometer, and the polymerase chain reaction (PCR) for nucleic-acid based assays. With these assays, we must integrate the capability to: l collect samples from aerosols, water, or surfaces; l perform sample preparation prior to the assays; l incubate the prepared samples, if necessary, for a period of time; l transport the prepared, incubated samples to the assays; l perform the assays; l interpret and report the results of the assays. Issues such as reliability, sensitivity and accuracy, quantity of consumables, maintenance schedule, etc. must be addressed satisfactorily to the end user. The highest possible sensitivity and specificity of the assay must be combined with no false alarms. Today, we have assays that can, in under 30 minutes, detect and identify simulants for BW agents at concentrations of a few hundred colony-forming units per ml of solution. If the bio-aerosol sampler of this system collects 1000 Ymin and concentrates the respirable particles into 1 ml of solution with 70% processing efficiency over a period of 5 minutes, then this translates to a detection/ID capability of under 0.1 agent-containing particle/liter of air.

  5. Mammographic computer-aided detection systems.

    PubMed

    2003-04-01

    While mammography is regarded as the best means available to screen for breast cancer, reading mammograms is a tedious, error-prone task. Given the repetitiveness of the process and the fact that less than 1% of mammograms in the average screening population contain cancer, it's no wonder that a significant number of breast cancers--about 28%--are missed by radiologists. The fact that human error is such a significant obstacle makes mammography screening an ideal application for computer-aided detection (CAD) systems. CAD systems serve as a "second pair of eyes" to ensure that radiologists don't miss a suspect area on an image. They analyze patterns on a digitized mammographic image, identify regions that may contain an abnormality indicating cancer, and mark these regions. The marks are then inspected and classified by a radiologist. But CAD systems provide no diagnosis of any kind--it's up to the radiologist to analyze the marked area and decide if it shows cancer. In this Evaluation, we describe the challenges posed by screening mammography, the operating principles and overall efficacy of CAD systems, and the characteristics to consider when purchasing a system. We also compare the performance of two commercially available systems, iCAD's MammoReader and R2's ImageChecker. Because the two systems offer comparable sensitivity, our judgments are based on other performance characteristics, including their ease of use, the number of false marks they produce, the degree to which they can integrate with hospital information systems, and their processing speed.

  6. Electronic diver (under ice) detection system

    SciTech Connect

    McKindra, C.D.; Dunton, K.H.

    1983-01-01

    This article describes field tests successfully conducted in the Alaskan and Canadian Arctic of the Electronic Diver (Under Ice) Detection System (EDDS). The initial impetus for this research and development was the plan by the U.S. Coast Guard to expand the use of divers in the Arctic and other cold environments. One of the possible tasks that these divers would perform was to survey the areal extent of an oil spill under land fast ice. This specific development was initiated out of concern for diver safety and effectiveness while conducting various missions. The EDDS was successfully tested in the Canadian Arctic as a part of the Dome/Canadian Marine Drilling, Ltd., experimental oil spill in April, 1980. A description of the system, its possible uses, and limitations are characterized. The EDDS is an important step forward for diver under ice safety and could be used on a submersible for similar purposes. The system was tested in an oily environment and was affected by neither diver tank air bubbles nor the oil. However, the air bubbles did adversely affect a pinger type system designed to perform similar functions. Although the system performed as planned, further work is needed to optimize its performance and size.

  7. Simple Systems for Detecting Spacecraft Meteoroid Punctures

    NASA Technical Reports Server (NTRS)

    Hall, Stephen B.

    2004-01-01

    A report describes proposed systems to be installed in spacecraft to detect punctures by impinging meteoroids or debris. Relative to other systems that have been used for this purpose, the proposed systems would be simpler and more adaptable, and would demand less of astronauts attention and of spacecraft power and computing resources. The proposed systems would include a thin, hollow, hermetically sealed panel containing an inert fluid at a pressure above the spacecraft cabin pressure. A transducer would monitor the pressure in the panel. It is assumed that an impinging object that punctures the cabin at the location of the panel would also puncture the panel. Because the volume of the panel would be much smaller than that of the cabin, the panel would lose its elevated pressure much faster than the cabin would lose its lower pressure. The transducer would convert the rapid pressure drop to an electrical signal that could trigger an alarm. Hence, the system would provide an immediate indication of the approximate location of a small impact leak, possibly in time to take corrective action before a large loss of cabin pressure could occur.

  8. A polarization system for persistent chemical detection

    NASA Astrophysics Data System (ADS)

    Craven-Jones, Julia; Appelhans, Leah; Couphos, Eric; Embree, Todd; Finnegan, Patrick; Goldstein, Dennis; Karelitz, David; LaCasse, Charles; Luk, Ting S.; Mahamat, Adoum; Massey, Lee; Tanbakuchi, Anthony; Washburn, Cody; Vigil, Steven

    2015-09-01

    We report on the development of a prototype polarization tag based system for detecting chemical vapors. The system primarily consists of two components, a chemically sensitive tag that experiences a change in its optical polarization properties when exposed to a specific chemical of interest, and an optical imaging polarimeter that is used to measure the polarization properties of the tags. Although the system concept could be extended to other chemicals, for the initial system prototype presented here the tags were developed to be sensitive to hydrogen fluoride (HF) vapors. HF is used in many industrial processes but is highly toxic and thus monitoring for its presence and concentration is often of interest for personnel and environmental safety. The tags are periodic multilayer structures that are produced using standard photolithographic processes. The polarimetric imager has been designed to measure the degree of linear polarization reflected from the tags in the short wave infrared. By monitoring the change in the reflected polarization signature from the tags, the polarimeter can be used to determine if the tag was exposed to HF gas. In this paper, a review of the system development effort and preliminary test results are presented and discussed, as well as our plan for future work.

  9. Method and system for detecting explosives

    DOEpatents

    Reber, Edward L.; Jewell, James K.; Rohde, Kenneth W.; Seabury, Edward H.; Blackwood, Larry G.; Edwards, Andrew J.; Derr, Kurt W.

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  10. High resolution detection system of capillary electrophoresis

    NASA Astrophysics Data System (ADS)

    Wang, Jie; Wang, Li Qiang; Shi, Yan; Zheng, Hua; Lu, Zu Kang

    2007-12-01

    The capillary electrophoresis (CE) with laser induced fluorescence detection (LIFD) system was founded according to confocal theory. The 3-D adjustment of the exciting and collecting optical paths was realized. The photomultiplier tube (PMT) is used and the signals are processed by a software designed by ourselves. Under computer control, high voltage is applied to appropriate reservoirs and to inject and separate DNA samples respectively. Two fluorescent dyes Thiazole Orange (TO) and SYBR Green I were contrasted. With both of the dyes, high signals-to-noise images were obtained with the CE-LIFD system. The single-bases can be distinguished from the electrophoretogram and high resolution of DNA sample separation was obtained.

