Powered by Deep Web Technologies
Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

KIDS: keyed intrusion detection system  

Science Conference Proceedings (OSTI)

Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to mimic normal payload, and so avoid detection if the anomaly detection method ... Keywords: Kerckhoffs' principle, anomaly detection, keyed IDS, network intrusion detection, word model

Sasa Mrdovic; Branislava Drazenovic

2010-07-01T23:59:59.000Z

2

An Intrusion Detection System Using Quantum-Mechanical Systems  

ORNL 2012-G00220/tcc UT-B ID 200701995 10.2012 An Intrusion Detection System Using Quantum-Mechanical Systems Technology Summary Securing property and ...

3

Network-wide deployment of intrusion detection and prevention systems  

Science Conference Proceedings (OSTI)

Traditional efforts for scaling network intrusion detection (NIDS) and intrusion prevention systems (NIPS) have largely focused on a single-vantage-point view. In this paper, we explore an alternative design that exploits spatial, network-wide opportunities ... Keywords: intrusion detection, network management

Vyas Sekar; Ravishankar Krishnaswamy; Anupam Gupta; Michael K. Reiter

2010-11-01T23:59:59.000Z

4

Intrusion detection in sensor networks using clustering and immune systems  

Science Conference Proceedings (OSTI)

Security of sensor networks is a complicated task, mostly due to the limited resources of sensor units. Encryption and authentication are useless if an attacker has entered the system. Thus, a second line of defense known as Intrusion Detection must ... Keywords: genetic algorithms, immune systems, intrusion detection, self-organizing maps, wireless sensor networks

Zorana Bankovi?; José M. Moya; Álvaro Araujo; Juan-Mariano De Goyeneche

2009-09-01T23:59:59.000Z

5

An Intrusion Detection System Using Quantum- mechanical Systems  

Technology Description A quantum mechanical-based device that detects an intrusion across a physical boundary or communication link. Because common

6

Intrusion Detection System for Advanced Metering Infrastructure  

Science Conference Proceedings (OSTI)

The deployment of Advanced Metering Infrastructure (AMI) technology significantly increases the attack surface that utilities have to protect. As a result, there is a critical need for efficient monitoring solutions to supplement protective measures and keep the infrastructure secure. This document investigates current industrial and academic efforts to address the challenge of detecting security events across the range of AMI networks and devices. The goal of this study is to help utilities and ...

2012-12-31T23:59:59.000Z

7

Alert correlation in collaborative intelligent intrusion detection systems-A survey  

Science Conference Proceedings (OSTI)

As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuse- and anomaly-based. ... Keywords: Alert correlation, Collaborative intrusion detection, Computational intelligence approaches, False positive analysis

Huwaida Tagelsir Elshoush; Izzeldin Mohamed Osman

2011-10-01T23:59:59.000Z

8

Distributed Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids.  

E-Print Network (OSTI)

??This thesis proposes a Distributed Intrusion Detection System for Smart Grids by developing and deploying intelligent modules in multiple layers of the smart grid in… (more)

Zhang, Yichi

2011-01-01T23:59:59.000Z

9

An Intrusion-Detection Model  

Science Conference Proceedings (OSTI)

A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's ... Keywords: statistical measures, Abnormal behavior, auditing, intrusions, monitoring, profiles, security

Dorothy E. Denning

1987-02-01T23:59:59.000Z

10

Intrusion Detection: Characterising intrusion detection sensors  

Science Conference Proceedings (OSTI)

An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience ...

Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen

2008-09-01T23:59:59.000Z

11

Review: The use of computational intelligence in intrusion detection systems: A review  

Science Conference Proceedings (OSTI)

Intrusion detection based upon computational intelligence is currently attracting considerable interest from the research community. Characteristics of computational intelligence (CI) systems, such as adaptation, fault tolerance, high computational speed ... Keywords: Artificial immune systems, Artificial neural networks, Computational intelligence, Evolutionary computation, Fuzzy systems, Intrusion detection, Soft computing, Survey, Swarm intelligence

Shelly Xiaonan Wu; Wolfgang Banzhaf

2010-01-01T23:59:59.000Z

12

State-based network intrusion detection systems for SCADA protocols: a proof of concept  

Science Conference Proceedings (OSTI)

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere ... Keywords: IDS, SCADA systems, critical infrastructures, security

Andrea Carcano; Igor Nai Fovino; Marcelo Masera; Alberto Trombetta

2009-09-01T23:59:59.000Z

13

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol  

Science Conference Proceedings (OSTI)

When SCADA systems are exposed to public networks, attackers can more easily penetrate the control systems that operate electrical power grids, water plants, and other critical infrastructures. To detect such attacks, SCADA systems require an intrusion ... Keywords: Bro, DNP3, SCADA, specification-based intrusion detection system

Hui Lin; Adam Slagell; Catello Di Martino; Zbigniew Kalbarczyk; Ravishankar K. Iyer

2013-01-01T23:59:59.000Z

14

Detecting intrusions in encrypted control traffic  

Science Conference Proceedings (OSTI)

Because of a lack of attack signatures and different forms of attacks, signature-based network intrusion detection systems currently provide insufficient protection for industrial control traffic. A combination of two anomaly detection approaches found ... Keywords: industrial control systems, intrusion detection, smart grids

Maarten Hoeve

2013-11-01T23:59:59.000Z

15

Integrating software specifications into intrusion detection  

Science Conference Proceedings (OSTI)

There exist a number of Intrusion Detection Systems (IDSs) that detect computer attacks based on some defined attack scenarios. The attack scenarios or security requirements in some of these IDSs are specified in attack specification languages that are ... Keywords: Attack scenarios, Intrusion detection, Software specification languages, State machines

Mohammad Zulkernine; Mathews Graves; Muhammad Umair Ahmed Khan

2007-08-01T23:59:59.000Z

16

Time-based intrusion detection in cyber-physical systems  

Science Conference Proceedings (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

17

Development and Testing of Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

Laser-Based Non-Intrusive Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurementsystems are entirely dependent on time-of-?ight laser measurements

2001-01-01T23:59:59.000Z

18

Energy Balancing Intrusion Detection System in Wireless Sensor Network  

Science Conference Proceedings (OSTI)

wireless sensor network (WSN) is vulnerable to a wide range of attacks due to deployment in the hostile ervironment and having limited resources. The security of WSN becomes a very important issue with the rapid development of WSN. Instrusion detection ... Keywords: WSN, Energy-effiency, Clustering, IDS

Chunyan Peng; Bing Liu

2012-10-01T23:59:59.000Z

19

Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices  

E-Print Network (OSTI)

Mobile computers are subject to a unique form of denial of service attack known as a battery exhaustion attack, in which an attacker attempts to rapidly drain the battery of the device. In this paper we present our first steps in the design of an intrusion detection system for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile computing devices. This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks. 1.

Daniel C. Nash; Thomas L. Martin; Dong S. Ha; Michael S. Hsiao

2005-01-01T23:59:59.000Z

20

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Advanced technologies for perimeter intrusion detection sensors  

SciTech Connect

The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

Williams, J.D.

1995-03-01T23:59:59.000Z

22

A Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

A Real- Time Laser-Based Detection System for Measurement ofTime Laser- Based Prototype Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurement

Cheng, Harry H.; Shaw, Ben; Palen, Joe; Wang, Zhaoqing; Chen, Bo

2002-01-01T23:59:59.000Z

23

Autonomous Rule Creation for Intrusion Detection  

SciTech Connect

Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-04-01T23:59:59.000Z

24

New Hardware and Software Design of a Field-Deployable Real-Time Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway  

E-Print Network (OSTI)

Time Laser-Based Prototype Detection System for MeasurementLaser-Based Non-Intrusive Detection System for MeasurementLaser-Based Non-Intrusive Detection System for Measurement

2001-01-01T23:59:59.000Z

25

Wild-Inspired Intrusion Detection System Framework for High Speed Networks f|p IDS Framework  

Science Conference Proceedings (OSTI)

While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and ... Keywords: Cybernetic Attacks, Framework, High Speed Network, Intrusion Detection, Monitoring

Hassen Sallay; Mohsen Rouached; Adel Ammar; Ouissem Ben Fredj; Khalid Al-Shalfan; Majdi Ben Saad

2011-10-01T23:59:59.000Z

26

Motif-oriented representation of sequences for a host-based intrusion detection system  

Science Conference Proceedings (OSTI)

Audit sequences have been used effectively to study process behaviors and build host-based intrusion detection models. Most sequence-based techniques make use of a pre-defined window size for scanning the sequences to model process behavior. In this ...

Gaurav Tandon; Debasis Mitra; Philip K. Chan

2004-05-01T23:59:59.000Z

27

Towards better tamper&intrusion detection  

Science Conference Proceedings (OSTI)

This presentation discusses in generic terms some of the work of the Vulnerability Assessment Team at Los Alamos National Laboratory in the area of tamper and intrusion detection. Novel security approaches are discussed. We also present preliminary results for a crude prototype of a high security ('Town Crier') monitoring system for securing moving cargo or stationary assets.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.)

2002-01-01T23:59:59.000Z

28

COTS diversity based intrusion detection and application to web servers  

Science Conference Proceedings (OSTI)

It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems and networks. However, the anomaly-based IDSes that have been proposed in the recent ... Keywords: COTS diversity, anomaly detection, design diversity, intrusion detection

Eric Totel; Frédéric Majorczyk; Ludovic Mé

2005-09-01T23:59:59.000Z

29

Enhancing byte-level network intrusion detection signatures with context  

Science Conference Proceedings (OSTI)

Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false-positive rate. We develop the concept of contextual signatures as ... Keywords: bro, evaluation, network intrusion detection, pattern matching, security, signatures, snort

Robin Sommer; Vern Paxson

2003-10-01T23:59:59.000Z

30

Effects-based feature identification for network intrusion detection  

Science Conference Proceedings (OSTI)

Intrusion detection systems (IDS) are an important element in a network's defences to help protect against increasingly sophisticated cyber attacks. IDS that rely solely on a database of stored known attacks are no longer sufficient for effectively detecting ... Keywords: Classification, Clustering, Decision trees, Feature selection, Intrusion detection

Panos Louvieris, Natalie Clewley, Xiaohui Liu

2013-12-01T23:59:59.000Z

31

Computer Intrusion Detection Through EWMA for Autocorrelated and Uncorrelated Data  

E-Print Network (OSTI)

Abstract—Reliability and quality of service from information systems has been threatened by cyber intrusions. To protect information systems from intrusions and thus assure reliability and quality of service, it is highly desirable to develop techniques that detect intrusions. Many intrusions manifest in anomalous changes in intensity of events occurring in information systems. In this study, we apply, test, and compare two EWMA techniques to detect anomalous changes in event intensity for intrusion detection: EWMA for autocorrelated data and EWMA for uncorrelated data. Different parameter settings and their effects on performance of these EWMA techniques are also investigated to provide guidelines for practical use of these techniques. Index Terms—Anomaly detection, computer audit data, exponentially weighted moving average (EWMA), information assurance,

Nong Ye; Senior Member; Sean Vilbert; Qiang Chen

2003-01-01T23:59:59.000Z

32

DogoIDS: a mobile and active intrusion detection system for IEEE 802.11s wireless mesh networks  

Science Conference Proceedings (OSTI)

Wireless Mesh Networks (WMN) are particularly vulnerable to attacks, since they feature constraint nodes, multi-hop communication, and an open wireless communication channel. These features limit the feasibility of the deployment of contemporary Intrusion ... Keywords: intrusion detection, security, wireless mesh networks

Rodrigo do Carmo; Matthias Hollick

2013-04-01T23:59:59.000Z

33

A cost-based analysis of intrusion detection system configuration under active or passive response  

Science Conference Proceedings (OSTI)

This paper studies the joint decisions of IDS configuration and alarm investigation capacity under active and passive responses. In active response, alarm events are blocked immediately, whereas alarm events are allowed to access the information assets ... Keywords: IDS configuration, Information security, Intrusion response, Investigation capacity

Wei T. Yue; Metin Çakany?ld?r?m

2010-12-01T23:59:59.000Z

34

Intrusion detection of sinkhole attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by ...

Ioannis Krontiris; Tassos Dimitriou; Thanassis Giannetsos; Marios Mpasoukos

2007-07-01T23:59:59.000Z

35

Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices  

E-Print Network (OSTI)

. These restrictions include limited processor power, memory, and power usage. Whereas a typical desktop system today for these attacks, a system that takes into account the performance, energy, and memory constraints of mobile accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy

Ha, Dong S.

36

Proposing a multi-touch interface for intrusion detection environments  

Science Conference Proceedings (OSTI)

Network Intrusion Detection is a critical task in today's environment, where network attacks and intrusions are everyday occurrences and state-level cyber warfare is a major concern. At the same time, it is a very difficult task, in part due to the large ... Keywords: activity theory, cognitive task analysis, data exploration, natural user interfaces, network intrusion detection visualization

Jeffrey Guenther; Fred Volk; Mark Shaneck

2010-09-01T23:59:59.000Z

37

Non-intrusive fault detection in reciprocating compressors  

E-Print Network (OSTI)

This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

Schantz, Christopher James

2011-01-01T23:59:59.000Z

38

Distributed fiber optic moisture intrusion sensing system  

DOE Patents (OSTI)

Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

Weiss, Jonathan D. (Albuquerque, NM)

2003-06-24T23:59:59.000Z

39

M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response  

Science Conference Proceedings (OSTI)

Anomaly-based intrusion detection is about the discrimination of malicious and legitimate behaviors on the basis of the characterization of system normality in terms of particular observable subjects. As the system normality is constructed solely from ... Keywords: Anomaly detection, POMDP, intrusion detection, network security, security metrics, security policy

Zonghua Zhang; Hong Shen

2009-11-01T23:59:59.000Z

40

Intrusion Prevention in Information Systems: Reactive and Proactive Responses  

Science Conference Proceedings (OSTI)

Intrusion prevention requires effective identification of and response to malicious events. In this paper, we model two important managerial decisions involved in the intrusion prevention process: the configuration of the detection component, and the ... Keywords: Information Security, Intrusion Detection, Intrusion Prevention, Intrusion Response

Wei Yue; Metin Cakanyildirim

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Intrusion ripple analysis in distributed information systems  

Science Conference Proceedings (OSTI)

Security is a very important aspect of distributed computing systems, especially in distributed information environments involving wide-area networks, such as internets. This paper addresses how a security breach, such as intrusion, propagates through ... Keywords: computer crime, distributed information systems, internets, intrusion ripple analysis, networked information system, ripple effect analysis, security breach propagation, software maintenance, wide-area networks

S. S. Yau; Jun Zhu

1997-10-01T23:59:59.000Z

42

Sensor Net: Nuclear Installation Intrusion Detection in/near Water ...  

Sensor Net: Nuclear Installation Intrusion Detection in/near Water ... Computational Sciences & Engineering Div Licensing Contact SIMS, DAVID L UT-Battelle, LLC

43

The placement-configuration problem for intrusion detection nodes in wireless sensor networks  

Science Conference Proceedings (OSTI)

The deployment and configuration of a distributed network intrusion detection system (NIDS) in a large Wireless Sensor Network (WSN) is an enormous challenge. A reduced number of devices equipped with detection capabilities have to be placed on strategic ...

Juan E. Tapiador, John A. Clark

2013-10-01T23:59:59.000Z

44

Delay of intrusion detection in wireless sensor networks  

Science Conference Proceedings (OSTI)

In this paper we consider sensor networks for intrusion detection, such that node deployment, node failures and node behavior result in coverage gaps and a fraction of disconnected nodes in an otherwise dense and well-connected network. We focus on the ... Keywords: delay, intrusion detection, percolation, sensor networks

Olivier Dousse; Christina Tavoularis; Patrick Thiran

2006-05-01T23:59:59.000Z

45

Model generalization and its implications on intrusion detection  

Science Conference Proceedings (OSTI)

To make up for the incompleteness of the known behaviors of a computing resource, model generalization is utilized to infer more behaviors in the behavior model besides the known behaviors. In principle, model generalization can improve the detection ... Keywords: generalization, intrusion, intrusion detection, machine learning, security, security infrastructure

Zhuowei Li; Amitabha Das; Jianying Zhou

2005-06-01T23:59:59.000Z

46

ITL Bulletin Acquiring and Deploying Intrusion Detection ...  

Science Conference Proceedings (OSTI)

... read the “Intru- sion Detection System Product Sur- vey” published by the Los Alamos National Laboratory and found at http://lib-www.lanl.gov/la ...

2012-03-26T23:59:59.000Z

47

A robust SNMP based infrastructure for intrusion detection and response in tactical MANETs  

Science Conference Proceedings (OSTI)

Intrusion Detection Systems (IDS) for adhoc networks need secure, reliable, flexible, and lightweight infrastructures for exchanging available sensor data and security event messages. Cooperation is a major concept of Mobile Adhoc Networks (MANETs). ...

Marko Jahnke; Jens Tölle; Sascha Lettgen; Michael Bussmann; Uwe Weddige

2006-07-01T23:59:59.000Z

48

Bloom Filter Based Intrusion Detection for Smart Grid  

E-Print Network (OSTI)

This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n-gram analysis and Bloom Filter. The predictable and regular nature of the SCADA communication patterns is exploited to train the intrusion detection system. The protocol considered to test the proposed approach is MODBUS which is used for communication between a SCADA server and field devices in power system. The approach is tested for attacks like HMI compromise and Man-in-the-Middle. Bloom Filter is chosen because of its strong space advantage over other data structures like hash tables, linked lists etc. for representing sets. The advantage comes from its probabilistic nature and compact array structure. The false positive rates are found to be minimal with careful choice of parameters for Bloom Filter design. Also the memory-efficient property of Bloom Filter makes it suitable for implementation in resource constrained SCADA components. It is also established that the knowledge of physical state of the power system i.e., normal, emergency or restorative state can help in improving the accuracy of the proposed approach.

Parthasarathy, Saranya

2012-05-01T23:59:59.000Z

49

Minimally intrusive strategies for fault detection and energy monitoring  

E-Print Network (OSTI)

This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

Cox, Robert Williams, 1979-

2006-01-01T23:59:59.000Z

50

A real-time intrusion prevention system for commercial enterprise databases  

Science Conference Proceedings (OSTI)

Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial ... Keywords: GLBA, HIPAA, VISA CISP, database security, encryption, intrusion tolerance, isolation

Ulf Mattsson

2005-02-01T23:59:59.000Z

51

Developing Novel Approaches to Tamper & Intrusion Detection - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Novel Approaches to Developing Novel Approaches to Tamper & Intrusion Detection VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers

52

Non-intrusive cooling system  

DOE Patents (OSTI)

A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

2001-05-22T23:59:59.000Z

53

A malware detector placement game for intrusion detection  

Science Conference Proceedings (OSTI)

We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop optimal detector algorithms taking into account attacker strategies and actions. ... Keywords: game theory, monitor placement, network-based intrusion detection

Stephan Schmidt; Tansu Alpcan; ?ahin Albayrak; Tamer Ba?ar; Achim Mueller

2007-10-01T23:59:59.000Z

54

Specification-Based Intrusion Detection for Advanced Metering Infrastructures  

Science Conference Proceedings (OSTI)

It is critical to develop an effective way to monitor advanced metering infrastructures (AMI). To ensure the security and reliability of a modernized power grid, the current deployment of millions of smart meters requires the development of innovative ... Keywords: AMI, specification-based security, intrusion detection, formal method

Robin Berthier; William H. Sanders

2011-12-01T23:59:59.000Z

55

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method  

Science Conference Proceedings (OSTI)

In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) ... Keywords: Android, Intrusion detection, Knowledge-based systems, Malware, Mobile devices, Temporal reasoning

Asaf Shabtai; Uri Kanonov; Yuval Elovici

2010-08-01T23:59:59.000Z

56

Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis  

E-Print Network (OSTI)

Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

Luo, Dong, 1966-

2001-01-01T23:59:59.000Z

57

Decision tree classifier for network intrusion detection with GA-based feature selection  

Science Conference Proceedings (OSTI)

Machine Learning techniques such as Genetic Algorithms and Decision Trees have been applied to the field of intrusion detection for more than a decade. Machine Learning techniques can learn normal and anomalous patterns from training data and generate ... Keywords: decision trees, genetic algorithm, intrusion detection

Gary Stein; Bing Chen; Annie S. Wu; Kien A. Hua

2005-03-01T23:59:59.000Z

58

TIAA: A Visual Toolkit for Intrusion Alert Analysis  

Science Conference Proceedings (OSTI)

This paper presents the development of TIAA, a visual toolkit for intrusion alert analysis. TIAA is developed to provide an interactive platform for analyzing potentially large sets of intrusion alerts reported by heterogeneous intrusion detection systems ...

Ning, P

2003-03-01T23:59:59.000Z

59

DETECTION OR WARNING SYSTEM  

DOE Patents (OSTI)

This patent application describes a sensitive detection or protective system capable of giving an alarm or warning upon the entrance or intrusion of any body into a defined area or zone protected by a radiation field of suitable direction or extent.

Tillman, J.E.

1951-06-30T23:59:59.000Z

60

A Host Intrusion Prevention System for Windows Operating Systems  

Science Conference Proceedings (OSTI)

this technique to Windows OS, also because Windows kernel structures ... vention System (HIPS) for Windows OS that immediately detects security rules.

