Sample records for simulated threat detection

  1. Vibrational spectroscopy standoff detection of threat chemicals

    NASA Astrophysics Data System (ADS)

    Ortiz-Rivera, William; Pacheco-Londoño, Leonardo C.; Castro-Suarez, John R.; Felix-Rivera, Hilsamar; Hernandez-Rivera, Samuel P.

    2011-06-01

    Spectroscopy based standoff detection systems: Raman and FTIR have been tested for detection of threat chemicals, including highly energetic materials, homemade explosives, explosives formulations and high explosives mixtures. Other threat chemicals studied included toxic industrial compounds (TIC) and chemical agent simulants. Microorganisms and biological threat agent simulants have also been detected at standoff distances. Open Path FTIR has been used to detect vapors and chemicals deposited on metal surfaces at μg/cm2 levels at distances as far as 30 m in active mode and 60 m in passive mode. In the case of Raman telescope, standoff distances for acetonitrile and ammonium nitrate were 140 m.

  2. MCNP Simulation Benchmarks for a Portable Inspection System for Narcotics, Explosives, and Nuclear Material Detection

    NASA Astrophysics Data System (ADS)

    Alfonso, Krystal; Elsalim, Mashal; King, Michael; Strellis, Dan; Gozani, Tsahi

    2013-04-01

    MCNPX simulations have been used to guide the development of a portable inspection system for narcotics, explosives, and special nuclear material (SNM) detection. The system seeks to address these threats to national security by utilizing a high-yield, compact neutron source to actively interrogate the threats and produce characteristic signatures that can then be detected by radiation detectors. The portability of the system enables rapid deployment and proximity to threats concealed in small spaces. Both dD and dT electronic neutron generators (ENG) were used to interrogate ammonium nitrate fuel oil (ANFO) and cocaine hydrochloride, and the detector response of NaI, CsI, and LaBr3 were compared. The effect of tungsten shielding on the neutron flux in the gamma ray detectors was investigated, while carbon, beryllium, and polyethylene ENG moderator materials were optimized by determining the reaction rate density in the threats. In order to benchmark the modeling results, experimental measurements are compared with MCNPX simulations. In addition, the efficiency and die-away time of a portable differential die-away analysis (DDAA) detector using 3He proportional counters for SNM detection has been determined.

  3. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  4. Effects of Night Work, Sleep Loss and Time on Task on Simulated Threat Detection Performance

    PubMed Central

    Basner, Mathias; Rubinstein, Joshua; Fomberstein, Kenneth M.; Coble, Matthew C.; Ecker, Adrian; Avinash, Deepa; Dinges, David F.

    2008-01-01

    Study Objectives: To investigate the effects of night work and sleep loss on a simulated luggage screening task (SLST) that mimicked the x-ray system used by airport luggage screeners. Design: We developed more than 5,800 unique simulated x-ray images of luggage organized into 31 stimulus sets of 200 bags each. 25% of each set contained either a gun or a knife with low or high target difficulty. The 200-bag stimuli sets were then run on software that simulates an x-ray screening system (SLST). Signal detection analysis was used to obtain measures of hit rate (HR), false alarm rate (FAR), threat detection accuracy (A′), and response bias (B″D). Setting: Experimental laboratory study Participants: 24 healthy nonprofessional volunteers (13 women, mean age ± SD = 29.9 ± 6.5 years). Interventions: Subjects performed the SLST every 2 h during a 5-day period that included a 35 h period of wakefulness that extended to night work and then another day work period after the night without sleep. Results: Threat detection accuracy A′ decreased significantly (P < 0.001) while FAR increased significantly (P < 0.001) during night work, while both A′ (P = 0.001) and HR decreased (P = 0.008) during day work following sleep loss. There were prominent time-on-task effects on response bias B″D (P = 0.002) and response latency (P = 0.004), but accuracy A′ was unaffected. Both HR and FAR increased significantly with increasing study duration (both P < 0.001), while response latency decreased significantly (P < 0.001). Conclusions: This study provides the first systematic evidence that night work and sleep loss adversely affect the accuracy of detecting complex real world objects among high levels of background clutter. If the results can be replicated in professional screeners and real work environments, fatigue in luggage screening personnel may pose a threat for air traffic safety unless countermeasures for fatigue are deployed. Citation: Basner M; Rubinstein J; Fomberstein KM; Coble MC; Avinash D; Dinges DF. Effects of Night Work, Sleep Loss and Time on Task on Simulated Threat Detection Performance. SLEEP 2008;31(9):1251-1259. PMID:18788650

  5. SNM-DAT: Simulation of a heterogeneous network for nuclear border security

    NASA Astrophysics Data System (ADS)

    Nemzek, R.; Kenyon, G.; Koehler, A.; Lee, D. M.; Priedhorsky, W.; Raby, E. Y.

    2007-08-01

    We approach the problem of detecting Special Nuclear Material (SNM) smuggling across open borders by modeling a heterogeneous sensor network using an agent-based simulation. Our simulation SNM Data Analysis Tool (SNM-DAT) combines fixed seismic, metal, and radiation detectors with a mobile gamma spectrometer. Decision making within the simulation determines threat levels by combined signatures. The spectrometer is a limited-availability asset, and is only deployed for substantial threats. "Crossers" can be benign or carrying shielded SNM. Signatures and sensors are physics based, allowing us to model realistic sensor networks. The heterogeneous network provides great gains in detection efficiency compared to a radiation-only system. We can improve the simulation through better sensor and terrain models, additional signatures, and crossers that mimic actual trans-border traffic. We expect further gains in our ability to design sensor networks as we learn the emergent properties of heterogeneous detection, and potential adversary responses.

  6. Integrated development of light armored vehicles based on wargaming simulators

    NASA Astrophysics Data System (ADS)

    Palmarini, Marc; Rapanotti, John

    2004-08-01

    Vehicles are evolving into vehicle networks through improved sensors, computers and communications. Unless carefully planned, these complex systems can result in excessive crew workload and difficulty in optimizing the use of the vehicle. To overcome these problems, a war-gaming simulator is being developed as a common platform to integrate contributions from three different groups. The simulator, OneSAF, is used to integrate simplified models of technology and natural phenomena from scientists and engineers with tactics and doctrine from the military and analyzed in detail by operations analysts. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. Vehicle survivability can be improved as well with better sensors, computers and countermeasures to detect and avoid or destroy threats. To improve threat detection and reliability, Defensive Aids Suite (DAS) designs are based on three complementary sensor technologies including: acoustics, visible and infrared optics and radar. Both active armour and softkill countermeasures are considered. In a typical scenario, a search radar, providing continuous hemispherical coverage, detects and classifies the threat and cues a tracking radar. Data from the tracking radar is processed and an explosive grenade is launched to destroy or deflect the threat. The angle of attack and velocity from the search radar can be used by the soft-kill system to carry out an infrared search and track or an illuminated range-gated scan for the threat platform. Upon detection, obscuration, countermanoeuvres and counterfire can be used against the threat. The sensor suite is completed by acoustic detection of muzzle blast and shock waves. Automation and networking at the platoon level contribute to improved vehicle survivability. Sensor data fusion is essential in avoiding catastrophic failure of the DAS. The modular DAS components can be used with Light Armoured Vehicle (LAV) variants including: armoured personnel carriers and direct-fire support vehicles. OneSAF will be used to assess the performance of these DAS-equipped vehicles on a virtual battlefield.

  7. Design and validation of inert homemade explosive simulants for X-ray-based inspection systems

    NASA Astrophysics Data System (ADS)

    Faust, Anthony A.; Nacson, Sabatino; Koffler, Bruce; Bourbeau, Éric; Gagne, Louis; Laing, Robin; Anderson, C. J.

    2014-05-01

    Transport Canada (TC), the Canadian Armed Forces, and other public security agencies have an interest in the assessment of the potential utility of advanced explosives detection technologies to aid in the detection and interdiction of commercial grade, military grade, and homemade or improvised explosives (HME or IE). The availability of suitable, non-hazardous, non-toxic, explosive simulants is of concern when assessing the potential utility of such detection systems. Lack of simulants limits the training opportunities, and ultimately the detection probability, of security personnel using these systems. While simulants for commercial and military grade explosives are available for a wide variety of detection technologies, the design and production of materials to simulate improvised explosives has not kept pace with this emerging threat. Funded by TC and the Canadian Safety and Security Program, Defence Research and Development Canada (DRDC), Visiontec Systems, and Optosecurity engaged in an effort to develop inert, non-toxic Xray interrogation simulants for IE materials such as ammonium nitrate, potassium chlorate, and triacetone triperoxide. These simulants were designed to mimic key X-ray interrogation-relevant material properties of real improvised explosives, principally their bulk density and effective atomic number. Different forms of the simulants were produced and tested, simulating the different explosive threat formulations that could be encountered by front line security workers. These simulants comply with safety and stability requirements, and as best as possible match form and homogeneity. This paper outlines the research program, simulant design, and validation.

  8. Motion-based threat detection using microrods: experiments and numerical simulations.

    PubMed

    Ezhilan, Barath; Gao, Wei; Pei, Allen; Rozen, Isaac; Dong, Renfeng; Jurado-Sanchez, Beatriz; Wang, Joseph; Saintillan, David

    2015-05-07

    Motion-based chemical sensing using microscale particles has attracted considerable recent attention. In this paper, we report on new experiments and Brownian dynamics simulations that cast light on the dynamics of both passive and active microrods (gold wires and gold-platinum micromotors) in a silver ion gradient. We demonstrate that such microrods can be used for threat detection in the form of a silver ion source, allowing for the determination of both the location of the source and concentration of silver. This threat detection strategy relies on the diffusiophoretic motion of both passive and active microrods in the ionic gradient and on the speed acceleration of the Au-Pt micromotors in the presence of silver ions. A Langevin model describing the microrod dynamics and accounting for all of these effects is presented, and key model parameters are extracted from the experimental data, thereby providing a reliable estimate for the full spatiotemporal distribution of the silver ions in the vicinity of the source.

  9. Coupled multi-group neutron photon transport for the simulation of high-resolution gamma-ray spectroscopy applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burns, Kimberly A.

    2009-08-01

    The accurate and efficient simulation of coupled neutron-photon problems is necessary for several important radiation detection applications. Examples include the detection of nuclear threats concealed in cargo containers and prompt gamma neutron activation analysis for nondestructive determination of elemental composition of unknown samples.

  10. Effects of night work, sleep loss and time on task on simulated threat detection performance.

    PubMed

    Basner, Mathias; Rubinstein, Joshua; Fomberstein, Kenneth M; Coble, Matthew C; Ecker, Adrian; Avinash, Deepa; Dinges, David F

    2008-09-01

    To investigate the effects of night work and sleep loss on a simulated luggage screening task (SLST) that mimicked the x-ray system used by airport luggage screeners. We developed more than 5,800 unique simulated x-ray images of luggage organized into 31 stimulus sets of 200 bags each. 25% of each set contained either a gun or a knife with low or high target difficulty. The 200-bag stimuli sets were then run on software that simulates an x-ray screening system (SLST). Signal detection analysis was used to obtain measures of hit rate (HR), false alarm rate (FAR), threat detection accuracy (A'), and response bias (B"(D)). Experimental laboratory study 24 healthy nonprofessional volunteers (13 women, mean age +/- SD = 29.9 +/- 6.5 years). Subjects performed the SLST every 2 h during a 5-day period that included a 35 h period of wakefulness that extended to night work and then another day work period after the night without sleep. Threat detection accuracy A' decreased significantly (P < 0.001) while FAR increased significantly (P < 0.001) during night work, while both A' (P = 0.001) and HR decreased (P = 0.008) during day work following sleep loss. There were prominent time-on-task effects on response bias B"(D) (P= 0.002) and response latency (P = 0.004), but accuracy A' was unaffected. Both HR and FAR increased significantly with increasing study duration (both P < 0.001), while response latency decreased significantly (P <0.001). This study provides the first systematic evidence that night work and sleep loss adversely affect the accuracy of detecting complex real world objects among high levels of background clutter. If the results can be replicated in professional screeners and real work environments, fatigue in luggage screening personnel may pose a threat for air traffic safety unless countermeasures for fatigue are deployed.

  11. Automated Weight-Window Generation for Threat Detection Applications Using ADVANTG

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mosher, Scott W; Miller, Thomas Martin; Evans, Thomas M

    2009-01-01

    Deterministic transport codes have been used for some time to generate weight-window parameters that can improve the efficiency of Monte Carlo simulations. As the use of this hybrid computational technique is becoming more widespread, the scope of applications in which it is being applied is expanding. An active source of new applications is the field of homeland security--particularly the detection of nuclear material threats. For these problems, automated hybrid methods offer an efficient alternative to trial-and-error variance reduction techniques (e.g., geometry splitting or the stochastic weight window generator). The ADVANTG code has been developed to automate the generation of weight-windowmore » parameters for MCNP using the Consistent Adjoint Driven Importance Sampling method and employs the TORT or Denovo 3-D discrete ordinates codes to generate importance maps. In this paper, we describe the application of ADVANTG to a set of threat-detection simulations. We present numerical results for an 'active-interrogation' problem in which a standard cargo container is irradiated by a deuterium-tritium fusion neutron generator. We also present results for two passive detection problems in which a cargo container holding a shielded neutron or gamma source is placed near a portal monitor. For the passive detection problems, ADVANTG obtains an O(10{sup 4}) speedup and, for a detailed gamma spectrum tally, an average O(10{sup 2}) speedup relative to implicit-capture-only simulations, including the deterministic calculation time. For the active-interrogation problem, an O(10{sup 4}) speedup is obtained when compared to a simulation with angular source biasing and crude geometry splitting.« less

  12. The Application of Neutron Transport Green's Functions to Threat Scenario Simulation

    NASA Astrophysics Data System (ADS)

    Thoreson, Gregory G.; Schneider, Erich A.; Armstrong, Hirotatsu; van der Hoeven, Christopher A.

    2015-02-01

    Radiation detectors provide deterrence and defense against nuclear smuggling attempts by scanning vehicles, ships, and pedestrians for radioactive material. Understanding detector performance is crucial to developing novel technologies, architectures, and alarm algorithms. Detection can be modeled through radiation transport simulations; however, modeling a spanning set of threat scenarios over the full transport phase-space is computationally challenging. Previous research has demonstrated Green's functions can simulate photon detector signals by decomposing the scenario space into independently simulated submodels. This paper presents decomposition methods for neutron and time-dependent transport. As a result, neutron detector signals produced from full forward transport simulations can be efficiently reconstructed by sequential application of submodel response functions.

  13. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    NASA Technical Reports Server (NTRS)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  14. Evaluation of appropriate sensor specifications for space based ballistic missile detection

    NASA Astrophysics Data System (ADS)

    Schweitzer, Caroline; Stein, Karin; Wendelstein, Norbert

    2012-10-01

    The detection and tracking of ballistic missiles (BMs) during launch or cloud break using satellite based electro-optical (EO) sensors is a promising possibility for pre-instructing early warning and fire control radars. However, the successful detection of a BM is depending on the applied infrared (IR)-channel, as emission and reflection of threat and background vary in different spectral (IR-) bands and for different observation scenarios. In addition, the spatial resolution of the satellite based system also conditions the signal-to-clutter-ratio (SCR) and therefore the predictability of the flight path. Generally available satellite images provide data in spectral bands, which are suitable for remote sensing applications and earth surface observations. However, in the fields of BM early warning, these bands are not of interest making the simulation of background data essential. The paper focuses on the analysis of IR-bands suitable for missile detection by trading off the suppression of background signature against threat signal strength. This comprises a radiometric overview of the background radiation in different spectral bands for different climates and seasons as well as for various cloud types and covers. A brief investigation of the BM signature and its trajectory within a threat scenario is presented. Moreover, the influence on the SCR caused by different observation scenarios and varying spatial resolution are pointed out. The paper also introduces the software used for simulating natural background spectral radiance images, MATISSE ("Advanced Modeling of the Earth for Environment and Scenes Simulation") by ONERA [1].

  15. Realistic computer network simulation for network intrusion detection dataset generation

    NASA Astrophysics Data System (ADS)

    Payer, Garrett

    2015-05-01

    The KDD-99 Cup dataset is dead. While it can continue to be used as a toy example, the age of this dataset makes it all but useless for intrusion detection research and data mining. Many of the attacks used within the dataset are obsolete and do not reflect the features important for intrusion detection in today's networks. Creating a new dataset encompassing a large cross section of the attacks found on the Internet today could be useful, but would eventually fall to the same problem as the KDD-99 Cup; its usefulness would diminish after a period of time. To continue research into intrusion detection, the generation of new datasets needs to be as dynamic and as quick as the attacker. Simply examining existing network traffic and using domain experts such as intrusion analysts to label traffic is inefficient, expensive, and not scalable. The only viable methodology is simulation using technologies including virtualization, attack-toolsets such as Metasploit and Armitage, and sophisticated emulation of threat and user behavior. Simulating actual user behavior and network intrusion events dynamically not only allows researchers to vary scenarios quickly, but enables online testing of intrusion detection mechanisms by interacting with data as it is generated. As new threat behaviors are identified, they can be added to the simulation to make quicker determinations as to the effectiveness of existing and ongoing network intrusion technology, methodology and models.

  16. Change-based threat detection in urban environments with a forward-looking camera

    NASA Astrophysics Data System (ADS)

    Morton, Kenneth, Jr.; Ratto, Christopher; Malof, Jordan; Gunter, Michael; Collins, Leslie; Torrione, Peter

    2012-06-01

    Roadside explosive threats continue to pose a significant risk to soldiers and civilians in conflict areas around the world. These objects are easy to manufacture and procure, but due to their ad hoc nature, they are difficult to reliably detect using standard sensing technologies. Although large roadside explosive hazards may be difficult to conceal in rural environments, urban settings provide a much more complicated background where seemingly innocuous objects (e.g., piles of trash, roadside debris) may be used to obscure threats. Since direct detection of all innocuous objects would flag too many objects to be of use, techniques must be employed to reduce the number of alarms generated and highlight only a limited subset of possibly threatening regions for the user. In this work, change detection techniques are used to reduce false alarm rates and increase detection capabilities for possible threat identification in urban environments. The proposed model leverages data from multiple video streams collected over the same regions by first applying video aligning and then using various distance metrics to detect changes based on image keypoints in the video streams. Data collected at an urban warfare simulation range at an Eastern US test site was used to evaluate the proposed approach, and significant reductions in false alarm rates compared to simpler techniques are illustrated.

  17. Modeling peripheral vision for moving target search and detection.

    PubMed

    Yang, Ji Hyun; Huston, Jesse; Day, Michael; Balogh, Imre

    2012-06-01

    Most target search and detection models focus on foveal vision. In reality, peripheral vision plays a significant role, especially in detecting moving objects. There were 23 subjects who participated in experiments simulating target detection tasks in urban and rural environments while their gaze parameters were tracked. Button responses associated with foveal object and peripheral object (PO) detection and recognition were recorded. In an urban scenario, pedestrians appearing in the periphery holding guns were threats and pedestrians with empty hands were non-threats. In a rural scenario, non-U.S. unmanned aerial vehicles (UAVs) were considered threats and U.S. UAVs non-threats. On average, subjects missed detecting 2.48 POs among 50 POs in the urban scenario and 5.39 POs in the rural scenario. Both saccade reaction time and button reaction time can be predicted by peripheral angle and entrance speed of POs. Fast moving objects were detected faster than slower objects and POs appearing at wider angles took longer to detect than those closer to the gaze center. A second-order mixed-effect model was applied to provide each subject's prediction model for peripheral target detection performance as a function of eccentricity angle and speed. About half the subjects used active search patterns while the other half used passive search patterns. An interactive 3-D visualization tool was developed to provide a representation of macro-scale head and gaze movement in the search and target detection task. An experimentally validated stochastic model of peripheral vision in realistic target detection scenarios was developed.

  18. An RFI Detection Algorithm for Microwave Radiometers Using Sparse Component Analysis

    NASA Technical Reports Server (NTRS)

    Mohammed-Tano, Priscilla N.; Korde-Patel, Asmita; Gholian, Armen; Piepmeier, Jeffrey R.; Schoenwald, Adam; Bradley, Damon

    2017-01-01

    Radio Frequency Interference (RFI) is a threat to passive microwave measurements and if undetected, can corrupt science retrievals. The sparse component analysis (SCA) for blind source separation has been investigated to detect RFI in microwave radiometer data. Various techniques using SCA have been simulated to determine detection performance with continuous wave (CW) RFI.

  19. Detection of person borne IEDs using multiple cooperative sensors

    NASA Astrophysics Data System (ADS)

    MacIntosh, Scott; Deming, Ross; Hansen, Thorkild; Kishan, Neel; Tang, Ling; Shea, Jing; Lang, Stephen

    2011-06-01

    The use of multiple cooperative sensors for the detection of person borne IEDs is investigated. The purpose of the effort is to evaluate the performance benefits of adding multiple sensor data streams into an aided threat detection algorithm, and a quantitative analysis of which sensor data combinations improve overall detection performance. Testing includes both mannequins and human subjects with simulated suicide bomb devices of various configurations, materials, sizes and metal content. Aided threat recognition algorithms are being developed to test detection performance of individual sensors against combined fused sensors inputs. Sensors investigated include active and passive millimeter wave imaging systems, passive infrared, 3-D profiling sensors and acoustic imaging. The paper describes the experimental set-up and outlines the methodology behind a decision fusion algorithm-based on the concept of a "body model".

  20. Design and Analysis of Cost-Efficient Sensor Deployment for Tracking Small UAS with Agent-Based Modeling.

    PubMed

    Shin, Sangmi; Park, Seongha; Kim, Yongho; Matson, Eric T

    2016-04-22

    Recently, commercial unmanned aerial systems (UAS) have gained popularity. However, these UAS are potential threats to people in terms of safety in public places, such as public parks or stadiums. To reduce such threats, we consider a design, modeling, and evaluation of a cost-efficient sensor system that detects and tracks small UAS. In this research, we focus on discovering the best sensor deployments by simulating different types and numbers of sensors in a designated area, which provide reasonable detection rates at low costs. Also, the system should cover the crowded areas more thoroughly than vacant areas to reduce direct threats to people underneath. This research study utilized the Agent-Based Modeling (ABM) technique to model a system consisting of independent and heterogeneous agents that interact with each other. Our previous work presented the ability to apply ABM to analyze the sensor configurations with two types of radars in terms of cost-efficiency. The results from the ABM simulation provide a list of candidate configurations and deployments that can be referred to for applications in the real world environment.

  1. Design and Analysis of Cost-Efficient Sensor Deployment for Tracking Small UAS with Agent-Based Modeling

    PubMed Central

    Shin, Sangmi; Park, Seongha; Kim, Yongho; Matson, Eric T.

    2016-01-01

    Recently, commercial unmanned aerial systems (UAS) have gained popularity. However, these UAS are potential threats to people in terms of safety in public places, such as public parks or stadiums. To reduce such threats, we consider a design, modeling, and evaluation of a cost-efficient sensor system that detects and tracks small UAS. In this research, we focus on discovering the best sensor deployments by simulating different types and numbers of sensors in a designated area, which provide reasonable detection rates at low costs. Also, the system should cover the crowded areas more thoroughly than vacant areas to reduce direct threats to people underneath. This research study utilized the Agent-Based Modeling (ABM) technique to model a system consisting of independent and heterogeneous agents that interact with each other. Our previous work presented the ability to apply ABM to analyze the sensor configurations with two types of radars in terms of cost-efficiency. The results from the ABM simulation provide a list of candidate configurations and deployments that can be referred to for applications in the real world environment. PMID:27110790

  2. Experimental Evidence of Threat-Sensitive Collective Avoidance Responses in a Large Wild-Caught Herring School

    PubMed Central

    Rieucau, Guillaume; Boswell, Kevin M.; De Robertis, Alex; Macaulay, Gavin J.; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60 000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the “threat-sensitive hypothesis”. PMID:24489778

  3. Simulating Operation of a Complex Sensor Network

    NASA Technical Reports Server (NTRS)

    Jennings, Esther; Clare, Loren; Woo, Simon

    2008-01-01

    Simulation Tool for ASCTA Microsensor Network Architecture (STAMiNA) ["ASCTA" denotes the Advanced Sensors Collaborative Technology Alliance.] is a computer program for evaluating conceptual sensor networks deployed over terrain to provide military situational awareness. This or a similar program is needed because of the complexity of interactions among such diverse phenomena as sensing and communication portions of a network, deployment of sensor nodes, effects of terrain, data-fusion algorithms, and threat characteristics. STAMiNA is built upon a commercial network-simulator engine, with extensions to include both sensing and communication models in a discrete-event simulation environment. Users can define (1) a mission environment, including terrain features; (2) objects to be sensed; (3) placements and modalities of sensors, abilities of sensors to sense objects of various types, and sensor false alarm rates; (4) trajectories of threatening objects; (5) means of dissemination and fusion of data; and (6) various network configurations. By use of STAMiNA, one can simulate detection of targets through sensing, dissemination of information by various wireless communication subsystems under various scenarios, and fusion of information, incorporating such metrics as target-detection probabilities, false-alarm rates, and communication loads, and capturing effects of terrain and threat.

  4. Familiarity promotes the blurring of self and other in the neural representation of threat

    PubMed Central

    Beckes, Lane; Hasselmo, Karen

    2013-01-01

    Neurobiological investigations of empathy often support an embodied simulation account. Using functional magnetic resonance imaging (fMRI), we monitored statistical associations between brain activations indicating self-focused threat to those indicating threats to a familiar friend or an unfamiliar stranger. Results in regions such as the anterior insula, putamen and supramarginal gyrus indicate that self-focused threat activations are robustly correlated with friend-focused threat activations but not stranger-focused threat activations. These results suggest that one of the defining features of human social bonding may be increasing levels of overlap between neural representations of self and other. This article presents a novel and important methodological approach to fMRI empathy studies, which informs how differences in brain activation can be detected in such studies and how covariate approaches can provide novel and important information regarding the brain and empathy. PMID:22563005

  5. Feasibility Study On Missile Launch Detection And Trajectory Tracking

    DTIC Science & Technology

    2016-09-01

    Vehicles ( UAVs ) in military operations, their role in a missile defense operation is not well defined. The simulation program discussed in this thesis ...targeting information to an attacking UAV to reliably intercept the missile. B . FURTHER STUDIES The simulation program can be enhanced to improve the...intercept the threat. This thesis explores the challenges in creating a simulation program to process video footage from an unstable platform and the

  6. The Safety Analysis of Shipborne Ammunition in Fire Environment

    NASA Astrophysics Data System (ADS)

    Ren, Junpeng; Wang, Xudong; Yue, Pengfei

    2017-12-01

    The safety of Ammunition has always been the focus of national military science and technology issues. And fire is one of the major safety threats to the ship’s ammunition storage environment, In this paper, Mk-82 shipborne aviation bomb has been taken as the study object, simulated the whole process of fire by using the FDS (Fire Detection System) software. According to the simulation results of FDS, ANSYS software was used to simulate the temperature field of Mk-82 carrier-based aviation bomb under fire environment, and the safety of aviation bomb in fire environment was analyzed. The result shows that the aviation bombs under the fire environment can occur the combustion or explosion after 70s constant cook-off, and it was a huge threat to the ship security.

  7. Vehicle-network defensive aids suite

    NASA Astrophysics Data System (ADS)

    Rapanotti, John

    2005-05-01

    Defensive Aids Suites (DAS) developed for vehicles can be extended to the vehicle network level. The vehicle network, typically comprising four platoon vehicles, will benefit from improved communications and automation based on low latency response to threats from a flexible, dynamic, self-healing network environment. Improved DAS performance and reliability relies on four complementary sensor technologies including: acoustics, visible and infrared optics, laser detection and radar. Long-range passive threat detection and avoidance is based on dual-purpose optics, primarily designed for manoeuvring, targeting and surveillance, combined with dazzling, obscuration and countermanoeuvres. Short-range active armour is based on search and track radar and intercepting grenades to defeat the threat. Acoustic threat detection increases the overall robustness of the DAS and extends the detection range to include small calibers. Finally, detection of active targeting systems is carried out with laser and radar warning receivers. Synthetic scene generation will provide the integrated environment needed to investigate, develop and validate these new capabilities. Computer generated imagery, based on validated models and an acceptable set of benchmark vignettes, can be used to investigate and develop fieldable sensors driven by real-time algorithms and countermeasure strategies. The synthetic scene environment will be suitable for sensor and countermeasure development in hardware-in-the-loop simulation. The research effort focuses on two key technical areas: a) computing aspects of the synthetic scene generation and b) and development of adapted models and databases. OneSAF is being developed for research and development, in addition to the original requirement of Simulation and Modelling for Acquisition, Rehearsal, Requirements and Training (SMARRT), and is becoming useful as a means for transferring technology to other users, researchers and contractors. This procedure eliminates the need to construct ad hoc models and databases. The vehicle network can be modelled phenomenologically until more information is available. These concepts and approach will be discussed in the paper.

  8. Surface-enhanced Raman as a water monitor for warfare agents

    NASA Astrophysics Data System (ADS)

    Spencer, Kevin M.; Sylvia, James M.; Clauson, Susan L.; Janni, James A.

    2002-02-01

    The threat of chemical warfare agents being released upon civilian and military personnel continues to escalate. One aspect of chemical preparedness is to analyze and protect the portable water supply for the military. Chemical nerve, blister, and choking agents, as well as biological threats must all be analyzed and low limits of detection must be verified. For chemical agents, this generally means detection down to the low ppb levels. Surface-Enhanced Raman Spectroscopy (SERS) is a spectroscopic technique that can detect trace levels of contaminants directly in the aqueous environment. In this paper, results are presented on the use of SERS to detect chemical and biological agent simulants with an end goal of creating a Joint Service Agent Water Monitor. Detection of cyanide, 2-chloroethyl ethyl sulfide, phosphonates, Gram-positive and Gram-negative bacteria using SERS has been performed and is discussed herein. Aspects of transferring laboratory results to an unattended field instrument are also discussed.

  9. Detecting and Quantifying Mind Wandering during Simulated Driving

    DOT National Transportation Integrated Search

    2017-08-08

    Mind wandering is a pervasive threat to transportation safety, potentially accounting for a substantial number of crashes and fatalities. In the current study, mind wandering was induced through completion of the same task for 5 days, consisting of a...

  10. Thermal bioaerosol cloud tracking with Bayesian classification

    NASA Astrophysics Data System (ADS)

    Smith, Christian W.; Dupuis, Julia R.; Schundler, Elizabeth C.; Marinelli, William J.

    2017-05-01

    The development of a wide area, bioaerosol early warning capability employing existing uncooled thermal imaging systems used for persistent perimeter surveillance is discussed. The capability exploits thermal imagers with other available data streams including meteorological data and employs a recursive Bayesian classifier to detect, track, and classify observed thermal objects with attributes consistent with a bioaerosol plume. Target detection is achieved based on similarity to a phenomenological model which predicts the scene-dependent thermal signature of bioaerosol plumes. Change detection in thermal sensor data is combined with local meteorological data to locate targets with the appropriate thermal characteristics. Target motion is tracked utilizing a Kalman filter and nearly constant velocity motion model for cloud state estimation. Track management is performed using a logic-based upkeep system, and data association is accomplished using a combinatorial optimization technique. Bioaerosol threat classification is determined using a recursive Bayesian classifier to quantify the threat probability of each tracked object. The classifier can accept additional inputs from visible imagers, acoustic sensors, and point biological sensors to improve classification confidence. This capability was successfully demonstrated for bioaerosol simulant releases during field testing at Dugway Proving Grounds. Standoff detection at a range of 700m was achieved for as little as 500g of anthrax simulant. Developmental test results will be reviewed for a range of simulant releases, and future development and transition plans for the bioaerosol early warning platform will be discussed.

  11. Impact of three task demand factors on simulated unmanned system intelligence, surveillance, and reconnaissance operations.

    PubMed

    Abich, Julian; Reinerman-Jones, Lauren; Matthews, Gerald

    2017-06-01

    The present study investigated how three task demand factors influenced performance, subjective workload and stress of novice intelligence, surveillance, and reconnaissance operators within a simulation of an unmanned ground vehicle. Manipulations were task type, dual-tasking and event rate. Participants were required to discriminate human targets within a street scene from a direct video feed (threat detection [TD] task) and detect changes in symbols presented in a map display (change detection [CD] task). Dual-tasking elevated workload and distress, and impaired performance for both tasks. However, with increasing event rate, CD task deteriorated, but TD improved. Thus, standard workload models provide a better guide to evaluating the demands of abstract symbols than to processing realistic human characters. Assessment of stress and workload may be especially important in the design and evaluation of systems in which human character critical signals must be detected in video images. Practitioner Summary: This experiment assessed subjective workload and stress during threat and CD tasks performed alone and in combination. Results indicated an increase in event rate led to significant improvements in performance during TD, but decrements during CD, yet both had associated increases in workload and engagement.

  12. Swarm Counter-Asymmetric-Threat (CAT) 6-DOF Dynamics Simulation

    DTIC Science & Technology

    2005-07-01

    NAWCWD TP 8593 Swarm Counter-Asymmetric-Threat ( CAT ) 6-DOF Dynamics Simulation by James Bobinchak Weapons and Energetics...mathematical models used in the swarm counter- asymmetric-threat ( CAT ) simulation and the results of extensive Monte Carlo simulations. The swarm CAT ...Asymmetric-Threat ( CAT ) 6-DOF Dynamics Simulation (U) 6. AUTHOR(S) James Bobinchak and Gary Hewer 7. PERFORMING ORGANIZATION NAME(S) AND

  13. Critical Infrastructure Protection and Resilience Literature Survey: Modeling and Simulation

    DTIC Science & Technology

    2014-11-01

    2013 Page 34 of 63 Below the yellow set is a purple cluster bringing together detection , anomaly , intrusion, sensors, monitoring and alerting (early...hazards and threats to security56 Water ADWICE, PSS®SINCAL ADWICE for real-time anomaly detection in water management systems57 One tool that...Systems. Cybernetics and Information Technologies. 2008;8(4):57-68. 57. Raciti M, Cucurull J, Nadjm-Tehrani S. Anomaly detection in water management

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Laughlin, Gary L.

    The International, Homeland, and Nuclear Security (IHNS) Program Management Unit (PMU) oversees a broad portfolio of Sandia’s programs in areas ranging from global nuclear security to critical asset protection. We use science and technology, innovative research, and global engagement to counter threats, reduce dangers, and respond to disasters. The PMU draws on the skills of scientists and engineers from across Sandia. Our programs focus on protecting US government installations, safeguarding nuclear weapons and materials, facilitating nonproliferation activities, securing infrastructures, countering chemical and biological dangers, and reducing the risk of terrorist threats. We conduct research in risk and threat analysis, monitoringmore » and detection, decontamination and recovery, and situational awareness. We develop technologies for verifying arms control agreements, neutralizing dangerous materials, detecting intruders, and strengthening resiliency. Our programs use Sandia’s High-Performance Computing resources for predictive modeling and simulation of interdependent systems, for modeling dynamic threats and forecasting adaptive behavior, and for enabling decision support and processing large cyber data streams. In this report, we highlight four advanced computation projects that illustrate the breadth of the IHNS mission space.« less

  15. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  16. Selecting Power-Efficient Signal Features for a Low-Power Fall Detector.

    PubMed

    Wang, Changhong; Redmond, Stephen J; Lu, Wei; Stevens, Michael C; Lord, Stephen R; Lovell, Nigel H

    2017-11-01

    Falls are a serious threat to the health of older people. A wearable fall detector can automatically detect the occurrence of a fall and alert a caregiver or an emergency response service so they may deliver immediate assistance, improving the chances of recovering from fall-related injuries. One constraint of such a wearable technology is its limited battery life. Thus, minimization of power consumption is an important design concern, all the while maintaining satisfactory accuracy of the fall detection algorithms implemented on the wearable device. This paper proposes an approach for selecting power-efficient signal features such that the minimum desirable fall detection accuracy is assured. Using data collected in simulated falls, simulated activities of daily living, and real free-living trials, all using young volunteers, the proposed approach selects four features from a set of ten commonly used features, providing a power saving of 75.3%, while limiting the error rate of a binary classification decision tree fall detection algorithm to 7.1%.Falls are a serious threat to the health of older people. A wearable fall detector can automatically detect the occurrence of a fall and alert a caregiver or an emergency response service so they may deliver immediate assistance, improving the chances of recovering from fall-related injuries. One constraint of such a wearable technology is its limited battery life. Thus, minimization of power consumption is an important design concern, all the while maintaining satisfactory accuracy of the fall detection algorithms implemented on the wearable device. This paper proposes an approach for selecting power-efficient signal features such that the minimum desirable fall detection accuracy is assured. Using data collected in simulated falls, simulated activities of daily living, and real free-living trials, all using young volunteers, the proposed approach selects four features from a set of ten commonly used features, providing a power saving of 75.3%, while limiting the error rate of a binary classification decision tree fall detection algorithm to 7.1%.

  17. Method for detecting and avoiding flight hazards

    NASA Astrophysics Data System (ADS)

    von Viebahn, Harro; Schiefele, Jens

    1997-06-01

    Today's aircraft equipment comprise several independent warning and hazard avoidance systems like GPWS, TCAS or weather radar. It is the pilot's task to monitor all these systems and take the appropriate action in case of an emerging hazardous situation. The developed method for detecting and avoiding flight hazards combines all potential external threats for an aircraft into a single system. It is based on an aircraft surrounding airspace model consisting of discrete volume elements. For each element of the volume the threat probability is derived or computed from sensor output, databases, or information provided via datalink. The position of the own aircraft is predicted by utilizing a probability distribution. This approach ensures that all potential positions of the aircraft within the near future are considered while weighting the most likely flight path. A conflict detection algorithm initiates an alarm in case the threat probability exceeds a threshold. An escape manoeuvre is generated taking into account all potential hazards in the vicinity, not only the one which caused the alarm. The pilot gets a visual information about the type, the locating, and severeness o the threat. The algorithm was implemented and tested in a flight simulator environment. The current version comprises traffic, terrain and obstacle hazards avoidance functions. Its general formulation allows an easy integration of e.g. weather information or airspace restrictions.

  18. Probabilistic information transmission in a network of coupled oscillators reveals speed-accuracy trade-off in responding to threats

    PubMed Central

    Chicoli, Amanda; Paley, Derek A.

    2016-01-01

    Individuals in a group may obtain information from other group members about the environment, including the location of a food source or the presence of a predator. Here, we model how information spreads in a group using a susceptible-infected-removed epidemic model. We apply this model to a simulated shoal of fish using the motion dynamics of a coupled oscillator model, in order to test the biological hypothesis that polarized or aligned shoaling leads to faster and more accurate escape responses. The contributions of this study are the (i) application of a probabilistic model of epidemics to the study of collective animal behavior; (ii) testing the biological hypothesis that group cohesion improves predator escape; (iii) quantification of the effect of social cues on startle propagation; and (iv) investigation of the variation in response based on network connectivity. We find that when perfectly aligned individuals in a group are startled, there is a rapid escape by individuals that directly detect the threat, as well as by individuals responding to their neighbors. However, individuals that are not startled do not head away from the threat. In startled groups that are randomly oriented, there is a rapid, accurate response by individuals that directly detect the threat, followed by less accurate responses by individuals responding to neighbor cues. Over the simulation duration, however, even unstartled individuals head away from the threat. This study illustrates a potential speed-accuracy trade-off in the startle response of animal groups, in agreement with several previous experimental studies. Additionally, the model can be applied to a variety of group decision-making processes, including those involving higher-dimensional motion. PMID:27907996

  19. Probabilistic information transmission in a network of coupled oscillators reveals speed-accuracy trade-off in responding to threats

    NASA Astrophysics Data System (ADS)

    Chicoli, Amanda; Paley, Derek A.

    2016-11-01

    Individuals in a group may obtain information from other group members about the environment, including the location of a food source or the presence of a predator. Here, we model how information spreads in a group using a susceptible-infected-removed epidemic model. We apply this model to a simulated shoal of fish using the motion dynamics of a coupled oscillator model, in order to test the biological hypothesis that polarized or aligned shoaling leads to faster and more accurate escape responses. The contributions of this study are the (i) application of a probabilistic model of epidemics to the study of collective animal behavior; (ii) testing the biological hypothesis that group cohesion improves predator escape; (iii) quantification of the effect of social cues on startle propagation; and (iv) investigation of the variation in response based on network connectivity. We find that when perfectly aligned individuals in a group are startled, there is a rapid escape by individuals that directly detect the threat, as well as by individuals responding to their neighbors. However, individuals that are not startled do not head away from the threat. In startled groups that are randomly oriented, there is a rapid, accurate response by individuals that directly detect the threat, followed by less accurate responses by individuals responding to neighbor cues. Over the simulation duration, however, even unstartled individuals head away from the threat. This study illustrates a potential speed-accuracy trade-off in the startle response of animal groups, in agreement with several previous experimental studies. Additionally, the model can be applied to a variety of group decision-making processes, including those involving higher-dimensional motion.

  20. Probabilistic information transmission in a network of coupled oscillators reveals speed-accuracy trade-off in responding to threats.

    PubMed

    Chicoli, Amanda; Paley, Derek A

    2016-11-01

    Individuals in a group may obtain information from other group members about the environment, including the location of a food source or the presence of a predator. Here, we model how information spreads in a group using a susceptible-infected-removed epidemic model. We apply this model to a simulated shoal of fish using the motion dynamics of a coupled oscillator model, in order to test the biological hypothesis that polarized or aligned shoaling leads to faster and more accurate escape responses. The contributions of this study are the (i) application of a probabilistic model of epidemics to the study of collective animal behavior; (ii) testing the biological hypothesis that group cohesion improves predator escape; (iii) quantification of the effect of social cues on startle propagation; and (iv) investigation of the variation in response based on network connectivity. We find that when perfectly aligned individuals in a group are startled, there is a rapid escape by individuals that directly detect the threat, as well as by individuals responding to their neighbors. However, individuals that are not startled do not head away from the threat. In startled groups that are randomly oriented, there is a rapid, accurate response by individuals that directly detect the threat, followed by less accurate responses by individuals responding to neighbor cues. Over the simulation duration, however, even unstartled individuals head away from the threat. This study illustrates a potential speed-accuracy trade-off in the startle response of animal groups, in agreement with several previous experimental studies. Additionally, the model can be applied to a variety of group decision-making processes, including those involving higher-dimensional motion.

  1. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Bio-threat microparticle simulants

    DOEpatents

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  3. Asynchronous threat awareness by observer trials using crowd simulation

    NASA Astrophysics Data System (ADS)

    Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter

    2016-10-01

    The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.

  4. Real time wide area radiation surveillance system (REWARD) based on 3d silicon and (CD,ZN)Te for neutron and gamma-ray detection

    NASA Astrophysics Data System (ADS)

    Disch, C.

    2014-09-01

    Mobile surveillance systems are used to find lost radioactive sources and possible nuclear threats in urban areas. The REWARD collaboration [1] aims to develop such a complete radiation monitoring system that can be installed in mobile or stationary setups across a wide area. The scenarios include nuclear terrorism threats, lost radioactive sources, radioactive contamination and nuclear accidents. This paper will show the performance capabilities of the REWARD system in different scnarios. The results include both Monte Carlo simulations as well as neutron and gamma-ray detection performances in terms of efficiency and nuclide identification. The outcomes of several radiation mapping survey with the entire REWARD system will also be presented.

  5. A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCann, Roy; Al-Sarray, Muthanna

    Studying cybersecurity events and analyzing their impacts encourage planners and operators to develop innovative approaches for preventing attacks in order to avoid outages and other disruptions. This work considers two parts in security studies; detecting an integrity attack and examining its effects on power system generators. The detection was conducted through employing synchrophasor technology to provide authentication of ACG commands based on observed system operating characteristics. The examination of an attack is completed via a detailed simulation of a modified IEEE 68-bus benchmark model to show the associated power system dynamic response. The results of the simulation are discussed formore » assessing the impacts of cyber threats.« less

  6. Tactile cueing effects on performance in simulated aerial combat with high acceleration.

    PubMed

    van Erp, Jan B F; Eriksson, Lars; Levin, Britta; Carlander, Otto; Veltman, J A; Vos, Wouter K

    2007-12-01

    Recent evidence indicates that vibrotactile displays can potentially reduce the risk of sensory and cognitive overload. Before these displays can be introduced in super agile aircraft, it must be ascertained that vibratory stimuli can be sensed and interpreted by pilots subjected to high G loads. Each of 9 pilots intercepted 32 targets in the Swedish Dynamic Flight Simulator. Targets were indicated on simulated standard Gripen visual displays. In addition, in half of the trials target direction was also displayed on a 60-element tactile torso display. Performance measures and subjective ratings were recorded. Each pilot pulled G peaks above +8 Gz. With tactile cueing present, mean reaction time was reduced from 1458 ms (SE = 54) to 1245 ms (SE = 88). Mean total chase time for targets that popped up behind the pilot's aircraft was reduced from 13 s (SE = 0.45) to 12 s (SE = 0.41). Pilots rated the tactile display favorably over the visual displays at target pop-up on the easiness of detecting a threat presence and on the clarity of initial position of the threats. This study is the first to show that tactile display information is perceivable and useful in hypergravity (up to +9 Gz). The results show that the tactile display can capture attention at threat pop-up and improve threat awareness for threats in the back, even in the presence of high-end visual displays. It is expected that the added value of tactile displays may further increase after formal training and in situations of unexpected target pop-up.

  7. I Spy with My Little Eye: Jurors' Detection of Internal Validity Threats in Expert Evidence

    PubMed Central

    McAuliff, Bradley D.; Duckworth, Tejah D.

    2010-01-01

    This experiment examined whether jury-eligible community members (N = 223) were able to detect internally invalid psychological science presented at trial. Participants read a simulated child sexual abuse case in which the defense expert described a study he had conducted on witness memory and suggestibility. We varied the study's internal validity (valid, missing control group, confound, and experimenter bias) and publication status (published, unpublished). Expert evidence quality ratings were higher for the valid versus missing control group version only. Publication increased ratings of defendant guilt when the study was missing a control group. Variations in internal validity did not influence perceptions of child victim credibility or police interview quality. Participants' limited detection of internal validity threats underscores the need to examine the effectiveness of traditional legal safeguards against junk science in court and improve the scientific reasoning ability of lay people and legal professionals. PMID:20162342

  8. The threat simulation theory of the evolutionary function of dreaming: Evidence from dreams of traumatized children.

    PubMed

    Valli, Katja; Revonsuo, Antti; Pälkäs, Outi; Ismail, Kamaran Hassan; Ali, Karzan Jalal; Punamäki, Raija-Leena

    2005-03-01

    The threat simulation theory of dreaming (TST) () states that dream consciousness is essentially an ancient biological defence mechanism, evolutionarily selected for its capacity to repeatedly simulate threatening events. Threat simulation during dreaming rehearses the cognitive mechanisms required for efficient threat perception and threat avoidance, leading to increased probability of reproductive success during human evolution. One hypothesis drawn from TST is that real threatening events encountered by the individual during wakefulness should lead to an increased activation of the system, a threat simulation response, and therefore, to an increased frequency and severity of threatening events in dreams. Consequently, children who live in an environment in which their physical and psychological well-being is constantly threatened should have a highly activated dream production and threat simulation system, whereas children living in a safe environment that is relatively free of such threat cues should have a weakly activated system. We tested this hypothesis by analysing the content of dream reports from severely traumatized and less traumatized Kurdish children and ordinary, non-traumatized Finnish children. Our results give support for most of the predictions drawn from TST. The severely traumatized children reported a significantly greater number of dreams and their dreams included a higher number of threatening dream events. The dream threats of traumatized children were also more severe in nature than the threats of less traumatized or non-traumatized children.

  9. Design, Development, and Innovation of an Interactive Multimedia Training Simulator for Responding to Air Transportation Bomb Threats

    NASA Technical Reports Server (NTRS)

    Chung, Christopher A.; Marwaha, Shweta

    2005-01-01

    This paper describes an interactive multimedia simulator for air transportation bomb threat training. The objective of this project is to improve the air transportation sector s capability to respond to bomb threats received by commercial airports and aircraft. The simulator provides realistic training on receiving and responding to a variety of bomb threats that might not otherwise be possible due to time, cost, or operational constraints. Validation analysis indicates that the use of the simulator resulted in statistically significant increases in individual ability to respond to these types of bomb threats.

  10. When and Why Threats Go Undetected: Impacts of Event Rate and Shift Length on Threat Detection Accuracy During Airport Baggage Screening.

    PubMed

    Meuter, Renata F I; Lacherez, Philippe F

    2016-03-01

    We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety. © 2015, Human Factors and Ergonomics Society.

  11. Rapid and label-free screening and identification of Anthrax simulants by Surface Enhanced Raman Spectroscopy

    NASA Astrophysics Data System (ADS)

    Lai, Antonia; Almaviva, Salvatore; Spizzichino, Valeria; Palucci, Antonio; Addari, Lorella; Luciani, Domenico; Mengali, Sandro; Marquette, Christophe; Berthuy, Ophélie; Jankiewicz, Bartlomiej; Pierno, Luigi

    2014-10-01

    In the framework of RAMBO (Rapid-Air Monitoring particle against biological threats) project of the European Defense Agency (EDA), the feasibility of an unattended Surface Enhanced Raman Spectroscopy (SERS) sensor for biological threats detection was investigated. Its main goal concern Bacillus anthrax detection, both as vegetative cells and endospores. However since such bacteria are classified in Risk Group 3 (very dangerous microorganism), Bacillus thuringiensis and Bacillus atrophaeus were used as simulants. In order to bind selectively the target bacilli, Phages properly selected were immobilized on an active commercially available SERS substrate (functionalization). The Phages are a type of virus that infect selectively, by means of receptors, specific bacteria. Moreover they can resist on water or air environments without losing their binding capabilities. The sensing surface was characterized by standard micro-Raman equipments to assess the background Raman features. The Raman measurements have been carried out from 10X to 100X of magnification to differentiate between average and local features. Moreover the fast response was acquired by limiting the measure time at less than 1 minute. Samples of vegetative cells and endospores of Bacilli were randomly dispersed on the functionalized SERS substrates. The results obtained are promising: samples with and without bacilli could be distinguished one from the other. This is a step toward the use of SERS as an effective and fast technique for early warning of biological threats.

  12. Detection of chemical agent aerosols

    NASA Astrophysics Data System (ADS)

    Fox, Jay A.; Ahl, Jeffrey L.; D'Amico, Francis M.; Vanderbeek, Richard G.; Moon, Raphael; Swim, Cynthia R.

    1999-05-01

    One of the major threats presented by a chemical agent attack is that of a munition exploding overhead and 'raining' aerosols which can contaminate surfaces when they impact. Since contact with these surfaces can be fatal, it is imperative to know when such an attack has taken place and the likely threat density and location. We present the results of an experiment designed to show the utility of a CO2 lidar in detecting such an attack. Testing occurred at Dugway Proving Grounds, Utah and involved the simulation of an explosive airburst chemical attack. Explosions occurred at a height of 30 m and liquid droplets from two chemicals, PEG-200 (polyethylene glycol 200) and TEP (triethylphosphate), were expelled and fell to the ground. The munition was the U.S. Army M9 Simulator, Projectile, Airburst, Liquid (SPAL) system that is designed for chemical warfare training exercises. The instrument that was used to detect the presence of the aerosols was the Laser Standoff Chemical Detector (LSCD) which is a light detection and ranging (LIDAR) system that utilizes a rapidly tunable, pulsed CO2 laser. The LIDAR scanned a horizontal path approximately 5 - 8 m above the ground in order to measure the concentration of liquid deposition. The LIDAR data were later correlated with card data to determine how well the system could predict the location and quantity of liquid deposition on the ground.

  13. Threat radar system simulations

    NASA Astrophysics Data System (ADS)

    Miller, L.

    The capabilities, requirements, and goals of radar emitter simulators are discussed. Simulators are used to evaluate competing receiver designs, to quantify the performance envelope of a radar system, and to model the characteristics of a transmitted signal waveform. A database of candidate threat systems is developed and, in concert with intelligence data on a given weapons system, permits upgrading simulators to new projected threat capabilities. Four currently available simulation techniques are summarized, noting the usefulness of developing modular software for fast controlled-cost upgrades of simulation capabilities.

  14. Detection of dim targets in multiple environments

    NASA Astrophysics Data System (ADS)

    Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.

    2013-10-01

    The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.

  15. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

    PubMed

    Li, Yuancheng; Qiu, Rixuan; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy.

  16. Simulation of an enhanced TCAS 2 system in operation

    NASA Technical Reports Server (NTRS)

    Rojas, R. G.; Law, P.; Burnside, W. D.

    1987-01-01

    Described is a computer simulation of a Boeing 737 aircraft equipped with an enhanced Traffic and Collision Avoidance System (TCAS II). In particular, an algorithm is developed which permits the computer simulation of the tracking of a target airplane by a Boeing 373 which has a TCAS II array mounted on top of its fuselage. This algorithm has four main components: namely, the target path, the noise source, the alpha-beta filter, and threat detection. The implementation of each of these four components is described. Furthermore, the areas where the present algorithm needs to be improved are also mentioned.

  17. Micromotors to capture and destroy anthrax simulant spores.

    PubMed

    Orozco, Jahir; Pan, Guoqing; Sattayasamitsathit, Sirilak; Galarnyk, Michael; Wang, Joseph

    2015-03-07

    Towards addressing the need for detecting and eliminating biothreats, we describe a micromotor-based approach for screening, capturing, isolating and destroying anthrax simulant spores in a simple and rapid manner with minimal sample processing. The B. globilli antibody-functionalized micromotors can recognize, capture and transport B. globigii spores in environmental matrices, while showing non-interactions with excess of non-target bacteria. Efficient destruction of the anthrax simulant spores is demonstrated via the micromotor-induced mixing of a mild oxidizing solution. The new micromotor-based approach paves a way to dynamic multifunctional systems that rapidly recognize, isolate, capture and destroy biological threats.

  18. Scatter in Cargo Radiography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erin A. Miller; Joseph A. Caggiano; Robert C. Runkle

    As a complement to passive detection systems, radiographic inspection of cargo is an increasingly important tool for homeland security because it has the potential to detect highly attenuating objects associated with special nuclear material or surrounding shielding, in addition to screening for items such as drugs or contraband. Radiographic detection of such threat objects relies on high image contrast between regions of different density and atomic number (Z). Threat detection is affected by scatter of the interrogating beamin the cargo, the radiographic system itself, and the surrounding environment, which degrades image contrast. Here, we estimate the extent to which scattermore » plays a role in radiographic imaging of cargo containers. Stochastic transport simulations were performed to determine the details of the radiography equipment and surrounding environment, which are important in reproducing measured data and to investigate scatter magnitudes for typical cargo. We find that scatter plays a stronger role in cargo radiography than in typicalmedical imaging scenarios, even for low-density cargo, with scatter-toprimary ratios ranging from 0.14 for very low density cargo, to between 0.20 and 0.40 for typical cargo, and higher yet for dense cargo.« less

  19. Isolating Neural Components of Threat Bias in Pediatric Anxiety

    ERIC Educational Resources Information Center

    Britton, Jennifer C.; Bar-Haim, Yair; Carver, Frederick W.; Holroyd, Tom; Norcross, Maxine A.; Detloff, Allison; Leibenluft, Ellen; Ernst, Monique; Pine, Daniel S.

    2012-01-01

    Background: Attention biases toward threat are often detected in individuals with anxiety disorders. Threat biases can be measured experimentally through dot-probe paradigms, in which individuals detect a probe following a stimulus pair including a threat. On these tasks, individuals with anxiety tend to detect probes that occur in a location…

  20. Small threat and contraband detection with TNA-based systems.

    PubMed

    Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T

    2005-01-01

    The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.

  1. From Anxious to Reckless: A Control Systems Approach Unifies Prefrontal-Limbic Regulation Across the Spectrum of Threat Detection.

    PubMed

    Mujica-Parodi, Lilianne R; Cha, Jiook; Gao, Jonathan

    2017-01-01

    Here we provide an integrative review of basic control circuits, and introduce techniques by which their regulation can be quantitatively measured using human neuroimaging. We illustrate the utility of the control systems approach using four human neuroimaging threat detection studies ( N = 226), to which we applied circuit-wide analyses in order to identify the key mechanism underlying individual variation. In so doing, we build upon the canonical prefrontal-limbic control system to integrate circuit-wide influence from the inferior frontal gyrus (IFG). These were incorporated into a computational control systems model constrained by neuroanatomy and designed to replicate our experimental data. In this model, the IFG acts as an informational set point, gating signals between the primary prefrontal-limbic negative feedback loop and its cortical information-gathering loop. Along the cortical route, if the sensory cortex provides sufficient information to make a threat assessment, the signal passes to the ventromedial prefrontal cortex (vmPFC), whose threat-detection threshold subsequently modulates amygdala outputs. However, if signal outputs from the sensory cortex do not provide sufficient information during the first pass, the signal loops back to the sensory cortex, with each cycle providing increasingly fine-grained processing of sensory data. Simulations replicate IFG (chaotic) dynamics experimentally observed at both ends at the threat-detection spectrum. As such, they identify distinct types of IFG disconnection from the circuit, with associated clinical outcomes. If IFG thresholds are too high, the IFG and sensory cortex cycle for too long; in the meantime the coarse-grained (excitatory) pathway will dominate, biasing ambiguous stimuli as false positives. On the other hand, if cortical IFG thresholds are too low, the inhibitory pathway will suppress the amygdala without cycling back to the sensory cortex for much-needed fine-grained sensory cortical data, biasing ambiguous stimuli as false negatives. Thus, the control systems model provides a consistent mechanism for IFG regulation, capable of producing results consistent with our data for the full spectrum of threat-detection: from fearful to optimal to reckless. More generally, it illustrates how quantitative characterization of circuit dynamics can be used to unify a fundamental dimension across psychiatric affective symptoms, with implications for populations that range from anxiety disorders to addiction.