  11. Simulation Model of Mobile Detection Systems

    SciTech Connect

    Edmunds, T; Faissol, D; Yao, Y

    2009-01-27

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  12. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  13. 46 CFR 108.413 - Fusible element fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the...

  14. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system...

  15. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system...

  16. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system...

  17. 46 CFR 108.405 - Fire detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Fire detection system. 108.405 Section 108.405 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system...

  18. Doppler-corrected differential detection system

    NASA Technical Reports Server (NTRS)

    Simon, Marvin K. (Inventor); Divsalar, Dariush (Inventor)

    1991-01-01

    Doppler in a communication system operating with a multiple differential phase-shift-keyed format (MDPSK) creates an adverse phase shift in an incoming signal. An open loop frequency estimation is derived from a Doppler-contaminated incoming signal. Based upon the recognition that, whereas the change in phase of the received signal over a full symbol contains both the differentially encoded data and the Doppler induced phase shift, the same change in phase over half a symbol (within a given symbol interval) contains only the Doppler induced phase shift, and the Doppler effect can be estimated and removed from the incoming signal. Doppler correction occurs prior to the receiver's final output of decoded data. A multiphase system can operate with two samplings per symbol interval at no penalty in signal-to-noise ratio provided that an ideal low pass pre-detection filter is employed, and two samples, at 1/4 and 3/4 of the symbol interval T sub s, are taken and summed together prior to incoming signal data detection.

  19. System for Anomaly and Failure Detection (SAFD) system development

    NASA Astrophysics Data System (ADS)

    Oreilly, D.

    1992-07-01

    This task specified developing the hardware and software necessary to implement the System for Anomaly and Failure Detection (SAFD) algorithm, developed under Technology Test Bed (TTB) Task 21, on the TTB engine stand. This effort involved building two units; one unit to be installed in the Block II Space Shuttle Main Engine (SSME) Hardware Simulation Lab (HSL) at Marshall Space Flight Center (MSFC), and one unit to be installed at the TTB engine stand. Rocketdyne personnel from the HSL performed the task. The SAFD algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failure as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient condition.

  20. System for Anomaly and Failure Detection (SAFD) system development

    NASA Technical Reports Server (NTRS)

    Oreilly, D.

    1992-01-01

    This task specified developing the hardware and software necessary to implement the System for Anomaly and Failure Detection (SAFD) algorithm, developed under Technology Test Bed (TTB) Task 21, on the TTB engine stand. This effort involved building two units; one unit to be installed in the Block II Space Shuttle Main Engine (SSME) Hardware Simulation Lab (HSL) at Marshall Space Flight Center (MSFC), and one unit to be installed at the TTB engine stand. Rocketdyne personnel from the HSL performed the task. The SAFD algorithm was developed as an improvement over the current redline system used in the Space Shuttle Main Engine Controller (SSMEC). Simulation tests and execution against previous hot fire tests demonstrated that the SAFD algorithm can detect engine failure as much as tens of seconds before the redline system recognized the failure. Although the current algorithm only operates during steady state conditions (engine not throttling), work is underway to expand the algorithm to work during transient condition.

  1. Developments toward a Low-Cost Approach for Long-Term, Unattended Vapor Intrusion Monitoring

    PubMed Central

    Tolley, William K.

    2014-01-01

    There are over 450,000 sites contaminated by chemicals in the US. This large number of contaminated sites and the speed of subsurface migration of chemicals pose considerable risk to nearby residences and commercial buildings. The high costs for monitoring around these site stem from the labor involved in placing and replacing the passive sorbent vapor samplers and the resultant laboratory analysis. This monitoring produces sparse data sets that do not track temporal changes well. To substantially reduce costs and better track exposures, less costly, unattended systems for monitoring soil gases and vapor intrusion into homes and businesses are desirable to aid in the remediation of contaminated sites. This paper describes progress toward the development of an inexpensive system specifically for monitoring vapor intrusion; the system can operate repeatedly without user intervention with low detection limits (1 × 10−9, or 1 part-per-billion). Targeted analytes include chlorinated hydrocarbons (dichloroethylene, trichloroethane, trichloroethylene, and perchloroethylene) and benzene. The system consists of a trap-and-purge preconcentrator for vapor collection in conjunction with a compact gas chromatography instrument to separate individual compounds. Chemical detection is accomplished with an array of chemicapacitors and a metal-oxide semiconductor combustibles sensor. Both the preconcentrator and the chromatography column are resistively heated. All components are compatible with ambient air, which serves as the carrier gas for the gas chromatography and detectors. PMID:24903107

  2. Evaluation of intrusion sensors and video assessment in areas of restricted passage

    SciTech Connect

    Hoover, C.E.; Ringler, C.E.

    1996-04-01

    This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

  3. Quench detection system for twin coils HTS SMES

    NASA Astrophysics Data System (ADS)

    Badel, A.; Tixador, P.; Simiand, G.; Exchaw, O.

    2010-10-01

    The quench detection and protection system is a critical element in superconducting magnets. After a short summary of the quench detection and protection issues in HTS magnets, an original detection system is presented. The main feature of this system is an active protection of the detection electronics during the discharges, making it possible to use standard electronics even if the discharge voltage is very high. The design of the detection system is therefore easier and it can be made very sensitive. An implementation example is presented for a twin coil HTS SMES prototype, showing the improvements when compared to classical detection systems during operation.

  4. Small arm fire acoustic detection and localization systems: gunfire detection system

    NASA Astrophysics Data System (ADS)

    Donzier, Alain; Cadavid, Sandra

    2005-05-01

    The Gunfire Detection System (GDS) is an acoustic passive sensor designed to rapidly detect, locate, and report on hostile fire from small arms upon detection of a blast wave from a bullet exiting the gun barrel and/or the supersonic wave of the bullet. Upon the detection of the muzzle blast and/or the acoustic shock wave caused by the moving bullet the GDS notifies the user and displays the azimuth, elevation and range to the gunfire origin (shooter). This information allows the GDS user to swiftly move, return fire or take other appropriate action. The paper presented examines the militarization process of a Commercial Off The Shelf (COTS) item and provides lessons learned.