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps  

Science Conference Proceedings (OSTI)

The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific ... Keywords: Smart Grid Communications, Anomaly Detection, Self-Organizing Maps, Intrusion Detection

Zubair Ahmed Baig, Saif Ahmad, Sadiq Mohammed Sait

2013-07-01T23:59:59.000Z

62

Applying a data mining method for intrusion detection  

Science Conference Proceedings (OSTI)

Widespread use of networked computers has made computer security a serious issue. Every networked computer, to varying degrees, is vulnerable to malicious computer attacks that can result in a range of security violations, such as, unauthorized user ... Keywords: classification tree, data mining, misuse detection

Vera Marinova-Boncheva

2007-06-01T23:59:59.000Z

63

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

64

Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring  

E-Print Network (OSTI)

This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

McKay, Thomas Duncan

2006-01-01T23:59:59.000Z

65

A method for modeling and quantifying the security attributes of intrusion tolerant systems  

Science Conference Proceedings (OSTI)

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, ... Keywords: MTTSF, QoS, intrusion tolerance, security attributes, semi Markov model

Bharat B. Madan; Katerina Goševa-Popstojanova; Kalyanaraman Vaidyanathan; Kishor S. Trivedi

2004-03-01T23:59:59.000Z

66

An analog and digital data acquisition system for Non-Intrusive Load Monitoring  

E-Print Network (OSTI)

Non-Intrusive Load Monitoring (NILM) is a method for characterizing and monitoring discrete loads connected to a power distribution system. This can include a ship, a car, or a utility distribution system. The entire concept ...

Clifford, Zachary Alan

2009-01-01T23:59:59.000Z

67

Techniques and tools for analyzing intrusion alerts  

Science Conference Proceedings (OSTI)

Traditional intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and raise alerts independently, though there may be logical connections between them. In situations where there are intensive attacks, not only will actual alerts ... Keywords: Intrusion detection, alert correlation, security management

Peng Ning; Yun Cui; Douglas S. Reeves; Dingbang Xu

2004-05-01T23:59:59.000Z

68

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

69

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

70

An architecture for adaptive intrusion-tolerant applications: Experiences with Auto-adaptive and Reconfigurable Systems  

Science Conference Proceedings (OSTI)

Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyber-attacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed applications ... Keywords: Byzantine fault tolerance, adaptive defense, adaptive middleware, intrusion tolerance, redundancy, survivability architecture

Partha Pal; Paul Rubel; Michael Atighetchi; Franklin Webber; William H. Sanders; Mouna Seri; HariGovind Ramasamy; James Lyons; Tod Courtney; Adnan Agbaria; Michel Cukier; Jeanna Gossett; Idit Keidar

2006-09-01T23:59:59.000Z

71

Non-intrusive load monitoring systems: Considerations for use and potential applications  

SciTech Connect

The value of measured energy performance data and the desire to acquire them without the cost, complexity, and intrusiveness of standard submetering techniques have led to recent research on non-intrusive load monitoring systems. These systems offer installation simplicity and the ability to discriminate important load changes through high-resolution, higher-speed sampling at a central monitoring point such as a building`s electrical service entrance. Important hardware and installation considerations learned from Oak Ridge National Laboratory`s (ORNL) experience with these systems are reviewed. In addition, the ability to discern important load changes in residential and commercial buildings using these systems is discussed based on recent ORNL experiments in two buildings. Potential applications, with examples, are also discussed. Using a non-intrusive load monitoring system, an experienced user can collect valuable building power profiles that provide insight into building operations, energy use, demand, and building systems problems easily and at low cost. These systems, when available, could be valuable to DSM and energy management professionals, utilities, researchers, building management firms, energy service companies, and others.

Sharp, T.R. [Oak Ridge National Lab., TN (United States). Energy Div.

1994-12-31T23:59:59.000Z

72

Shipboard fluid system diagnostics using non-intrusive load monitoring  

E-Print Network (OSTI)

Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

Mitchell, Gregory R. (Gregory Reed)

2007-01-01T23:59:59.000Z

73

Distributed fiber optic intrusion sensor system for monitoring long perimeters  

E-Print Network (OSTI)

A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from seismic disturbances in the vicinity are sensed by a phase-sensitive optical time-domain reflectometer (??OTDR). Light pulses from a cw laser operating in a single longitudinal mode and with low (MHz/min range) frequency drift are injected into one end of the single mode fiber, and the backscattered light is monitored with a photodetector. In laboratory tests with 12 km of fiber on reels, the effects of localized phase perturbations induced by a piezoelectric fiber stretcher on ??OTDR traces were characterized. In field tests in which the sensing element is a single mode fiber in a 3-mm diameter cable buried in an 8 to 18 inch deep, 4 inch wide trench in clay soil, detection of intruders on foot up to 15 ft from the cable line was achieved. In desert terrain field tests in which the sensing fiber is in a 4.5-mm diameter cable buried in a 1 ft deep, 2.5 ft wide trench filled with loose sand, high sensitivity and consistent detection of intruders on foot and of vehicles traveling down a road near the cable line was realized over a cable length of 8.5 km and a total fiber path of 19 km in real time. In a final series of field tests in clay soil, phase changes produced by the steps of a person walking up to 15 ft away from the buried cable were observed, and vehicles traveling at 10 mph were consistently detected up to 300 ft away. Based on these results, this technology may be regarded as a candidate for providing low-cost perimeter security for nuclear power plants, electrical power distribution centers, storage facilities for fuel and volatile chemicals, communication hubs, airports, government offices, military bases, embassies, and national borders.

Juarez, Juan C.

2005-08-01T23:59:59.000Z

74

iSSH v. Auditd: Intrusion Detection in High Performance Computing  

SciTech Connect

The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

Karns, David M. [Los Alamos National Laboratory; Protin, Kathryn S. [Los Alamos National Laboratory; Wolf, Justin G. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

75

Fuel washout detection system  

DOE Patents (OSTI)

A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

76

Immunity-Based Intrusion Detection System: A General ...  

Science Conference Proceedings (OSTI)

... and proliferation of B cells are closely regulated (with a co-stimulation) in order to ... The signals tell how to kill the new virus as well as similar one. ...

1999-11-05T23:59:59.000Z

77

Computationally Efficient Neural Network Intrusion Security Awareness  

SciTech Connect

An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

Todd Vollmer; Milos Manic

2009-08-01T23:59:59.000Z

78

Buried fiber optic intrusion sensor  

E-Print Network (OSTI)

A distributed fiber optic intrusion sensor capable of detecting intruders from the pressure of their weight on the earth's surface was investigated in the laboratory and in field tests. The presence of an intruder above or in proximity to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry, disturbances were monitored in long (several km) lengths of optical fiber. Narrow linewidth and low frequency drift in the laser were achieved through a combination of optical feedback and insulation of the laser cavity against environmental effects. The frequency drift of the laser, characterized using an all-fiber Mach Zehnder interferometer, was found to be less than 1 MHz/min, as required for operation of the intrusion detection system. Intrusions were simulated in a laboratory setting using a piezoelectric transducer to produce a controllable optical phase shift at the 2 km point of a 12 km path length. Interrogation of the distributed sensor was accomplished by repetitively gating light pulses from the stable laser into the sensing fiber. By monitoring the Rayleigh backscattered light with a photodetector and comparing traces with and without an induced phase shift, the phase disturbances were detected and located. Once the feasibility of such a sensor was proven in the laboratory, the experimental set up was transferred to Texas A&M's Riverside Campus. At the test site, approximately 40 meters of fiber optic cable were buried in a triangle perimeter and then spliced into the 12 km path length which was housed inside the test facility. Field tests were conducted producing results comparable to those found in the laboratory. Intrusions over this buried fiber were detectable on the ?-OTDR trace and could be localized to the intrusion point. This type of sensor has the potential benefits of heightened sensitivity, covertness, and greatly reduced cost over the conventional seismic, acoustic, infrared, magnetic, and fiber optic sensors for monitoring long (multi-km) perimeters.

Maier, Eric William

2005-05-01T23:59:59.000Z

79

Compensated intruder-detection systems  

DOE Patents (OSTI)

The invention is an improvement to an intruder-detection system of the kind where intruder-induced signals are transmitted through a medium whose conductance varies with certain climatic conditions. The improved system includes means coupled to the medium for converting the intruder-induced signals received therefrom to a first electrical signal. Means also are provided for generating a reference signal proportional to the climate-induced changes in the signal-conductance of the medium. Means are provided for generating, from the first electrical signal and the reference signal, an electrical output signal which is unaffected by the changes in signal-conductance. Means are provided to give warning when the output signal exceeds a selected value. In another aspect, the invention is a method for operating an intruder-detection system of the kind wherein an intrusion-generated signal transmitted through a detection medium is converted to a first electrical signal. The first electrical signal contains variations resulting from climate-induced changes in the medium. The method of the invention comprises generating an electrical reference signal proportional to the climate-induced changes in the medium; conditioning the first signal with the reference signal to produce an electrical output signal which is unaffected by the climate-induced changes in the medium; and impressing the resulting output signal across an alarm circuit to actuate the same when the output signal exceeds a selected value.

McNeilly, D.R.; Miller, W.R.

1982-01-20T23:59:59.000Z

80

Network Intrusion Detection and Visualization using Aggregations in a Cyber Security Data Warehouse  

SciTech Connect

The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our pro-posed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.

Czejdo, Bogdan [ORNL; Ferragut, Erik M [ORNL; Goodall, John R [ORNL; Laska, Jason A [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Portable modular detection system  

Science Conference Proceedings (OSTI)

Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

Brennan, James S. (Rodeo, CA); Singh, Anup (Danville, CA); Throckmorton, Daniel J. (Tracy, CA); Stamps, James F. (Livermore, CA)

2009-10-13T23:59:59.000Z

82

Design and testing of a non-intrusive torque measurement system  

E-Print Network (OSTI)

This thesis details the initial development of a non-intrusive torque measurement system to measure torque in a rotating driveshaft like those commonly found on internal combustion engine powered irrigation pumping plants. A typical driveshaft used in pumping plant applications consists of flanged U-joints on each end with a constant cross-section steele tube portion connecting the U-joints. The photoelectric sensor based system was able to predict torque to within 3?9.1 N-m (346 in-lbs) under constant rpm conditions. Two sensor types, phototransistor and photodiode, were tested. The photodiode sensor was tested with two emitter types: infrared LED and red laser. No significant difference in response was found using either the LED or red laser emmitters. Both the photoelectric and photodiode sensor measurements showed correlation to actual torque. The photoelectric sensor configuration correlation had a standard error of 5?% of a typical natural-gas pumping plant installation running at 773.9 N-m of torque. The sensors were mounted independent of the driveshaft and measured the phaseshift of two pins mounted on the shaft as they passed through the photosensing area. This caused extreme sensitivity to vibration of the engine and driveshaft. A similar design with a temporary mount connected to the shaft and transmitting the response signal via radio frequency telemetry could decrease the effects of vibration on the system.

Wilson, Edwin Ernest

1998-01-01T23:59:59.000Z

83

Intrusion Detection: A Bibliography  

E-Print Network (OSTI)

This document contains more than 600 references, dated from 1980 to 2001. We undoubtedly have forgotten some important citations, either through oversight or ignorance. Moreover, errors may remain in the citations. Thus, we ask for your indulgence and, more importantly, for your help. Send us a note if you nd any errors and let us know of any omissions

Ludovic Mé; Cédric Michel

2001-01-01T23:59:59.000Z

84

Radiation detection system  

SciTech Connect

A radiation detection system including a radiation-to-light converter and fiber optic wave guides to transmit the light to a remote location for processing. The system utilizes fluors particularly developed for use with optical fibers emitting at wavelengths greater than about 500 nm and having decay times less than about 10 ns.

Franks, Larry A. (Santa Barbara, CA); Lutz, Stephen S. (Santa Barbara, CA); Lyons, Peter B. (Los Alamos, NM)

1981-01-01T23:59:59.000Z

85

Solar system fault detection  

SciTech Connect

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

1986-01-01T23:59:59.000Z

86

Solar system fault detection  

DOE Patents (OSTI)

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, R.B.; Pruett, J.C. Jr.

1984-05-14T23:59:59.000Z

87

Radiation detection system  

DOE Patents (OSTI)

A radiation detection system which utilizes the generation of Cerenkov light in and the transmission of that light longitudinally through fiber optic wave guides in order to transmit intelligence relating to the radiation to a remote location. The wave guides are aligned with respect to charged particle radiation so that the Cerenkov light, which is generated at an angle to the radiation, is accepted by the fiber for transmission therethrough. The Cerenkov radiation is detected, recorded, and analyzed at the other end of the fiber.

Nelson, Melvin A. (Santa Barbara, CA); Davies, Terence J. (Santa Barbara, CA); Morton, III, John R. (Livermore, CA)

1976-01-01T23:59:59.000Z

88

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

89

Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation  

SciTech Connect

The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

2005-09-27T23:59:59.000Z

90

Arc fault detection system  

DOE Patents (OSTI)

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

Jha, Kamal N. (Bethel Park, PA)

1999-01-01T23:59:59.000Z

91

Arc fault detection system  

DOE Patents (OSTI)

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

Jha, K.N.

1999-05-18T23:59:59.000Z

92

Intrusive gravity currents  

E-Print Network (OSTI)

The front speed of intrusive gravity currents. J. FluidP.F. Linden. Intrusive gravity currents. J. Fluid Mechanics,of mesoscale variability of gravity waves. Part II: Frontal,

Hang, Alice Thanh

2009-01-01T23:59:59.000Z

93

HRT LEAK DETECTION SYSTEM  

SciTech Connect

All HRT process piping and equipment is contained in a large tank and flanged connections with stainless steel ring gaskets are used where needed to permit the removal of values and items of equipment. Underwater remote maintenance is to be employed and special provisions are required for indicating and locating leaks at all mechanical joints in the process system. Each joint is monitored and a signal is given when a leak occurs. The valve operator stems are sealed with stainless steel bellows and a means of detecting a leak in the bellows has been included. (auth)

Kuster, J.E.

1956-04-20T23:59:59.000Z

94

Machine learning for host-based anomaly detection  

Science Conference Proceedings (OSTI)

Anomaly detection techniques complement, signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences ...

Gaurav Tandon / Philip K. Chan

2008-01-01T23:59:59.000Z

95

On scalable attack detection in the network  

Science Conference Proceedings (OSTI)

Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunately, even today, many IDS systems we know of keep per-connection or per-flow ... Keywords: data structures, denial of service, network attacks, routers, scanning, streaming algorithms, syn flooding

Ramana Rao Kompella; Sumeet Singh; George Varghese

2007-02-01T23:59:59.000Z

96

A non-intrusive fault tolerant framework for mission critical real-time systems  

E-Print Network (OSTI)

The need for dependable real-time systems for embedded application is growing, and, at the same time, so does the amount of functionality required from these systems. As testing can only show the presence of errors, not ...

Gorelov, Sébastien

2005-01-01T23:59:59.000Z

97

Electric load information system based on non-intrusive power monitoring  

E-Print Network (OSTI)

Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

Lee, Kwangduk Douglas, 1970-

2003-01-01T23:59:59.000Z

98

NetHost-sensor: Monitoring a target host's application via system calls  

Science Conference Proceedings (OSTI)

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may employ ... Keywords: Application security, Dynamic link libraries, Host, Intrusion detection, Network, System calls

A. A. Abimbola; J. M. Munoz; W. J. Buchanan

2006-01-01T23:59:59.000Z

99

Simple, state-based approaches to program-based anomaly detection  

Science Conference Proceedings (OSTI)

This article describes variants of two state-based intrusion detection algorithms from Michael and Ghosh [2000] and Ghosh et al. [2000], and gives experimental results on their performance. The algorithms detect anomalies in execution audit data. One ... Keywords: Anomaly detection, finite automata, information system security, intrusion detection, machine learning

C. C. Michael; Anup Ghosh

2002-08-01T23:59:59.000Z

100

Protein detection system  

DOE Patents (OSTI)

The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

2009-05-05T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Thermal neutron detection system  

DOE Patents (OSTI)

According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

Peurrung, Anthony J. (Richland, WA); Stromswold, David C. (West Richland, WA)

2000-01-01T23:59:59.000Z

102

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 0.4) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

103

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual  

E-Print Network (OSTI)

TIAA: A Toolkit for Intrusion Alert Analysis (Version 1.0) Installation and Operation Manual 1 Introduction The Toolkit for Intrusion Alert Analysis(TIAA) was developed based on previous Intrusion Alert Correlator [3]. The primary goal of TIAA is to provide system support for interactive analysis of intrusion

Ning, Peng

104

APDS: Autonomous Pathogen Detection System  

SciTech Connect

An early warning system to counter bioterrorism, the Autonomous Pathogen Detection System (APDS) continuously monitors the environment for the presence of biological pathogens (e.g., anthrax) and once detected, it sounds an alarm much like a smoke detector warns of a fire. Long before September 11, 2001, this system was being developed to protect domestic venues and events including performing arts centers, mass transit systems, major sporting and entertainment events, and other high profile situations in which the public is at risk of becoming a target of bioterrorist attacks. Customizing off-the-shelf components and developing new components, a multidisciplinary team developed APDS, a stand-alone system for rapid, continuous monitoring of multiple airborne biological threat agents in the environment. The completely automated APDS samples the air, prepares fluid samples in-line, and performs two orthogonal tests: immunoassay and nucleic acid detection. When compared to competing technologies, APDS is unprecedented in terms of flexibility and system performance.

Langlois, R G; Brown, S; Burris, L; Colston, B; Jones, L; Makarewicz, T; Mariella, R; Masquelier, D; McBride, M; Milanovich, F; Masarabadi, S; Venkateswaran, K; Marshall, G; Olson, D; Wolcott, D

2002-02-14T23:59:59.000Z

105

Power line detection system  

DOE Patents (OSTI)

A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

Latorre, V.R.; Watwood, D.B.

1994-09-27T23:59:59.000Z

106

Power line detection system  

DOE Patents (OSTI)

A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

Latorre, Victor R. (Tracy, CA); Watwood, Donald B. (Tracy, CA)

1994-01-01T23:59:59.000Z

107

Intrusions: What Drives Them?  

Science Conference Proceedings (OSTI)

The driving mechanism for the observed interleaving of water masses is generally assumed to be double-diffusive mixing. However, some observations of intrusions have been made in regions where the mean stratification is stable to double-diffusive ...

Dave Hebert

1999-06-01T23:59:59.000Z

108

Next Generation Intrusion Detection: Autonomous ...  

Science Conference Proceedings (OSTI)

... Prior to joining GTRI Dr. Cannady was a Special Agent with the US Naval Investigative Service, specializing in counterintelligence matters and the ...

2000-11-03T23:59:59.000Z

109

Intrusion detection at 100G  

Science Conference Proceedings (OSTI)

Driven by the growing data transfer needs of the scientific community and the standardization of the 100 Gbps Ethernet Specification, 100 Gbps is now becoming a reality for many HPC sites. This tenfold increase in bandwidth creates a number of significant ...

Scott Campbell; Jason Lee

2011-11-01T23:59:59.000Z

110

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for...

111

Detection & Diagnostic Systems Multimedia - Argonne National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications...

112

Salinity Intrusion in Estuaries  

Science Conference Proceedings (OSTI)

One dimensional time-averaged solutions are examined for salinity intrusion in estuaries with a breadth variation BL(X/?)n and a depth variation H(X/?)m, where X is the distance from the head of the estuary. These solutions emphasize the ...

D. Prandle

1981-10-01T23:59:59.000Z

113

UNICORN: misuse detection for UNICOS  

Science Conference Proceedings (OSTI)

An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other ... Keywords: anomaly detection, computer misuse, auditing, UNICOS, computer security, hacking, intrusion detection, security logs

Gary G. Christoph; Kathleen A. Jackson; Michael C. Neuman; Christine L. B. Siciliano; Dennis D. Simmonds; Cathy A. Stallings; Joseph L. Thompson

1995-12-01T23:59:59.000Z

114

Compensated intruder-detection systems  

DOE Patents (OSTI)

Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

McNeilly, David R. (Maryville, TN); Miller, William R. (Andersonville, TN)

1984-01-01T23:59:59.000Z

115

Data Assimilation of Tropopause Height Using Dry Intrusion Observations  

Science Conference Proceedings (OSTI)

This article investigates the problem of initializing upper-level potential vorticity by using the detection of dry intrusions that can be seen in water vapor images. First, a satellite image processing technique has been developed for the ...

Yann Michel

2010-01-01T23:59:59.000Z

116

An arc fault detection system  

DOE Patents (OSTI)

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn, opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

Jha, Kamal N.

1997-12-01T23:59:59.000Z

117

Ionization detection system for aerosols  

DOE Patents (OSTI)

This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber.

Jacobs, Martin E. (Chillicothe, OH)

1977-01-01T23:59:59.000Z

118

Pulsed helium ionization detection system  

DOE Patents (OSTI)

A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

Ramsey, R.S.; Todd, R.A.