  2. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid

    PubMed Central

    Li, Yuancheng; Jing, Sitong

    2018-01-01

    Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can’t satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence Extreme Learning Machine (OS-ELM) is established, which is used to detecting the attack in AMI and carrying out the comparative analysis with other algorithms. Simulation results show that, compared with other intrusion detection methods, intrusion detection method based on OS-ELM is more superior in detection speed and accuracy. PMID:29485990

  3. Detection of Anomalous Insiders in Collaborative Environments via Relational Analysis of Access Logs

    PubMed Central

    Chen, You; Malin, Bradley

    2014-01-01

    Collaborative information systems (CIS) are deployed within a diverse array of environments, ranging from the Internet to intelligence agencies to healthcare. It is increasingly the case that such systems are applied to manage sensitive information, making them targets for malicious insiders. While sophisticated security mechanisms have been developed to detect insider threats in various file systems, they are neither designed to model nor to monitor collaborative environments in which users function in dynamic teams with complex behavior. In this paper, we introduce a community-based anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on information recorded in the access logs of collaborative environments. CADS is based on the observation that typical users tend to form community structures, such that users with low a nity to such communities are indicative of anomalous and potentially illicit behavior. The model consists of two primary components: relational pattern extraction and anomaly detection. For relational pattern extraction, CADS infers community structures from CIS access logs, and subsequently derives communities, which serve as the CADS pattern core. CADS then uses a formal statistical model to measure the deviation of users from the inferred communities to predict which users are anomalies. To empirically evaluate the threat detection model, we perform an analysis with six months of access logs from a real electronic health record system in a large medical center, as well as a publicly-available dataset for replication purposes. The results illustrate that CADS can distinguish simulated anomalous users in the context of real user behavior with a high degree of certainty and with significant performance gains in comparison to several competing anomaly detection models. PMID:25485309

  4. An improvement in rollover detection of articulated vehicles using the grey system theory

    NASA Astrophysics Data System (ADS)

    Chou, Tao; Chu, Tzyy-Wen

    2014-05-01

    A Rollover Index combined with the grey system theory, called a Grey Rollover Index (GRI), is proposed to assess the rollover threat for articulated vehicles with a tractor-semitrailer combination. This index can predict future trends of vehicle dynamics based on current vehicle motion; thus, it is suitable for vehicle-rollover detection. Two difficulties are encountered when applying the GRI for rollover detection. The first difficulty is effectively predicting the rollover threat of the vehicles, and the second difficulty is achieving a definite definition of the real rollover timing of a vehicle. The following methods are used to resolve these problems. First, a nonlinear mathematical model is constructed to accurately describe the vehicle dynamics of articulated vehicles. This model is combined with the GRI to predict rollover propensity. Finally, TruckSim™ software is used to determine the real rollover timing and facilitate the accurate supply of information to the rollover detection system through the GRI. This index is used to verify the simulation based on the common manoeuvres that cause rollover accidents to reduce the occurrence of false signals and effectively increase the efficiency of the rollover detection system.

  5. Towards detection of pipeline integrity threats using a smart fiber optic surveillance system: PIT-STOP project blind field test results

    NASA Astrophysics Data System (ADS)

    Tejedor, J.; Macias-Guarasa, J.; Martins, H. F.; Piote, D.; Pastor-Graells, J.; Martin-Lopez, S.; Corredera, P.; De Pauw, G.; De Smet, F.; Postvoll, W.; Ahlen, C. H.; Gonzalez-Herraez, M.

    2017-04-01

    This paper presents the first report on on-line and final blind field test results of a pipeline integrity threat surveillance system. The system integrates a machine+activity identification mode, and a threat detection mode. Two different pipeline sections were selected for the blind tests: One close to the sensor position, and the other 35 km away from it. Results of the machine+activity identification mode showed that about 46% of the times the machine, the activity or both were correctly identified. For the threat detection mode, 8 out of 10 threats were correctly detected, with 1 false alarm.

  6. Response of the REWARD detection system to the presence of a Radiological Dispersal Device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luis, R.; Baptista, M.; Barros, S.

    2015-07-01

    In recent years an increased international concern has emerged about the radiological and nuclear (RN) threats associated with the illicit trafficking of nuclear and radioactive materials that could be potentially used for terrorist attacks. The objective of the REWARD (Real Time Wide Area Radiation Surveillance System) project, co-funded by the European Union 7. Framework Programme Security, consisted in building a mobile system for real time, wide area radiation surveillance, using a CdZnTe detector for gamma radiation and a neutron detector based on novel silicon technologies. The sensing unit includes a GPS system and a wireless communication interface to send themore » data remotely to a monitoring base station, where it will be analyzed in real time and correlated with historical data from the tag location, in order to generate an alarm when an abnormal situation is detected. Due to its portability and accuracy, the system will be extremely useful in many different scenarios such as nuclear terrorism, lost radioactive sources, radioactive contamination or nuclear accidents. This paper shortly introduces the REWARD detection system, depicts some terrorist threat scenarios involving radioactive sources and special nuclear materials and summarizes the simulation work undertaken during the past three years in the framework of the REWARD project. The main objective consisted in making predictions regarding the behavior of the REWARD system in the presence of a Radiological Dispersion Device (RDD), one of the reference scenarios foreseen for REWARD, using the Monte Carlo simulation program MCNP6. The reference scenario is characterized in detail, from the i) radiological protection, ii) radiation detection requirements and iii) communications points of view. Experimental tests were performed at the Fire Brigades Facilities in Rome and at the Naples Fire Brigades, and the results, which validate the simulation work, are presented and analyzed. The response of the REWARD detection system to the presence of an RDD is predicted and discussed. (authors)« less

  7. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  8. Investigation of a Nanowire Electronic Nose by Computer Simulation

    DTIC Science & Technology

    2009-04-14

    R. D. Mileham, and D. W. Galipeau. Gas sensing based on inelastic electron tunneling spectroscopy. IEEE Sensors Journal, 8(6):983988, 2008. [6] J...explosives in the hold of passenger aircraft . More generally they can be used to detect the presence of molecules that could be a threat to human health...design suitable for subsequent fabrication and then characterization. 15. SUBJECT TERMS EOARD, Sensor Technology, electronic

  9. Episodic foresight and anxiety: Proximate and ultimate perspectives.

    PubMed

    Miloyan, Beyon; Bulley, Adam; Suddendorf, Thomas

    2016-03-01

    In this paper, we examine the relationship between episodic foresight and anxiety from an evolutionary perspective, proposing that together they confer an advantage for modifying present moment decision-making and behaviour in the light of potential future threats to fitness. We review the body of literature on the role of episodic foresight in anxiety, from both proximate and ultimate perspectives. We propose that anxious feelings associated with episodic simulation of possible threat-related future events serve to imbue these simulations with motivational currency. Episodic and semantic details of a future threat may be insufficient for motivating its avoidance, but anxiety associated with a simulation can provoke adaptive threat management. As such, we detail how anxiety triggered by a self-generated, threat-related future simulation prepares the individual to manage that threat (in terms of its likelihood and/or consequences) over greater temporal distances than observed in other animals. We then outline how anxiety subtypes may represent specific mechanisms for predicting and managing particular classes of fitness threats. This approach offers an inroad for understanding the nature of characteristic future thinking patterns in anxiety disorders and serves to illustrate the adaptive function of the mechanism from which clinical anxiety deviates. © 2015 The British Psychological Society.

  10. Optics detection and laser countermeasures on a combat vehicle

    NASA Astrophysics Data System (ADS)

    Sjöqvist, Lars; Allard, Lars; Pettersson, Magnus; Börjesson, Per; Lindskog, Nils; Bodin, Johan; Widén, Anders; Persson, Hâkan; Fredriksson, Jan; Edström, Sten

    2016-10-01

    Magnifying optical assemblies used for weapon guidance or rifle scopes may possess a threat for a combat vehicle and its personnel. Detection and localisation of optical threats is consequently of interest in military applications. Typically a laser system is used in optics detection, or optical augmentation, to interrogate a scene of interest to localise retroreflected laser radiation. One interesting approach for implementing optics detection on a combat vehicle is to use a continuous scanning scheme. In addition, optics detection can be combined with laser countermeasures, or a laser dazzling function, to efficiently counter an optical threat. An optics detection laser sensor demonstrator has been implemented on a combat vehicle. The sensor consists of a stabilised gimbal and was integrated together with a LEMUR remote electro-optical sight. A narrow laser slit is continuously scanned around the horizon to detect and locate optical threats. Detected threats are presented for the operator within the LEMUR presentation system, and by cueing a countermeasure laser installed in the LEMUR sensor housing threats can be defeated. Results obtained during a field demonstration of the optics detection sensor and the countermeasure laser will be presented. In addition, results obtained using a dual-channel optics detection system designed for false alarm reduction are also discussed.

  11. Glider communications and controls for the sea sentry mission.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feddema, John Todd; Dohner, Jeffrey Lynn

    2005-03-01

    This report describes a system level study on the use of a swarm of sea gliders to detect, confirm and kill littoral submarine threats. The report begins with a description of the problem and derives the probability of detecting a constant speed threat without networking. It was concluded that glider motion does little to improve this probability unless the speed of a glider is greater than the speed of the threat. Therefore, before detection, the optimal character for a swarm of gliders is simply to lie in wait for the detection of a threat. The report proceeds by describing themore » effect of noise on the localization of a threat once initial detection is achieved. This noise is estimated as a function of threat location relative to the glider and is temporally reduced through the use of an information or Kalman filtering. In the next section, the swarm probability of confirming and killing a threat is formulated. Results are compared to a collection of stationary sensors. These results show that once a glider has the ability to move faster than the threat, the performance of the swarm is equal to the performance of a stationary swarm of gliders with confirmation and kill ranges equal to detection range. Moreover, at glider speeds greater than the speed of the threat, swarm performance becomes a weak function of speed. At these speeds swarm performance is dominated by detection range. Therefore, to future enhance swarm performance or to reduce the number of gliders required for a given performance, detection range must be increased. Communications latency is also examined. It was found that relatively large communication delays did little to change swarm performance. Thus gliders may come to the surface and use SATCOMS to effectively communicate in this application.« less

  12. Threat detection in desert environment with passive millimeter-wave sensor

    NASA Astrophysics Data System (ADS)

    Wilson, John P.; Schuetz, Christopher A.; Martin, Richard D.; Dillon, Thomas E.; Murakowski, Maciej; Prather, Dennis W.

    2011-06-01

    A new technique for improvised explosive device (IED) creation uses an explosive device buried in foam and covered in a layer of dirt. These devices are difficult to detect visually, however, their material characteristics make them detectable by passive millimeter-wave (pmmW) sensors. Results are presented from a test using a mock IED and an outdoor set-up consisting of two mock IEDs on a dirt background. The results show that the mock IEDs produces a millimeter-wave signature which is distinguishable from the background surrounding the mock IEDs. Simulations based on the measured data are presented and a design for a future vehicle mounted sensor is shown.

  13. Autobiographical memory sources of threats in dreams.

    PubMed

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Superior Detection of Threat-Relevant Stimuli in Infancy

    ERIC Educational Resources Information Center

    LoBue, Vanessa; DeLoache, Judy S.

    2010-01-01

    The ability to quickly detect potential threat is an important survival mechanism for humans and other animals. Past research has established that adults have an attentional bias for the detection of threat-relevant stimuli, including snakes and spiders as well as angry human faces. Recent studies have documented that preschool children also…

  15. Design and Engineering of a Multi-Target (Multiplex) DNA Simulant to Evaluate Nulceic Acid Based Assays for Detection of Biological Threat Agents

    DTIC Science & Technology

    2006-11-01

    mallei , Burkholderia pseudomallei and Variola virus (smallpox virus). A chimera of 2040 bp was engineered to produce PCR amplicons of different sizes...potential bio-warfare use have been completely sequenced, B. mallei , the etiologic agent of glanders , and B. pseudomallei, causative agent of... Burkholderia mallei Nierman et al, 2004 Burkholderia pseudomallei Holden et al, 2004 Burkholderia thailandensis

  16. Performance Assessment of Network Intrusion-Alert Prediction

    DTIC Science & Technology

    2012-09-01

    the threats. In this thesis, we use Snort to generate the intrusion detection alerts. 2. SNORT Snort is an open source network intrusion...standard for IPS. (Snort, 2012) We choose Snort because it is an open source product that is free to download and can be deployed cross-platform...Learning & prediction in relational time series: A survey. 21st Behavior Representation in Modeling & Simulation ( BRIMS ) Conference 2012, 93–100. Tan

  17. Threat detection of liquid explosives and precursors from their x-ray scattering pattern using energy dispersive detector technology

    NASA Astrophysics Data System (ADS)

    Kehres, Jan; Lyksborg, Mark; Olsen, Ulrik L.

    2017-09-01

    Energy dispersive X-ray diffraction (EDXRD) can be applied for identification of liquid threats in luggage scanning in security applications. To define the instrumental design, the framework for data reduction and analysis and test the performance of the threat detection in various scenarios, a flexible laboratory EDXRD test setup was build. A data set of overall 570 EDXRD spectra has been acquired for training and testing of threat identification algorithms. The EDXRD data was acquired with limited count statistics and at multiple detector angles and merged after correction and normalization. Initial testing of the threat detection algorithms with this data set indicate the feasibility of detection levels of > 95 % true positive with < 6 % false positive alarms.

  18. Assessment of pilot workload with the introduction of an airborne threat-alert system

    NASA Technical Reports Server (NTRS)

    Battiste, Vernol; Bortolussi, Michael R.

    1989-01-01

    Simulated line operations were used to assess the value of the TCAS on the pilot's ability to avoid a collision and to determine the effects of various display configurations and information contents on the flight-crew performance and workload. The crew flew a Phase II Link/Boeing 727 simulator in a simulated ATC environment. Four levels of collision avoidance information were evaluated using the following TCAS display formats: no TCAS information, TCAS information with no traffic display information, TCAS information with threat-activated traffic display information, and TCAS information with a full-time traffic display of threat information. It was found that the use of a threat-activated TCAS display significantly reduced the first officers' workload was significantly reduced by the threat-activated TCAS display, as were the workloads of the captain and the second officer.

  19. Optimising the neutron environment of Radiation Portal Monitors: A computational study

    NASA Astrophysics Data System (ADS)

    Gilbert, Mark R.; Ghani, Zamir; McMillan, John E.; Packer, Lee W.

    2015-09-01

    Efficient and reliable detection of radiological or nuclear threats is a crucial part of national and international efforts to prevent terrorist activities. Radiation Portal Monitors (RPMs), which are deployed worldwide, are intended to interdict smuggled fissile material by detecting emissions of neutrons and gamma rays. However, considering the range and variety of threat sources, vehicular and shielding scenarios, and that only a small signature is present, it is important that the design of the RPMs allows these signatures to be accurately differentiated from the environmental background. Using Monte-Carlo neutron-transport simulations of a model 3He detector system we have conducted a parameter study to identify the optimum combination of detector shielding, moderation, and collimation that maximises the sensitivity of neutron-sensitive RPMs. These structures, which could be simply and cost-effectively added to existing RPMs, can improve the detector response by more than a factor of two relative to an unmodified, bare design. Furthermore, optimisation of the air gap surrounding the helium tubes also improves detector efficiency.

  20. Attribute-driven transfer learning for detecting novel buried threats with ground-penetrating radar

    NASA Astrophysics Data System (ADS)

    Colwell, Kenneth A.; Collins, Leslie M.

    2016-05-01

    Ground-penetrating radar (GPR) technology is an effective method of detecting buried explosive threats. The system uses a binary classifier to distinguish "targets", or buried threats, from "nontargets" arising from system prescreener false alarms; this classifier is trained on a dataset of previously-observed buried threat types. However, the threat environment is not static, and new threat types that appear must be effectively detected even if they are not highly similar to every previously-observed type. Gathering a new dataset that includes a new threat type is expensive and time-consuming; minimizing the amount of new data required to effectively detect the new type is therefore valuable. This research aims to reduce the number of training examples needed to effectively detect new types using transfer learning, which leverages previous learning tasks to accelerate and improve new ones. Further, new types have attribute data, such as composition, components, construction, and size, which can be observed without GPR and typically are not explicitly included in the learning process. Since attribute tags for buried threats determine many aspects of their GPR representation, a new threat type's attributes can be highly relevant to the transfer-learning process. In this work, attribute data is used to drive transfer learning, both by using attributes to select relevant dataset examples for classifier fusion, and by extending a relevance vector machine (RVM) model to perform intelligent attribute clustering and selection. Classification performance results for both the attribute-only case and the low-data case are presented, using a dataset containing a variety of threat types.

  1. Potential of VIIRS Time Series Data for Aiding the USDA Forest Service Early Warning System for Forest Health Threats: A Gypsy Moth Defoliation Case Study

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; Smoot, James; Kuper, Phillip; Prados, Donald; Russell, Jeffrey; Ross, Kenton; Gasser, Gerald; Sader, Steven; McKellip, Rodney

    2007-01-01

    This report details one of three experiments performed during FY 2007 for the NASA RPC (Rapid Prototyping Capability) at Stennis Space Center. This RPC experiment assesses the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) and MODIS (Moderate Resolution Imaging Spectroradiometer) data for detecting and monitoring forest defoliation from the non-native Eurasian gypsy moth (Lymantria dispar). The intent of the RPC experiment was to assess the degree to which VIIRS data can provide forest disturbance monitoring information as an input to a forest threat EWS (Early Warning System) as compared to the level of information that can be obtained from MODIS data. The USDA Forest Service (USFS) plans to use MODIS products for generating broad-scaled, regional monitoring products as input to an EWS for forest health threat assessment. NASA SSC is helping the USFS to evaluate and integrate currently available satellite remote sensing technologies and data products for the EWS, including the use of MODIS products for regional monitoring of forest disturbance. Gypsy moth defoliation of the mid-Appalachian highland region was selected as a case study. Gypsy moth is one of eight major forest insect threats listed in the Healthy Forest Restoration Act (HFRA) of 2003; the gypsy moth threatens eastern U.S. hardwood forests, which are also a concern highlighted in the HFRA of 2003. This region was selected for the project because extensive gypsy moth defoliation occurred there over multiple years during the MODIS operational period. This RPC experiment is relevant to several nationally important mapping applications, including agricultural efficiency, coastal management, ecological forecasting, disaster management, and carbon management. In this experiment, MODIS data and VIIRS data simulated from MODIS were assessed for their ability to contribute broad, regional geospatial information on gypsy moth defoliation. Landsat and ASTER (Advanced Spaceborne Thermal Emission and Reflection Radiometer) data were used to assess the quality of gypsy moth defoliation mapping products derived from MODIS data and from simulated VIIRS data. The project focused on use of data from MODIS Terra as opposed to MODIS Aqua mainly because only MODIS Terra data was collected during 2000 and 2001-years with comparatively high amounts of gypsy moth defoliation within the study area. The project assessed the quality of VIIRS data simulation products. Hyperion data was employed to assess the quality of MODIS-based VIIRS simulation datasets using image correlation analysis techniques. The ART (Application Research Toolbox) software was used for data simulation. Correlation analysis between MODIS-simulated VIIRS data and Hyperion-simulated VIIRS data for red, NIR (near-infrared), and NDVI (Normalized Difference Vegetation Index) image data products collectively indicate that useful, effective VIIRS simulations can be produced using Hyperion and MODIS data sources. The r(exp 2) for red, NIR, and NDVI products were 0.56, 0.63, and 0.62, respectively, indicating a moderately high correlation between the 2 data sources. Temporal decorrelation from different data acquisition times and image misregistration may have lowered correlation results. The RPC experiment also generated MODIS-based time series data products using the TSPT (Time Series Product Tool) software. Time series of simulated VIIRS NDVI products were produced at approximately 400-meter resolution GSD (Ground Sampling Distance) at nadir for comparison to MODIS NDVI products at either 250- or 500-meter GSD. The project also computed MODIS (MOD02) NDMI (Normalized Difference Moisture Index) products at 500-meter GSD for comparison to NDVI-based products. For each year during 2000-2006, MODIS and VIIRS (simulated from MOD02) time series were computed during the peak gypsy moth defoliation time frame in the study area (approximately June 10 through July 27). Gypsy moth defoliation mapping products from simated VIIRS and MOD02 time series were produced using multiple methods, including image classification and change detection via image differencing. The latter enabled an automated defoliation detection product computed using percent change in maximum NDVI for a peak defoliation period during 2001 compared to maximum NDVI across the entire 2000-2006 time frame. Final gypsy moth defoliation mapping products were assessed for accuracy using randomly sampled locations found on available geospatial reference data (Landsat and ASTER data in conjunction with defoliation map data from the USFS). Extensive gypsy moth defoliation patches were evident on screen displays of multitemporal color composites derived from MODIS data and from simulated VIIRS vegetation index data. Such defoliation was particularly evident for 2001, although widespread denuded forests were also seen for 2000 and 2003. These visualizations were validated using aforementioned reference data. Defoliation patches were visible on displays of MODIS-based NDVI and NDMI data. The viewing of apparent defoliation patches on all of these products necessitated adoption of a specialized temporal data processing method (e.g., maximum NDVI during the peak defoliation time frame). The frequency of cloud cover necessitated this approach. Multitemporal simulated VIIRS and MODIS Terra data both produced effective general classifications of defoliated forest versus other land cover. For 2001, the MOD02-simulated VIIRS 400-meter NDVI classification produced a similar yet slightly lower overall accuracy (87.28 percent with 0.72 Kappa) than the MOD02 250-meter NDVI classification (88.44 percent with 0.75 Kappa). The MOD13 250-meter NDVI classification had a lower overall accuracy (79.13 percent) and a much lower Kappa (0.46). The report discusses accuracy assessment results in much more detail, comparing overall classification and individual class accuracy statistics for simulated VIIRS 400-meter NDVI, MOD02 250-meter NDVI, MOD02-500 meter NDVI, MOD13 250-meter NDVI, and MOD02 500-meter NDMI classifications. Automated defoliation detection products from simulated VIIRS and MOD02 data for 2001 also yielded similar, relatively high overall classification accuracy (85.55 percent for the VIIRS 400-meter NDVI versus 87.28 percent for the MOD02 250-meter NDVI). In contrast, the USFS aerial sketch map of gypsy moth defoliation showed a lower overall classification accuracy at 73.64 percent. The overall classification Kappa values were also similar for the VIIRS (approximately 0.67 Kappa) versus the MOD02 (approximately 0.72 Kappa) automated defoliation detection product, which were much higher than the values exhibited by the USFS sketch map product (overall Kappa of approximately 0.47). The report provides additional details on the accuracy of automated gypsy moth defoliation detection products compared with USFS sketch maps. The results suggest that VIIRS data can be effectively simulated from MODIS data and that VIIRS data will produce gypsy moth defoliation mapping products that are similar to MODIS-based products. The results of the RPC experiment indicate that VIIRS and MODIS data products have good potential for integration into the forest threat EWS. The accuracy assessment was performed only for 2001 because of time constraints and a relative scarcity of cloud-free Landsat and ASTER data for the peak defoliation period of the other years in the 2000-2006 time series. Additional work should be performed to assess the accuracy of gypsy moth defoliation detection products for additional years.The study area (mid-Appalachian highlands) and application (gypsy moth forest defoliation) are not necessarily representative of all forested regions and of all forest threat disturbance agents. Additional work should be performed on other inland and coastal regions as well as for other major forest threats.

  2. Potential of VIIRS Time Series Data for Aiding the USDA Forest Service Early Warning System for Forest Health Threats: A Gypsy Moth Defoliation Case Study

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; McKellip, Rodney

    2008-01-01

    The Healthy Forest Restoration Act of 2003 mandated that a national forest threat Early Warning System (EWS) be developed. The USFS (USDA Forest Service) is currently building this EWS. NASA is helping the USFS to integrate remotely sensed data into the EWS, including MODIS data for monitoring forest disturbance at broad regional scales. This RPC experiment assesses the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) and MODIS (Moderate Resolution Imaging Spectroradiometer) data for contribution to the EWS. In doing so, the RPC project employed multitemporal simulated VIIRS and MODIS data for detecting and monitoring forest defoliation from the non-native Eurasian gypsy moth (Lymantria despar). Gypsy moth is an invasive species threatening eastern U.S. hardwood forests. It is one of eight major forest insect threats listed in the Healthy Forest Restoration Act of 2003. This RPC experiment is relevant to several nationally important mapping applications, including carbon management, ecological forecasting, coastal management, and disaster management

  3. Polarimetry and infrared spectroscopy in the detection of low-volatility chemical threats

    NASA Astrophysics Data System (ADS)

    Petryk, Michael W. P.; Marenco, Armando J.

    2011-05-01

    The polarization modulation infrared reflection absorption spectroscopy (PMIRRAS) spectra of the nerve agents GB (O-isopropyl methylphosphonofluoridate) and GF (cyclohexyl methylphoshonofluoridate) were recorded for the first time. A comparison of these spectra with the nerve agent VX (ethyl S-2-diisopropylaminoethyl methylphosphonothiolate) and the spectra of some trialkyl phosphates indicates that it is easy to distinguish between chemical warfare agents and simulants on militarily-relevant surfaces using PMIRRAS.

  4. Exploration of Force Transition in Stability Operations Using Multi-Agent Simulation

    DTIC Science & Technology

    2006-09-01

    risk, mission failure risk, and time in the context of the operational threat environment. The Pythagoras Multi-Agent Simulation and Data Farming...NUMBER OF PAGES 173 14. SUBJECT TERMS Stability Operations, Peace Operations, Data Farming, Pythagoras , Agent- Based Model, Multi-Agent Simulation...the operational threat environment. The Pythagoras Multi-Agent Simulation and Data Farming techniques are used to investigate force-level

  5. Determining the Requisite Components of Visual Threat Detection to Improve Operational Performance

    DTIC Science & Technology

    2014-04-01

    cognitive processes, and may be enhanced by focusing training development on the principle components such as causal reasoning. The second report will...discuss the development and evaluation of a research-based training exemplar. Visual threat detection pervades many military contexts, but is also... developing computer-controlled exercises to study the primary components of visual threat detection. Similarly, civilian law enforcement officers were

  6. How to test the threat-simulation theory.

    PubMed

    Revonsuo, Antti; Valli, Katja

    2008-12-01

    Malcolm-Smith, Solms, Turnbull and Tredoux [Malcolm-Smith, S., Solms, M.,Turnbull, O., & Tredoux, C. (2008). Threat in dreams: An adaptation? Consciousness and Cognition, 17, 1281-1291.] have made an attempt to test the Threat-Simulation Theory (TST), a theory offering an evolutionary psychological explanation for the function of dreaming [Revonsuo, A. (2000a). The reinterpretation of dreams: An evolutionary hypothesis of the function of dreaming. Behavioral and Brain Sciences, 23(6), 877-901]. Malcolm-Smith et al. argue that empirical evidence from their own study as well as from some other studies in the literature does not support the main predictions of the TST: that threatening events are frequent and overrepresented in dreams, that exposure to real threats activates the threat-simulation system, and that dream threats contain realistic rehearsals of threat avoidance responses. Other studies, including our own, have come up with results and conclusions that are in conflict with those of Malcolm-Smith et al. In this commentary, we provide an analysis of the sources of these disagreements, and their implications to the TST. Much of the disagreement seems to stem from differing interpretations of the theory and, consequently, of differing methods to test it.

  7. Using Contaminant Transport Simulations to Optimize Electrical Resistivity Tomography Survey Design for Improved Contaminant Detection at Lined Ponds

    NASA Astrophysics Data System (ADS)

    Herring, T.; Pidlisecky, A.

    2015-12-01

    The saline flowback water produced during hydraulic fracturing is often stored in lined surface ponds. Leakage from these ponds poses a significant environmental threat and there is a need for a reliable and economical long term monitoring strategy. Electrical resistivity tomography (ERT), being sensitive to changes in groundwater salinity, is therefore well suited to such a problem. The goal of this work is to compare the leak detection capabilities of a surface ERT array and a downhole ERT array. In this study several plausible 3D electrical conductivity models were created that simulated a contaminant plume evolving over time, using realistic contaminant concentrations, plume geometries, water saturation profiles, and seasonal temperature profiles. The forward modeled data were used to identify the advantages and drawbacks of using each ERT array orientation.

  8. Detection of vapor-phase organophosphate threats using wearable conformable integrated epidermal and textile wireless biosensor systems.

    PubMed

    Mishra, Rupesh K; Martín, Aida; Nakagawa, Tatsuo; Barfidokht, Abbas; Lu, Xialong; Sempionatto, Juliane R; Lyu, Kay Mengjia; Karajic, Aleksandar; Musameh, Mustafa M; Kyratzis, Ilias L; Wang, Joseph

    2018-03-15

    Flexible epidermal tattoo and textile-based electrochemical biosensors have been developed for vapor-phase detection of organophosphorus (OP) nerve agents. These new wearable sensors, based on stretchable organophosphorus hydrolase (OPH) enzyme electrodes, are coupled with a fully integrated conformal flexible electronic interface that offers rapid and selective square-wave voltammetric detection of OP vapor threats and wireless data transmission to a mobile device. The epidermal tattoo and textile sensors display a good reproducibility (with RSD of 2.5% and 4.2%, respectively), along with good discrimination against potential interferences and linearity over the 90-300mg/L range, with a sensitivity of 10.7µA∙cm 3 ∙mg -1 (R 2 = 0.983) and detection limit of 12mg/L in terms of OP air density. Stress-enduring inks, used for printing the electrode transducers, ensure resilience against mechanical deformations associated with textile and skin-based on-body sensing operations. Theoretical simulations are used to estimate the OP air density over the sensor surface. These fully integrated wearable wireless tattoo and textile-based nerve-agent vapor biosensor systems offer considerable promise for rapid warning regarding personal exposure to OP nerve-agent vapors in variety of decentralized security applications. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework

    NASA Astrophysics Data System (ADS)

    Tsigkritis, Theocharis; Spanoudakis, George; Kloukinas, Christos; Lorenzoli, Davide

    The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "Cthreats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted violations, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which generate diagnostic information for violations of S&D properties and detecting threats.

  10. Forecasting Lightning Threat Using WRF Proxy Fields

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  11. The impact of uncertain threat on affective bias: Individual differences in response to ambiguity.

    PubMed

    Neta, Maital; Cantelon, Julie; Haga, Zachary; Mahoney, Caroline R; Taylor, Holly A; Davis, F Caroline

    2017-12-01

    Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Workflow in clinical trial sites & its association with near miss events for data quality: ethnographic, workflow & systems simulation.

    PubMed

    de Carvalho, Elias Cesar Araujo; Batilana, Adelia Portero; Claudino, Wederson; Reis, Luiz Fernando Lima; Schmerling, Rafael A; Shah, Jatin; Pietrobon, Ricardo

    2012-01-01

    With the exponential expansion of clinical trials conducted in (Brazil, Russia, India, and China) and VISTA (Vietnam, Indonesia, South Africa, Turkey, and Argentina) countries, corresponding gains in cost and enrolment efficiency quickly outpace the consonant metrics in traditional countries in North America and European Union. However, questions still remain regarding the quality of data being collected in these countries. We used ethnographic, mapping and computer simulation studies to identify/address areas of threat to near miss events for data quality in two cancer trial sites in Brazil. Two sites in Sao Paolo and Rio Janeiro were evaluated using ethnographic observations of workflow during subject enrolment and data collection. Emerging themes related to threats to near miss events for data quality were derived from observations. They were then transformed into workflows using UML-AD and modeled using System Dynamics. 139 tasks were observed and mapped through the ethnographic study. The UML-AD detected four major activities in the workflow evaluation of potential research subjects prior to signature of informed consent, visit to obtain subject́s informed consent, regular data collection sessions following study protocol and closure of study protocol for a given project. Field observations pointed to three major emerging themes: (a) lack of standardized process for data registration at source document, (b) multiplicity of data repositories and (c) scarcity of decision support systems at the point of research intervention. Simulation with policy model demonstrates a reduction of the rework problem. Patterns of threats to data quality at the two sites were similar to the threats reported in the literature for American sites. The clinical trial site managers need to reorganize staff workflow by using information technology more efficiently, establish new standard procedures and manage professionals to reduce near miss events and save time/cost. Clinical trial sponsors should improve relevant support systems.

  13. Workflow in Clinical Trial Sites & Its Association with Near Miss Events for Data Quality: Ethnographic, Workflow & Systems Simulation

    PubMed Central

    Araujo de Carvalho, Elias Cesar; Batilana, Adelia Portero; Claudino, Wederson; Lima Reis, Luiz Fernando; Schmerling, Rafael A.; Shah, Jatin; Pietrobon, Ricardo

    2012-01-01

    Background With the exponential expansion of clinical trials conducted in (Brazil, Russia, India, and China) and VISTA (Vietnam, Indonesia, South Africa, Turkey, and Argentina) countries, corresponding gains in cost and enrolment efficiency quickly outpace the consonant metrics in traditional countries in North America and European Union. However, questions still remain regarding the quality of data being collected in these countries. We used ethnographic, mapping and computer simulation studies to identify/address areas of threat to near miss events for data quality in two cancer trial sites in Brazil. Methodology/Principal Findings Two sites in Sao Paolo and Rio Janeiro were evaluated using ethnographic observations of workflow during subject enrolment and data collection. Emerging themes related to threats to near miss events for data quality were derived from observations. They were then transformed into workflows using UML-AD and modeled using System Dynamics. 139 tasks were observed and mapped through the ethnographic study. The UML-AD detected four major activities in the workflow evaluation of potential research subjects prior to signature of informed consent, visit to obtain subject́s informed consent, regular data collection sessions following study protocol and closure of study protocol for a given project. Field observations pointed to three major emerging themes: (a) lack of standardized process for data registration at source document, (b) multiplicity of data repositories and (c) scarcity of decision support systems at the point of research intervention. Simulation with policy model demonstrates a reduction of the rework problem. Conclusions/Significance Patterns of threats to data quality at the two sites were similar to the threats reported in the literature for American sites. The clinical trial site managers need to reorganize staff workflow by using information technology more efficiently, establish new standard procedures and manage professionals to reduce near miss events and save time/cost. Clinical trial sponsors should improve relevant support systems. PMID:22768105

  14. IMPROVED TECHNNOLOGY TO PREVENT ILLICIT TRAFFICKING IN NUCLEAR MATERIALS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Richardson, J H

    2005-07-20

    The proliferation of nuclear, chemical, and biological weapons (collectively known as weapons of mass destruction, or WMD) and the potential acquisition and use of WMD against the world by terrorists are extremely serious threats to international security. These threats are complex and interrelated. There are myriad routes to weapons of mass destruction--many different starting materials, material sources, and production processes. There are many possible proliferators--threshold countries, rogue states, state-sponsored or transnational terrorists groups, domestic terrorists, and even international crime organizations. Motives for acquiring and using WMD are similarly wide ranging--from a desire to change the regional power balance, deny accessmore » to a strategic area, or alter international policy to extortion, revenge, or hate. Because of the complexity of this threat landscape, no single program, technology, or capability--no silver bullet--can solve the WMD proliferation and terrorism problem. An integrated program is needed that addresses the WMD proliferation and terrorism problem from end to end, from prevention to detection, reversal, and response, while avoiding surprise at all stages, with different activities directed specifically at different types of WMD and proliferators. Radiation detection technologies are an important tool in the prevention of proliferation. A variety of new developments have enabled enhanced performance in terms of energy resolution, spatial resolution, predictive modeling and simulation, active interrogation, and ease of operation and deployment in the field. The radiation properties of nuclear materials, particularly highly enriched uranium (HEU), make the detection of smuggled nuclear materials technically difficult. A number of efforts are under way to devise improved detector materials and instruments and to identify novel signatures that could be detected. Key applications of this work include monitoring for radioactive materials at choke points, searching for nuclear materials, and developing instruments for response personnel.« less

  15. Ultrasensitive microchip based on smart microgel for real-time online detection of trace threat analytes.

    PubMed

    Lin, Shuo; Wang, Wei; Ju, Xiao-Jie; Xie, Rui; Liu, Zhuang; Yu, Hai-Rong; Zhang, Chuan; Chu, Liang-Yin

    2016-02-23

    Real-time online detection of trace threat analytes is critical for global sustainability, whereas the key challenge is how to efficiently convert and amplify analyte signals into simple readouts. Here we report an ultrasensitive microfluidic platform incorporated with smart microgel for real-time online detection of trace threat analytes. The microgel can swell responding to specific stimulus in flowing solution, resulting in efficient conversion of the stimulus signal into significantly amplified signal of flow-rate change; thus highly sensitive, fast, and selective detection can be achieved. We demonstrate this by incorporating ion-recognizable microgel for detecting trace Pb(2+), and connecting our platform with pipelines of tap water and wastewater for real-time online Pb(2+) detection to achieve timely pollution warning and terminating. This work provides a generalizable platform for incorporating myriad stimuli-responsive microgels to achieve ever-better performance for real-time online detection of various trace threat molecules, and may expand the scope of applications of detection techniques.

  16. Detection of chemical warfare simulants using Raman excitation at 1064 nm

    NASA Astrophysics Data System (ADS)

    Dentinger, Claire; Mabry, Mark W.; Roy, Eric G.

    2014-05-01

    Raman spectroscopy is a powerful technique for material identification. The technique is sensitive to primary and higher ordered molecular structure and can be used to identify unknown materials by comparison with spectral reference libraries. Additionally, miniaturization of opto-electronic components has permitted development of portable Raman analyzers that are field deployable. Raman scattering is a relatively weak effect compared to a competing phenomenon, fluorescence. Even a moderate amount of fluorescence background interference can easily prevent identification of unknown materials. A long wavelength Raman system is less likely to induce fluorescence from a wider variety of materials than a higher energy visible laser system. Compounds such as methyl salicylate (MS), diethyl malonate (DEM), and dimethyl methylphosphonate (DMMP) are used as chemical warfare agent (CWA) simulants for development of analytical detection strategies. Field detection of these simulants however poses unique challenges because threat identification must be made quickly without the turnaround time usually required for a laboratory based analysis. Fortunately, these CWA simulants are good Raman scatterers, and field based detection using portable Raman instruments is promising. Measurements of the CWA simulants were done using a 1064 nm based portable Raman spectrometer. The longer wavelength excitation laser was chosen relative to a visible based laser systems because the 1064 nm based spectrometer is less likely to induce fluorescence and more suitable to a wider range of materials. To more closely mimic real world measurement situations, different sample presentations were investigated.

  17. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks.

    PubMed

    Canetti, Daphna; Gross, Michael; Waismel-Manor, Israel; Levanon, Asaf; Cohen, Hagit

    2017-02-01

    Do cyberattacks fuel the politics of threat? By what mechanism does it do so? To address these questions, we employ a technological and physiological experiment (2 × 2) involving a simulated cyberattack. Participants were randomly assigned to "cyberattack" (treatment) or "no attack" (control) conditions. We find that cyber-attacks make people more likely to express threat perceptions; we suggest salivary cortisol, a measure of stress, as the mechanism bridging cyber and the politics of threat. Contrary to existing evidence, salivary cortisol is the mechanism that translates simulated exposure to cyberattacks into political threat perceptions.

  18. Classifying threats with a 14-MeV neutron interrogation system.

    PubMed

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  19. If training data appears to be mislabeled, should we relabel it? Improving supervised learning algorithms for threat detection in ground penetrating radar data

    NASA Astrophysics Data System (ADS)

    Reichman, Daniël.; Collins, Leslie M.; Malof, Jordan M.

    2018-04-01

    This work focuses on the development of automatic buried threat detection (BTD) algorithms using ground penetrating radar (GPR) data. Buried threats tend to exhibit unique characteristics in GPR imagery, such as high energy hyperbolic shapes, which can be leveraged for detection. Many recent BTD algorithms are supervised, and therefore they require training with exemplars of GPR data collected over non-threat locations and threat locations, respectively. Frequently, data from non-threat GPR examples will exhibit high energy hyperbolic patterns, similar to those observed from a buried threat. Is it still useful therefore, to include such examples during algorithm training, and encourage an algorithm to label such data as a non-threat? Similarly, some true buried threat examples exhibit very little distinctive threat-like patterns. We investigate whether it is beneficial to treat such GPR data examples as mislabeled, and either (i) relabel them, or (ii) remove them from training. We study this problem using two algorithms to automatically identify mislabeled examples, if they are present, and examine the impact of removing or relabeling them for training. We conduct these experiments on a large collection of GPR data with several state-of-the-art GPR-based BTD algorithms.

  20. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    DTIC Science & Technology

    2013-08-01

    potential threats present in this scene and explain the meaning and implications of these threats. You have two minutes to write a response...could be due to the nature of the tasks or to fatigue. Requiring Soldiers to write answers on multiple trials, and across similar tasks, might have...tasks will likely be significantly different from those experienced in the trainer. This would remove the writing requirement over multiple trials

  1. An earlier time of scan is associated with greater threat-related amygdala reactivity.

    PubMed

    Baranger, David A A; Margolis, Seth; Hariri, Ahmad R; Bogdan, Ryan

    2017-08-01

    Time-dependent variability in mood and anxiety suggest that related neural phenotypes, such as threat-related amygdala reactivity, may also follow a diurnal pattern. Here, using data from 1,043 young adult volunteers, we found that threat-related amygdala reactivity was negatively coupled with time of day, an effect which was stronger in the left hemisphere (β = -0.1083, p-fdr = 0.0012). This effect was moderated by subjective sleep quality (β = -0.0715, p-fdr = 0.0387); participants who reported average and poor sleep quality had relatively increased left amygdala reactivity in the morning. Bootstrapped simulations suggest that similar cross-sectional samples with at least 300 participants would be able to detect associations between amygdala reactivity and time of scan. In control analyses, we found no associations between time and V1 activation. Our results provide initial evidence that threat-related amygdala reactivity may vary diurnally, and that this effect is potentiated among individuals with average to low sleep quality. More broadly, our results suggest that considering time of scan in study design or modeling time of scan in analyses, as well as collecting additional measures of circadian variation, may be useful for understanding threat-related neural phenotypes and their associations with behavior, such as fear conditioning, mood and anxiety symptoms, and related phenotypes. © The Author (2017). Published by Oxford University Press.

  2. An earlier time of scan is associated with greater threat-related amygdala reactivity

    PubMed Central

    Baranger, David A. A.; Margolis, Seth; Hariri, Ahmad R.

    2017-01-01

    Abstract Time-dependent variability in mood and anxiety suggest that related neural phenotypes, such as threat-related amygdala reactivity, may also follow a diurnal pattern. Here, using data from 1,043 young adult volunteers, we found that threat-related amygdala reactivity was negatively coupled with time of day, an effect which was stronger in the left hemisphere (β = −0.1083, p-fdr = 0.0012). This effect was moderated by subjective sleep quality (β = −0.0715, p-fdr = 0.0387); participants who reported average and poor sleep quality had relatively increased left amygdala reactivity in the morning. Bootstrapped simulations suggest that similar cross-sectional samples with at least 300 participants would be able to detect associations between amygdala reactivity and time of scan. In control analyses, we found no associations between time and V1 activation. Our results provide initial evidence that threat-related amygdala reactivity may vary diurnally, and that this effect is potentiated among individuals with average to low sleep quality. More broadly, our results suggest that considering time of scan in study design or modeling time of scan in analyses, as well as collecting additional measures of circadian variation, may be useful for understanding threat-related neural phenotypes and their associations with behavior, such as fear conditioning, mood and anxiety symptoms, and related phenotypes. PMID:28379578

  3. Multisensor data fusion for IED threat detection

    NASA Astrophysics Data System (ADS)

    Mees, Wim; Heremans, Roel

    2012-10-01

    In this paper we present the multi-sensor registration and fusion algorithms that were developed for a force protection research project in order to detect threats against military patrol vehicles. The fusion is performed at object level, using a hierarchical evidence aggregation approach. It first uses expert domain knowledge about the features used to characterize the detected threats, that is implemented in the form of a fuzzy expert system. The next level consists in fusing intra-sensor and inter-sensor information. Here an ordered weighted averaging operator is used. The object level fusion between candidate threats that are detected asynchronously on a moving vehicle by sensors with different imaging geometries, requires an accurate sensor to world coordinate transformation. This image registration will also be discussed in this paper.

  4. Explosives (and other threats) detection using pulsed neutron interrogation and optimized detectors

    NASA Astrophysics Data System (ADS)

    Strellis, Dan A.; Elsalim, Mashal; Gozani, Tsahi

    2011-06-01

    We have previously reported results from a human-portable system using neutron interrogation to detect contraband and explosives. We summarized our methodology for distinguishing threat materials such as narcotics, C4, and mustard gas in the myriad of backgrounds present in the maritime environment. We are expanding our mission for the Domestic Nuclear Detection Office (DNDO) to detect Special Nuclear Material (SNM) through the detection of multiple fission signatures without compromising the conventional threat detection performance. This paper covers our initial investigations into using neutrons from compact pulsed neutron generators via the d(D,n)3He or d(T,n)α reactions with energies of ~2.5 and 14 MeV, respectively, for explosives (and other threats) detection along with a variety of gamma-ray detectors. Fast neutrons and thermal neutrons (after successive collisions) can stimulate the emission of various threat detection signatures. For explosives detection, element-specific gamma-ray signatures via the (n,n'γ) inelastic scattering reaction and the (n,'γ) thermal capture reaction are detected. For SNM, delayed gamma-rays following fission can be measured with the same detector. Our initial trade-off investigations of several gamma-ray detectors types (NaI, CsI, LaBr3, HPGe) for measuring gamma-ray signatures in a pulsed neutron environment for potential application in a human-portable active interrogation system are covered in this paper.

  5. Reactive chromophores for sensitive and selective detection of chemical warfare agents and toxic industrial chemicals

    NASA Astrophysics Data System (ADS)

    Frye-Mason, Greg; Leuschen, Martin; Wald, Lara; Paul, Kateri; Hancock, Lawrence F.

    2005-05-01

    A reactive chromophore developed at MIT exhibits sensitive and selective detection of surrogates for G-class nerve agents. This reporter acts by reacting with the agent to form an intermediate that goes through an internal cyclization reaction. The reaction locks the molecule into a form that provides a strong fluorescent signal. Using a fluorescent sensor platform, Nomadics has demonstrated rapid and sensitive detection of reactive simulants such as diethyl chloro-phosphate (simulant for sarin, soman, and related agents) and diethyl cyanophosphate (simulant for tabun). Since the unreacted chromophore does not fluoresce at the excitation wavelength used for the cyclized reporter, the onset of fluo-rescence can be easily detected. This fluorescence-based detection method provides very high sensitivity and could enable rapid detection at permissible exposure levels. Tests with potential interferents show that the reporter is very selective, with responses from only a few highly toxic, electrophilic chemicals such as phosgene, thionyl chloride, and strong acids such as HF, HCl, and nitric acid. Dimethyl methyl phosphonate (DMMP), a common and inactive simu-lant for other CW detectors, is not reactive enough to generate a signal. The unique selectivity to chemical reactivity means that a highly toxic and hazardous chemical is present when the reporter responds and illustrates that this sensor can provide very low false alarm rates. Current efforts focus on demonstrating the sensitivity and range of agents and toxic industrial chemicals detected with this reporter as well as developing additional fluorescent reporters for a range of chemical reactivity classes. The goal is to produce a hand-held sensor that can sensitively detect a broad range of chemical warfare agent and toxic industrial chemical threats.

  6. Geographic Wormhole Detection in Wireless Sensor Networks

    PubMed Central

    Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin

    2015-01-01

    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616

  7. Potential of VIIRS Data for Regional Monitoring of Gypsy Moth Defoliation: Implications for Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Ryan, Robert E.; Smoot, James C.; Prados, Donald; McKellip, Rodney; Sader. Steven A.; Gasser, Jerry; May, George; Hargrove, William

    2007-01-01

    A NASA RPC (Rapid Prototyping Capability) experiment was conducted to assess the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) data for monitoring non-native gypsy moth (Lymantria dispar) defoliation of forests. This experiment compares defoliation detection products computed from simulated VIIRS and from MODIS (Moderate Resolution Imaging Spectroradiometer) time series products as potential inputs to a forest threat EWS (Early Warning System) being developed for the USFS (USDA Forest Service). Gypsy moth causes extensive defoliation of broadleaved forests in the United States and is specifically identified in the Healthy Forest Restoration Act (HFRA) of 2003. The HFRA mandates development of a national forest threat EWS. This system is being built by the USFS and NASA is aiding integration of needed satellite data products into this system, including MODIS products. This RPC experiment enabled the MODIS follow-on, VIIRS, to be evaluated as a data source for EWS forest monitoring products. The experiment included 1) assessment of MODIS-simulated VIIRS NDVI products, and 2) evaluation of gypsy moth defoliation mapping products from MODIS-simulated VIIRS and from MODIS NDVI time series data. This experiment employed MODIS data collected over the approximately 15 million acre mid-Appalachian Highlands during the annual peak defoliation time frame (approximately June 10 through July 27) during 2000-2006. NASA Stennis Application Research Toolbox software was used to produce MODIS-simulated VIIRS data and NASA Stennis Time Series Product Tool software was employed to process MODIS and MODIS-simulated VIIRS time series data scaled to planetary reflectance. MODIS-simulated VIIRS data was assessed through comparison to Hyperion-simulated VIIRS data using data collected during gypsy moth defoliation. Hyperion-simulated MODIS data showed a high correlation with actual MODIS data (NDVI R2 of 0.877 and RMSE of 0.023). MODIS-simulated VIIRS data for the same date showed moderately high correlation with Hyperion-simulated VIIRS data (NDVI R2 of 0.62 and RMSE of 0.035), even though the datasets were collected about a half an hour apart during changing weather conditions. MODIS products (MOD02, MOD09, and MOD13) and MOD02-simulated VIIRS time series data were used to generate defoliation mapping products based on image classification and image differencing change detection techniques. Accuracy of final defoliation mapping products was assessed by image interpreting over 170 randomly sampled locations found on Landsat and ASTER data in conjunction with defoliation map data from the USFS. The MOD02-simulated VIIRS 400-meter NDVI classification produced a similar overall accuracy (87.28 percent with 0.72 Kappa) to the MOD02 250-meter NDVI classification (86.71 percent with 0.71 Kappa). In addition, the VIIRS 400-meter NDVI, MOD02 250-meter NDVI, and MOD02 500-meter NDVI showed good user and producer accuracies for the defoliated forest class (70 percent) and acceptable Kappa values (0.66). MOD02 and MOD02-simulated VIIRS data both showed promise as data sources for regional monitoring of forest disturbance due to insect defoliation.

  8. Subconscious detection of threat as reflected by an enhanced response bias.

    PubMed

    Windmann, S; Krüger, T

    1998-12-01

    Neurobiological and cognitive models of unconscious information processing suggest that subconscious threat detection can lead to cognitive misinterpretations and false alarms, while conscious processing is assumed to be perceptually and conceptually accurate and unambiguous. Furthermore, clinical theories suggest that pathological anxiety results from a crude preattentive warning system predominating over more sophisticated and controlled modes of processing. We investigated the hypothesis that subconscious detection of threat in a cognitive task is reflected by enhanced "false signal" detection rather than by selectively enhanced discrimination of threat items in 30 patients with panic disorder and 30 healthy controls. We presented a tachistoscopic word-nonword discrimination task and a subsequent recognition task and analyzed the data by means of process-dissociation procedures. In line with our expectations, subjects of both groups showed more false signal detection to threat than to neutral stimuli as indicated by an enhanced response bias, whereas indices of discriminative sensitivity did not show this effect. In addition, patients with panic disorder showed a generally enhanced response bias in comparison to healthy controls. They also seemed to have processed the stimuli less elaborately and less differentially. Results are consistent with the assumption that subconscious threat detection can lead to misrepresentations of stimulus significance and that pathological anxiety is characterized by a hyperactive preattentive alarm system that is insufficiently controlled by higher cognitive processes. Copyright 1998 Academic Press.

  9. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR

    NASA Astrophysics Data System (ADS)

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K.; Sharma, Ramesh C.

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ˜5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly.

  10. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: a review.

    PubMed

    Upadhyayula, Venkata K K

    2012-02-17

    There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and biothreat pathogens through any of the four sensory means mentioned previously. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. Terahertz imaging system for stand-off detection of threats

    NASA Astrophysics Data System (ADS)

    Hübers, H.-W.; Semenov, A. D.; Richter, H.; Böttger, U.

    2007-04-01

    Suicide bombers and hidden bombs or explosives have become serious threats especially for mass transportation. Until now there exists no established system which can be used against these threats. Therefore new technologies especially for stand-off detection of threats are required. Terahertz (THz) rays offer an alternative inspection method, which can cope with these new challenges. Major advantages of THz radiation as compared to other spectral regions are the possibility to penetrate through clothes and that THz radiation is not harmful for human health. In this report the design and results of a THz stand-off detection system will be presented. The sensor is based on active illumination of the object and sensitive heterodyne detection of reflected and backscattered radiation. The system operates at about 0.8 THz. A THz laser is used for illumination and a superconducting hot-electron bolometric mixer for detection. The local oscillator required for heterodyne detection is a multiplied microwave source. The optical system is designed to allow for stand-off detection at 20 m with a spatial resolution less than 2 cm.

  12. Use of High-Resolution WRF Simulations to Forecast Lightning Threat

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.; LaCasse, K.; Goodman, S. J.; Cecil, D. J.

    2008-01-01

    Recent observational studies have confirmed the existence of a robust statistical relationship between lightning flash rates and the amount of large precipitating ice hydrometeors aloft in storms. This relationship is exploited, in conjunction with the capabilities of cloud-resolving forecast models such as WRF, to forecast explicitly the threat of lightning from convective storms using selected output fields from the model forecasts. The simulated vertical flux of graupel at -15C and the shape of the simulated reflectivity profile are tested in this study as proxies for charge separation processes and their associated lightning risk. Our lightning forecast method differs from others in that it is entirely based on high-resolution simulation output, without reliance on any climatological data. short [6-8 h) simulations are conducted for a number of case studies for which three-dmmensional lightning validation data from the North Alabama Lightning Mapping Array are available. Experiments indicate that initialization of the WRF model on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity fields, and METAR and ACARS data y&eld satisfactory simulations. __nalyses of the lightning threat fields suggests that both the graupel flux and reflectivity profile approaches, when properly calibrated, can yield reasonable lightning threat forecasts, although an ensemble approach is probably desirable in order to reduce the tendency for misplacement of modeled storms to hurt the accuracy of the forecasts. Our lightning threat forecasts are also compared to other more traditional means of forecasting thunderstorms, such as those based on inspection of the convective available potential energy field.

  13. Best Practices and Controls for Mitigating Insider Threats

    DTIC Science & Technology

    2013-08-08

    for plagiarism in academic papers, the process is virtually identical Solution: Managing The Insider Threat: What Every Organization Should Know...University Plagiarism Detection & DLP Managing The Insider Threat: What Every Organization Should Know Twitter #CERTinsiderthreat © 2013 Carnegie...How do we test document similarity? •  Cosine similarity algorithms •  Laymen’s terms: Plagiarism Detection •  Even though we’re not checking

  14. Methodology of automated ionosphere front velocity estimation for ground-based augmentation of GNSS

    NASA Astrophysics Data System (ADS)

    Bang, Eugene; Lee, Jiyun

    2013-11-01

    ionospheric anomalies occurring during severe ionospheric storms can pose integrity threats to Global Navigation Satellite System (GNSS) Ground-Based Augmentation Systems (GBAS). Ionospheric anomaly threat models for each region of operation need to be developed to analyze the potential impact of these anomalies on GBAS users and develop mitigation strategies. Along with the magnitude of ionospheric gradients, the speed of the ionosphere "fronts" in which these gradients are embedded is an important parameter for simulation-based GBAS integrity analysis. This paper presents a methodology for automated ionosphere front velocity estimation which will be used to analyze a vast amount of ionospheric data, build ionospheric anomaly threat models for different regions, and monitor ionospheric anomalies continuously going forward. This procedure automatically selects stations that show a similar trend of ionospheric delays, computes the orientation of detected fronts using a three-station-based trigonometric method, and estimates speeds for the front using a two-station-based method. It also includes fine-tuning methods to improve the estimation to be robust against faulty measurements and modeling errors. It demonstrates the performance of the algorithm by comparing the results of automated speed estimation to those manually computed previously. All speed estimates from the automated algorithm fall within error bars of ± 30% of the manually computed speeds. In addition, this algorithm is used to populate the current threat space with newly generated threat points. A larger number of velocity estimates helps us to better understand the behavior of ionospheric gradients under geomagnetic storm conditions.

  15. Social information use in threat perception: Social buffering, contagion and facilitation of alarm responses

    PubMed Central

    Oliveira, Rui F.; Faustino, Ana I.

    2017-01-01

    ABSTRACT Group living animals can use the behavior of others as cues for the presence of threat in the environment and adjust their behavior accordingly. Therefore, different social phenomena that modulate the response to threat, such as social buffering, social transmission (contagion), and facilitation of alarm responses can be seen as different manifestations of social information use in threat detection. Thus, social phenomena that are functionally antagonistic, such as social buffering and social transmission of fear, may rely on shared neurobehavioral mechanisms related to the use of social information in decision-making about the presence of threat in the environment. Here, we propose a unifying conceptual framework for the study of social information use in threat perception based on signal detection theory.

  16. Threat captures attention but does not affect learning of contextual regularities.

    PubMed

    Yamaguchi, Motonori; Harwood, Sarah L

    2017-04-01

    Some of the stimulus features that guide visual attention are abstract properties of objects such as potential threat to one's survival, whereas others are complex configurations such as visual contexts that are learned through past experiences. The present study investigated the two functions that guide visual attention, threat detection and learning of contextual regularities, in visual search. Search arrays contained images of threat and non-threat objects, and their locations were fixed on some trials but random on other trials. Although they were irrelevant to the visual search task, threat objects facilitated attention capture and impaired attention disengagement. Search time improved for fixed configurations more than for random configurations, reflecting learning of visual contexts. Nevertheless, threat detection had little influence on learning of the contextual regularities. The results suggest that factors guiding visual attention are different from factors that influence learning to guide visual attention.