  5. Advanced Water Vapor Lidar Detection System

    NASA Technical Reports Server (NTRS)

    Elsayed-Ali, Hani

    1998-01-01

    In the present water vapor lidar system, the detected signal is sent over long cables to a waveform digitizer in a CAMAC crate. This has the disadvantage of transmitting analog signals for a relatively long distance, which is subjected to pickup noise, leading to a decrease in the signal to noise ratio. Generally, errors in the measurement of water vapor with the DIAL method arise from both random and systematic sources. Systematic errors in DIAL measurements are caused by both atmospheric and instrumentation effects. The selection of the on-line alexandrite laser with a narrow linewidth, suitable intensity and high spectral purity, and its operation at the center of the water vapor lines, ensures minimum influence in the DIAL measurement that are caused by the laser spectral distribution and avoid system overloads. Random errors are caused by noise in the detected signal. Variability of the photon statistics in the lidar return signal, noise resulting from detector dark current, and noise in the background signal are the main sources of random error. This type of error can be minimized by maximizing the signal to noise ratio. The increase in the signal to noise ratio can be achieved by several ways. One way is to increase the laser pulse energy, by increasing its amplitude or the pulse repetition rate. Another way, is to use a detector system with higher quantum efficiency and lower noise, on the other hand, the selection of a narrow band optical filter that rejects most of the day background light and retains high optical efficiency is an important issue. Following acquisition of the lidar data, we minimize random errors in the DIAL measurement by averaging the data, but this will result in the reduction of the vertical and horizontal resolutions. Thus, a trade off is necessary to achieve a balance between the spatial resolution and the measurement precision. Therefore, the main goal of this research effort is to increase the signal to noise ratio by a factor of

  6. Leak detection system upgrades Cochin pipeline

    SciTech Connect

    Wray, B.; O`Leary, C.

    1996-02-01

    Amoco Canada`s Cochin pipeline system consists of 1,900 miles of 12-inch pipeline, 31 pump stations, eight injection/delivery stations and five propane terminals. It originates just northeast of Edmonton and crosses into the US in North Dakota, runs south of Lake Michigan, turns northeast to pass through Detroit and terminates in Sarnia, Ontario. In 1991, it was decided to significantly upgrade facilities for operating the Cochin pipeline. The control center hardware was obsolete, including parts and components no longer available. Also, SCADA and modeling software was no longer supported by outside vendors or consultants and there was only limited in-house support available. The land-based communications system was unreliable and expensive. Goals for the upgrade project included maintaining (improving) reliability and minimizing operating risks. Amoco Canada wanted to ensure reliable operations and support, provide reliable and effective leak detection, establish dependable communications, have the capability to respond to market additions or changes and maintain customer and regulatory confidence. Another important goal was to minimize operating costs. Specifically, methods were sought to minimize power costs, communications expense and support and maintenance expenditures while eliminating non-productive work. This paper reviews the resulting design and performance of this system.

  7. Method and system for turbomachinery surge detection

    DOEpatents

    Faymon, David K.; Mays, Darrell C.; Xiong, Yufei

    2004-11-23

    A method and system for surge detection within a gas turbine engine, comprises: measuring the compressor discharge pressure (CDP) of the gas turbine over a period of time; determining a time derivative (CDP.sub.D ) of the measured (CDP) correcting the CDP.sub.D for altitude, (CDP.sub.DCOR); estimating a short-term average of CDP.sub.DCOR.sup.2 ; estimating a short-term average of CDP.sub.DCOR ; and determining a short-term variance of corrected CDP rate of change (CDP.sub.roc) based upon the short-term average of CDP.sub.DCOR and the short-term average of CDP.sub.DCOR.sup.2. The method and system then compares the short-term variance of corrected CDP rate of change with a pre-determined threshold (CDP.sub.proc) and signals an output when CDP.sub.roc >CDP.sub.proc. The method and system provides a signal of a surge within the gas turbine engine when CDP.sub.roc remains>CDP.sub.proc for pre-determined period of time.

  8. Automatic system for detecting pornographic images

    NASA Astrophysics Data System (ADS)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  9. The questa magmatic system: Petrologic, chemical and isotopic variations in cogenetic volcanic and plutonic rocks of the latir volcanic field and associated intrusives, northern New Mexico

    SciTech Connect

    Johnson, C.M.

    1986-01-01

    Field, chemical and isotopic data demonstrate that nearly all igneous rocks at Questa resulted from interactions between mantle-derived parental magmas and the crust. Strontium, neodymium and lead isotope ratios of early andesites to rhyolites (28 to 26 Ma) indicate that these magmas assimilated > 25% lower crust. Injection of basaltic magmas extensively modified the strontium and neodymium but not the lead isotope compositions of the lower crust. Eruption of comendite magmas and the peralkaline Amalia Tuff 26 Ma is correlated with inception of regional extension. Lead isotope ratios identify different sources for the metaluminous granites and the peralkaline rocks. 26 Ma metaluminous granite to granodiorite intrusions have chemical and isotopic compositions to those of the precaldera intermediate-composition rocks, and are interpreted as representing the solidified equivalents of the precaldera magmatic episode. However, both conventional and ion-microprobe isotopic data prohibit significant assimilation of crustal rocks at the level of exposure, suggesting that the plutons were emplaced a relatively crystal-rich mushes which did not have sufficient heat to assimilate country rocks. This suggest that in some cases plutonic rocks are better than volcanic rocks in representing the isotopic compositions of their source regions, because the assimilation potential of crystal-rich magmas is significantly less than that of largely liquid magmas.

  10. Liquid chromatography detection unit, system, and method

    SciTech Connect

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  11. Nucleic acid detection systems for enteroviruses.