1985-04-09T23:59:59.000Z

119

Explosives detection system and method  

DOE Patents (OSTI)

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2007-12-11T23:59:59.000Z

120

Monitoring smartphones for anomaly detection  

Science Conference Proceedings (OSTI)

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection ... Keywords: anomaly detection, monitoring, smartphones

Aubrey-Derrick Schmidt; Frank Peters; Florian Lamour; Christian Scheel; Seyit Ahmet Çamtepe; Sahin Albayrak

2009-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Layered security architecture for masquerade attack detection  

Science Conference Proceedings (OSTI)

Masquerade attack refers to an attack that uses a fake identity, to gain unauthorized access to personal computer information through legitimate access identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant ... Keywords: anomaly detection, intrusion detection system, masquerade detection, user profiling

Hamed Saljooghinejad; Wilson Naik Bhukya

2012-07-01T23:59:59.000Z

122

Intrusion Margins and Associated Fractures | Open Energy Information  

Open Energy Info (EERE)

Intrusion Margins and Associated Fractures Intrusion Margins and Associated Fractures Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Intrusion Margins and Associated Fractures Dictionary.png Intrusion Margins and Associated Fractures: No definition has been provided for this term. Add a Definition Controlling Structures List of controlling structures typically associated with geothermal systems: Major Normal Fault Termination of a Major Normal Fault Stepover or Relay Ramp in Normal Fault Zones Apex or Salient of Normal Fault Fault Intersection Accommodation Zone Displacement Transfer Zone Pull-Apart in Strike-Slip Fault Zone Intrusion Margins and Associated Fractures Stratigraphic Boundaries Fissure Swarms Caldera Rim Margins Lithologically Controlled Fractures caused by igneous activity creates permeability, allowing water

123

Non-intrusive appliance monitor apparatus  

DOE Patents (OSTI)

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

1989-08-15T23:59:59.000Z

124

Non-intrusive appliance monitor apparatus  

DOE Patents (OSTI)

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

1989-08-15T23:59:59.000Z

125

Harmonic approaches to non-intrusive load diagnostics  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

Fuller, Ashley E. (Ashley Eliot)

2008-01-01T23:59:59.000Z

126

Improving shipboard applications of non-intrusive load monitoring  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

127

METHOD AND SYSTEM FOR TURBOMACHINERY SURGE DETECTION ...  

A method and system for surge detection within a gas turbine engine, comprises: measuring the compressor discharge pressure (CDP) of the gas turbine ...

128

NIST: Testing of Radiation Detection Systems  

Science Conference Proceedings (OSTI)

Testing of Radiation Detection Systems. ... The GRaDER program will provide users with information about the performance of radiation instruments. ...

2012-12-12T23:59:59.000Z

129

Discriminating ultrasonic proximity detection system  

DOE Patents (OSTI)

This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

Annala, Wayne C. (Durango, CO)

1989-01-01T23:59:59.000Z

130

Discriminating ultrasonic proximity detection system  

DOE Patents (OSTI)

This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

Annala, W.C.

1986-12-04T23:59:59.000Z

131

Alert correlation using artificial immune recognition system  

Science Conference Proceedings (OSTI)

High volumes of low-level alerts that are generated by intrusion detection systems (IDSs) are serious obstacle for using them effectively. These high volumes of alerts overwhelm system administrators in such a way that they cannot manage and ...

Mehdi Bateni; Ahmad Baraani; Ali Ghorbani

2012-06-01T23:59:59.000Z

132

A national drilling program to study the roots of active hydrothermal systems related to young magmatic intrusions  

DOE Green Energy (OSTI)

The importance of studies of active hydrothermal-magma systems as part of a national continental scientific drilling program has been emphasized in numerous workshops and symposia. The present report, prepared by the Panel on Thermal Regimes of the Continental Scientific Drilling Committee, both reinforces and expands on earlier recommendations. The US Geodynamics Committee 1979 report of the Los Almos workshop, Continental Scientific Drilling Program, placed major emphasis on maximizing the scientific value of current and planned drilling by industry and government, supplementing these efforts with holes drilled solely for scientific purposes. Although the present report notes the importance of opportunities for scientific investigations that may be added on to current, mission-oriented drilling activities, the Panel on Thermal Regimes recognizes that such opportunities are limited and thus focused its study on holes dedicated to broad scientific objectives. 16 refs., 2 figs., 4 tabs.

Not Available

1984-01-01T23:59:59.000Z

133

DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA  

Science Conference Proceedings (OSTI)

Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

2010-12-02T23:59:59.000Z

134

Gas intrusion into SPR caverns  

Science Conference Proceedings (OSTI)

The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

1995-12-01T23:59:59.000Z

135

Radiation Detection Materials and Systems | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiation Detection Materials and Systems SHARE Radiation Detection Materials and Systems ORNL's Nuclear Material Detection and Characterization programs are at the forefront of...

136

Intrusive multi-probe system  

DOE Green Energy (OSTI)

The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

Green, R.A.; Hester, L.R.; Bouchillon, C.W.

1995-02-01T23:59:59.000Z

137

Network intrusion detector: NID user`s guide V 1.0  

SciTech Connect

The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

Palasek, R. [ed.

1994-04-01T23:59:59.000Z

138

Detection of arcs in automotive electrical systems  

E-Print Network (OSTI)

At the present time, there is no established method for the detection of DC electric arcing. This is a concern for forthcoming advanced automotive electrical systems which consist of higher DC electric power bus voltages, ...

Mishrikey, Matthew David

2005-01-01T23:59:59.000Z

139

RADIATION DETECTING AND TELEMETERING SYSTEM  

DOE Patents (OSTI)

A system is presented for measuring ionizing radiation at several remote stations and transmitting the measured information by radio to a central station. At each remote station a signal proportioned to the counting rate is applied across an electrical condenser made of ferroelectric material. The voltage across the condenser will vary as a function of the incident radiation and the capacitance of the condenser will vary accordingly. This change in capacitance is used to change the frequency of a crystalcontrolled oscillator. The output of the oscillator is coupled to an antenna for transmitting a signal proportional to the incident radiation.

Richards, H.K.

1959-12-15T23:59:59.000Z

140

Fault detection and diagnosis of technical systems  

Science Conference Proceedings (OSTI)

Sensors, actuators and/or physical components in technical systems are often affected by unpermitted or un-expected deviations from normal operation behaviour. The fault diagnosis task consists of determination of the fault type with as many details ... Keywords: fault detection and diagnosis, residuals, symptoms, technical systems

Ioana Fagarasan; S. ST. Iliescu

2008-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Laser-Based Non-Intrusive Detection System for Measurement of True Travel Time on the Highway 1  

E-Print Network (OSTI)

United States Department of Transportation, Federal Highway Administration. The contents of this report reflect the views of the authors who are responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of the State of California. This report does not constitute a standard, specification, or regulation. Report for MOU 3005

Harry H. Cheng; Ben Shaw; Joe Palen; Bin Lin; Xudong Hu; Bo Chen; Jason Parks; Harry H. Cheng; Ben Shaw; Joe Palen; Bin Lin; Xudong Hu; Bo Chen; Jason Parks

2000-01-01T23:59:59.000Z

142

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges  

NLE Websites -- All DOE Office Websites (Extended Search)

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Speaker(s): Hampden Kuhns Date: May 10, 2010 - 12:00pm Location: 90-3122 Non-Intrusive Load Monitoring (NILM) describes the process of disaggregating multiple energy loads on a single circuit using signal processing techniques. The granular output of this analysis (much like an itemized phone bill) can help rate payers identify inefficiencies in their buildings and promote cost-effective energy efficiency actions. The concepts behind NIALM were originally developed in the late 1980s by George Hart of MIT and commercialized by Enetics Inc, but hardware expense, accuracy, and detection limit issues have hampered its large scale adoption. This presentation discusses the several steps of the original

143

System For Detection Of Hazardous Events  

DOE Patents (OSTI)

A system for detecting the occurrence of anomalies, includes a plurality of spaced apart nodes, with each node having adjacent nodes, each of the nodes having one or more sensors associated with the node and capable of detecting anomalies, and each of the nodes having a controller connected to the sensors associated with the node. The system also includes communication links between adjacent nodes, whereby the nodes form a network. Each controller is programmed to query its adjacent nodes to assess the status of the adjacent nodes and the communication links.

Kulesz, James J [Oak Ridge, TN; Worley, Brian A [Knoxville, TN

2005-08-16T23:59:59.000Z

144

Position Sensitive Detection System for Charged Particles  

Science Conference Proceedings (OSTI)

The position sensitive detection system presented in this work employs the Anger logic algorithm to determine the position of the light spark produced by the passage of charged particles on a 170 x 170 x 10 mm3 scintillator material (PILOT-U). The detection system consists of a matrix of nine photomultipliers, covering a fraction of the back area of the scintillators. Tests made with a non-collimated alpha particle source together with a Monte Carlo simulation that reproduces the data, suggest an intrinsic position resolution of up to 6 mm is achieved.

Coello, E. A. [Instituto de Fisica, Univ. Nacional Autonoma de Mexico; Favela, F. [Instituto de Fisica, Univ. Nacional Autonoma de Mexico; Curiel, Q. [Instituto de Fisica, Univ. Nacional Autonoma de Mexico; Chavez, E [Instituto de Fisica, Univ. Nacional Autonoma de Mexico; Huerta, A. [Instituto de Fisica, Univ. Nacional Autonoma de Mexico; Varela, A. [Instituto Nacional de Investigaciones Nucleares, Ocoyoacac, Mexico; Shapira, Dan [ORNL

2012-01-01T23:59:59.000Z

145

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

146

Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008  

Energy.gov (U.S. Department of Energy (DOE))

A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis.

147

DCE Bio Detection System Final Report  

SciTech Connect

The DCE (DNA Capture Element) Bio-Detection System (Biohound) was conceived, designed, built and tested by PNNL under a MIPR for the US Air Force under the technical direction of Dr. Johnathan Kiel and his team at Brooks City Base in San Antonio Texas. The project was directed toward building a measurement device to take advantage of a unique aptamer based assay developed by the Air Force for detecting biological agents. The assay uses narrow band quantum dots fluorophores, high efficiency fluorescence quenchers, magnetic micro-beads beads and selected aptamers to perform high specificity, high sensitivity detection of targeted biological materials in minutes. This final report summarizes and documents the final configuration of the system delivered to the Air Force in December 2008

Lind, Michael A.; Batishko, Charles R.; Morgen, Gerald P.; Owsley, Stanley L.; Dunham, Glen C.; Warner, Marvin G.; Willett, Jesse A.

2007-12-01T23:59:59.000Z

148

Intrusion detection and monitoring for wireless networks.  

SciTech Connect

Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

2005-11-01T23:59:59.000Z

149

Digital radiographic systems detect boiler tube cracks  

SciTech Connect

Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

Walker, S. [EPRI, Charlotte, NC (United States)

2008-06-15T23:59:59.000Z

150

Video analytics algorithm for detecting objects crossing lines in specific direction using blob-based analysis  

Science Conference Proceedings (OSTI)

This paper presents a video analytics algorithm for detecting event of objects crossing predetermined line-of-interest in the scene in specific direction. A fast blob-based analysis is formulated to detect the event, combined with the object detection ... Keywords: line intrusion, surveillance system, tripwire, video analytics, virtual boundary, wrong direction detection

Zulaikha Kadim; Liang kim meng; Norshuhada Samudin; Khairunnisa Mohamed Johari; Khairil Hafriza; Choong Teck Liong; Hon Hock Woon

2012-12-01T23:59:59.000Z

151

A Machine Learning Evaluation of an Artificial Immune System  

Science Conference Proceedings (OSTI)

ARTIS is an artificial immune system framework which contains several adaptive mechanisms. LISYS is a version of ARTIS specialized for the problem of network intrusion detection. The adaptive mechanisms of LISYS are characterized in terms of their machine-learning ...

Matthew Glickman; Justin Balthrop; Stephanie Forrest

2005-06-01T23:59:59.000Z

152

System and method for detecting gas  

DOE Patents (OSTI)

A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

Chow, Oscar Ken (Simsbury, CT); Moulthrop, Lawrence Clinton (Windsor, CT); Dreier, Ken Wayne (Madison, CT); Miller, Jacob Andrew (Dexter, MI)

2010-03-16T23:59:59.000Z

153

Gravity-driven intrusions in stratified fluids  

E-Print Network (OSTI)

5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6partial- depth intrusive gravity currents,” Atmosphere -

Maurer, Benjamin Dudley

2011-01-01T23:59:59.000Z

154

Systems and methods for detecting and processing  

DOE Patents (OSTI)

Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

Johnson, Michael M. (Livermore, CA); Yoshimura, Ann S. (Tracy, CA)

2006-03-28T23:59:59.000Z

155

DOE Mobile Detection Assessment Response System (MDARS)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Helps Pioneer "Robot" Patrol Technology: Deployment of the Helps Pioneer "Robot" Patrol Technology: Deployment of the DOE Mobile Detection Assessment Response System (MDARS) The use of patrol robots to cost effectively improve security while reducing health and safety risks at DOE and NNSA nuclear facilities is an HSS advanced technology deployment "first". Over the past 2 years, the HSS Office of Technology has played a key role in working with the Army, the National Nuclear Security Administration (NNSA), the Nevada National Security Site (NNSS) and General Dynamics Robotics Systems to purchase, prototype, test and deploy the first of three MDARS patrol robots at NNSS. In addition to the initial purchase, HSS successfully negotiated a mutually acceptable

156

Method and system for detecting explosives  

DOE Patents (OSTI)

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2009-03-10T23:59:59.000Z

157

Detection & Diagnostic Systems - Nuclear Engineering Division (Argonne)  

NLE Websites -- All DOE Office Websites (Extended Search)

Departments > Detection & Diagnostic Departments > Detection & Diagnostic Systems DEPARTMENTS Engineering Analysis Nuclear Systems Analysis Research & Test Reactor Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Detection & Diagnostic Systems Bookmark and Share The Detection & Diagnostic Systems Department conducts research and development related to instruments and non-destructive evaluation (NDE) techniques for characterization of materials and determination of system parameters related to different energy systems (including fossil,

158

For Radiation Detection Systems – Specific Methods  

Science Conference Proceedings (OSTI)

... The test procedures outlined within this TTOP will cover radiation detection instruments used for gamma-ray and neutron detection as well as ...

2013-01-10T23:59:59.000Z

159

Evolving non-intrusive load monitoring  

Science Conference Proceedings (OSTI)

Non-intrusive load monitoring (NILM) identifies used appliances in a total power load according to their individual load characteristics. In this paper we propose an evolutionary optimization algorithm to identify appliances, which are modeled as on/off ... Keywords: NILM, evolution, evolutionary algorithm, knapsack problem, non-intrusive load monitoring

Dominik Egarter; Anita Sobe; Wilfried Elmenreich

2013-04-01T23:59:59.000Z

160

Online fault detection and tolerance for photovoltaic energy harvesting systems  

Science Conference Proceedings (OSTI)

Photovoltaic energy harvesting systems (PV systems) are subject to PV cell faults, which decrease the efficiency of PV systems and even shorten the PV system lifespan. Manual PV cell fault detection and elimination are expensive and nearly impossible ... Keywords: fault detection, fault tolerance, photovoltaic panel reconfiguration, photovoltaic system

Xue Lin; Yanzhi Wang; Di Zhu; Naehyuck Chang; Massoud Pedram

2012-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Signatures of Doubly Diffusive Convection and Turbulence in an Intrusive Regime  

Science Conference Proceedings (OSTI)

Doubly diffusive convection and turbulence were measured from a submarine in a region where the mean gradients do not support doubly diffusive processes but intrusions provide favorable sites. The stability of the submarine-mounted CTD system ...

Thomas R. Osborn

1988-01-01T23:59:59.000Z

162

The Autonomous Pathogen Detection System (APDS)  

SciTech Connect

Shaped like a mailbox on wheels, it's been called a bioterrorism ''smoke detector.'' It can be found in transportation hubs such as airports and subways, and it may be coming to a location near you. Formally known as the Autonomous Pathogen Detection System, or APDS, this latest tool in the war on bioterrorism was developed at Lawrence Livermore National Laboratory to continuously sniff the air for airborne pathogens and toxins such as anthrax or plague. The APDS is the modern day equivalent of the canaries miners took underground with them to test for deadly carbon dioxide gas. But this canary can test for numerous bacteria, viruses, and toxins simultaneously, report results every hour, and confirm positive samples and guard against false positive results by using two different tests. The fully automated system collects and prepares air samples around the clock, does the analysis, and interprets the results. It requires no servicing or human intervention for an entire week. Unlike its feathered counterpart, when an APDS unit encounters something deadly in the air, that's when it begins singing, quietly. The APDS unit transmits a silent alert and sends detailed data to public health authorities, who can order evacuation and begin treatment of anyone exposed to toxic or biological agents. It is the latest in a series of biodefense detectors developed at DOE/NNSA national laboratories. The manual predecessor to APDS, called BASIS (for Biological Aerosol Sentry and Information System), was developed jointly by Los Alamos and Lawrence Livermore national laboratories. That system was modified to become BioWatch, the Department of Homeland Security's biological urban monitoring program. A related laboratory instrument, the Handheld Advanced Nucleic Acid Analyzer (HANAA), was first tested successfully at LLNL in September 1997. Successful partnering with private industry has been a key factor in the rapid advancement and deployment of biodefense instruments such as these. The APDS technology has been licensed and is currently undergoing commercialization.

Morris, J; Dzenitis, J

2004-09-22T23:59:59.000Z

163

Detection of contamination of municipal water distribution systems  

DOE Patents (OSTI)

A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

Cooper, John F. (Oakland, CA)

2012-01-17T23:59:59.000Z

164

Standoff Detection of Chemicals Using Rydberg Fingerprint ...  

applied for non-intrusive detection of combustion intermediates. The technique can be applied to detection of chemical vapors as well as residues on ...

165

Semantic security analysis of SCADA networks to detect malicious control commands in power grids  

Science Conference Proceedings (OSTI)

In the current generation of SCADA (Supervisory Control And Data Acquisition) systems used in power grids, a sophisticated attacker can exploit system vulnerabilities and use a legitimate maliciously crafted command to cause a wide range of system changes ... Keywords: contingency analysis, intrusion detection system, scada, semantic analysis

Hui Lin, Adam Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer

2013-11-01T23:59:59.000Z

166

Computer system performance problem detection using time series models  

Science Conference Proceedings (OSTI)

Computer systems require monitoring to detect performance anomalies such as runaway processes, but problem detection and diagnosis is a complex task requiring skilled attention. Although human attention was never ideal for this task, as networks of computers ...

Peter Hoogenboom; Jay Lepreau

1993-06-01T23:59:59.000Z

167

Research on energy consumption detection system based on OPC technology  

Science Conference Proceedings (OSTI)

For developing of energy consumption detection systems, the system integration becomes more and more difficult. The OPC Object Linking and Embedding OLE for process control technology is used to simplify the problem. The system integration can be improved ...

Changtao Wang; Zhonghua Han; Bin Ma

2013-06-01T23:59:59.000Z

168

System and method for detecting cells or components thereof  

DOE Patents (OSTI)

A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

2009-01-06T23:59:59.000Z

169

Gravity-Driven Intrusions in Stratified Fluids  

E-Print Network (OSTI)

5.5.1 Five interleaving interfacial gravity currents 5.5.2Ten interleaving interfacial gravity currents . 5.6in Iceland showing multiple gravity-driven intrusions c ´

Maurer, Benjamin D.

2011-01-01T23:59:59.000Z

170

Dust Intrusion Events into the Mediterranean Basin  

Science Conference Proceedings (OSTI)

In this study seven dust intrusion events were identified and analyzed in the central and eastern part of the Mediterranean Sea beginning August 1988 and ending September 1989. In order to locate their sources, characterize their mode, and ...

U. Dayan; J. Heffter; J. Miller; G. Gutman

1991-08-01T23:59:59.000Z

171

Active, Non-Intrusive Inspection Technologies for Homeland Defense  

SciTech Connect

Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

James L. Jones

2003-06-01T23:59:59.000Z

172

Fault Detection and Diagnosis in Building HVAC Systems  

E-Print Network (OSTI)

Wright, “Condition monitoring in HVAC subsystems using firstmonitoring packaged HVAC equipment. ASHRAE Transactions”,Detection and Diagnosis of HVAC Systems Using Support Vector

Najafi, Massieh

2010-01-01T23:59:59.000Z

173

Millimeter-Wave Systems Track Biometrics; Detect Chemicals ...  

emergency responders. Scientists at Argonne National Laboratory have devised two unique mmW detection systems to meet these needs. One—a first-of-

174

Best Management Practice: Distribution System Audits, Leak Detection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice: Distribution System Audits, Leak Best Management Practice: Distribution System Audits, Leak Detection, and Repair Best Management Practice: Distribution System Audits, Leak Detection, and Repair October 7, 2013 - 3:06pm Addthis A distribution system audit, leak detection, and repair programs help Federal facilities reduce water losses and make better use of limited water resources. Overview Federal facilities with large campus settings and expansive distribution systems can lose a significant amount of total water production and purchases to system leaks. Leaks in distribution systems are caused by a number of factors, including pipe corrosion, high system pressure, construction disturbances, frost damage, damaged joints, and ground shifting and settling. Regular distribution system leak detection surveys

175

Phase and amplitude detection system for the Stanford Linear Accelerator  

Science Conference Proceedings (OSTI)

A computer controlled phase and amplitude detection system to measure and stabilize the rf power sources in the Stanford Linear Accelerator is described. This system measures the instantaneous phase and amplitude of a 1 microsecond 2856 MHz rf pulse and will be used for phase feedback control and for amplitude and phase jitter detection. This paper discusses the measurement system performance requirements for the operation of the Stanford Linear Collider, and the design and implementation of the phase and amplitude detection system. The fundamental software algorithms used in the measurement are described, as is the performance of the prototype phase and amplitude detector system.