  17. MDMA DECREASES THE EFFECTS OF SIMULATED SOCIAL REJECTION

    PubMed Central

    Frye, Charles G.; Wardle, Margaret C.; Norman, Greg J.; de Wit, Harriet

    2014-01-01

    3-4-methylenedioxymethamphetamine (MDMA) increases self-reported positive social feelings and decreases the ability to detect social threat in faces, but its effects on experiences of social acceptance and rejection have not been determined. We examined how an acute dose of MDMA affects subjective and autonomic responses to simulated social acceptance and rejection. We predicted that MDMA would decrease subjective responses to rejection. On an exploratory basis, we also examined the effect of MDMA on respiratory sinus arrhythmia (RSA), a measure of parasympathetic cardiac control often thought to index social engagement and emotional regulation. Over three sessions, healthy adult volunteers with previous MDMA experience (N = 36) received capsules containing placebo, 0.75 or 1.5 mg/kg of MDMA under counter-balanced double-blind conditions. During expected peak drug effect, participants played two rounds of a virtual social simulation task called “Cyberball” during which they experienced acceptance in one round and rejection in the other. During the task we also obtained electrocardiograms (ECGs), from which we calculated RSA. After each round, participants answered questionnaires about their mood and self-esteem. As predicted, MDMA decreased the effect of simulated social rejection on self-reported mood and self-esteem and decreased perceived intensity of rejection, measured as the percent of ball tosses participants reported receiving. Consistent with its sympathomimetic properties, MDMA decreased RSA as compared to placebo. Our finding that MDMA decreases perceptions of rejection in simulated social situations extends previous results indicating that MDMA reduces perception of social threat in faces. Together these findings suggest a cognitive mechanism by which MDMA might produce pro-social behavior and feelings and how the drug might function as an adjunct to psychotherapy. These phenomena merit further study in non-simulated social environments. PMID:24316346

  18. Impact of flying qualities on mission effectiveness for helicopter air combat, volume 1

    NASA Technical Reports Server (NTRS)

    Harris, T. M.; Beerman, D. A.

    1983-01-01

    A computer simulation to investigate the impact of flying qualities on mission effectiveness is described. The objective of the study was to relate the effects of flying qualities, such as precision of flight path control and pilot workload, to the ability of a single Scout helicopter, or helicopter team, to accomplish a specified anti-armor mission successfully. The model of the actual engagement is a Monte Carlo simulation that has the capability to assess the effects of helicopter characteristics, numbers, tactics and weaponization on the force's ability to accomplish a specific mission against a specified threat as a function of realistic tactical factors. A key feature of this program is a simulation of micro-terrain features and their effects on detection, exposure, and masking for nap-of-the-earth (NOE) flight.

  19. Inter-professional in-situ simulated team and resuscitation training for patient safety: Description and impact of a programmatic approach.

    PubMed

    Zimmermann, Katja; Holzinger, Iris Bachmann; Ganassi, Lorena; Esslinger, Peter; Pilgrim, Sina; Allen, Meredith; Burmester, Margarita; Stocker, Martin

    2015-10-29

    Inter-professional teamwork is key for patient safety and team training is an effective strategy to improve patient outcome. In-situ simulation is a relatively new strategy with emerging efficacy, but best practices for the design, delivery and implementation have yet to be evaluated. Our aim is to describe and evaluate the implementation of an inter-professional in-situ simulated team and resuscitation training in a teaching hospital with a programmatic approach. We designed and implemented a team and resuscitation training program according to Kern's six steps approach for curriculum development. General and specific needs assessments were conducted as independent cross-sectional surveys. Teamwork, technical skills and detection of latent safety threats were defined as specific objectives. Inter-professional in-situ simulation was used as educational strategy. The training was embedded within the workdays of participants and implemented in our highest acuity wards (emergency department, intensive care unit, intermediate care unit). Self-perceived impact and self-efficacy were sampled with an anonymous evaluation questionnaire after every simulated training session. Assessment of team performance was done with the team-based self-assessment tool TeamMonitor applying Van der Vleuten's conceptual framework of longitudinal evaluation after experienced real events. Latent safety threats were reported during training sessions and after experienced real events. The general and specific needs assessments clearly identified the problems, revealed specific training needs and assisted with stakeholder engagement. Ninety-five interdisciplinary staff members of the Children's Hospital participated in 20 in-situ simulated training sessions within 2 years. Participant feedback showed a high effect and acceptance of training with reference to self-perceived impact and self-efficacy. Thirty-five team members experiencing 8 real critical events assessed team performance with TeamMonitor. Team performance assessment with TeamMonitor was feasible and identified specific areas to target future team training sessions. Training sessions as well as experienced real events revealed important latent safety threats that directed system changes. The programmatic approach of Kern's six steps for curriculum development helped to overcome barriers of design, implementation and assessment of an in-situ team and resuscitation training program. This approach may help improve effectiveness and impact of an in-situ simulated training program.

  20. Missile airframe simulation testbed: MANPADS (MAST-M) for test and evaluation of aircraft survivability equipment

    NASA Astrophysics Data System (ADS)

    Clements, Jim; Robinson, Richard; Bunt, Leslie; Robinson, Joe

    2011-06-01

    A number of techniques have been utilized to evaluate the performance of Aircraft Survivability Equipment (ASE) against threat Man-Portable Air Defense Systems (MANPADS). These techniques include flying actual threat MANPADS against stationary ASE with simulated aircraft signatures, testing installed ASE systems against simulated threat signatures, and laboratory hardware-in-the-loop (HWIL) testing with simulated aircraft and simulated missile signatures. All of these tests lack the realism of evaluating installed ASE against in-flight MANPADS on a terminal homing intercept path toward the actual ASE equipped aircraft. This limitation is due primarily to the current inability to perform non-destructive MANPADS/Aircraft flight testing. The U.S. Army Aviation and Missile Research and Development and Engineering Center (AMRDEC) is working to overcome this limitation with the development of a recoverable surrogate MANPADS missile system capable of engaging aircraft equipped with ASE while guaranteeing collision avoidance with the test aircraft. Under its Missile Airframe Simulation Testbed - MANPADS (MAST-M) program, the AMRDEC is developing a surrogate missile system which will utilize actual threat MANPADS seeker/guidance sections to control the flight of a surrogate missile which will perform a collision avoidance and recovery maneuver prior to intercept to insure non-destructive test and evaluation of the ASE and reuse of the MANPADS seeker/guidance section. The remainder of this paper provides an overview of this development program and intended use.

  1. Detection of biological warfare agents using ultra violet-laser induced fluorescence LIDAR.

    PubMed

    Joshi, Deepti; Kumar, Deepak; Maini, Anil K; Sharma, Ramesh C

    2013-08-01

    This review has been written to highlight the threat of biological warfare agents, their types and detection. Bacterial biological agent Bacillus anthracis (bacteria causing the disease anthrax) which is most likely to be employed in biological warfare is being discussed in detail. Standoff detection of biological warfare agents in aerosol form using Ultra violet-Laser Induced Fluorescence (UV-LIF) spectroscopy method has been studied. Range-resolved detection and identification of biological aerosols by both nano-second and non-linear femto-second LIDAR is also discussed. Calculated received fluorescence signal for a cloud of typical biological agent Bacillus globigii (Simulants of B. anthracis) at a location of ~5.0 km at different concentrations in presence of solar background radiation has been described. Overview of current research efforts in internationally available working UV-LIF LIDAR systems are also mentioned briefly. Copyright © 2013 Elsevier B.V. All rights reserved.

  2. Simulation in the clinical setting: towards a standard lexicon.

    PubMed

    Posner, Glenn D; Clark, Marcia L; Grant, Vincent J

    2017-01-01

    Simulation-based educational activities are happening in the clinical environment but are not all uniform in terms of their objectives, delivery, or outputs. While these activities all provide an opportunity for individual and team training, nuances in the location, timing, notification, and participants impact the potential outcomes of these sessions and objectives achieved. In light of this, there are actually many different types of simulation-based activity that occur in the clinical environment, which has previously all been grouped together as "in situ" simulation. However, what truly defines in situ simulation is how the clinical environment responds in its' natural state, including the personnel, equipment, and systems responsible for care in that environment. Beyond individual and team skill sets, there are threats to patient safety or quality patient care that result from challenges with equipment, processes, or system breakdowns. These have been labeled "latent safety threats." We submit that the opportunity for discovery of latent safety threats is what defines in situ simulation and truly differentiates it from what would be more rightfully called "on-site" simulation. The distinction between the two is highlighted in this article, as well as some of the various sub-types of in situ simulation.

  3. Development of a handheld widefield hyperspectral imaging (HSI) sensor for standoff detection of explosive, chemical, and narcotic residues

    NASA Astrophysics Data System (ADS)

    Nelson, Matthew P.; Basta, Andrew; Patil, Raju; Klueva, Oksana; Treado, Patrick J.

    2013-05-01

    The utility of Hyper Spectral Imaging (HSI) passive chemical detection employing wide field, standoff imaging continues to be advanced in detection applications. With a drive for reduced SWaP (Size, Weight, and Power), increased speed of detection and sensitivity, developing a handheld platform that is robust and user-friendly increases the detection capabilities of the end user. In addition, easy to use handheld detectors could improve the effectiveness of locating and identifying threats while reducing risks to the individual. ChemImage Sensor Systems (CISS) has developed the HSI Aperio™ sensor for real time, wide area surveillance and standoff detection of explosives, chemical threats, and narcotics for use in both government and commercial contexts. Employing liquid crystal tunable filter technology, the HSI system has an intuitive user interface that produces automated detections and real-time display of threats with an end user created library of threat signatures that is easily updated allowing for new hazardous materials. Unlike existing detection technologies that often require close proximity for sensing and so endanger operators and costly equipment, the handheld sensor allows the individual operator to detect threats from a safe distance. Uses of the sensor include locating production facilities of illegal drugs or IEDs by identification of materials on surfaces such as walls, floors, doors, deposits on production tools and residue on individuals. In addition, the sensor can be used for longer-range standoff applications such as hasty checkpoint or vehicle inspection of residue materials on surfaces or bulk material identification. The CISS Aperio™ sensor has faster data collection, faster image processing, and increased detection capability compared to previous sensors.

  4. Performance estimation for threat detection in CT systems

    NASA Astrophysics Data System (ADS)

    Montgomery, Trent; Karl, W. Clem; Castañón, David A.

    2017-05-01

    Detecting the presence of hazardous materials in suitcases and carry-on luggage is an important problem in aviation security. As the set of threats is expanding, there is a corresponding need to increase the capabilities of explosive detection systems to address these threats. However, there is a lack of principled tools for predicting the performance of alternative designs for detection systems. In this paper, we describe an approach for computing bounds on the achievable classification performance of material discrimination systems based on empirical statistics that estimate the f-divergence of the underlying features. Our approach can be used to examine alternative physical observation modalities and measurement configurations, as well as variations in reconstruction and feature extraction algorithms.

  5. Automated and miniaturized detection of biological threats with a centrifugal microfluidic system

    NASA Astrophysics Data System (ADS)

    Mark, D.; van Oordt, T.; Strohmeier, O.; Roth, G.; Drexler, J.; Eberhard, M.; Niedrig, M.; Patel, P.; Zgaga-Griesz, A.; Bessler, W.; Weidmann, M.; Hufert, F.; Zengerle, R.; von Stetten, F.

    2012-06-01

    The world's growing mobility, mass tourism, and the threat of terrorism increase the risk of the fast spread of infectious microorganisms and toxins. Today's procedures for pathogen detection involve complex stationary devices, and are often too time consuming for a rapid and effective response. Therefore a robust and mobile diagnostic system is required. We present a microstructured LabDisk which performs complex biochemical analyses together with a mobile centrifugal microfluidic device which processes the LabDisk. This portable system will allow fully automated and rapid detection of biological threats at the point-of-need.

  6. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    ERIC Educational Resources Information Center

    Parasuraman, Raja; de Visser, Ewart; Clarke, Ellen; McGarry, W. Ryan; Hussey, Elizabeth; Shaw, Tyler; Thompson, James C.

    2009-01-01

    Three experiments examined the vigilance performance of participants watching videos depicting intentional actions of an individual's hand reaching for and grasping an object--involving transporting or using either a gun or a hairdryer--in order to detect infrequent threat-related actions. Participants indicated detection of target actions either…

  7. Monte Carlo Simulations for the Detection of Buried Objects Using Single Sided Backscattered Radiation.

    PubMed

    Yip, Mary; Saripan, M Iqbal; Wells, Kevin; Bradley, David A

    2015-01-01

    Detection of buried improvised explosive devices (IEDs) is a delicate task, leading to a need to develop sensitive stand-off detection technology. The shape, composition and size of the IEDs can be expected to be revised over time in an effort to overcome increasingly sophisticated detection methods. As an example, for the most part, landmines are found through metal detection which has led to increasing use of non-ferrous materials such as wood or plastic containers for chemical based explosives being developed. Monte Carlo simulations have been undertaken considering three different commercially available detector materials (hyperpure-Ge (HPGe), lanthanum(III) bromide (LaBr) and thallium activated sodium iodide (NaI(Tl)), applied at a stand-off distance of 50 cm from the surface and burial depths of 0, 5 and 10 cm, with sand as the obfuscating medium. Target materials representing medium density wood and mild steel have been considered. Each detector has been modelled as a 10 cm thick cylinder with a 20 cm diameter. It appears that HPGe represents the most promising detector for this application. Although it was not the highest density material studied, its excellent energy resolving capability leads to the highest quality spectra from which detection decisions can be inferred. The simulation work undertaken here suggests that a vehicle-born threat detection system could be envisaged using a single betatron and a series of detectors operating in parallel observing the space directly in front of the vehicle path. Furthermore, results show that non-ferrous materials such as wood can be effectively discerned in such remote-operated detection system, with the potential to apply a signature analysis template matching technique for real-time analysis of such data.

  8. Rapid and sensitive detection of Zika virus by reverse transcription loop-mediated isothermal amplification.

    PubMed

    Wang, Xuan; Yin, Fenggui; Bi, Yuhai; Cheng, Gong; Li, Jing; Hou, Lidan; Li, Yunlong; Yang, Baozhi; Liu, Wenjun; Yang, Limin

    2016-12-01

    Zika virus (ZIKV) is an arbovirus that recently emerged and has expanded worldwide, causing a global threat and raising international concerns. Current molecular diagnostics, e.g., real-time PCR and reverse transcription PCR (RT-PCR), are time consuming, expensive, and can only be deployed in a laboratory instead of for field diagnostics. This study aimed to develop a one-step reverse transcription loop-mediated isothermal amplification (RT-LAMP) platform showing sensitivity, specificity, and more convenience than previous methods, being easily distributed and implemented. Specific primers were designed and screened to target the entire ZIKV genome. The analytical sensitivity and specificity of the assay were evaluated and compared with traditional PCR and quantitative real-time PCR. Three different simulated clinical sample quick preparation protocols were evaluated to establish a rapid and straightforward treatment procedure for clinical specimens in open field detection. The RT-LAMP assay for detection of ZIKV demonstrated superior specificity and sensitivity compared to traditional PCR at the optimum reaction temperature. For the ZIKV RNA standard, the limit of detection was 20 copies/test. For the simulated ZIKV clinical samples, the limit of detection was 0.02 pfu/test, which was one order of magnitude higher than RT-PCR and similar to real-time PCR. The detection limit of simulated ZIKV specimens prepared using a protease quick processing method was consistent with that of samples prepared using commercial nucleic acid extraction kits, indicating that our ZIKV detection method could be used in point-of-care testing. The RT-LAMP assay had excellent sensitivity and specificity for detecting ZIKV and can be deployed together with a rapid specimen processing method, offering the possibility for ZIKV diagnosis outside of the laboratory. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. What we are watching—five top global infectious disease threats, 2012: a perspective from CDC’s Global Disease Detection Operations Center

    PubMed Central

    Christian, Kira A.; Ijaz, Kashef; Dowell, Scott F.; Chow, Catherine C.; Chitale, Rohit A.; Bresee, Joseph S.; Mintz, Eric; Pallansch, Mark A.; Wassilak, Steven; McCray, Eugene; Arthur, Ray R.

    2013-01-01

    Disease outbreaks of international public health importance continue to occur regularly; detecting and tracking significant new public health threats in countries that cannot or might not report such events to the global health community is a challenge. The Centers for Disease Control and Prevention’s (CDC) Global Disease Detection (GDD) Operations Center, established in early 2007, monitors infectious and non-infectious public health events to identify new or unexplained global public health threats and better position CDC to respond, if public health assistance is requested or required. At any one time, the GDD Operations Center actively monitors approximately 30–40 such public health threats; here we provide our perspective on five of the top global infectious disease threats that we were watching in 2012: (1) avian influenza A (H5N1), (2) cholera, (3) wild poliovirus, (4) enterovirus-71, and (5) extensively drug-resistant tuberculosis. PMID:23827387

  10. Driving With Hemianopia: III. Detection of Stationary and Approaching Pedestrians in a Simulator

    PubMed Central

    Alberti, Concetta F.; Peli, Eli; Bowers, Alex R.

    2014-01-01

    Purpose. To compare blind-side detection performance of drivers with homonymous hemianopia (HH) for stationary and approaching pedestrians, initially appearing at small (4°) or large (14°) eccentricities in a driving simulator. While the stationary pedestrians did not represent an imminent threat, as their eccentricity increased rapidly as the vehicle advanced, the approaching pedestrians maintained a collision course with approximately constant eccentricity, walking or running, toward the travel lane as if to cross. Methods. Twelve participants with complete HH and without spatial neglect pressed the horn whenever they detected a pedestrian while driving along predetermined routes in two driving simulator sessions. Miss rates and reaction times were analyzed for 52 stationary and 52 approaching pedestrians. Results. Miss rates were higher and reaction times longer on the blind than the seeing side (P < 0.01). On the blind side, miss rates were lower for approaching than stationary pedestrians (16% vs. 29%, P = 0.01), especially at larger eccentricities (20% vs. 54%, P = 0.005), but reaction times for approaching pedestrians were longer (1.72 vs. 1.41 seconds; P = 0.03). Overall, the proportion of potential blind-side collisions (missed and late responses) was not different for the two paradigms (41% vs. 35%, P = 0.48), and significantly higher than for the seeing side (3%, P = 0.002). Conclusions. In a realistic pedestrian detection task, drivers with HH exhibited significant blind-side detection deficits. Even when approaching pedestrians were detected, responses were often too late to avoid a potential collision. PMID:24346175

  11. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    PubMed

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. Airborne Particulate Threat Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. governmentmore » agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.« less

  13. Threat-Detection and Attentional Bias to Threat in Women Recovered from Anorexia Nervosa: Neural Alterations in Extrastriate and Medial Prefrontal Cortices.

    PubMed

    Bang, Lasse; Rø, Øyvind; Endestad, Tor

    2017-03-01

    Behavioral studies have shown that anorexia nervosa (AN) is associated with attentional bias to general threat cues. The neurobiological underpinnings of attentional bias to threat in AN are unknown. This study investigated the neural responses associated with threat-detection and attentional bias to threat in AN. We measured neural responses to a dot-probe task, involving pairs of angry and neutral face stimuli, in 22 adult women recovered from AN and 21 comparison women. Recovered AN women did not exhibit a behavioral attentional bias to threat. In response to angry faces, recovered women showed significant hypoactivation in the extrastriate cortex. During attentional bias to angry faces, recovered women showed significant hyperactivation in the medial prefrontal cortex. This was because of significant deactivation in comparison women, which was absent in recovered AN women. Women recovered from AN are characterized by altered neural responses to threat cues. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association. Copyright © 2016 John Wiley & Sons, Ltd and Eating Disorders Association.

  14. Radar sensors for intersection collision avoidance

    NASA Astrophysics Data System (ADS)

    Jocoy, Edward H.; Phoel, Wayne G.

    1997-02-01

    On-vehicle sensors for collision avoidance and intelligent cruise control are receiving considerably attention as part of Intelligent Transportation Systems. Most of these sensors are radars and `look' in the direction of the vehicle's headway, that is, in the direction ahead of the vehicle. Calspan SRL Corporation is investigating the use of on- vehicle radar for Intersection Collision Avoidance (ICA). Four crash scenarios are considered and the goal is to design, develop and install a collision warning system in a test vehicle, and conduct both test track and in-traffic experiments. Current efforts include simulations to examine ICA geometry-dependent design parameters and the design of an on-vehicle radar and tracker for threat detection. This paper discusses some of the simulation and radar design efforts. In addition, an available headway radar was modified to scan the wide angles (+/- 90 degree(s)) associated with ICA scenarios. Preliminary proof-of-principal tests are underway as a risk reduction effort. Some initial target detection results are presented.

  15. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  16. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  17. Comparing the effects of real versus simulated violence on dream imagery.

    PubMed

    Dale, Allyson; Murkar, Anthony; Miller, Nicolle; Black, Joshua

    2014-08-01

    Participants in the current study were 75 males, including 25 Canadian soldiers, 25 heavy gamers who play military based video games such as "Call of Duty," and a control group comprised of 25 males. One dream per participant was analyzed using Hall and Van de Castle content analysis guidelines, including aggression, threat, and previously established scales for intensity of aggression and emotion. The dreams of soldiers had a higher frequency of both aggression and threat, and were also more intense in aggression and emotion than both the heavy gamers and the controls. These findings suggest that exposure to real life violence and threat (as well as the emotional significance of the experience) is more frequently incorporated into dream imagery than simulated or virtual threat. Limitations and directions for future studies are discussed.

  18. Modeling and Simulation of Survivable Armor Design Studies for IED Threats

    DTIC Science & Technology

    2008-03-01

    to be a threat both globally and domestically. One of the deadly devices in this arsenal is the Explosively Formed Projectile ( EPF ). This study...continues to be a threat both globally and domestically. One of the deadly devices in this arsenal is the Explosively Formed Projectile ( EPF ). This study

  19. PrE (Person-Relative-to-Event) Theory of Coping with Threat.

    ERIC Educational Resources Information Center

    Mulilis, John-Paul; Duval, T. Shelley

    The generalizability of Person-Relative-to-Event (PrE) theory, originally applied to disaster-related situations, is investigated in a non-disaster simulation. The PrE theory of coping with threat emphasizes the relationship between level of appraised threat relative to person resources and personal responsibility. This theory has previously been…

  20. Using in situ simulation to identify and resolve latent environmental threats to patient safety: case study involving operational changes in a labor and delivery ward.

    PubMed

    Hamman, William R; Beaudin-Seiler, Beth M; Beaubien, Jeffrey M; Gullickson, Amy M; Orizondo-Korotko, Krystyna; Gross, Amy C; Fuqua, Wayne; Lammers, Richard

    2010-01-01

    Since the publication of "To Err Is Human" in 1999, health care professionals have looked to high-reliability industries such as aviation for guidance on improving system safety. One of the most widely adopted aviation-derived approaches is simulation-based team training, also known as crew resource management training. In the health care domain, crew resource management training often takes place in custom-built simulation laboratories that are designed to replicate operating rooms or labor and delivery rooms. Unlike these traditional crew resource management training programs, "in situ simulation" occurs on actual patient care units, involves actual health care team members, and uses actual organization processes to train and assess team performance. During the past 24 months, our research team has conducted nearly 40 in situ simulations. In this article, we present the results from 1 such simulation: a patient who experienced a difficult labor that resulted in an emergency caesarian section and hysterectomy. During the simulation, a number of latent environmental threats to safety were identified. This article presents the latent threats and the steps that the hospital has taken to remedy them.

  1. Holographic radar imaging privacy techniques utilizing dual-frequency implementation

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-01

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.

  2. Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.

    2008-04-18

    Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less

  3. Validation of Survivability Validation Protocols

    DTIC Science & Technology

    1993-05-01

    simu- lation fidelityl. Physical testing of P.i SOS, in either aboveground tests (AGTs) or underground test ( UGTs ), will usually be impossible, due...with some simulation fidelity compromises) are possible in UGTs and/orAGTs. Hence proof tests, if done in statistically significant numbers, can...level. Simulation fidelity and AGT/ UGT /threat correlation will be validation issues here. Extrapolation to threat environments will be done via modeling

  4. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  5. Enhanced Analysis Techniques for an Imaging Neutron and Gamma Ray Spectrometer

    NASA Astrophysics Data System (ADS)

    Madden, Amanda C.

    The presence of gamma rays and neutrons is a strong indicator of the presence of Special Nuclear Material (SNM). The imaging Neutron and gamma ray SPECTrometer (NSPECT) developed by the University of New Hampshire and Michigan Aerospace corporation detects the fast neutrons and prompt gamma rays from fissile material, and the gamma rays from radioactive material. The instrument operates as a double scatter device, requiring a neutron or a gamma ray to interact twice in the instrument. While this detection requirement decreases the efficiency of the instrument, it offers superior background rejection and the ability to measure the energy and momentum of the incident particle. These measurements create energy spectra and images of the emitting source for source identification and localization. The dual species instrument provides superior detection than a single species alone. In realistic detection scenarios, few particles are detected from a potential threat due to source shielding, detection at a distance, high background, and weak sources. This contributes to a small signal to noise ratio, and threat detection becomes difficult. To address these difficulties, several enhanced data analysis tools were developed. A Receiver Operating Characteristic Curve (ROC) helps set instrumental alarm thresholds as well as to identify the presence of a source. Analysis of a dual-species ROC curve provides superior detection capabilities. Bayesian analysis helps to detect and identify the presence of a source through model comparisons, and helps create a background corrected count spectra for enhanced spectroscopy. Development of an instrument response using simulations and numerical analyses will help perform spectra and image deconvolution. This thesis will outline the principles of operation of the NSPECT instrument using the double scatter technology, traditional analysis techniques, and enhanced analysis techniques as applied to data from the NSPECT instrument, and an outline of how these techniques can be used to superior detection of radioactive and fissile materials.

  6. A Live Threat Violence Simulation Exercise for Psychiatric Outpatient Departments: A Valuable Aid to Training in Violence Prevention.

    PubMed

    Feinstein, Robert E; Yager, Joel

    2017-10-30

    Violence in psychiatric outpatient settings is a ubiquitous concern. This article describes the development, implementation, and evaluation of a live threat violence simulation exercise, designed to reduce the risk of future outpatient clinic violence and minimize the effects of future incidents on staff. The psychiatric outpatient clinic at the University of Colorado Hospital developed, implemented, and evaluated a 4-hour live violence threat simulation exercise as a companion to a 7-hour violence prevention program. The simulation includes an orientation, two threat simulation scenarios, three debriefings, satisfaction surveys, problem identification, action plans, and annual safety and process improvements. The authors have conducted live violence simulation exercises from 2011-2016, and have collected survey data about our annual simulation exercise from 2014-2016. Each year ≥ 52% of participants responded, and each year ≥ 90% of respondents rated the simulation as "very helpful/helpful", ≥ 86% believed themselves to be "much better/better" prepared to deal with violent episodes, and < 2% of participants experienced post-simulation side effects such as worries about past trauma; anxiety; sleep problems; increase in workplace concerns. From 2011-2016, the clinic experienced 4 major violent episodes and 36 episodes of potential violence with no staff injuries and minimal psychological sequelae to one staff member. Violence prevention efforts and the development of close police/staff relationships may have contributed to these fortunate outcomes. Satisfaction surveys suggest that the simulations are very helpful/helpful, with participants feeling much better/ better prepared to manage violence. The exercises led the authors to initiate staff safety related behavioral changes as well as physical space and safety processes improvements. The violence prevention program and simulation exercises have promoted excellent relationships with police and a consistent safety record over six years. This approach may be useful for other psychiatric outpatient departments.

  7. Explosive Detection in Aviation Applications Using CT

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martz, H E; Crawford, C R

    2011-02-15

    CT scanners are deployed world-wide to detect explosives in checked and carry-on baggage. Though very similar to single- and dual-energy multi-slice CT scanners used today in medical imaging, some recently developed explosives detection scanners employ multiple sources and detector arrays to eliminate mechanical rotation of a gantry, photon counting detectors for spectral imaging, and limited number of views to reduce cost. For each bag scanned, the resulting reconstructed images are first processed by automated threat recognition algorithms to screen for explosives and other threats. Human operators review the images only when these automated algorithms report the presence of possible threats.more » The US Department of Homeland Security (DHS) has requirements for future scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. A third-party in this context refers to academics and companies other than the established vendors. DHS is particularly interested in exploring the model that has been used very successfully by the medical imaging industry, in which university researchers develop algorithms that are eventually deployed in commercial medical imaging equipment. The purpose of this paper is to discuss opportunities for third-parties to develop advanced reconstruction and threat detection algorithms.« less

  8. Final Technical Report. Project Boeing SGS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bell, Thomas E.

    Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less

  9. Applications of Quantum Cascade Laser Scanners for Remote Detection of Chemical and Biological Threats and Weapons of Mass Destruction

    DTIC Science & Technology

    2014-07-09

    Rivera. Highly Sensitive Filter Paper Substrate for SERS Trace Explosives Detection , International Journal of Spectroscopy, (09 2012): 0. doi: 10.1155...Highly Sensitive Filter Paper Substrate for SERS Field Detection of Trace Threat Chemicals”, PITTCON-2013: Forensic Analysis in the Lab and Crime Scene...the surface. In addition, built-in algorithms were used for nearly real-time sample detection . Trace and bulk concentrations of the other substances

  10. Satellite Survivability Module

    NASA Astrophysics Data System (ADS)

    Buehler, P.; Smith, J.

    The Satellite Survivability Module (SSM) is an end-to-end, physics-based, performance prediction model for directed energy engagement of orbiting spacecraft. SSM was created as an add-on module for the Satellite Tool Kit (STK). Two engagement types are currently supported: laser engagement of the focal plane array of an imaging spacecraft; and Radio Frequency (RF) engagement of spacecraft components. This paper will focus on the laser engagement scenario, the process by which it is defined, and how we use this tool to support a future laser threat detection system experiment. For a laser engagement, the user creates a spacecraft, defines its optical system, adds any protection techniques used by the optical system, introduces a laser threat, and then defines the atmosphere through which the laser will pass. SSM models the laser engagement and its impact on the spacecraft's optical system using four impact levels: degradation, saturation, damage, and destruction. Protection techniques, if employed, will mitigate engagement effects. SSM currently supports two laser protection techniques. SSM allows the user to create and implement a variety of "what if" scenarios. Satellites can be placed in a variety of orbits. Threats can be placed anywhere on the Earth or, for version 2.0, on other satellites. Satellites and threats can be mixed and matched to examine possibilities. Protection techniques for a particular spacecraft can be turned on or off individually; and can be arranged in any order to simulate more complicated protection schemes. Results can be displayed as 2-D or 3-D visualizations, or as textual reports. A new report feature available in version 2.0 will allow laser effects data to be displayed dynamically during scenario execution. In order to test SSM capabilities, the Ball team used SSM to model several engagement scenarios for our future laser threat detection system experiment. Actual test sites, along with actual laser, optics, and detector characteristics were entered into SSM to determine what effects we can expect to see, and to what extent. We concluded that SSM results are accurate when compared to actual field test results. The work is currently funded by the Air Force Research Laboratory, Space Vehicles directorate at Kirtland AFB, New Mexico, under contract number FA9453-06-C-0371.

  11. Threat in dreams: an adaptation?

    PubMed

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, p<.00012). Contrary to TST's predictions, the SA participants reported significantly fewer threat dreams (chi([1,N=287])(2)=6.11, p<.0134), and did not differ from the Welsh participants in responses to dream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  12. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Khan, M. Umer

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues,more » motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.« less

  13. A Capsule-Type Electromagnetic Acoustic Transducer for Fast Screening of External Corrosion in Nonmagnetic Pipes.

    PubMed

    Li, Yong; Cai, Rui; Yan, Bei; Zainal Abidin, Ilham Mukriz; Jing, Haoqing; Wang, Yi

    2018-05-28

    For fuel transmission and structural strengthening, small-diameter pipes of nonmagnetic materials are extensively adopted in engineering fields including aerospace, energy, transportation, etc. However, the hostile and corrosive environment leaves them vulnerable to external corrosion which poses a severe threat to structural integrity of pipes. Therefore, it is imperative to nondestructively detect and evaluate the external corrosion in nonmagnetic pipes. In light of this, a capsule-type Electromagnetic Acoustic Transducer (EMAT) for in-situ nondestructive evaluation of nonmagnetic pipes and fast screening of external corrosion is proposed in this paper. A 3D hybrid model for efficient prediction of responses from the proposed transducer to external corrosion is established. Closed-form expressions of field quantities of electromagnetics and EMAT signals are formulated. Simulations based on the hybrid model indicate feasibility of the proposed transducer in detection and evaluation of external corrosion in nonmagnetic pipes. In parallel, experiments with the fabricated transducer have been carried out. Experimental results are supportive of the conclusion drawn from simulations. The investigation via simulations and experiments implies that the proposed capsule-type EMAT is capable of fast screening of external corrosion, which is beneficial to the in-situ nondestructive evaluation of small-diameter nonmagnetic pipes.

  14. Object detection in MOUT: evaluation of a hybrid approach for confirmation and rejection of object detection hypotheses

    NASA Astrophysics Data System (ADS)

    Manger, Daniel; Metzler, Jürgen

    2014-03-01

    Military Operations in Urban Terrain (MOUT) require the capability to perceive and to analyze the situation around a patrol in order to recognize potential threats. A permanent monitoring of the surrounding area is essential in order to appropriately react to the given situation, where one relevant task is the detection of objects that can pose a threat. Especially the robust detection of persons is important, as in MOUT scenarios threats usually arise from persons. This task can be supported by image processing systems. However, depending on the scenario, person detection in MOUT can be challenging, e.g. persons are often occluded in complex outdoor scenes and the person detection also suffers from low image resolution. Furthermore, there are several requirements on person detection systems for MOUT such as the detection of non-moving persons, as they can be a part of an ambush. Existing detectors therefore have to operate on single images with low thresholds for detection in order to not miss any person. This, in turn, leads to a comparatively high number of false positive detections which renders an automatic vision-based threat detection system ineffective. In this paper, a hybrid detection approach is presented. A combination of a discriminative and a generative model is examined. The objective is to increase the accuracy of existing detectors by integrating a separate hypotheses confirmation and rejection step which is built by a discriminative and generative model. This enables the overall detection system to make use of both the discriminative power and the capability to detect partly hidden objects with the models. The approach is evaluated on benchmark data sets generated from real-world image sequences captured during MOUT exercises. The extension shows a significant improvement of the false positive detection rate.

  15. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  16. Measuring attentional biases for threat in children and adults.

    PubMed

    LoBue, Vanessa

    2014-10-19

    Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.

  17. What We Are Watching-Top Global Infectious Disease Threats, 2013-2016: An Update from CDC's Global Disease Detection Operations Center.

    PubMed

    Christian, Kira A; Iuliano, A Danielle; Uyeki, Timothy M; Mintz, Eric D; Nichol, Stuart T; Rollin, Pierre; Staples, J Erin; Arthur, Ray R

    To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the "detect" element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better "Prevent, Detect, and Respond" to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis.

  18. Violence prevention education program for psychiatric outpatient departments.

    PubMed

    Feinstein, Robert E

    2014-10-01

    Approximately 40 % of psychiatrists and up to 64 % of psychiatric residents have been physically assaulted. Ranges of 72-96 % of psychiatric residents in various studies have been verbally threatened. As violence risk occurs in outpatient settings, our department developed a quality and safety curriculum designed to prepare psychiatric residents and staff to optimally respond to aggressive outpatients and violence threats or events. In 2011 and 2012, we offered an 8-part violence prevention performance improvement curriculum/program including (1) situational awareness/creating a safe environment; (2) violence de-escalation training; (3) violence risk assessment training, use of risk assessment tools, and medical record documentation; (4) violence safety discharge planning; (5) legal issues and violence; (6) "shots fired on campus" video/discussion; (7) "2011 violence threat simulation" video/discussion; and (8) violence threat simulation exercise. This program was offered to approximately 60 psychiatric residents/staff in each year. We obtained qualitative comments about the entire program and data from 2 years of post-event surveys on the usefulness of the "violence threat simulation exercise." The large majority of comments about program elements 1 to 7 were positive. In 2011 and 2012, respectively, 76 and 86 % of participants responded to a post-event survey of the violence threat simulation exercise; 90 and 88 % of participants, respectively, reported the simulation to be very helpful/somewhat helpful; and 86 and 82 % of participants, respectively, reported feeling much better/better prepared to deal with a violent event. Although some participants experienced anxiety, sleep disturbances, increase in work safety concerns, and/or traumatic memories, the majority reported no post-simulation symptoms (72 and 80 %, respectively). Although we are unable to demonstrate that this program effectively prevents violence, the overall positive response from participants encourages us to continue developing our quality and safety program and to offer our easily reproducible and modifiable curriculum to others.

  19. A Bayesian system to detect and characterize overlapping outbreaks.

    PubMed

    Aronis, John M; Millett, Nicholas E; Wagner, Michael M; Tsui, Fuchiang; Ye, Ye; Ferraro, Jeffrey P; Haug, Peter J; Gesteland, Per H; Cooper, Gregory F

    2017-09-01

    Outbreaks of infectious diseases such as influenza are a significant threat to human health. Because there are different strains of influenza which can cause independent outbreaks, and influenza can affect demographic groups at different rates and times, there is a need to recognize and characterize multiple outbreaks of influenza. This paper describes a Bayesian system that uses data from emergency department patient care reports to create epidemiological models of overlapping outbreaks of influenza. Clinical findings are extracted from patient care reports using natural language processing. These findings are analyzed by a case detection system to create disease likelihoods that are passed to a multiple outbreak detection system. We evaluated the system using real and simulated outbreaks. The results show that this approach can recognize and characterize overlapping outbreaks of influenza. We describe several extensions that appear promising. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Automatic Implementation of Prony Analysis for Electromechanical Mode Identification from Phasor Measurements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Ning; Huang, Zhenyu; Tuffner, Francis K.

    2010-07-31

    Small signal stability problems are one of the major threats to grid stability and reliability. Prony analysis has been successfully applied on ringdown data to monitor electromechanical modes of a power system using phasor measurement unit (PMU) data. To facilitate an on-line application of mode estimation, this paper developed a recursive algorithm for implementing Prony analysis and proposed an oscillation detection method to detect ringdown data in real time. By automatically detect ringdown data, the proposed method helps guarantee that Prony analysis is applied properly and timely on the ringdown data. Thus, the mode estimation results can be performed reliablymore » and timely. The proposed method is tested using Monte Carlo simulations based on a 17-machine model and is shown to be able to properly identify the oscillation data for on-line application of Prony analysis.« less

  1. Microorganisms detection on substrates using QCL spectroscopy

    NASA Astrophysics Data System (ADS)

    Padilla-Jiménez, Amira C.; Ortiz-Rivera, William; Castro-Suarez, John R.; Ríos-Velázquez, Carlos; Vázquez-Ayala, Iris; Hernández-Rivera, Samuel P.

    2013-05-01

    Recent investigations have focused on the improvement of rapid and accurate methods to develop spectroscopic markers of compounds constituting microorganisms that are considered biological threats. Quantum cascade lasers (QCL) systems have revolutionized many areas of research and development in defense and security applications, including his area of research. Infrared spectroscopy detection based on QCL was employed to acquire mid infrared (MIR) spectral signatures of Bacillus thuringiensis (Bt), Escherichia coli (Ec) and Staphylococcus epidermidis (Se), which were used as biological agent simulants of biothreats. The experiments were carried out in reflection mode on various substrates such as cardboard, glass, travel baggage, wood and stainless steel. Chemometrics statistical routines such as principal component analysis (PCA) regression and partial least squares-discriminant analysis (PLS-DA) were applied to the recorded MIR spectra. The results show that the infrared vibrational techniques investigated are useful for classification/detection of the target microorganisms on the types of substrates studied.

  2. Cyber threat impact assessment and analysis for space vehicle architectures

    NASA Astrophysics Data System (ADS)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  3. Real-time airborne gamma-ray background estimation using NASVD with MLE and radiation transport for calibration

    NASA Astrophysics Data System (ADS)

    Kulisek, J. A.; Schweppe, J. E.; Stave, S. C.; Bernacki, B. E.; Jordan, D. V.; Stewart, T. N.; Seifert, C. E.; Kernan, W. J.

    2015-06-01

    Helicopter-mounted gamma-ray detectors can provide law enforcement officials the means to quickly and accurately detect, identify, and locate radiological threats over a wide geographical area. The ability to accurately distinguish radiological threat-generated gamma-ray signatures from background gamma radiation in real time is essential in order to realize this potential. This problem is non-trivial, especially in urban environments for which the background may change very rapidly during flight. This exacerbates the challenge of estimating background due to the poor counting statistics inherent in real-time airborne gamma-ray spectroscopy measurements. To address this challenge, we have developed a new technique for real-time estimation of background gamma radiation from aerial measurements without the need for human analyst intervention. The method can be calibrated using radiation transport simulations along with data from previous flights over areas for which the isotopic composition need not be known. Over the examined measured and simulated data sets, the method generated accurate background estimates even in the presence of a strong, 60Co source. The potential to track large and abrupt changes in background spectral shape and magnitude was demonstrated. The method can be implemented fairly easily in most modern computing languages and environments.

  4. A Novel In Situ Simulation Intervention Used to Mitigate an Outbreak of Methicillin-Resistant Staphylococcus aureus in a Neonatal Intensive Care Unit.

    PubMed

    Gibbs, Kathleen; DeMaria, Samuel; McKinsey, Scarlett; Fede, Andrea; Harrington, Anne; Hutchison, Deborah; Torchen, Carol; Levine, Adam; Goldberg, Andrew

    2018-03-01

    To describe the successful implementation of an in situ simulation program to diagnose and correct latent safety threats in a level 4 neonatal intensive care unit (NICU) to mitigate a methicillin-resistant Staphylococcus aureus (MRSA) outbreak. An investigational report describes a simulation intervention that occurred during a 4-month MRSA outbreak in a single-center, 46-bed, newly renovated level 4 NICU. The simulation program was developed for all NICU providers in which they were exposed to a 30-minute in situ human simulation intervention that included education, evaluation, and debriefing to resolve perceived or observed latent safety threats. The primary study outcome was improved hand hygiene compliance and an enhanced estimate of the culture of safety during a 6-month period. A total of 99 healthcare providers including physicians, nurses, respiratory therapists, and environmental service workers completed the course. Before the simulation intervention, there were 18 patients colonized or infected with a single MRSA clone; after the intervention, there were no new episodes of colonization or infection. An in situ, simulation-based intervention can counter threats to patient safety related to workflow and lapses in infection control practices and improve patient outcomes. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    PubMed

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  6. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis

    PubMed Central

    Holgado-Tello, Fco. P.; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A.

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity. PMID:27378991

  7. Explosive and chemical threat detection by surface-enhanced Raman scattering: a review.

    PubMed

    Hakonen, Aron; Andersson, Per Ola; Stenbæk Schmidt, Michael; Rindzevicius, Tomas; Käll, Mikael

    2015-09-17

    Acts of terror and warfare threats are challenging tasks for defense agencies around the world and of growing importance to security conscious policy makers and the general public. Explosives and chemical warfare agents are two of the major concerns in this context, as illustrated by the recent Boston Marathon bombing and nerve gas attacks on civilians in the Middle East. To prevent such tragic disasters, security personnel must be able to find, identify and deactivate the threats at multiple locations and levels. This involves major technical and practical challenges, such as detection of ultra-low quantities of hazardous compounds at remote locations for anti-terror purposes and monitoring of environmental sanitation of dumped or left behind toxic substances and explosives. Surface-enhanced Raman scattering (SERS) is one of todays most interesting and rapidly developing methods for label-free ultrasensitive vibrational "fingerprinting" of a variety of molecular compounds. Performance highlights include attomolar detection of TNT and DNT explosives, a sensitivity that few, if any, other technique can compete with. Moreover, instrumentation needed for SERS analysis are becoming progressively better, smaller and cheaper, and can today be acquired for a retail price close to 10,000 US$. This contribution aims to give a comprehensive overview of SERS as a technique for detection of explosives and chemical threats. We discuss the prospects of SERS becoming a major tool for convenient in-situ threat identification and we summarize existing SERS detection methods and substrates with particular focus on ultra-sensitive real-time detection. General concepts, detection capabilities and perspectives are discussed in order to guide potential users of the technique for homeland security and anti-warfare purposes. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. The reinterpretation of dreams: an evolutionary hypothesis of the function of dreaming.

    PubMed

    Revonsuo, A

    2000-12-01

    Several theories claim that dreaming is a random by-product of REM sleep physiology and that it does not serve any natural function. Phenomenal dream content, however, is not as disorganized as such views imply. The form and content of dreams is not random but organized and selective: during dreaming, the brain constructs a complex model of the world in which certain types of elements, when compared to waking life, are underrepresented whereas others are over represented. Furthermore, dream content is consistently and powerfully modulated by certain types of waking experiences. On the basis of this evidence, I put forward the hypothesis that the biological function of dreaming is to simulate threatening events, and to rehearse threat perception and threat avoidance. To evaluate this hypothesis, we need to consider the original evolutionary context of dreaming and the possible traces it has left in the dream content of the present human population. In the ancestral environment human life was short and full of threats. Any behavioral advantage in dealing with highly dangerous events would have increased the probability of reproductive success. A dream-production mechanism that tends to select threatening waking events and simulate them over and over again in various combinations would have been valuable for the development and maintenance of threat-avoidance skills. Empirical evidence from normative dream content, children's dreams, recurrent dreams, nightmares, post traumatic dreams, and the dreams of hunter-gatherers indicates that our dream-production mechanisms are in fact specialized in the simulation of threatening events, and thus provides support to the threat simulation hypothesis of the function of dreaming.

  9. Countering MANPADS: study of new concepts and applications: part two

    NASA Astrophysics Data System (ADS)

    Maltese, Dominique; Vergnolle, Jean-François; Aragones, Julien; Renaudat, Mathieu

    2007-04-01

    The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of protecting systems (i.e. Directed Infra Red Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, identification, targeting and jamming capabilities to face MANPAD threats. Besides, Multiple Missiles attacks become more and more current scenarios to deal with. In this paper, a practical example of DIRCM systems under study at SAGEM DEFENSE & SECURITY Company is presented. The article is the continuation of a previous SPIE one. Self-protection solutions include built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Targets scenarios including multiple threats are considered to design systems architectures. In a first step, the article reminds the context, current and future threats (IR seekers of different generations...), and scenarios for system definition. Then, it focuses on potential self-protection systems under study at SAGEM DEFENSE & SECURITY Company. Different strategies including target identification, multi band laser and active imagery have been previously studied in order to design DIRCM System solutions. Thus, results of self-protection scenarios are provided for different MANPAD scenarios to highlight key problems to solve. Data have been obtained from simulation software modeling full DIRCM systems architectures on technical and operational scenarios (parametric studies).

  10. SSI-ARC Flight Test 3 Data Review

    NASA Technical Reports Server (NTRS)

    Gong, Chester; Wu, Minghong G.

    2015-01-01

    The "Unmanned Aircraft System (UAS) Integration into the National Airspace System (NAS)" Project conducted flight test program, referred to as Flight Test 3, at Armstrong Flight Research Center from June - August 2015. Four flight test days were dedicated to the NASA Ames-developed Detect and Avoid (DAA) System referred to as Autoresolver. The encounter scenarios, which involved NASA's Ikhana UAS and a manned intruder aircraft, were designed to collect data on DAA system performance in real-world conditions and uncertainties with four different surveillance sensor systems. Resulting flight test data and analysis results will be used to evaluate the DAA system performance (e.g., trajectory prediction accuracy, threat detection) and to add fidelity to simulation models used to inform Minimum Operating Performance Standards (MOPS) for integrating UAS into routine NAS operations.

  11. Insider Threat - Material Control and Accountability Mitigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur bymore » an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.« less

  12. A Neutron Based Interrogation System For SNM In Cargo

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kane, Steven Z.; Koltick, David S.

    A complete system has been simulated using experimentally obtained input parameters for the detection of special nuclear materials (SNM). A variation of the associated particle imaging (API) technique, referred to as reverse associated particle imaging detection (RAPID), has been developed in the context of detecting 5-kg spherical samples of U-235 in cargo. The RAPID technique allows for the interrogation of containers at neutron production rates between {approx}1x10{sup 8} neutrons/s and {approx}3x10{sup 8} neutrons/s. The merit of performance for the system is the time to detect the threat material with 95% probability of detection and 10{sup -4} false positive rate permore » interrogated voxel of cargo. Detection times of 5 minutes were found for a maximally loaded cargo container uniformly filled with iron and as low as 1 second in containers loaded to 1/4 of full capacity with either iron or wood. The worse case system performance, 30 minutes interrogation time, occurs for a maximally loaded container containing wood at 0.4 g/cm{sup 3}.« less

  13. Detecting insider activity using enhanced directory virtualization.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shin, Dongwan; Claycomb, William R.

    2010-07-01

    Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less

  14. NIITEK-NVESD AMDS program and interim field-ready system

    NASA Astrophysics Data System (ADS)

    Hibbard, Mark W.; Etebari, Ali

    2010-04-01

    NIITEK (Non-Intrusive Inspection Technology, Inc) develops and fields vehicle-mounted mine and buried threat detection systems. Since 2003, the NIITEK has developed and tested a remote robot-mounted mine detection system for use in the NVESD AMDS program. This paper will discuss the road map of development since the outset of the program, including transition from a data collection platform towards a militarized field-ready system for immediate use as a remote countermine and buried threat detection solution with real-time autonomous threat classification. The detection system payload has been integrated on both the iRobot Packbot and the Foster-Miller Talon robot. This brief will discuss the requirements for a successful near-term system, the progressive development of the system, our current real-time capabilities, and our planned upgrades for moving into and supporting field testing, evaluation, and ongoing operation.

  15. Escorting commercial aircraft to reduce the MANPAD threat

    NASA Astrophysics Data System (ADS)

    Hock, Nicholas; Richardson, M. A.; Butters, B.; Walmsley, R.; Ayling, R.; Taylor, B.

    2005-11-01

    This paper studies the Man-Portable Air Defence System (MANPADS) threat against large commercial aircraft using flight profile analysis, engagement modelling and simulation. Non-countermeasure equipped commercial aircraft are at risk during approach and departure due to the large areas around airports that would need to be secured to prevent the use of highly portable and concealable MANPADs. A software model (CounterSim) has been developed and was used to simulate an SA-7b and large commercial aircraft engagement. The results of this simulation have found that the threat was lessened when a escort fighter aircraft is flown in the 'Centreline Low' position, or 25 m rearward from the large aircraft and 15 m lower, similar to the Air-to-Air refuelling position. In the model a large aircraft on approach had a 50% chance of being hit or having a near miss (within 20m) whereas escorted by a countermeasure equipped F-16 in the 'Centerline Low' position, this was reduced to only 14%. Departure is a particularly vulnerable time for large aircraft due to slow climb rates and the inability to fly evasive manoeuvres. The 'Centreline Low' escorted departure greatly reduced the threat to 16% hit or near miss from 62% for an unescorted heavy aircraft. Overall the CounterSim modelling has showed that escorting a civilian aircraft on approach and departure can reduce the MANPAD threat by 3 to 4 times.

  16. An Initial Investigation into the Role of Stereotype Threat in the Test Performance of College Students with Learning Disabilities

    ERIC Educational Resources Information Center

    May, Alison L.; Stone, C. Addison

    2014-01-01

    In a quasi-experimental evaluation of the possible role of stereotype threat in the academic performance of college students with learning disabilities (LD), students with (N = 29) and without (N = 62) identified LD took a simulated Verbal GRE® task in one of two conditions modeled after those used in past stereotype threat (ST) research. The task…

  17. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models,the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of forecasts become available.

  18. Automated recognition and tracking of aerosol threat plumes with an IR camera pod

    NASA Astrophysics Data System (ADS)

    Fauth, Ryan; Powell, Christopher; Gruber, Thomas; Clapp, Dan

    2012-06-01

    Protection of fixed sites from chemical, biological, or radiological aerosol plume attacks depends on early warning so that there is time to take mitigating actions. Early warning requires continuous, autonomous, and rapid coverage of large surrounding areas; however, this must be done at an affordable cost. Once a potential threat plume is detected though, a different type of sensor (e.g., a more expensive, slower sensor) may be cued for identification purposes, but the problem is to quickly identify all of the potential threats around the fixed site of interest. To address this problem of low cost, persistent, wide area surveillance, an IR camera pod and multi-image stitching and processing algorithms have been developed for automatic recognition and tracking of aerosol plumes. A rugged, modular, static pod design, which accommodates as many as four micro-bolometer IR cameras for 45deg to 180deg of azimuth coverage, is presented. Various OpenCV1 based image-processing algorithms, including stitching of multiple adjacent FOVs, recognition of aerosol plume objects, and the tracking of aerosol plumes, are presented using process block diagrams and sample field test results, including chemical and biological simulant plumes. Methods for dealing with the background removal, brightness equalization between images, and focus quality for optimal plume tracking are also discussed.

  19. Investigation and simulation on fate and transport of leachate from a livestock mortality burial site

    NASA Astrophysics Data System (ADS)

    Lim, J.-W.; Lee, S.; Kaown, D.; Lee, K.-K.

    2012-04-01

    Leachate released from livestock mortality burial during decomposition of carcasses can be a threat to groundwater quality. Monitoring study of groundwater quality in the vicinity of livestock burial reported that a caution is needed to prevent contamination of both groundwater and soil, especially in case of mortality burial (Glanville, 2000; Ritter and Chirnside, 1995). The average concentration of ammonium-N and chloride is reported to be 12,600 mg/l and 2,600 mg/l respectively, which is 2-4 times higher than leachate from earthen manure storages and landfills (Pratt, 2009). To assess the potential threat of burial leachate to groundwater quality, simulation of leachate transport is performed based on a hydrogeologic model of an actual mortality burial site. At the burial site of this study located at a hill slope, two mortality pits have been constructed along the slope to bury swine during the outbreak of nationwide foot and mouth disease(FMD) in 2011. Though the pits were partially lined with impermeable material, potential threat of leachate leakage is still in concern. Electrical resistivity survey has been performed several times at the burial site and abnormal resistivity zones have been detected which are supposed as leachate leakage from the burial. Subsurface model including unsaturated zone is built since the leakage is supposed to occur mainly in lateral of the burial pits which is in unsaturated zone. When examining leachate transport, main focus is given to a nitrogenous compound and colloidal character of FMD virus. Nitrifying of denitrifying characters of nitrogenous compound and transport of colloidal particles are affected mainly by soil water content in unsaturated zone. Thus, the fate and transport of burial leachate affected by seasonal variation in recharge pattern is investigated.

  20. A Novel Fiber Optic Based Surveillance System for Prevention of Pipeline Integrity Threats.

    PubMed

    Tejedor, Javier; Macias-Guarasa, Javier; Martins, Hugo F; Piote, Daniel; Pastor-Graells, Juan; Martin-Lopez, Sonia; Corredera, Pedro; Gonzalez-Herraez, Miguel

    2017-02-12

    This paper presents a novel surveillance system aimed at the detection and classification of threats in the vicinity of a long gas pipeline. The sensing system is based on phase-sensitive optical time domain reflectometry ( ϕ -OTDR) technology for signal acquisition and pattern recognition strategies for threat identification. The proposal incorporates contextual information at the feature level and applies a system combination strategy for pattern classification. The contextual information at the feature level is based on the tandem approach (using feature representations produced by discriminatively-trained multi-layer perceptrons) by employing feature vectors that spread different temporal contexts. The system combination strategy is based on a posterior combination of likelihoods computed from different pattern classification processes. The system operates in two different modes: (1) machine + activity identification, which recognizes the activity being carried out by a certain machine, and (2) threat detection, aimed at detecting threats no matter what the real activity being conducted is. In comparison with a previous system based on the same rigorous experimental setup, the results show that the system combination from the contextual feature information improves the results for each individual class in both operational modes, as well as the overall classification accuracy, with statistically-significant improvements.

  1. Security systems engineering overview

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Steele, B.J.

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less

  2. Detection and identification of human targets in radar data

    NASA Astrophysics Data System (ADS)

    Gürbüz, Sevgi Z.; Melvin, William L.; Williams, Douglas B.

    2007-04-01

    Radar offers unique advantages over other sensors, such as visual or seismic sensors, for human target detection. Many situations, especially military applications, prevent the placement of video cameras or implantment seismic sensors in the area being observed, because of security or other threats. However, radar can operate far away from potential targets, and functions during daytime as well as nighttime, in virtually all weather conditions. In this paper, we examine the problem of human target detection and identification using single-channel, airborne, synthetic aperture radar (SAR). Human targets are differentiated from other detected slow-moving targets by analyzing the spectrogram of each potential target. Human spectrograms are unique, and can be used not just to identify targets as human, but also to determine features about the human target being observed, such as size, gender, action, and speed. A 12-point human model, together with kinematic equations of motion for each body part, is used to calculate the expected target return and spectrogram. A MATLAB simulation environment is developed including ground clutter, human and non-human targets for the testing of spectrogram-based detection and identification algorithms. Simulations show that spectrograms have some ability to detect and identify human targets in low noise. An example gender discrimination system correctly detected 83.97% of males and 91.11% of females. The problems and limitations of spectrogram-based methods in high clutter environments are discussed. The SNR loss inherent to spectrogram-based methods is quantified. An alternate detection and identification method that will be used as a basis for future work is proposed.

  3. Regulatory Underpinnings of Global Health Security: FDA's Roles in Preventing, Detecting, and Responding to Global Health Threats

    PubMed Central

    Bond, Katherine C.; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas—antimicrobial resistance, food safety, and supply chain integrity—in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats. PMID:25254912

  4. Regulatory underpinnings of Global Health security: FDA's roles in preventing, detecting, and responding to global health threats.