    PubMed Central

    Rotbart, H A

    1991-01-01

    The enteroviruses comprise nearly 70 human pathogens responsible for a wide array of diseases including poliomyelitis, meningitis, myocarditis, and neonatal sepsis. Current diagnostic tests for the enteroviruses are limited in their use by the slow growth, or failure to grow, of certain serotypes in culture, the antigenic diversity among the serotypes, and the low titer of virus in certain clinical specimens. Within the past 6 years, applications of molecular cloning techniques, in vitro transcription vectors, automated nucleic acid synthesis, and the polymerase chain reaction have resulted in significant progress toward nucleic acid-based detection systems for the enteroviruses that take advantage of conserved genomic sequences across many, if not all, serotypes. Similar approaches to the study of enteroviral pathogenesis have already produced dramatic advances in our understanding of how these important viruses cause their diverse clinical spectra. PMID:1649002

  12. Systems and methods for detecting neutrons

    DOEpatents

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  13. System for detecting special nuclear materials

    SciTech Connect

    Jandel, Marian; Rusev, Gencho Yordanov; Taddeucci, Terry Nicholas

    2015-07-14

    The present disclosure includes a radiological material detector having a convertor material that emits one or more photons in response to a capture of a neutron emitted by a radiological material; a photon detector arranged around the convertor material and that produces an electrical signal in response to a receipt of a photon; and a processor connected to the photon detector, the processor configured to determine the presence of a radiological material in response to a predetermined signature of the electrical signal produced at the photon detector. One or more detectors described herein can be integrated into a detection system that is suited for use in port monitoring, treaty compliance, and radiological material management activities.

  14. 29 CFR 1910.164 - Fire detection systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 5 2011-07-01 2011-07-01 false Fire detection systems. 1910.164 Section 1910.164 Labor... OCCUPATIONAL SAFETY AND HEALTH STANDARDS Fire Protection Other Fire Protection Systems § 1910.164 Fire detection systems. (a) Scope and application. This section applies to all automatic fire detection...

  15. 46 CFR 182.480 - Flammable vapor detection systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Flammable vapor detection systems. 182.480 Section 182.480 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... detection systems. (a) A flammable vapor detection system required by § 182.410(c) must meet UL...

  16. 46 CFR 182.480 - Flammable vapor detection systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Flammable vapor detection systems. 182.480 Section 182.480 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER... detection systems. (a) A flammable vapor detection system required by § 182.410(c) must meet UL...

  17. VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration

    SciTech Connect

    Pritchard, D.A.

    1987-05-01

    It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

  18. Saline and particle-driven interfacial intrusions

    NASA Astrophysics Data System (ADS)

    de Rooij, Frans; Linden, P. F.; Dalziel, Stuart B.

    1999-06-01

    This paper presents a theoretical and experimental investigation into saline and particle-driven intrusions along the interface between two layers of different densities. The conditions at the nose of an intrusion are described in an analysis similar to that applied by Benjamin (1968) to boundary gravity currents. Equations for propagation velocity and front position as functions of relative density are derived. These are used in an integral model for intrusions, which also includes the effects of sedimentation of particles and detrainment of interstitial fluid. The model describes the time-evolution of the length of the intrusion and the sediment distribution it produces. Laboratory experiments were carried out with lock-releases of a fixed volume of saline or particle-laden fluid into a two-layer stratification. Measurements were taken of the intrusion propagation, intrusion position and sediment distribution, and are found to be in good agreement with the solutions of the integral model.

  19. Non-intrusive temperature measurement using microscale visualization techniques

    NASA Astrophysics Data System (ADS)

    Chamarthy, Pramod; Garimella, Suresh V.; Wereley, Steven T.

    2009-07-01

    μPIV is a widely accepted tool for making accurate measurements in microscale flows. The particles that are used to seed the flow, due to their small size, undergo Brownian motion which adds a random noise component to the measurements. Brownian motion introduces an undesirable error in the velocity measurements, but also contains valuable temperature information. A PIV algorithm which detects both the location and broadening of the correlation peak can measure velocity as well as temperature simultaneously using the same set of images. The approach presented in this work eliminates the use of the calibration constant used in the literature (Hohreiter et al. in Meas Sci Technol 13(7):1072-1078, 2002), making the method system-independent, and reducing the uncertainty involved in the technique. The temperature in a stationary fluid was experimentally measured using this technique and compared to that obtained using the particle tracking thermometry method and a novel method, low image density PIV. The method of cross-correlation PIV was modified to measure the temperature of a moving fluid. A standard epi-fluorescence μPIV system was used for all the measurements. The experiments were conducted using spherical fluorescent polystyrene-latex particles suspended in water. Temperatures ranging from 20 to 80°C were measured. This method allows simultaneous non-intrusive temperature and velocity measurements in integrated cooling systems and lab-on-a-chip devices.

  20. The Autonomous Pathogen Detection System (APDS)

    SciTech Connect

    Morris, J; Dzenitis, J

    2004-09-22

    Shaped like a mailbox on wheels, it's been called a bioterrorism ''smoke detector.'' It can be found in transportation hubs such as airports and subways, and it may be coming to a location near you. Formally known as the Autonomous Pathogen Detection System, or APDS, this latest tool in the war on bioterrorism was developed at Lawrence Livermore National Laboratory to continuously sniff the air for airborne pathogens and toxins such as anthrax or plague. The APDS is the modern day equivalent of the canaries miners took underground with them to test for deadly carbon dioxide gas. But this canary can test for numerous bacteria, viruses, and toxins simultaneously, report results every hour, and confirm positive samples and guard against false positive results by using two different tests. The fully automated system collects and prepares air samples around the clock, does the analysis, and interprets the results. It requires no servicing or human intervention for an entire week. Unlike its feathered counterpart, when an APDS unit encounters something deadly in the air, that's when it begins singing, quietly. The APDS unit transmits a silent alert and sends detailed data to public health authorities, who can order evacuation and begin treatment of anyone exposed to toxic or biological agents. It is the latest in a series of biodefense detectors developed at DOE/NNSA national laboratories. The manual predecessor to APDS, called BASIS (for Biological Aerosol Sentry and Information System), was developed jointly by Los Alamos and Lawrence Livermore national laboratories. That system was modified to become BioWatch, the Department of Homeland Security's biological urban monitoring program. A related laboratory instrument, the Handheld Advanced Nucleic Acid Analyzer (HANAA), was first tested successfully at LLNL in September 1997. Successful partnering with private industry has been a key factor in the rapid advancement and deployment of biodefense instruments such as these

  1. How stratospheric are deep stratospheric intrusions? LUAMI 2008

    NASA Astrophysics Data System (ADS)

    Trickl, Thomas; Vogelmann, Hannes; Fix, Andreas; Schäfler, Andreas; Wirth, Martin; Calpini, Bertrand; Levrat, Gilbert; Romanens, Gonzague; Apituley, Arnoud; Wilson, Keith M.; Begbie, Robert; Reichardt, Jens; Vömel, Holger; Sprenger, Michael