Fox, J.D.; Schwarz, H.D.

1983-01-01T23:59:59.000Z

176

Explosive simulants for testing explosive detection systems  

DOE Patents (OSTI)

Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

Kury, John W. (Danville, CA); Anderson, Brian L. (Lodi, CA)

1999-09-28T23:59:59.000Z

177

Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems  

E-Print Network (OSTI)

Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems Xue Lin 1 , Yanzhi, yanzhiwa, dizhu, pedram}@usc.edu, 2 naehyuck@elpl.snu.ac.kr ABSTRACT Photovoltaic energy harvesting systems (PV systems) are subject to PV cell faults, which decrease the efficiency of PV systems and even

Pedram, Massoud

178

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

179

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

180

Systems for detecting charged particles in object inspection  

DOE Patents (OSTI)

Techniques, apparatus and systems for detecting particles such as muons. In one implementation, a monitoring system has a cosmic ray-produced charged particle tracker with a plurality of drift cells. The drift cells, which can be for example aluminum drift tubes, can be arranged at least above and below a volume to be scanned to thereby track incoming and outgoing charged particles, such as cosmic ray-produced muons, while also detecting gamma rays. The system can selectively detect devices or materials, such as iron, lead, gold and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can also detect any radioactive sources occupying the volume from gamma rays emitted therefrom. If necessary, the drift tubes can be sealed to eliminate the need for a gas handling system. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

Morris, Christopher L.; Makela, Mark F.

2013-08-20T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

The Structure and Driving Mechanisms of the Baltic Intrusions  

Science Conference Proceedings (OSTI)

Data from closely spaced CTD profiling performed in the eastern Gotland Basin after the 1993 inflow event are used to study thermohaline intrusions in the Baltic Sea. Two CTD cross sections display abundant intrusive layers in the permanent ...

Natalia Kuzmina; Bert Rudels; Tapani Stipa; Victor Zhurbas

2005-06-01T23:59:59.000Z

182

Intrusion Characteristics in the Antarctic Polar Front  

Science Conference Proceedings (OSTI)

Data obtained on two cruises to the Antarctic Polar Front are used to investigate the nature of thermohaline intrusions in the front. These data, obtained in the Drake Passage and south of New Zealand, include CTD time series made relative to ...

John M. Toole

1981-06-01T23:59:59.000Z

183

Intrusive gravity currents in two-layer  

E-Print Network (OSTI)

Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept to as a gravity current · In contrast to waves, gravity currents transport significant mass (e.g. fluid parcels, sediment, insects, etc.) Introduction Gravity currents in the environment www

Flynn, Morris R.

184

Design and Evaluation of Hybrid Fault-Detection Systems  

Science Conference Proceedings (OSTI)

As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Up to now, system designers have primarily considered hardware-only and software-only fault-detection mechanisms ...

George A. Reis; Jonathan Chang; Neil Vachharajani; Ram Rangan; David I. August; Shubhendu S. Mukherjee

2005-06-01T23:59:59.000Z

185

Occupancy change detection system and method  

DOE Patents (OSTI)

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

Bruemmer, David J. (Idaho Falls, ID); Few, Douglas A. (Idaho Falls, ID)

2009-09-01T23:59:59.000Z

186

Methods and systems for remote detection of gases  

SciTech Connect

Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

Johnson, Timothy J

2012-09-18T23:59:59.000Z

187

Fault detection of multivariable system using its directional properties  

E-Print Network (OSTI)

A novel algorithm for making the combination of outputs in the output zero direction of the plant always equal to zero was formulated. Using this algorithm and the result of MacFarlane and Karcanias, a fault detection scheme was proposed which utilizes the directional property of the multivariable linear system. The fault detection scheme is applicable to linear multivariable systems. Results were obtained for both continuous and discrete linear multivariable systems. A quadruple tank system was used to illustrate the results. The results were further verified by the steady state analysis of the plant.

Pandey, Amit Nath

2004-12-01T23:59:59.000Z

188

Strategies To Detect Hidden Geothermal Systems Based On Monitoring and  

Open Energy Info (EERE)

To Detect Hidden Geothermal Systems Based On Monitoring and To Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Strategies To Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Details Activities (5) Areas (1) Regions (0) Abstract: We investigate the potential for CO2 monitoring in thenear-surface environment as an approach to exploration for hiddengeothermal systems. Numerical simulations of CO2 migration from a modelhidden geothermal system show that CO2 concentrations can reach highlevels in the shallow subsurface even for relatively low CO2 fluxes.Therefore, subsurface measurements offer an advantage over above-groundmeasurements which are affected by winds that rapidly disperse

189

Angle Instability Detection in Power Systems with High Wind Penetration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Angle Instability Detection in Power Angle Instability Detection in Power Systems with High Wind Penetration Using PMUs YC Zhang National Renewable Energy Laboratory Yingchen.zhang@nrel.gov 27/28 June 2013 Washington, DC DOE/OE Transmission Reliability Program Angle Instability Detection in Power Systems with High Wind Penetration Using Synchrophasor Measurements  Project Objective * Utilize synchrophasor measurements to estimate the equivalent inertia of a power source such as synchronous generators or wind turbine generators * Develop angle instability detection method for a system with high wind penetration using the synchrophasor measurements 2 3 Background Submitted to IEEE Journal of Emerging and Selected Topics in Power Electronics * In case of angular instability, some machines will have

190

SQLIA detection and prevention approach for RFID systems  

Science Conference Proceedings (OSTI)

While SQL injection attacks have been plaguing web application systems for years, the possibility of them affecting RFID systems was only identified very recently. However, very little work exists to mitigate this serious security threat to RFID-enabled ... Keywords: Detection and prevention, RFID, SQL injection attack, Security, Tag-born malware

Jemal Abawajy

2013-03-01T23:59:59.000Z

191

A Fault Detection and Diagnosis Method for HVAC Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

A Fault Detection and Diagnosis Method for HVAC Systems A Fault Detection and Diagnosis Method for HVAC Systems Speaker(s): Peng Xu Date: December 2, 2002 - 12:00pm Location: Bldg. 90 There is a growing consensus that most buildings do not perform as well as intended and that faults in HVAC systems are widespread in commercial buildings. An automated fault detection and diagnosis tool for HVAC systems is being developed, based on an integrated, life-cycle, approach to commissioning and performance monitoring. The tool uses component-level HVAC equipment models implemented in the SPARK equation-based simulation environment. The models are configured using design information and component manufacturers' data and then fine-tuned to match the actual performance of the equipment by using data measured during functional tests

192

Towards the protection of industrial control systems: conclusions of a vulnerability analysis of profinet IO  

Science Conference Proceedings (OSTI)

The trend of introducing common information and communication technologies into automation control systems induces besides many benefits new security risks to industrial plants and critical infrastructures. The increasing use of Internet protocols in ... Keywords: anomaly detection, industrial control systems, intrusion detection, profinet IO attacks, profinet IO vulnerabilities

Andreas Paul, Franka Schuster, Hartmut König

2013-07-01T23:59:59.000Z

193

Observing industrial control system attacks launched via metasploit framework  

Science Conference Proceedings (OSTI)

Industrial Control Systems (ICS) are present across many industries ranging from automotive to utilities. These systems have been found to be connected to corporate enterprise servers and can communicate over unencrypted communication channels. Interconnections ... Keywords: SCADA, industrial control systems, intrusion detection

Nathan Wallace, Travis Atkison

2013-04-01T23:59:59.000Z

194

Evading stepping-stone detection under the cloak of streaming media with SNEAK  

Science Conference Proceedings (OSTI)

Network-based intrusions have become a serious threat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing ... Keywords: Stepping-stone detection, Time-based watermarking, Traffic analysis

Jaideep D. Padhye; Kush Kothari; Madhu Venkateshaiah; Matthew Wright

2010-09-01T23:59:59.000Z

195

Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring  

E-Print Network (OSTI)

for Detection of Hidden Geothermal Systems Figure 7.4.for Detection of Hidden Geothermal Systems Figure 7.5.for Detection of Hidden Geothermal Systems Figure 7.6.

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2004-01-01T23:59:59.000Z

196

A Learning System for Discriminating Variants of Malicious Network Traffic  

Science Conference Proceedings (OSTI)

Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

Beaver, Justin M [ORNL; Symons, Christopher T [ORNL; Gillen, Rob [ORNL

2013-01-01T23:59:59.000Z

197

ANOLE Portable Radiation Detection System Field Test and Evaluation Campaign  

SciTech Connect

Handheld, backpack, and mobile sensors are elements of the Global Nuclear Detection System for the interdiction and control of illicit radiological and nuclear materials. They are used by the U.S. Department of Homeland Security (DHS) and other government agencies and organizations in various roles for border protection, law enforcement, and nonproliferation monitoring. In order to systematically document the operational performance of the common commercial off-the-shelf portable radiation detection systems, the DHS Domestic Nuclear Detection Office conducted a test and evaluation campaign conducted at the Nevada Test Site from January 18 to February 27, 2006. Named “Anole,” it was the first test of its kind in terms of technical design and test complexities. The Anole test results offer users information for selecting appropriate mission-specific portable radiation detection systems. The campaign also offered manufacturers the opportunity to submit their equipment for independent operationally relevant testing to subsequently improve their detector performance. This paper will present the design, execution, and methodologies of the DHS Anole portable radiation detection system test campaign.

Chris A. Hodge

2007-07-12T23:59:59.000Z

198

Fissile and Non-Fissile Material Detection Using Nuclear Acoustic Resonance Signatures  

Science Conference Proceedings (OSTI)

The objective of this project is to develop anovel technique for remote, non-destructive, non-radiation-based detection of materials of interest to Nonproliferation Programs. We propse the development of a detection system based on magnetic resonance principles (NAR), which would work where radiation detection is not possible. The approach would be non-intrusive, penetrating, applicable to many materials of interest for Nonproliferation, and be able to identify the nuclear samples under investigation.

Bernhard R. Tittmann; P.M. Lenahan; David Spears; Rhys Williams

2008-11-25T23:59:59.000Z

199

Development and Field Testing of Laser Photodiode Array-Based Vehicle Detection Systems  

E-Print Network (OSTI)

A Real-Time Laser-Based Detection System for Measurement ofTime Laser-Based Prototype Detection System for Measurement

2004-01-01T23:59:59.000Z

200

The synchronous active neutron detection system for spent fuel assay  

SciTech Connect

The authors have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit the unique operating features of a 14-MeV neutron generator developed by Schlumberger. This generator and a novel detection system will be applied to the direct measurement of the fissile material content in spent fuel in place of the indirect measures used at present. The technique they are investigating is termed synchronous active neutron detection (SAND). It closely follows a method that has been used routinely in other branches of physics to detect very small signals in the presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed {open_quotes}lock-in{close_quotes} amplifiers. The authors have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. This approach is possible because the Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. The results to date are preliminary but quite promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly. It also appears to be quite resilient to background neutron interference. The interrogating neutrons appear to be nonthermal and penetrating. Although a significant amount of work remains to fully explore the relevant physics and optimize the instrument design, the underlying concept appears sound.

Pickrell, M.M.; Kendall, P.K.

1994-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A Smart Sensor System for Carbon Monoxide Detection  

Science Conference Proceedings (OSTI)

This paper illustrates a smart sensor system for carbon monoxide detection. An innovative technological approach has been pursued to fabricate gas sensors on silicon substrate, compatible with IC fabrication. A mixed analog-digital electronic interface processes ... Keywords: sensor interfaces, sensors, sigma-delta converters

G. C. Cardinali; L. Dori; M. Fiorini; I. Sayago; G. Faglia; C. Perego; G. Sberveglieri; V. Liberali; F. Maloberti; D. Tonietto

1997-11-01T23:59:59.000Z

202

Distribution System Audits, Leak Detection, and Repair: Kirtland Air Force Base Leak Detection and Repair Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Best Management Practice Best Management Practice Case Study #3 Distribution System Audits, Leak Detection, and Repair Kirtland Air Force Base - Leak Detection and Repair Program Overview Kirtland Air Force Base (AFB) performed an award winning leak detection and repair program in 2006. The results of the project are saving Kirtland AFB 179 million gallons each year, which is over 16% of the total water use at the base. Kirtland AFB is located on 52,000 acres, southeast and adjacent to Albuquerque, New Mexico. The area is a high altitude desert, only receiving about 8 inches of rain each year. Kirtland AFB draws water from an under- ground aquifer via seven production wells through- out the base. The base also has access to water from the City of Albuquerque. The underground water

203

Distribution System Audits, Leak Detection, and Repair: Kirtland Air Force Base Leak Detection and Repair Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice Best Management Practice Case Study #3 Distribution System Audits, Leak Detection, and Repair Kirtland Air Force Base - Leak Detection and Repair Program Overview Kirtland Air Force Base (AFB) performed an award winning leak detection and repair program in 2006. The results of the project are saving Kirtland AFB 179 million gallons each year, which is over 16% of the total water use at the base. Kirtland AFB is located on 52,000 acres, southeast and adjacent to Albuquerque, New Mexico. The area is a high altitude desert, only receiving about 8 inches of rain each year. Kirtland AFB draws water from an under- ground aquifer via seven production wells through- out the base. The base also has access to water from the City of Albuquerque. The underground water

204

Machine Learning for Host-based Anomaly Detection by  

E-Print Network (OSTI)

Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly detectors model system call sequences to detect novel attacks. This dissertation makes four key contributions to detect host anomalies. First, we present an unsupervised approach to clean training data using novel representations for system call sequences. Second, supervised learning with system call arguments and other attributes is proposed for enriched modeling. Third, techniques to increase model coverage for improved accuracy are presented. Fourth, we propose spatio-temporal modeling to detect suspicious behavior for mobile hosts. Experimental results on various data sets indicate that our techniques are more effective than traditional methods in capturing attack-based host anomalies. Additionally, our supervised methods create succint models and the computational overhead incurred is reasonable for an online anomaly detection system. iii Acknowledgements An ancient saying in Sanskrit: Matri devo bhava (revere your mother), pitri devo

Gaurav Tandon; Gaurav Tandon; Philip K. Chan, Ph.D.; Marius C. Silaghi, Ph.D.; Georgios C. Anagnostopoulos, Ph.D.; Gaurav Tandon; Dissertation Advisor; Philip K. Chan, Ph.D.

2008-01-01T23:59:59.000Z

205

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage...  

Open Energy Info (EERE)

icon A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A...

206

A secure monitoring and control system for Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

The maintenance of Wireless Sensor Networks (WSNs) can carry high or prohibitive costs, particularly, if the WSN is deployed in unattended areas. Secure monitoring and control of the WSN is vital, however, practical systems are rare and limited with ... Keywords: Monitoring,Wireless sensor networks,Control systems,Intrusion detection,Elliptic curve cryptography

Michael Riecker, Rainer Thome, Dingwen Yuan, Matthias Hollick

2012-10-01T23:59:59.000Z

207

Integrated alarm annunciation and entry control systems -- Survey results  

SciTech Connect

This report provides the results and analyses of a detailed survey undertaken in Summer 1993 to address integrated intrusion detection alarm annunciation and entry control system issues. This survey was undertaken as a first attempt toward beginning to answer questions about integrated systems and commercial capabilities to meet or partially meet US Department of Energy (DOE) site needs.

Clever, J.J.; Arakaki, L.H.; Monaco, F.M.; Juarros, L.E.; Quintana, G.R.

1993-10-01T23:59:59.000Z

208

Engineering Design of a Continuous Duty $\\gamma$ -Production Proton Target for the Contraband Detection System  

E-Print Network (OSTI)

Engineering Design of a Continuous Duty $\\gamma$ -Production Proton Target for the Contraband Detection System

Rathke, J; Klein, J

1999-01-01T23:59:59.000Z

209

Miniature Integrated Nuclear Detection System (MINDS) | Princeton Plasma  

NLE Websites -- All DOE Office Websites (Extended Search)

News Room News Archive American Fusion News Press Releases Publications Weekly Highlights White Papers Fact Sheets Newsletters PPPL News Princeton Journal Watch Blog Events Research Education Organization Contact Us News Room News Archive American Fusion News Press Releases Publications Weekly Highlights White Papers Fact Sheets Newsletters PPPL News Princeton Journal Watch Blog Miniature Integrated Nuclear Detection System (MINDS) Anti-terrorism efforts are getting a boost from the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL). A team led by PPPL engineer Charles Gentile has developed a Miniature Integrated Nuclear Detection System, called MINDS, which can be used to scan moving vehicles, luggage, cargo vessels, and the like for specific nuclear signatures

210

Iterated Function System Models in Data Analysis: Detection and Separation  

E-Print Network (OSTI)

We investigate the use of iterated function system (IFS) models for data analysis. An IFS is a discrete dynamical system in which each time step corresponds to the application of one of a finite collection of maps. The maps, which represent distinct dynamical regimes, may act in some pre-determined sequence or may be applied in random order. An algorithm is developed to detect the sequence of regime switches under the assumption of continuity. This method is tested on a simple IFS and applied to an experimental computer performance data set. This methodology has a wide range of potential uses: from change-point detection in time-series data to the field of digital communications.

Zachary Alexander; Elizabeth Bradley; Joshua Garland; James D. Meiss

2011-08-15T23:59:59.000Z

211

Neutron Interrogation System For Underwater Threat Detection And Identification  

Science Conference Proceedings (OSTI)

Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

2009-03-10T23:59:59.000Z

212

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network (OSTI)

intensity matrix (CIM) Q X|U – a set of homogeneousset of U is empty, the CIM is simply a standard intensitytory. So we know which CIM is governing the transition

Xu, Jing

2010-01-01T23:59:59.000Z

213

Ultra-Wideband Guard Dog Intrusion Detection Sensors  

... in a variety of exercises, including a 5 star node configuration outdoors with satellite exfiltration and simultaneous internet broadcast.

214

NISTIR 6416, Applying Mobile Agents to Intrusion Detection ...  

Science Conference Proceedings (OSTI)

... Advanced Telecommunications/Information Distribution Research Program ... opportunities for improved automation in the ... a set of devices, when and ...

2012-11-09T23:59:59.000Z

215

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network (OSTI)

histogram. In ACM SIGMETRICS. Tandon, G. and Chan, P. K. (them in our experiments. Tandon and Chan (2005) look at a

Xu, Jing

2010-01-01T23:59:59.000Z

216

Secure Routing and Intrusion Detection in Ad Hoc Networks  

Science Conference Proceedings (OSTI)

... The loss or capture of unattended sensors and personal computing devices ... Traffic monitoring in wired networks is usually per- formed at switches ...

2007-09-19T23:59:59.000Z

217

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage  

Open Energy Info (EERE)

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Details Activities (0) Areas (0) Regions (0) Abstract: Lengshuiqing is part of the late Proterozoic igneous province from the western margin of the Yangtze craton. The Lengshuiqing area comprises five ultramafic-mafic intrusions, emplaced in the late Proterozoic Yanbian Group. The intrusions from Lengshuiqing contain cumulate ultramafic zones (peridotite + olivine pyroxenite), with cumulus olivine and Cr-spinel, and intercumulus pyroxenes, hornblende, phlogopite and plagioclase. Ni-Cu ore (pyrrhotite + pentlandite + chalcopyrite) is

218

Detecting unknown network attacks using language models  

Science Conference Proceedings (OSTI)

We propose a method for network intrusion detection based on language models such as n-grams and words. Our method proceeds by extracting these models from TCP connection payloads and applying unsupervised anomaly detection. The essential part ...

Konrad Rieck; Pavel Laskov

2006-07-01T23:59:59.000Z

219

Log Summarization and Anomaly Detection for TroubleshootingDistributed Systems  

SciTech Connect

Today's system monitoring tools are capable of detectingsystem failures such as host failures, OS errors, and network partitionsin near-real time. Unfortunately, the same cannot yet be said of theend-to-end distributed softwarestack. Any given action, for example,reliably transferring a directory of files, can involve a wide range ofcomplex and interrelated actions across multiple pieces of software:checking user certificates and permissions, getting details for allfiles, performing third-party transfers, understanding re-try policydecisions, etc. We present an infrastructure for troubleshooting complexmiddleware, a general purpose technique for configurable logsummarization, and an anomaly detection technique that works in near-realtime on running Grid middleware. We present results gathered using thisinfrastructure from instrumented Grid middleware and applications runningon the Emulab testbed. From these results, we analyze the effectivenessof several algorithms at accurately detecting a variety of performanceanomalies.

Gunter, Dan; Tierney, Brian L.; Brown, Aaron; Swany, Martin; Bresnahan, John; Schopf, Jennifer M.