    PubMed

    Courtney, Brooke; Bond, Katherine C; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas-antimicrobial resistance, food safety, and supply chain integrity-in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats.

  5. A combined emitter threat assessment method based on ICW-RCM

    NASA Astrophysics Data System (ADS)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  6. High-reliability emergency response teams in the hospital: improving quality and safety using in situ simulation training.

    PubMed

    Wheeler, Derek S; Geis, Gary; Mack, Elizabeth H; LeMaster, Tom; Patterson, Mary D

    2013-06-01

    In situ simulation training is a team-based training technique conducted on actual patient care units using equipment and resources from that unit, and involving actual members of the healthcare team. We describe our experience with in situ simulation training in a major children's medical centre. In situ simulations were conducted using standardised scenarios approximately twice per month on inpatient hospital units on a rotating basis. Simulations were scheduled so that each unit participated in at least two in situ simulations per year. Simulations were conducted on a revolving schedule alternating on the day and night shifts and were unannounced. Scenarios were preselected to maximise the educational experience, and frequently involved clinical deterioration to cardiopulmonary arrest. We performed 64 of the scheduled 112 (57%) in situ simulations on all shifts and all units over 21 months. We identified 134 latent safety threats and knowledge gaps during these in situ simulations, which we categorised as medication, equipment, and/or resource/system threats. Identification of these errors resulted in modification of systems to reduce the risk of error. In situ simulations also provided a method to reinforce teamwork behaviours, such as the use of assertive statements, role clarity, performance of frequent updating, development of a shared mental model, performance of independent double checks of high-risk medicines, and overcoming authority gradients between team members. Participants stated that the training programme was effective and did not disrupt patient care. In situ simulations can identify latent safety threats, identify knowledge gaps, and reinforce teamwork behaviours when used as part of an organisation-wide safety programme.

  7. Factors increasing snake detection and perceived threat in captive rhesus macaques (Macaca mulatta).

    PubMed

    Etting, Stephanie F; Isbell, Lynne A; Grote, Mark N

    2014-02-01

    The primary predators of primates are all ambush hunters, and yet felids, raptors, and snakes differ in aspects of their ecology that affect the evasive strategies of their primate prey. Felids and raptors can traverse long distances quickly, thus the urgency of threat they present increases as they come closer in proximity to primates. In contrast, snakes do not move rapidly over long distances, and so primates may be reasonably safe even at close distances provided snakes can be detected and monitored. We investigated the ability of captive rhesus macaques (Macaca mulatta) to detect snakes at distances ranging from 15 to 1.5 m. We also examined variation in intensity of perceived threat by applying a Hidden Markov Model to infer changes in underlying state from observable behaviors, that is, increased attention and mobbing. We found that the macaques often failed to detect snake models but that closer proximity improved snake detection, which is necessary before threat can be perceived. We also found that having only one individual in fairly close proximity (≤ 7.5 m) was sufficient to alert the rest of the group and so the chances of detection did not increase with increasing group size. Finally, we found that when the snakes were perceived, they did not elicit greater intensity of response with closer proximity. These results provide evidence that the threat from snakes is greatest when they are in proximity to primates but are unseen. When snakes are seen, however, distance appears not to affect primates' perceived risk, in contrast to their perceived risk from raptors and felids. © 2013 Wiley Periodicals, Inc.

  8. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  9. Rapid detection of Bacillus anthracis spores using a super-paramagnetic lateral-flow immunological detection system.

    PubMed

    Wang, Dian-Bing; Tian, Bo; Zhang, Zhi-Ping; Deng, Jiao-Yu; Cui, Zong-Qiang; Yang, Rui-Fu; Wang, Xu-Ying; Wei, Hong-Ping; Zhang, Xian-En

    2013-04-15

    There is an urgent need for convenient, sensitive, and specific methods to detect the spores of Bacillus anthracis, the causative agent of anthrax, because of the bioterrorism threat posed by this bacterium. In this study, we firstly develop a super-paramagnetic lateral-flow immunological detection system for B. anthracis spores. This system involves the use of a portable magnetic assay reader, super-paramagnetic iron oxide particles, lateral-flow strips and two different monoclonal antibodies directed against B. anthracis spores. This detection system specifically recognises as few as 400 pure B. anthracis spores in 30 min. This system has a linear range of 4×10³-10⁶ CFU ml⁻¹ and reproducible detection limits of 200 spores mg⁻¹ milk powder and 130 spores mg⁻¹ soil for simulated samples. In addition, this approach shows no obvious cross-reaction with other related Bacillus spores, even at high concentrations, and has no significant dependence on the duration of the storage of the immunological strips. Therefore, this super-paramagnetic lateral-flow immunological detection system is a promising tool for the rapid and sensitive detection of Bacillus anthracis spores under field conditions. Copyright © 2012 Elsevier B.V. All rights reserved.

  10. Personal privacy, information assurance, and the threat posed by malware techology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  11. Evidence for aversive withdrawal response to own errors.

    PubMed

    Hochman, Eldad Yitzhak; Milman, Valery; Tal, Liron

    2017-10-01

    Recent model suggests that error detection gives rise to defensive motivation prompting protective behavior. Models of active avoidance behavior predict it should grow larger with threat imminence and avoidance. We hypothesized that in a task requiring left or right key strikes, error detection would drive an avoidance reflex manifested by rapid withdrawal of an erring finger growing larger with threat imminence and avoidance. In experiment 1, three groups differing by error-related threat imminence and avoidance performed a flanker task requiring left or right force sensitive-key strikes. As predicted, errors were followed by rapid force release growing faster with threat imminence and opportunity to evade threat. In experiment 2, we established a link between error key release time (KRT) and the subjective sense of inner-threat. In a simultaneous, multiple regression analysis of three error-related compensatory mechanisms (error KRT, flanker effect, error correction RT), only error KRT was significantly associated with increased compulsive checking tendencies. We propose that error response withdrawal reflects an error-withdrawal reflex. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Chemical and biological threat-agent detection using electrophoresis-based lab-on-a-chip devices.

    PubMed

    Borowsky, Joseph; Collins, Greg E

    2007-10-01

    The ability to separate complex mixtures of analytes has made capillary electrophoresis (CE) a powerful analytical tool since its modern configuration was first introduced over 25 years ago. The technique found new utility with its application to the microfluidics based lab-on-a-chip platform (i.e., microchip), which resulted in ever smaller footprints, sample volumes, and analysis times. These features, coupled with the technique's potential for portability, have prompted recent interest in the development of novel analyzers for chemical and biological threat agents. This article will comment on three main areas of microchip CE as applied to the separation and detection of threat agents: detection techniques and their corresponding limits of detection, sampling protocol and preparation time, and system portability. These three areas typify the broad utility of lab-on-a-chip for meeting critical, present-day security, in addition to illustrating areas wherein advances are necessary.

  13. Analyzing the Interdiction of Sea-Borne Threats Using Simulation Optimization

    DTIC Science & Technology

    2007-03-01

    Low Threat Interdiction Operations................... 56 Table 4-4: Resource Utilization under Medium Threat Interdiction Operations...1.1.1 Emerging Concern “Over 90 percent of the nation’s $5.3 billion annual investment in the TSA goes to aviation—to fight the last war.… While...using varying mission ops tempos for the interdiction model and the competing mission model. Specifically, we look at low, medium , and high asset

  14. The Threat Detection System that Cried Wolf: Reconciling Developers with Operators

    DTIC Science & Technology

    2017-01-01

    generating false alarms when true threats are not present. As a result, operators lose faith in the systems—ignoring them or even turning them off and...taking the chance that a true threat will not appear. This article reviews statistical concepts to reconcile the performance metrics that summarize a...the fraction of true threats for which the system correctly declares an alarm. Conversely, Pfa describes the fraction of true clutter ( true non

  15. Laser Threat Analysis System (LTAS)

    NASA Astrophysics Data System (ADS)

    Pfaltz, John M.; Richardson, Christina E.; Ruiz, Abel; Barsalou, Norman; Thomas, Robert J.

    2002-11-01

    LTAS is a totally integrated modeling and simulation environment designed for the purpose of ascertaining the susceptibility of Air Force pilots and air crews to optical radiation threats. Using LTAS, mission planners can assess the operational impact of optically directed energy weapons and countermeasures. Through various scenarios, threat analysts are able to determine the capability of laser threats and their impact on operational missions including the air crew's ability to complete their mission effectively. Additionally, LTAS allows the risk of laser use on training ranges and the requirement for laser protection to be evaluated. LTAS gives mission planners and threat analysts complete control of the threat environment including threat parameter control and placement, terrain mapping (line-of-site), atmospheric conditions, and laser eye protection (LEP) selection. This report summarizes the design of the final version of LTAS, and the modeling methodologies implemented to accomplish analysis.

  16. National Security Science and Technology Initiative: Air Cargo Screening

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bingham, Philip R; White, Tim; Cespedes, Ernesto

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with fourmore » of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive benchmarks combinations, and conducted modeling and simulation studies to begin populating the matrix of commodities, threats, and detection technologies. (4) Designed and fabricated basic (homogeneous) commodity test pallets and fabricated inert stimulants to support experiments and to validate modeling/simulation results. (5) Developed/expanded the team's capabilities to conduct full-scale imaging (neutron and x-ray) experiments of air cargo commodities and explosive benchmarks. (6) Conducted experiments to improve the collection of trace particles of explosives from a variety of surfaces representative of air cargo materials by means of mechanical (air/vibration/pressure), thermal, and electrostatic methods. Air cargo screening is a difficult challenge that will require significant investment in both research and development to find a suitable solution to ensure the safety of passengers without significantly hindering the flow of commodities. The initiative funded by Battelle has positioned this group to make major contributions in meeting the air cargo challenge by developing collaborations, developing laboratory test systems, improving knowledge of the challenges (both technical and business) for air cargo screening, and increasing the understanding of the capabilities for current inspection methods (x-ray radiography, x-ray backscatter, etc.) and potential future inspection methods (neutron radiography, fusion of detector modalities, advanced trace detection, etc.). Lastly, air cargo screening is still an issue that will benefit from collaboration between Department of Energy Laboratories and Battelle. On January 7, 2010, DHS Secretary Napolitano joined White House Press Secretary Robert Gibbs and Assistant to the President for Counterterrorism and Homeland Security John Brennan to announce several recommendations DHS has made to the President for improving the technology and procedures used to protect air travel from acts of terrorism. (This announcement followed the 25 Dec'09 Delta/Northwest Airlines Flight 253 terror attack.) Secretary Napolitano outlined five recommendations DHS will pursue to enhance the safety of the traveling public. One of the five recommendations, read as follows: 'Establish a partnership on aviation security between DHS and the Department of Energy and its National Laboratories in order to develop new and more effective technologies to deter and disrupt known threats and proactively anticipate and protect against new ways by which terrorists could seek to board an aircraft.' In conclusion, it appears very timely that Battelle and its DOE lab partners initiated a serious collaboration on the air cargo topic, and that we should continue to work toward future collaboration in response to the government's needs.« less

  17. "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity": Correction.

    PubMed

    2018-04-01

    Reports an error in "The impact of uncertain threat on affective bias: Individual differences in response to ambiguity" by Maital Neta, Julie Cantelon, Zachary Haga, Caroline R. Mahoney, Holly A. Taylor and F. Caroline Davis ( Emotion , 2017[Dec], Vol 17[8], 1137-1143). In this article, the copyright attribution was incorrectly listed under the Creative Commons CC-BY license due to production-related error. The correct copyright should be "In the public domain." The online version of this article has been corrected. (The following abstract of the original article appeared in record 2017-40275-001.) Individuals who operate under highly stressful conditions (e.g., military personnel and first responders) are often faced with the challenge of quickly interpreting ambiguous information in uncertain and threatening environments. When faced with ambiguity, it is likely adaptive to view potentially dangerous stimuli as threatening until contextual information proves otherwise. One laboratory-based paradigm that can be used to simulate uncertain threat is known as threat of shock (TOS), in which participants are told that they might receive mild but unpredictable electric shocks while performing an unrelated task. The uncertainty associated with this potential threat induces a state of emotional arousal that is not overwhelmingly stressful, but has widespread-both adaptive and maladaptive-effects on cognitive and affective function. For example, TOS is thought to enhance aversive processing and abolish positivity bias. Importantly, in certain situations (e.g., when walking home alone at night), this anxiety can promote an adaptive state of heightened vigilance and defense mobilization. In the present study, we used TOS to examine the effects of uncertain threat on valence bias, or the tendency to interpret ambiguous social cues as positive or negative. As predicted, we found that heightened emotional arousal elicited by TOS was associated with an increased tendency to interpret ambiguous cues negatively. Such negative interpretations are likely adaptive in situations in which threat detection is critical for survival and should override an individual's tendency to interpret ambiguity positively in safe contexts. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  18. Radioactive threat detection using scintillant-based detectors

    NASA Astrophysics Data System (ADS)

    Chalmers, Alex

    2004-09-01

    An update to the performance of AS&E's Radioactive Threat Detection sensor technology. A model is presented detailing the components of the scintillant-based RTD system employed in AS&E products aimed at detecting radiological WMD. An overview of recent improvements in the sensors, electrical subsystems and software algorithms are presented. The resulting improvements in performance are described and sample results shown from existing systems. Advanced and future capabilities are described with an assessment of their feasibility and their application to Homeland Defense.

  19. Determining the Orbit Locations of Turkish Airborne Early Warning and Control Aircraft Over the Turkish Air Space

    DTIC Science & Technology

    2009-03-01

    and Control (AEW&C) Aircraft. AEW&C aircraft has become vital to detect low altitude threats that a ground RADAR cannot detect because of obstacles...HARM). The concern is to cover and detect the threats as far as possible from Turkey within a risk that the commander accepts. The goal is to help...decision makers decide how many AEW aircraft are needed to obtain full coverage. In order to provide optimum results, a Maximal Coverage Location

  20. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    PubMed

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  1. Analyzing Cyber-Physical Threats on Robotic Platforms.

    PubMed

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  2. Analyzing Cyber-Physical Threats on Robotic Platforms †

    PubMed Central

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  3. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    PubMed Central

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  4. Testosterone reduces conscious detection of signals serving social correction: implications for antisocial behavior.

    PubMed

    van Honk, Jack; Schutter, Dennis J L G

    2007-08-01

    Elevated levels of testosterone have repeatedly been associated with antisocial behavior, but the psychobiological mechanisms underlying this effect are unknown. However, testosterone is evidently capable of altering the processing of facial threat, and facial signals of fear and anger serve sociality through their higher-level empathy-provoking and socially corrective properties. We investigated the hypothesis that testosterone predisposes people to antisocial behavior by reducing conscious recognition of facial threat. In a within-subjects design, testosterone (0.5 mg) or placebo was administered to 16 female volunteers. Afterward, a task with morphed stimuli indexed their sensitivity for consciously recognizing the facial expressions of threat (disgust, fear, and anger) and nonthreat (surprise, sadness, and happiness). Testosterone induced a significant reduction in the conscious recognition of facial threat overall. Separate analyses for the three categories of threat faces indicated that this effect was reliable for angry facial expressions exclusively. This testosterone-induced impairment in the conscious detection of the socially corrective facial signal of anger may predispose individuals to antisocial behavior.

  5. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  6. Assessing the Two-Plasmon Decay Threat Through Simulations and Experiments on the NIKE Laser System

    NASA Astrophysics Data System (ADS)

    Phillips, Lee; Weaver, J. L.; Oh, J.; Schmitt, A. J.; Obenschain, S.

    2010-11-01

    NIKE is a Krf laser system at the Naval Research Laboratory used to explore hydrodynamic stability, equation of state, and other physics problems arising in IFE research. The comparatively short KrF wavelength is expected to raise the threshold of most parametric instabilities. We report on simulations performed using the FAST3d radiation hydrocode to design TPD experiments that have have allowed us to explore the validity of simple threshold formulas and help establish the accuracy of our simulations. We have also studied proposed high-gain shock ignition designs and devised experiments that can approach the relevant scalelength-temperature regime, allowing us a potential experimental method to study the LPI threat to these designs by direct observation. Through FAST3d studies of shock-ignited and conventional direct-drive designs with KrF (248 nm) and 3rd harmonic (351nm) drivers, we examine the benefits of the shorter wavelength KrF light in reducing the LPI threat.

  7. The Application of High Energy Resolution Green's Functions to Threat Scenario Simulation

    NASA Astrophysics Data System (ADS)

    Thoreson, Gregory G.; Schneider, Erich A.

    2012-04-01

    Radiation detectors installed at key interdiction points provide defense against nuclear smuggling attempts by scanning vehicles and traffic for illicit nuclear material. These hypothetical threat scenarios may be modeled using radiation transport simulations. However, high-fidelity models are computationally intensive. Furthermore, the range of smuggler attributes and detector technologies create a large problem space not easily overcome by brute-force methods. Previous research has demonstrated that decomposing the scenario into independently simulated components using Green's functions can simulate photon detector signals with coarse energy resolution. This paper extends this methodology by presenting physics enhancements and numerical treatments which allow for an arbitrary level of energy resolution for photon transport. As a result, spectroscopic detector signals produced from full forward transport simulations can be replicated while requiring multiple orders of magnitude less computation time.

  8. Evaluation of "shotgun" proteomics for identification of biological threat agents in complex environmental matrixes: experimental simulations.

    PubMed

    Verberkmoes, Nathan C; Hervey, W Judson; Shah, Manesh; Land, Miriam; Hauser, Loren; Larimer, Frank W; Van Berkel, Gary J; Goeringer, Douglas E

    2005-02-01

    There is currently a great need for rapid detection and positive identification of biological threat agents, as well as microbial species in general, directly from complex environmental samples. This need is most urgent in the area of homeland security, but also extends into medical, environmental, and agricultural sciences. Mass-spectrometry-based analysis is one of the leading technologies in the field with a diversity of different methodologies for biothreat detection. Over the past few years, "shotgun"proteomics has become one method of choice for the rapid analysis of complex protein mixtures by mass spectrometry. Recently, it was demonstrated that this methodology is capable of distinguishing a target species against a large database of background species from a single-component sample or dual-component mixtures with relatively the same concentration. Here, we examine the potential of shotgun proteomics to analyze a target species in a background of four contaminant species. We tested the capability of a common commercial mass-spectrometry-based shotgun proteomics platform for the detection of the target species (Escherichia coli) at four different concentrations and four different time points of analysis. We also tested the effect of database size on positive identification of the four microbes used in this study by testing a small (13-species) database and a large (261-species) database. The results clearly indicated that this technology could easily identify the target species at 20% in the background mixture at a 60, 120, 180, or 240 min analysis time with the small database. The results also indicated that the target species could easily be identified at 20% or 6% but could not be identified at 0.6% or 0.06% in either a 240 min analysis or a 30 h analysis with the small database. The effects of the large database were severe on the target species where detection above the background at any concentration used in this study was impossible, though the three other microbes used in this study were clearly identified above the background when analyzed with the large database. This study points to the potential application of this technology for biological threat agent detection but highlights many areas of needed research before the technology will be useful in real world samples.

  9. Bridging the health security divide: department of defense support for the global health security agenda.

    PubMed

    Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R

    2014-01-01

    In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.

  10. What We Are Watching—Top Global Infectious Disease Threats, 2013-2016: An Update from CDC's Global Disease Detection Operations Center

    PubMed Central

    Iuliano, A. Danielle; Uyeki, Timothy M.; Mintz, Eric D.; Nichol, Stuart T.; Rollin, Pierre; Staples, J. Erin; Arthur, Ray R.

    2017-01-01

    To better track public health events in areas where the public health system is unable or unwilling to report the event to appropriate public health authorities, agencies can conduct event-based surveillance, which is defined as the organized collection, monitoring, assessment, and interpretation of unstructured information regarding public health events that may represent an acute risk to public health. The US Centers for Disease Control and Prevention's (CDC's) Global Disease Detection Operations Center (GDDOC) was created in 2007 to serve as CDC's platform dedicated to conducting worldwide event-based surveillance, which is now highlighted as part of the “detect” element of the Global Health Security Agenda (GHSA). The GHSA works toward making the world more safe and secure from disease threats through building capacity to better “Prevent, Detect, and Respond” to those threats. The GDDOC monitors approximately 30 to 40 public health events each day. In this article, we describe the top threats to public health monitored during 2012 to 2016: avian influenza, cholera, Ebola virus disease, and the vector-borne diseases yellow fever, chikungunya virus, and Zika virus, with updates to the previously described threats from Middle East respiratory syndrome-coronavirus (MERS-CoV) and poliomyelitis. PMID:28805465

  11. GBAS Ionospheric Anomaly Monitoring Based on a Two-Step Approach

    PubMed Central

    Zhao, Lin; Yang, Fuxin; Li, Liang; Ding, Jicheng; Zhao, Yuxin

    2016-01-01

    As one significant component of space environmental weather, the ionosphere has to be monitored using Global Positioning System (GPS) receivers for the Ground-Based Augmentation System (GBAS). This is because an ionospheric anomaly can pose a potential threat for GBAS to support safety-critical services. The traditional code-carrier divergence (CCD) methods, which have been widely used to detect the variants of the ionospheric gradient for GBAS, adopt a linear time-invariant low-pass filter to suppress the effect of high frequency noise on the detection of the ionospheric anomaly. However, there is a counterbalance between response time and estimation accuracy due to the fixed time constants. In order to release the limitation, a two-step approach (TSA) is proposed by integrating the cascaded linear time-invariant low-pass filters with the adaptive Kalman filter to detect the ionospheric gradient anomaly. The performance of the proposed method is tested by using simulated and real-world data, respectively. The simulation results show that the TSA can detect ionospheric gradient anomalies quickly, even when the noise is severer. Compared to the traditional CCD methods, the experiments from real-world GPS data indicate that the average estimation accuracy of the ionospheric gradient improves by more than 31.3%, and the average response time to the ionospheric gradient at a rate of 0.018 m/s improves by more than 59.3%, which demonstrates the ability of TSA to detect a small ionospheric gradient more rapidly. PMID:27240367

  12. SWIR hyperspectral imaging detector for surface residues

    NASA Astrophysics Data System (ADS)

    Nelson, Matthew P.; Mangold, Paul; Gomer, Nathaniel; Klueva, Oksana; Treado, Patrick

    2013-05-01

    ChemImage has developed a SWIR Hyperspectral Imaging (HSI) sensor which uses hyperspectral imaging for wide area surveillance and standoff detection of surface residues. Existing detection technologies often require close proximity for sensing or detecting, endangering operators and costly equipment. Furthermore, most of the existing sensors do not support autonomous, real-time, mobile platform based detection of threats. The SWIR HSI sensor provides real-time standoff detection of surface residues. The SWIR HSI sensor provides wide area surveillance and HSI capability enabled by liquid crystal tunable filter technology. Easy-to-use detection software with a simple, intuitive user interface produces automated alarms and real-time display of threat and type. The system has potential to be used for the detection of variety of threats including chemicals and illicit drug substances and allows for easy updates in the field for detection of new hazardous materials. SWIR HSI technology could be used by law enforcement for standoff screening of suspicious locations and vehicles in pursuit of illegal labs or combat engineers to support route-clearance applications- ultimately to save the lives of soldiers and civilians. In this paper, results from a SWIR HSI sensor, which include detection of various materials in bulk form, as well as residue amounts on vehicles, people and other surfaces, will be discussed.

  13. Radiation anomaly detection algorithms for field-acquired gamma energy spectra

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ron; Guss, Paul; Mitchell, Stephen

    2015-08-01

    The Remote Sensing Laboratory (RSL) is developing a tactical, networked radiation detection system that will be agile, reconfigurable, and capable of rapid threat assessment with high degree of fidelity and certainty. Our design is driven by the needs of users such as law enforcement personnel who must make decisions by evaluating threat signatures in urban settings. The most efficient tool available to identify the nature of the threat object is real-time gamma spectroscopic analysis, as it is fast and has a very low probability of producing false positive alarm conditions. Urban radiological searches are inherently challenged by the rapid and large spatial variation of background gamma radiation, the presence of benign radioactive materials in terms of the normally occurring radioactive materials (NORM), and shielded and/or masked threat sources. Multiple spectral anomaly detection algorithms have been developed by national laboratories and commercial vendors. For example, the Gamma Detector Response and Analysis Software (GADRAS) a one-dimensional deterministic radiation transport software capable of calculating gamma ray spectra using physics-based detector response functions was developed at Sandia National Laboratories. The nuisance-rejection spectral comparison ratio anomaly detection algorithm (or NSCRAD), developed at Pacific Northwest National Laboratory, uses spectral comparison ratios to detect deviation from benign medical and NORM radiation source and can work in spite of strong presence of NORM and or medical sources. RSL has developed its own wavelet-based gamma energy spectral anomaly detection algorithm called WAVRAD. Test results and relative merits of these different algorithms will be discussed and demonstrated.

  14. Deep Space Wide Area Search Strategies

    NASA Astrophysics Data System (ADS)

    Capps, M.; McCafferty, J.

    There is an urgent need to expand the space situational awareness (SSA) mission beyond catalog maintenance to providing near real-time indications and warnings of emerging events. While building and maintaining a catalog of space objects is essential to SSA, this does not address the threat of uncatalogued and uncorrelated deep space objects. The Air Force therefore has an interest in transformative technologies to scan the geostationary (GEO) belt for uncorrelated space objects. Traditional ground based electro-optical sensors are challenged in simultaneously detecting dim objects while covering large areas of the sky using current CCD technology. Time delayed integration (TDI) scanning has the potential to enable significantly larger coverage rates while maintaining sensitivity for detecting near-GEO objects. This paper investigates strategies of employing TDI sensing technology from a ground based electro-optical telescope, toward providing tactical indications and warnings of deep space threats. We present results of a notional wide area search TDI sensor that scans the GEO belt from three locations: Maui, New Mexico, and Diego Garcia. Deep space objects in the NASA 2030 debris catalog are propagated over multiple nights as an indicative data set to emulate notional uncatalogued near-GEO orbits which may be encountered by the TDI sensor. Multiple scan patterns are designed and simulated, to compare and contrast performance based on 1) efficiency in coverage, 2) number of objects detected, and 3) rate at which detections occur, to enable follow-up observations by other space surveillance network (SSN) sensors. A step-stare approach is also modeled using a dedicated, co-located sensor notionally similar to the Ground-Based Electro-Optical Deep Space Surveillance (GEODSS) tower. Equivalent sensitivities are assumed. This analysis quantifies the relative benefit of TDI scanning for the wide area search mission.

  15. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  16. Driving-forces model on individual behavior in scenarios considering moving threat agents

    NASA Astrophysics Data System (ADS)

    Li, Shuying; Zhuang, Jun; Shen, Shifei; Wang, Jia

    2017-09-01

    The individual behavior model is a contributory factor to improve the accuracy of agent-based simulation in different scenarios. However, few studies have considered moving threat agents, which often occur in terrorist attacks caused by attackers with close-range weapons (e.g., sword, stick). At the same time, many existing behavior models lack validation from cases or experiments. This paper builds a new individual behavior model based on seven behavioral hypotheses. The driving-forces model is an extension of the classical social force model considering scenarios including moving threat agents. An experiment was conducted to validate the key components of the model. Then the model is compared with an advanced Elliptical Specification II social force model, by calculating the fitting errors between the simulated and experimental trajectories, and being applied to simulate a specific circumstance. Our results show that the driving-forces model reduced the fitting error by an average of 33.9% and the standard deviation by an average of 44.5%, which indicates the accuracy and stability of the model in the studied situation. The new driving-forces model could be used to simulate individual behavior when analyzing the risk of specific scenarios using agent-based simulation methods, such as risk analysis of close-range terrorist attacks in public places.

  17. Inferring the nature of anthropogenic threats from long-term abundance records.

    PubMed

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of information into a common rigorous framework. Ultimately, our framework may greatly assist conservation organizations in documenting threatening processes and planning species recovery. © 2014 Society for Conservation Biology.

  18. A novel approach to automatic threat detection in MMW imagery of people scanned in portals

    NASA Astrophysics Data System (ADS)

    Vaidya, Nitin M.; Williams, Thomas

    2008-04-01

    We have developed a novel approach to performing automatic detection of concealed threat objects in passive MMW imagery of people scanned in a portal setting. It is applicable to the significant class of imaging scanners that use the protocol of having the subject rotate in front of the camera in order to image them from several closely spaced directions. Customary methods of dealing with MMW sequences rely on the analysis of the spatial images in a frame-by-frame manner, with information extracted from separate frames combined by some subsequent technique of data association and tracking over time. We contend that the pooling of information over time in traditional methods is not as direct as can be and potentially less efficient in distinguishing threats from clutter. We have formulated a more direct approach to extracting information about the scene as it evolves over time. We propose an atypical spatio-temporal arrangement of the MMW image data - to which we give the descriptive name Row Evolution Image (REI) sequence. This representation exploits the singular aspect of having the subject rotate in front of the camera. We point out which features in REIs are most relevant to detecting threats, and describe the algorithms we have developed to extract them. We demonstrate results of successful automatic detection of threats, including ones whose faint image contrast renders their disambiguation from clutter very challenging. We highlight the ease afforded by the REI approach in permitting specialization of the detection algorithms to different parts of the subject body. Finally, we describe the execution efficiency advantages of our approach, given its natural fit to parallel processing. mage

  19. Forecasting Lightning Threat using Cloud-resolving Model Simulations

    NASA Technical Reports Server (NTRS)

    McCaul, E. W., Jr.; Goodman, S. J.; LaCasse, K. M.; Cecil, D. J.

    2009-01-01

    As numerical forecasts capable of resolving individual convective clouds become more common, it is of interest to see if quantitative forecasts of lightning flash rate density are possible, based on fields computed by the numerical model. Previous observational research has shown robust relationships between observed lightning flash rates and inferred updraft and large precipitation ice fields in the mixed phase regions of storms, and that these relationships might allow simulated fields to serve as proxies for lightning flash rate density. It is shown in this paper that two simple proxy fields do indeed provide reasonable and cost-effective bases for creating time-evolving maps of predicted lightning flash rate density, judging from a series of diverse simulation case study events in North Alabama for which Lightning Mapping Array data provide ground truth. One method is based on the product of upward velocity and the mixing ratio of precipitating ice hydrometeors, modeled as graupel only, in the mixed phase region of storms at the -15\\dgc\\ level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domainwide statistics of the peak values of simulated flash rate proxy fields against domainwide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. A blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Weather Research and Forecast Model simulations of selected North Alabama cases show that this model can distinguish the general character and intensity of most convective events, and that the proposed methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because models tend to have more difficulty in correctly predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single simulations can be in error. Although these model shortcomings presently limit the precision of lightning threat forecasts from individual runs of current generation models, the techniques proposed herein should continue to be applicable as newer and more accurate physically-based model versions, physical parameterizations, initialization techniques and ensembles of cloud-allowing forecasts become available.

  20. The neural circuits of innate fear: detection, integration, action, and memorization

    PubMed Central

    Silva, Bianca A.; Gross, Cornelius T.

    2016-01-01

    How fear is represented in the brain has generated a lot of research attention, not only because fear increases the chances for survival when appropriately expressed but also because it can lead to anxiety and stress-related disorders when inadequately processed. In this review, we summarize recent progress in the understanding of the neural circuits processing innate fear in rodents. We propose that these circuits are contained within three main functional units in the brain: a detection unit, responsible for gathering sensory information signaling the presence of a threat; an integration unit, responsible for incorporating the various sensory information and recruiting downstream effectors; and an output unit, in charge of initiating appropriate bodily and behavioral responses to the threatful stimulus. In parallel, the experience of innate fear also instructs a learning process leading to the memorization of the fearful event. Interestingly, while the detection, integration, and output units processing acute fear responses to different threats tend to be harbored in distinct brain circuits, memory encoding of these threats seems to rely on a shared learning system. PMID:27634145

  1. Liquids and homemade explosive detection

    NASA Astrophysics Data System (ADS)

    Ellenbogen, Michael; Bijjani, Richard

    2009-05-01

    Excerpt from the US Transportation Security Agency website: "The ban on liquids, aerosols and gels was implemented on August 10 after a terrorist plot was foiled. Since then, experts from around the government, including the FBI and our national labs have analyzed the information we now have and have conducted extensive explosives testing to get a better understanding of this specific threat." In order to lift the ban and ease the burden on the flying public, Reveal began an extensive effort in close collaboration with the US and several other governments to help identify these threats. This effort resulted in the successful development and testing of an automated explosive detection system capable of resolving these threats with a high probability of detection and a low false alarm rate. We will present here some of the methodology and approach we took to address this problem.

  2. Detecting underwater improvised explosive threats (DUIET)

    NASA Astrophysics Data System (ADS)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  3. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    MedlinePlus

    ... as hospitals and nursing homes. What's in the Report Foreword [page 5] Executive Summary [page 6] Section ... Glossary [page 107] Acknowledgements [page 112] 2013 Threat Report [PDF – 114 pages] CDC’s Budget Initiative to Detect ...

  4. Effects of platooning on signal-detection performance, workload, and stress: A driving simulator study.

    PubMed

    Heikoop, Daniël D; de Winter, Joost C F; van Arem, Bart; Stanton, Neville A

    2017-04-01

    Platooning, whereby automated vehicles travel closely together in a group, is attractive in terms of safety and efficiency. However, concerns exist about the psychological state of the platooning driver, who is exempted from direct control, yet remains responsible for monitoring the outside environment to detect potential threats. By means of a driving simulator experiment, we investigated the effects on recorded and self-reported measures of workload and stress for three task-instruction conditions: (1) No Task, in which participants had to monitor the road, (2) Voluntary Task, in which participants could do whatever they wanted, and (3) Detection Task, in which participants had to detect red cars. Twenty-two participants performed three 40-min runs in a constant-speed platoon, one condition per run in counterbalanced order. Contrary to some classic literature suggesting that humans are poor monitors, in the Detection Task condition participants attained a high mean detection rate (94.7%) and a low mean false alarm rate (0.8%). Results of the Dundee Stress State Questionnaire indicated that automated platooning was less distressing in the Voluntary Task than in the Detection Task and No Task conditions. In terms of heart rate variability, the Voluntary Task condition yielded a lower power in the low-frequency range relative to the high-frequency range (LF/HF ratio) than the Detection Task condition. Moreover, a strong time-on-task effect was found, whereby the mean heart rate dropped from the first to the third run. In conclusion, participants are able to remain attentive for a prolonged platooning drive, and the type of monitoring task has effects on the driver's psychological state. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Algorithm Summary and Evaluation: Automatic Implementation of Ringdown Analysis for Electromechanical Mode Identification from Phasor Measurements

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Ning; Huang, Zhenyu; Tuffner, Francis K.

    2010-02-28

    Small signal stability problems are one of the major threats to grid stability and reliability. Prony analysis has been successfully applied on ringdown data to monitor electromechanical modes of a power system using phasor measurement unit (PMU) data. To facilitate an on-line application of mode estimation, this paper develops a recursive algorithm for implementing Prony analysis and proposed an oscillation detection method to detect ringdown data in real time. By automatically detecting ringdown data, the proposed method helps guarantee that Prony analysis is applied properly and timely on the ringdown data. Thus, the mode estimation results can be performed reliablymore » and timely. The proposed method is tested using Monte Carlo simulations based on a 17-machine model and is shown to be able to properly identify the oscillation data for on-line application of Prony analysis. In addition, the proposed method is applied to field measurement data from WECC to show the performance of the proposed algorithm.« less

  6. Fitness for duty: A 3 minute version of the Psychomotor Vigilance Test predicts fatigue related declines in luggage screening performance

    PubMed Central

    Basner, Mathias; Rubinstein, Joshua

    2011-01-01

    Objective To evaluate the ability of a 3-min Psychomotor Vigilance Test (PVT) to predict fatigue related performance decrements on a simulated luggage screening task (SLST). Methods Thirty-six healthy non-professional subjects (mean age 30.8 years, 20 female) participated in a 4 day laboratory protocol including a 34 hour period of total sleep deprivation with PVT and SLST testing every 2 hours. Results Eleven and 20 lapses (355 ms threshold) on the PVT optimally divided SLST performance into high, medium, and low performance bouts with significantly decreasing threat detection performance A′. Assignment to the different SLST performance groups replicated homeostatic and circadian patterns during total sleep deprivation. Conclusions The 3 min PVT was able to predict performance on a simulated luggage screening task. Fitness-for-duty feasibility should now be tested in professional screeners and operational environments. PMID:21912278

  7. Fitness for duty: a 3-minute version of the Psychomotor Vigilance Test predicts fatigue-related declines in luggage-screening performance.

    PubMed

    Basner, Mathias; Rubinstein, Joshua

    2011-10-01

    To evaluate the ability of a 3-minute Psychomotor Vigilance Test (PVT) to predict fatigue-related performance decrements on a simulated luggage-screening task (SLST). Thirty-six healthy nonprofessional subjects (mean age = 30.8 years, 20 women) participated in a 4-day laboratory protocol including a 34-hour period of total sleep deprivation with PVT and SLST testing every 2 hours. Eleven and 20 lapses (355-ms threshold) on the PVT optimally divided SLST performance into high-, medium-, and low-performance bouts with significantly decreasing threat detection performance A'. Assignment to the different SLST performance groups replicated homeostatic and circadian patterns during total sleep deprivation. The 3-minute PVT was able to predict performance on a simulated luggage-screening task. Fitness-for-duty feasibility should now be tested in professional screeners and operational environments.

  8. Medical Differential Diagnosis (MDD) as the Architectural Framework for a Knowledge Model: A Vulnerability Detection and Threat Identification Methodology for Cyber-Crime and Cyber-Terrorism

    ERIC Educational Resources Information Center

    Conley-Ware, Lakita D.

    2010-01-01

    This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…

  9. XRIndex: a brief screening tool for individual differences in security threat detection in x-ray images

    PubMed Central

    Rusconi, Elena; Ferri, Francesca; Viding, Essi; Mitchener-Nissen, Timothy

    2015-01-01

    X-ray imaging is a cost-effective technique at security checkpoints that typically require the presence of human operators. We have previously shown that self-reported attention to detail can predict threat detection performance with small-vehicle x-ray images (Rusconi et al., 2012). Here, we provide evidence for the generality of such a link by having a large sample of naïve participants screen more typical dual-energy x-ray images of hand luggage. The results show that the Attention to Detail score from the autism-spectrum quotient (AQ) questionnaire (Baron-Cohen et al., 2001) is a linear predictor of threat detection accuracy. We then develop and fine-tune a novel self-report scale for security screening: the XRIndex, which improves on the Attention to Detail scale for predictive power and opacity to interpretation. The XRIndex is not redundant with any of the Big Five personality traits. We validate the XRIndex against security x-ray images with an independent sample of untrained participants and suggest that the XRIndex may be a useful aid for the identification of suitable candidates for professional security training with a focus on x-ray threat detection. Further studies are needed to determine whether this can also apply to trained professionals. PMID:26321935

  10. Abnormal Superior Temporal Connectivity During Fear Perception in Schizophrenia

    PubMed Central

    Leitman, David I.; Loughead, James; Wolf, Daniel H.; Ruparel, Kosha; Kohler, Christian G.; Elliott, Mark A.; Bilker, Warren B.; Gur, Raquel E.; Gur, Ruben C.

    2008-01-01

    Patients with schizophrenia have difficulty in decoding facial affect. A study using event–related functional neuroimaging indicated that errors in fear detection in schizophrenia are associated with paradoxically higher activation in the amygdala and an associated network implicated in threat detection. Furthermore, this exaggerated activation to fearful faces correlated with severity of flat affect. These findings suggest that abnormal threat detection processing may reflect disruptions between nodes that comprise the affective appraisal circuit. Here we examined connectivity within this network by determining the pattern of intercorrelations among brain regions (regions of interest) significantly activated during fear identification in both healthy controls and patients using a novel procedure CORANOVA. This analysis tests differences in the interregional correlation strength between schizophrenia and healthy controls. Healthy subjects' task activation was principally characterized by robust correlations between medial structures like thalamus (THA) and amygdala (AMY) and middle frontal (MF), inferior frontal (IF), and prefrontal cortical (PFC) regions. In contrast, schizophrenia patients displayed no significant correlations between the medial regions and either MF or IF. Further, patients had significantly higher correlations between occipital lingual gyrus and superior temporal gyrus than healthy subjects. These between-group connectivity differences suggest that schizophrenia threat detection impairment may stem from abnormal stimulus integration. Such abnormal integration may disrupt the evaluation of threat within fronto-cortical regions. PMID:18550592

  11. Unconscious affective processing and empathy: an investigation of subliminal priming on the detection of painful facial expressions.

    PubMed

    Yamada, Makiko; Decety, Jean

    2009-05-01

    Results from recent functional neuroimaging studies suggest that facial expressions of pain trigger empathic mimicry responses in the observer, in the sense of an activation in the pain matrix. However, pain itself also signals a potential threat in the environment and urges individuals to escape or avoid its source. This evolutionarily primitive aspect of pain processing, i.e., avoidance from the threat value of pain, seems to conflict with the emergence of empathic concern, i.e., a motivation to approach toward the other. The present study explored whether the affective values of targets influence the detection of pain at the unconscious level. We found that the detection of pain was facilitated by unconscious negative affective processing rather than by positive affective processing. This suggests that detection of pain is primarily influenced by its inherent threat value, and that empathy and empathic concern may not rely on a simple reflexive resonance as generally thought. The results of this study provide a deeper understanding of how fundamental the unconscious detection of pain is to the processes involved in the experience of empathy and sympathy.

  12. Automated intelligent video surveillance system for ships

    NASA Astrophysics Data System (ADS)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  13. Amygdala lesions in rhesus macaques decrease attention to threat

    PubMed Central

    Dal Monte, Olga; Costa, Vincent D.; Noble, Pamela L.; Murray, Elisabeth A.; Averbeck, Bruno B.

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  14. Foliage penetration by using 4-D point cloud data

    NASA Astrophysics Data System (ADS)

    Méndez Rodríguez, Javier; Sánchez-Reyes, Pedro J.; Cruz-Rivera, Sol M.

    2012-06-01

    Real-time awareness and rapid target detection are critical for the success of military missions. New technologies capable of detecting targets concealed in forest areas are needed in order to track and identify possible threats. Currently, LAser Detection And Ranging (LADAR) systems are capable of detecting obscured targets; however, tracking capabilities are severely limited. Now, a new LADAR-derived technology is under development to generate 4-D datasets (3-D video in a point cloud format). As such, there is a new need for algorithms that are able to process data in real time. We propose an algorithm capable of removing vegetation and other objects that may obfuscate concealed targets in a real 3-D environment. The algorithm is based on wavelets and can be used as a pre-processing step in a target recognition algorithm. Applications of the algorithm in a real-time 3-D system could help make pilots aware of high risk hidden targets such as tanks and weapons, among others. We will be using a 4-D simulated point cloud data to demonstrate the capabilities of our algorithm.

  15. Feasibility study of the automated detection and localization of underground tunnel excavation using Brillouin optical time domain reflectometer

    NASA Astrophysics Data System (ADS)

    Klar, Assaf; Linker, Raphael

    2009-05-01

    Cross-borders smuggling tunnels enable unmonitored movement of people, drugs and weapons and pose a very serious threat to homeland security. Recent advances in strain measurements using optical fibers allow the development of smart underground security fences that could detect the excavation of smuggling tunnels. This paper presents the first stages in the development of such a fence using Brillouin Optical Time Domain Reflectometry (BOTDR). In the simulation study, two different ground displacement models are used in order to evaluate the robustness of the system against imperfect modeling. In both cases, soil-fiber interaction is considered. Measurement errors, and surface disturbances (obtained from a field test) are also included in the calibration and validation stages of the system. The proposed detection system is based on wavelet decomposition of the BOTDR signal, followed by a neural network that is trained to recognize the tunnel signature in the wavelet coefficients. The results indicate that the proposed system is capable of detecting even small tunnel (0.5m diameter) as deep as 20 meter.

  16. Experimental estimation of snare detectability for robust threat monitoring.

    PubMed

    O'Kelly, Hannah J; Rowcliffe, J Marcus; Durant, Sarah; Milner-Gulland, E J

    2018-02-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccessible areas. As with cryptic animal targets, any approach used to monitor snaring levels must address the issue of imperfect detection, but no standard method exists to do so. We carried out a field experiment in Keo Seima Wildlife Reserve in eastern Cambodia with the following objectives: (1) To estimate the detection probably of wire snares within a tropical forest context, and to investigate how detectability might be affected by habitat type, snare type, or observer. (2) To trial two sets of sampling protocols feasible to implement in a range of challenging field conditions. (3) To conduct a preliminary assessment of two potential analytical approaches to dealing with the resulting snare encounter data. We found that although different observers had no discernible effect on detection probability, detectability did vary between habitat type and snare type. We contend that simple repeated counts carried out at multiple sites and analyzed using binomial mixture models could represent a practical yet robust solution to the problem of monitoring snaring levels both inside and outside of protected areas. This experiment represents an important first step in developing improved methods of threat monitoring, and such methods are greatly needed in southeast Asia, as well as in as many other regions.

  17. Characterizing Density and Complexity of Imported Cargos

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Birrer, Nathaniel; Divin, Charles; Glenn, Steven

    X-ray inspection systems are used to detect radiological and nuclear threats in imported cargo. In order to better understand performance of these systems, system imaging capabilities and the characteristics of imported cargo need to be determined. This project involved calculation of the modulation transfer function as a metric of system imaging performance and a study of the density and inhomogeneity of imported cargos, which have been shown to correlate with human analysts, threat detection performance.

  18. IR radiation characteristics and operating range research for a quad-rotor unmanned aircraft vehicle.

    PubMed

    Gong, Mali; Guo, Rui; He, Sifeng; Wang, Wei

    2016-11-01

    The security threats caused by multi-rotor unmanned aircraft vehicles (UAVs) are serious, especially in public places. To detect and control multi-rotor UAVs, knowledge of IR characteristics is necessary. The IR characteristics of a typical commercial quad-rotor UAV are investigated in this paper through thermal imaging with an IR camera. Combining the 3D geometry and IR images of the UAV, a 3D IR characteristics model is established so that the radiant power from different views can be obtained. An estimation of operating range to detect the UAV is calculated theoretically using signal-to-noise ratio as the criterion. Field experiments are implemented with an uncooled IR camera in an environment temperature of 12°C and a uniform background. For the front view, the operating range is about 150 m, which is close to the simulation result of 170 m.

  19. Sensitivity to social and non-social threats in temperamentally shy children at-risk for anxiety.

    PubMed

    LoBue, Vanessa; Pérez-Edgar, Koraly

    2014-03-01

    In the current brief report, we examined threat perception in a group of young children who may be at-risk for anxiety due to extreme temperamental shyness. Results demonstrate specific differences in the processing of social threats: 4- to 7-year-olds in the high-shy group demonstrated a greater bias for social threats (angry faces) than did a comparison group of low-shy children. This pattern did not hold for non-social threats like snakes: Both groups showed an equal bias for the detection of snakes over frogs. The results suggest that children who are tempermentally shy have a heightened sensitivity to social signs of threat early in development. These findings have implications for understanding mechanisms of early threat sensitivity that may predict later socioemotional maladjustment. © 2013 John Wiley & Sons Ltd.

  20. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    NASA Astrophysics Data System (ADS)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  1. Costs of landscape silviculture for fire and habitat management.

    Treesearch

    S. Hummel; D.E. Calkin

    2005-01-01

    In forest reserves of the U.S. Pacific Northwest, management objectives include protecting late-semi habitat structure by reducing the threat of large-scale disturbances like wildfire. We simulated how altering within- and among-stand structure with silvicultural treatments of differing intensity affected late-seral forest (LSF) structure and fire threat (FT) reduction...

  2. Internalising Problems and the Effects of Peer Ostracism on Children's Primary Needs

    ERIC Educational Resources Information Center

    Hawes, David J.; Zadro, Lisa; Iannuzzelli, Rose; Godwin, Alexandra; MacNevin, Georgia; Dadds, Mark R.; Griffiths, Brendan; Richardson, Rick

    2013-01-01

    The aim of this study was to examine associations between ostracism, internalising problems, and threat to primary needs (belonging, control, self-esteem, meaningful existence) in children (N= 165, M age = 9 years). Ostracism was simulated experimentally using the Cyberball paradigm--a computer-based ball-throwing game--and threats to primary…

  3. Standoff alpha radiation detection for hot cell imaging and crime scene investigation

    NASA Astrophysics Data System (ADS)

    Kerst, Thomas; Sand, Johan; Ihantola, Sakari; Peräjärvi, Kari; Nicholl, Adrian; Hrnecek, Erich; Toivonen, Harri; Toivonen, Juha

    2018-02-01

    This paper presents the remote detection of alpha contamination in a nuclear facility. Alpha-active material in a shielded nuclear radiation containment chamber has been localized by optical means. Furthermore, sources of radiation danger have been identified in a staged crime scene setting. For this purpose, an electron-multiplying charge-coupled device camera was used to capture photons generated by alpha-induced air scintillation (radioluminescence). The detected radioluminescence was superimposed with a regular photograph to reveal the origin of the light and thereby the alpha radioactive material. The experimental results show that standoff detection of alpha contamination is a viable tool in radiation threat detection. Furthermore, the radioluminescence spectrum in the air is spectrally analyzed. Possibilities of camera-based alpha threat detection under various background lighting conditions are discussed.

  4. Standoff alpha radiation detection for hot cell imaging and crime scene investigation

    NASA Astrophysics Data System (ADS)

    Kerst, Thomas; Sand, Johan; Ihantola, Sakari; Peräjärvi, Kari; Nicholl, Adrian; Hrnecek, Erich; Toivonen, Harri; Toivonen, Juha

    2018-06-01

    This paper presents the remote detection of alpha contamination in a nuclear facility. Alpha-active material in a shielded nuclear radiation containment chamber has been localized by optical means. Furthermore, sources of radiation danger have been identified in a staged crime scene setting. For this purpose, an electron-multiplying charge-coupled device camera was used to capture photons generated by alpha-induced air scintillation (radioluminescence). The detected radioluminescence was superimposed with a regular photograph to reveal the origin of the light and thereby the alpha radioactive material. The experimental results show that standoff detection of alpha contamination is a viable tool in radiation threat detection. Furthermore, the radioluminescence spectrum in the air is spectrally analyzed. Possibilities of camera-based alpha threat detection under various background lighting conditions are discussed.

  5. Stress-induced cortisol facilitates threat-related decision making among police officers.

    PubMed

    Akinola, Modupe; Mendes, Wendy Berry

    2012-02-01

    Previous research suggests that cortisol can affect cognitive functions such as memory, decision making, and attentiveness to threat-related cues. Here, we examine whether increases in cortisol, brought on by an acute social stressor, influence threat-related decision making. Eighty-one police officers completed a standardized laboratory stressor and then immediately completed a computer simulated decision-making task designed to examine decisions to accurately shoot or not shoot armed and unarmed Black and White targets. Results indicated that police officers who had larger cortisol increases to the social-stress task subsequently made fewer errors when deciding to shoot armed Black targets relative to armed White targets, suggesting that hypothalamic pituitary adrenal (HPA) activation may exacerbate vigilance for threat cues. We conclude with a discussion of the implications of threat-initiated decision making.

  6. Simulation of atmospheric and terrestrial background signatures for detection and tracking scenarios

    NASA Astrophysics Data System (ADS)

    Schweitzer, Caroline; Stein, Karin

    2015-10-01

    In the fields of early warning, one is depending on reliable image exploitation: Only if the applied detection and tracking algorithms work efficiently, the threat approach alert can be given fast enough to ensure an automatic initiation of the countermeasure. In order to evaluate the performance of those algorithms for a certain electro-optical (EO) sensor system, test sequences need to be created as realistic and comprehensive as possible. Since both, background and target signature, depend on the environmental conditions, a detailed knowledge of the meteorology and climatology is necessary. Trials for measuring these environmental characteristics serve as a solid basis, but might only constitute the conditions during a rather short period of time. To represent the entire variation of meteorology and climatology that the future system will be exposed to, the application of comprehensive atmospheric modelling tools is essential. This paper gives an introduction of the atmospheric modelling tools that are currently used at Fraunhofer IOSB to simulate spectral background signatures in the infrared (IR) range. It is also demonstrated, how those signatures are affected by changing atmospheric and climatic conditions. In conclusion - and with a special focus on the modelling of different cloud types - sources of error and limits are discussed.

  7. Statement of Work Third Party Algorithm Development and Evaluation of Detection of Liquid Explosives in Dual-Energy Digital Radiographic/TIP Ready X-ray Images - Public Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nekoogar, F; Martz, Jr., H E

    2009-09-23

    The purpose of this statement of work is for third party collaborators to train, validate and have Lawrence Livermore National Security, LLC (LLNS) evaluate algorithms to detect liquid threats in digital radiography (DR)/TIP Ready X-ray (TRX) images that will be provided by LLNS through the Transportation and Security Administration (TSA). LLNS will provide a set of images with threat(s) to determine detection rates and non-threat images from airports to determine false alarm rates. A key including a bounding box showing the locations of the threats and non-threats will be provided for the images. It is expected that the Subcontractor shallmore » use half of the images with their keys for training the algorithms and the other half shall be used for validation (third party evaluation) purposes. The Subcontractor shall not use the key to the second half of the data other than for the validation and reporting of the performance of its algorithm (not for training). The Subcontractor has 45 business days from the receipt of datasets and the Subcontract to: (1) Run their detection/classification algorithms on the data; (2) Deliver a final report describing their performance by generating Receiver Operator Characteristic (ROC) curves using their algorithm; and (3) Deliver a copy of the third party's executable software (already trained and validated by the datasets) to LLNL accompanied by a user manual. LLNS will evaluate the performance of the same algorithm on another separate set of data. LLNS evaluation of the Subcontractor's algorithm will be documented in a final report within 30 days of receiving the executable code. This report will be sent to TSA and the report may be disseminated to the Subcontract at TSA's discretion.« less

  8. Hot or cold: is communicating anger or threats more effective in negotiation?

    PubMed

    Sinaceur, Marwan; Van Kleef, Gerben A; Neale, Margaret A; Adam, Hajo; Haag, Christophe

    2011-09-01

    Is communicating anger or threats more effective in eliciting concessions in negotiation? Recent research has emphasized the effectiveness of anger communication, an emotional strategy. In this article, we argue that anger communication conveys an implied threat, and we document that issuing threats is a more effective negotiation strategy than communicating anger. In 3 computer-mediated negotiation experiments, participants received either angry or threatening messages from a simulated counterpart. Experiment 1 showed that perceptions of threat mediated the effect of anger (vs. a control) on concessions. Experiment 2 showed that (a) threat communication elicited greater concessions than anger communication and (b) poise (being confident and in control of one's own feelings and decisions) ascribed to the counterpart mediated the positive effect of threat compared to anger on concessions. Experiment 3 replicated this positive effect of threat over anger when recipients had an attractive alternative to a negotiated agreement. These findings qualify previous research on anger communication in negotiation. Implications for the understanding of emotion and negotiation are discussed. PsycINFO Database Record (c) 2011 APA, all rights reserved

  9. Protecting against cyber threats in networked information systems

    NASA Astrophysics Data System (ADS)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  10. Extraction and classification of 3D objects from volumetric CT data

    NASA Astrophysics Data System (ADS)

    Song, Samuel M.; Kwon, Junghyun; Ely, Austin; Enyeart, John; Johnson, Chad; Lee, Jongkyu; Kim, Namho; Boyd, Douglas P.

    2016-05-01

    We propose an Automatic Threat Detection (ATD) algorithm for Explosive Detection System (EDS) using our multistage Segmentation Carving (SC) followed by Support Vector Machine (SVM) classifier. The multi-stage Segmentation and Carving (SC) step extracts all suspect 3-D objects. The feature vector is then constructed for all extracted objects and the feature vector is classified by the Support Vector Machine (SVM) previously learned using a set of ground truth threat and benign objects. The learned SVM classifier has shown to be effective in classification of different types of threat materials. The proposed ATD algorithm robustly deals with CT data that are prone to artifacts due to scatter, beam hardening as well as other systematic idiosyncrasies of the CT data. Furthermore, the proposed ATD algorithm is amenable for including newly emerging threat materials as well as for accommodating data from newly developing sensor technologies. Efficacy of the proposed ATD algorithm with the SVM classifier is demonstrated by the Receiver Operating Characteristics (ROC) curve that relates Probability of Detection (PD) as a function of Probability of False Alarm (PFA). The tests performed using CT data of passenger bags shows excellent performance characteristics.

  11. Plasma radome designed for the EMP effects defense

    NASA Astrophysics Data System (ADS)

    Li, Zhigang; Wang, Jiachun; Cheng, Li; Wang, Qichao

    2016-11-01

    Radar, as the main detection means, plays an extremely important role in modern warfare. However, it is easily attacked by the electromagnetic pulse (EMP) weapon. In order to defense the threat, a radome formed by plasma is designed. The plasma radome is used to protect the radar systems against EMP coupling through both `front door' and `back door'. What's more, the damage effects of EMP to the radar systems are analyzed, and the protection mechanism of plasma to EMP weapon is discussed. In addition, a simulation experiment is carried out to verify the feasibility of the plasma radome to defense against EMP. The results indicate that the structure performs well, which makes it a new method against EMP weapon.

  12. Muon tomography imaging algorithms for nuclear threat detection inside large volume containers with the Muon Portal detector

    NASA Astrophysics Data System (ADS)

    Riggi, S.; Antonuccio-Delogu, V.; Bandieramonte, M.; Becciani, U.; Costa, A.; La Rocca, P.; Massimino, P.; Petta, C.; Pistagna, C.; Riggi, F.; Sciacca, E.; Vitello, F.