    2016-07-01

    A large-scale comparison of water-vapour vertical-sounding instruments took place over central Europe on 17 October 2008, during a rather homogeneous deep stratospheric intrusion event (LUAMI, Lindenberg Upper-Air Methods Intercomparison). The measurements were carried out at four observational sites: Payerne (Switzerland), Bilthoven (the Netherlands), Lindenberg (north-eastern Germany), and the Zugspitze mountain (Garmisch-Partenkichen, German Alps), and by an airborne water-vapour lidar system creating a transect of humidity profiles between all four stations. A high data quality was verified that strongly underlines the scientific findings. The intrusion layer was very dry with a minimum mixing ratios of 0 to 35 ppm on its lower west side, but did not drop below 120 ppm on the higher-lying east side (Lindenberg). The dryness hardens the findings of a preceding study ("Part 1", Trickl et al., 2014) that, e.g., 73 % of deep intrusions reaching the German Alps and travelling 6 days or less exhibit minimum mixing ratios of 50 ppm and less. These low values reflect values found in the lowermost stratosphere and indicate very slow mixing with tropospheric air during the downward transport to the lower troposphere. The peak ozone values were around 70 ppb, confirming the idea that intrusion layers depart from the lowermost edge of the stratosphere. The data suggest an increase of ozone from the lower to the higher edge of the intrusion layer. This behaviour is also confirmed by stratospheric aerosol caught in the layer. Both observations are in agreement with the idea that sections of the vertical distributions of these constituents in the source region were transferred to central Europe without major change. LAGRANTO trajectory calculations demonstrated a rather shallow outflow from the stratosphere just above the dynamical tropopause, for the first time confirming the conclusions in "Part 1" from the Zugspitze CO observations. The trajectories qualitatively explain

  2. A neutron based vehicle-borne improvised explosive device detection system

    NASA Astrophysics Data System (ADS)

    Koltick, D.; Kim, Y.; McConchie, S.; Novikov, I.; Belbot, M.; Gardner, G.

    2007-08-01

    Vehicle-borne improvised explosive devices pose significant risk to government facilities, economic centers and the general public. The detonation of large-scale explosive devices is a worldwide phenomenon. Checkpoint operations currently call for a manual search of vehicles, putting personnel at high risk. We have built a prototype, remotely controlled system to non-intrusively and non-destructively detect explosives with a vehicle inspection time of between 2 and 5 min. The system utilizes a neutron generator and high-purity germanium (HPGe) detectors housed in moving components that scan the entire vehicle and allow for a single location rescan. The neutron generator operates at ∼108 neutrons per second resulting in extremely small induced radiation levels and low exposure to possible stowaways. A control software operator interface is fully automated for remote operation of the hardware components and execution of the data analysis and threat algorithm with no operator intervention. Studies have been completed to characterize the performance of the system as a function of the weight of explosive within a complete set of vehicles. The underlying physical concepts of the system development are presented.

  3. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country. PMID:27347649

  4. An international perspective on Facebook intrusion.

    PubMed

    Błachnio, Agata; Przepiorka, Aneta; Benvenuti, Martina; Cannata, Davide; Ciobanu, Adela Magdalena; Senol-Durak, Emre; Durak, Mithat; Giannakos, Michail N; Mazzoni, Elvis; Pappas, Ilias O; Popa, Camelia; Seidman, Gwendolyn; Yu, Shu; Wu, Anise M S; Ben-Ezra, Menachem

    2016-08-30

    Facebook has become one of the most popular social networking websites in the world. The main aim of the study was to present an international comparison of Facebook intrusion and Internet penetration while examining possible gender differences. The study consisted of 2589 participants from eight countries: China, Greece, Israel, Italy, Poland, Romania, Turkey, USA. Facebook intrusion and Internet penetration were taken into consideration. In this study the relationship between Facebook intrusion and Internet penetration was demonstrated. Facebook intrusion was slightly negatively related to Internet penetration in each country.

  5. Detection of contamination of municipal water distribution systems

    DOEpatents

    Cooper, John F.

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  6. Igneous Intrusion Impacts on Waste Packages and Waste Forms

    SciTech Connect

    P. Bernot

    2004-08-16

    The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The model is based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. This constitutes the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of SR and LA (BSC 2003a) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2002a). The technical work plan is governed by the procedures of AP-SIII.10Q, Models. Any deviations from the technical work plan are documented in the TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model: (1) Impacts of magma intrusion on the components of engineered barrier system (e.g., drip shields and cladding) of emplacement drifts in Zone 1, and the fate of waste forms. (2) Impacts of conducting magma heat and diffusing magma gases on the drip shields, waste packages, and cladding in the Zone 2 emplacement drifts adjacent to the intruded drifts. (3) Impacts of intrusion on Zone 1 in-drift thermal and geochemical environments, including seepage hydrochemistry. The scope of this model only includes impacts to the components stated above, and does not include impacts to other engineered barrier system (EBS) components such as the invert and

  7. Development of Fall Detection System Using Ultrasound Sensors

    NASA Astrophysics Data System (ADS)

    Tajima, Takuya; Abe, Takehiko; Kimura, Haruhiko

    This paper proposes a sensing system for detecting bather's fall. The fall detection system uses ultrasound sensors installed on the ceiling of bathroom to measure the distance between sensor and a bather. The merits of utilizing ultrasound sensor are easy installation and easy use. Moreover the apparatus has an advantage of enhancing the privacy of bathers and having robustness against humidity. In order to detect bather's fall, the proposed system uses the following two methods: status detection and behavior detection. The function of status detection is to estimate bather's postures such as standing and sitting by monitoring the highest part of bather's body. Meanwhile, the function of behavior detection is to grasp the speed of bather's vertical movement by monitoring the change of distance between sensor and the bather. The system estimates the occurrence of bather's fall when the distance changes suddenly. As a result of experiment with some subjects, the system was possible to detect bather's falling behavior with high accuracy.

  8. Non-intrusive method of measuring PCV blowby constituents

    SciTech Connect

    Crane, M.E.; Ariga, S.; Boulard, R.; Lindamood, B.

    1994-10-01

    A technique is presented that has been successfully demonstrated to non-intrusively and quickly sample gases typically found in PCV systems. Color Detection Tubes (CDTs) were used with a simple sampling arrangement to monitor CO{sub 2}, NO{sub x}, O{sub 2}, and H{sub 2}O(g) at the closure line, crankcase, and PCV line. Measurements were accurate and could be made instantaneously. Short Path Thermal Desorbtion Tubes (SPTDTs) were used at the same engine locations for the characterization of fuel- and oil-derived hydrocarbon (HC) fractions and required only 50 cc samples. High engine loads caused pushover of blowby vapors as indicated by increased concentrations of CO{sub 2}, NO{sub x}, H{sub 2}O(g), and fuel HCs in the engines` fresh air inlets during WOT operation. Peak concentrations of blowby vapors were measured in the crankcase under no load and part throttle conditions. Oxygen concentrations always opposed the trends of CO{sub 2}, NO{sub x}, and H{sub 2}O(g). SPTDT data revealed that the PCV system consumes approximately 100-200 times more fuel vapors than oil vapors, on a mass basis; however, PCV-derived oil consumption represented almost 12 percent of total engine oil consumption under no load conditions. 8 refs., 17 figs.