2007-08-01T23:59:59.000Z

220

Methods and systems for detecting abnormal digital traffic  

DOE Patents (OSTI)

Aspects of the present invention encompass methods and systems for detecting abnormal digital traffic by assigning characterizations of network behaviors according to knowledge nodes and calculating a confidence value based on the characterizations from at least one knowledge node and on weighting factors associated with the knowledge nodes. The knowledge nodes include a characterization model based on prior network information. At least one of the knowledge nodes should not be based on fixed thresholds or signatures. The confidence value includes a quantification of the degree of confidence that the network behaviors constitute abnormal network traffic.

Goranson, Craig A [Kennewick, WA; Burnette, John R [Kennewick, WA

2011-03-22T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Image change detection systems, methods, and articles of manufacture  

DOE Patents (OSTI)

Aspects of the invention relate to image change detection systems, methods, and articles of manufacture. According to one aspect, a method of identifying differences between a plurality of images is described. The method includes loading a source image and a target image into memory of a computer, constructing source and target edge images from the source and target images to enable processing of multiband images, displaying the source and target images on a display device of the computer, aligning the source and target edge images, switching displaying of the source image and the target image on the display device, to enable identification of differences between the source image and the target image.

Jones, James L. (Idaho Falls, ID); Lassahn, Gordon D. (Idaho Falls, ID); Lancaster, Gregory D. (Idaho Falls, ID)

2010-01-05T23:59:59.000Z

222

Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant  

SciTech Connect

The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

1993-11-01T23:59:59.000Z

223

Distributed sensor system for fault detection and isolation in multistage manufacturing systems  

Science Conference Proceedings (OSTI)

With rapid innovations in sensing technology and the rising complexity in manufacturing processes, increasingly less expensive and smart devices with multiple heterogeneous on-board sensors, networked through wired or wireless links and deployable ... Keywords: DSS, MMS, data management, decision making, distributed control, distributed sensor systems, fault detection, fault isolation, industrial automation, information processing, multistage manufacturing systems, optimal design, sensor networks

Du Shi-Chang; Xi Li-Feng; Shi Jian-Jun

2006-03-01T23:59:59.000Z

224

Detection optimization using linear systems analysis of a coded aperture laser sensor system  

SciTech Connect

Minimum detectable irradiance levels for a diffraction grating based laser sensor were calculated to be governed by clutter noise resulting from reflected earth albedo. Features on the earth surface caused pseudo-imaging effects on the sensor`s detector arras that resulted in the limiting noise in the detection domain. It was theorized that a custom aperture transmission function existed that would optimize the detection of laser sources against this clutter background. Amplitude and phase aperture functions were investigated. Compared to the diffraction grating technique, a classical Young`s double-slit aperture technique was investigated as a possible optimized solution but was not shown to produce a system that had better clutter-noise limited minimum detectable irradiance. Even though the double-slit concept was not found to have a detection advantage over the slit-grating concept, one interesting concept grew out of the double-slit design that deserved mention in this report, namely the Barker-coded double-slit. This diffractive aperture design possessed properties that significantly improved the wavelength accuracy of the double-slit design. While a concept was not found to beat the slit-grating concept, the methodology used for the analysis and optimization is an example of the application of optoelectronic system-level linear analysis. The techniques outlined here can be used as a template for analysis of a wide range of optoelectronic systems where the entire system, both optical and electronic, contribute to the detection of complex spatial and temporal signals.

Gentry, S.M. [Sandia National Labs., Albuquerque, NM (United States). Optoelectronic Design Dept.

1994-09-01T23:59:59.000Z

225

High Altitude Aerial Natural Gas Leak Detection System  

SciTech Connect

The objective of this program was to develop and demonstrate a cost-effective and power-efficient advanced standoff sensing technology able to detect and quantify, from a high-altitude (> 10,000 ft) aircraft, natural gas leaking from a high-pressure pipeline. The advanced technology is based on an enhanced version of the Remote Methane Leak Detector (RMLD) platform developed previously by Physical Sciences Inc. (PSI). The RMLD combines a telecommunications-style diode laser, fiber-optic components, and low-cost DSP electronics with the well-understood principles of Wavelength Modulation Spectroscopy (WMS), to indicate the presence of natural gas located between the operator and a topographic target. The transceiver transmits a laser beam onto a topographic target and receives some of the laser light reflected by the target. The controller processes the received light signal to deduce the amount of methane in the laser's path. For use in the airborne platform, we modified three aspects of the RMLD, by: (1) inserting an Erbium-doped optical fiber laser amplifier to increase the transmitted laser power from 10 mW to 5W; (2) increasing the optical receiver diameter from 10 cm to 25 cm; and (3) altering the laser wavelength from 1653 nm to 1618 nm. The modified RMLD system provides a path-integrated methane concentration sensitivity {approx}5000 ppm-m, sufficient to detect the presence of a leak from a high capacity transmission line while discriminating against attenuation by ambient methane. In ground-based simulations of the aerial leak detection scenario, we demonstrated the ability to measure methane leaks within the laser beam path when it illuminates a topographic target 2000 m away. We also demonstrated simulated leak detection from ranges of 200 m using the 25 cm optical receiver without the fiber amplifier.

Richard T. Wainner; Mickey B. Frish; B. David Green; Matthew C. Laderer; Mark G. Allen; Joseph R. Morency

2006-12-31T23:59:59.000Z

226

System and method for detection of dispersed broadband signals  

DOE Patents (OSTI)

A system and method for detecting the presence of dispersed broadband signals in real time are disclosed. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos[l brace]2[phi](t)[r brace]. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase [phi](t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of [phi][prime](t). 10 figs.

Qian, S.; Dunham, M.E.

1999-06-08T23:59:59.000Z

227

ROBOTIC SYSTEMS for DEPLOYING SENSORS to DETECT CONTRABAND in CARGO  

E-Print Network (OSTI)

in this respect from sniffing explosives on the persons of terrorists passing through airports: explosives solvent detection, quadrupole mass spectrometry chemical taggant detection tandem/hybrid techniques

Siegel, Mel

228

ROBOTIC SYSTEMS for DEPLOYING SENSORS to DETECT CONTRABAND in CARGO  

E-Print Network (OSTI)

in this respect from sniffing explosives on the persons of terrorists passing through airports: explosives detection, quadrupole mass spectrometry chemical taggant detection tandem/hybrid techniques biosensors eddy

Siegel, Mel

229

Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring  

E-Print Network (OSTI)

Propulsion Laboratory, National Rev. 1.2 Strategies for Detection of Hidden Geothermal Systems Aeronautics and Space

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2004-01-01T23:59:59.000Z

230

Spreader-Bar Radiation Detection System Enhancements: A Modeling and Simulation Study  

SciTech Connect

This report provides the modeling and simulation results of the investigation of enhanced spreader bar radiation detection systems.

Ely, James H.; Ashbaker, Eric D.; Batdorf, Michael T.; Baciak, James E.; Hensley, Walter K.; Jarman, Kenneth D.; Robinson, Sean M.; Sandness, Gerald A.; Schweppe, John E.

2012-11-13T23:59:59.000Z

231

A Multi-Layer Phoswich Radioxenon Detection System  

SciTech Connect

Laboratory radioactive sources were used to characterize the phoswich detector. The CaF{sub 2} scintillator has a low light-yield and slow decay time, thus produces very small signals due to low-energy gamma rays or X-rays. Therefore, detection of 30 keV X-rays (from the xenon radioisotopes) using this layer and discriminating its very small signals from electronic noise was a challenging task. Several solutions were considered and experimentally evaluated. We found that the best solution would be extending the fast triangular filter from 10 taps to 30 taps. This will extend the peaking time of this filter from 25 nsec to 75 nsec. The digital filter is implemented in FPGA on our DPP2.0 and is used to trigger the detection system. Functionality of the new filter in capturing and discriminating 30 keV X-rays was confirmed by using a {sup 133}Ba gamma-ray source. Development of the DPP GUI software has continued with the addition of two new panels to display histograms of beta/gamma and beta/x-ray coincidence events. This includes coincidence events from a single channel, as well as two-channel, coincidence event. A pileup rejection algorithm has been implemented in the FPGA code, and controls to adjust its sensitivity have been added to the GUI. Work has begun on a new prototype system to develop a USB host interface between the PC and the FPGA to end reliance on Opal Kelly prototyping boards; the hardware for this system has been completely assembled, and the PC-side software is currently in development.

David M. Hamby

2008-07-14T23:59:59.000Z

232

'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State  

Science Conference Proceedings (OSTI)

This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

Miles McQueen; Annarita Giani

2011-09-01T23:59:59.000Z

233

DimaSense™: A Novel Nucleic Acid Detection System  

SciTech Connect

Recently, we developed a suite of methods for the rational design and fabrication of well-defined nanoparticle architectures, including clusters using bio-encoded nanoscale building blocks and layer-by-layer stepwise assembly on a solid support. In particular, the Nano-Assembly platform using Encoded Solid Supports (NAESS) allows for controlled interactions, purification of side products, modularity of design, and the construction of complex nanoparticle architectures. This approach offers several advantages over the current art of designing nanoparticle clusters, which include the high-yield synthesis of desired architectures, a 'plug-and-play' design allowing for the introduction of a variety of sensing modalities, and ease of scalability in high-throughput and synthesis yield. As a utility proof of concept, we implemented our unique cluster fabrication platform to design gold nanoparticle dimers which are linked via a single-stranded DNA oligonucleotide recognition motif. The design of this motif is such that binding of complementary nucleic acids results in specific, selective and rapid dimer dissociation, which can be monitored by dynamic light scattering (DLS). We demonstrated single level mismatch selectivity using this approach. The limit of detection was determined to be 1011 molecules of synthetic target RNA or DNA within 30 minutes of incubation at 33 C. This detection limit is determined by the dimer's concentration which can be probed by currently used standard DLS instruments. We also demonstrated a specific detection of target RNA in a solution containing competing 1,000-fold excess of non-complementary DNA fragments, 10% BSA, and endonucleases. Molecular diagnostic companies, RNA-based technology developers, and personalized medicine companies have applications that could benefit from using DimaSense{trademark}. The technology represents a platform which enables the simple and reasonably inexpensive design and fabrication of highly selective genetic sensors. These sensors operate with very low concentrations of target, can utilize standard instrumentation, produce detection results rapidly, and are robust enough to function in the presence of many competing genetic targets. Many current genetic target detection products/approaches/technologies rely upon methods (such as qPCR) which are more complicated, cumbersome, and costly to perform, and are not well suited to point-of-care diagnostic applications. Several clinical diagnostic applications, particularly point-of-care (POC) diagnostics for infectious diseases, are possible and appear to be a good fit for the technology. In addition, the advent of personalized medicine will create opportunities for molecular diagnostic companies with the capabilities of rapidly and quantitatively detecting nucleic acid sequences. The global POC market was {approx}$7.7B in 2010, with a recent annual growth rate of {approx}7%. A specific disease or disease-class diagnostic would need to be identified before a more meaningful sub-market value could be stated. Additional validation of the technology to show that it displays appropriate performance parameters for a commercial application on 'real world' samples is required for true commercial readiness. In addition, optimization of sensor design parameters, to effect a 10-fold increase in sensitivity, may be required to produce a commercially ready sensor system. These validation and sensor design optimization are estimated to require 3-4 months and {approx}$75k. For an unregulated product to give this sensor system a distinct competitive advantage, 2-3 years of product development and $1.5-3M are likely required. For regulated markets, time to market (through clinic) and cost would depend upon the product.

Stadler, A.

2011-05-18T23:59:59.000Z

234

Non-Intrusive Occupancy Monitoring using Smart Meters  

Science Conference Proceedings (OSTI)

Detailed information about a home's occupancy is necessary to implement many advanced energy-efficiency optimizations. However, monitoring occupancy directly is intrusive, typically requiring the deployment of multiple environmental sensors, e.g., motion, ... Keywords: Electricity, Energy, Grid

Dong Chen, Sean Barker, Adarsh Subbaswamy, David Irwin, Prashant Shenoy

2013-11-01T23:59:59.000Z

235

The Diagnosis of Vertical Motion within Dry Intrusions  

Science Conference Proceedings (OSTI)

Dry intrusions play an important role in modulating precipitation patterns both in the midlatitudes and in the Tropics. The lifting of unsaturated air aloft often leads to destabilization and the enhancement of precipitation rates, and may ...

Richard P. James; John H. E. Clark

2003-10-01T23:59:59.000Z

236

Equilibration of Two-Dimensional Double-Diffusive Intrusions  

Science Conference Proceedings (OSTI)

This paper considers the equilibration of lateral intrusions in a doubly diffusive fluid with uniform unbounded basic-state gradients in temperature and salinity. These are density compensated in the horizontal direction and finger favorable in ...

Julian Simeonov; Melvin E. Stern

2007-03-01T23:59:59.000Z

237

Warm-Air Intrusions in Arizona’s Meteor Crater  

Science Conference Proceedings (OSTI)

Episodic nighttime intrusions of warm air, accompanied by strong winds, enter the enclosed near-circular Meteor Crater basin on clear, synoptically undisturbed nights. Data analysis is used to document these events and to determine their spatial ...

Bianca Adler; C. David Whiteman; Sebastian W. Hoch; Manuela Lehner; Norbert Kalthoff

2012-06-01T23:59:59.000Z

238

Mutual Intrusion of a Gravity Current and Density Front Formation  

Science Conference Proceedings (OSTI)

A two-dimensional prognostic model was employed to examine the mutual intrusion of a gravity current and the formation of a density front. The results indicated strong vertical motion near the front and, with Earth rotation included, a baroclinic ...

Dono-Ping Wang

1984-07-01T23:59:59.000Z

239

Interactive visualization for network and port scan detection  

Science Conference Proceedings (OSTI)

Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connection is attempted to each port on a given destination. Being able to detect ... Keywords: information visualization, intrusion detection, network scans, network security, port scans, user interfaces

Chris Muelder; Kwan-Liu Ma; Tony Bartoletti

2005-09-01T23:59:59.000Z

240

Low cost fault detection system for railcars and tracks  

E-Print Network (OSTI)

A "low cost fault detection system" that identifies wheel flats and defective tracks is explored here. This is achieved with the conjunction of sensors, microcontrollers and Radio Frequency (RF) transceivers. The objective of the proposed research is to identify faults plaguing railcars and to be able to clearly distinguish the faults of a railcar from the inherent faults in the track. The focus of the research though, is mainly to identify wheel flats and defective tracks. The thesis has been written with the premise that the results from the simulation software GENSYS are close to the real time data that would have been obtained from an actual railcar. Based on the results of GENSYS, a suitable algorithm is written that helps segregate a fault in a railcar from a defect in a track. The above code is implemented using hardware including microcontrollers, accelerometers, RF transceivers and a real time monitor. An enclosure houses the system completely, so that it is ready for application in a real environment. This also involves selection of suitable hardware so that there is a uniform source of power supply that reduces the cost and assists in building a robust system.

Vengalathur, Sriram T.

2003-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system. Volume 1  

Science Conference Proceedings (OSTI)

The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data.

Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

1993-03-01T23:59:59.000Z

242

Scoping study of SNM detection and indentification for adjunct on-site treaty monitoring. Final report  

SciTech Connect

Following the fall of the Soviet Union, political pressure to negotiate meaningful nuclear arms agreements with Russia and the former soviet republics has increased. Anticipating the monitoring requirements of a future treaty for the decommissioning and disassembly of nuclear warheads presents opportunities to review existing monitoring technologies and to explore new methods to detect and analyze intrinsic radiation. Fully instrumented radiation-detection systems with a range of monitoring capabilities are available, but special-purpose instruments will still need to be developed to match increasing demands for high-confidence, low-intrusion monitoring in a specific scenario. As a guide to present capabilities in monitoring technologies, we have categorized their relevant attributes to detect and identify special nuclear material based on levels of confidence, intrusiveness, vulnerability, and other critical concerns. To add additional flexibility, we review emerging technologies and estimate the development time to bring them to operational status.

Murray, W.S.; Morgado, R.E.; Frankle, C.M.

1995-07-01T23:59:59.000Z

243

Nuisance Source Population Modeling for Radiation Detection System Analysis  

SciTech Connect

A major challenge facing the prospective deployment of radiation detection systems for homeland security applications is the discrimination of radiological or nuclear 'threat sources' from radioactive, but benign, 'nuisance sources'. Common examples of such nuisance sources include naturally occurring radioactive material (NORM), medical patients who have received radioactive drugs for either diagnostics or treatment, and industrial sources. A sensitive detector that cannot distinguish between 'threat' and 'benign' classes will generate false positives which, if sufficiently frequent, will preclude it from being operationally deployed. In this report, we describe a first-principles physics-based modeling approach that is used to approximate the physical properties and corresponding gamma ray spectral signatures of real nuisance sources. Specific models are proposed for the three nuisance source classes - NORM, medical and industrial. The models can be validated against measured data - that is, energy spectra generated with the model can be compared to actual nuisance source data. We show by example how this is done for NORM and medical sources, using data sets obtained from spectroscopic detector deployments for cargo container screening and urban area traffic screening, respectively. In addition to capturing the range of radioactive signatures of individual nuisance sources, a nuisance source population model must generate sources with a frequency of occurrence consistent with that found in actual movement of goods and people. Measured radiation detection data can indicate these frequencies, but, at present, such data are available only for a very limited set of locations and time periods. In this report, we make more general estimates of frequencies for NORM and medical sources using a range of data sources such as shipping manifests and medical treatment statistics. We also identify potential data sources for industrial source frequencies, but leave the task of estimating these frequencies for future work. Modeling of nuisance source populations is only useful if it helps in understanding detector system performance in real operational environments. Examples of previous studies in which nuisance source models played a key role are briefly discussed. These include screening of in-bound urban traffic and monitoring of shipping containers in transit to U.S. ports.

Sokkappa, P; Lange, D; Nelson, K; Wheeler, R

2009-10-05T23:59:59.000Z

244

Automated tools to implement and test Internet systems in reconfigurable hardware  

Science Conference Proceedings (OSTI)

Tools have been developed to automatically integrate and test networking systems in reconfigurable hardware. These tools dynamically generate circuits for Field Programmable Gate Arrays (FPGAs). A library of hardware-accelerated modules has been developed ... Keywords: Field Programmable Gate Array (FPGA), Internet, firewall, network intrusion detection and prevention, networks, reconfigurable hardware, tools

John W. Lockwood; Chris Neely; Chris Zuver; Dave Lim

2003-07-01T23:59:59.000Z

245

A Theoretical Structural Impairment Detection System for Timber Railway Bridges  

E-Print Network (OSTI)

The objective of this research is to develop a theoretical Structural Impairment Detection System (SIDS) for timber railway bridges. Due to fatigue, the timber stringers in timber railway bridges develop shear cracks. These shear cracks lead to higher bridge deflections, higher stresses in the stringers and rail, and shorter fatigue life of the system. A SIDS is proposed which links wheel path accelerations obtained from traversing freight cars to the condition of the bridge. In order to develop the SIDS, two models of timber railway bridges with various levels of structural impairment were developed. The first model was a quasi-static model developed from classical beam theory and implemented in MATLAB. The second model was a dynamic, finite element model created in LS-DYNA. Traversing axle loads were imposed on the models. The results obtained from the model were the wheel paths the axles take as they traverse the bridge. The paths were expressed as vertical displacements as a function of position on the bridge. Wheel path accelerations were obtained by numerically differentiating the vertical displacements. The accelerations were then used to train neural networks to have an input of an acceleration vector and an output of a bridge condition vector. The neural networks were trained on results from both models under three train speeds: 40 mph, 30 mph, and 20 mph. The networks were able to determine the correct bridge condition 90% of the time when the train speed was 40 mph and 70% of the time when the train speed was 30 mph. The networks were not successful in determining bridge condition when the train speed was 20 mph.

Orsak, John

2012-05-01T23:59:59.000Z

246

Detecting illicit leakage of information in operating systems  

Science Conference Proceedings (OSTI)

Keywords: analysis, audit collection, data transmission, information flow, multi-level secure systems, operating system security

Shiuh-Pyng Shieh; Virgil D. Gligor

1996-01-01T23:59:59.000Z

247

Strategies For Detecting Hidden Geothermal Systems By Near-Surface...  

Open Energy Info (EERE)

stress resulting from elevated CO2 concentrations, and (5) light detection and ranging (LIDAR) that can measure CO2 concentrations over an integrated path. Technologies currently...

248

Fault Detection and Diagnosis in Building HVAC Systems  

E-Print Network (OSTI)

in AHU of VAV system”, Energy Conversion & Management, 30.energy efficient building management system”, Energy Conversionenergy efficient building management system”, Energy Conversion

Najafi, Massieh

2010-01-01T23:59:59.000Z

249

Nanotechnology-Based Systems for Nuclear Radiation and Chemicl Detection  

SciTech Connect

This main objectives of this effort are the development and prototyping of a small. sensitive, and low-cost multi-channel nanoparticle scintillation microdevice with integrated waveguides for alpha, beta, gamma, and neutron detection. This research effort has integrated experiments and simulation to determine the combination of process-specific materials for the achievement optimum detection conditions.