    2013-11-01

    Muon tomographic visualization techniques try to reconstruct a 3D image as close as possible to the real localization of the objects being probed. Statistical algorithms under test for the reconstruction of muon tomographic images in the Muon Portal Project are discussed here. Autocorrelation analysis and clustering algorithms have been employed within the context of methods based on the Point Of Closest Approach (POCA) reconstruction tool. An iterative method based on the log-likelihood approach was also implemented. Relative merits of all such methods are discussed, with reference to full GEANT4 simulations of different scenarios, incorporating medium and high-Z objects inside a container.

  13. Verification of Minimum Detectable Activity for Radiological Threat Source Search

    NASA Astrophysics Data System (ADS)

    Gardiner, Hannah; Myjak, Mitchell; Baciak, James; Detwiler, Rebecca; Seifert, Carolyn

    2015-10-01

    The Department of Homeland Security's Domestic Nuclear Detection Office is working to develop advanced technologies that will improve the ability to detect, localize, and identify radiological and nuclear sources from airborne platforms. The Airborne Radiological Enhanced-sensor System (ARES) program is developing advanced data fusion algorithms for analyzing data from a helicopter-mounted radiation detector. This detector platform provides a rapid, wide-area assessment of radiological conditions at ground level. The NSCRAD (Nuisance-rejection Spectral Comparison Ratios for Anomaly Detection) algorithm was developed to distinguish low-count sources of interest from benign naturally occurring radiation and irrelevant nuisance sources. It uses a number of broad, overlapping regions of interest to statistically compare each newly measured spectrum with the current estimate for the background to identify anomalies. We recently developed a method to estimate the minimum detectable activity (MDA) of NSCRAD in real time. We present this method here and report on the MDA verification using both laboratory measurements and simulated injects on measured backgrounds at or near the detection limits. This work is supported by the US Department of Homeland Security, Domestic Nuclear Detection Office, under competitively awarded contract/IAA HSHQDC-12-X-00376. This support does not constitute an express or implied endorsement on the part of the Gov't.

  14. Hyperspectral monitoring of chemically sensitive plant sentinels

    NASA Astrophysics Data System (ADS)

    Simmons, Danielle A.; Kerekes, John P.; Raqueno, Nina G.

    2009-08-01

    Automated detection of chemical threats is essential for an early warning of a potential attack. Harnessing plants as bio-sensors allows for distributed sensing without a power supply. Monitoring the bio-sensors requires a specifically tailored hyperspectral system. Tobacco plants have been genetically engineered to de-green when a material of interest (e.g. zinc, TNT) is introduced to their immediate vicinity. The reflectance spectra of the bio-sensors must be accurately characterized during the de-greening process for them to play a role in an effective warning system. Hyperspectral data have been collected under laboratory conditions to determine the key regions in the reflectance spectra associated with the degreening phenomenon. Bio-sensor plants and control (nongenetically engineered) plants were exposed to TNT over the course of two days and their spectra were measured every six hours. Rochester Institute of Technologys Digital Imaging and Remote Sensing Image Generation Model (DIRSIG) was used to simulate detection of de-greened plants in the field. The simulated scene contains a brick school building, sidewalks, trees and the bio-sensors placed at the entrances to the buildings. Trade studies of the bio-sensor monitoring system were also conducted using DIRSIG simulations. System performance was studied as a function of field of view, pixel size, illumination conditions, radiometric noise, spectral waveband dependence and spectral resolution. Preliminary results show that the most significant change in reflectance during the degreening period occurs in the near infrared region.

  15. Detection of influenza-like illness aberrations by directly monitoring Pearson residuals of fitted negative binomial regression models.

    PubMed

    Chan, Ta-Chien; Teng, Yung-Chu; Hwang, Jing-Shiang

    2015-02-21

    Emerging novel influenza outbreaks have increasingly been a threat to the public and a major concern of public health departments. Real-time data in seamless surveillance systems such as health insurance claims data for influenza-like illnesses (ILI) are ready for analysis, making it highly desirable to develop practical techniques to analyze such readymade data for outbreak detection so that the public can receive timely influenza epidemic warnings. This study proposes a simple and effective approach to analyze area-based health insurance claims data including outpatient and emergency department (ED) visits for early detection of any aberrations of ILI. The health insurance claims data during 2004-2009 from a national health insurance research database were used for developing early detection methods. The proposed approach fitted the daily new ILI visits and monitored the Pearson residuals directly for aberration detection. First, negative binomial regression was used for both outpatient and ED visits to adjust for potentially influential factors such as holidays, weekends, seasons, temporal dependence and temperature. Second, if the Pearson residuals exceeded 1.96, aberration signals were issued. The empirical validation of the model was done in 2008 and 2009. In addition, we designed a simulation study to compare the time of outbreak detection, non-detection probability and false alarm rate between the proposed method and modified CUSUM. The model successfully detected the aberrations of 2009 pandemic (H1N1) influenza virus in northern, central and southern Taiwan. The proposed approach was more sensitive in identifying aberrations in ED visits than those in outpatient visits. Simulation studies demonstrated that the proposed approach could detect the aberrations earlier, and with lower non-detection probability and mean false alarm rate in detecting aberrations compared to modified CUSUM methods. The proposed simple approach was able to filter out temporal trends, adjust for temperature, and issue warning signals for the first wave of the influenza epidemic in a timely and accurate manner.

  16. Implementation and testing of a sensor-netting algorithm for early warning and high confidence C/B threat detection

    NASA Astrophysics Data System (ADS)

    Gruber, Thomas; Grim, Larry; Fauth, Ryan; Tercha, Brian; Powell, Chris; Steinhardt, Kristin

    2011-05-01

    Large networks of disparate chemical/biological (C/B) sensors, MET sensors, and intelligence, surveillance, and reconnaissance (ISR) sensors reporting to various command/display locations can lead to conflicting threat information, questions of alarm confidence, and a confused situational awareness. Sensor netting algorithms (SNA) are being developed to resolve these conflicts and to report high confidence consensus threat map data products on a common operating picture (COP) display. A data fusion algorithm design was completed in a Phase I SBIR effort and development continues in the Phase II SBIR effort. The initial implementation and testing of the algorithm has produced some performance results. The algorithm accepts point and/or standoff sensor data, and event detection data (e.g., the location of an explosion) from various ISR sensors (e.g., acoustic, infrared cameras, etc.). These input data are preprocessed to assign estimated uncertainty to each incoming piece of data. The data are then sent to a weighted tomography process to obtain a consensus threat map, including estimated threat concentration level uncertainty. The threat map is then tested for consistency and the overall confidence for the map result is estimated. The map and confidence results are displayed on a COP. The benefits of a modular implementation of the algorithm and comparisons of fused / un-fused data results will be presented. The metrics for judging the sensor-netting algorithm performance are warning time, threat map accuracy (as compared to ground truth), false alarm rate, and false alarm rate v. reported threat confidence level.

  17. Development of a high-throughput microfluidic integrated microarray for the detection of chimeric bioweapons.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheppod, Timothy; Satterfield, Brent; Hukari, Kyle W.

    2006-10-01

    The advancement of DNA cloning has significantly augmented the potential threat of a focused bioweapon assault, such as a terrorist attack. With current DNA cloning techniques, toxin genes from the most dangerous (but environmentally labile) bacterial or viral organism can now be selected and inserted into robust organism to produce an infinite number of deadly chimeric bioweapons. In order to neutralize such a threat, accurate detection of the expressed toxin genes, rather than classification on strain or genealogical decent of these organisms, is critical. The development of a high-throughput microarray approach will enable the detection of unknowns chimeric bioweapons. Themore » development of a high-throughput microarray approach will enable the detection of unknown bioweapons. We have developed a unique microfluidic approach to capture and concentrate these threat genes (mRNA's) upto a 30 fold concentration. These captured oligonucleotides can then be used to synthesize in situ oligonucleotide copies (cDNA probes) of the captured genes. An integrated microfluidic architecture will enable us to control flows of reagents, perform clean-up steps and finally elute nanoliter volumes of synthesized oligonucleotides probes. The integrated approach has enabled a process where chimeric or conventional bioweapons can rapidly be identified based on their toxic function, rather than being restricted to information that may not identify the critical nature of the threat.« less

  18. Colorimetric Sensor Arrays for the Detection and Identification of Chemical Weapons and Explosives

    PubMed Central

    Kangas, Michael J.; Burks, Raychelle M.; Atwater, Jordyn; Lukowicz, Rachel M.; Williams, Pat; Holmes, Andrea E.

    2017-01-01

    ABSTRACT There is a significant demand for devices that can rapidly detect chemical–biological–explosive (CBE) threats on-site and allow for immediate responders to mitigate spread, risk, and loss. The key to an effective reconnaissance mission is a unified detection technology that analyzes potential threats in real time. In addition to reviewing the current state of the art in the field, this review illustrates the practicality of colorimetric arrays composed of sensors that change colors in the presence of analytes. This review also describes an outlook toward future technologies, and describes how they could possibly be used in areas such as war zones to detect and identify hazardous substances. PMID:27636675

  19. Colorimetric Sensor Arrays for the Detection and Identification of Chemical Weapons and Explosives.

    PubMed

    Kangas, Michael J; Burks, Raychelle M; Atwater, Jordyn; Lukowicz, Rachel M; Williams, Pat; Holmes, Andrea E

    2017-03-04

    There is a significant demand for devices that can rapidly detect chemical-biological-explosive (CBE) threats on-site and allow for immediate responders to mitigate spread, risk, and loss. The key to an effective reconnaissance mission is a unified detection technology that analyzes potential threats in real time. In addition to reviewing the current state of the art in the field, this review illustrates the practicality of colorimetric arrays composed of sensors that change colors in the presence of analytes. This review also describes an outlook toward future technologies, and describes how they could possibly be used in areas such as war zones to detect and identify hazardous substances.

  20. Securely Partitioning Spacecraft Computing Resources: Validation of a Separation Kernel

    NASA Astrophysics Data System (ADS)

    Bremer, Leon; Schreutelkamp, Erwin

    2011-08-01

    The F-35 Lightning II, also known as the Joint Strike Fighter, will be the first operational fighter aircraft equipped with an operational MultiShip Embedded Training capability. This onboard training system allows teams of fighter pilots to jointly operate their F-35 in flight against virtual threats, avoiding the need for real adversary air threats and surface threat systems in their training. The European Real-time Operations Simulator (EuroSim) framework is well known in the space domain, particularly in support of engineering and test phases of space system development. In the MultiShip Embedded Training project, EuroSim is not only the essential tool for development and verification throughout the project but is also the engine of the final embedded simulator on board of the F-35 aircraft. The novel ways in which EuroSim is applied in the project in relation to distributed simulation problems, team collaboration, tool chains and embedded systems can benefit many projects and applications. The paper describes the application of EuroSim as the simulation engine of the F-35 Embedded Training solution, the extensions to the EuroSim product that enable this application, and its usage in development and verification of the whole project as carried out at the sites of Dutch Space and the National Aerospace Laboratory (NLR).

  1. When anticipation beats accuracy: Threat alters memory for dynamic scenes.

    PubMed

    Greenstein, Michael; Franklin, Nancy; Martins, Mariana; Sewack, Christine; Meier, Markus A

    2016-05-01

    Threat frequently leads to the prioritization of survival-relevant processes. Much of the work examining threat-related processing advantages has focused on the detection of static threats or long-term memory for details. In the present study, we examined immediate memory for dynamic threatening situations. We presented participants with visually neutral, dynamic stimuli using a representational momentum (RM) paradigm, and manipulated threat conceptually. Although the participants in both the threatening and nonthreatening conditions produced classic RM effects, RM was stronger for scenarios involving threat (Exps. 1 and 2). Experiments 2 and 3 showed that this effect does not generalize to the nonthreatening objects within a threatening scene, and that it does not extend to arousing happy situations. Although the increased RM effect for threatening objects by definition reflects reduced accuracy, we argue that this reduced accuracy may be offset by a superior ability to predict, and thereby evade, a moving threat.

  2. Performance optimization for space-based sensors: simulation and modelling at Fraunhofer IOSB

    NASA Astrophysics Data System (ADS)

    Schweitzer, Caroline; Stein, Karin

    2014-10-01

    The prediction of the effectiveness of a space-based sensor for its designated application in space (e.g. special earth surface observations or missile detection) can help to reduce the expenses, especially during the phases of mission planning and instrumentation. In order to optimize the performance of such systems we simulate and analyse the entire operational scenario, including: - optional waveband - various orbit heights and viewing angles - system design characteristics, e. g. pixel size and filter transmission - atmospheric effects, e. g. different cloud types, climate zones and seasons In the following, an evaluation of the appropriate infrared (IR) waveband for the designated sensor application is given. The simulation environment is also capable of simulating moving objects like aircraft or missiles. Therefore, the spectral signature of the object/missile as well as its track along a flight path is implemented. The resulting video sequence is then analysed by a tracking algorithm and an estimation of the effectiveness of the sensor system can be simulated. This paper summarizes the work carried out at Fraunhofer IOSB in the field of simulation and modelling for the performance optimization of space based sensors. The paper is structured as follows: First, an overview of the applied simulation and modelling software is given. Then, the capability of those tools is illustrated by means of a hypothetical threat scenario for space-based early warning (launch of a long-range ballistic missile (BM)).

  3. Security Information and Event Management Tools and Insider Threat Detection

    DTIC Science & Technology

    2013-09-01

    Orebaugh, A., Scholl , M., & Stine, K. (2011, September). Information security continuous monitoring (ISCM) for federal information systems and...E., Conway, T., Keverline, S., Williams , M., Capelli, D., Willke, B., & Moore, A. (2008, January). Insider threat study: illicit cyber activity in

  4. Airborne Systems Technology Application to the Windshear Threat

    NASA Technical Reports Server (NTRS)

    Arbuckle, P. Douglas; Lewis, Michael S.; Hinton, David A.

    1996-01-01

    The general approach and products of the NASA/FAA Airborne Windshear Program conducted by NASA Langley Research Center are summarized, with references provided for the major technical contributions. During this period, NASA conducted 2 years of flight testing to characterize forward-looking sensor performance. The NASA/FAA Airborne Windshear Program was divided into three main elements: Hazard Characterization, Sensor Technology, and Flight Management Systems. Simulation models developed under the Hazard Characterization element are correlated with flight test data. Flight test results comparing the performance and characteristics of the various Sensor Technologies (microwave radar, lidar, and infrared) are presented. Most of the activities in the Flight Management Systems element were conducted in simulation. Simulation results from a study evaluating windshear crew procedures and displays for forward-looking sensor-equipped airplanes are discussed. NASA Langley researchers participated heavily in the FAA process of generating certification guidelines for predictive windshear detection systems. NASA participants felt that more valuable technology products were generated by the program because of this interaction. NASA involvement in the process and the resulting impact on products and technology transfer are discussed in this paper.

  5. Confronting Global Issues: A Multipurpose IR Simulation

    ERIC Educational Resources Information Center

    Shellman, Stephen M.; Turan, Kursad

    2006-01-01

    This article describes an international relations simulation that focuses on threats of transnational insurgent organizations, the future of the Iraqi regime, and the effect of globalization on foreign policies. It contains both the Simulation Director's Guide and the Participant's Guide. The guides explain the steps taken to run the simulation…

  6. Design of an electron-accelerator-driven compact neutron source for non-destructive assay

    NASA Astrophysics Data System (ADS)

    Murata, A.; Ikeda, S.; Hayashizaki, N.

    2017-09-01

    The threat of nuclear and radiological terrorism remains one of the greatest challenges to international security, and the threat is constantly evolving. In order to prevent nuclear terrorism, it is important to avoid unlawful import of nuclear materials, such as uranium and plutonium. Development of technologies for non-destructive measurement, detection and recognition of nuclear materials is essential for control at national borders. At Tokyo Institute of Technology, a compact neutron source system driven by an electron-accelerator has been designed for non-destructive assay (NDA). This system is composed of a combination of an S-band (2.856 GHz) RF-gun, a tungsten target to produce photons by bremsstrahlung, a beryllium target, which is suitable for use in generating neutrons because of the low threshold energy of photonuclear reactions, and a moderator to thermalize the fast neutrons. The advantage of this system can accelerate a short pulse beam with a pulse width less than 1 μs which is difficult to produce by neutron generators. The amounts of photons and neutron produced by electron beams were simulated using the Monte Carlo simulation code PHITS 2.82. When the RF-gun is operated with an average electron beam current of 0.1 mA, it is expected that the neutron intensities are 1.19 × 109 n/s and 9.94 × 109 n/s for incident electron beam energies of 5 MeV and 10 MeV, respectively.

  7. Neutron Interrogation System For Underwater Threat Detection And Identification

    NASA Astrophysics Data System (ADS)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-01

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  8. Stress lowers the detection threshold for foul-smelling 2-mercaptoethanol.

    PubMed

    Pacharra, Marlene; Schäper, Michael; Kleinbeck, Stefan; Blaszkewicz, Meinolf; Wolf, Oliver T; van Thriel, Christoph

    2016-01-01

    Previous studies have reported enhanced vigilance for threat-related information in response to acute stress. While it is known that acute stress modulates sensory systems in humans, its impact on olfaction and the olfactory detection of potential threats is less clear. Two psychophysical experiments examined, if acute stress lowers the detection threshold for foul-smelling 2-mercaptoethanol. Participants in Experiment 1 (N = 30) and Experiment 2 (N = 32) were randomly allocated to a control group or a stress group. Participants in the stress group underwent a purely psychosocial stressor (public mental arithmetic) in Experiment 1 and a stressor that combined a physically demanding task with social-evaluative threat in Experiment 2 (socially evaluated cold-pressor test). In both experiments, olfactory detection thresholds were repeatedly assessed by means of dynamic dilution olfactometry. Each threshold measurement consisted of three trials conducted using an ascending method of limits. Participants in the stress groups showed the expected changes in heart rate, salivary cortisol, and mood measures in response to stress. About 20 min after the stressor, participants in the stress groups could detect 2-mercaptoethanol at a lower concentration than participants in the corresponding control groups. Our results show that acute stress lowers the detection threshold for a malodor.

  9. Anomaly Detection in Gamma-Ray Vehicle Spectra with Principal Components Analysis and Mahalanobis Distances

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tardiff, Mark F.; Runkle, Robert C.; Anderson, K. K.

    2006-01-23

    The goal of primary radiation monitoring in support of routine screening and emergency response is to detect characteristics in vehicle radiation signatures that indicate the presence of potential threats. Two conceptual approaches to analyzing gamma-ray spectra for threat detection are isotope identification and anomaly detection. While isotope identification is the time-honored method, an emerging technique is anomaly detection that uses benign vehicle gamma ray signatures to define an expectation of the radiation signature for vehicles that do not pose a threat. Newly acquired spectra are then compared to this expectation using statistical criteria that reflect acceptable false alarm rates andmore » probabilities of detection. The gamma-ray spectra analyzed here were collected at a U.S. land Port of Entry (POE) using a NaI-based radiation portal monitor (RPM). The raw data were analyzed to develop a benign vehicle expectation by decimating the original pulse-height channels to 35 energy bins, extracting composite variables via principal components analysis (PCA), and estimating statistically weighted distances from the mean vehicle spectrum with the mahalanobis distance (MD) metric. This paper reviews the methods used to establish the anomaly identification criteria and presents a systematic analysis of the response of the combined PCA and MD algorithm to modeled mono-energetic gamma-ray sources.« less

  10. Stochastic model for threat assessment in multi-sensor defense system

    NASA Astrophysics Data System (ADS)

    Wang, Yongcheng; Wang, Hongfei; Jiang, Changsheng

    2007-11-01

    This paper puts forward a stochastic model for target detecting and tracking in multi-sensor defense systems and applies the Lanchester differential equations to threat assessment in combat. The two different modes of targets tracking and their respective Lanchester differential equations are analyzed and established. By use of these equations, we could briefly estimate the loss of each combat side and accordingly get the threat estimation results, given the situation analysis is accomplished.

  11. Assessing Threat Detection Scenarios through Hypothesis Generation and Testing

    DTIC Science & Technology

    2015-12-01

    Dog Day scenario .............................................................................................................. 9...Figure 1. Rankings of priority threats identified in the Dog Day scenario ............................... 9 Figure 2. Rankings of priority...making in uncertain environments relies heavily on pattern matching. Cohen, Freeman, and Wolf (1996) reported that features of the decision problem

  12. Predictive Analytics for Safer Food Supply

    USDA-ARS?s Scientific Manuscript database

    Science based risk analysis improves the USDA Food Safety Inspection Service’s ability to combat threats to public health from food-borne illness by allowing the Agency to focus resources on hazards that pose the greatest risk. Innovative algorithms enable detection and containment of threat by an...

  13. Chemical Sniffing Instrumentation for Security Applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; Marshall, Alan; Verbeck, Guido F

    2016-07-27

    Border control for homeland security faces major challenges worldwide due to chemical threats from national and/or international terrorism as well as organized crime. A wide range of technologies and systems with threat detection and monitoring capabilities has emerged to identify the chemical footprint associated with these illegal activities. This review paper investigates artificial sniffing technologies used as chemical sensors for point-of-use chemical analysis, especially during border security applications. This article presents an overview of (a) the existing available technologies reported in the scientific literature for threat screening, (b) commercially available, portable (hand-held and stand-off) chemical detection systems, and (c) their underlying functional and operational principles. Emphasis is given to technologies that have been developed for in-field security operations, but laboratory developed techniques are also summarized as emerging technologies. The chemical analytes of interest in this review are (a) volatile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and terrorist events), (b) chemical "signatures" associated with human presence, and (c) threat compounds (drugs, explosives, and chemical warfare agents).

  14. MF/HF Multistatic Mid-Ocean Radar Experiments in Support of SWOTHR (surface-Wave Over-the-Horizon Radar)

    DTIC Science & Technology

    1989-09-16

    SWOTHR was conceived to be an organic asset capable of providing early detection and tracking of fast , surface-skimming threats, such as cruise missiles...distributed real-time processing and threat tracking system. Spe- cific project goals were to verify detection performance pree ctions for small, fast targets...means that enlarging the ground plane would have been a fruitless excercise in any event. B-6 5 i I U Table B-1 summarizes the calculated parameters of

  15. Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments

    DTIC Science & Technology

    2010-11-01

    behavioral feature values. This would provide a baseline notional object trust and is formally defined as follows: TO(1)[0, 1] = ∑ 0,n:νbt wtP (S) (8...TO(2)[0, 1] = ∑ wtP (S) · identity(O,P ) (9) 28- 12 RTO-MP-IST-091 Combining Trust and Behavioral Analysis to Detect Security Threats in Open...respectively. The wtP weight function determines the significance of a particular behavioral feature in the final trust calculation. Note that the weight

  16. Advances in chemical sensing technologies for VOCs in breath for security/threat assessment, illicit drug detection, and human trafficking activity.

    PubMed

    Giannoukos, S; Agapiou, A; Taylor, S

    2018-01-17

    On-site chemical sensing of compounds associated with security and terrorist attacks is of worldwide interest. Other related bio-monitoring topics include identification of individuals posing a threat from illicit drugs, explosive manufacturing, as well as searching for victims of human trafficking and collapsed buildings. The current status of field analytical technologies is directed towards the detection and identification of vapours and volatile organic compounds (VOCs). Some VOCs are associated with exhaled breath, where research is moving from individual breath testing (volatilome) to cell breath (microbiome) and most recently to crowd breath metabolites (exposome). In this paper, an overview of field-deployable chemical screening technologies (both stand-alone and those with portable characteristics) is given with application to early detection and monitoring of human exposome in security operations. On-site systems employed in exhaled breath analysis, i.e. mass spectrometry (MS), optical spectroscopy and chemical sensors are reviewed. Categories of VOCs of interest include (a) VOCs in human breath associated with exposure to threat compounds, and (b) VOCs characteristic of, and associated with, human body odour (e.g. breath, sweat). The latter are relevant to human trafficking scenarios. New technological approaches in miniaturised detection and screening systems are also presented (e.g. non-scanning digital light processing linear ion trap MS (DLP-LIT-MS), nanoparticles, mid-infrared photo-acoustic spectroscopy and hyphenated technologies). Finally, the outlook for rapid and precise, real-time field detection of threat traces in exhaled breath is revealed and discussed.

  17. Temporal allocation of attention toward threat in individuals with posttraumatic stress symptoms.

    PubMed

    Amir, Nader; Taylor, Charles T; Bomyea, Jessica A; Badour, Christal L

    2009-12-01

    Research suggests that individuals with posttraumatic stress disorder (PTSD) selectively attend to threat-relevant information. However, little is known about how initial detection of threat influences the processing of subsequently encountered stimuli. To address this issue, we used a rapid serial visual presentation paradigm (RSVP; Raymond, J. E., Shapiro, K. L., & Arnell, K. M. (1992). Temporary suppression of visual processing in an RSVP task: An attentional blink? Journal of Experimental Psychology: Human Perception and Performance, 18, 849-860) to examine temporal allocation of attention to threat-related and neutral stimuli in individuals with PTSD symptoms (PTS), traumatized individuals without PTSD symptoms (TC), and non-anxious controls (NAC). Participants were asked to identify one or two targets in an RSVP stream. Typically processing of the first target decreases accuracy of identifying the second target as a function of the temporal lag between targets. Results revealed that the PTS group was significantly more accurate in detecting a neutral target when it was presented 300 or 500ms after threat-related stimuli compared to when the target followed neutral stimuli. These results suggest that individuals with PTSD may process trauma-relevant information more rapidly and efficiently than benign information.

  18. Improving rotorcraft survivability to RPG attack using inverse methods

    NASA Astrophysics Data System (ADS)

    Anderson, D.; Thomson, D. G.

    2009-09-01

    This paper presents the results of a preliminary investigation of optimal threat evasion strategies for improving the survivability of rotorcraft under attack by rocket propelled grenades (RPGs). The basis of this approach is the application of inverse simulation techniques pioneered for simulation of aggressive helicopter manoeuvres to the RPG engagement problem. In this research, improvements in survivability are achieved by computing effective evasive manoeuvres. The first step in this process uses the missile approach warning system camera (MAWS) on the aircraft to provide angular information of the threat. Estimates of the RPG trajectory and impact point are then estimated. For the current flight state an appropriate evasion response is selected then realised via inverse simulation of the platform dynamics. Results are presented for several representative engagements showing the efficacy of the approach.

  19. Countering MANPADS: study of new concepts and applications

    NASA Astrophysics Data System (ADS)

    Maltese, Dominique; Robineau, Jacques; Audren, Jean-Thierry; Aragones, Julien; Sailliot, Christophe

    2006-05-01

    The latest events of ground-to-air Man Portable Air Defense (MANPAD) attacks against aircraft have revealed a new threat both for military and civilian aircraft. Consequently, the implementation of Protecting systems (i.e. Directed InfraRed Counter Measure - DIRCM) in order to face IR guided missiles turns out to be now inevitable. In a near future, aircraft will have to possess detection, tracking, targeting and jamming capabilities to face single and multiple MANPAD threats fired in short-range scenarios from various environments (urban sites, landscape...). In this paper, a practical example of a DIRCM system under study at SAGEM DEFENSE & SECURITY company is presented. The self-protection solution includes built-in and automatic locking-on, tracking, identification and laser jamming capabilities, including defeat assessment. Target Designations are provided by a Missile Warning System. Multiple Target scenarios have been considered to design the system architecture. The article deals with current and future threats (IR seekers of different generations...), scenarios and platforms for system definition. Plus, it stresses on self-protection solutions based on laser jamming capability. Different strategies including target identification, multi band laser, active imagery are described. The self-protection system under study at SAGEM DEFENSE & SECURITY company is also a part of this chapter. Eventually, results of self-protection scenarios are provided for different MANPAD scenarios. Data have been obtained from a simulation software. The results highlight how the system reacts to incoming IR-guided missiles in short time scenarios.

  20. NA22 Model Cities Project - LL244T An Intelligent Transportation System-Based Radiation Alert and Detection System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peglow, S

    2004-02-24

    The purpose of this project was twofold: first, provide an understanding of the technical foundation and planning required for deployment of Intelligent Transportation System (ITS)-based system architectures for the protection of New York City from a terrorist attack using a vehicle-deployed nuclear device; second, work with stakeholders to develop mutual understanding of the technologies and tactics required for threat detection/identification and establish guidelines for designing operational systems and procedures. During the course of this project we interviewed and coordinated analysis with people from the New Jersey State Attorney General's office, the New Jersey State Police, the Port Authority of Newmore » York/New Jersey, the Counterterrorism Division of the New York City Police Department, the New Jersey Transit Authority, the State of New Jersey Department of Transportation, TRANSCOM and a number of contractors involved with state and federal intelligent transportation development and implementation. The basic system architecture is shown in the figure below. In an actual system deployment, radiation sensors would be co-located with existing ITS elements and the data will be sent to the Traffic Operations Center. A key element of successful system operation is the integration of vehicle data, such as license plate, EZ pass ID, vehicle type/color and radiation signature. A threat data base can also be implemented and utilized in cases where there is a suspect vehicle identified from other intelligence sources or a mobile detector system. Another key aspect of an operational architecture is the procedures used to verify the threat and plan interdiction. This was a major focus of our work and discussed later in detail. In support of the operational analysis, we developed a detailed traffic simulation model that is described extensively in the body of the report.« less

  1. Identification of Malicious Web Pages by Inductive Learning

    NASA Astrophysics Data System (ADS)

    Liu, Peishun; Wang, Xuefang

    Malicious web pages are an increasing threat to current computer systems in recent years. Traditional anti-virus techniques focus typically on detection of the static signatures of Malware and are ineffective against these new threats because they cannot deal with zero-day attacks. In this paper, a novel classification method for detecting malicious web pages is presented. This method is generalization and specialization of attack pattern based on inductive learning, which can be used for updating and expanding knowledge database. The attack pattern is established from an example and generalized by inductive learning, which can be used to detect unknown attacks whose behavior is similar to the example.

  2. EVALUATION OF SENSOR AND MONITORS TO DETECT CHANGES IN WATER QUALITY

    EPA Science Inventory

    The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...

  3. Combatting Insider Threats

    NASA Astrophysics Data System (ADS)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  4. Prevalence effects in newly trained airport checkpoint screeners: trained observers miss rare targets, too.

    PubMed

    Wolfe, Jeremy M; Brunelli, David N; Rubinstein, Joshua; Horowitz, Todd S

    2013-12-02

    Many socially important search tasks are characterized by low target prevalence, meaning that targets are rarely encountered. For example, transportation security officers (TSOs) at airport checkpoints encounter very few actual threats in carry-on bags. In laboratory-based visual search experiments, low prevalence reduces the probability of detecting targets (Wolfe, Horowitz, & Kenner, 2005). In the lab, this "prevalence effect" is caused by changes in decision and response criteria (Wolfe & Van Wert, 2010) and can be mitigated by presenting a burst of high-prevalence search with feedback (Wolfe et al., 2007). The goal of this study was to see if these effects could be replicated in the field with TSOs. A total of 125 newly trained TSOs participated in one of two experiments as part of their final evaluation following training. They searched for threats in simulated bags across five blocks. The first three blocks were low prevalence (target prevalence ≤ .05) with no feedback; the fourth block was high prevalence (.50) with full feedback; and the final block was, again, low prevalence. We found that newly trained TSOs were better at detecting targets at high compared to low prevalence, replicating the prevalence effect. Furthermore, performance was better (and response criterion was more "liberal") in the low-prevalence block that took place after the high-prevalence block than in the initial three low-prevalence blocks, suggesting that a burst of high-prevalence trials may help alleviate the prevalence effect in the field.

  5. Prevalence effects in newly trained airport checkpoint screeners: Trained observers miss rare targets, too

    PubMed Central

    Wolfe, Jeremy M.; Brunelli, David N.; Rubinstein, Joshua; Horowitz, Todd S.

    2013-01-01

    Many socially important search tasks are characterized by low target prevalence, meaning that targets are rarely encountered. For example, transportation security officers (TSOs) at airport checkpoints encounter very few actual threats in carry-on bags. In laboratory-based visual search experiments, low prevalence reduces the probability of detecting targets (Wolfe, Horowitz, & Kenner, 2005). In the lab, this “prevalence effect” is caused by changes in decision and response criteria (Wolfe & Van Wert, 2010) and can be mitigated by presenting a burst of high-prevalence search with feedback (Wolfe et al., 2007). The goal of this study was to see if these effects could be replicated in the field with TSOs. A total of 125 newly trained TSOs participated in one of two experiments as part of their final evaluation following training. They searched for threats in simulated bags across five blocks. The first three blocks were low prevalence (target prevalence ≤ .05) with no feedback; the fourth block was high prevalence (.50) with full feedback; and the final block was, again, low prevalence. We found that newly trained TSOs were better at detecting targets at high compared to low prevalence, replicating the prevalence effect. Furthermore, performance was better (and response criterion was more “liberal”) in the low-prevalence block that took place after the high-prevalence block than in the initial three low-prevalence blocks, suggesting that a burst of high-prevalence trials may help alleviate the prevalence effect in the field. PMID:24297778

  6. Approach/avoidance in dreams.

    PubMed

    Malcolm-Smith, Susan; Koopowitz, Sheri; Pantelis, Eleni; Solms, Mark

    2012-03-01

    The influential threat simulation theory (TST) asserts that dreaming yields adaptive advantage by providing a virtual environment in which threat-avoidance may be safely rehearsed. We have previously found the incidence of biologically threatening dreams to be around 20%, with successful threat avoidance occurring in approximately one-fifth of such dreams. TST asserts that threat avoidance is over-represented relative to other possible dream contents. To begin assessing this issue, we contrasted the incidence of 'avoidance' dreams with that of their opposite: 'approach' dreams. Because TST states that the threat-avoidance function is only fully activated in ecologically valid (biologically threatening) contexts, we also performed this contrast for populations living in both high- and low-threat environments. We find that 'approach' dreams are significantly more prevalent across both contexts. We suggest these results are more consistent with the view that dreaming is generated by reward-seeking systems than by fear-conditioning systems, although reward-seeking is clearly not the only factor determining the content of dreams. Copyright © 2011 Elsevier Inc. All rights reserved.

  7. Open-area concealed-weapon detection system

    NASA Astrophysics Data System (ADS)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  8. Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.

    2006-08-01

    The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presentlymore » under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.« less

  9. Evaluating 6 ricin field detection assays.

    PubMed

    Slotved, Hans-Christian; Sparding, Nadja; Tanassi, Julia Tanas; Steenhard, Nina R; Heegaard, Niels H H

    2014-01-01

    This study presents data showing the performance of 6 commercial detection assays against ricin around concentrations specified as detection limits by the producers. A 2-fold dilution series of 20 ng/ml ricin was prepared and used for testing the lateral-flow kits: BADD, Pro Strips™, ENVI, RAID DX, Ricin BioThreat Alert, and IMASS™ device. Three of the 6 tested field assays (IMASS™ device, ENVI assay, and the BioThreat Alert assay) were able to detect ricin, although differences in the measured detection limits compared to the official detection limits and false-negative results were observed. We were not able to get the BADD, Pro Strips™, and RAID assays to function in our laboratory. We conclude that when purchasing a field responder assay, there is large variation in the specificity of the assays, and a number of in-house tests must be performed to ensure functionality.

  10. Strategic Analysis of Family Support in EHDI Systems

    ERIC Educational Resources Information Center

    Bradham, Tamala S.; Houston, K. Todd; Guignard, Gayla Hutsell; Hoffman, Jeff

    2011-01-01

    State coordinators of early hearing detection and intervention (EHDI) programs completed a strengths, weaknesses, opportunities, and threats, or SWOT, analysis that examined 12 areas within state EHDI programs. For the family support area, 47 EHDI coordinators listed 255 items, and themes were identified within each category. A threats,…

  11. A Threat-Detection Advantage in Those with Autism Spectrum Disorders

    ERIC Educational Resources Information Center

    Krysko, Krysko M.; Rutherford, M. D.

    2009-01-01

    Identifying threatening expressions is a significant social perceptual skill. Individuals with autism spectrum disorders (ASD) are impaired in social interaction, show deficits in face and emotion processing, show amygdala abnormalities and display a disadvantage in the perception of social threat. According to the anger superiority hypothesis,…

  12. Data Management in the EHDI System

    ERIC Educational Resources Information Center

    Bradham, Tamala S.; Hoffman, Jeff; Houston, K. Todd

    2011-01-01

    State coordinators of early hearing detection and intervention (EHDI) programs completed a strengths, weaknesses, opportunities, and threats, or SWOT, analysis that examined 12 areas within EHDI programs. Forty-seven coordinators listed 242 items in the area of data management, and themes were identified in each category. A threats, opportunities,…

  13. Wireless sensors and sensor networks for homeland security applications.

    PubMed

    Potyrailo, Radislav A; Nagraj, Nandini; Surman, Cheryl; Boudries, Hacene; Lai, Hanh; Slocik, Joseph M; Kelley-Loughnane, Nancy; Naik, Rajesh R

    2012-11-01

    New sensor technologies for homeland security applications must meet the key requirements of sensitivity to detect agents below risk levels, selectivity to provide minimal false-alarm rates, and response speed to operate in high throughput environments, such as airports, sea ports, and other public places. Chemical detection using existing sensor systems is facing a major challenge of selectivity. In this review, we provide a brief summary of chemical threats of homeland security importance; focus in detail on modern concepts in chemical sensing; examine the origins of the most significant unmet needs in existing chemical sensors; and, analyze opportunities, specific requirements, and challenges for wireless chemical sensors and wireless sensor networks (WSNs). We further review a new approach for selective chemical sensing that involves the combination of a sensing material that has different response mechanisms to different species of interest, with a transducer that has a multi-variable signal-transduction ability. This new selective chemical-sensing approach was realized using an attractive ubiquitous platform of battery-free passive radio-frequency identification (RFID) tags adapted for chemical sensing. We illustrate the performance of RFID sensors developed in measurements of toxic industrial materials, humidity-independent detection of toxic vapors, and detection of chemical-agent simulants, explosives, and strong oxidizers.

  14. Compressed Sensing Techniques Applied to Ultrasonic Imaging of Cargo Containers.

    PubMed

    López, Yuri Álvarez; Lorenzo, José Ángel Martínez

    2017-01-15

    One of the key issues in the fight against the smuggling of goods has been the development of scanners for cargo inspection. X-ray-based radiographic system scanners are the most developed sensing modality. However, they are costly and use bulky sources that emit hazardous, ionizing radiation. Aiming to improve the probability of threat detection, an ultrasonic-based technique, capable of detecting the footprint of metallic containers or compartments concealed within the metallic structure of the inspected cargo, has been proposed. The system consists of an array of acoustic transceivers that is attached to the metallic structure-under-inspection, creating a guided acoustic Lamb wave. Reflections due to discontinuities are detected in the images, provided by an imaging algorithm. Taking into consideration that the majority of those images are sparse, this contribution analyzes the application of Compressed Sensing (CS) techniques in order to reduce the amount of measurements needed, thus achieving faster scanning, without compromising the detection capabilities of the system. A parametric study of the image quality, as a function of the samples needed in spatial and frequency domains, is presented, as well as the dependence on the sampling pattern. For this purpose, realistic cargo inspection scenarios have been simulated.

  15. Compressed Sensing Techniques Applied to Ultrasonic Imaging of Cargo Containers

    PubMed Central

    Álvarez López, Yuri; Martínez Lorenzo, José Ángel

    2017-01-01

    One of the key issues in the fight against the smuggling of goods has been the development of scanners for cargo inspection. X-ray-based radiographic system scanners are the most developed sensing modality. However, they are costly and use bulky sources that emit hazardous, ionizing radiation. Aiming to improve the probability of threat detection, an ultrasonic-based technique, capable of detecting the footprint of metallic containers or compartments concealed within the metallic structure of the inspected cargo, has been proposed. The system consists of an array of acoustic transceivers that is attached to the metallic structure-under-inspection, creating a guided acoustic Lamb wave. Reflections due to discontinuities are detected in the images, provided by an imaging algorithm. Taking into consideration that the majority of those images are sparse, this contribution analyzes the application of Compressed Sensing (CS) techniques in order to reduce the amount of measurements needed, thus achieving faster scanning, without compromising the detection capabilities of the system. A parametric study of the image quality, as a function of the samples needed in spatial and frequency domains, is presented, as well as the dependence on the sampling pattern. For this purpose, realistic cargo inspection scenarios have been simulated. PMID:28098841

  16. Efficiency of Airborne Sample Analysis Platform (ASAP) bioaerosol sampler for pathogen detection

    PubMed Central

    Sharma, Anurag; Clark, Elizabeth; McGlothlin, James D.; Mittal, Suresh K.

    2015-01-01

    The threat of bioterrorism and pandemics has highlighted the urgency for rapid and reliable bioaerosol detection in different environments. Safeguarding against such threats requires continuous sampling of the ambient air for pathogen detection. In this study we investigated the efficacy of the Airborne Sample Analysis Platform (ASAP) 2800 bioaerosol sampler to collect representative samples of air and identify specific viruses suspended as bioaerosols. To test this concept, we aerosolized an innocuous replication-defective bovine adenovirus serotype 3 (BAdV3) in a controlled laboratory environment. The ASAP efficiently trapped the surrogate virus at 5 × 103 plaque-forming units (p.f.u.) [2 × 105 genome copy equivalent] concentrations or more resulting in the successful detection of the virus using quantitative PCR. These results support the further development of ASAP for bioaerosol pathogen detection. PMID:26074900

  17. Inspection of the objects on the sea floor by using 14 MeV tagged neutrons

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valkovic, V.; Sudac, D.; Obhodas, J.

    2011-07-01

    Variety of objects found on the sea floor needs to be inspected for the presence of materials which represent the threat to the environment and to the safety of humans. We have demonstrated that the sealed tube 14 MeV neutron generator with the detection of associated alpha particles can be used underwater when mounted inside ROV equipped with the hydraulic legs and variety of sensors for the inspection of such objects for the presence of threat materials. Such a system is performing the measurement by using the NaI gamma detector and an API-120 neutron generator which could be rotated inmore » order to maximize the inspected target volume. The neutron beam intensity during the 10-30 min. measurements is usually 1 x 10{sup 7} n/s in 4{pi}. In this report the experimental results for some of commonly found objects containing TNT explosive or its simulant are presented. The measured gamma spectra are dominant by C, O and Fe peaks enabling the determination of the presence of explosives inside the ammunition shell. Parameters influencing the C/O ratio are discussed in some details. (authors)« less

  18. CAPS Simulation Environment Development

    NASA Technical Reports Server (NTRS)

    Murphy, Douglas G.; Hoffman, James A.

    2005-01-01

    The final design for an effective Comet/Asteroid Protection System (CAPS) will likely come after a number of competing designs have been simulated and evaluated. Because of the large number of design parameters involved in a system capable of detecting an object, accurately determining its orbit, and diverting the impact threat, a comprehensive simulation environment will be an extremely valuable tool for the CAPS designers. A successful simulation/design tool will aid the user in identifying the critical parameters in the system and eventually allow for automatic optimization of the design once the relationships of the key parameters are understood. A CAPS configuration will consist of space-based detectors whose purpose is to scan the celestial sphere in search of objects likely to make a close approach to Earth and to determine with the greatest possible accuracy the orbits of those objects. Other components of a CAPS configuration may include systems for modifying the orbits of approaching objects, either for the purpose of preventing a collision or for positioning the object into an orbit where it can be studied or used as a mineral resource. The Synergistic Engineering Environment (SEE) is a space-systems design, evaluation, and visualization software tool being leveraged to simulate these aspects of the CAPS study. The long-term goal of the SEE is to provide capabilities to allow the user to build and compare various CAPS designs by running end-to-end simulations that encompass the scanning phase, the orbit determination phase, and the orbit modification phase of a given scenario. Herein, a brief description of the expected simulation phases is provided, the current status and available features of the SEE software system is reported, and examples are shown of how the system is used to build and evaluate a CAPS detection design. Conclusions and the roadmap for future development of the SEE are also presented.

  19. Inhalation of 7.5% carbon dioxide increases threat processing in humans.

    PubMed

    Garner, Matthew; Attwood, Angela; Baldwin, David S; James, Alexandra; Munafò, Marcus R

    2011-07-01

    Inhalation of 7.5% CO(2) increases anxiety and autonomic arousal in humans, and elicits fear behavior in animals. However, it is not known whether CO(2) challenge in humans induces dysfunction in neurocognitive processes that characterize generalized anxiety, notably selective attention to environmental threat. Healthy volunteers completed an emotional antisaccade task in which they looked toward or away from (inhibited) negative and neutral stimuli during inhalation of 7.5% CO(2) and air. CO(2) inhalation increased anxiety, autonomic arousal, and erroneous eye movements toward threat on antisaccade trials. Autonomic response to CO(2) correlated with hypervigilance to threat (speed to initiate prosaccades) and reduced threat inhibition (increased orienting toward and slower orienting away from threat on antisaccade trials) independent of change in mood. Findings extend evidence that CO(2) triggers fear behavior in animals via direct innervation of a distributed fear network that mobilizes the detection of and allocation of processing resources toward environmental threat in humans.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geelhood, Bruce D.; Wogman, Ned A.

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders ismore » considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Geelhood, Bruce D.; Wogman, Ned A.

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. Themore » radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.« less

  2. Nuclear disarmament verification via resonant phenomena.

    PubMed

    Hecla, Jake J; Danagoulian, Areg

    2018-03-28

    Nuclear disarmament treaties are not sufficient in and of themselves to neutralize the existential threat of the nuclear weapons. Technologies are necessary for verifying the authenticity of the nuclear warheads undergoing dismantlement before counting them toward a treaty partner's obligation. Here we present a concept that leverages isotope-specific nuclear resonance phenomena to authenticate a warhead's fissile components by comparing them to a previously authenticated template. All information is encrypted in the physical domain in a manner that amounts to a physical zero-knowledge proof system. Using Monte Carlo simulations, the system is shown to reveal no isotopic or geometric information about the weapon, while readily detecting hoaxing attempts. This nuclear technique can dramatically increase the reach and trustworthiness of future nuclear disarmament treaties.

  3. Multimillion Atom Simulations of Nanoenergetic Materials

    DTIC Science & Technology

    2014-12-01

    L R E P O R T DTRA-TR-14-46 Multimillion Atom Simulations of Nanoenergetic Materials Distribution Statement A. Approved for public release...December 2009 Multimillion Atom Simulations of Nanoenergetic Materials HDTRA1-07-1-0023 Priya Vashishta Rajiv K. Kalia Aiichiro Nakano Collaboratory for...Technical Report (December 18, 2006—December 17, 2009) Defense Threat Reduction Agency Grant # HDTRA1-07-1-0023 Multimillion Atom Simulations of

  4. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  5. When do ego threats lead to self-regulation failure? Negative consequences of defensive high self-esteem.

    PubMed

    Lambird, Kathleen Hoffman; Mann, Traci

    2006-09-01

    High self-esteem (HSE) is increasingly recognized as heterogeneous. By measuring subtypes of HSE, the present research reevaluates the finding that HSE individuals show poor self-regulation following ego threat (Baumeister, Heatherton, & Tice, 1993). In Experiment 1, participants with HSE showed poor self-regulation after ego threat only if they also were defensive (high in self-presentation bias). In Experiment 2, two measures--self-presentation bias and implicit self-esteem--were used to subtype HSE individuals as defensive. Both operationalizations of defensive HSE predicted poor self-regulation after ego threat. The results indicate that (a) only defensive HSE individuals are prone to self-regulation failure following ego threat and (b) measures of self-presentation bias and implicit self-esteem can both be used to detect defensiveness.

  6. Issues in national missile defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canavan, G.H.

    1998-12-01

    Strategic missiles and weapons are proliferating rapidly; thus, the US and its Allies are likely to face both capable bilateral threats and multilateral configurations with complex coalitions for which defenses could be essential for stability. Current hit-to-kill interceptor and radar and infrared detection, track, and discrimination technology should suffice for limited threats, but it is necessary to meet those threats in time while maintaining growth potential for the more sophisticated threats likely to follow. National Missile Defense faces a confusing array of threats, programs, and alternatives, but the technologies in development are clearly an appropriate first step towards any ofmore » them. They are likely to succeed in the near term; the challenge is to retain flexibility to provide needed options in the mid and long terms.« less

  7. Threat-detection in child development: an evolutionary perspective.

    PubMed

    Boyer, Pascal; Bergstrom, Brian

    2011-03-01

    Evidence for developmental aspects of fear-targets and anxiety suggests a complex but stable pattern whereby specific kinds of fears emerge at different periods of development. This developmental schedule seems appropriate to dangers encountered repeatedly during human evolution. Also consistent with evolutionary perspective, the threat-detection systems are domain-specific, comprising different kinds of cues to do with predation, intraspecific violence, contamination-contagion and status loss. Proper evolutionary models may also be relevant to outstanding issues in the domain, notably the connections between typical development and pathology. Copyright © 2010 Elsevier Ltd. All rights reserved.

  8. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  9. Potential of preemptive DIRCM systems

    NASA Astrophysics Data System (ADS)

    Steinvall, Ove

    2015-10-01

    Manpads offer a severe threat to both civilian and military airborne platforms. The present countermeasure systems include platform maneuver, flares and DIRCM systems. Recently an increasing interest is aimed at preemptive measures e.g. to detect, identify and counter the threat before any missile has been launched. This will emphasize the importance of detecting and analyzing other signatures than those treated in conventional DIRCM systems. These may include laser emission from the target, detection of retro-reflections from optical sights and seekers as well as the optical signatures of the weapon and operator including the aiming and tracking activity. We will exemplify some of the concepts by experimental results and discuss some of the system and technology challenges.

  10. Exploring the function of selective attention and hypervigilance for threat in anxiety.

    PubMed

    Richards, Helen J; Benson, Valerie; Donnelly, Nick; Hadwin, Julie A

    2014-02-01

    Theoretical frameworks of anxiety propose that attentional biases to threat-related stimuli cause or maintain anxious states. The current paper draws on theoretical frameworks and key empirical studies to outline the distinctive attentional processes highlighted as being important in understanding anxiety. We develop a conceptual framework to make a distinction between two attentional biases: selective attention to threat and hypervigilance for threat. We suggest that these biases each have a different purpose and can account for the typical patterns of facilitated and impaired attention evident in anxious individuals. The framework is novel in its specification of the eye movement behavior associated with these attentional biases. We highlight that selective attention involves narrowing overt attention onto threat to ensure that these stimuli receive processing priority, leading to rapid engagement with task-relevant threat and delayed disengagement from task-irrelevant threat. We show that hypervigilance operates in the presence and absence of threat and involves monitoring for potential dangers via attentional broadening or excessive scanning of the environment with numerous eye movements, leading to improved threat detection and increased distraction from task-irrelevant threat. We conclude that future research could usefully employ eye movement measures to more clearly understand the diverse roles of attention in anxiety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Biological Defense: DOD Has Strengthened Coordination on Medical Countermeasures but Can Improve Its Process for Threat Prioritization

    DTIC Science & Technology

    2014-05-01

    applicability of DOD Directive 6205.3, which they believe was made obsolete when the 2001 Quadrennial Defense Review established DOD’s emphasis on...gas masks, gloves, and boots, or biosurveillance and detection equipment in our analysis. We included in our definition of “biological threat

  12. Stand-off CWA imaging system: second sight MS

    NASA Astrophysics Data System (ADS)

    Bernascolle, Philippe F.; Elichabe, Audrey; Fervel, Franck; Haumonté, Jean-Baptiste

    2012-06-01

    In recent years, several manufactures of IR imaging devices have launched commercial models applicable to a wide range of chemical species. These cameras are rugged and sufficiently sensitive to detect low concentrations of toxic and combustible gases. Bertin Technologies, specialized in the design and supply of innovating systems for industry, defense and health, has developed a stand-off gas imaging system using a multi-spectral infrared imaging technology. With this system, the gas cloud size, localization and evolution can be displayed in real time. This technology was developed several years ago in partnership with the CEB, a French MoD CBRN organization. The goal was to meet the need for early warning caused by a chemical threat. With a night & day efficiency of up to 5 km, this process is able to detect Chemical Warfare Agents (CWA), critical Toxic Industrial Compounds (TIC) and also flammable gases. The system has been adapted to detect industrial spillage, using off-the-shelf uncooled infrared cameras, allowing 24/7 surveillance without costly frequent maintenance. The changes brought to the system are in compliance with Military Specifications (MS) and primarily focus on the signal processing improving the classification of the detected products and on the simplification of the Human Machine Interface (HMI). Second Sight MS is the only mass produced, passive stand-off CWA imaging system with a wide angle (up to 60°) already used by several regular armies around the world. This paper examines this IR gas imager performance when exposed to several CWA, TIC and simulant compounds. First, we will describe the Second Sight MS system. The theory of gas detection, visualization and classification functions has already been described elsewhere, so we will just summarize it here. We will then present the main topic of this paper which is the results of the tests done in laboratory on live agents and in open field on simulant. The sensitivity threshold of the camera measured in laboratory, on some CWA (G, H agents...) and TIC (ammonia, sulfur dioxide...) will be given. The result of the detection and visualization of a gas cloud in open field testing for some simulants (DMMP, SF6) at a far distance will be also shown.

  13. Editorial: Biological Engagement Programs: Reducing Threats and Strengthening Global Health Security Through Scientific Collaboration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fair, Jeanne M.

    It is often said about infectious diseases that a “threat anywhere is a threat everywhere,” and the recent outbreaks of Ebola in West Africa and Zika virus in South America have proven that pathogens know no borders. Not only are they transboundary, pathogens do not discriminate who they infect. In addition to the natural increase in emerging zoonotic infectious diseases worldwide due to changing environmental conditions and globalization, the use of infectious diseases as warfare agents is a threat in today’s world. Early detection remains one of the best ways to prevent small outbreaks becoming epidemics and pandemics. We findmore » that an accurate diagnosis, detection, and reporting of diseases are important components of mitigating outbreaks, and biosurveillance remains the top tool in our toolbox. And while vaccines have been important for controlling more common infectious virus diseases, they are less feasible for less common diseases, emerging pathogens, and rapidly evolving microbes. Furthermore, due to globalization and increased travel, emigration, and migration, biosurveillance is critical throughout the world, not just in pockets of more developed regions.« less

  14. Editorial: Biological Engagement Programs: Reducing Threats and Strengthening Global Health Security Through Scientific Collaboration

    DOE PAGES

    Fair, Jeanne M.

    2017-07-12

    It is often said about infectious diseases that a “threat anywhere is a threat everywhere,” and the recent outbreaks of Ebola in West Africa and Zika virus in South America have proven that pathogens know no borders. Not only are they transboundary, pathogens do not discriminate who they infect. In addition to the natural increase in emerging zoonotic infectious diseases worldwide due to changing environmental conditions and globalization, the use of infectious diseases as warfare agents is a threat in today’s world. Early detection remains one of the best ways to prevent small outbreaks becoming epidemics and pandemics. We findmore » that an accurate diagnosis, detection, and reporting of diseases are important components of mitigating outbreaks, and biosurveillance remains the top tool in our toolbox. And while vaccines have been important for controlling more common infectious virus diseases, they are less feasible for less common diseases, emerging pathogens, and rapidly evolving microbes. Furthermore, due to globalization and increased travel, emigration, and migration, biosurveillance is critical throughout the world, not just in pockets of more developed regions.« less

  15. Common IED exploitation target set ontology

    NASA Astrophysics Data System (ADS)

    Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William

    2010-04-01

    The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.

  16. The Effect of Active Versus Passive Training Strategies on Improving Older Drivers’ Scanning in Intersections

    PubMed Central

    Romoser, Matthew R. E.; Fisher, Donald L.

    2010-01-01

    Objective This study aimed (a) to determine whether older drivers looked less often for potential threats while turning than younger drivers and (b) to compare the effectiveness of active and passive training on older drivers’ performance and evaluation of their driving skills in intersections. Background Age-related declines in vision, physical abilities, psychomotor coordination, and cognition combine to make it less likely that older drivers will look for potential threats during a turn. Research suggests that active training should be an effective means of improving older drivers’ performance and self-awareness. Method In Experiment 1, younger and older participants drove a series of virtual intersection scenarios, were shown video replays, and were provided feedback. In Experiment 2, older drivers were assigned to one of three cohorts: active simulator training, passive classroom training, or no training. Pre- and posttraining simulator and field drives assessed training effectiveness. Results In Experiment 1, older drivers looked less often during turns than younger drivers. Customized feedback was successful in altering drivers’ perception of their abilities. In Experiment 2, active training increased a driver’s probability of looking for a threat during a turn by nearly 100% in both posttraining simulator and field drives. Those receiving passive training or no training showed no improvement. Conclusion Compared with passive training, active training is a more effective strategy for increasing older drivers’ likelihood of looking for threats during a turn. Application The results of this research can guide the development of programs that could reduce intersection crashes among older drivers. PMID:20196291

  17. Finite Element Based Optimization of Material Parameters for Enhanced Ballistic Protection

    NASA Astrophysics Data System (ADS)

    Ramezani, Arash; Huber, Daniel; Rothe, Hendrik

    2013-06-01

    The threat imposed by terrorist attacks is a major hazard for military installations, vehicles and other items. The large amounts of firearms and projectiles that are available, pose serious threats to military forces and even civilian facilities. An important task for international research and development is to avert danger to life and limb. This work will evaluate the effect of modern armor with numerical simulations. It will also provide a brief overview of ballistic tests in order to offer some basic knowledge of the subject, serving as a basis for the comparison of simulation results. The objective of this work is to develop and improve the modern armor used in the security sector. Numerical simulations should replace the expensive ballistic tests and find vulnerabilities of items and structures. By progressively changing the material parameters, the armor is to be optimized. Using a sensitivity analysis, information regarding decisive variables is yielded and vulnerabilities are easily found and eliminated afterwards. To facilitate the simulation, advanced numerical techniques have been employed in the analyses.

  18. Population viability analysis of the Endangered shortnose sturgeon

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jager, Yetta; Bevelhimer, Mark S; Peterson, Douglas L.