  9. Analyzing and Detecting Problems in Systems of Systems

    NASA Technical Reports Server (NTRS)

    Lindvall, Mikael; Ackermann, Christopher; Stratton, William C.; Sibol, Deane E.; Godfrey, Sally

    2008-01-01

    Many software systems are evolving complex system of systems (SoS) for which inter-system communication is mission-critical. Evidence indicates that transmission failures and performance issues are not uncommon occurrences. In a NASA-supported Software Assurance Research Program (SARP) project, we are researching a new approach addressing such problems. In this paper, we are presenting an approach for analyzing inter-system communications with the goal to uncover both transmission errors and performance problems. Our approach consists of a visualization and an evaluation component. While the visualization of the observed communication aims to facilitate understanding, the evaluation component automatically checks the conformance of an observed communication (actual) to a desired one (planned). The actual and the planned are represented as sequence diagrams. The evaluation algorithm checks the conformance of the actual to the planned diagram. We have applied our approach to the communication of aerospace systems and were successful in detecting and resolving even subtle and long existing transmission problems.

  10. An Immunity-Based Anomaly Detection System with Sensor Agents

    PubMed Central

    Okamoto, Takeshi; Ishida, Yoshiteru

    2009-01-01

    This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user's command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems. PMID:22291560

  11. Systems and Methods for Automated Water Detection Using Visible Sensors

    NASA Technical Reports Server (NTRS)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  12. Coastal Marsh Monitoring for Persistent Saltwater Intrusion

    NASA Technical Reports Server (NTRS)

    Hall, Callie M.

    2008-01-01

    This viewgraph presentation reviews NASA's work on the project that supports the Gulf of Mexico Alliance (GOMA) Governors Action Plan to monitor the coastal wetlands for saltwater intrusion. The action items that relate to the task are: (1) Obtain information on projected relative sea level rise, subsidence, and storm vulnerability to help prioritize conservation projects, including restoration, enhancement, and acquisition, and (2) Develop and apply ecosystem models to forecast the habitat structure and succession following hurricane disturbance and changes in ecological functions and services that impact vital socio-economic aspects of coastal systems. The objectives of the program are to provide resource managers with remote sensing products that support ecosystem forecasting models requiring salinity and inundation data. Specifically, the proposed work supports the habitat-switching modules in the Coastal Louisiana Ecosystem Assessment and Restoration (CLEAR) model, which provides scientific evaluation for restoration management.

  13. Detecting Planets Outside The Solar System

    NASA Technical Reports Server (NTRS)

    Pravdo, Steven H.; Terrile, Richard J.; Ftaclas, Christ; Gatewood, George

    1993-01-01

    Report describes proposed Astrometric Imaging Telescope, used to detect planets in orbit around distant stars. Includes executive summary and statement of scientific objectives of Astrometric Imaging Telescope program.

  14. Life Detection System DTIVA for Monitoring Parameter in Fossilization Process

    NASA Astrophysics Data System (ADS)

    Gómez, F.; Garcia-Descalzo, L.; Cockell, C. S.; Schwendner, P.; Rettberg, P.; Beblo-Vranesevic, K.; Bohmeier, M.; Rabbow, E.; Westall, F.; Gaboyer, F.; Walter, N.; Moissl-Eichinger, M.; Perras, A.; Amils, R.; Malki, M.; Ehrenfreund, P.; Monaghan, E.; Marteinsson, V.; Vannier, P.

    2016-05-01

    Using Life Detection System LDS we followed the physicochemical parameter in a growth culture under fossilization/mineralization-induced process with the objectives of biomarkers detection. Biomarkers study is crucial for the search for life on Mars.

  15. Legal Vs. Psychological Aspects of Intrusiveness.

    ERIC Educational Resources Information Center

    Binder, Virginia L.

    Court decisions stressing the rights of mental patients have necessitated a radical revision in the management of behavioral treatment programs. The client's rights to the least intrusive procedures to achieve treatment goals have become important in case law. Factors which identify intrusiveness include: (1) the extent to which the "new mental…

  16. Reduction of Attrition Through Intrusive Advising.

    ERIC Educational Resources Information Center

    Glennen, Robert E.; Baxley, Dan M.

    1985-01-01

    Examines the effects of an intrusive advising program on the attrition rate of college freshmen and sophomores. Identifies reasons students drop out and outlines an advising program used at Western New Mexico University. Results showed the intrusive advising program to be effective in reducing attrition rates. (BH)

  17. Emotional and Behavioral Reaction to Intrusive Thoughts

    ERIC Educational Resources Information Center

    Berry, Lisa-Marie; May, Jon; Andrade, Jackie; Kavanagh, David

    2010-01-01

    A self-report measure of the emotional and behavioral reactions to intrusive thoughts was developed. The article presents data that confirm the stability, reliability, and validity of the new seven-item measure. Emotional and behavioral reactions to intrusions emerged as separate factors on the Emotional and Behavioral Reactions to Intrusions…

  18. Vapour Intrusion into Buildings - A Literature Review

    EPA Science Inventory

    This chapter provides a review of recent research on vapour intrusion of volatile organic compounds (VOCs) into buildings. The chapter builds on a report from Tillman and Weaver (2005) which reviewed the literature on vapour intrusion through 2005. Firstly, the term ‘vapour intru...

  19. System and method for detecting cells or components thereof

    DOEpatents

    Porter, Marc D.; Lipert, Robert J.; Doyle, Robert T.; Grubisha, Desiree S.; Rahman, Salma

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  20. Dike Intrusion Process of 2000 Miyakejima - Kozujima Event estimated from GPS measurements in Kozujima - Niijima Islands, central Japan

    NASA Astrophysics Data System (ADS)

    Murase, M.; Nakao, S.; Kato, T.; Tabei, T.; Kimata, F.; Fujii, N.