Kody Varahramyan; Pedro Derosa; Chester Wilson

2006-10-11T23:59:59.000Z

250

Recurrent neuro-fuzzy system for fault detection and isolation in nuclear reactors  

Science Conference Proceedings (OSTI)

This paper presents an application of recurrent neuro-fuzzy systems to fault detection and isolation in nuclear reactors. A general framework is adopted, in which a fuzzification module is linked to an inference module that is actually a neural network ... Keywords: Diagnostic system, Fault detection and isolation, Human-machine integration, Neuro-fuzzy systems, Nuclear power plants, Recurrent neural networks

Alexandre Evsukoff; Sylviane Gentil

2005-01-01T23:59:59.000Z

251

A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS  

E-Print Network (OSTI)

1 A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS T. I describes a control scheme with fault detection capabilities suitable for application to HVAC systems as a reference of correct operation. Faults that occur in the HVAC system under control cause the PI

252

DADICC: Intelligent system for anomaly detection in a combined cycle gas turbine plant  

Science Conference Proceedings (OSTI)

DADICC is the abbreviated name for an intelligent system able to detect on-line and diagnose anomalies as soon as possible in the dynamic evolution of the behaviour of a power plant based on a combined cycle gas turbine. In order to reach this objective, ... Keywords: Anomaly detection, Diagnosis, Expert system, Multi-agent system, Neural network, Normal behaviour

Antonio Arranz; Alberto Cruz; Miguel A. Sanz-Bobi; Pablo Ruíz; Josué Coutiño

2008-05-01T23:59:59.000Z

253

Automatic expert system based on images for accuracy crop row detection in maize fields  

Science Conference Proceedings (OSTI)

This paper proposes an automatic expert system for accuracy crop row detection in maize fields based on images acquired from a vision system. Different applications in maize, particularly those based on site specific treatments, require the identification ... Keywords: Crop row detection in maize fields, Expert system, Image segmentation, Image thresholding, Linear regression, Machine vision, Theil-Sen estimator

J. M. Guerrero; M. Guijarro; M. Montalvo; J. Romeo; L. Emmi; A. Ribeiro; G. Pajares

2013-02-01T23:59:59.000Z

254

Advanced X-ray Systems for the Detection of Special Nuclear ...  

Science Conference Proceedings (OSTI)

... The Dosimetry Group provides support to the Domestic Nuclear Detection Office ... radiation dosimetry in and around these high-energy systems. ...

2013-03-13T23:59:59.000Z

255

Fault detection of fault ride through for doubly-fed induction generator based wind energy systems.  

E-Print Network (OSTI)

??Fault detection and mitigation is of high importance for existing DFIG based wind energy conversion systems. Keeping the doubly-fed induction generator (DFIG) online during faults… (more)

Ramroop, Shoba AD

2008-01-01T23:59:59.000Z

256

Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas  

Open Energy Info (EERE)

Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Monitoring Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Report: Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Monitoring Details Activities (6) Areas (1) Regions (0) Abstract: Hidden geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the

257

Lightning Direction-Finding Systems for Forest Fire Detection  

Science Conference Proceedings (OSTI)

Extensive networks of magnetic direction-finding (DF) stations have been installed throughout the western United States and Alaska to facilitate early detection of lightning-caused fires. Each station contains a new wideband direction-finder that ...

E. P. Krider; R. C. Noggle; A. E. Pifer; D. L. Vance

1980-09-01T23:59:59.000Z

258

A Flushing Model of Onslow Bay, North Carolina, Based on Intrusion Volumes  

Science Conference Proceedings (OSTI)

Onslow Bay, North Carolina, is repeatedly flushed by intrusions of Gulf Stream water. An exponential dilution model based on intrusion models indicates 20–60 days are required for 50% dilution of Bay waters.

Larry P. Atkinson; Leonard J. Pietrafesa

1980-03-01T23:59:59.000Z

259

Non-intrusive refrigerant charge indicator - Energy ...  

... -phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, ...

260

The Three-Dimensional Mapping of a Small Thermohaline Intrusion  

Science Conference Proceedings (OSTI)

During the Mixed-Layer Experiment (MILE) at Ocean Station P in August-September 1977. a depth-cycling towed CTD was used to map intrusions below the seasonal thermocline. In a 10 km square two prominent minima in temperature and salinity were ...

M. C. Grego

1980-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Distribution and Circulation of the Coastal Oyashio Intrusion  

Science Conference Proceedings (OSTI)

The distribution and circulation of the coastal Oyashio intrusion were examined with a CTD and shipboard ADCP survey conducted in the vicinity of the east coast of Japan in May 1994. The estimate of mixing ratios in the density range of 26.4–27.2 ...

Yugo Shimizu; Ichiro Yasuda; Shin-ichi Ito

2001-06-01T23:59:59.000Z

262

Anomaly detection in extremist web forums using a dynamical systems approach  

Science Conference Proceedings (OSTI)

In this paper, we present preliminary results of analyzing data from the Dark Web collection using a dynamical systems approach for unsupervised anomaly detection. The goal is to provide a robust, focus-of-attention mechanism to identify emerging threats ... Keywords: data mining, dynamical systems, finite-time Lyapunov exponents, unsupervised anomaly detection

Steve Kramer

2010-07-01T23:59:59.000Z

263

High-speed and high-fidelity system and method for collecting network traffic  

DOE Patents (OSTI)

A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

Weigle, Eric H. (Los Alamos, NM)

2010-08-24T23:59:59.000Z

264

Video systems for alarm assessment  

SciTech Connect

The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing closed-circuit television systems for video alarm assessment. There is a section on each of the major components in a video system: camera, lens, lighting, transmission, synchronization, switcher, monitor, and recorder. Each section includes information on component selection, procurement, installation, test, and maintenance. Considerations for system integration of the components are contained in each section. System emphasis is focused on perimeter intrusion detection and assessment systems. A glossary of video terms is included. 13 figs., 9 tabs.

Greenwoll, D.A.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Ebel, P.E. (BE, Inc., Barnwell, SC (United States))

1991-09-01T23:59:59.000Z

265

A Reference Based Analysis Framework for Analyzing System Call Traces  

SciTech Connect

Reference based analysis (RBA) is a novel data mining tool for exploring a test data set with respect to a reference data set. The power of RBA lies in it ability to transform any complex data type, such as symbolic sequences and multi-variate categorical data instances, into a multivariate continuous representation. The transformed representation not only allows visualization of the complex data, which cannot be otherwise visualized in its original form, but also allows enhanced anomaly detection in the transformed feature space. We demonstrate the application of the RBA framework in analyzing system call traces and show how the transformation results in improved intrusion detection performance over state of art data mining based intrusion detection methods developed for system call traces.

Chandola, Varun [ORNL; Kumar, Vipin [University of Minnesota; Boriah, Shyam [University of Minnesota

2010-01-01T23:59:59.000Z

266

System Assurance: Beyond Detecting Vulnerabilities, 1st edition  

Science Conference Proceedings (OSTI)

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable ...

Nikolai Mansourov; Djenana Campara

2010-12-01T23:59:59.000Z

267

Reliability testing of active SDHW components. Part III. Development of a fault detection system  

SciTech Connect

This report describes a fault detection system developed for solar domestic hot water systems that will assist the homeowner and repairman in detecting major operational faults with the system. A study by the Florida Solar Energy Center showed that most homeowners were unaware of how well their systems were operating. With this need in mind, we developed a system that will detect and display circulation failures, nighttime circulation, freeze protection failure, and overheating protection failure. Cost of the unit using retail prices for components is less than $55.00 (1985 $), excluding the sensors. Fault detection systems are necessary, since it is difficult for homeowners to know the status of their system. Our device is sufficiently developed for industry to use, although further development of some of the sensors and some cost reduction is necessary.

Farrington, R.B.

1986-01-01T23:59:59.000Z

268

ADWICE – anomaly detection with real-time incremental clustering  

Science Conference Proceedings (OSTI)

Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in real-time places hard requirements on the algorithms used, making many proposed ... Keywords: adaptability, anomaly detection, clustering, intrusion detection, realtime

Kalle Burbeck; Simin Nadjm-Tehrani

2004-12-01T23:59:59.000Z

269

Attacks against process control systems: risk assessment, detection, and response  

Science Conference Proceedings (OSTI)

In the last years there has been an increasing interest in the security of process control and SCADA systems. Furthermore, recent computer attacks such as the Stuxnet worm, have shown there are parties with the motivation and resources to effectively ... Keywords: IDS, SCADA, control systems, critical infrastructure protection, cyber-physical systems, security

Alvaro A. Cárdenas; Saurabh Amin; Zong-Syun Lin; Yu-Lun Huang; Chi-Yen Huang; Shankar Sastry

2011-03-01T23:59:59.000Z

270

Flight Testing of an Advanced Airborne Natural Gas Leak Detection System  

SciTech Connect

ITT Industries Space Systems Division (Space Systems) has developed an airborne natural gas leak detection system designed to detect, image, quantify, and precisely locate leaks from natural gas transmission pipelines. This system is called the Airborne Natural Gas Emission Lidar (ANGEL) system. The ANGEL system uses a highly sensitive differential absorption Lidar technology to remotely detect pipeline leaks. The ANGEL System is operated from a fixed wing aircraft and includes automatic scanning, pointing system, and pilot guidance systems. During a pipeline inspection, the ANGEL system aircraft flies at an elevation of 1000 feet above the ground at speeds of between 100 and 150 mph. Under this contract with DOE/NETL, Space Systems was funded to integrate the ANGEL sensor into a test aircraft and conduct a series of flight tests over a variety of test targets including simulated natural gas pipeline leaks. Following early tests in upstate New York in the summer of 2004, the ANGEL system was deployed to Casper, Wyoming to participate in a set of DOE-sponsored field tests at the Rocky Mountain Oilfield Testing Center (RMOTC). At RMOTC the Space Systems team completed integration of the system and flew an operational system for the first time. The ANGEL system flew 2 missions/day for the duration for the 5-day test. Over the course of the week the ANGEL System detected leaks ranging from 100 to 5,000 scfh.

Dawn Lenz; Raymond T. Lines; Darryl Murdock; Jeffrey Owen; Steven Stearns; Michael Stoogenke

2005-10-01T23:59:59.000Z

271

Circuitry, systems and methods for detecting magnetic fields  

SciTech Connect

Circuitry for detecting magnetic fields includes a first magnetoresistive sensor and a second magnetoresistive sensor configured to form a gradiometer. The circuitry includes a digital signal processor and a first feedback loop coupled between the first magnetoresistive sensor and the digital signal processor. A second feedback loop which is discrete from the first feedback loop is coupled between the second magnetoresistive sensor and the digital signal processor.

Kotter, Dale K. (Shelley, ID); Spencer, David F. (Idaho Falls, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID)

2010-09-14T23:59:59.000Z

272

Strategies To Detect Hidden Geothermal Systems Based On Monitoring...  

Open Energy Info (EERE)

Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article:...

273

Fault Detection and Diagnosis in Building HVAC Systems.  

E-Print Network (OSTI)

??Building HVAC systems account for more than 30% of annual energy consumption in United States. However, it has become apparent that only in a small… (more)

Najafi, Massieh

2010-01-01T23:59:59.000Z

274

Systems and methods for detecting a flame in a fuel nozzle of a gas turbine  

SciTech Connect

A system may detect a flame about a fuel nozzle of a gas turbine. The gas turbine may have a compressor and a combustor. The system may include a first pressure sensor, a second pressure sensor, and a transducer. The first pressure sensor may detect a first pressure upstream of the fuel nozzle. The second pressure sensor may detect a second pressure downstream of the fuel nozzle. The transducer may be operable to detect a pressure difference between the first pressure sensor and the second pressure sensor.

Kraemer, Gilbert Otto; Storey, James Michael; Lipinski, John; Mestroni, Julio Enrique; Williamson, David Lee; Marshall, Jason Randolph; Krull, Anthony

2013-05-07T23:59:59.000Z

275

Human detection with a multi-sensors stereovision system  

E-Print Network (OSTI)

is a part of the Integrated Energy Systems - Productivity and Buildings Science program, a Public Interest Energy Research (PIER) program. It is funded by California ratepayers through California's System Benefit collection, the Daylight Code classification, and review of the work. Review and Advisory Committee: Dr. Jed

276

Detection system based on a novel large area hybrid detector  

Science Conference Proceedings (OSTI)

A system level implementation of a large area hybrid detector is presented. The detector used in this system consists of an array of hydrogenated amorphous silicon photodiodes directly connected to a CMOS readout chip, which is vertically integrated ... Keywords: Amorphous silicon, Hybrid detectors, Large area photodetectors

A. Nascetti; P. Valerio; D. Caputo; G. de Cesare

2010-11-01T23:59:59.000Z

277

Optically Detected Magnetic Resonance Studies on ?-conjugated semiconductor systems  

Science Conference Proceedings (OSTI)

Optically Detected Magnetic Resonance (ODMR) techniques were used to investigate the dynamics of excitons and charge carriers in ?-conjugated organic semiconductors. Degradation behavior of the negative spin-1/2 electroluminescence-detected magnetic resonance (ELDMR) was observed in Alq3 devices. The increase in the resonance amplitude implies an increasing bipolaron formation during degradation, which might be the result of growth of charge traps in the device. The same behavior of the negative spin-1/2 ELDMR was observed in 2wt% Rubrene doped Tris(8-hydroxyquinolinato)aluminium (Alq3) devices. However, with increasing injection current, a positive spin-1/2 ELDMR, together with positive spin 1 triplet powder patterns at {delta}m{sub S}={+-}1 and {delta}m{sub S}={+-}2, emerges. Due to the similarities in the frequency dependences of single and double modulated ELDMR and the photoluminescence-detected magnetic resonance (PLDMR) results in poly[2-methoxy-5-(2 -ethyl-hexyloxy)-1,4-phenyl ene vinylene] (MEH-PPV) films, the mechanism for this positive spin-1/2 ELDMR was assigned to enhanced triplet-polaron quenching under resonance conditions. The ELDMR in rubrene doped Alq3 devices provides a path to investigate charge distribution in the device under operational conditions. Combining the results of several devices with different carrier blocking properties and the results from transient EL, it was concluded trions not only exist near buffer layer but also exist in the electron transport layer. This TPQ model can also be used to explain the positive spin-1/2 PLDMR in poly(3-hexylthiophene) (P3HT) films at low temperature and in MEH-PPV films at various temperatures up to room temperature. Through quantitative analysis, TE-polaron quenching (TPQ) model is shown having the ability to explain most behaviors of the positive spin-1/2 resonance. Photocurrent detected magnetic resonance (PCDMR) studies on MEH-PPV devices revealed a novel transient resonance signal. The signal may originate from the higher concentration of deep traps near cathode. A quantitative analysis based on this assumption was carried out and found to be consistent with the experimental results.

Chen, Ying

2011-12-06T23:59:59.000Z

278

Fault Detection and Diagnosis in Building HVAC Systems  

E-Print Network (OSTI)

techniques for model-based FDD methods applied to vapordetection and diagnosis (FDD) has been an active area for6-17]. In building HVAC systems, FDD has received increasing

Najafi, Massieh

2010-01-01T23:59:59.000Z

279

HONEY: A Multimodality Fall Detection and Telecare System  

E-Print Network (OSTI)

to provide home-based telecare instead of institutionalized healthcare. Falling is one of the most common. To facilitate a reliable, safe and real-time home-based healthcare environment, we propose the HONEY system

Shi, Weisong

280

Systems and methods of detecting force and stress using tetrapod nanocrystal  

DOE Patents (OSTI)

Systems and methods of detecting force on the nanoscale including methods for detecting force using a tetrapod nanocrystal by exposing the tetrapod nanocrystal to light, which produces a luminescent response by the tetrapod nanocrystal. The method continues with detecting a difference in the luminescent response by the tetrapod nanocrystal relative to a base luminescent response that indicates a force between a first and second medium or stresses or strains experienced within a material. Such systems and methods find use with biological systems to measure forces in biological events or interactions.

Choi, Charina L.; Koski, Kristie J.; Sivasankar, Sanjeevi; Alivisatos, A. Paul

2013-08-20T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Radiation detection system for portable gamma-ray spectroscopy  

DOE Patents (OSTI)

A portable gamma ray detection apparatus having a gamma ray detector encapsulated by a compact isolation structure having at least two volumetrically-nested enclosures where at least one is a thermal shield. The enclosures are suspension-mounted to each other to successively encapsulate the detector without structural penetrations through the thermal shields. A low power cooler is also provided capable of cooling the detector to cryogenic temperatures without consuming cryogens, due to the heat load reduction by the isolation structure and the reduction in the power requirements of the cooler. The apparatus also includes a lightweight portable power source for supplying power to the apparatus, including to the cooler and the processing means, and reducing the weight of the apparatus to enable handheld operation or toting on a user's person.

Rowland, Mark S. (Alamo, CA); Howard, Douglas E. (Livermore, CA); Wong, James L. (Dublin, CA); Jessup, James L. (Tracy, CA); Bianchini, Greg M. (Livermore, CA); Miller, Wayne O. (Livermore, CA)

2006-06-20T23:59:59.000Z

282

Automated system for detection of epileptiform patterns in EEG by using a modified RBFN classifier  

Science Conference Proceedings (OSTI)

In this paper, we present a two-stage system based on a modified radial basis function network (RBFN) classifier for an automated detection of epileptiform pattern (EP) in an electroencephalographic signal. In the first stage, a discrete perceptron fed ... Keywords: Automatic spike detection, EEG, Neural networks, Pattern recognition, Radial basis function networks

Nurettin Ac?r

2005-08-01T23:59:59.000Z

283

Image replica detection system utilizing R-trees and linear discriminant analysis  

Science Conference Proceedings (OSTI)

This manuscript introduces a novel system for content-based identification of image replicas. The proposed approach utilizes image resemblance for deciding whether a test image has been replicated from a certain original or not. We formulate replica ... Keywords: Content-based monitoring, Copy image detection, Copyright protection, Fingerprinting, Linear discriminant analysis (LDA), Perceptual hashing, R-tree indexing, Replica detection, Robust hashing

Spiros Nikolopoulos; Stafanos Zafeiriou; Nikos Nikolaidis; Ioannis Pitas

2010-03-01T23:59:59.000Z

284

On a Graphics Hardware-Based Vortex Detection and Visualization System  

Science Conference Proceedings (OSTI)

We present a graphics hardware-based system for interactive denoising, vortex detection, and visualization of vector data. No intermediate results need to be read back by the application once the vector field has been loaded onto the graphics adapter. ... Keywords: Flow visualization, Graphics hardware, Vortex detection

S. Stegmaier; T. Ertl

2005-04-01T23:59:59.000Z

285

Non-Intrusive Appliance Load Monitoring: Promise and Practice  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fraunhofer USA Fraunhofer USA Non-intrusive Appliance Load Monitoring (NIALM): Promise and Practice Michael Zeifman, Ph.D. and Kurt Roth, Ph.D. March 1 st , 2012 Building America Stakeholder Meeting © Fraunhofer USA What Is NIALM?  Non-Intrusive Appliance Load Monitoring  A.k.a. Non-Intrusive Load Monitoring  Main breaker/circuit level  Data acquisition (hardware) and disaggregation algorithms (software) 2 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 600 800 1000 1200 1400 Time Power, W 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Power, W Coffee Maker 07:00 07:30 08:00 08:30 09:00 09:30 0 500 1000 Power, W Refrigerator 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Time Power, W TV © Fraunhofer USA NIALM: Interest  Significant growth in U.S. granted patents

286

A Hierarchical Rule-Based Fault Detection and Diagnostic Method for HVAC Systems  

E-Print Network (OSTI)

A rule-based, system-level fault detection and diagnostic (FDD) method for HVAC systems was developed. It functions as an interface between multiple, equipment-specific FDD tools and a human operator. The method resolves and prioritizes conflicting fault reports from equipment-specific FDD tools, performs FDD at the system level, and presents an integrated view of an HVAC system’s fault status to an operator. A simulation study to test and evaluate the method was conducted.

Jeffrey Schein; Steven T. Bushby

2005-01-01T23:59:59.000Z

287

Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.  

Science Conference Proceedings (OSTI)

Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O. [Stonewater Control Systems, Inc., Kannapolis, NC

2013-02-01T23:59:59.000Z

288

TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems  

E-Print Network (OSTI)

Light detection systems in Liquid Argon Time Projection Chambers (LArTPCs) require the detection of the 128 nm light produced during argon scintillation. Most detectors use Tetraphenyl Butadiene (TPB) to shift the wavelength of the light into a range visible to Photomultiplier Tubes (PMTs). These proceedings summarize characterizations of light-guides coated with a matrix of TPB in UV transmitting acrylic which are more compact than existing LArTPC light collection systems.