    2011-07-01

    This study used population viability analysis (PVA) to partition the influences of potential threats to the endangered shortnose sturgeon (Acipenser brevirostrum). A workshop brought together experts to help identify potential threats including groundwater withdrawal, poor water quality, saltwater intrusion, mercury effects, harvest as by-catch, and sedimentation of spawning habitat. During the course of the project, we eliminated some threats and added new ones. Groundwater withdrawal was dismissed after a study failed to identify connection with groundwater and the majority of pumping is from a confined aquifer. We also eliminated activities on Fort Stewart as influences on spawning habitat because anymore » successful spawning must occur upstream of Fort Stewart. We added climate change to the list of threats based on our assessment of temperature effects and expectations of sea-level rise. Our study highlighted the role of populations in nearby rivers in providing metapopulation support, raising the concern that the population in the Ogeechee River acts as a demographic sink. As part of this study, we carried out a field sampling study to analyze effects of training activities on headwater streams. We developed a new methodology for sampling design as part of this effort and used a mixed-modeling approach to identify relationships between land cover-land use, including those associated with military training activity and water quality. We found that tank training was associated with higher suspended sediment and equipment training was associated with higher organic carbon) and water quality. We detected effects of training on suspended sediment and organic carbon. We also carried out a field sampling effort in the Canoochee and Ogeechee Rivers. In the Ogeechee River, we found that dissolved oxygen in 40% of measurements during summer were below 4 mg L-1. To evaluate mercury as a potential threat, we developed a mercury uptake model and analyzed mercury levels in amphipod prey and sturgeon eggs. These did not exceed EPA guidelines. Finally, we developed a PVA model that including linkages between shortnose sturgeon growth, reproduction, and survival and each remaining threat; All three had significant influences. Preliminary simulations suggest that elevated temperatures under future climate will extirpate this population and add support to the hypothesis that this species requires access to spawning habitat far upstream to persist.« less

  19. Clinical laboratory as an economic model for business performance analysis

    PubMed Central

    Buljanović, Vikica; Patajac, Hrvoje; Petrovečki, Mladen

    2011-01-01

    Aim To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Methods Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. Conclusion The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period. PMID:21853546

  20. Clinical laboratory as an economic model for business performance analysis.

    PubMed

    Buljanović, Vikica; Patajac, Hrvoje; Petrovecki, Mladen

    2011-08-15

    To perform SWOT (strengths, weaknesses, opportunities, and threats) analysis of a clinical laboratory as an economic model that may be used to improve business performance of laboratories by removing weaknesses, minimizing threats, and using external opportunities and internal strengths. Impact of possible threats to and weaknesses of the Clinical Laboratory at Našice General County Hospital business performance and use of strengths and opportunities to improve operating profit were simulated using models created on the basis of SWOT analysis results. The operating profit as a measure of profitability of the clinical laboratory was defined as total revenue minus total expenses and presented using a profit and loss account. Changes in the input parameters in the profit and loss account for 2008 were determined using opportunities and potential threats, and economic sensitivity analysis was made by using changes in the key parameters. The profit and loss account and economic sensitivity analysis were tools for quantifying the impact of changes in the revenues and expenses on the business operations of clinical laboratory. Results of simulation models showed that operational profit of €470 723 in 2008 could be reduced to only €21 542 if all possible threats became a reality and current weaknesses remained the same. Also, operational gain could be increased to €535 804 if laboratory strengths and opportunities were utilized. If both the opportunities and threats became a reality, the operational profit would decrease by €384 465. The operational profit of the clinical laboratory could be significantly reduced if all threats became a reality and the current weaknesses remained the same. The operational profit could be increased by utilizing strengths and opportunities as much as possible. This type of modeling may be used to monitor business operations of any clinical laboratory and improve its financial situation by implementing changes in the next fiscal period.

  1. Behavior-based network management: a unique model-based approach to implementing cyber superiority

    NASA Astrophysics Data System (ADS)

    Seng, Jocelyn M.

    2016-05-01

    Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.

  2. Real-Time Airborne Gamma-Ray Background Estimation Using NASVD with MLE and Radiation Transport for Calibration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kulisek, Jonathan A.; Schweppe, John E.; Stave, Sean C.

    2015-06-01

    Helicopter-mounted gamma-ray detectors can provide law enforcement officials the means to quickly and accurately detect, identify, and locate radiological threats over a wide geographical area. The ability to accurately distinguish radiological threat-generated gamma-ray signatures from background gamma radiation in real time is essential in order to realize this potential. This problem is non-trivial, especially in urban environments for which the background may change very rapidly during flight. This exacerbates the challenge of estimating background due to the poor counting statistics inherent in real-time airborne gamma-ray spectroscopy measurements. To address this, we have developed a new technique for real-time estimation ofmore » background gamma radiation from aerial measurements. This method is built upon on the noise-adjusted singular value decomposition (NASVD) technique that was previously developed for estimating the potassium (K), uranium (U), and thorium (T) concentrations in soil post-flight. The method can be calibrated using K, U, and T spectra determined from radiation transport simulations along with basis functions, which may be determined empirically by applying maximum likelihood estimation (MLE) to previously measured airborne gamma-ray spectra. The method was applied to both measured and simulated airborne gamma-ray spectra, with and without man-made radiological source injections. Compared to schemes based on simple averaging, this technique was less sensitive to background contamination from the injected man-made sources and may be particularly useful when the gamma-ray background frequently changes during the course of the flight.« less

  3. Membrane Inlet Mass Spectrometry for Homeland Security and Forensic Applications

    NASA Astrophysics Data System (ADS)

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; France, Neil

    2015-02-01

    A man-portable membrane inlet mass spectrometer has been built and tested to detect and monitor characteristic odors emitted from the human body and also from threat substances. In each case, a heated membrane sampling probe was used. During human scent monitoring experiments, data were obtained for inorganic gases and volatile organic compounds emitted from human breath and sweat in a confined space. Volatile emissions were detected from the human body at low ppb concentrations. Experiments with compounds associated with narcotics, explosives, and chemical warfare agents were conducted for a range of membrane types. Test compounds included methyl benzoate (odor signature of cocaine), piperidine (precursor in clandestine phencyclidine manufacturing processes), 2-nitrotoluene (breakdown product of TNT), cyclohexanone (volatile signature of plastic explosives), dimethyl methylphosphonate (used in sarin and soman nerve agent production), and 2-chloroethyl ethyl sulfide (simulant compound for sulfur mustard gas). Gas phase calibration experiments were performed allowing sub-ppb LOD to be established. The results showed excellent linearity versus concentration and rapid membrane response times.

  4. Membrane inlet mass spectrometry for homeland security and forensic applications.

    PubMed

    Giannoukos, Stamatios; Brkić, Boris; Taylor, Stephen; France, Neil

    2015-02-01

    A man-portable membrane inlet mass spectrometer has been built and tested to detect and monitor characteristic odors emitted from the human body and also from threat substances. In each case, a heated membrane sampling probe was used. During human scent monitoring experiments, data were obtained for inorganic gases and volatile organic compounds emitted from human breath and sweat in a confined space. Volatile emissions were detected from the human body at low ppb concentrations. Experiments with compounds associated with narcotics, explosives, and chemical warfare agents were conducted for a range of membrane types. Test compounds included methyl benzoate (odor signature of cocaine), piperidine (precursor in clandestine phencyclidine manufacturing processes), 2-nitrotoluene (breakdown product of TNT), cyclohexanone (volatile signature of plastic explosives), dimethyl methylphosphonate (used in sarin and soman nerve agent production), and 2-chloroethyl ethyl sulfide (simulant compound for sulfur mustard gas). Gas phase calibration experiments were performed allowing sub-ppb LOD to be established. The results showed excellent linearity versus concentration and rapid membrane response times.

  5. A methodological framework for the evaluation of syndromic surveillance systems: a case study of England.

    PubMed

    Colón-González, Felipe J; Lake, Iain R; Morbey, Roger A; Elliot, Alex J; Pebody, Richard; Smith, Gillian E

    2018-04-24

    Syndromic surveillance complements traditional public health surveillance by collecting and analysing health indicators in near real time. The rationale of syndromic surveillance is that it may detect health threats faster than traditional surveillance systems permitting more timely, and hence potentially more effective public health action. The effectiveness of syndromic surveillance largely relies on the methods used to detect aberrations. Very few studies have evaluated the performance of syndromic surveillance systems and consequently little is known about the types of events that such systems can and cannot detect. We introduce a framework for the evaluation of syndromic surveillance systems that can be used in any setting based upon the use of simulated scenarios. For a range of scenarios this allows the time and probability of detection to be determined and uncertainty is fully incorporated. In addition, we demonstrate how such a framework can model the benefits of increases in the number of centres reporting syndromic data and also determine the minimum size of outbreaks that can or cannot be detected. Here, we demonstrate its utility using simulations of national influenza outbreaks and localised outbreaks of cryptosporidiosis. Influenza outbreaks are consistently detected with larger outbreaks being detected in a more timely manner. Small cryptosporidiosis outbreaks (<1000 symptomatic individuals) are unlikely to be detected. We also demonstrate the advantages of having multiple syndromic data streams (e.g. emergency attendance data, telephone helpline data, general practice consultation data) as different streams are able to detect different outbreak types with different efficacy (e.g. emergency attendance data are useful for the detection of pandemic influenza but not for outbreaks of cryptosporidiosis). We also highlight that for any one disease, the utility of data streams may vary geographically, and that the detection ability of syndromic surveillance varies seasonally (e.g. an influenza outbreak starting in July is detected sooner than one starting later in the year). We argue that our framework constitutes a useful tool for public health emergency preparedness in multiple settings. The proposed framework allows the exhaustive evaluation of any syndromic surveillance system and constitutes a useful tool for emergency preparedness and response.

  6. Rapid simulation of X-ray transmission imaging for baggage inspection via GPU-based ray-tracing

    NASA Astrophysics Data System (ADS)

    Gong, Qian; Stoian, Razvan-Ionut; Coccarelli, David S.; Greenberg, Joel A.; Vera, Esteban; Gehm, Michael E.

    2018-01-01

    We present a pipeline that rapidly simulates X-ray transmission imaging for arbitrary system architectures using GPU-based ray-tracing techniques. The purpose of the pipeline is to enable statistical analysis of threat detection in the context of airline baggage inspection. As a faster alternative to Monte Carlo methods, we adopt a deterministic approach for simulating photoelectric absorption-based imaging. The highly-optimized NVIDIA OptiX API is used to implement ray-tracing, greatly speeding code execution. In addition, we implement the first hierarchical representation structure to determine the interaction path length of rays traversing heterogeneous media described by layered polygons. The accuracy of the pipeline has been validated by comparing simulated data with experimental data collected using a heterogenous phantom and a laboratory X-ray imaging system. On a single computer, our approach allows us to generate over 400 2D transmission projections (125 × 125 pixels per frame) per hour for a bag packed with hundreds of everyday objects. By implementing our approach on cloud-based GPU computing platforms, we find that the same 2D projections of approximately 3.9 million bags can be obtained in a single day using 400 GPU instances, at a cost of only 0.001 per bag.

  7. Mueller matrix microscope: a quantitative tool to facilitate detections and fibrosis scorings of liver cirrhosis and cancer tissues.

    PubMed

    Wang, Ye; He, Honghui; Chang, Jintao; He, Chao; Liu, Shaoxiong; Li, Migao; Zeng, Nan; Wu, Jian; Ma, Hui

    2016-07-01

    Today the increasing cancer incidence rate is becoming one of the biggest threats to human health.Among all types of cancers, liver cancer ranks in the top five in both frequency and mortality rate all over the world. During the development of liver cancer, fibrosis often evolves as part of a healing process in response to liver damage, resulting in cirrhosis of liver tissues. In a previous study, we applied the Mueller matrix microscope to pathological liver tissue samples and found that both the Mueller matrix polar decomposition (MMPD) and Mueller matrix transformation (MMT) parameters are closely related to the fibrous microstructures. In this paper,we take this one step further to quantitatively facilitate the fibrosis detections and scorings of pathological liver tissue samples in different stages from cirrhosis to cancer using the Mueller matrix microscope. The experimental results of MMPD and MMT parameters for the fibrotic liver tissue samples in different stages are measured and analyzed. We also conduct Monte Carlo simulations based on the sphere birefringence model to examine in detail the influence of structural changes in different fibrosis stages on the imaging parameters. Both the experimental and simulated results indicate that the polarized light microscope and transformed Mueller matrix parameter scan provide additional quantitative information helpful for fibrosis detections and scorings of liver cirrhosis and cancers. Therefore, the polarized light microscope and transformed Mueller matrix parameters have a good application prospect in liver cancer diagnosis.

  8. Mueller matrix microscope: a quantitative tool to facilitate detections and fibrosis scorings of liver cirrhosis and cancer tissues

    NASA Astrophysics Data System (ADS)

    Wang, Ye; He, Honghui; Chang, Jintao; He, Chao; Liu, Shaoxiong; Li, Migao; Zeng, Nan; Wu, Jian; Ma, Hui

    2016-07-01

    Today the increasing cancer incidence rate is becoming one of the biggest threats to human health. Among all types of cancers, liver cancer ranks in the top five in both frequency and mortality rate all over the world. During the development of liver cancer, fibrosis often evolves as part of a healing process in response to liver damage, resulting in cirrhosis of liver tissues. In a previous study, we applied the Mueller matrix microscope to pathological liver tissue samples and found that both the Mueller matrix polar decomposition (MMPD) and Mueller matrix transformation (MMT) parameters are closely related to the fibrous microstructures. In this paper, we take this one step further to quantitatively facilitate the fibrosis detections and scorings of pathological liver tissue samples in different stages from cirrhosis to cancer using the Mueller matrix microscope. The experimental results of MMPD and MMT parameters for the fibrotic liver tissue samples in different stages are measured and analyzed. We also conduct Monte Carlo simulations based on the sphere birefringence model to examine in detail the influence of structural changes in different fibrosis stages on the imaging parameters. Both the experimental and simulated results indicate that the polarized light microscope and transformed Mueller matrix parameters can provide additional quantitative information helpful for fibrosis detections and scorings of liver cirrhosis and cancers. Therefore, the polarized light microscope and transformed Mueller matrix parameters have a good application prospect in liver cancer diagnosis.

  9. Laser photoacoustic spectroscopy helps fight terrorism: High sensitivity detection of chemical Warfare Agent and explosives

    NASA Astrophysics Data System (ADS)

    Patel, C. K. N.

    2008-01-01

    Tunable laser photoacoustic spectroscopy is maturing rapidly in its applications to real world problems. One of the burning problems of the current turbulent times is the threat of terrorist acts against civilian population. This threat appears in two distinct forms. The first is the potential release of chemical warfare agents (CWA), such as the nerve agents, in a crowded environment. An example of this is the release of Sarin by Aum Shinrikyo sect in a crowded Tokyo subway in 1995. An example of the second terrorist threat is the ever-present possible suicide bomber in crowded environment such as airports, markets and large buildings. Minimizing the impact of both of these threats requires early detection of the presence of the CWAs and explosives. Photoacoustic spectroscopy is an exquisitely sensitive technique for the detection of trace gaseous species, a property that Pranalytica has extensively exploited in its CO2 laser based commercial instrumentation for the sub-ppb level detection of a number of industrially important gases including ammonia, ethylene, acrolein, sulfur hexafluoride, phosphine, arsine, boron trichloride and boron trifluoride. In this presentation, I will focus, however, on our recent use of broadly tunable single frequency high power room temperature quantum cascade lasers (QCL) for the detection of the CWAs and explosives. Using external grating cavity geometry, we have developed room temperature QCLs that produce continuously tunable single frequency CW power output in excess of 300 mW at wavelengths covering 5 μm to 12 μm. I will present data that show a CWA detection capability at ppb levels with false alarm rates below 1:108. I will also show the capability of detecting a variety of explosives at a ppb level, again with very low false alarm rates. Among the explosives, we have demonstrated the capability of detecting homemade explosives such as triacetone triperoxide and its liquid precursor, acetone which is a common household liquid. This capability, deployed at airports and other public places, will go a long way towards increasing public safety and minimizing inconveniences faced in airline travel.

  10. Far-field tsunami of 2017 Mw 8.1 Tehuantepec, Mexico earthquake recorded by Chilean tide gauge network: Implications for tsunami warning systems

    NASA Astrophysics Data System (ADS)

    González-Carrasco, J. F.; Benavente, R. F.; Zelaya, C.; Núñez, C.; Gonzalez, G.

    2017-12-01

    The 2017 Mw 8.1, Tehuantepec earthquake generated a moderated tsunami, which was registered in near-field tide gauges network activating a tsunami threat state for Mexico issued by PTWC. In the case of Chile, the forecast of tsunami waves indicate amplitudes less than 0.3 meters above the tide level, advising an informative state of threat, without activation of evacuation procedures. Nevertheless, during sea level monitoring of network we detect wave amplitudes (> 0.3 m) indicating a possible change of threat state. Finally, NTWS maintains informative level of threat based on mathematical filtering analysis of sea level records. After 2010 Mw 8.8, Maule earthquake, the Chilean National Tsunami Warning System (NTWS) has increased its observational capabilities to improve early response. Most important operational efforts have focused on strengthening tide gauge network for national area of responsibility. Furthermore, technological initiatives as Integrated Tsunami Prediction and Warning System (SIPAT) has segmented the area of responsibility in blocks to focus early warning and evacuation procedures on most affected coastal areas, while maintaining an informative state for distant areas of near-field earthquake. In the case of far-field events, NTWS follow the recommendations proposed by Pacific Tsunami Warning Center (PTWC), including a comprehensive monitoring of sea level records, such as tide gauges and DART (Deep-Ocean Assessment and Reporting of Tsunami) buoys, to evaluate the state of tsunami threat in the area of responsibility. The main objective of this work is to analyze the first-order physical processes involved in the far-field propagation and coastal impact of tsunami, including implications for decision-making of NTWS. To explore our main question, we construct a finite-fault model of the 2017, Mw 8.1 Tehuantepec earthquake. We employ the rupture model to simulate a transoceanic tsunami modeled by Neowave2D. We generate synthetic time series at tide gauge stations and compare them with recorded sea level data, to dismiss meteorological processes, such as storms and surges. Resonance analysis is performed by wavelet technique.

  11. Fuel Tank Non-Nuclear Vulnerability Test Program

    DTIC Science & Technology

    1975-02-01

    configurations and structures , for all the threat velocities and obli~quities, alid for all the different fuel tank conditions. This is very unrealistic and can...of operational aircraft. It is, ot. course, imtpractical to simiul~ate all the potential conditions, threat variables, structural materials, and...simulate the structural members of the aircraft to which the aircraft skin and fuel tank walls are attached. The effect that paint, on the aircraft

  12. Combating Terrorism Technical Support Office. 2008 Review

    DTIC Science & Technology

    2009-01-15

    threat object displayed at the operator control unit of the robotic platform. Remote Utility Conversion Kit The Remote Utility Conversion Kit (RUCK) is a...three- dimensional and isometric simulations and games. Develop crowd models, adversarial behavior models, network-based simulations, mini-simulations...Craft-Littoral The modular unmanned surface craft-littoral ( MUSCL ) is a spin- off of EOD/LIC’s Unmanned Reconnaissance Observation Craft, developed

  13. Combined, solid-state molecular property and gamma spectrometers for CBRNE detection

    NASA Astrophysics Data System (ADS)

    Rogers, Ben; Grate, Jay; Pearson, Brett; Gallagher, Neal; Wise, Barry; Whitten, Ralph; Adams, Jesse

    2013-05-01

    Nevada Nanotech Systems, Inc. (Nevada Nano) has developed a multi-sensor solution to Chemical, Biological, Radiological, Nuclear and Explosives (CBRNE) detection that combines the Molecular Property Spectrometer™ (MPS™)—a micro-electro-mechanical chip-based technology capable of measuring a variety of thermodynamic and electrostatic molecular properties of sampled vapors and particles—and a compact, high-resolution, solid-state gamma spectrometer module for identifying radioactive materials, including isotopes used in dirty bombs and nuclear weapons. By conducting multiple measurements, the system can provide a more complete characterization of an unknown sample, leading to a more accurate identification. Positive identifications of threats are communicated using an integrated wireless module. Currently, system development is focused on detection of commercial, military and improvised explosives, radioactive materials, and chemical threats. The system can be configured for a variety of CBRNE applications, including handheld wands and swab-type threat detectors requiring short sample times, and ultra-high sensitivity detectors in which longer sampling times are used. Here we provide an overview of the system design and operation and present results from preliminary testing.

  14. Impaired threat prioritisation after selective bilateral amygdala lesions

    PubMed Central

    Bach, Dominik R.; Hurlemann, Rene; Dolan, Raymond J.

    2015-01-01

    The amygdala is proposed to process threat-related information in non-human animals. In humans, empirical evidence from lesion studies has provided the strongest evidence for a role in emotional face recognition and social judgement. Here we use a face-in-the-crowd (FITC) task which in healthy control individuals reveals prioritised threat processing, evident in faster serial search for angry compared to happy target faces. We investigate AM and BG, two individuals with bilateral amygdala lesions due to Urbach–Wiethe syndrome, and 16 control individuals. In lesion patients we show a reversal of a threat detection advantage indicating a profound impairment in prioritising threat information. This is the first direct demonstration that human amygdala lesions impair prioritisation of threatening faces, providing evidence that this structure has a causal role in responding to imminent danger. PMID:25282058

  15. Modelling a man-portable air-defence (MANPAD) system with a rosette scan two-colour infrared (IR) and ultraviolet (UV) seeker

    NASA Astrophysics Data System (ADS)

    Kumar, Devinder; Smith, Leon; Richardson, Mark A.; Ayling, Richard; Barlow, Nick

    2014-10-01

    The Ultraviolet (UV) band of the electromagnetic (EM) spectrum has the potential to be used as the host medium for the operation of guided weapons. Unlike in the Infrared (IR), a target propelled by an air breathing jet engine produces no detectable radiation in the UV band, and is opaque to the background UV produced by the Sun. Successful engineering of spectral airborne IR countermeasures (CM) against existing two colour IR seekers has encouraged missile counter-countermeasure (CCM) designers to utilise the silhouette signature of an aircraft in the UV as a means of distinguishing between a true target and a flare CM. In this paper we describe the modelling process of a dual band IR and UV rosette scan seeker using CounterSim, a missile engagement and countermeasure simulation software package developed by Chemring Countermeasures Ltd. Results are shown from various simulated engagements of the dual band MANPAD with a C-130 Hercules modelled by Chemring Countermeasures. These results have been used to estimate the aircrafts' vulnerability to this MANPAD threat. A discussion on possible future optical countermeasures against dual band IR-UV seekers is given in conclusion to the simulation results.

  16. Study of Threat Scenario Reconstruction based on Multiple Correlation

    NASA Astrophysics Data System (ADS)

    Yuan, Xuejun; Du, Jing; Qin, Futong; Zhou, Yunyan

    2017-10-01

    The emergence of intrusion detection technology has solved many network attack problems, ensuring the safety of computer systems. However, because of the isolated output alarm information, large amount of data, and mixed events, it is difficult for the managers to understand the deep logic relationship between the alarm information, thus they cannot deduce the attacker’s true intentions. This paper presents a method of online threat scene reconstruction to handle the alarm information, which reconstructs of the threat scene. For testing, the standard data set is used.

  17. Health anxiety and attentional bias: the time course of vigilance and avoidance in light of pictorial illness information.

    PubMed

    Jasper, Fabian; Witthöft, Michael

    2011-12-01

    Cognitive-behavioral models of health anxiety stress the importance of selective attention not only towards internal but also towards external health threat related stimuli. Yet, little is known about the time course of this attentional bias. The current study investigates threat related attentional bias in participants with varying degrees of health anxiety. Attentional bias was assessed using a visual dot-probe task with health-threat and neutral pictures at two exposure durations, 175ms and 500ms. A baseline condition was added to the dot-probe task to dissociate indices of vigilance towards threat and difficulties to disengage from threat. Substantial positive correlations of health anxiety, anxiety sensitivity, and absorption with difficulties to disengage from threat were detected at 500ms exposure time. At an early stage (i.e., at 175ms exposure time), we found significant positive correlations of health anxiety and absorption with orientation towards threat. Results suggest a vigilance avoidance pattern of selective attention associated with pictorial illness related stimuli in health anxiety. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Brief Report: Reduced Prioritization of Facial Threat in Adults with Autism

    ERIC Educational Resources Information Center

    Sasson, Noah J.; Shasteen, Jonathon R.; Pinkham, Amy E.

    2016-01-01

    Typically-developing (TD) adults detect angry faces more efficiently within a crowd than non-threatening faces. Prior studies of this social threat superiority effect (TSE) in ASD using tasks consisting of schematic faces and homogeneous crowds have produced mixed results. Here, we employ a more ecologically-valid test of the social TSE and find…

  19. Photoacoustic spectroscopy for trace vapor detection and standoff detection of explosives

    NASA Astrophysics Data System (ADS)

    Holthoff, Ellen L.; Marcus, Logan S.; Pellegrino, Paul M.

    2016-05-01

    The Army is investigating several spectroscopic techniques (e.g., infrared spectroscopy) that could allow for an adaptable sensor platform. Current sensor technologies, although reasonably sized, are geared to more classical chemical threats, and the ability to expand their capabilities to a broader range of emerging threats is uncertain. Recently, photoacoustic spectroscopy (PAS), employed in a sensor format, has shown enormous potential to address these ever-changing threats. PAS is one of the more flexible IR spectroscopy variants, and that flexibility allows for the construction of sensors that are designed for specific tasks. PAS is well suited for trace detection of gaseous and condensed media. Recent research has employed quantum cascade lasers (QCLs) in combination with MEMS-scale photoacoustic cell designs. The continuous tuning capability of QCLs over a broad wavelength range in the mid-infrared spectral region greatly expands the number of compounds that can be identified. We will discuss our continuing evaluation of QCL technology as it matures in relation to our ultimate goal of a universal compact chemical sensor platform. Finally, expanding on our previously reported photoacoustic detection of condensed phase samples, we are investigating standoff photoacoustic chemical detection of these materials. We will discuss the evaluation of a PAS sensor that has been designed around increasing operator safety during detection and identification of explosive materials by performing sensing operations at a standoff distance. We investigate a standoff variant of PAS based upon an interferometric sensor by examining the characteristic absorption spectra of explosive hazards collected at 1 m.

  20. Sensor and information fusion for improved hostile fire situational awareness

    NASA Astrophysics Data System (ADS)

    Scanlon, Michael V.; Ludwig, William D.

    2010-04-01

    A research-oriented Army Technology Objective (ATO) named Sensor and Information Fusion for Improved Hostile Fire Situational Awareness uniquely focuses on the underpinning technologies to detect and defeat any hostile threat; before, during, and after its occurrence. This is a joint effort led by the Army Research Laboratory, with the Armaments and the Communications and Electronics Research, Development, and Engineering Centers (CERDEC and ARDEC) partners. It addresses distributed sensor fusion and collaborative situational awareness enhancements, focusing on the underpinning technologies to detect/identify potential hostile shooters prior to firing a shot and to detect/classify/locate the firing point of hostile small arms, mortars, rockets, RPGs, and missiles after the first shot. A field experiment conducted addressed not only diverse modality sensor performance and sensor fusion benefits, but gathered useful data to develop and demonstrate the ad hoc networking and dissemination of relevant data and actionable intelligence. Represented at this field experiment were various sensor platforms such as UGS, soldier-worn, manned ground vehicles, UGVs, UAVs, and helicopters. This ATO continues to evaluate applicable technologies to include retro-reflection, UV, IR, visible, glint, LADAR, radar, acoustic, seismic, E-field, narrow-band emission and image processing techniques to detect the threats with very high confidence. Networked fusion of multi-modal data will reduce false alarms and improve actionable intelligence by distributing grid coordinates, detection report features, and imagery of threats.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  2. An aviation security (AVSEC) screening demonstrator for the detection of non-metallic threats at 28-33 GHz

    NASA Astrophysics Data System (ADS)

    Salmon, Neil A.; Bowring, Nick; Hutchinson, Simon; Southgate, Matthew; O'Reilly, Dean

    2013-10-01

    The unique selling proposition of millimetre wave technology for security screening is that it provides a stand-off or portal scenario sensing capability for non-metallic threats. The capabilities to detect some non-metallic threats are investigated in this paper, whilst recommissioning the AVSEC portal screening system at the Manchester Metropolitan University. The AVSEC system is a large aperture (1.6 m) portal screening imager which uses spatially incoherent illumination at 28-33 GHz from mode scrambling cavities to illuminate the subject. The imaging capability is critically analysed in terms of this illumination. A novel technique for the measurement of reflectance, refractive index and extinction coefficient is investigated and this then use to characterise the signatures of nitromethane, hexane, methanol, bees wax and baking flour. Millimetre wave images are shown how these liquids in polycarbonate bottles and the other materials appear against the human body.

  3. STARR: shortwave-targeted agile Raman robot for the detection and identification of emplaced explosives

    NASA Astrophysics Data System (ADS)

    Gomer, Nathaniel R.; Gardner, Charles W.

    2014-05-01

    In order to combat the threat of emplaced explosives (land mines, etc.), ChemImage Sensor Systems (CISS) has developed a multi-sensor, robot mounted sensor capable of identification and confirmation of potential threats. The system, known as STARR (Shortwave-infrared Targeted Agile Raman Robot), utilizes shortwave infrared spectroscopy for the identification of potential threats, combined with a visible short-range standoff Raman hyperspectral imaging (HSI) system for material confirmation. The entire system is mounted onto a Talon UGV (Unmanned Ground Vehicle), giving the sensor an increased area search rate and reducing the risk of injury to the operator. The Raman HSI system utilizes a fiber array spectral translator (FAST) for the acquisition of high quality Raman chemical images, allowing for increased sensitivity and improved specificity. An overview of the design and operation of the system will be presented, along with initial detection results of the fusion sensor.

  4. Transferring x-ray based automated threat detection between scanners with different energies and resolution

    NASA Astrophysics Data System (ADS)

    Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.

    2017-10-01

    A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.

  5. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  6. Attogram sensing of trinitrotoluene with a self-assembled molecular gelator.

    PubMed

    Kartha, Kalathil K; Babu, Sukumaran S; Srinivasan, Sampath; Ajayaghosh, Ayyappanpillai

    2012-03-14

    Detection of explosives is of utmost importance due to the threat to human security as a result of illegal transport and terrorist activities. Trinitrotoluene (TNT) is a widely used explosive in landmines and military operations that contaminates the environment and groundwater, posing a threat to human health. Achieving the detection of explosives at a sub-femtogram level using a molecular sensor is a challenge. Herein we demonstrate that a fluorescent organogelator exhibits superior detection capability for TNT in the gel form when compared to that in the solution state. The gel when coated on disposable paper strips detects TNT at a record attogram (ag, 10(-18) g) level (∼12 ag/cm(2)) with a detection limit of 0.23 ppq. This is a simple and low-cost method for the detection of TNT on surfaces or in aqueous solutions in a contact mode, taking advantage of the unique molecular packing of an organogelator and the associated photophysical properties.

  7. Fast neutron counting in a mobile, trailer-based search platform

    NASA Astrophysics Data System (ADS)

    Hayward, Jason P.; Sparger, John; Fabris, Lorenzo; Newby, Robert J.

    2017-12-01

    Trailer-based search platforms for detection of radiological and nuclear threats are often based upon coded aperture gamma-ray imaging, because this method can be rendered insensitive to local variations in gamma background while still localizing the source well. Since gamma source emissions are rather easily shielded, in this work we consider the addition of fast neutron counting to a mobile platform for detection of sources containing Pu. A proof-of-concept system capable of combined gamma and neutron coded-aperture imaging was built inside of a trailer and used to detect a 252Cf source while driving along a roadway. Neutron detector types employed included EJ-309 in a detector plane and EJ-299-33 in a front mask plane. While the 252Cf gamma emissions were not readily detectable while driving by at 16.9 m standoff, the neutron emissions can be detected while moving. Mobile detection performance for this system and a scaled-up system design are presented, along with implications for threat sensing.

  8. Windshear avoidance - Requirements and proposed system for airborne lidar detection

    NASA Technical Reports Server (NTRS)

    Targ, Russell; Bowles, Roland L.

    1988-01-01

    A generalized windshear hazard index is derived from considerations of wind conditions and an aircraft's present and potential altitude. Based on a systems approach to the windshear threat, lidar appears to be a viable methodology for windshear detection and avoidance, even in conditions of moderately heavy precipitation. The airborne CO2 and Ho:YAG lidar windshear detection systems analyzed can each give the pilot information about the line-of-sight component of windshear threat from his present position to a region extending 1 to 3 km in front of the aircraft. This constitutes a warning time of 15 to 45 s. The technology necessary to design, build and test such a brassboard 10.6-micron CO2 lidar is at hand.

  9. Advanced shortwave infrared and Raman hyperspectral sensors for homeland security and law enforcement operations

    NASA Astrophysics Data System (ADS)

    Klueva, Oksana; Nelson, Matthew P.; Gardner, Charles W.; Gomer, Nathaniel R.

    2015-05-01

    Proliferation of chemical and explosive threats as well as illicit drugs continues to be an escalating danger to civilian and military personnel. Conventional means of detecting and identifying hazardous materials often require the use of reagents and/or physical sampling, which is a time-consuming, costly and often dangerous process. Stand-off detection allows the operator to detect threat residues from a safer distance minimizing danger to people and equipment. Current fielded technologies for standoff detection of chemical and explosive threats are challenged by low area search rates, poor targeting efficiency, lack of sensitivity and specificity or use of costly and potentially unsafe equipment such as lasers. A demand exists for stand-off systems that are fast, safe, reliable and user-friendly. To address this need, ChemImage Sensor Systems™ (CISS) has developed reagent-less, non-contact, non-destructive sensors for the real-time detection of hazardous materials based on widefield shortwave infrared (SWIR) and Raman hyperspectral imaging (HSI). Hyperspectral imaging enables automated target detection displayed in the form of image making result analysis intuitive and user-friendly. Application of the CISS' SWIR-HSI and Raman sensing technologies to Homeland Security and Law Enforcement for standoff detection of homemade explosives and illicit drugs and their precursors in vehicle and personnel checkpoints is discussed. Sensing technologies include a portable, robot-mounted and standalone variants of the technology. Test data is shown that supports the use of SWIR and Raman HSI for explosive and drug screening at checkpoints as well as screening for explosives and drugs at suspected clandestine manufacturing facilities.

  10. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    PubMed

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  11. Oil in the Sahara: mapping anthropogenic threats to Saharan biodiversity from space.

    PubMed

    Duncan, Clare; Kretz, Daniela; Wegmann, Martin; Rabeil, Thomas; Pettorelli, Nathalie

    2014-01-01

    Deserts are among the most poorly monitored and understood biomes in the world, with evidence suggesting that their biodiversity is declining fast. Oil exploration and exploitation can constitute an important threat to fragmented and remnant desert biodiversity, yet little is known about where and how intensively such developments are taking place. This lack of information hinders local efforts to adequately buffer and protect desert wildlife against encroachment from anthropogenic activity. Here, we investigate the use of freely available satellite imagery for the detection of features associated with oil exploration in the African Sahelo-Saharan region. We demonstrate how texture analyses combined with Landsat data can be employed to detect ground-validated exploration sites in Algeria and Niger. Our results show that site detection via supervised image classification and prediction is generally accurate. One surprising outcome of our analyses is the relatively high level of site omission errors in Niger (43%), which appears to be due to non-detection of potentially small-scale, temporary exploration activity: we believe the repeated implementation of our framework could reduce the severity of potential methodological limitations. Overall, our study provides a methodological basis for the mapping of anthropogenic threats associated with oil exploitation that can be conducted across desert regions.

  12. Oil in the Sahara: mapping anthropogenic threats to Saharan biodiversity from space

    PubMed Central

    Duncan, Clare; Kretz, Daniela; Wegmann, Martin; Rabeil, Thomas; Pettorelli, Nathalie

    2014-01-01

    Deserts are among the most poorly monitored and understood biomes in the world, with evidence suggesting that their biodiversity is declining fast. Oil exploration and exploitation can constitute an important threat to fragmented and remnant desert biodiversity, yet little is known about where and how intensively such developments are taking place. This lack of information hinders local efforts to adequately buffer and protect desert wildlife against encroachment from anthropogenic activity. Here, we investigate the use of freely available satellite imagery for the detection of features associated with oil exploration in the African Sahelo-Saharan region. We demonstrate how texture analyses combined with Landsat data can be employed to detect ground-validated exploration sites in Algeria and Niger. Our results show that site detection via supervised image classification and prediction is generally accurate. One surprising outcome of our analyses is the relatively high level of site omission errors in Niger (43%), which appears to be due to non-detection of potentially small-scale, temporary exploration activity: we believe the repeated implementation of our framework could reduce the severity of potential methodological limitations. Overall, our study provides a methodological basis for the mapping of anthropogenic threats associated with oil exploitation that can be conducted across desert regions. PMID:24733946

  13. Conceptual design study for an advanced cab and visual system, volume 2

    NASA Technical Reports Server (NTRS)

    Rue, R. J.; Cyrus, M. L.; Garnett, T. A.; Nachbor, J. W.; Seery, J. A.; Starr, R. L.

    1980-01-01

    The performance, design, construction and testing requirements are defined for developing an advanced cab and visual system. The rotorcraft system integration simulator is composed of the advanced cab and visual system and the rotorcraft system motion generator, and is part of an existing simulation facility. User's applications for the simulator include rotorcraft design development, product improvement, threat assessment, and accident investigation.

  14. Improving Military Change Detection Skills in a Virtual Environment: The Effects of Time, Threat Level, and Tutorials

    DTIC Science & Technology

    2011-09-01

    36 b. Designing for Vigilance .............................................. 38 viii c. Landmarks and Spatial Navigation... DESIGNING AND EXECUTING CHANGE DETECTION SCENARIO TRAINING ............................................................................... 153 A...SCENARIO INSTRUCTIONS FOR EDITORS ................................. 153 B. HOW TO DESIGN A CHANGE DETECTION SCENARIO .............. 157 APPENDIX K

  15. Analysis of web-related threats in ten years of logs from a scientific portal

    NASA Astrophysics Data System (ADS)

    Santos, Rafael D. C.; Grégio, André R. A.; Raddick, Jordan; Vattki, Vamsi; Szalay, Alex

    2012-06-01

    SkyServer is an Internet portal to data from the Sloan Digital Sky Survey, the largest online archive of astronomy data in the world. provides free access to hundreds of millions of celestial objects for science, education and outreach purposes. Logs of accesses to SkyServer comprise around 930 million hits, 140 million web services accesses and 170 million SQL submitted queries, collected over the past 10 years. These logs also contain indications of compromise attempts on the servers. In this paper, we show some threats that were detected in ten years of stored logs, and compare them with known threats in those years. Also, we present an analysis of the evolution of those threats over these years.

  16. Threats from patients and their effects on medical decision making: a cross-sectional, randomised trial.

    PubMed

    Kristiansen, I S; Førde, O H; Aasland, O; Hotvedt, R; Johnsen, R; Førde, R

    2001-04-21

    Negative experiences are not uncommon among doctors in Norway. Our aim was to find out about the various types of negative reactions (eg, complaints, negative exposure to the media, financial claims, and notification to the police) received by physicians from patients or relatives in response to treatment, to identify their cause, and to study their effects on subsequent clinical decisions. We posted questionnaires about negative reactions of patients to a random sample (n=1260) of Norwegian doctors. Each doctor was additionally sent five written case simulations and asked to choose one of several proposed clinical strategies. Half (630) the physicians received cases containing threats from the patient or their relatives. 988 (78%) physicians returned the questionnaire, 463 (47%) of whom reported negative experiences. Such experiences were reported more frequently by men (357 [51%]) and family physicians (157 [58%]) than by other participants. Negative experiences did not affect choice of strategy for case simulations. For the first case, chest pain, 217 (44%) physicians presented with a threat chose a defensive strategy compared with 145 (30%) of those who were not (difference 14%; 95% CI 8-20). For the second case, a headache case, the corresponding numbers were 278 (57%) and 118 (25%) (32%; 26-38). Physician age, sex, specialty, or experience of negative reactions of patients did not alter the effect of threats received during our study. Negative experiences do not affect subsequent decision making. However, doctors do comply with wishes from patients or relatives when presented with direct threats.

  17. Validation of an explanatory tool for data-fused displays for high-technology future aircraft

    NASA Astrophysics Data System (ADS)

    Fletcher, Georgina C. L.; Shanks, Craig R.; Selcon, Stephen J.

    1996-05-01

    As the number of sensor and data sources in the military cockpit increases, pilots will suffer high levels of workload which could result in reduced performance and the loss of situational awareness. A DRA research program has been investigating the use of data-fused displays in decision support and has developed and laboratory-tested an explanatory tool for displaying information in air combat scenarios. The tool has been designed to provide pictorial explanations of data that maintain situational awareness by involving the pilot in the hostile aircraft threat assessment task. This paper reports a study carried out to validate the success of the explanatory tool in a realistic flight simulation facility. Aircrew were asked to perform a threat assessment task, either with or without the explanatory tool providing information in the form of missile launch success zone envelopes, while concurrently flying a waypoint course within set flight parameters. The results showed that there was a significant improvement (p less than 0.01) in threat assessment accuracy of 30% when using the explanatory tool. This threat assessment performance advantage was achieved without a trade-off with flying task performance. Situational awareness measures showed no general differences between the explanatory and control conditions, but significant learning effects suggested that the explanatory tool makes the task initially more intuitive and hence less demanding on the pilots' attentional resources. The paper concludes that DRA's data-fused explanatory tool is successful at improving threat assessment accuracy in a realistic simulated flying environment, and briefly discusses the requirements for further research in the area.

  18. Beer for "brohood": A laboratory simulation of masculinity confirmation through alcohol use behaviors in men.

    PubMed

    Fugitt, Jessica L; Ham, Lindsay S

    2018-05-01

    Though alcohol use is a widespread behavior, men tend to drink more and experience more alcohol-related negative consequences than do women. Research suggests that individuals are motivated to maintain ingroup status by engaging in behaviors prototypical of the ingroup when group status has been threatened, and that men are particularly likely to do this when masculine ingroup status is threatened. The present study investigated masculine drinking behaviors through a social lens, examining the impact of masculinity threat on alcohol consumption in a simulated bar laboratory. Sixty-five male students ages 21-29 years (Mage = 22.66; 74% White) consumed beer in a taste-test paradigm after being exposed to randomly assigned personality feedback relative to gender standards. This feedback suggested that they were either low in masculinity (threat condition, n = 22) or high in masculinity (control condition, n = 22). A third condition received the low-masculinity feedback and then were exposed to information to undermine masculine alcohol use norms (undermine condition, n = 21) to account for negative affect reduction motives for use. As hypothesized, individuals in the threat condition consumed significantly more alcohol than those in the control and undermine conditions, even though the threat and undermine conditions reported similar levels of negative affect following masculinity threat. These results suggest that consumption of alcohol by men in social contexts may be strongly motivated by the desire to confirm masculine status. This understanding may be used to enhance the effectiveness of alcohol use intervention protocols. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  19. Brain drain? An examination of stereotype threat effects during training on knowledge acquisition and organizational effectiveness.

    PubMed

    Grand, James A

    2017-02-01

    Stereotype threat describes a situation in which individuals are faced with the risk of upholding a negative stereotype about their subgroup based on their actions. Empirical work in this area has primarily examined the impact of negative stereotypes on performance for threatened individuals. However, this body of research seldom acknowledges that performance is a function of learning-which may also be impaired by pervasive group stereotypes. This study presents evidence from a 3-day self-guided training program demonstrating that stereotype threat impairs acquisition of cognitive learning outcomes for females facing a negative group stereotype. Using hierarchical Bayesian modeling, results revealed that stereotyped females demonstrated poorer declarative knowledge acquisition, spent less time reflecting on learning activities, and developed less efficiently organized knowledge structures compared with females in a control condition. Findings from a Bayesian mediation model also suggested that despite stereotyped individuals "working harder" to perform well, their underachievement was largely attributable to failures in learning to "work smarter." Building upon these empirical results, a computational model and computer simulation is also presented to demonstrate the practical significance of stereotype-induced impairments to learning on the development of an organization's human capital resources and capabilities. The simulation results show that even the presence of small effects of stereotype threat during learning/training have the potential to exert a significant negative impact on an organization's performance potential. Implications for future research and practice examining stereotype threat during learning are discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Time-course of attention for threatening pictures in high and low trait anxiety.

    PubMed

    Koster, Ernst H W; Verschuere, Bruno; Crombez, Geert; Van Damme, Stefaan

    2005-08-01

    Cognitive studies about anxiety suggest that the interplay between automatic and strategic biases in attention to threat is related to the persistence of fear. In the present study, the time-course of attention to pictures with varying threat levels was investigated in high trait anxious (HTA, n=21) and low trait anxious (LTA, n=22) students. In a visual probe detection task, high and mild threat pictures were presented at three durations: 100, 500, and 1250 ms. Results indicated that all individuals attended to the high threat pictures for the 100 ms condition. Differential responding between HTA and LTA individuals was found for the 500 ms condition: only HTA individuals showed an attentional bias for mild threatening stimuli. For the 1250 ms condition, the HTA individuals attended away from high and mild threat pictures. The observed pattern of differential attention to threatening pictures may explain the persistence of fear in HTA individuals.

  1. The ecology of human fear: survival optimization and the nervous system

    PubMed Central

    Mobbs, Dean; Hagan, Cindy C.; Dalgleish, Tim; Silston, Brian; Prévost, Charlotte

    2015-01-01

    We propose a Survival Optimization System (SOS) to account for the strategies that humans and other animals use to defend against recurring and novel threats. The SOS attempts to merge ecological models that define a repertoire of contextually relevant threat induced survival behaviors with contemporary approaches to human affective science. We first propose that the goal of the nervous system is to reduce surprise and optimize actions by (i) predicting the sensory landscape by simulating possible encounters with threat and selecting the appropriate pre-encounter action and (ii) prevention strategies in which the organism manufactures safe environments. When a potential threat is encountered the (iii) threat orienting system is engaged to determine whether the organism ignores the stimulus or switches into a process of (iv) threat assessment, where the organism monitors the stimulus, weighs the threat value, predicts the actions of the threat, searches for safety, and guides behavioral actions crucial to directed escape. When under imminent attack, (v) defensive systems evoke fast reflexive indirect escape behaviors (i.e., fight or flight). This cascade of responses to threat of increasing magnitude are underwritten by an interconnected neural architecture that extends from cortical and hippocampal circuits, to attention, action and threat systems including the amygdala, striatum, and hard-wired defensive systems in the midbrain. The SOS also includes a modulatory feature consisting of cognitive appraisal systems that flexibly guide perception, risk and action. Moreover, personal and vicarious threat encounters fine-tune avoidance behaviors via model-based learning, with higher organisms bridging data to reduce face-to-face encounters with predators. Our model attempts to unify the divergent field of human affective science, proposing a highly integrated nervous system that has evolved to increase the organism's chances of survival. PMID:25852451

  2. Injury representation against ballistic threats using three novel numerical models.

    PubMed

    Breeze, Johno; Fryer, R; Pope, D; Clasper, J

    2017-06-01

    Injury modelling of ballistic threats is a valuable tool for informing policy on personal protective equipment and other injury mitigation methods. Currently, the Ministry of Defence (MoD) and Centre for Protection of National Infrastructure (CPNI) are focusing on the development of three interlinking numerical models, each of a different fidelity, to answer specific questions on current threats. High-fidelity models simulate the physical events most realistically, and will be used in the future to test the medical effectiveness of personal armour systems. They are however generally computationally intensive, slow running and much of the experimental data to base their algorithms on do not yet exist. Medium fidelity models, such as the personnel vulnerability simulation (PVS), generally use algorithms based on physical or engineering estimations of interaction. This enables a reasonable representation of reality and greatly speeds up runtime allowing full assessments of the entire body area to be undertaken. Low-fidelity models such as the human injury predictor (HIP) tool generally use simplistic algorithms to make injury predictions. Individual scenarios can be run very quickly and hence enable statistical casualty assessments of large groups, where significant uncertainty concerning the threat and affected population exist. HIP is used to simulate the blast and penetrative fragmentation effects of a terrorist detonation of an improvised explosive device within crowds of people in metropolitan environments. This paper describes the collaboration between MoD and CPNI using an example of all three fidelities of injury model and to highlight future areas of research that are required. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  3. Insects and their life cycle: Steps to take to assess threats

    Treesearch

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  4. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Treesearch

    Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...

  5. Lessons learned in the execution of advanced x-ray material discrimination (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Young, Sharene

    2017-05-01

    Advanced X-ray Material Discrimination (AXMD) or BAA 13-05 was a broad agency announcement which was initiated in order to develop solutions to the following problem. The emergence of improvised explosive threats and their use by terrorists has placed many challenges on the aviation security screening layers. EDS and AT X-ray equipment have been presented with considerable challenges in developing a broad detection capability for improvised explosive threats during security screening of checked bags and carry-on items. Technologies are needed that increase the measurement or mathematical discrimination between improvised explosive threats and stream-of-commerce clutter in checked baggage and carry-on items. Conventional EDS utilizes two basic discriminating signatures: effective atomic number and density of screened objects. R and D is needed to identify additional discriminating signatures between improvised explosive threats and stream-of commerce clutter to improve detection capability with reduced false alarm rates. DHS S and T EXD along with stakeholders at the TSA, TSL, and the UK Home Office have been successful in funding efforts to address and potentially provide operational solutions which can be deployed as part of the Next Generation of X-ray Technologies.

  6. A method for detecting and characterizing outbreaks of infectious disease from clinical reports.

    PubMed

    Cooper, Gregory F; Villamarin, Ricardo; Rich Tsui, Fu-Chiang; Millett, Nicholas; Espino, Jeremy U; Wagner, Michael M

    2015-02-01

    Outbreaks of infectious disease can pose a significant threat to human health. Thus, detecting and characterizing outbreaks quickly and accurately remains an important problem. This paper describes a Bayesian framework that links clinical diagnosis of individuals in a population to epidemiological modeling of disease outbreaks in the population. Computer-based diagnosis of individuals who seek healthcare is used to guide the search for epidemiological models of population disease that explain the pattern of diagnoses well. We applied this framework to develop a system that detects influenza outbreaks from emergency department (ED) reports. The system diagnoses influenza in individuals probabilistically from evidence in ED reports that are extracted using natural language processing. These diagnoses guide the search for epidemiological models of influenza that explain the pattern of diagnoses well. Those epidemiological models with a high posterior probability determine the most likely outbreaks of specific diseases; the models are also used to characterize properties of an outbreak, such as its expected peak day and estimated size. We evaluated the method using both simulated data and data from a real influenza outbreak. The results provide support that the approach can detect and characterize outbreaks early and well enough to be valuable. We describe several extensions to the approach that appear promising. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. A Method for Detecting and Characterizing Outbreaks of Infectious Disease from Clinical Reports

    PubMed Central

    Cooper, Gregory F.; Villamarin, Ricardo; Tsui, Fu-Chiang (Rich); Millett, Nicholas; Espino, Jeremy U.; Wagner, Michael M.

    2014-01-01

    Outbreaks of infectious disease can pose a significant threat to human health. Thus, detecting and characterizing outbreaks quickly and accurately remains an important problem. This paper describes a Bayesian framework that links clinical diagnosis of individuals in a population to epidemiological modeling of disease outbreaks in the population. Computer-based diagnosis of individuals who seek healthcare is used to guide the search for epidemiological models of population disease that explain the pattern of diagnoses well. We applied this framework to develop a system that detects influenza outbreaks from emergency department (ED) reports. The system diagnoses influenza in individuals probabilistically from evidence in ED reports that are extracted using natural language processing. These diagnoses guide the search for epidemiological models of influenza that explain the pattern of diagnoses well. Those epidemiological models with a high posterior probability determine the most likely outbreaks of specific diseases; the models are also used to characterize properties of an outbreak, such as its expected peak day and estimated size. We evaluated the method using both simulated data and data from a real influenza outbreak. The results provide support that the approach can detect and characterize outbreaks early and well enough to be valuable. We describe several extensions to the approach that appear promising. PMID:25181466

  8. A lab-on-chip for biothreat detection using single-molecule DNA mapping.

    PubMed

    Meltzer, Robert H; Krogmeier, Jeffrey R; Kwok, Lisa W; Allen, Richard; Crane, Bryan; Griffis, Joshua W; Knaian, Linda; Kojanian, Nanor; Malkin, Gene; Nahas, Michelle K; Papkov, Vyacheslav; Shaikh, Saad; Vyavahare, Kedar; Zhong, Qun; Zhou, Yi; Larson, Jonathan W; Gilmanshin, Rudolf

    2011-03-07

    Rapid, specific, and sensitive detection of airborne bacteria, viruses, and toxins is critical for biodefense, yet the diverse nature of the threats poses a challenge for integrated surveillance, as each class of pathogens typically requires different detection strategies. Here, we present a laboratory-on-a-chip microfluidic device (LOC-DLA) that integrates two unique assays for the detection of airborne pathogens: direct linear analysis (DLA) with unsurpassed specificity for bacterial threats and Digital DNA for toxins and viruses. The LOC-DLA device also prepares samples for analysis, incorporating upstream functions for concentrating and fractionating DNA. Both DLA and Digital DNA assays are single molecule detection technologies, therefore the assay sensitivities depend on the throughput of individual molecules. The microfluidic device and its accompanying operation protocols have been heavily optimized to maximize throughput and minimize the loss of analyzable DNA. We present here the design and operation of the LOC-DLA device, demonstrate multiplex detection of rare bacterial targets in the presence of 100-fold excess complex bacterial mixture, and demonstrate detection of picogram quantities of botulinum toxoid.

  9. Integrated multisensor perimeter detection systems

    NASA Astrophysics Data System (ADS)

    Kent, P. J.; Fretwell, P.; Barrett, D. J.; Faulkner, D. A.

    2007-10-01

    The report describes the results of a multi-year programme of research aimed at the development of an integrated multi-sensor perimeter detection system capable of being deployed at an operational site. The research was driven by end user requirements in protective security, particularly in threat detection and assessment, where effective capability was either not available or prohibitively expensive. Novel video analytics have been designed to provide robust detection of pedestrians in clutter while new radar detection and tracking algorithms provide wide area day/night surveillance. A modular integrated architecture based on commercially available components has been developed. A graphical user interface allows intuitive interaction and visualisation with the sensors. The fusion of video, radar and other sensor data provides the basis of a threat detection capability for real life conditions. The system was designed to be modular and extendable in order to accommodate future and legacy surveillance sensors. The current sensor mix includes stereoscopic video cameras, mmWave ground movement radar, CCTV and a commercially available perimeter detection cable. The paper outlines the development of the system and describes the lessons learnt after deployment in a pilot trial.

  10. Stimulus-driven attention, threat bias, and sad bias in youth with a history of an anxiety disorder or depression

    PubMed Central

    Sylvester, Chad M.; Hudziak, James J.; Gaffrey, Michael S.; Barch, Deanna M.; Luby, Joan L.

    2015-01-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n=40) as well as healthy controls (HC; n=33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression. PMID:25702927

  11. Stimulus-Driven Attention, Threat Bias, and Sad Bias in Youth with a History of an Anxiety Disorder or Depression.

    PubMed

    Sylvester, Chad M; Hudziak, James J; Gaffrey, Michael S; Barch, Deanna M; Luby, Joan L

    2016-02-01

    Attention biases towards threatening and sad stimuli are associated with pediatric anxiety and depression, respectively. The basic cognitive mechanisms associated with attention biases in youth, however, remain unclear. Here, we tested the hypothesis that threat bias (selective attention for threatening versus neutral stimuli) but not sad bias relies on stimulus-driven attention. We collected measures of stimulus-driven attention, threat bias, sad bias, and current clinical symptoms in youth with a history of an anxiety disorder and/or depression (ANX/DEP; n = 40) as well as healthy controls (HC; n = 33). Stimulus-driven attention was measured with a non-emotional spatial orienting task, while threat bias and sad bias were measured at a short time interval (150 ms) with a spatial orienting task using emotional faces and at a longer time interval (500 ms) using a dot-probe task. In ANX/DEP but not HC, early attention bias towards threat was negatively correlated with later attention bias to threat, suggesting that early threat vigilance was associated with later threat avoidance. Across all subjects, stimulus-driven orienting was not correlated with early threat bias but was negatively correlated with later threat bias, indicating that rapid stimulus-driven orienting is linked to later threat avoidance. No parallel relationships were detected for sad bias. Current symptoms of depression but not anxiety were related to decreased stimulus-driven attention. Together, these results are consistent with the hypothesis that threat bias but not sad bias relies on stimulus-driven attention. These results inform the design of attention bias modification programs that aim to reverse threat biases and reduce symptoms associated with pediatric anxiety and depression.

  12. Early Detection Monitoring Approaches for Exotic Aquatic Species in Great Lakes Harbors and Embayments

    EPA Science Inventory

    Aquatic invasive species pose a significant ecological and economic threat in the Great Lakes basin. Early detection of invaders is desirable so as to allow for a timely management response, raising the question of how to accomplish this detection in a consistent, cost-effective...

  13. Layoffs and tradeoffs: production, quality, and safety demands under the threat of job loss.

    PubMed

    Probst, Tahira M

    2002-07-01

    Employees often face a conflict between production targets, quality assurance, and adherence to safety policies. In a time when layoffs are on the rise, it is important to understand the effects of employee job insecurity on these potentially competing demands. A laboratory experiment manipulated the threat of layoffs in a simulated organization and assessed its effect on employee productivity, product quality, and adherence to safety policies. Results suggest that student participants faced with the threat of layoffs were more productive, yet violated more safety rules and produced lower quality outputs, than participants in the control condition. Implications for organizations contemplating layoffs and directions for future research are discussed.