    2003-12-01

    .(2003) discuss the gravity change of Miyakejima and they conclude that the magma supply from the chamber under Miyakejima volcano is too small to explain the dike intrusion. In order to discuss the local ground deformation, Nagoya University additionally operates the local GPS network of single frequency receivers at seven sites in Kozujima, Shikineshima and Niijima. Form the vertical deformation detected on local GPS network, northward tilting is observed in Kozujima. We used Genetic Algorithm (GA) for search the model parameter of dike intrusion and fault. GA is an attractive global search tool suitable for the irregular, multimodal fitness functions typically observed in nonlinear optimization problems. We discuss mechanism of Miyakejima - Kozujima event in detail using data of 20 GPS sites near field by GA. The results suggest that magma intrusion system of the dike between Miyakejima and Kozujima changes on August 18 when a large volcano eruption occurred. Until August 18 the activity of creep fault is high and after then deflation at the point source just under the dike is active.

  1. Magnetic fabric constraints of the emplacement of igneous intrusions

    NASA Astrophysics Data System (ADS)

    Maes, Stephanie M.

    Fabric analysis is critical to evaluating the history, kinematics, and dynamics of geological deformation. This is particularly true of igneous intrusions, where the development of fabric is used to constrain magmatic flow and emplacement mechanisms. Fabric analysis was applied to three mafic intrusions, with different tectonic and petrogenetic histories, to study emplacement and magma flow: the Insizwa sill (Mesozoic Karoo Large Igneous Province, South Africa), Sonju Lake intrusion (Proterozoic Midcontinent Rift, Minnesota, USA), and Palisades sill (Mesozoic rift basin, New Jersey, USA). Multiple fabric analysis techniques were used to define the fabric in each intrusive body. Using digital image analysis techniques on multiple thin sections, the three-dimensional shape-preferred orientation (SPO) of populations of mineral phases were calculated. Low-field anisotropy of magnetic susceptibility (AMS) measurements were used as a proxy for the mineral fabric of the ferromagnetic phases (e.g., magnetite). In addition, a new technique---high-field AMS---was used to isolate the paramagnetic component of the fabric (e.g., silicate fabric). Each fabric analysis technique was then compared to observable field fabrics as a framework for interpretation. In the Insizwa sill, magnetic properties were used to corroborate vertical petrologic zonation and distinguish sub-units within lithologically defined units. Abrupt variation in magnetic properties provides evidence supporting the formation of the Insizwa sill by separate magma intrusions. Low-field AMS fabrics in the Sonju Lake intrusion exhibit consistent SW-plunging lineations and SW-dipping foliations. These fabric orientations provide evidence that the cumulate layers in the intrusion were deposited in a dynamic environment, and indicate magma flowed from southwest to northeast, parallel to the pre-existing rift structures. In the Palisades sill, the magnetite SPO and low-field AMS lineation have developed orthogonal to

  2. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  3. 46 CFR 108.404 - Selection of fire detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Selection of fire detection system. 108.404 Section 108.404 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If...

  4. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  5. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  6. 46 CFR 108.404 - Selection of fire detection system.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Selection of fire detection system. 108.404 Section 108.404 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If...

  7. 46 CFR 108.404 - Selection of fire detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Selection of fire detection system. 108.404 Section 108.404 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If...

  8. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  9. 46 CFR 108.404 - Selection of fire detection system.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Selection of fire detection system. 108.404 Section 108.404 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If...

  10. 46 CFR 108.411 - Smoke detection system.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Smoke detection system. 108.411 Section 108.411 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.411 Smoke detection system. Each smoke accumulator in a...

  11. Fusion of Optimized Indicators from Advanced Driver Assistance Systems (ADAS) for Driver Drowsiness Detection

    PubMed Central

    Daza, Iván G.; Bergasa, Luis M.; Bronte, Sebastián; Yebes, J. Javier; Almazán, Javier; Arroyo, Roberto

    2014-01-01

    This paper presents a non-intrusive approach for monitoring driver drowsiness using the fusion of several optimized indicators based on driver physical and driving performance measures, obtained from ADAS (Advanced Driver Assistant Systems) in simulated conditions. The paper is focused on real-time drowsiness detection technology rather than on long-term sleep/awake regulation prediction technology. We have developed our own vision system in order to obtain robust and optimized driver indicators able to be used in simulators and future real environments. These indicators are principally based on driver physical and driving performance skills. The fusion of several indicators, proposed in the literature, is evaluated using a neural network and a stochastic optimization method to obtain the best combination. We propose a new method for ground-truth generation based on a supervised Karolinska Sleepiness Scale (KSS). An extensive evaluation of indicators, derived from trials over a third generation simulator with several test subjects during different driving sessions, was performed. The main conclusions about the performance of single indicators and the best combinations of them are included, as well as the future works derived from this study. PMID:24412904

  12. Fusion of optimized indicators from Advanced Driver Assistance Systems (ADAS) for driver drowsiness detection.

    PubMed

    Daza, Iván García; Bergasa, Luis Miguel; Bronte, Sebastián; Yebes, Jose Javier; Almazán, Javier; Arroyo, Roberto

    2014-01-09

    This paper presents a non-intrusive approach for monitoring driver drowsiness using the fusion of several optimized indicators based on driver physical and driving performance measures, obtained from ADAS (Advanced Driver Assistant Systems) in simulated conditions. The paper is focused on real-time drowsiness detection technology rather than on long-term sleep/awake regulation prediction technology. We have developed our own vision system in order to obtain robust and optimized driver indicators able to be used in simulators and future real environments. These indicators are principally based on driver physical and driving performance skills. The fusion of several indicators, proposed in the literature, is evaluated using a neural network and a stochastic optimization method to obtain the best combination. We propose a new method for ground-truth generation based on a supervised Karolinska Sleepiness Scale (KSS). An extensive evaluation of indicators, derived from trials over a third generation simulator with several test subjects during different driving sessions, was performed. The main conclusions about the performance of single indicators and the best combinations of them are included, as well as the future works derived from this study.

  13. Improvement of Abnormality Detection System for Bathers Using Ultrasonic Sensors

    NASA Astrophysics Data System (ADS)

    Dobashi, Hiroki; Tajima, Takuya; Abe, Takehiko; Nambo, Hidetaka; Kimura, Haruhiko

    This paper proposes a new method for improving an existing abnormality detection system for person who soaks in a bathtub. As the number of aged people increases year by year in Japan, bathing accident of the aged is growing at a rapid rate, especially in-bathtub drowning accident. Therefore, prompt detection of bather's abnormality such as dizziness and fainting is important to prevent in-bathtub drowning. In order to detect bather's abnormality promptly, an abnormality detection system using seven ultrasonic sensors has been proposed. The system uses the following two methods: posture detection and behavior detection, to detect bather's different state from normal before an accident occurs, and improves a delay of detection considered to be a serious problem heretofore. There was however plenty of room for improvement. In order to improve detection rate of the system, we propose a new detection method in this paper. The method uses two ultrasonic sensors to beam bather's head and neck, and detects the head height and swing speed of the head. Experimental results are superior to the accuracy of the existing system, which enables us to detect bather's abnormality more accurately.