Ignarra, C M

2013-01-01T23:59:59.000Z

289

An Analysis of a Spreader Bar Crane Mounted Gamma-Ray Radiation Detection System  

E-Print Network (OSTI)

Over 95% of imports entering the United States from outside North America arrive via cargo containers by sea at 329 ports of entry. The current layered approach for the detection only scans 5% of cargo bound for the United States. This is inadequate to protect our country. This research involved the building of a gamma-ray radiation detection system used for cargo scanning. The system was mounted on a spreader bar crane (SBC) at the Port of Tacoma (PoT) and the applicability and capabilities of the system were analyzed. The detection system provided continuous count rate and spectroscopic data among three detectors while operating in an extreme environment. In a separate set of experiments, 60Co and 137Cs sources were positioned inside a cargo container and data were recorded for several count times. The Monte Carlo N-Particle (MCNP) code was used to simulate a radioactive source inside an empty cargo container and the results were compared to experimentally recorded data. The detection system demonstrated the ability to detect 60Co, 137Cs, 192Ir, highly-enriched uranium (HEU), and weapons-grade plutonium (WGPu) with minimum detectable activities (MDA) of 5.9 ± 0.4 microcuries (?Ci), 19.3 ± 1.1 ?Ci, 11.7 ± 0.6 ?Ci, 3.5 ± 0.3 kilograms (kg), and 30.6 ± 1.3 grams (g), respectively. This system proved strong gamma-ray detection capabilities, but was limited in the detection of fissile materials Additional details of this system are presented and advantages of this approach to cargo scanning over current approaches are discussed.

Grypp, Matthew D

2013-05-01T23:59:59.000Z

290

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the...

291

Statistically qualified neuro-analytic failure detection method and system  

DOE Patents (OSTI)

An apparatus and method for monitoring a process involve development and application of a statistically qualified neuro-analytic (SQNA) model to accurately and reliably identify process change. The development of the SQNA model is accomplished in two stages: deterministic model adaption and stochastic model modification of the deterministic model adaptation. Deterministic model adaption involves formulating an analytic model of the process representing known process characteristics, augmenting the analytic model with a neural network that captures unknown process characteristics, and training the resulting neuro-analytic model by adjusting the neural network weights according to a unique scaled equation error minimization technique. Stochastic model modification involves qualifying any remaining uncertainty in the trained neuro-analytic model by formulating a likelihood function, given an error propagation equation, for computing the probability that the neuro-analytic model generates measured process output. Preferably, the developed SQNA model is validated using known sequential probability ratio tests and applied to the process as an on-line monitoring system. Illustrative of the method and apparatus, the method is applied to a peristaltic pump system.

Vilim, Richard B. (Aurora, IL); Garcia, Humberto E. (Idaho Falls, ID); Chen, Frederick W. (Naperville, IL)

2002-03-02T23:59:59.000Z

292

Characterization of mixed waste for sorting and inspection using non-intrusive methods  

SciTech Connect

Characterization of mixed wastes (that is, radioactive and otherwise hazardous) requires that all hazardous, non-conforming, and radioactive materials be identified, localized, and quantified. With such information, decisions can be made regarding whether the item is treatable or has been adequately treated. Much of the required information can be gained without taking representative samples and analyzing them in a chemistry laboratory. Non-intrusive methods can be used to provide this information on-line at the waste treatment facility. Ideally, the characterization would be done robotically, and either automatically or semi-automatically in order to improve efficiency and safety. For the FY94 Mixed Waste Operations (MWO) project, a treatable waste item is defined as a homogeneous metal object that has external radioactive or heavy metal hazardous contamination. Surface treatment of some kind would therefore be the treatment method to be investigated. The authors developed sorting and inspection requirements, and assessed viable non-intrusive techniques to meet these requirements. They selected radiography, computed tomography and X-ray fluorescence. They have characterized selected mock waste items, and determined minimum detectable amounts of materials. They have demonstrated the efficiency possible by integrating radiographic with tomographic data. Here, they developed a technique to only use radiographic data where the material is homogeneous (fast), and then switching to tomography in those areas where heterogeneity is detected (slower). They also developed a tomographic technique to quantify the volume of each component of a mixed material. This is useful for such things as determining ash content. Lastly, they have developed a document in MOSAIC, an Internet multi-media browser. This document is used to demonstrate the ability to share data and information world-wide.

Roberson, G.P.; Ryon, R.W.; Bull, N.L.

1994-12-01T23:59:59.000Z

293

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect

Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

294

Ultrasonic imaging system for in-process fabric defect detection  

DOE Patents (OSTI)

An ultrasonic method and system are provided for monitoring a fabric to identify a defect. A plurality of ultrasonic transmitters generate ultrasonic waves relative to the fabric. An ultrasonic receiver means responsive to the generated ultrasonic waves from the transmitters receives ultrasonic waves coupled through the fabric and generates a signal. An integrated peak value of the generated signal is applied to a digital signal processor and is digitized. The digitized signal is processed to identify a defect in the fabric. The digitized signal processing includes a median value filtering step to filter out high frequency noise. Then a mean value and standard deviation of the median value filtered signal is calculated. The calculated mean value and standard deviation are compared with predetermined threshold values to identify a defect in the fabric.

Sheen, Shuh-Haw (Naperville, IL); Chien, Hual-Te (Naperville, IL); Lawrence, William P. (Downers Grove, IL); Raptis, Apostolos C. (Downers Grove, IL)

1997-01-01T23:59:59.000Z

295

Non-Intrusive Electric Load Monitoring in Commercial Buildings  

E-Print Network (OSTI)

Increased interest in optimal control, energy scorekeeping and fault detection for HVAC equipment in commercial buildings has focused attention on instrumentation required to obtain the desired data. In this paper we investigate what can be learned from measurements of electrical power at a single point, that of the electrical service for the entire HVAC system. This low-cost measurement has proved in field tests to be capable of detecting the power change when a piece of equipment turns on or off; detecting oscillating equipment power caused by poorly tuned controllers; and detecting suboptimal staging of multiple chillers. Detection of equipment start and stop transitions was strengthened by application of a nonlinear filter that determines the point of median power from a filtering window of user-selected width. A review of electric motor literature indicated that samples of electrical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether this technique can be applied to a number of motors on the same circuit.

Norford, L. K.; Mabey, N.

1992-05-01T23:59:59.000Z

296

Stragegies to Detect Hidden Geothermal Systems Based on Monitoring and Analysis of CO2 in the Near-Surface Environment  

E-Print Network (OSTI)

in volcanic and geothermal areas. Appl. Geochem. , 13, 543–1977. Chemistry and Geothermal Systems. Academic Press, Newfor detecting hidden geothermal systems by near-surface gas

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2008-01-01T23:59:59.000Z

297

Stabilizability and Detectability of Singularly Perturbed Linear Time-Invariant Systems with Delays in State and Control  

Science Conference Proceedings (OSTI)

A singularly perturbed linear time-invariant system with delays in state and control variables is considered. Connection between properties of open-loop stabilizability (detectability) of the reduced-order and boundary-layer systems, associated with ... Keywords: System with delays in state and control variables, open-loop stabilizability and detectability, reduced-order and boundary-layer systems, singularly perturbed system

V. Y. Glizer

1999-04-01T23:59:59.000Z

298

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

Science Conference Proceedings (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

299

Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning  

Science Conference Proceedings (OSTI)

Internet Coordinates Systems (ICS) are used to predict Internet distances with limited measurements. However the precision of an ICS is degraded by the presence of Triangle Inequality Violations (TIVs). Simple methods have been proposed to detect TIVs, ... Keywords: Decision Trees, Internet Coordinate System, Supervised Learning, Triangle Inequality Violation

Yongjun Liao; Mohamed Ali Kaafar; Bamba Gueye; François Cantin; Pierre Geurts; Guy Leduc

2009-05-01T23:59:59.000Z

300

Data flow analysis for anomaly detection and identification toward resiliency in extreme scale systems  

Science Conference Proceedings (OSTI)

The increased complexity and scale of high performance computing and future extreme-scale systems have made resilience a key issue, since it is expected that future systems will have various faults during critical operations. It is also expected that ... Keywords: Anomaly, Data analysis, Fault detection and identification, Resilience

Byoung Uk Kim

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

A knowledge-based system approach for sensor fault modeling, detection and mitigation  

Science Conference Proceedings (OSTI)

Sensors are vital components for control and advanced health management techniques. However, sensors continue to be considered the weak link in many engineering applications since often they are less reliable than the system they are observing. This ... Keywords: Detection, Expert system, Neural Network, Sensor failure

Jonny Carlos da Silva; Abhinav Saxena; Edward Balaban; Kai Goebel

2012-09-01T23:59:59.000Z

302

Context and profile based cascade classifier for efficient people detection and safety care system  

Science Conference Proceedings (OSTI)

This study propose a system of extracting and tracking objects for a multimedia system and addresses how to extract the head feature from an object area. It is observed in images taken from real-time records like a video, there is always a variance in ... Keywords: Context-awareness, Feature selection, Human detection, Tracking

Kang-Dae Lee; Mi Young Nam; Kyung-Yong Chung; Young-Ho Lee; Un-Gu Kang

2013-03-01T23:59:59.000Z

303

An in-cell alpha detection system for radioisotope component assembly operations  

DOE Green Energy (OSTI)

A remotely operated alpha detection system is being developed for use at the Radioisotope Power Systems Facility at the US Department of Energy's Hanford Site. It will be used in hot cells being constructed to assemble components of Radioisotope Thermoelectric Generators for space power applications. The in-cell detection equipment will survey radiological swipe samples to determine smearable surface contamination levels on radioisotope fuel, fueled components, and hot-cell work areas. This system is potentially adaptable to other hot cell and glovebox applications where radiation dose rates and contamination levels are expected to be low. 2 figs.

Carteret, B.A. (Westinghouse Hanford Co., Richland, WA (United States)); Goles, R.W. (Pacific Northwest Lab., Richland, WA (United States))

1991-09-01T23:59:59.000Z

304

Development of a scintillation flow-cell detection system for environmental restoration and waste management applications  

Science Conference Proceedings (OSTI)

A flow-cell detection system was developed utilizing a coincidence circuit and tested with BaF{sub 2}, CaF{sub 2}:Eu and scintillating glass. The coincidence detection system reduced the background from {approximately}200 cps to {approximately}0.5 cps. The detection efficiencies for these cells ranged from 0.38 to 0.66 for {sup 45}Ca beta particles (E{sub max} = 0.257 MeV) and from 0.45 to 0.52 for {sup 233}U alpha particles (E{sub {alpha}} = 4.8 MeV). The minimum detectable activity was calculated for a 30 s count time and determined to be in the range of 1-2 Bq.

DeVol, T.A.; Branton, S.D.; Fjeld, R.A.

1996-05-01T23:59:59.000Z

305

Development of an Automated Microfluidic System for DNA Collection, Amplification, and Detection of Pathogens  

Science Conference Proceedings (OSTI)

This project was focused on developing and testing automated routines for a microfluidic Pathogen Detection System. The basic pathogen detection routine has three primary components; cell concentration, DNA amplification, and detection. In cell concentration, magnetic beads are held in a flow cell by an electromagnet. Sample liquid is passed through the flow cell and bacterial cells attach to the beads. These beads are then released into a small volume of fluid and delivered to the peltier device for cell lysis and DNA amplification. The cells are lysed during initial heating in the peltier device, and the released DNA is amplified using polymerase chain reaction (PCR) or strand displacement amplification (SDA). Once amplified, the DNA is then delivered to a laser induced fluorescence detection unit in which the sample is detected. These three components create a flexible platform that can be used for pathogen detection in liquid and sediment samples. Future developments of the system will include on-line DNA detection during DNA amplification and improved capture and release methods for the magnetic beads during cell concentration.

Hagan, Bethany S.; Bruckner-Lea, Cynthia J.

2002-12-01T23:59:59.000Z

306

Method and apparatus for detecting timing errors in a system oscillator  

DOE Patents (OSTI)

This invention is comprised of a method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

Gliebe, R.J.; Kramer, W.R.

1991-12-31T23:59:59.000Z

307

Method and apparatus for detecting timing errors in a system oscillator  

DOE Patents (OSTI)

A method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

Gliebe, Ronald J. (Library, PA); Kramer, William R. (Bethel Park, PA)

1993-01-01T23:59:59.000Z

308

Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio J. Marquez  

E-Print Network (OSTI)

Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio detection in boiler steam-water systems. The algorithm has been tested using real industrial data from Syncrude Canada, and has proven to be effective in detection of boiler tube or steam leaks; proper

Marquez, Horacio J.

309

PROJECT SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE GLIDER-BASED PASSIVE ACOUSTIC DETECTION SYSTEM,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE GLIDER-BASED PASSIVE ACOUSTIC DETECTION SYSTEM, Attachment PACIFIC NORTHWEST NATIONAL LABORATORY, RICHLAND, WASHINGTON Proposed Action Pacific Northwest National Laboratory (PNNL) proposes to conduct a proof-of-principle study to develop a wave glider-based passive acoustic detection system for monitoring whale populations (e.g., presence, distribution, relative abundance). Long-term goals of the project include better understanding whale populations to facilitate environmentally responsible development of offshore energy and improving the capability to monitor the world's oceans. Location of Action The proposed action would occur at PNNL facilities in Richland, Washington; at the Marine Science Laboratory

310

LATE SYN-INTRUSIVE CLASTIC DIKES AT THE BASE OF THE PALISADES INTRUSIVE SHEET, FORT LEE, NJ, IMPLY A SHALLOW (~3 to 4 KM) DEPTH OF  

E-Print Network (OSTI)

dikes, vesicles, pipe amygdales, and brecciated chilled-margin facies of the Palisades suggest, the Palisades intrusive sheet, Watchung basalts, and place-names mentioned in the text. Index map modified from

Merguerian, Charles

311

Pathogen Detection Lab-On-A-Chip (PADLOC) System for Plant Pathogen Diagnosis  

E-Print Network (OSTI)

Polymerase Chain Reaction (PCR) detection paves the way to reliable and rapid diagnosis of diseases and has been used extensively since its introduction. Many miniaturized PCR systems were presented by microfluidics and lab-on-a-chip community. However, most of the developed systems did not employ real-time detection and thus required post-PCR processes to obtain results. Among the few real-time PCR systems, almost all of them aimed for medical applications and those for plant pathogen diagnosis systems are almost non-existent in the literature. In this work, we are presenting a portable system that employs microfluidics PCR system with integrated optical systems to accomplish real-time quantitative PCR for plant pathogen diagnosis. The system is comprised of a PCR chip that has a chamber for PCR sample with integrated metal heaters fabricated by standard microfabrication procedures, an optical system that includes lenses, filters, a dichroic mirror and a photomultiplier tube (PMT) to achieve sensitive fluorescence measurement capability and a computer control system for Proportional Integral Derivative (PID) control and data acquisition. The optical detection system employs portable components and has a size of 3.9 x 5.9 x 11.9 cm which makes it possible to be used in field settings. On the device side, two different designs are used. The first design includes a single chamber in a 25.4 x 25.4 mm device and the capacity of the chamber is 9 micro-liters which is sufficient to do gel electrophoresis verification. The second design has three 2.2 micro-liter chambers squeezed in the same size device while having smaller volume to increase high throughput of the system. The operation of the system was demonstrated using Fusarium oxysporum spf. lycopersici which is a fungal plant pathogen that affects crops in the USA. In the presence of the plant pathogen, noticeable increases in the photomultiplier tube output were observed which means successful amplifications and detections occurred. The results were confirmed using gel electrophoresis which is a conventional post-PCR process to determine the existence and length of the amplified DNA. Clear bands located in the expected position were observed following the gel electrophoresis. Overall, we have presented a portable PCR system that has the capability of detecting plant pathogens.

Cifci, Osman

2012-08-01T23:59:59.000Z

312

Method and apparatus for providing pulse pile-up correction in charge quantizing radiation detection systems  

DOE Patents (OSTI)

This invention is comprised of a radiation detection method and system for continuously correcting the quantization of detected charge during pulse pile-up conditions. Charge pulses from a radiation detector responsive to the energy of detected radiation events are converted to voltage pulses of predetermined shape whose peak amplitudes are proportional to the quantity of charge of each corresponding detected event by means of a charge-sensitive preamplifier. These peak amplitudes are sampled and stored sequentially in accordance with their respective times of occurrence. Based on the stored peak amplitudes and times of occurrence, a correction factor is generated which represents the fraction of a previous pulses influence on a preceding pulse peak amplitude. This correction factor is subtracted from the following pulse amplitude in a summing amplifier whose output then represents the corrected charge quantity measurement.

Britton, C.L. Jr.; Wintenberg, A.L.

1992-12-31T23:59:59.000Z

313

Evaluation of a lattice-Boltzmann method for mercury intrusion porosimetry simulations  

Science Conference Proceedings (OSTI)

We have simulated intrusion of a non-wetting liquid into pores of varying shape and size. Simulations were based on the lattice-Boltzmann method and the Shan-Chen multiphase model. The liquid-solid contact angle for pores with circular cross-section ... Keywords: lattice-Boltzmann, mercury intrusion porosimetry, wetting

J. Hyväluoma; P. Raiskinmäki; A. Jäsberg; A. Koponen; M. Kataja; J. Timonen

2004-08-01T23:59:59.000Z

314

Weakening of the Kuroshio Intrusion into the South China Sea over the Past Two Decades  

Science Conference Proceedings (OSTI)

Inferred from the satellite and in situ hydrographic data from the 1990s and 2000s, the Kuroshio intrusion into the South China Sea (SCS) had a weakening trend over the past two decades. Associated with the weakened Kuroshio intrusion, the ...

Feng Nan; Huijie Xue; Fei Chai; Dongxiao Wang; Fei Yu; Maochong Shi; Peifang Guo; Peng Xiu

2013-10-01T23:59:59.000Z

315

Joint symbol detection and channel parameter estimation in asynchronous DS-CDMA systems  

Science Conference Proceedings (OSTI)

A method for jointly estimating the time delay and complex gain parameters, as well as detecting the transmitted symbols in an asynchronous multipath DS-CDMA system, is presented. A short training sequence is used to obtain a coarse estimate of the channel ...

A. Ranheim; P. Pelin

2000-02-01T23:59:59.000Z

316

Methods, systems and devices for detecting threatening objects and for classifying magnetic data  

Science Conference Proceedings (OSTI)

A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.

Kotter, Dale K. (Shelley, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID); Spencer, David F. (Idaho Falls, ID)

2012-01-24T23:59:59.000Z

317

Detecting Free Carriers in Organic Photovoltaic Systems: Time-Resolved Microwave Conductivity  

DOE Green Energy (OSTI)

In here we report on using flash photolysis, time-resolved microwave conductivity (fp-TRMC) as a tool for detecting the fate of mobile charge carriers. This spectroscopy does not require electrodes and can therefore focus attention on the active components of the donor- acceptor system and provide insight into the heart of OPV device functionality.

Rumbles, G.; Kopidakis, N.; Coffey, D.; Ferguson, A.; Dayal, S.; Reid, O.

2011-01-01T23:59:59.000Z

318

Laser system for natural gas detection. Phase I. Laboratory feasibility studies  

SciTech Connect

Laboratory and field tests successfully proved the feasibility of laser remote sensing as a leak-survey tool in gas distribution systems. Using a pair of helium neon lasers to measure methane, the device exhibited at a 43-ft range a methane detection limit of 3 ppm in a gas plume with a 3.3-ft path length.

Grant, W.B.; Hinkley, E.D.

1981-12-01T23:59:59.000Z

319

Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo  

DOE Patents (OSTI)

A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

Slaughter, Dennis R. (Oakland, CA); Pohl, Bertram A. (Berkeley, CA); Dougan, Arden D. (San Ramon, CA); Bernstein, Adam (Palo Alto, CA); Prussin, Stanley G. (Kensington, CA); Norman, Eric B. (Oakland, CA)

2008-04-15T23:59:59.000Z

320

Fast Detection and Mitigation of Cascading Outages in the Power System  

E-Print Network (OSTI)

This dissertation studies the causes and mechanism of power system cascading outages and proposes the improved interactive scheme between system-wide and local levels of monitoring and control to quickly detect, classify and mitigate the cascading outages in power system. A novel method for evaluating the vulnerability of individual components as well as the whole power system, which is named as weighted vulnerability analysis, is developed. Betweenness centrality is used to measure the importance of each bus and transmission line in the modeled power system network, which is in turn used to determine the weights for the weighted vulnerability index. It features fast reaction time and achieves higher accuracy when dealing with the cascading outage detection, classification and mitigation over the traditional methods. The overload problem due to power flow redistribution after one line tripped is a critical factor contributing to the cascading outages. A parallel corridor searching method is proposed to quickly identify the most vulnerable components after tripping a transmission line. The power system topology model can be simplified into state graph after searching the domains for each generator, the commons for each bus, and links between the commons. The parallel corridor will be determined by searching the links and commons in system topology graph for the given state of power system operation. During stressed operating state, either stable or unstable power swing may have impacts on distance relay judgment and lead to relay misoperation, which will result in the power system lines being tripped and as a consequence power system operating state becoming even more stressful. At the local level, an enhanced fault detection tool during power system swing is developed to reduce the chance of relay misoperation. Comprehensive simulation studies have been implemented by using the IEEE 39-bus and 118-bus test systems. The results are promising because: The results from weighted vulnerability analysis could provide better system situational awareness and accurate information about the disturbance; The results form parallel corridor search method could identify the most vulnerable lines after power re-distribution, which will give operator time to take remedial actions; The results from new travelling wave and wavelet transform based fault detection could reduce the impact of relay misoperation.

Pang, Chengzong

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Development of an impedance-based sensor for the detection of catalyst coking in fuel-reforming systems.  