  14. Effect of perceived threat on avoidance maneuvers selected while viewing cockpit traffic displays

    NASA Technical Reports Server (NTRS)

    Smith, J. D.; Ellis, S. R.

    1982-01-01

    Ten airline pilots rated the collision danger of air traffic presented on cockpit displays of traffic information (CDTI) while they monitored simulated departures from Denver. They selected avoidance maneuvers when necessary for separation. Most evasive maneuvers were turns rather than vertical maneuvers. Evasive maneuvers chosen for encounters with low or moderate perceived collision danger were generally toward the intruding aircraft. This tendency lessened as the perceived threat level increased. In the highest threat situations pilots turned toward the intruder only at chance levels. Some of the implications of the pilots' turning-towards tendencies are discussed with respect to automatic collision avoidance systems and coordination of avoidance maneuvers of conflicting aircraft.

  15. Detection of special nuclear materials using prompt gamma-rays from fast and slow neutron-induced fission

    NASA Astrophysics Data System (ADS)

    Kane, Steven Ze

    A complete system has been simulated using experimentally obtained input parameters for the detection of special nuclear materials (SNM). A variation of the associated particle imaging (API) technique, referred to as reverse associated particle imaging detection (RAPID), has been developed in the context of detecting 5-kg spherical samples of U-235 in cargo containers uniformly filled with wood (low-Z) or iron (high-Z) at densities ranging from 0.1 g/cm3 to 0.4 g/cm3, the maximal density for a uniformly fully loaded 40-ft standard cargo container. In addition, samples were located at the center of a given container to study worst-case scenarios. The RAPID technique allows for the interrogation of containers at neutron production rates between 1x108 neutrons/s and 4x108 neutrons/s, depending on cargo material and density. These rates are low enough to prevent transmutation of materials in cargo and radiation safety hazards are limited. The merit of performance for the system is the time to detect the threat material with 95% probability of detection and 10-4 false positive rate per interrogated voxel of cargo. The detection of 5-kg of U-235 was chosen because this quantity of material is near the lower limit of the amount of special nuclear material that might be used in a nuclear weapon. This is in contrast to the 25-kg suggested sensitivity proposed by the International Atomic Energy Agency (IAEA).

  16. Smell, learn and live: the role of chemical alarm cues in predator learning during early life history in a marine fish.

    PubMed

    Holmes, Thomas H; McCormick, Mark I

    2010-03-01

    The speed with which individuals can learn to identify and react appropriately to predation threats when transitioning to new life history stages and habitats will influence their survival. This study investigated the role of chemical alarm cues in both anti-predator responses and predator identification during a transitional period in a newly settled coral reef damselfish, Pomacentrus amboinensis. Individuals were tested for changes in seven behavioural traits in response to conspecific and heterospecific skin extracts. Additionally, we tested whether fish could learn to associate a previously novel chemical cue (i.e. simulated predator scent) with danger, after previously being exposed to a paired cue combining the conspecific skin extract with the novel scent. Fish exposed to conspecific skin extracts were found to significantly decreased their feeding rate whilst those exposed to heterospecific and control cues showed no change. Individuals were also able to associate a previously novel scent with danger after only a single previous exposure to the paired conspecific skin extract/novel scent cue. Our results indicate that chemical alarm cues play a large role in both threat detection and learned predator recognition during the early post-settlement period in coral reef fishes. Copyright (c) 2010. Published by Elsevier B.V.

  17. Use of High-resolution WRF Simulations to Forecast Lightning Threat

    NASA Technical Reports Server (NTRS)

    McCaul, William E.; LaCasse, K.; Goodman, S. J.

    2006-01-01

    Recent observational studies have confirmed the existence of a robust statistical relationship between lightning flash rates and the amount of large precipitating ice hydrometeors in storms. This relationship is exploited, in conjunction with the capabilities of recent forecast models such as WRF, to forecast the threat of lightning from convective storms using the output fields from the model forecasts. The simulated vertical flux of graupel at -15C is used in this study as a proxy for charge separation processes and their associated lightning risk. Six-h simulations are conducted for a number of case studies for which three-dimensional lightning validation data from the North Alabama Lightning Mapping Array are available. Experiments indicate that initialization of the WRF model on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity and reflectivity fields, and METAR and ACARS data yield the most realistic simulations. An array of subjective and objective statistical metrics are employed to document the utility of the WRF forecasts. The simulation results are also compared to other more traditional means of forecasting convective storms, such as those based on inspection of the convective available potential energy field.

  18. ECDC Round Table Report and ProMed-mail most useful international information sources for the Netherlands Early Warning Committee.

    PubMed

    Bijkerk, Paul; Monnier, Annelie A; Fanoy, Ewout B; Kardamanidis, Katina; Friesema, Ingrid Hm; Knol, Mirjam J

    2017-04-06

    The Netherlands Early Warning Committee (NEWC) aims to identify infectious diseases causing a potential threat to Dutch public health. Threats are assessed and published as (information) alerts for public health experts. To identify threats from abroad, the NEWC screens 10 sources reporting disease outbreaks each week. To identify the sources essential for complete and timely reporting, we retrospectively analysed 178 international alerts published between 31 January 2013 and 30 January 2014. In addition, we asked the four NEWC coordinators about the required time to scan the information sources. We documented the date and source in which the signal was detected. The ECDC Round Table (RT) Report and ProMED-mail were the most complete and timely sources, reporting 140 of 178 (79%) and 121 of 178 (68%) threats respectively. The combination of both sources reported 169 (95%) of all threats in a timely manner. Adding any of the other sources resulted in minor increases in the total threats found, but considerable additional time investment per additional threat. Only three potential relevant threats (2%) would have been missed by only using the ECDC RT Report and ProMed-mail. We concluded that using only the ECDC RT Report and ProMed-mail to identify threats from abroad maintains a sensitive Early Warning System. This article is copyright of The Authors, 2017.

  19. ECDC Round Table Report and ProMed-mail most useful international information sources for the Netherlands Early Warning Committee

    PubMed Central

    Monnier, Annelie A; Fanoy, Ewout B; Kardamanidis, Katina; Friesema, Ingrid HM; Knol, Mirjam J

    2017-01-01

    The Netherlands Early Warning Committee (NEWC) aims to identify infectious diseases causing a potential threat to Dutch public health. Threats are assessed and published as (information) alerts for public health experts. To identify threats from abroad, the NEWC screens 10 sources reporting disease outbreaks each week. To identify the sources essential for complete and timely reporting, we retrospectively analysed 178 international alerts published between 31 January 2013 and 30 January 2014. In addition, we asked the four NEWC coordinators about the required time to scan the information sources. We documented the date and source in which the signal was detected. The ECDC Round Table (RT) Report and ProMED-mail were the most complete and timely sources, reporting 140 of 178 (79%) and 121 of 178 (68%) threats respectively. The combination of both sources reported 169 (95%) of all threats in a timely manner. Adding any of the other sources resulted in minor increases in the total threats found, but considerable additional time investment per additional threat. Only three potential relevant threats (2%) would have been missed by only using the ECDC RT Report and ProMed-mail. We concluded that using only the ECDC RT Report and ProMed-mail to identify threats from abroad maintains a sensitive Early Warning System. PMID:28422006

  20. Scanning of vehicles for nuclear materials

    NASA Astrophysics Data System (ADS)

    Katz, J. I.

    2014-05-01

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost and disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.

  1. Scanning of vehicles for nuclear materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Katz, J. I.

    2014-05-09

    Might a nuclear-armed terrorist group or state use ordinary commerce to deliver a nuclear weapon by smuggling it in a cargo container or vehicle? This delivery method would be the only one available to a sub-state actor, and it might enable a state to make an unattributed attack. Detection of a weapon or fissile material smuggled in this manner is difficult because of the large volume and mass available for shielding. Here I review methods for screening cargo containers to detect the possible presence of nuclear threats. Because of the large volume of innocent international commerce, and the cost andmore » disruption of secondary screening by opening and inspection, it is essential that the method be rapid and have a low false-positive rate. Shielding can prevent the detection of neutrons emitted spontaneously or by induced fission. The two promising methods are muon tomography and high energy X-radiography. If they do not detect a shielded threat object they can detect the shield itself.« less

  2. Stress-induced cortisol secretion impairs detection performance in x-ray baggage screening for hidden weapons by screening novices.

    PubMed

    Thomas, Livia; Schwaninger, Adrian; Heimgartner, Nadja; Hedinger, Patrik; Hofer, Franziska; Ehlert, Ulrike; Wirtz, Petra H

    2014-09-01

    Aviation security strongly depends on screeners' performance in the detection of threat objects in x-ray images of passenger bags. We examined for the first time the effects of stress and stress-induced cortisol increases on detection performance of hidden weapons in an x-ray baggage screening task. We randomly assigned 48 participants either to a stress or a nonstress group. The stress group was exposed to a standardized psychosocial stress test (TSST). Before and after stress/nonstress, participants had to detect threat objects in a computer-based object recognition test (X-ray ORT). We repeatedly measured salivary cortisol and X-ray ORT performance before and after stress/nonstress. Cortisol increases in reaction to psychosocial stress induction but not to nonstress independently impaired x-ray detection performance. Our results suggest that stress-induced cortisol increases at peak reactivity impair x-ray screening performance. Copyright © 2014 Society for Psychophysiological Research.

  3. Detecting background changes in environments with dynamic foreground by separating probability distribution function mixtures using Pearson's method of moments

    NASA Astrophysics Data System (ADS)

    Jenkins, Colleen; Jordan, Jay; Carlson, Jeff

    2007-02-01

    This paper presents parameter estimation techniques useful for detecting background changes in a video sequence with extreme foreground activity. A specific application of interest is automated detection of the covert placement of threats (e.g., a briefcase bomb) inside crowded public facilities. We propose that a histogram of pixel intensity acquired from a fixed mounted camera over time for a series of images will be a mixture of two Gaussian functions: the foreground probability distribution function and background probability distribution function. We will use Pearson's Method of Moments to separate the two probability distribution functions. The background function can then be "remembered" and changes in the background can be detected. Subsequent comparisons of background estimates are used to detect changes. Changes are flagged to alert security forces to the presence and location of potential threats. Results are presented that indicate the significant potential for robust parameter estimation techniques as applied to video surveillance.

  4. Dispersal and fallout simulations for urban consequences management (u)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Grinstein, Fernando F; Wachtor, Adam J; Nelson, Matt

    2010-01-01

    Hazardous chemical, biological, or radioactive releases from leaks, spills, fires, or blasts, may occur (intentionally or accidentally) in urban environments during warfare or as part of terrorist attacks on military bases or other facilities. The associated contaminant dispersion is complex and semi-chaotic. Urban predictive simulation capabilities can have direct impact in many threat-reduction areas of interest, including, urban sensor placement and threat analysis, contaminant transport (CT) effects on surrounding civilian population (dosages, evacuation, shelter-in-place), education and training of rescue teams and services. Detailed simulations for the various processes involved are in principle possible, but generally not fast. Predicting urban airflowmore » accompanied by CT presents extremely challenging requirements. Crucial technical issues include, simulating turbulent fluid and particulate transport, initial and boundary condition modeling incorporating a consistent stratified urban boundary layer with realistic wind fluctuations, and post-processing of the simulation results for practical consequences management. Relevant fluid dynamic processes to be simulated include, detailed energetic and contaminant sources, complex building vortex shedding and flows in recirculation zones, and modeling of particle distributions, including particulate fallout, as well as deposition, re-suspension and evaporation. Other issues include, modeling building damage effects due to eventual blasts, addressing appropriate regional and atmospheric data reduction.« less

  5. A susceptible-infected model of early detection of respiratory infection outbreaks on a background of influenza

    PubMed Central

    Mohtashemi, Mojdeh; Szolovits, Peter; Dunyak, James; Mandl, Kenneth D.

    2013-01-01

    The threat of biological warfare and the emergence of new infectious agents spreading at a global scale have highlighted the need for major enhancements to the public health infrastructure. Early detection of epidemics of infectious diseases requires both real-time data and real-time interpretation of data. Despite moderate advancements in data acquisition, the state of the practice for real-time analysis of data remains inadequate. We present a nonlinear mathematical framework for modeling the transient dynamics of influenza, applied to historical data sets of patients with influenza-like illness. We estimate the vital time-varying epidemiological parameters of infections from historical data, representing normal epidemiological trends. We then introduce simulated outbreaks of different shapes and magnitudes into the historical data, and estimate the parameters representing the infection rates of anomalous deviations from normal trends. Finally, a dynamic threshold-based detection algorithm is devised to assess the timeliness and sensitivity of detecting the irregularities in the data, under a fixed low false-positive rate. We find that the detection algorithm can identify such designated abnormalities in the data with high sensitivity with specificity held at 97%, but more importantly, early during an outbreak. The proposed methodology can be applied to a broad range of influenza-like infectious diseases, whether naturally occurring or a result of bioterrorism, and thus can be an integral component of a real-time surveillance system. PMID:16556450

  6. Statistical Models for Predicting Threat Detection From Human Behavior.

    PubMed

    Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.

  7. Using Swarming Agents for Scalable Security in Large Network Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crouse, Michael; White, Jacob L.; Fulp, Errin W.

    2011-09-23

    The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less

  8. Digital tripwire: a small automated human detection system

    NASA Astrophysics Data System (ADS)

    Fischer, Amber D.; Redd, Emmett; Younger, A. Steven

    2009-05-01

    A low cost, lightweight, easily deployable imaging sensor that can dependably discriminate threats from other activities within its field of view and, only then, alert the distant duty officer by transmitting a visual confirmation of the threat would provide a valuable asset to modern defense. At present, current solutions suffer from a multitude of deficiencies - size, cost, power endurance, but most notably, an inability to assess an image and conclude that it contains a threat. The human attention span cannot maintain critical surveillance over banks of displays constantly conveying such images from the field. DigitalTripwire is a small, self-contained, automated human-detection system capable of running for 1-5 days on two AA batteries. To achieve such long endurance, the DigitalTripwire system utilizes an FPGA designed with sleep functionality. The system uses robust vision algorithms, such as a partially unsupervised innovative backgroundmodeling algorithm, which employ several data reduction strategies to operate in real-time, and achieve high detection rates. When it detects human activity, either mounted or dismounted, it sends an alert including images to notify the command center. In this paper, we describe the hardware and software design of the DigitalTripwire system. In addition, we provide detection and false alarm rates across several challenging data sets demonstrating the performance of the vision algorithms in autonomously analyzing the video stream and classifying moving objects into four primary categories - dismounted human, vehicle, non-human, or unknown. Performance results across several challenging data sets are provided.

  9. Neural Detection of Malicious Network Activities Using a New Direct Parsing and Feature Extraction Technique

    DTIC Science & Technology

    2015-09-01

    intrusion detection systems , neural networks 15. NUMBER OF PAGES 75 16. PRICE CODE 17. SECURITY CLASSIFICATION OF... detection system (IDS) software, which learns to detect and classify network attacks and intrusions through prior training data. With the added criteria of...BACKGROUND The growing threat of malicious network activities and intrusion attempts makes intrusion detection systems (IDS) a

  10. Novel Application of FTIR Spectroscopy for the Passive Standoff Detection of Radiological Materials

    DTIC Science & Technology

    2006-08-01

    possibility of applying the long-wave passive standoff detection technique to the identification of radiological materials. This work is based on...infrared (FTIR) radiometry is a well-known technique for detecting and identifying chemical warfare agents. In addition to these potential threats...necessary tools and techniques available for detecting and identifying radioactive products. At present, the main detection techniques depend on methods

  11. Application research of rail transit safety protection based on laser detection

    NASA Astrophysics Data System (ADS)

    Wang, Zhifei

    2016-10-01

    Platform screen door can not only prevent the passengers fell or jumped the track danger, to passengers bring comfortable waiting environment, but also has the function of environmental protection and energy saving. But platform screen door and train the full-length gap region is insecure in the system design of a hidden, such as passengers for some reason (grab the train) in the interstitial region retention, is sandwiched between the intercity safety door and the door, and such as the region lacks security detection and alarm system, once the passengers in the gap region retention (caught), bring more serious threat to the safety of passengers and traffic safety. This paper from the point of view of the design presents the physical, infrared, laser three safety protection device setting schemes. Domestic intelligence of between rail transit shield door and train security clearance processing used is screen door system standard configuration, the obstacle detection function for avoid passengers stranded in the clearance has strong prevention function. Laser detection research and development projects can access to prevent shield door and train gap clamp safety measures. Rail safety protection method are studied applying laser detection technique. According to the laser reflection equation of foreign body, the characteristics of laser detection of foreign bodies are given in theory. By using statistical analysis method, the workflow of laser detection system is established. On this basis, protection methods is proposed. Finally the simulation and test results show that the laser detection technology in the rail traffic safety protection reliability and stability, And the future laser detection technology in is discussed the development of rail transit.

  12. Rapid response radiation sensors for homeland security applications

    NASA Astrophysics Data System (ADS)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Guss, Paul

    2014-09-01

    The National Security Technologies, LLC, Remote Sensing Laboratory is developing a rapid response radiation detection system for homeland security field applications. The intelligence-driven system is deployed only when non-radiological information about the target is verifiable. The survey area is often limited, so the detection range is small; in most cases covering a distance of 10 meters or less suffices. Definitive response is required in no more than 3 seconds and should minimize false negative alarms, but can err on the side of positive false alarms. The detection system is rapidly reconfigurable in terms of size, shape, and outer appearance; it is a plug-and-play system. Multiple radiation detection components (viz., two or more sodium iodide scintillators) are used to independently "over-determine" the existence of the threat object. Rapid response electronic dose rate meters are also included in the equipment suite. Carefully studied threat signatures are the basis of the decision making. The use of Rad-Detect predictive modeling provides information on the nature of the threat object. Rad-Detect provides accurate dose rate from heavily shielded large sources; for example those lost in Mexico were Category 1 radiation sources (~3,000 Ci of 60Co), the most dangerous of five categories defined by the International Atomic Energy Agency. Taken out of their shielding containers, Category 1 sources can kill anyone who is exposed to them at close range for a few minutes to an hour. Whenever possible sub-second data acquisition will be attempted, and, when deployed, the system will be characterized for false alarm rates. Although the radiation detection materials selected are fast (viz., faster scintillators), their speed is secondary to sensitivity, which is of primary importance. Results from these efforts will be discussed and demonstrated.

  13. Deep convective cloud characterizations from both broadband imager and hyperspectral infrared sounder measurements

    NASA Astrophysics Data System (ADS)

    Ai, Yufei; Li, Jun; Shi, Wenjing; Schmit, Timothy J.; Cao, Changyong; Li, Wanbiao

    2017-02-01

    Deep convective storms have contributed to airplane accidents, making them a threat to aviation safety. The most common method to identify deep convective clouds (DCCs) is using the brightness temperature difference (BTD) between the atmospheric infrared (IR) window band and the water vapor (WV) absorption band. The effectiveness of the BTD method for DCC detection is highly related to the spectral resolution and signal-to-noise ratio (SNR) of the WV band. In order to understand the sensitivity of BTD to spectral resolution and SNR for DCC detection, a BTD to noise ratio method using the difference between the WV and IR window radiances is developed to assess the uncertainty of DCC identification for different instruments. We examined the case of AirAsia Flight QZ8501. The brightness temperatures (Tbs) over DCCs from this case are simulated for BTD sensitivity studies by a fast forward radiative transfer model with an opaque cloud assumption for both broadband imager (e.g., Multifunction Transport Satellite imager, MTSAT-2 imager) and hyperspectral IR sounder (e.g., Atmospheric Infrared Sounder) instruments; we also examined the relationship between the simulated Tb and the cloud top height. Results show that despite the coarser spatial resolution, BTDs measured by a hyperspectral IR sounder are much more sensitive to high cloud tops than broadband BTDs. As demonstrated in this study, a hyperspectral IR sounder can identify DCCs with better accuracy.

  14. Developmental relations between behavioral inhibition, anxiety, and attention biases to threat and positive information

    PubMed Central

    White, Lauren K.; Degnan, Kathryn A.; Henderson, Heather A.; Pérez-Edgar, Koraly; Walker, Olga L.; Shechner, Tomer; Leibenluft, Ellen; Bar-Haim, Yair; Pine, Daniel S.; Fox, Nathan A.

    2016-01-01

    The current study examined relations between behavioral inhibition (BI) assessed in toddlerhood (n=268) and attention biases (AB) to threat and positive faces and maternal reported anxiety assessed when children were 5 and 7-years old. Results revealed that BI predicted anxiety at age 7 in children with AB toward threat, away from positive, or with no bias, at age 7; BI did not predict anxiety for children displaying AB away from threat or toward positive. Five-year AB did not moderate the link between BI and 7-year anxiety. No direct association between AB and BI or anxiety was detected; moreover, children did not show stable AB across development. These findings extend our understanding of the developmental links between BI, AB, and anxiety. PMID:28042902

  15. Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time

    DTIC Science & Technology

    2013-10-01

    Threats: Tools and Techniques 2 2.1 The Man-in-The-Middle ( MiTM ) Proxy 2 2.2 The Inspection Process 2 3 Installing WebDLPIndexer 4 3.1 Install JDK SE...selected open source and public-domain tools since they are freely available to the public. 2.1 The Man-in-The-Middle ( MiTM ) Proxy This report builds

  16. Age and automation interact to influence performance of a simulated luggage screening task.

    PubMed

    Wiegmann, Douglas; McCarley, Jason S; Kramer, Arthur F; Wickens, Christopher D

    2006-08-01

    An experiment examined the impact of automation on young and old adults' abilities to detect threat objects in a simulated baggage-screening task. Younger and older adult participants viewed X-ray images of cluttered baggage, 20% of which contained a hidden knife. Some participants were provided an automated aid with a hit rate of 0.90 and a false alarm rate of 0.25. The aid provided assistance to participants in one of three forms: a text message that appeared before the stimulus image; a text message that appeared following the stimulus image; or a spatial cue concurrent with the stimulus image. Control participants performed the task with no assistance from an aid. Spatial cuing improved performance for both age groups. Text cuing improved young adults' performance, but had no benefit for older participants. Effects were similar whether the text cue preceded or followed the search stimulus itself. Results indicate that spatial cuing rather than text alerts may be more effective in aiding performance during a baggage screening task and such benefits are likely to occur regardless of operator age.

  17. Generalized Drivers in the Mammalian Endangerment Process

    PubMed Central

    González-Suárez, Manuela; Revilla, Eloy

    2014-01-01

    An important challenge for conservation today is to understand the endangerment process and identify any generalized patterns in how threats occur and aggregate across taxa. Here we use a global database describing main current external threats in mammals to evaluate the prevalence of distinct threatening processes, primarily of anthropogenic origin, and to identify generalized drivers of extinction and their association with vulnerability status and intrinsic species' traits. We detect several primary threat combinations that are generally associated with distinct species. In particular, large and widely distributed mammals are affected by combinations of direct exploitation and threats associated with increasing landscape modification that go from logging to intense human land-use. Meanwhile, small, narrowly distributed species are affected by intensifying levels of landscape modification but are not directly exploited. In general more vulnerable species are affected by a greater number of threats, suggesting increased extinction risk is associated with the accumulation of external threats. Overall, our findings show that endangerment in mammals is strongly associated with increasing habitat loss and degradation caused by human land-use intensification. For large and widely distributed mammals there is the additional risk of being hunted. PMID:24587315

  18. Threat perception in mild cognitive impairment and early dementia.

    PubMed

    Henry, Julie D; Thompson, Claire; Ruffman, Ted; Leslie, Felicity; Withall, Adrienne; Sachdev, Perminder; Brodaty, Henry

    2009-09-01

    Mild cognitive impairment (MCI) and dementia affect many aspects of emotion processing. Even though the ability to detect threat is a particularly important aspect of emotion processing, no study to date has assessed threat perception in either of these groups. The purpose of the present study was to test whether individuals with MCI (n = 38) and mild dementia (n = 34) have difficulty differentiating between faces and situations normatively judged to be either high or low in threat relative to age-matched controls (n = 34). To achieve this aim, all participants completed 2 danger rating tasks that involved viewing and rating high- and low-danger images. It was also assessed whether threat perception was related to cognitive functioning and emotion recognition. The results indicated that all 3 groups were accurately, and comparably, able to differentiate high from low-danger faces. However, the dementia group had difficulties differentiating high from low-danger situations, which reflected a bias to overattribute the level of threat posed by normatively judged nonthreatening situations. This difficulty was related to more general cognitive decline.

  19. Use of Current 2010 Forest Disturbance Monitoring Products for the Conterminous United States in Aiding a National Forest Threat Early Warning System

    NASA Technical Reports Server (NTRS)

    Spruce, Joseph P.; Hargrove, William; Gasser, J.; Smoot, J.; Kuper, P.

    2010-01-01

    This presentation discusses contributions of near real time (NRT) MODIS forest disturbance detection products for the conterminous United States to an emerging national forest threat early warning system (EWS). The latter is being developed by the USDA Forest Service s Eastern and Western Environmental Threat Centers with help from NASA Stennis Space Center and the Oak Ridge National Laboratory. Building off work done in 2009, this national and regional forest disturbance detection and viewing capability of the EWS employs NRT MODIS NDVI data from the USGS eMODIS group and historical NDVI data from standard MOD13 products. Disturbance detection products are being computed for 24 day composites that are refreshed every 8 days. Products for 2010 include 42 dates of the 24 day composites. For each compositing date, we computed % change in forest maximum NDVI products for 2010 with respect to each of three historical baselines of 2009, 2007-2009, and 2003-2009,. The three baselines enable one to view potential current, recent, and longer term forest disturbances. A rainbow color table was applied to each forest change product so that potential disturbances (NDVI drops) were identified in hot color tones and growth (NDVI gains) in cold color tones. Example products were provided to end-users responsible for forest health monitoring at the Federal and State levels. Large patches of potential forest disturbances were validated based on comparisons with available reference data, including Landsat and field survey data. Products were posted on two internet mapping systems for US Forest Service internal and collaborator use. MODIS forest disturbance detection products were computed and posted for use in as little as 1 day after the last input date of the compositing period. Such products were useful for aiding aerial disturbance detection surveys and for assessing disturbance persistence on both inter- and intra-annual scales. Multiple 2010 forest disturbance events were detected across the nation, including damage from ice storms, tornadoes, caterpillars, bark beetles, and wildfires. This effort enabled improved NRT forest disturbance monitoring capabilities for this nation-wide forest threat EWS.

  20. Use of Current 2010 Forest Disturbance Monitoring Products for the Conterminous United States in Aiding a National Forest Threat Early Warning System

    NASA Astrophysics Data System (ADS)

    Spruce, J.; Hargrove, W. W.; Gasser, J.; Smoot, J.; Kuper, P.

    2010-12-01

    This presentation discusses contributions of near real time (NRT) MODIS forest disturbance detection products for the conterminous United States to an emerging national forest threat early warning system (EWS). The latter is being developed by the USDA Forest Service’s Eastern and Western Environmental Threat Centers with help from NASA Stennis Space Center and the Oak Ridge National Laboratory. Building off work done in 2009, this national and regional forest disturbance detection and viewing capability of the EWS employs NRT MODIS NDVI data from the USGS eMODIS group and historical NDVI data from standard MOD13 products. Disturbance detection products are being computed for 24 day composites that are refreshed every 8 days. Products for 2010 include 42 dates of the 24 day composites. For each compositing date, we computed % change in forest maximum NDVI products for 2010 with respect to each of three historical baselines of 2009, 2007-2009, and 2003-2009. The three baselines enable one to view potential current, recent, and longer term forest disturbances. A rainbow color table was applied to each forest change product so that potential disturbances (NDVI drops) were identified in hot color tones and growth (NDVI gains) in cold color tones. Example products were provided to end-users responsible for forest health monitoring at the Federal and State levels. Large patches of potential forest disturbances were validated based on comparisons with available reference data, including Landsat and field survey data. Products were posted on two internet mapping systems for US Forest Service internal and collaborator use. MODIS forest disturbance detection products were computed and posted for use in as little as 1 day after the last input date of the compositing period. Such products were useful for aiding aerial disturbance detection surveys and for assessing disturbance persistence on both inter- and intra-annual scales. Multiple 2010 forest disturbance events were detected across the nation, including damage from ice storms, tornados, caterpillars, bark beetles, and wildfires. This effort enabled improved NRT forest disturbance monitoring capabilities for this nation-wide forest threat EWS.

  1. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  2. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  3. [Health threats and health system crises. An approach to early warning and response. 2008 SESPAS Report].

    PubMed

    Simón Soria, Fernando; Guillén Enríquez, Francisco Javier

    2008-04-01

    The world is changing more and faster than ever before. New diseases are coming to light each year, controlled diseases are reemerging as potential threats, and natural or man-made disasters are increasingly affecting human health. The "International Health Regulations (2005)" reflect the changes in the response of public health to this new situation. Surveillance of specific diseases and predefined control measures have been replaced by surveillance of public health events of international concern and control measures adapted to each situation. The public health events of international interest are characterized by their seriousness, predictability, the risk of international spread and potential for travel or trade restrictions. The development of the European Early Warning and Response System in 1998 and the creation of the European Center for Disease Prevention and Control in 2005 demonstrate political commitment in Europe, with early detection of and response to public health threats. However, timely risk evaluation and response at a national level requires improved data digitalization and accessibility, automatic notification processes, data analysis and dissemination of information, the combination of information from multiple sources and adaptation of public health services. The autonomous regions in Spain are initiating this adaptation process, but interoperability between systems and the development of guidelines for a coordinated response should be steered by the National Interregional Health Council and coordinated by the Ministry of Health. Efficient early warning systems of health threats that allow for a timely response and reduce uncertainty about information would help to minimize the risk of public health crises. The profile of public health threats is nonspecific. Early detection of threats requires access to information from multiple sources and efficient risk assessment. Key factors for improving the response to public health threats are the development of surveillance methods and operational research in public health.

  4. Volume-holographic memory for laser threat discrimination

    NASA Astrophysics Data System (ADS)

    Delong, Mark L.; Duncan, Bradley D.; Parker, Jack H., Jr.

    1996-10-01

    Using conventional volume-holographic angle multiplexing in an Fe:LiNbO3 crystal, we have developed a compact laser threat discriminator, intended for aircraft integration, that optically detects laser spatial coherence and angle of arrival while simultaneously rejecting incoherent background sources, such as the Sun. The device is intended for a specific type of psychophysical laser attack against U.S. Air Force pilots, namely, third-world-country exploitation of inexpensive and powerful cw Ar-ion or doubled Nd:YAG lasers in the visible spectrum to blind or disorient U.S. pilots. The component does not solve the general tactical laser weapon situation, which includes identifying precision-guided munitions, range finders, and lidar systems that use pulsed infrared lasers. These are fundamentally different threats requiring different detector solutions. The device incorporates a sequence of highly redundant, simple black-and-white warning patterns that are keyed to be reconstructed as the incident laser threat, playing the role of an uncooperative probe beam, changes angle with respect to the crystal. The device tracks both azimuth and elevation, using a nonconventional hologram viewing system. Recording and playback conditions are simplified because nonzero cross talk is a desirable feature of this discriminator, inasmuch as our application requires a nonzero probability of detection for arbitrary directions of arrival within the sensor's field of view. The device can exploit phase-matched grating trade-off with probe-beam wavelength, accommodating wavelength-tunable threats, while still maintaining high direction-of-arrival tracking accuracy. .

  5. On a simulation study of cyber attacks on vehicle-to-infrastructure communication (V2I) in Intelligent Transportation System (ITS)

    NASA Astrophysics Data System (ADS)

    Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao

    2015-05-01

    An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.

  6. Applying a multi-replication framework to support dynamic situation assessment and predictive capabilities

    NASA Astrophysics Data System (ADS)

    Lammers, Craig; McGraw, Robert M.; Steinman, Jeffrey S.

    2005-05-01

    Technological advances and emerging threats reduce the time between target detection and action to an order of a few minutes. To effectively assist with the decision-making process, C4I decision support tools must quickly and dynamically predict and assess alternative Courses Of Action (COAs) to assist Commanders in anticipating potential outcomes. These capabilities can be provided through the faster-than-real-time predictive simulation of plans that are continuously re-calibrating with the real-time picture. This capability allows decision-makers to assess the effects of re-tasking opportunities, providing the decision-maker with tremendous freedom to make time-critical, mid-course decisions. This paper presents an overview and demonstrates the use of a software infrastructure that supports DSAP capabilities. These DSAP capabilities are demonstrated through the use of a Multi-Replication Framework that supports (1) predictivie simulations using JSAF (Joint Semi-Automated Forces); (2) real-time simulation, also using JSAF, as a state estimation mechanism; and, (3) real-time C4I data updates through TBMCS (Theater Battle Management Core Systems). This infrastructure allows multiple replications of a simulation to be executed simultaneously over a grid faster-than-real-time, calibrated with live data feeds. A cost evaluator mechanism analyzes potential outcomes and prunes simulations that diverge from the real-time picture. In particular, this paper primarily serves to walk a user through the process for using the Multi-Replication Framework providing an enhanced decision aid.

  7. STATISTICAL METHODS FOR ENVIRONMENTAL APPLICATIONS USING DATA SETS WITH BELOW DETECTION LIMIT OBSERVATIONS AS INCORPORTED IN PROUCL 4.0

    EPA Science Inventory

    Nondetect (ND) or below detection limit (BDL) results cannot be measured accurately, and, therefore, are reported as less than certain detection limit (DL) values. However, since the presence of some contaminants (e.g., dioxin) in environmental media may pose a threat to human he...

  8. Technical and operational users' opinions of a handheld device to detect directed energy.

    PubMed

    Boyd, Andrew D; Naiman, Melissa; Stevenson, Greer W; Preston, Richard; Valenta, Annette L

    2013-05-01

    Lasers, a form of directed energy (DE), are a threat to pilots and Air Force personnel. In light of this threat, a handheld medical device called the "Tricorder" is under development to improve situational awareness of DE. Current operational procedures do not include methods for recording or handling new information regarding DE. The purpose of this study was to understand Air Force personnel opinions and beliefs about desired features and operational use to enhance user acceptance of the Tricorder. Q-methodology was implemented to study opinions and beliefs related to DE. Two groups were approached, medical personnel in the Illinois Air National Guard and four active duty members of an Air Force Rescue Squadron. Both groups completed the same Q-sort of both operational and equipment concerns. Six opinion sets regarding operational concerns described 61% of the total variation in perceptions among participants. The factors were: concern over health effects, implications to individuals, combat/tactical concerns, force health protection, and theater/tactical concerns. Five opinion sets described 68% of the variation in the equipment functions perceived as most important. The participants indicated that ideally the device should measure exposure, enhance laser detection/response, support night vision and ease of use, detect threats, and enhance combat medicine. This survey revealed the complexity of equipment and the operational implications of detecting DE. Q-methodology is a unique strategy to both evaluate technology and explore users' concerns.

  9. Small Ne of the Isolated and Unmanaged Horse Population on Sable Island.

    PubMed

    Uzans, Andrea J; Lucas, Zoe; McLeod, Brenna A; Frasier, Timothy R

    2015-01-01

    For small, isolated populations 2 common conservation concerns relate to genetic threats: inbreeding and negative consequences associated with loss of genetic diversity due to drift. Mitigating these threats often involves conservation actions that can be controversial, such as translocations or captive breeding programs. Although such actions have been successful in some situations, in others they have had undesirable outcomes. Here, we estimated the effective population size (N e ) of the Sable Island horses to assess the risk to this population of these genetic threats. We found surprising consistency of N e estimates across the 5 different methods used, with a mean of 48 effective individuals. This estimate falls below the 50 criterion of the "50/500 rule," below which inbreeding depression is a concern for population viability. However, simulations and knowledge of population history indicate that this population is still in its early stages of approaching equilibrium between mutation, drift, and genetic diversity; and no negative consequences have been identified that could be associated with inbreeding depression. Therefore, we do not recommend taking management action (such as translocations) at this stage. Rather, we propose continued monitoring of genetic diversity and fitness over time so that trends and any substantial changes can be detected. This represents one of the few unmanaged horse populations in the world, and therefore these data will not only alert us to serious concerns regarding their conservation status, but will also provide a wealth of information about how natural processes drive patterns of reproduction, mortality, and population growth over time. © The American Genetic Association 2015. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Real time avalanche detection for high risk areas.

    DOT National Transportation Integrated Search

    2014-12-01

    Avalanches routinely occur on State Highway 21 (SH21) between Lowman and Stanley, Idaho each winter. The avalanches pose : a threat to the safety of maintenance workers and the traveling public. A real-time avalanche detection system will allow the :...

  11. Glanders (Burkholderia Mallei)

    MedlinePlus

    ... Signs and Symptoms Risk of Exposure Treatment Prevention Information for Healthcare workers Bioterrorism The Threat Preparedness Detection & Response Bioterrorism Response Planning Community-Based ...

  12. Standoff detection of chemical and biological threats using laser-induced breakdown spectroscopy.

    PubMed

    Gottfried, Jennifer L; De Lucia, Frank C; Munson, Chase A; Miziolek, Andrzej W

    2008-04-01

    Laser-induced breakdown spectroscopy (LIBS) is a promising technique for real-time chemical and biological warfare agent detection in the field. We have demonstrated the detection and discrimination of the biological warfare agent surrogates Bacillus subtilis (BG) (2% false negatives, 0% false positives) and ovalbumin (0% false negatives, 1% false positives) at 20 meters using standoff laser-induced breakdown spectroscopy (ST-LIBS) and linear correlation. Unknown interferent samples (not included in the model), samples on different substrates, and mixtures of BG and Arizona road dust have been classified with reasonable success using partial least squares discriminant analysis (PLS-DA). A few of the samples tested such as the soot (not included in the model) and the 25% BG:75% dust mixture resulted in a significant number of false positives or false negatives, respectively. Our preliminary results indicate that while LIBS is able to discriminate biomaterials with similar elemental compositions at standoff distances based on differences in key intensity ratios, further work is needed to reduce the number of false positives/negatives by refining the PLS-DA model to include a sufficient range of material classes and carefully selecting a detection threshold. In addition, we have demonstrated that LIBS can distinguish five different organophosphate nerve agent simulants at 20 meters, despite their similar stoichiometric formulas. Finally, a combined PLS-DA model for chemical, biological, and explosives detection using a single ST-LIBS sensor has been developed in order to demonstrate the potential of standoff LIBS for universal hazardous materials detection.

  13. Simulation of data safety components for corporative systems

    NASA Astrophysics Data System (ADS)

    Yaremko, Svetlana A.; Kuzmina, Elena M.; Savchuk, Tamara O.; Krivonosov, Valeriy E.; Smolarz, Andrzej; Arman, Abenov; Smailova, Saule; Kalizhanova, Aliya

    2017-08-01

    The article deals with research of designing data safety components for corporations by means of mathematical simulations and modern information technologies. Simulation of threats ranks has been done which is based on definite values of data components. The rules of safety policy for corporative information systems have been presented. The ways of realization of safety policy rules have been proposed on the basis of taken conditions and appropriate class of valuable data protection.

  14. Evaluating Hospital-Based Surveillance for Outbreak Detection in Bangladesh: Analysis of Healthcare Utilization Data

    PubMed Central

    Nikolay, Birgit; Salje, Henrik; Sturm-Ramirez, Katharine; Azziz-Baumgartner, Eduardo; Homaira, Nusrat; Iuliano, A. Danielle; Paul, Repon C.; Hossain, M. Jahangir; Cauchemez, Simon; Gurley, Emily S.

    2017-01-01

    Background The International Health Regulations outline core requirements to ensure the detection of public health threats of international concern. Assessing the capacity of surveillance systems to detect these threats is crucial for evaluating a country’s ability to meet these requirements. Methods and Findings We propose a framework to evaluate the sensitivity and representativeness of hospital-based surveillance and apply it to severe neurological infectious diseases and fatal respiratory infectious diseases in Bangladesh. We identified cases in selected communities within surveillance hospital catchment areas using key informant and house-to-house surveys and ascertained where cases had sought care. We estimated the probability of surveillance detecting different sized outbreaks by distance from the surveillance hospital and compared characteristics of cases identified in the community and cases attending surveillance hospitals. We estimated that surveillance detected 26% (95% CI 18%–33%) of severe neurological disease cases and 18% (95% CI 16%–21%) of fatal respiratory disease cases residing at 10 km distance from a surveillance hospital. Detection probabilities decreased markedly with distance. The probability of detecting small outbreaks (three cases) dropped below 50% at distances greater than 26 km for severe neurological disease and at distances greater than 7 km for fatal respiratory disease. Characteristics of cases attending surveillance hospitals were largely representative of all cases; however, neurological disease cases aged <5 y or from the lowest socioeconomic group and fatal respiratory disease cases aged ≥60 y were underrepresented. Our estimates of outbreak detection rely on suspected cases that attend a surveillance hospital receiving laboratory confirmation of disease and being reported to the surveillance system. The extent to which this occurs will depend on disease characteristics (e.g., severity and symptom specificity) and surveillance resources. Conclusion We present a new approach to evaluating the sensitivity and representativeness of hospital-based surveillance, making it possible to predict its ability to detect emerging threats. PMID:28095468

  15. The capture and destruction of E. coli from simulated urban runoff using conventional bioretention media and iron oxide-coated sand

    USDA-ARS?s Scientific Manuscript database

    Given the magnitude of the threat to the quality of receiving water bodies posed by microbial pollutants in urban stormwater runoff, and the untested potential for their removal in bioretention systems, studies were performed to evaluate the removal efficiency of bacteria from simulated urban stormw...

  16. Distinct frontal and amygdala correlates of change detection for facial identity and expression

    PubMed Central

    Achaibou, Amal; Loth, Eva

    2016-01-01

    Recruitment of ‘top-down’ frontal attentional mechanisms is held to support detection of changes in task-relevant stimuli. Fluctuations in intrinsic frontal activity have been shown to impact task performance more generally. Meanwhile, the amygdala has been implicated in ‘bottom-up’ attentional capture by threat. Here, 22 adult human participants took part in a functional magnetic resonance change detection study aimed at investigating the correlates of successful (vs failed) detection of changes in facial identity vs expression. For identity changes, we expected prefrontal recruitment to differentiate ‘hit’ from ‘miss’ trials, in line with previous reports. Meanwhile, we postulated that a different mechanism would support detection of emotionally salient changes. Specifically, elevated amygdala activation was predicted to be associated with successful detection of threat-related changes in expression, over-riding the influence of fluctuations in top-down attention. Our findings revealed that fusiform activity tracked change detection across conditions. Ventrolateral prefrontal cortical activity was uniquely linked to detection of changes in identity not expression, and amygdala activity to detection of changes from neutral to fearful expressions. These results are consistent with distinct mechanisms supporting detection of changes in face identity vs expression, the former potentially reflecting top-down attention, the latter bottom-up attentional capture by stimulus emotional salience. PMID:26245835

  17. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pederson, Ann C.; Snow, Catherine L.; Townsend, Jeremy

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decisionmore » makers and management in determining the most effective policies and procedures for their country or facility.« less

  18. Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.

    Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container drivingmore » through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.« less

  19. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang

    The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.

  20. Limited view angle iterative CT reconstruction

    NASA Astrophysics Data System (ADS)

    Kisner, Sherman J.; Haneda, Eri; Bouman, Charles A.; Skatter, Sondre; Kourinny, Mikhail; Bedford, Simon

    2012-03-01

    Computed Tomography (CT) is widely used for transportation security to screen baggage for potential threats. For example, many airports use X-ray CT to scan the checked baggage of airline passengers. The resulting reconstructions are then used for both automated and human detection of threats. Recently, there has been growing interest in the use of model-based reconstruction techniques for application in CT security systems. Model-based reconstruction offers a number of potential advantages over more traditional direct reconstruction such as filtered backprojection (FBP). Perhaps one of the greatest advantages is the potential to reduce reconstruction artifacts when non-traditional scan geometries are used. For example, FBP tends to produce very severe streaking artifacts when applied to limited view data, which can adversely affect subsequent processing such as segmentation and detection. In this paper, we investigate the use of model-based reconstruction in conjunction with limited-view scanning architectures, and we illustrate the value of these methods using transportation security examples. The advantage of limited view architectures is that it has the potential to reduce the cost and complexity of a scanning system, but its disadvantage is that limited-view data can result in structured artifacts in reconstructed images. Our method of reconstruction depends on the formulation of both a forward projection model for the system, and a prior model that accounts for the contents and densities of typical baggage. In order to evaluate our new method, we use realistic models of baggage with randomly inserted simple simulated objects. Using this approach, we show that model-based reconstruction can substantially reduce artifacts and improve important metrics of image quality such as the accuracy of the estimated CT numbers.

  1. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign andmore » threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.« less

  2. Anxiety dissociates the adaptive functions of sensory and motor response enhancements to social threats

    PubMed Central

    El Zein, Marwa; Wyart, Valentin; Grèzes, Julie

    2015-01-01

    Efficient detection and reaction to negative signals in the environment is essential for survival. In social situations, these signals are often ambiguous and can imply different levels of threat for the observer, thereby making their recognition susceptible to contextual cues – such as gaze direction when judging facial displays of emotion. However, the mechanisms underlying such contextual effects remain poorly understood. By computational modeling of human behavior and electrical brain activity, we demonstrate that gaze direction enhances the perceptual sensitivity to threat-signaling emotions – anger paired with direct gaze, and fear paired with averted gaze. This effect arises simultaneously in ventral face-selective and dorsal motor cortices at 200 ms following face presentation, dissociates across individuals as a function of anxiety, and does not reflect increased attention to threat-signaling emotions. These findings reveal that threat tunes neural processing in fast, selective, yet attention-independent fashion in sensory and motor systems, for different adaptive purposes. DOI: http://dx.doi.org/10.7554/eLife.10274.001 PMID:26712157

  3. Mechanisms of change in ERP treatment of compulsive hand washing: does primary threat make a difference?

    PubMed

    Cougle, Jesse R; Wolitzky-Taylor, Kate B; Lee, Han-Joo; Telch, Michael J

    2007-07-01

    The present study sought to examine patterns of habituation in exposure and response prevention (ERP) treatment of compulsive hand washing. Sub-clinical compulsive washers (n=27) with illness or non-illness primary threats were compared in order to detect potential differences in response to a single session of ERP. Changes in anxiety, disgust, and urge to wash were analyzed, and significant reductions in both anxiety and disgust were noted. Urge to wash significantly declined among washers primarily concerned with illness; among those concerned with non-illness threats, urge to wash did not significantly decline. Moreover, anxiety was found to decline when controlling for disgust and vice versa. Lastly, when both anxiety and disgust were entered into a model predicting changes in urge to wash, anxiety but not disgust predicted urge to wash for those with illness-related threats; for washers with non-illness threats, the findings were the reverse. Several clinical and theoretical implications are discussed.

  4. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    PubMed

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening.

  5. Threat assessment and sensor management in a modular architecture

    NASA Astrophysics Data System (ADS)

    Page, S. F.; Oldfield, J. P.; Islip, S.; Benfold, B.; Brandon, R.; Thomas, P. A.; Stubbins, D. J.

    2016-10-01

    Many existing asset/area protection systems, for example those deployed to protect critical national infrastructure, are comprised of multiple sensors such as EO/IR, radar, and Perimeter Intrusion Detection Systems (PIDS), loosely integrated with a central Command and Control (C2) system. Whilst some sensors provide automatic event detection and C2 systems commonly provide rudimentary multi-sensor rule based alerting, the performance of such systems is limited by the lack of deep integration and autonomy. As a result, these systems have a high degree of operator burden. To address these challenges, an architectural concept termed "SAPIENT" was conceived. SAPIENT is based on multiple Autonomous Sensor Modules (ASMs) connected to a High-Level Decision Making Module (HLDMM) that provides data fusion, situational awareness, alerting, and sensor management capability. The aim of the SAPIENT concept is to allow for the creation of a surveillance system, in a modular plug-and-play manner, that provides high levels of autonomy, threat detection performance, and reduced operator burden. This paper considers the challenges associated with developing an HLDMM aligned with the SAPIENT concept, through the discussion of the design of a realised HLDMM. Particular focus is drawn to how high levels of system level performance can be achieved whilst retaining modularity and flexibility. A number of key aspects of our HLDMM are presented, including an integrated threat assessment and sensor management framework, threat sequence matching, and ASM trust modelling. The results of real-world testing of the HLDMM, in conjunction with multiple Laser, Radar, and EO/IR sensors, in representative semi-urban environments, are discussed.

  6. Can laptops be left inside passenger bags if motion imaging is used in X-ray security screening?

    PubMed Central

    Mendes, Marcia; Schwaninger, Adrian; Michel, Stefan

    2013-01-01

    This paper describes a study where a new X-ray machine for security screening featuring motion imaging (i.e., 5 views of a bag are shown as an image sequence) was evaluated and compared to single view imaging available on conventional X-ray screening systems. More specifically, it was investigated whether with this new technology X-ray screening of passenger bags could be enhanced to such an extent that laptops could be left inside passenger bags, without causing a significant impairment in threat detection performance. An X-ray image interpretation test was created in four different versions, manipulating the factors packing condition (laptop and bag separate vs. laptop in bag) and display condition (single vs. motion imaging). There was a highly significant and large main effect of packing condition. When laptops and bags were screened separately, threat item detection was substantially higher. For display condition, a medium effect was observed. Detection could be slightly enhanced through the application of motion imaging. There was no interaction between display and packing condition, implying that the high negative effect of leaving laptops in passenger bags could not be fully compensated by motion imaging. Additional analyses were carried out to examine effects depending on different threat categories (guns, improvised explosive devices, knives, others), the placement of the threat items (in bag vs. in laptop) and viewpoint (easy vs. difficult view). In summary, although motion imaging provides an enhancement, it is not strong enough to allow leaving laptops in bags for security screening. PMID:24151457

  7. Meta-analytic review of the effects of a single dose of intranasal oxytocin on threat processing in humans.

    PubMed

    Leppanen, Jenni; Ng, Kah Wee; Kim, Youl-Ri; Tchanturia, Kate; Treasure, Janet

    2018-01-01

    Heightened threat sensitivity is a transdiagnostic feature in several psychiatric disorders. The neuropeptide oxytocin has been shown to reduce fear related behaviours and facilitated fear extinction in animals. These findings have led to increasing interest to explore the effects of intranasal oxytocin on threat processing in humans. The review included 26 studies (N = 1173), nine of which included clinical populations (N = 234). The clinical groups included were people with borderline personality disorder (BPD), anorexia nervosa, bulimia nervosa, depression, anxiety, and alcohol dependence disorder. We examined the effects of a single dose of intranasal oxytocin on startle response, attentional responses, and behavioural responses to threat. A single dose of intranasal oxytocin significantly increased the physiological startle response to threat in healthy people with a small effect size. However, oxytocin did not have significant effects on attentional bias towards social or disorder-specific threat, fixation towards threatening stimuli among healthy or clinical populations, or on threat related behavioural approach or avoidance responses. No studies investigated the effects of oxytocin on the startle response to threat among clinical populations. Additionally, only one of the reviewed studies had sufficient power to detect at least a moderate effect of oxytocin according to our criterion. The synthesis of literature suggest that oxytocin may influence the salience of threatening stimuli among healthy individuals, increasing the startle response to threat. It would be of interest to investigate the effects of oxytocin on the startle response to threat among clinical populations. Copyright © 2017 Elsevier B.V. All rights reserved.

  8. The Insider Threat to Cybersecurity: How Group Process and Ignorance Affect Analyst Accuracy and Promptitude

    DTIC Science & Technology

    2017-09-01

    meta-analytic review and theoretical integration . Journal of Personality and Social Psychology ,65(4), 681. Karr-Wisniewski, P., & Lu, Y. (2010...dissertation applies attribution theory, a product of cognitive psychology , to evaluate how analysts collectively and individually make attributions in...Likewise, many researchers agree that anomaly detection is an integral component for insider threat analysis (Brdiczka, Liu, Price, Shen, Patil, Chow

  9. Insider Threat Detection on the Windows Operating System using Virtual Machine Introspection

    DTIC Science & Technology

    2012-06-14

    by a malicious insider. HBSS systems running on a user’s workstation could be disabled either due to misconfiguration, privilege escalation , or by a...potential malicious insider threat, organizations must develop use cases which categorize possible attack techniques, such as data exfiltration via...hardware and contain any type of data an attacker may be looking for. Minimal Resources Since honeypots do not provide any network services, they

  10. Development and Demonstration of a Prototype Free Flight Cockpit Display of Traffic Information

    NASA Technical Reports Server (NTRS)

    Johnson, Walter W.; Battiste, Vernol; Delzell, Susanne; Holland, Sheila; Belcher, Sean; Jordan, Kevin

    2003-01-01

    Two versions of a prototype Free Flight cockpit situational display (Basic and Enhanced) were examined in a simulation at the NASA Ames Research Center. Both displays presented a display of traffic out to a range of 120 NM, and an alert when the automation detected a substantial danger of losing separation with another aircraft. The task for the crews was to detect and resolve threats to separation posed by intruder aircraft. An Enhanced version of the display was also examined. It incorporated two additional conflict alerting levels and tools to aid in trajectory prediction and path planning. Ten crews from a major airline participated in the study. Performance analyses and pilot debriefings showed that the Enhanced display was preferred, and that minimal separation between the intruder and the ownship was larger with the Enhanced display. In addition, the additional information on the Enhanced display did not lead crews to engage in more maneuvering. Instead an opposite trend was indicated. Finally, crews using the Enhanced display responded more proactively, tending to resolve alerts earlier.

  11. Ventrolateral prefrontal cortex and the effects of task demand context on facial affect appraisal in schizophrenia.

    PubMed

    Leitman, David I; Wolf, Daniel H; Loughead, James; Valdez, Jeffrey N; Kohler, Christian G; Brensinger, Colleen; Elliott, Mark A; Turetsky, Bruce I; Gur, Raquel E; Gur, Ruben C

    2011-01-01

    Schizophrenia patients display impaired performance and brain activity during facial affect recognition. These impairments may reflect stimulus-driven perceptual decrements and evaluative processing abnormalities. We differentiated these two processes by contrasting responses to identical stimuli presented under different contexts. Seventeen healthy controls and 16 schizophrenia patients performed an fMRI facial affect detection task. Subjects identified an affective target presented amongst foils of differing emotions. We hypothesized that targeting affiliative emotions (happiness, sadness) would create a task demand context distinct from that generated when targeting threat emotions (anger, fear). We compared affiliative foil stimuli within a congruent affiliative context with identical stimuli presented in an incongruent threat context. Threat foils were analysed in the same manner. Controls activated right orbitofrontal cortex (OFC)/ventrolateral prefrontal cortex (VLPFC) more to affiliative foils in threat contexts than to identical stimuli within affiliative contexts. Patients displayed reduced OFC/VLPFC activation to all foils, and no activation modulation by context. This lack of context modulation coincided with a 2-fold decrement in foil detection efficiency. Task demands produce contextual effects during facial affective processing in regions activated during affect evaluation. In schizophrenia, reduced modulation of OFC/VLPFC by context coupled with reduced behavioural efficiency suggests impaired ventral prefrontal control mechanisms that optimize affective appraisal.

  12. Flu, Floods, and Fire: Ethical Public Health Preparedness.

    PubMed

    Phelan, Alexandra L; Gostin, Lawrence O

    2017-05-01

    Even as public health ethics was developing as a field, major incidents such as 9/11 and the SARS epidemic propelled discourse around public health emergency preparedness and response. Policy and practice shifted to a multidisciplinary approach, recognizing the broad range of potential threats to public health, including biological, physical, radiological, and chemical threats. This propelled the development of surveillance systems to detect incidents, laboratory capacities to rapidly test for potential threats, and therapeutic and social countermeasures to prepare for and respond to a range of hazards. In bringing public health ethics and emergency preparedness together, Emergency Ethics: Public Health Preparedness and Response adds depth and complexity to both fields. As global threats continue to emerge, the book, edited by Bruce Jennings, John D. Arras, Drue H. Barrett, and Barbara A. Ellis, will offer a vital compass. © 2017 The Hastings Center.

  13. Asymdystopia: The Threat of Small Biases in Evaluations of Education Interventions That Need to Be Powered to Detect Small Impacts. NCEE 2018-4002

    ERIC Educational Resources Information Center

    Deke, John; Wei, Thomas; Kautz, Tim

    2017-01-01

    Evaluators of education interventions are increasingly designing studies to detect impacts much smaller than the 0.20 standard deviations that Cohen (1988) characterized as "small." While the need to detect smaller impacts is based on compelling arguments that such impacts are substantively meaningful, the drive to detect smaller impacts…

  14. A large surface neutron and photon detector for civil security applications

    NASA Astrophysics Data System (ADS)

    De Vita, R.; Ambi, F.; Battaglieri, M.; Osipenko, M.; Piombo, D.; Ricco, G.; Ripani, M.; Taiuti, M.

    2010-05-01

    The security of ports and transportation is of utmost importance for the development of economy and the security of a nation. Among the necessary actions to ensure the security of ports and borders, the inspection of containers is one of the most time consuming and expensive procedures. Potential threats are the illegal traffic of radioactive materials that could be employed for the construction of weapons, as uranium and plutonium. New techniques for the inspections of containers should be fast, allow the detection and identification of dangerous materials, and be non-invasive, to reduce costs and delays. We propose to build a large surface photon and neutron detector based on plastic scintillator to identify the presence of fissile or fertile material inside a container. The detector consists of scintillator bars, wrapped in thin foils of reflecting material containing gadolinium for neutron capture and arranged in planes separated by few-millimeter-thick lead sheets. The total instrumented surface is a few squared meters. Neutrons emitted by fissile materials are identified by gadolinium capture, which results in a high multiplicity gamma flash with total energy of 8 MeV. Photons emitted by the same source are detected via their Compton interaction in the scintillating material. The discrimination between photons and neutrons is achieved by measuring the number of bars of the detector that measured a signal above threshold. The resulting multiplicity is a clear signature of the particle type. First simulations of the detector response with GEANT4 have shown that a detection efficiency of 20-30% for neutrons emitted by fissile materials and a photon/neutron rejection ratio of more than two orders of magnitude can be achieved. Based on these simulations, the sensitivity of the detector to known amounts of plutonium and uranium was estimated. In this contribution, the conceptual design of the detector will be reviewed, the results of the simulations will be presented and the plan of measurements to be performed on a prototype will be discussed.