  14. Assessment of permeation quality of concrete through mercury intrusion porosimetry

    SciTech Connect

    Kumar, Rakesh; Bhattacharjee, B

    2004-02-01

    Permeation quality of laboratory cast concrete beams was determined through initial surface absorption test (ISAT). The pore system characteristics of the same concrete beam specimens were determined through mercury intrusion porosimetry (MIP). Data so obtained on the measured initial surface absorption rate of water by concrete and characteristics of pore system of concrete estimated from porosimetry results were used to develop correlations between them. Through these correlations, potential of MIP in assessing the durability quality of concrete in actual structure is demonstrated.

  15. Early Forest Fire Detection Using Radio-Acoustic Sounding System

    PubMed Central

    Sahin, Yasar Guneri; Ince, Turker

    2009-01-01

    Automated early fire detection systems have recently received a significant amount of attention due to their importance in protecting the global environment. Some emergent technologies such as ground-based, satellite-based remote sensing and distributed sensor networks systems have been used to detect forest fires in the early stages. In this study, a radio-acoustic sounding system with fine space and time resolution capabilities for continuous monitoring and early detection of forest fires is proposed. Simulations show that remote thermal mapping of a particular forest region by the proposed system could be a potential solution to the problem of early detection of forest fires. PMID:22573967

  16. Intrusion-Tolerant Location Information Services in Intelligent Vehicular Networks

    NASA Astrophysics Data System (ADS)

    Yan, Gongjun; Yang, Weiming; Shaner, Earl F.; Rawat, Danda B.

    Intelligent Vehicular Networks, known as Vehicle-to-Vehicle and Vehicle-to-Roadside wireless communications (also called Vehicular Ad hoc Networks), are revolutionizing our daily driving with better safety and more infortainment. Most, if not all, applications will depend on accurate location information. Thus, it is of importance to provide intrusion-tolerant location information services. In this paper, we describe an adaptive algorithm that detects and filters the false location information injected by intruders. Given a noisy environment of mobile vehicles, the algorithm estimates the high resolution location of a vehicle by refining low resolution location input. We also investigate results of simulations and evaluate the quality of the intrusion-tolerant location service.

  17. Intelligent Signal Processing for Detection System Optimization

    SciTech Connect

    Fu, C Y; Petrich, L I; Daley, P F; Burnham, A K

    2004-12-05

    A wavelet-neural network signal processing method has demonstrated approximately tenfold improvement over traditional signal-processing methods for the detection limit of various nitrogen and phosphorus compounds from the output of a thermionic detector attached to a gas chromatograph. A blind test was conducted to validate the lower detection limit. All fourteen of the compound spikes were detected when above the estimated threshold, including all three within a factor of two above the threshold. In addition, two of six spikes were detected at levels of 1/2 the concentration of the nominal threshold. Another two of the six would have been detected correctly if we had allowed human intervention to examine the processed data. One apparent false positive in five nulls was traced to a solvent impurity, whose presence was subsequently identified by analyzing a solvent aliquot evaporated to 1% residual volume, while the other four nulls were properly classified. We view this signal processing method as broadly applicable in analytical chemistry, and we advocate that advanced signal processing methods should be applied as directly as possible to the raw detector output so that less discriminating preprocessing and post-processing does not throw away valuable signal.

  18. Self-report may underestimate trauma intrusions.

    PubMed

    Takarangi, Melanie K T; Strange, Deryn; Lindsay, D Stephen

    2014-07-01

    Research examining maladaptive responses to trauma routinely relies on spontaneous self-report to index intrusive thoughts, which assumes people accurately recognize and report their intrusive thoughts. However, "mind-wandering" research reveals people are not always meta-aware of their thought content: they often fail to notice shifts in their attention. In two experiments, we exposed subjects to trauma films, then instructed them to report intrusive thoughts during an unrelated reading task. Intermittently, we asked whether they were thinking about the trauma. As expected, subjects often spontaneously reported intrusive thoughts. However, they were also "caught" engaging in unreported trauma-oriented thoughts. The presence and frequency of intermittent probes did not influence self-caught intrusions. Both self-caught and probe-caught intrusions were related to an existing tendency toward intrusive cognition, film-related distress, and thought suppression attempts. Our data suggest people may lack meta-awareness of trauma-related thoughts, which has implications for theory, research and treatment relating to trauma-related psychopathology. PMID:24993526

  19. Detection system ensures positive alarm activation in digital message loss

    NASA Technical Reports Server (NTRS)

    Bokros, P.; Burstein, A.; Hewitt, E. D.

    1966-01-01

    Lost Word Detection System /LOWDS/ provides special identification for each error detection message transmitted from receiver to transmitter. The message is identified as an original message or an n-times retransmitted message so the receiver can detect where a retransmission request was not fulfilled and activate an alarm.

  20. New Non-Intrusive Inspection Technologies for Nuclear Security and Nonproliferation

    NASA Astrophysics Data System (ADS)

    Ledoux, Robert J.

    2015-10-01

    Comprehensive monitoring of the supply chain for nuclear materials has historically been hampered by non-intrusive inspection systems that have such large false alarm rates that they are impractical in the flow of commerce. Passport Systems, Inc. (Passport) has developed an active interrogation system which detects fissionable material, high Z material, and other contraband in land, sea and air cargo. Passport's design utilizes several detection modalities including high resolution imaging, passive radiation detection, effective-Z (EZ-3D™) anomaly detection, Prompt Neutrons from Photofission (PNPF), and Nuclear Resonance Fluorescence (NRF) isotopic identification. These technologies combine to: detect fissionable, high-Z, radioactive and contraband materials, differentiate fissionable materials from high-Z shielding materials, and isotopically identify actinides, Special Nuclear Materials (SNM), and other contraband (e.g. explosives, drugs, nerve agents). Passport's system generates a 3-D image of the scanned object which contains information such as effective-Z and density, as well as a 2-D image and isotopic and fissionable information for regions of interest.