  15. Toll-like receptor variation in the bottlenecked population of the Seychelles warbler: computer simulations see the 'ghost of selection past' and quantify the 'drift debt'.

    PubMed

    Gilroy, D L; Phillips, K P; Richardson, D S; van Oosterhout, C

    2017-07-01

    Balancing selection can maintain immunogenetic variation within host populations, but detecting its signal in a postbottlenecked population is challenging due to the potentially overriding effects of drift. Toll-like receptor genes (TLRs) play a fundamental role in vertebrate immune defence and are predicted to be under balancing selection. We previously characterized variation at TLR loci in the Seychelles warbler (Acrocephalus sechellensis), an endemic passerine that has undergone a historical bottleneck. Five of seven TLR loci were polymorphic, which is in sharp contrast to the low genomewide variation observed. However, standard population genetic statistical methods failed to detect a contemporary signature of selection at any TLR locus. We examined whether the observed TLR polymorphism could be explained by neutral evolution, simulating the population's demography in the software DIYABC. This showed that the posterior distributions of mutation rates had to be unrealistically high to explain the observed genetic variation. We then conducted simulations with an agent-based model using typical values for the mutation rate, which indicated that weak balancing selection has acted on the three TLR genes. The model was able to detect evidence of past selection elevating TLR polymorphism in the prebottleneck populations, but was unable to discern any effects of balancing selection in the contemporary population. Our results show drift is the overriding evolutionary force that has shaped TLR variation in the contemporary Seychelles warbler population, and the observed TLR polymorphisms might be merely the 'ghost of selection past'. Forecast models predict immunogenetic variation in this species will continue to be eroded in the absence of contemporary balancing selection. Such 'drift debt' occurs when a gene pool has not yet reached its new equilibrium level of polymorphism, and this loss could be an important threat to many recently bottlenecked populations. © 2017 European Society For Evolutionary Biology. Journal of Evolutionary Biology © 2017 European Society For Evolutionary Biology.

  16. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    PubMed

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  17. Dissecting the Function of Hippocampal Oscillations in a Human Anxiety Model

    PubMed Central

    Khemka, Saurabh

    2017-01-01

    Neural oscillations in hippocampus and medial prefrontal cortex (mPFC) are a hallmark of rodent anxiety models that build on conflict between approach and avoidance. Yet, the function of these oscillations, and their expression in humans, remain elusive. Here, we used magnetoencephalography (MEG) to investigate neural oscillations in a task that simulated approach–avoidance conflict, wherein 23 male and female human participants collected monetary tokens under a threat of virtual predation. Probability of threat was signaled by color and learned beforehand by direct experience. Magnitude of threat corresponded to a possible monetary loss, signaled as a quantity. We focused our analyses on an a priori defined region-of-interest, the bilateral hippocampus. Oscillatory power under conflict was linearly predicted by threat probability in a location consistent with right mid-hippocampus. This pattern was specific to the hippocampus, most pronounced in the gamma band, and not explained by spatial movement or anxiety-like behavior. Gamma power was modulated by slower theta rhythms, and this theta modulation increased with threat probability. Furthermore, theta oscillations in the same location showed greater synchrony with mPFC theta with increased threat probability. Strikingly, these findings were not seen in relation to an increase in threat magnitude, which was explicitly signaled as a quantity and induced similar behavioral responses as learned threat probability. Thus, our findings suggest that the expression of hippocampal and mPFC oscillatory activity in the context of anxiety is specifically linked to threat memory. These findings resonate with neurocomputational accounts of the role played by hippocampal oscillations in memory. SIGNIFICANCE STATEMENT We use a biologically relevant approach–avoidance conflict test in humans while recording neural oscillations with magnetoencephalography to investigate the expression and function of hippocampal oscillations in human anxiety. Extending nonhuman studies, we can assign a possible function to hippocampal oscillations in this task, namely threat memory communication. This blends into recent attempts to elucidate the role of brain synchronization in defensive responses to threat. PMID:28626018

  18. Subclinical infection of a young captive Asian elephant with elephant endotheliotropic herpesvirus 1.

    PubMed

    Azab, Walid; Damiani, Armando Mario; Ochs, Andreas; Osterrieder, Nikolaus

    2018-02-01

    Elephant endotheliotropic herpesviruses (EEHVs) are a continuous threat for young Asian elephants. We report a laboratory-confirmed infection of a 5-year-old female Asian elephant (AZ_2016) in the Berlin Zoologischer Garten. Initially, high EEHV-1 loads were detected in trunk swabs obtained from the young elephant during routine screening. The animal showed no clinical signs except for slight irritability. EEHV-1 was continuously shed for almost one year, with fluctuations in viral load from time to time. Our investigations highlight the continuous threat of EEHV-1 to young captive Asian elephants and stress the importance of routine monitoring of captive elephants to allow early detection of infection.

  19. Coming to terms with fear

    PubMed Central

    LeDoux, Joseph E.

    2014-01-01

    The brain mechanisms of fear have been studied extensively using Pavlovian fear conditioning, a procedure that allows exploration of how the brain learns about and later detects and responds to threats. However, mechanisms that detect and respond to threats are not the same as those that give rise to conscious fear. This is an important distinction because symptoms based on conscious and nonconscious processes may be vulnerable to different predisposing factors and may also be treatable with different approaches in people who suffer from uncontrolled fear or anxiety. A conception of so-called fear conditioning in terms of circuits that operate nonconsciously, but that indirectly contribute to conscious fear, is proposed as way forward. PMID:24501122

  20. Rapid and sensitive detection of Yersinia pestis using amplification of plague diagnostic bacteriophages monitored by real-time PCR.

    PubMed

    Sergueev, Kirill V; He, Yunxiu; Borschel, Richard H; Nikolich, Mikeljon P; Filippov, Andrey A

    2010-06-28

    Yersinia pestis, the agent of plague, has caused many millions of human deaths and still poses a serious threat to global public health. Timely and reliable detection of such a dangerous pathogen is of critical importance. Lysis by specific bacteriophages remains an essential method of Y. pestis detection and plague diagnostics. The objective of this work was to develop an alternative to conventional phage lysis tests--a rapid and highly sensitive method of indirect detection of live Y. pestis cells based on quantitative real-time PCR (qPCR) monitoring of amplification of reporter Y. pestis-specific bacteriophages. Plague diagnostic phages phiA1122 and L-413C were shown to be highly effective diagnostic tools for the detection and identification of Y. pestis by using qPCR with primers specific for phage DNA. The template DNA extraction step that usually precedes qPCR was omitted. phiA1122-specific qPCR enabled the detection of an initial bacterial concentration of 10(3) CFU/ml (equivalent to as few as one Y. pestis cell per 1-microl sample) in four hours. L-413C-mediated detection of Y. pestis was less sensitive (up to 100 bacteria per sample) but more specific, and thus we propose parallel qPCR for the two phages as a rapid and reliable method of Y. pestis identification. Importantly, phiA1122 propagated in simulated clinical blood specimens containing EDTA and its titer rise was detected by both a standard plating test and qPCR. Thus, we developed a novel assay for detection and identification of Y. pestis using amplification of specific phages monitored by qPCR. The method is simple, rapid, highly sensitive, and specific and allows the detection of only live bacteria.

  1. Detection of chemical pollutants by passive LWIR hyperspectral imaging

    NASA Astrophysics Data System (ADS)

    Lavoie, Hugo; Thériault, Jean-Marc; Bouffard, François; Puckrin, Eldon; Dubé, Denis

    2012-09-01

    Toxic industrial chemicals (TICs) represent a major threat to public health and security. Their detection constitutes a real challenge to security and first responder's communities. One promising detection method is based on the passive standoff identification of chemical vapors emanating from the laboratory under surveillance. To investigate this method, the Department of National Defense and Public Safety Canada have mandated Defense Research and Development Canada (DRDC) - Valcartier to develop and test passive Long Wave Infrared (LWIR) hyperspectral imaging (HSI) sensors for standoff detection. The initial effort was focused to address the standoff detection and identification of toxic industrial chemicals (TICs) and precursors. Sensors such as the Multi-option Differential Detection and Imaging Fourier Spectrometer (MoDDIFS) and the Improved Compact ATmospheric Sounding Interferometer (iCATSI) were developed for this application. This paper describes the sensor developments and presents initial results of standoff detection and identification of TICs and precursors. The standoff sensors are based on the differential Fourier-transform infrared (FTIR) radiometric technology and are able to detect, spectrally resolve and identify small leak plumes at ranges in excess of 1 km. Results from a series of trials in asymmetric threat type scenarios will be presented. These results will serve to establish the potential of the method for standoff detection of TICs precursors and surrogates.

  2. Real-time 3D change detection of IEDs

    NASA Astrophysics Data System (ADS)

    Wathen, Mitch; Link, Norah; Iles, Peter; Jinkerson, John; Mrstik, Paul; Kusevic, Kresimir; Kovats, David

    2012-06-01

    Road-side bombs are a real and continuing threat to soldiers in theater. CAE USA recently developed a prototype Volume based Intelligence Surveillance Reconnaissance (VISR) sensor platform for IED detection. This vehicle-mounted, prototype sensor system uses a high data rate LiDAR (1.33 million range measurements per second) to generate a 3D mapping of roadways. The mapped data is used as a reference to generate real-time change detection on future trips on the same roadways. The prototype VISR system is briefly described. The focus of this paper is the methodology used to process the 3D LiDAR data, in real-time, to detect small changes on and near the roadway ahead of a vehicle traveling at moderate speeds with sufficient warning to stop the vehicle at a safe distance from the threat. The system relies on accurate navigation equipment to geo-reference the reference run and the change-detection run. Since it was recognized early in the project that detection of small changes could not be achieved with accurate navigation solutions alone, a scene alignment algorithm was developed to register the reference run with the change detection run prior to applying the change detection algorithm. Good success was achieved in simultaneous real time processing of scene alignment plus change detection.

  3. Threat-Related Attention Bias Variability and Posttraumatic Stress.

    PubMed

    Naim, Reut; Abend, Rany; Wald, Ilan; Eldar, Sharon; Levi, Ofir; Fruchter, Eyal; Ginat, Karen; Halpern, Pinchas; Sipos, Maurice L; Adler, Amy B; Bliese, Paul D; Quartana, Phillip J; Pine, Daniel S; Bar-Haim, Yair

    2015-12-01

    Threat monitoring facilitates survival by allowing one to efficiently and accurately detect potential threats. Traumatic events can disrupt healthy threat monitoring, inducing biased and unstable threat-related attention deployment. Recent research suggests that greater attention bias variability, that is, attention fluctuations alternating toward and away from threat, occurs in participants with PTSD relative to healthy comparison subjects who were either exposed or not exposed to traumatic events. The current study extends findings on attention bias variability in PTSD. Previous measurement of attention bias variability was refined by employing a moving average technique. Analyses were conducted across seven independent data sets; in each, data on attention bias variability were collected by using variants of the dot-probe task. Trauma-related and anxiety symptoms were evaluated across samples by using structured psychiatric interviews and widely used self-report questionnaires, as specified for each sample. Analyses revealed consistent evidence of greater attention bias variability in patients with PTSD following various types of traumatic events than in healthy participants, participants with social anxiety disorder, and participants with acute stress disorder. Moreover, threat-related, and not positive, attention bias variability was correlated with PTSD severity. These findings carry possibilities for using attention bias variability as a specific cognitive marker of PTSD and for tailoring protocols for attention bias modification for this disorder.

  4. Individual reactions to stress predict performance during a critical aviation incident.

    PubMed

    Vine, Samuel J; Uiga, Liis; Lavric, Aureliu; Moore, Lee J; Tsaneva-Atanasova, Krasimira; Wilson, Mark R

    2015-01-01

    Understanding the influence of stress on human performance is of theoretical and practical importance. An individual's reaction to stress predicts their subsequent performance; with a "challenge" response to stress leading to better performance than a "threat" response. However, this contention has not been tested in truly stressful environments with highly skilled individuals. Furthermore, the effect of challenge and threat responses on attentional control during visuomotor tasks is poorly understood. Thus, this study aimed to examine individual reactions to stress and their influence on attentional control, among a cohort of commercial pilots performing a stressful flight assessment. Sixteen pilots performed an "engine failure on take-off" scenario, in a high-fidelity flight simulator. Reactions to stress were indexed via self-report; performance was assessed subjectively (flight instructor assessment) and objectively (simulator metrics); gaze behavior data were captured using a mobile eye tracker, and measures of attentional control were subsequently calculated (search rate, stimulus driven attention, and entropy). Hierarchical regression analyses revealed that a threat response was associated with poorer performance and disrupted attentional control. The findings add to previous research showing that individual reactions to stress influence performance and shed light on the processes through which stress influences performance.

  5. Photonic sensor opportunities for distributed and wireless systems in security applications

    NASA Astrophysics Data System (ADS)

    Krohn, David

    2006-10-01

    There are broad ranges of homeland security sensing applications that can be facilitated by distributed fiber optic sensors and photonics integrated wireless systems. These applications include [1]: Pipeline, (Monitoring, Security); Smart structures (Bridges, Tunnels, Dams, Public spaces); Power lines (Monitoring, Security); Transportation security; Chemical/biological detection; Wide area surveillance - perimeter; and Port Security (Underwater surveillance, Cargo container). Many vital assets which cover wide areas, such as pipeline and borders, are under constant threat of being attacked or breached. There is a rapidly emerging need to be able to provide identification of intrusion threats to such vital assets. Similar problems exit for monitoring the basic infrastructure such as water supply, power utilities, communications systems as well as transportation. There is a need to develop a coordinated and integrated solution for the detection of threats. From a sensor standpoint, consideration must not be limited to detection, but how does detection lead to intervention and deterrence. Fiber optic sensor technology must be compatible with other surveillance technologies such as wireless mote technology to facilitate integration. In addition, the multi-functionality of fiber optic sensors must be expanded to include bio-chemical detection. There have been a number of barriers for the acceptance and broad use of smart fiber optic sensors. Compared to telecommunications, the volume is low. This fact coupled with proprietary and custom specifications has kept the price of fiber optic sensors high. There is a general lack of a manufacturing infrastructure and lack of standards for packaging and reliability. Also, there are several competing technologies; some photonic based and other approaches based on conventional non-photonic technologies.

  6. Translational simulation: not 'where?' but 'why?' A functional view of in situ simulation.

    PubMed

    Brazil, Victoria

    2017-01-01

    Healthcare simulation has been widely adopted for health professional education at all stages of training and practice and across cognitive, procedural, communication and teamwork domains. Recent enthusiasm for in situ simulation-delivered in the real clinical environment-cites improved transfer of knowledge and skills into real-world practice, as well as opportunities to identify latent safety threats and other workplace-specific issues. However, describing simulation type according to place may not be helpful. Instead, I propose the term translational simulation as a functional term for how simulation may be connected directly with health service priorities and patient outcomes, through interventional and diagnostic functions, independent of the location of the simulation activity.

  7. System considerations for detection and tracking of small targets using passive sensors

    NASA Astrophysics Data System (ADS)

    DeBell, David A.

    1991-08-01

    Passive sensors provide only a few discriminants to assist in threat assessment of small targets. Tracking of the small targets provides additional discriminants. This paper discusses the system considerations for tracking small targets using passive sensors, in particular EO sensors. Tracking helps establish good versus bad detections. Discussed are the requirements to be placed on the sensor system's accuracy, with respect to knowledge of the sightline direction. The detection of weak targets sets a requirement for two levels of tracking in order to reduce processor throughput. A system characteristic is the need to track all detections. For low thresholds, this can mean a heavy track burden. Therefore, thresholds must be adaptive in order not to saturate the processors. Second-level tracks must develop a range estimate in order to assess threat. Sensor platform maneuvers are required if the targets are moving. The need for accurate pointing, good stability, and a good update rate will be shown quantitatively, relating to track accuracy and track association.

  8. Technical approaches to reducing the threat of nuclear terrorism

    NASA Astrophysics Data System (ADS)

    Priedhorsky, William C.

    2005-04-01

    The threat of a nuclear attack on the United States by terrorists using a smuggled weapon is now considered more likely than an attack by a nuclear-armed ballistic missle. Consequently it is important to understand what can be done to detect and intercept a nuclear weapon being smuggled into the United States. A significant quantity of smuggled nuclear material has been intercepted already, but science and technology have so far contributed little to its interception. The critical special nuclear materials, plutonium and highly enriched uranium, are only weakly radioactive and detection of their radioactivity is limited both by atmospheric attenuation and by competition with natural backgrounds. Although many schemes for long-range detection of radioactivity have been proposed, none so far appears feasible. Detection of nuclear radiation can be improved using new technologies and sensing systems, but it will still be possible only at relatively small distances. Consequently the best approach to containing dangerous nuclear materials is at their sources; containment within lengthy borders and large areas is extremely difficult.

  9. Early detection of testicular cancer: revisiting the role of self-efficacy in testicular self-examination among young asymptomatic males.

    PubMed

    Umeh, Kanayo; Chadwick, Rebecca

    2016-02-01

    Research suggests that self-efficacy is an important factor in behaviors that facilitate the early-detection of various cancers. In general people with high self-efficacy are more likely to attend cancer screening sessions or perform bodily self-exams. However, there is a paucity of research focusing on testicular cancer and testicular self-examination (TSE). The effect of self-efficacy on TSE remains unclear especially given the relative obscurity of the testicular cancer threat, and appropriate clinical- and self-detection procedures, in the young asymptomatic male population. Thus, the present study tested the interaction of self-efficacy with young men's appraisals of the threat of testicular cancer. The study was based on 2 × 2 × 2 mixed factorial experimental design. Over 100 young asymptomatic men were exposed to a health warning about testicular cancer and randomly assigned to high/low self-efficacy, vulnerability, and severity conditions. High self-efficacy increased motivation to perform TSE given high vulnerability, but damaged attitudes to self-exams given low vulnerability and severity estimates. High self-efficacy also facilitated subsequent TSE. Overall, these findings support preexisting notions of self-efficacy but raise new questions about the moderating effects of threat appraisals.

  10. Change of search time and non-search time in X-ray baggage screening due to training.

    PubMed

    Koller, Saskia M; Drury, Colin G; Schwaninger, Adrian

    2009-06-01

    As found in studies of aircraft structural inspection, the time used for judging if a part of an aircraft shows tiny cracks is composed of search time, used for actively scanning, and non-search time, used for matching and decision while fixating a region of interest (Drury et al. 1997). These findings can be applied to detection of threats by X-ray screening of passenger bags at airports. To investigate whether search time and non-search time change when an experienced screener is given additional training in recognising threat objects in passenger bags, data from a European airport were analysed. A comparison of detection performance and reaction time between two large groups of screeners, one trained for 6 months, shows a large impact of training on overall performance and on both search and non-search components of the task. There was also a small but consistent decline in performance measures with screener age. This study shows a way to localise the effect of training on threat detection performance for aviation security screening. Analysis of the time needed for screening each passenger bag showed that training had a significant effect, particularly on the non-search part of the searching process (i.e. identification, recognition, decision, response execution, etc.).

  11. Report to Congress on Sustainable Ranges, 2009

    DTIC Science & Technology

    2009-05-01

    and undersea spaces under the administration of other nations with their permission and international areas. In each case, DoD must deal with a... undersea presentations designed for live or simulated weapons engagement. 6. Threats—Various physical and simulated threat presentations such as...Statements (EIS) are complete. The remaining Tactical Training Theater Assessment and Planning (TAP) program including the East Coast Undersea Warfare

  12. Detection Methodologies for Pathogen and Toxins: A Review.

    PubMed

    Alahi, Md Eshrat E; Mukhopadhyay, Subhas Chandra

    2017-08-16

    Pathogen and toxin-contaminated foods and beverages are a major source of illnesses, even death, and have a significant economic impact worldwide. Human health is always under a potential threat, including from biological warfare, due to these dangerous pathogens. The agricultural and food production chain consists of many steps such as harvesting, handling, processing, packaging, storage, distribution, preparation, and consumption. Each step is susceptible to threats of environmental contamination or failure to safeguard the processes. The production process can be controlled in the food and agricultural sector, where smart sensors can play a major role, ensuring greater food quality and safety by low cost, fast, reliable, and profitable methods of detection. Techniques for the detection of pathogens and toxins may vary in cost, size, and specificity, speed of response, sensitivity, and precision. Smart sensors can detect, analyse and quantify at molecular levels contents of different biological origin and ensure quality of foods against spiking with pesticides, fertilizers, dioxin, modified organisms, anti-nutrients, allergens, drugs and so on. This paper reviews different methodologies to detect pathogens and toxins in foods and beverages.

  13. Explosives detection and identification using surface plasmon-coupled emission

    NASA Astrophysics Data System (ADS)

    Ja, Shiou-Jyh

    2012-06-01

    To fight against the explosives-related threats in defense and homeland security applications, a smarter sensing device that not only detects but differentiates multiple true threats from false positives caused by environmental interferents is essential. A new optical detection system is proposed to address these issues by using the temporal and spectroscopic information generated by the surface plasmon coupling emission (SPCE) effect. Innovative SPCE optics have been designed using Zemax software to project the fluorescence signal into clear "rainbow rings" on a CCD with subnanometer wavelength resolution. The spectroscopic change of the fluorescence signal and the time history of such changes due to the presence of a certain explosive analyte are unique and can be used to identify explosives. Thanks to high optical efficiency, reporter depositions as small as 160-μm in diameter can generate a sufficient signal, allowing a dense array of different reporters to be interrogated with wavelength multiplexing and detect a wide range of explosives. We have demonstrated detection and classification of explosives, such as TNT, NT, NM, RDX, PETN, and AN, with two sensing materials in a prototype.

  14. Spatially offset Raman spectroscopy for explosives detection through difficult (opaque) containers

    NASA Astrophysics Data System (ADS)

    Maskall, Guy T.; Bonthron, Stuart; Crawford, David

    2013-10-01

    With the continuing threat to aviation security from homemade explosive devices, the restrictions on taking a volume of liquid greater than 100 ml onto an aircraft remain in place. From January 2014, these restrictions will gradually be reduced via a phased implementation of technological screening of Liquids, Aerosols and Gels (LAGs). Raman spectroscopy offers a highly sensitive, and specific, technique for the detection and identification of chemicals. Spatially Offset Raman Spectroscopy (SORS), in particular, offers significant advantages over conventional Raman spectroscopy for detecting and recognizing contents within optically challenging (Raman active) containers. Containers vary enormously in their composition; glass type, plastic type, thickness, reflectance, and pigmentation are all variable and cause an infinite range of absorbances, fluorescence backgrounds, Rayleigh backscattered laser light, and container Raman bands. In this paper we show that the data processing chain for Cobalt Light Systems' INSIGHT100 bottlescanner is robust to such variability. We discuss issues of model selection for the detection stage and demonstrate an overall detection rate across a wide range of threats and containers of 97% with an associated false alarm rate of 0.1% or lower.

  15. External corrosion and leakage detection of oil and gas pipeline using FBG fiber optics and a trigger

    NASA Astrophysics Data System (ADS)

    Ge, Yaomou

    Oil and gas pipelines play a critical role in delivering the energy resources from producing fields to power communities around the world. However, there are many threats to pipeline integrity, which may lead to significant incidents, causing safety, environmental and economic problems. Corrosion has been a big threat to oil and gas pipelines for a long time, which has attributed to approximately 18% of the significant incidents in oil and gas pipelines. In addition, external corrosion of pipelines accounts for a significant portion (more than 25%) of pipeline failure. External corrosion detection is the research area of this thesis. In this thesis, a review of existing corrosion detection or monitoring methods is presented, and optical fiber sensors show a great promise in corrosion detection of oil and gas pipelines. Several scenarios of optical fiber corrosion sensors are discussed, and two of them are selected for future research. A new corrosion and leakage detection sensor, consisting of a custom designed trigger and a FBG optical fiber, will be presented. This new device has been experimentally tested and it shows great promise.

  16. Bullets versus burgers: is it threat or relevance that captures attention?

    PubMed

    de Oca, Beatrice M; Black, Alison A

    2013-01-01

    Previous studies have found that potentially dangerous stimuli are better at capturing attention than neutral stimuli, a finding sometimes called the threat superiority effect. However, non-threatening stimuli also capture attention in many studies of visual attention. In Experiment 1, the relevance superiority effect was tested with a visual search task comparing detection times for threatening stimuli (guns), pleasant but motivationally relevant stimuli (food), and neutral stimuli (flowers and chairs). Gun targets were detected more rapidly than both types of neutral targets, whereas food targets were detected more quickly than the neutral chair targets only. Guns were detected more rapidly than food. In Experiment 2, threatening targets (guns and snakes), pleasant but motivationally relevant targets (money and food), and neutral targets (trees and couches) were all presented with the same neutral distractors (cactus and pots) in order to control for the valence of the distractor stimulus across the three categories of target stimuli. Threatening and pleasant target categories facilitated attention relative to neutral targets. The results support the view that both threatening and pleasant pictures can be detected more rapidly than neutral targets.

  17. Synthesized speech rate and pitch effects on intelligibility of warning messages for pilots

    NASA Technical Reports Server (NTRS)

    Simpson, C. A.; Marchionda-Frost, K.

    1984-01-01

    In civilian and military operations, a future threat-warning system with a voice display could warn pilots of other traffic, obstacles in the flight path, and/or terrain during low-altitude helicopter flights. The present study was conducted to learn whether speech rate and voice pitch of phoneme-synthesized speech affects pilot accuracy and response time to typical threat-warning messages. Helicopter pilots engaged in an attention-demanding flying task and listened for voice threat warnings presented in a background of simulated helicopter cockpit noise. Performance was measured by flying-task performance, threat-warning intelligibility, and response time. Pilot ratings were elicited for the different voice pitches and speech rates. Significant effects were obtained only for response time and for pilot ratings, both as a function of speech rate. For the few cases when pilots forgot to respond to a voice message, they remembered 90 percent of the messages accurately when queried for their response 8 to 10 sec later.

  18. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  19. Observations on military exploitation of explosives detection technologies

    NASA Astrophysics Data System (ADS)

    Faust, Anthony A.; de Ruiter, C. J.; Ehlerding, Anneli; McFee, John E.; Svinsås, Eirik; van Rheenen, Arthur D.

    2011-06-01

    Accurate and timely detection of explosives, energetic materials, and their associated compounds would provide valuable information to military commanders in a wide range of military operations: protection of fast moving convoys from mobile or static IED threats; more deliberate countermine and counter-IED operations during route or area clearance; and static roles such as hasty or deliberate checkpoints, critical infrastructure protection and support to public security. The detection of hidden explosive hazards is an extremely challenging problem, as evidenced by the fact that related research has been ongoing in many countries for at least seven decades and no general purpose solution has yet been found. Technologies investigated have spanned all major scientific fields, with emphasis on the physical sciences, life sciences, engineering, robotics, computer technology and mathematics. This paper will present a limited, operationally-focused overview of the current status of detection technologies. Emphasis will be on those technologies that directly detect the explosive hazard, as opposed to those that detect secondary properties of the threat, such as the casing, associated wires or electronics. Technologies that detect explosives include those based on nuclear radiation and terahertz radiation, as well as trace and biological detection techniques. Current research areas of the authors will be used to illustrate the practical applications.

  20. New technology for early detection of health threats

    NASA Astrophysics Data System (ADS)

    Southern, Šárka O.; Lilienthal, Gerald W.

    2008-04-01

    Governmental agencies charged with protecting the health of the population and agriculture have several main strategic objectives including the detection of harmful agents, the identification of vulnerable biological targets, the prediction of health outcomes and the development of countermeasures. New technologies are urgently needed in several critical areas of bio-chemical defense: economical and minimally invasive biosensors for field use in humans and other species important for agriculture and infrastructure, universal analytical platforms for broad-based, early warnings of threats and technologies guiding the development of countermeasures. A new technology called Stress Response Profiling (SRP) was recently developed by the Gaia Medical Institute. SRP provides a universal analytical platform for monitoring health status based on measurements of physiological stress. The platform is implemented through handheld devices that can be used for noninvasive detection of early-stage health problems. This paper summarizes SRP features, advantages and potential benefits for critical areas of homeland defense.

  1. Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.

    PubMed

    Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa

    2012-05-30

    Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Policing of reproduction by hidden threats in a cooperative mammal.

    PubMed

    Cant, Michael A; Nichols, Hazel J; Johnstone, Rufus A; Hodge, Sarah J

    2014-01-07

    The evolution of cooperation in animal and human societies is associated with mechanisms to suppress individual selfishness. In insect societies, queens and workers enforce cooperation by "policing" selfish reproduction by workers. Insect policing typically takes the form of damage limitation after individuals have carried out selfish acts (such as laying eggs). In contrast, human policing is based on the use of threats that deter individuals from acting selfishly in the first place, minimizing the need for damage limitation. Policing by threat could in principle be used to enforce reproductive suppression in animal societies, but testing this idea requires an experimental approach to simulate reproductive transgression and provoke out-of-equilibrium behavior. We carried out an experiment of this kind on a wild population of cooperatively breeding banded mongooses (Mungos mungo) in Uganda. In this species, each group contains multiple female breeders that give birth to a communal litter, usually on the same day. In a 7-y experiment we used contraceptive injections to manipulate the distribution of maternity within groups, triggering hidden threats of infanticide. Our data suggest that older, socially dominant females use the threat of infanticide to deter selfish reproduction by younger females, but that females can escape the threat of infanticide by synchronizing birth to the same day as older females. Our study shows that reproduction in animal societies can be profoundly influenced by threats that remain hidden until they are triggered experimentally. Coercion may thus extend well beyond the systems in which acts of infanticide are common.

  3. [SWOT analysis of laboratory certification and accreditation on detection of parasitic diseases].

    PubMed

    Xiong, Yan-hong; Zheng, Bin

    2014-04-01

    This study analyzes the strength, weakness, opportunity and threat (SWOT) of laboratory certification and accreditation on detection of parasitic diseases by SWOT analysis comprehensively, and it puts forward some development strategies specifically, in order to provide some indicative references for the further development.

  4. Label-free virus detection using silicon photonic microring resonators

    USDA-ARS?s Scientific Manuscript database

    Viruses represent a continual threat to humans through a number of mechanisms, which include disease, bioterrorism, and destruction of both plant and animal food resources. Many contemporary techniques used for the detection of viruses and viral infections suffer from limitations such as the need fo...

  5. An Adaptive Database Intrusion Detection System

    ERIC Educational Resources Information Center

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  6. Threat in opportunity and opportunity in threat: energy prospects for Australia and New Zealand

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nemetz, P.N.; Vertinsky, I.B.; Vertinsky, P.

    A review of the determinants of energy policy options available to Australia and New Zealand compares their choices and assesses their long-term vulnerability to changes in the global energy situation. The authors use a cross-impact simulation model using six alternative scenarios of petroleum prices and world economic conditions. The results indicate that Australia is susceptible to short-run fluctuations, but its resource endowment is a stabilizing factor. New Zealand, however, is gambling its economic development on the increasing value of its resources.

  7. Expectancy influences on attention to threat are only weak and transient: Behavioral and physiological evidence.

    PubMed

    Aue, Tatjana; Chauvigné, Léa A S; Bristle, Mirko; Okon-Singer, Hadas; Guex, Raphaël

    2016-12-01

    Can prior expectancies shape attention to threat? To answer this question, we manipulated the expectancies of spider phobics and nonfearful controls regarding the appearance of spider and bird targets in a visual search task. We observed robust evidence for expectancy influences on attention to birds, reflected in error rates, reaction times, pupil diameter, and heart rate (HR). We found no solid effect, however, of the same expectancies on attention to spiders; only HR revealed a weak and transient impact of prior expectancies on the orientation of attention to threat. Moreover, these asymmetric effects for spiders versus birds were observed in both phobics and controls. Our results are thus consistent with the notion of a threat detection mechanism that is only partially permeable to current expectancies, thereby increasing chances of survival in situations that are mistakenly perceived as safe. Copyright © 2016 Elsevier B.V. All rights reserved.

  8. Proactive malware detection

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan; Diep, Michael; Dredden, David; Mix, Matthew; Olsen, Mark; Price, Brian; Steil, Betty

    2014-06-01

    Small-to-medium sized businesses lack resources to deploy and manage high-end advanced solutions to deter sophisticated threats from well-funded adversaries, but evidence shows that these types of businesses are becoming key targets. As malicious code and network attacks become more sophisticated, classic signature-based virus and malware detection methods are less effective. To augment the current malware methods of detection, we developed a proactive approach to detect emerging malware threats using open source tools and intelligence to discover patterns and behaviors of malicious attacks and adversaries. Technical and analytical skills are combined to track adversarial behavior, methods and techniques. We established a controlled (separated domain) network to identify, monitor, and track malware behavior to increase understanding of the methods and techniques used by cyber adversaries. We created a suite of tools that observe the network and system performance looking for anomalies that may be caused by malware. The toolset collects information from open-source tools and provides meaningful indicators that the system was under or has been attacked. When malware is discovered, we analyzed and reverse engineered it to determine how it could be detected and prevented. Results have shown that with minimum resources, cost effective capabilities can be developed to detect abnormal behavior that may indicate malicious software.

  9. Biological warfare agents

    PubMed Central

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  10. Particle Filtering for Obstacle Tracking in UAS Sense and Avoid Applications

    PubMed Central

    Moccia, Antonio

    2014-01-01

    Obstacle detection and tracking is a key function for UAS sense and avoid applications. In fact, obstacles in the flight path must be detected and tracked in an accurate and timely manner in order to execute a collision avoidance maneuver in case of collision threat. The most important parameter for the assessment of a collision risk is the Distance at Closest Point of Approach, that is, the predicted minimum distance between own aircraft and intruder for assigned current position and speed. Since assessed methodologies can cause some loss of accuracy due to nonlinearities, advanced filtering methodologies, such as particle filters, can provide more accurate estimates of the target state in case of nonlinear problems, thus improving system performance in terms of collision risk estimation. The paper focuses on algorithm development and performance evaluation for an obstacle tracking system based on a particle filter. The particle filter algorithm was tested in off-line simulations based on data gathered during flight tests. In particular, radar-based tracking was considered in order to evaluate the impact of particle filtering in a single sensor framework. The analysis shows some accuracy improvements in the estimation of Distance at Closest Point of Approach, thus reducing the delay in collision detection. PMID:25105154

  11. Internalizing the threat of risk--a qualitative study about adolescents' experience living with screening-detected celiac disease 5 years after diagnosis.

    PubMed

    Nordyke, Katrina; Rosén, Anna; Emmelin, Maria; Ivarsson, Anneli

    2014-06-11

    Mass screening could identify those with unrecognized celiac disease (CD), but the experience of being detected through screening and living with screening-detected CD should be explored before considering this as acceptable intervention. For this study we invited screening-detected adolescents to describe their experience living with screening-detected CD five years after diagnosis with the aim to explore how their perceptions, practices, and beliefs evolved. Adolescents who were diagnosed through a population-based CD screening were invited to write narratives after being diagnosed. Of 153 adolescents who were eventually diagnosed through the screening, 91 wrote narratives one year after diagnosis and 72 five years after diagnosis. A qualitative content analysis resulted in a theme and categories that describe the experience living with screening-detected CD five years after diagnosis. The overall theme--Internalizing the threat of risk--illustrates that being detected through screening and the internalized threat of future health complications have impacted how these adolescents felt about the diagnosis, coped with the gluten-free diet (GFD), and thought about CD screening. This theme is supported by four categories: maintaining an imposed disease identity describes how they continued to define their diagnosis in relation to the screening. They also expressed moving from forced food changes to adapted diet routines by describing habits, routines, coping strategies, and the financial burden of the GFD. They had enduring beliefs of being spared negative consequences, however, even after five years, some doubted they had CD and worried that being detected and eating a GFD might not be beneficial, i.e. continuing to fear it is "all in vain". There was maintenance and evolution in the perceptions, practices, and beliefs of the adolescents after five years. Some have adjusted to the disease and adapted new habits and coping strategies to deal with the GFD, while others still doubt they have CD or that being detected was beneficial. The transition to adapting to the disease and GFD is ongoing, illustrating the importance of providing ongoing support for those with screening-detected CD as they adjust to this chronic disease and the GFD.

  12. Planetary Defense: Are we currently looking for our keys under the lamp post?

    NASA Astrophysics Data System (ADS)

    Nuth, J. A., III; Barbee, B.; Leung, R. Y.

    2016-12-01

    Planetary Defense is a serious and important endeavor and the approach taken to date is a sensible beginning. Finding and cataloging all potentially hazardous asteroids and supporting research into relevant topics required to divert such a threat to our home planet is a necessary, but far from sufficient set of activities required to ensure the survival of our species. Concentrating our efforts on the asteroid threat is relatively easy. Most asteroids move in near-circular orbits, are relatively close to the ecliptic plane and are likely to be detected as hazards many decades in advance of a potential impact. The single most likely problem that will be encountered in deflecting such a threat will be developing the political will to fund the project while there is still ample time for multiple deflection techniques to be applied successfully. While asteroid threats can be mitigated, comets are the invisible danger lurking in the vast, dark parking lot that is the outer solar system. Very few comets falling into the inner solar system will be detected more than two years before their arrival: refinement of a new comet's trajectory requires months of observation before its hazard potential can be realistically assessed and knowledge of the composition, mass and shape of the body cannot be refined sufficiently to design a deflection campaign without much more observational effort. To make matters worse, because of the highly elliptical orbits of most new comets, some of which can be far out of the ecliptic plane while a few can even be in retrograde orbits, the impact velocity of a typical comet will be significantly higher than that of an asteroid. If this increase is only a factor of two, then a typical comet carries four times the impact energy of an asteroid of similar size, though much higher multipliers are possible. The distribution of meteor stream velocities can be examined to place bounds on this threat. Finally, the time required to assemble and launch an asteroid deflection mission starting from scratch and with a high probability of success could exceed three years from mission approval. Based on the recent passage of Comet Siding Spring one must therefore conclude that a successful comet deflection mission must begin well before a hazardous comet is even detected, much less characterized as a significant threat.

  13. Numerical Simulation of HIWC Conditions with the Terminal Area Simulation System

    NASA Technical Reports Server (NTRS)

    Proctor, Fred H.; Switzer, George F.

    2016-01-01

    Three-dimensional, numerical simulation of a mesoconvective system is conducted in order to better understand conditions associated with High Ice Water Content (HIWC) and its threat to aviation safety. Although peak local values of ice water content may occur early in the storm lifetime, large areas of high concentrations expand with time and persist even when the storm tops begin to warm. The storm canopy which contains HIWC, has low radar reflectivity factor and is fed by an ensemble of regenerating thermal pulses.

  14. Validation of a Simulation Process for Assessing the Response of a Vehicle and Its Occupants to an Explosive Threat

    DTIC Science & Technology

    2010-01-01

    gross vehicle response; and the effects of blast mitigation material, restraint system, and seat design to the loads developed on the members of an...occupant. A Blast Event Simulation sysTem (BEST) has been developed for facilitating the easy use of the LS- DYNA solvers for conducting a...et al, 1999] for modeling blast events. In this paper the Eulerian solver of LS- DYNA is employed for simulating the soil – explosive – air

  15. Method for Determining the Sensitivity of a Physical Security System.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Speed, Ann; Gauthier, John H.; Hoffman, Matthew John

    Modern systems, such as physical security systems, are often designed to involve complex interactions of technological and human elements. Evaluation of the performance of these systems often overlooks the human element. A method is proposed here to expand the concept of sensitivity—as denoted by d’—from signal detection theory (Green & Swets 1966; Macmillan & Creelman 2005), which came out of the field of psychophysics, to cover not only human threat detection but also other human functions plus the performance of technical systems in a physical security system, thereby including humans in the overall evaluation of system performance. New in thismore » method is the idea that probabilities of hits (accurate identification of threats) and false alarms (saying “threat” when there is not one), which are used to calculate d’ of the system, can be applied to technologies and, furthermore, to different functions in the system beyond simple yes-no threat detection. At the most succinct level, the method returns a single number that represents the effectiveness of a physical security system; specifically, the balance between the handling of actual threats and the distraction of false alarms. The method can be automated, and the constituent parts revealed, such that given an interaction graph that indicates the functional associations of system elements and the individual probabilities of hits and false alarms for those elements, it will return the d’ of the entire system as well as d’ values for individual parts. The method can also return a measure of the response bias* of the system. One finding of this work is that the d’ for a physical security system can be relatively poor in spite of having excellent d’s for each of its individual functional elements.« less

  16. TC4 Observing Campaign: An Operational Test of NASA Planetary Defense Network

    NASA Astrophysics Data System (ADS)

    Reddy, V.; Kelley, M. S.; Landis, R. R.

    Impacts due to near-Earth objects ( 90% near-Earth asteroids, or NEAs, and 10% comets) are one of the natural hazards that can pose a great risk to life on Earth, but one that can potentially be mitigated, if the threat is detected with sufficient lead-time. While the probability of such an event is low, the outcome is so catastrophic that we are well justified in investing a modest effort to minimize this threat. Historically, asteroid impacts have altered the course of evolution on the Earth. In 2013 the Chelyabinsk meteor over Russia, which injured over 1600 people and caused $30M in damages, reinforced the importance of detecting and characterizing small NEAs that pose a greater threat than most large NEAs discovered so far. The NASA Planetary Defense Coordination Office (PDCO) was established to ensure the early detection, tracking and characterization of potentially hazardous objects (PHOs) and is the lead office for providing timely and accurate communications and coordination of U.S. Government planning for response to an actual impact threat. In an effort to test the operational readiness of all entities critical to planetary defense, the NASA PDCO is supporting a community-led exercise. The target of this exercise is 2012 TC4, a 20- meter diameter asteroid that is currently expected to pass by the Earth over Antarctica on Oct. 12, 2017 at a distance of only 2.3 Earth radii. The goal of the TC4 Observing Campaign is to recover, track, and characterize 2012 TC4 as a potential impactor in order to exercise the entire Planetary Defense system from observations, modeling, prediction, and communication. The paper will present an overview of the campaign and summarize early results from the exercise.

  17. Activity Learning as a Foundation for Security Monitoring in Smart Homes.

    PubMed

    Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo

    2017-03-31

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.

  18. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    NASA Astrophysics Data System (ADS)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  19. Use of media and public-domain Internet sources for detection and assessment of plant health threats

    PubMed Central

    Thomas, Carla S.; Nelson, Noele P.; Jahn, Gary C.; Niu, Tianchan; Hartley, David M.

    2011-01-01

    Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance. PMID:24149031

  20. Leveraging the laboratory response network model for the global health security agenda.

    PubMed

    Mangal, Chris N; Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.

  1. Leveraging the Laboratory Response Network Model for the Global Health Security Agenda

    PubMed Central

    Maryogo-Robinson, Lucy

    2014-01-01

    Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916

  2. Commercial-Aircraft Protection System

    NASA Astrophysics Data System (ADS)

    Case, Russell L., Jr.; Wolff, Peter H.

    2004-09-01

    Recent world events have identified needs for a commercial aircraft defense system against Man-Portable Air Defense Systems (MANPADS), such as SA-7 and Stinger shoulder launched surface-to-air missiles. Technical challenges include target detection, identification and countermeasures. Political and societal challenges include cost, time to deployment, ground and air safety, and reliability. These challenges, as well as many others, have been met and overcome with the development of Thor Systems' Commercial-Aircraft Protection System (C-APS). C-APS makes use of commercial technology such as radar and infrared sensors with a laser-based countermeasure. Unlike adapted military systems, C-APS detects the threat long before the military versions by employing a 360 degree hemispherical scan, identifying the threat with an infrared sensor and employing a directed laser to not only deflect the target but to permanently disable its seeker. Enhanced capabilities include multiple threat elimination and closed-loop technology for kill verification. All of this is accomplished with development costs less than half that required to convert military technology, manufacturing costs significantly less than competitive products, and a maintenance cycle coincident with standard FAA requirements, which are significantly longer than current systems.

  3. Use of media and public-domain Internet sources for detection and assessment of plant health threats.

    PubMed

    Thomas, Carla S; Nelson, Noele P; Jahn, Gary C; Niu, Tianchan; Hartley, David M

    2011-09-05

    Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance.

  4. Bio-Inspired Distributed Decision Algorithms for Anomaly Detection

    DTIC Science & Technology

    2017-03-01

    TERMS DIAMoND, Local Anomaly Detector, Total Impact Estimation, Threat Level Estimator 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU...21 4.2 Performance of the DIAMoND Algorithm as a DNS-Server Level Attack Detection and Mitigation...with 6 Nodes ........................................................................................ 13 8 Hierarchical 2- Level Topology

  5. Applying spectral unmixing and support vector machine to airborne hyperspectral imagery for detecting giant reed

    USDA-ARS?s Scientific Manuscript database

    This study evaluated linear spectral unmixing (LSU), mixture tuned matched filtering (MTMF) and support vector machine (SVM) techniques for detecting and mapping giant reed (Arundo donax L.), an invasive weed that presents a severe threat to agroecosystems and riparian areas throughout the southern ...

  6. Centrifugal microfluidic platform for ultrasensitive detection of Botulinum Toxin

    USDA-ARS?s Scientific Manuscript database

    Botulinum neurotoxin – a global public health threat and category A bioterrorism agent - is the most toxic substance known and one of the most challenging toxins to detect due to its lethality at extremely low concentrations. Hence the live-mouse bioassay because of its superior sensitivity, remains...

  7. Deep convolutional neural networks for classifying GPR B-scans

    NASA Astrophysics Data System (ADS)

    Besaw, Lance E.; Stimac, Philip J.

    2015-05-01

    Symmetric and asymmetric buried explosive hazards (BEHs) present real, persistent, deadly threats on the modern battlefield. Current approaches to mitigate these threats rely on highly trained operatives to reliably detect BEHs with reasonable false alarm rates using handheld Ground Penetrating Radar (GPR) and metal detectors. As computers become smaller, faster and more efficient, there exists greater potential for automated threat detection based on state-of-the-art machine learning approaches, reducing the burden on the field operatives. Recent advancements in machine learning, specifically deep learning artificial neural networks, have led to significantly improved performance in pattern recognition tasks, such as object classification in digital images. Deep convolutional neural networks (CNNs) are used in this work to extract meaningful signatures from 2-dimensional (2-D) GPR B-scans and classify threats. The CNNs skip the traditional "feature engineering" step often associated with machine learning, and instead learn the feature representations directly from the 2-D data. A multi-antennae, handheld GPR with centimeter-accurate positioning data was used to collect shallow subsurface data over prepared lanes containing a wide range of BEHs. Several heuristics were used to prevent over-training, including cross validation, network weight regularization, and "dropout." Our results show that CNNs can extract meaningful features and accurately classify complex signatures contained in GPR B-scans, complementing existing GPR feature extraction and classification techniques.

  8. Aircraft Survivability: Aircraft Battle Damage and Repair, Summer 2007

    DTIC Science & Technology

    2007-01-01

    Modeling and Analysis Program ( TMAP ) Missile Modeling System for Advanced Investigation of Countermeasures (MOSAIC) & Joint Surface-to-Air Missle... TMAP Threat System Models (TSM) into engagement simulations (MOSAIC [IR] and JSAMS [RF]). This 3-year project will integrate and fully test six...three per engagement simulation) JASC priority TMAP TSMs in official releases of MOSAIC and JSAMS. Project Engineers— Luke Borntrager (USAF, AFRL) and

  9. Report to Congress on Sustainable Ranges, 2008

    DTIC Science & Technology

    2008-01-01

    undersea areas located throughout the U.S. and abroad, to include the frequency spectrum and associated infrastructure needed to satisfy DoD’s...subject to formal use agreements between the Department and land owners. The DoD also utilizes various air, sea, and undersea space in the US, foreign...air, sea, and undersea presentations designed for live or simulated weapons engagement. [6] Threats—Various physical and simulated threat

  10. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  11. Science and Technology Review May 2004

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Henson, V E

    2004-04-02

    This month's issue has the following articles: (1) ''A Multidisciplinary Attack on Bioterrorism''--Commentary by Tomas Diaz de la Rubia. (2) ''Life at the Nanoscale''--Livermore researchers are exploring the molecules of life at the nanoscale to fight bioterrorism, improve human health, and understand how proteins function. (3) ''Screening Cargo Containers to Remove a Terrorist Threat''--A detection system for cargo containers will search for hidden nuclear materials that terrorists might try to ship to U.S. seaports. (4) ''Improved Algorithms Speed It Up for Codes''--Recent changes to the algorithms used in Monte Carlo calculations are reducing the time needed to run the high-fidelitymore » simulations being developed for the nation's supercomputers. (5) ''The Siren Call of the Seas: Sequestering Carbon Dioxide''--Scientists at Livermore evaluate possible methods for removing carbon dioxide from Earth's atmosphere and storing it in the planet's waters.« less

  12. Neuronal correlates of personal space intrusion in violent offenders.

    PubMed

    Schienle, Anne; Wabnegger, Albert; Leitner, Mario; Leutgeb, Verena

    2017-04-01

    Personal space (PS) is defined as the imagery region immediately surrounding our body, which acts as safety zone. It has been suggested that PS is enlarged in violent offenders and that this group shows an enhanced sensitivity to the reduction of interpersonal distance. In the present fMRI study high-risk violent offenders and noncriminal controls were presented with photos of neutral facial expressions by men and women. All images were shown twice, as static photos, and animated (i.e., appearing to approach the subject) in order to simulate PS intrusion. Approaching faces generally provoked activation of a fronto-parietal network and the insula. Offenders responded with greater insula activation to approaching faces, especially when the person was male. Insular activation has been recognized before as a neuronal correlate of potential threat and harm detection in PS. The increased reactivity of violent offenders is possibly a result of their hostile attribution bias.

  13. Gamma signatures of the C-BORD Tagged Neutron Inspection System

    NASA Astrophysics Data System (ADS)

    Sardet, A.; Pérot, B.; Carasco, C.; Sannié, G.; Moretto, S.; Nebbia, G.; Fontana, C.; Pino, F.; Iovene, A.; Tintori, C.

    2018-01-01

    In the frame of C-BORD project (H2020 program of the EU), a Rapidly relocatable Tagged Neutron Inspection System (RRTNIS) is being developed to non-intrusively detect explosives, chemical threats, and other illicit goods in cargo containers. Material identification is performed through gamma spectroscopy, using twenty NaI detectors and four LaBr3 detectors, to determine the different elements composing the inspected item from their specific gamma signatures induced by fast neutrons. This is performed using an unfolding algorithm to decompose the energy spectrum of a suspect item, selected by X-ray radiography and on which the RRTNIS inspection is focused, on a database of pure element gamma signatures. This paper reports on simulated signatures for the NaI and LaBr3 detectors, constructed using the MCNP6 code. First experimental spectra of a few elements of interest are also presented.

  14. Modeling Tool for Decision Support during Early Days of an Anthrax Event.

    PubMed

    Rainisch, Gabriel; Meltzer, Martin I; Shadomy, Sean; Bower, William A; Hupert, Nathaniel

    2017-01-01

    Health officials lack field-implementable tools for forecasting the effects that a large-scale release of Bacillus anthracis spores would have on public health and hospitals. We created a modeling tool (combining inhalational anthrax caseload projections based on initial case reports, effects of variable postexposure prophylaxis campaigns, and healthcare facility surge capacity requirements) to project hospitalizations and casualties from a newly detected inhalation anthrax event, and we examined the consequences of intervention choices. With only 3 days of case counts, the model can predict final attack sizes for simulated Sverdlovsk-like events (1979 USSR) with sufficient accuracy for decision making and confirms the value of early postexposure prophylaxis initiation. According to a baseline scenario, hospital treatment volume peaks 15 days after exposure, deaths peak earlier (day 5), and recovery peaks later (day 23). This tool gives public health, hospital, and emergency planners scenario-specific information for developing quantitative response plans for this threat.

  15. An epidemic model for biological data fusion in ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Chang, K. C.; Kotari, Vikas

    2009-05-01

    Bio terrorism can be a very refined and a catastrophic approach of attacking a nation. This requires the development of a complete architecture dedicatedly designed for this purpose which includes but is not limited to Sensing/Detection, Tracking and Fusion, Communication, and others. In this paper we focus on one such architecture and evaluate its performance. Various sensors for this specific purpose have been studied. The accent has been on use of Distributed systems such as ad-hoc networks and on application of epidemic data fusion algorithms to better manage the bio threat data. The emphasis has been on understanding the performance characteristics of these algorithms under diversified real time scenarios which are implemented through extensive JAVA based simulations. Through comparative studies on communication and fusion the performance of channel filter algorithm for the purpose of biological sensor data fusion are validated.

  16. Radiological Health Protection Issues Associated with Use of Active Detection Technology Systems for Detection of Radioactive Threat Materials

    DTIC Science & Technology

    2013-07-01

    detection system available will simply register events resulting from natural background radiation if a suitable source emission is not employed. The...random fluctuations in the natural background radiation level. Noise within the detection system can result from any of the various components that...Uritani et al., 1994). Nothing can generally be done to reduce or stabilize the amount of natural background radiation present for nonstationary

  17. UAS Detection Classification and Neutralization: Market Survey 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Birch, Gabriel Carisle; Griffin, John Clark; Erdman, Matthew Kelly

    The purpose of this document is to briefly frame the challenges of detecting low, slow, and small (LSS) unmanned aerial systems (UAS). The conclusion drawn from internal discussions and external reports is the following; detection of LSS UAS is a challenging problem that can- not be achieved with a single detection modality for all potential targets. Classification of LSS UAS, especially classification in the presence of background clutter (e.g., urban environment) or other non-threating targets (e.g., birds), is under-explored. Though information of avail- able technologies is sparse, many of the existing options for UAS detection appear to be in theirmore » infancy (when compared to more established ground-based air defense systems for larger and/or faster threats). Companies currently providing or developing technologies to combat the UAS safety and security problem are certainly worth investigating, however, no company has provided the statistical evidence necessary to support robust detection, identification, and/or neutralization of LSS UAS targets. The results of a market survey are included that highlights potential commercial entities that could contribute some technology that assists in the detection, classification, and neutral- ization of a LSS UAS. This survey found no clear and obvious commercial solution, though recommendations are given for further investigation of several potential systems.« less

  18. Joint chemical agent detector (JCAD): the future of chemical agent detection

    NASA Astrophysics Data System (ADS)

    Laljer, Charles E.

    2003-08-01

    The Joint Chemical Agent Detector (JCAD) has continued development through 2002. The JCAD has completed Contractor Validation Testing (CVT) that included chemical warfare agent testing, environmental testing, electromagnetic interferent testing, and platform integration validation. The JCAD provides state of the art chemical warfare agent detection capability to military and homeland security operators. Intelligence sources estimate that over twenty countries have active chemical weapons programs. The spread of weapons of mass destruction (and the industrial capability for manufacture of these weapons) to third world nations and terrorist organizations has greatly increased the chemical agent threat to U.S. interests. Coupled with the potential for U.S. involvement in localized conflicts in an operational or support capacity, increases the probability that the military Joint Services may encounter chemical agents anywhere in the world. The JCAD is a small (45 in3), lightweight (2 lb.) chemical agent detector for vehicle interiors, aircraft, individual personnel, shipboard, and fixed site locations. The system provides a common detection component across multi-service platforms. This common detector system will allow the Joint Services to use the same operational and support concept for more efficient utilization of resources. The JCAD detects, identifies, quantifies, and warns of the presence of chemical agents prior to onset of miosis. Upon detection of chemical agents, the detector provides local and remote audible and visual alarms to the operators. Advance warning will provide the vehicle crew and other personnel in the local area with the time necessary to protect themselves from the lethal effects of chemical agents. The JCAD is capable of being upgraded to protect against future chemical agent threats. The JCAD provides the operator with the warning necessary to survive and fight in a chemical warfare agent threat environment.

  19. Multi-Action Planning for Threat Management: A Novel Approach for the Spatial Prioritization of Conservation Actions

    PubMed Central

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J.; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms. PMID:26020794

  20. Multi-action planning for threat management: a novel approach for the spatial prioritization of conservation actions.

    PubMed

    Cattarino, Lorenzo; Hermoso, Virgilio; Carwardine, Josie; Kennard, Mark J; Linke, Simon

    2015-01-01

    Planning for the remediation of multiple threats is crucial to ensure the long term persistence of biodiversity. Limited conservation budgets require prioritizing which management actions to implement and where. Systematic conservation planning traditionally assumes that all the threats in priority sites are abated (fixed prioritization approach). However, abating only the threats affecting the species of conservation concerns may be more cost-effective. This requires prioritizing individual actions independently within the same site (independent prioritization approach), which has received limited attention so far. We developed an action prioritization algorithm that prioritizes multiple alternative actions within the same site. We used simulated annealing to find the combination of actions that remediate threats to species at the minimum cost. Our algorithm also accounts for the importance of selecting actions in sites connected through the river network (i.e., connectivity). We applied our algorithm to prioritize actions to address threats to freshwater fish species in the Mitchell River catchment, northern Australia. We compared how the efficiency of the independent and fixed prioritization approach varied as the importance of connectivity increased. Our independent prioritization approach delivered more efficient solutions than the fixed prioritization approach, particularly when the importance of achieving connectivity was high. By spatially prioritizing the specific actions necessary to remediate the threats affecting the target species, our approach can aid cost-effective habitat restoration and land-use planning. It is also particularly suited to solving resource allocation problems, where consideration of spatial design is important, such as prioritizing conservation efforts for highly mobile species, species facing climate change-driven range shifts, or minimizing the risk of threats spreading across different realms.

Top