E-Print Network (OSTI)

??A novel sensor for detecting the early stages of catalyst coking in fuel reforming systems has been developed. The sensor was manufactured by inkjet printing… (more)

Wheeler, Jeffrey L.

2013-01-01T23:59:59.000Z

322

Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems  

Science Conference Proceedings (OSTI)

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

2013-01-01T23:59:59.000Z

323

The detection, prevention and mitigation of cascading outages in the power system  

E-Print Network (OSTI)

This dissertation studies the causes and mechanism of power system cascading outages and develops new methods and new tools to help detect, prevent and mitigate the outages. Three effective solutions: a steady state control scheme, a transient stability control scheme, and an interactive system-wide and local scheme have been proposed using those new methods and tools. A steady state control scheme can help detect and prevent the possible cascading outage at its initial slow steady state progress stage. It uses new methods and new tools to solve the line overload, congestion or bus high/low voltage problems. New methods, such as vulnerability index (VI), margin index (MI), network contribution factor (NCF), topology processing and selected minimum load shedding (SMLS), and new tools, such as transmission network control based on a network contribution factor (NCF) method, generator control based on a generator distribution factor (GDF) method, and load control based on a load distribution factor (LDF) method have been proposed and developed. A transient stability control scheme can help prevent and mitigate the possible cascading outage at its transient progress stage if there is enough time to take action. It uses one Lyapunov direct method, potential energy boundary surface (PEBS) method, and sensitivity analysis of transient energy margin for fast stabilizing control. The results are verified by the accurate time-domain transient stability analysis method. The interactive scheme takes advantage of accurate system-wide and local information and analysis results, uses some techniques from both steady state control and transient stability control, works at both the system-wide level and local substation level, monitors the system all the time, and takes actions when needed to help detect, prevent and mitigate the possible cascading outage. Comprehensive simulation studies have been implemented using the IEEE 14- bus, 24-bus, 39-bus and 118-bus systems and promising results show the ability of the proposed solutions to help detect, prevent and mitigate cascading outages.

Song, Hongbiao

2006-12-01T23:59:59.000Z

324

Sea water intrusion model of Amchitka Island, Alaska  

SciTech Connect

During the 1960s and 1970s, Amchitka Island, Alaska, was the site of three underground nuclear tests, referred to as Milrow, Long Shot and Cannikin. Amchitka Island is located in the western part of the Aleutian Island chain, Alaska. The groundwater systems affected by the three underground nuclear tests at Amchitka Island are essentially unmonitored because all of the current monitoring wells are too shallow and not appropriately placed to detect migration from the cavities. The dynamics of the island`s fresh water-sea water hydrologic system will control contaminant migration from the three event cavities, with migration expected in the direction of the Bering Sea from Long shot and Cannikin and the Pacific Ocean from Milrow. The hydrogeologic setting (actively flowing groundwater system to maintain a freshwater lens) suggests a significant possibility for relatively rapid contaminant migration from these sites, but also presents an opportunity to use projected flowpaths to a monitoring advantage. The purpose of this investigation is to develop a conceptual model of the Amchitka groundwater system and to produce computer model simulations that reflect the boundary conditions and hydraulic properties of the groundwater system. The simulations will be used to assess the validity of the proposed conceptual model and highlight the uncertainties in hydraulic properties of the aquifer. The uncertainties will be quantified by sensitivity analyses on various model parameters. Within the limitations of the conceptual model and the computer simulations, conclusions will be drawn regarding potential radionuclide migration from the three underground nuclear tests.

Wheatcraft, S.W. [Nevada Univ., Reno, NV (United States). Hydrology/Hydrogeology Dept., Environmental and Resource Science

1995-09-01T23:59:59.000Z

325

Visualizing microbial pollution in Santa Monica Bay with Geographic Information Systems (GIS) and through field-testing a rapid, robust, field-portable water detection sensing system  

E-Print Network (OSTI)

hic Information Systems (GIS) and Through Field - testing aEngineering, UCLA Introduction: GIS and rapid detection:water quality characterizi ng GIS is a powerful mapping tool

2009-01-01T23:59:59.000Z

326

Hot spot detection system for vanes or blades of a combustion turbine  

DOE Patents (OSTI)

This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature.

Twerdochlib, Michael (Oviedo, FL)

1999-01-01T23:59:59.000Z

327

Hot spot detection system for vanes or blades of a combustion turbine  

DOE Patents (OSTI)

This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature. 5 figs.

Twerdochlib, M.

1999-02-02T23:59:59.000Z

328

A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems  

SciTech Connect

The objective of this document is to report results in the detection and characterization of special behavior in large electric power systems. Such behavior is usually dynamic in nature, but not always. This is also true for the underlying sources of special behavior. At the device level, a source of special behavior might be an automatic control system, a dynamic load, or even a manual control system that is operated according to some sharply defined policy. Other possible sources include passive system conditions, such as the state of a switched device or the amount of power carried on some critical line. Detection and characterization are based upon “signature information” that is extracted from the behavior observed. Characterization elements include the signature information itself, the nature of the behavior and its likely causes, and the associated implications for the system or for the public at large. With sufficient data and processing, this characterization may directly identify a particular condition or device at a specific location. Such conclusive results cannot always be done from just one observation, however. Information environments that are very sparse may require multiple observations, comparative model studies, and even direct testing of the system.

Hauer, John F.; DeSteese, John G.

2004-08-20T23:59:59.000Z

329

System and method for bearing fault detection using stator current noise cancellation  

Science Conference Proceedings (OSTI)

A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to repeatedly receive real-time operating current data from the operating motor and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Habetler, Thomas G. (Snellville, GA); Harley, Ronald G. (Lawrenceville, GA); Theisen, Peter J. (West Bend, WI)

2010-08-17T23:59:59.000Z

330

System and method for motor fault detection using stator current noise cancellation  

Science Conference Proceedings (OSTI)

A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to acquire at least on additional set of real-time operating current data from the motor during operation, redefine the noise component present in each additional set of real-time operating current data, and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Nowak, Michael P. (Menomonee Falls, WI); Dimino, Steven A. (Wauwatosa, WI)

2010-12-07T23:59:59.000Z

331

Method of remote powering and detecting multiple UWB passive tags in an RFID system  

DOE Patents (OSTI)

A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

2012-05-29T23:59:59.000Z

332

Intrinsically resilient energy control systems  

Science Conference Proceedings (OSTI)

To preserve critical energy control functions while under attack, it is necessary to perform comprehensive analysis on the root cause and impact of an ongoing cyber intrusion without sacrificing the availability of energy delivery. In this position paper, ... Keywords: cybersecurity, data integration, energy control system, intrusion-tolerant scada, knowledge base, ontology, root cause analysis, semantic annotation, situational awareness

Frederick Sheldon; Daniel Fetzer; David Manz; Jingshan Huang; Stuart Goose; Thomas Morris; Jiangbo Dang; Jonathan Kirsch; Dong Wei

2013-01-01T23:59:59.000Z

333

An active system for the detection of special fissile material in small watercraft  

E-Print Network (OSTI)

Due to increasing terrorist threats and illegal proliferation of nuclear material and technology, there is a need for increased research in the area of detection of smuggled fissile material, some of which is designated by the International Atomic Energy Agency as special fissile material. This thesis focuses on a hypothetical scenario in which a terrorist organization has managed to smuggle an amount of special fissile material onto a personal recreational watercraft and sail it into a marina. If the boat could be forced to go through a detector system, then the contents could be interrogated and a determination made of whether any special fissile material was aboard. This thesis examines the hypothesis that active interrogation may be used successfully in the detection of special fissile material in such an environment. It shows that it is feasible to use an active neutron system to detect a significant quantity of special fissile material onboard a small boat via the differential dieaway technique. The MCNP Monte Carlo transport code was used to simulate the use of a pulsed neutron generator to induce fission in the fissile material and then estimate the detector response. The detector modeled was based on elastic scattering-induced recoil protons using pure hydrogen gas. There was a significant difference between the system with and without the presence of fissile material, and the estimated detector response for the system with fissile material present was shown to be sufficiently greater than the response due to background radiation only. Additionally, dose was estimated and found to be small enough that the system would not likely pose a significant radiological health risk to passengers on the boat.

Johansen, Norman Alfan, III

2006-08-01T23:59:59.000Z

334

Feasibility of detecting artificial magnetic anomalies in hydrofractured rock by superconducting gradiometer-SQUID systems  

DOE Green Energy (OSTI)

A study of the signal physics of magnetic anomaly detection by superconducting gradiometer-SQUID systems to determine the feasibility of possible applications to the geothermal energy program is described. The system would make full use of the incredible sensitivity of the superconducting quantum interference device (SQUID) which can be in the range of 10/sup -11/ Oe. In addition to magnetic anomalies in the earth's field produced by spherical distributions of magnetic matter, anomalies that would be artificially produced by flooding magnetic material into cracks produced by hydrofracturing in deep boreholes drilled into dry rock geothermal sources are considered. The study indicates that surface detection by horizontal and vertical gradiometers of crack anomalies will not be feasible if the magnetic material flooding the crack is a paramagnetic solution. However, one can concoct a slurry to carry prepolarized ferromagnetic particles of a size sufficiently large to permit domain formation but small enough to permit rotation and alignment in the earth's field. In this case, the anomaly signal is large enough to permit extraction of anomaly orientation information out of the background of magnetic noise and earth's field gradients. The superconducting gradiometer-SQUID system is shown to be exceptional in its capability of removing undesirable magnetic noise and gradients. The greatest promise was found in systems that would be comprised of a magnetometer or gradiometer that could be lowered into the borehole to positions opposite the formations cracked by hydrofracturing. The use of a paramagnetic material to produce the artificial anomaly will not provide signals of sufficient amplitude to overcome the magnetic noise. However, the slurry containing only one percent by volume of ferromagnetic particles will produce a crack anomaly that is easily detectable by magnetometer or by the superconducting gradiometer-SQUID system.

Overton, W.C. Jr.

1976-12-01T23:59:59.000Z

335

Development and Testing of an Air Fluorescence Imaging System for the Detection of Radiological Contamination  

SciTech Connect

Detection of radionuclides emitting short-range radiation, such as {alpha} and low-energy {beta} particles, has always presented a challenge, particularly when such radionuclides are dispersed over a wide area. In this situation, conventional detection methods require the area of interest to be surveyed using a fragile probe at very close range--a slow, error-prone, and potentially dangerous process that may take many hours for a single room. The instrument under development uses a novel approach by imaging radiation-induced fluorescence in the air surrounding a contaminated area, rather than detecting the radiation directly. A robust and portable system has been designed and built that will allow contaminated areas to be rapidly detected and delineated. The detector incorporates position-sensitive photo-multiplier tubes, UV filters, a fast electronic shutter and an aspherical phase mask that significantly increases the depth-of-field. Preliminary tests have been conducted using sealed {sup 241}Am sources of varying activities and surface areas. The details of the instrument design will be described and the results of recent testing will be presented.

Inrig, Elizabeth [Defence R and D Canada - Ottawa, 3701 Carling Avenue, Ottawa, Ontario (Canada); Koslowsky, Vern; Andrews, Bob; Dick, Michael; Forget, Patrick; Ing, Harry [Bubble Technology Industries, Box 100, Chalk River, Ontario (Canada); Hugron, Roger [Director General Nuclear Safety, 101 Colonel By Drive, Ottawa, Ontario (Canada); Wong, Larry [Canadian Nuclear Safety Commission, 3484 Limebank Road, Ottawa, Ontario (Canada)

2011-12-13T23:59:59.000Z

336

Double-Diffusive Intrusions in a Stable Salinity Gradient “Heated from Below”  

Science Conference Proceedings (OSTI)

Two-dimensional direct numerical simulations (DNS) are used to investigate the growth and nonlinear equilibration of spatially periodic double-diffusive intrusion for negative vertical temperature Tz < 0 and salinity Sz < 0 gradients, which are ...

Julian Simeonov; Melvin E. Stern

2008-10-01T23:59:59.000Z

337

Effects of droplet size on intrusion of sub-surface oil spills  

E-Print Network (OSTI)

This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

Chan, Godine Kok Yan

2013-01-01T23:59:59.000Z

338

Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants  

E-Print Network (OSTI)

The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

Greene, William C. (William Calvin)

2005-01-01T23:59:59.000Z

339

Double-Diffusive Intrusions in a Stable Salinity Gradient “Heated from Below”  

Science Conference Proceedings (OSTI)

Two-dimensional direct numerical simulations (DNS) are used to investigate the growth and nonlinear equilibration of spatially periodic double-diffusive intrusion for negative vertical temperature Tz gradients, which are ...

Julian Simeonov; Melvin E. Stern

2008-10-01T23:59:59.000Z

340

Neutronic analysis of the 1D and 1E banks reflux detection system  

Science Conference Proceedings (OSTI)

Two H Canyon neutron monitoring systems for early detection of postulated abnormal reflux conditions in the Second Uranium Cycle 1E and 1D Mixer-Settle Banks have been designed and built. Monte Carlo neutron transport simulations using the general purpose, general geometry, n-particle MCNP code have been performed to model expected response of the monitoring systems to varying conditions.The confirmatory studies documented herein conclude that the 1E and 1D neutron monitoring systems are able to achieve adequate neutron count rates for various neutron source and detector configurations, thereby eliminating excessive integration count time. Neutron count rate sensitivity studies are also performed. Conversely, the transport studies concluded that the neutron count rates are statistically insensitive to nitric acid content in the aqueous region and to the transition region length. These studies conclude that the 1E and 1D neutron monitoring systems are able to predict the postulated reflux conditions for all examined perturbations in the neutron source and detector configurations. In the cases examined, the relative change in the neutron count rates due to postulated transitions from normal {sup 235}U concentration levels to reflux levels remain satisfactory detectable.

Blanchard, A.

1999-12-21T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems  

DOE Green Energy (OSTI)

''Hidden'' geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and has moderate solubility in water. We carried out numerical simulations of a CO2 migration scenario to calculate the magnitude of expected fluxes and concentrations. Our results show that CO2 concentrations can reach high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are predominantly controlled by CO2 uptake by photosynthesis, production by root respiration, microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include the infrared gas analyzer, the accumulation chamber method, the eddy covariance method, hyperspectral imaging, and light detection and ranging. To meet the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring techniques with statistical analysis and modeling strategies. The proposed monitoring plan initially focuses on rapid, economical, reliable measurements of CO2 subsurface concentrations and surface fluxes and statistical analysis of the collected data. Based on this analysis, are as with a high probability of containing geothermal CO2 anomalies can be further sampled and analyzed using more expensive chemical and isotopic methods. Integrated analysis of all measurements will determine definitively if CO2 derived from a deep geothermal source is present, and if so, the spatial extent of the anomaly. The suitability of further geophysical measurements, installation of deep wells, and geochemical analyses of deep fluids can then be determined based on the results of the near surface CO2 monitoring program.

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2005-01-19T23:59:59.000Z

342

Reference Handbook for Site-Specific Assessment of Subsurface Vapor Intrusion to Indoor Air  

Science Conference Proceedings (OSTI)

Subsurface vapor intrusion is only one of several possible sources for volatile and semi-volatile chemicals in indoor air. This report provides guidance on the site-specific assessment of the significance of subsurface vapor intrusion into indoor air. Topics covered include theoretical considerations, sampling and analysis considerations, recommended strategies and procedures, interpretive tools, mitigation measures, and suggestions for future research. This document reflects a comprehensive understandin...

2005-03-28T23:59:59.000Z

343

Method for detecting sophisticated cyber attacks  

DOE Patents (OSTI)

A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

Potok, Thomas E. (Oak Ridge, TN)

2008-11-18T23:59:59.000Z

344

Optical methods and systems for detecting a constituent in a gas containing oxygen in harsh environments  

DOE Patents (OSTI)

A method for detecting a gas phase constituent such as carbon monoxide, nitrogen dioxide, hydrogen, or hydrocarbons in a gas comprising oxygen such as air, includes providing a sensing material or film having a metal embedded in a catalytically active matrix such as gold embedded in a yttria stabilized zirconia (YSZ) matrix. The method may include annealing the sensing material at about 900.degree. C., exposing the sensing material and gas to a temperature above 400.degree. C., projecting light onto the sensing material, and detecting a change in the absorption spectrum of the sensing material due to the exposure of the sensing material to the gas in air at the temperature which causes a chemical reaction in the sensing material compared to the absorption spectrum of the sensing material in the absence of the gas. Systems employing such a method are also disclosed.

Carpenter, Michael A. (Scotia, NY); Sirinakis, George (Bronx, NY)

2011-01-04T23:59:59.000Z

345

A Qualitive Modeling Approach for Fault Detection and Diagnosis on HVAC Systems  

E-Print Network (OSTI)

This paper describes the basics and first test results of a model based approach using qualitative modeling to perform Fault Detection and Diagnostics (FDD) on HVAC and R systems. A quantized system describing the qualitative behavior of a dynamical system is established by transforming numerical inputs into qualitative values or states. Then, the qualitative model is used to determine system-states or outputs that may occur in the future. The qualitative model determines the probability that a subsequent condition might occur. The model can then be used for FDD purposes by comparing the expected states of the faultless system with the occurring states of the real process. The paper presents the first results of the model, trained with measurement data of an air handling unit (AHU) heating coil. The authors plan to extend the model to further AHU components and to test them against real data to assess their performance for FDD and their economic viability in terms of engineering efforts and costs by comparing them with a rule-based FDD system. It is then planned to implement and test the models on several large HVAC and R systems operating at two major European airports in the framework of the FP7 European project CASCADE ICT for Energy Efficient Airports.

Muller, T.; Rehault, N.; Rist, T.

2013-01-01T23:59:59.000Z

346

Environmental assessment of the thermal neutron activation explosive detection system for concourse use at US airports  

SciTech Connect

This document is an environmental assessment of a system designed to detect the presence of explosives in checked airline baggage or cargo. The system is meant to be installed at the concourse or lobby ticketing areas of US commercial airports and uses a sealed radioactive source of californium-252 to irradiate baggage items. The major impact of the use of this system arises from direct exposure of the public to scattered or leakage radiation from the source and to induced radioactivity in baggage items. Under normal operation and the most likely accident scenarios, the environmental impacts that would be created by the proposed licensing action would not be significant. 44 refs., 19 figs., 18 tabs.

Jones, C.G.

1990-08-01T23:59:59.000Z

347

DEVELOPMENT OF DEPOSIT DETECTION SYSTEM IN PIPELINES OF THE STEELWORKS USING CS-137 GAMMA-RAY  

SciTech Connect

The deposit is built up in the pipeline of the steelworks by the chemical reaction among COG (coke oven gas), BFG (blast furnace gas), moisture, and steel in the high temperature environment and obstructs the smooth gas flow. In this study a gamma-ray system is developed to detect the deposit accumulated in pipelines and calculate the accumulation rate with respect to the cross section area of pipes. Cs-137 is used as the gamma-ray source and the system is designed to apply to pipes of various diameters. This system also includes the DB for storage and display of the measurement results so that it can be used for the efficient management of the pipelines.

Song, Won-Joon; Lee, Seung-Hee; Jeong, Hee-Dong [Research Institute of Industrial Science and Technology, 32 Hyoja-Dong, Nam-Ku, Pohang, 790-330 (Korea, Republic of)

2008-02-28T23:59:59.000Z

348

Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring  

DOE Green Energy (OSTI)

''Hidden'' geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the subsurface and above ground in the near-surface environment to serve as a tool to discover hidden geothermal systems. We focus the investigation on CO2 due to (1) its abundance in geothermal systems, (2) its moderate solubility in water, and (3) the wide range of technologies available to monitor CO2 in the near-surface environment. However, monitoring in the near-surface environment for CO2 derived from hidden geothermal reservoirs is complicated by the large variation in CO2 fluxes and concentrations arising from natural biological and hydrologic processes. In the near-surface environment, the flow and transport of CO2 at high concentrations will be controlled by its high density, low viscosity, and high solubility in water relative to air. Numerical simulations of CO2 migration show that CO2 concentrations can reach very high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, surface winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are primarily controlled by CO2 uptake by photosynthesis, production by root respiration, and microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include (1) the infrared gas analyzer (IRGA) for measurement of concentrations at point locations, (2) the accumulation chamber (AC) method for measuring soil CO2 fluxes at point locations, (3) the eddy covariance (EC) method for measuring net CO2 flux over a given area, (4) hyperspectral imaging of vegetative stress resulting from elevated CO2 concentrations, and (5) light detection and ranging (LIDAR) that can measure CO2 concentrations over an integrated path. Technologies currently in developmental stages that have the potential to be used for CO2 monitoring include tunable lasers for long distance integrated concentration measurements and micro-electronic mechanical systems (MEMS) that can make widespread point measurements. To address the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring methodologies with statistical analysis and modeling strategies. Within the area targeted for geothermal exploration, point measurements of soil CO2 fluxes and concentrations using the AC method and a portable IRGA, respectively, and measurements of net surface flux using EC should be made. Also, the natural spatial and temporal variability of surface CO2 fluxes and subsurface CO2 concentrations should be quantified within a background area with similar geologic, climatic, and ecosystem characteristics to the area targeted for geothermal exploration. Statistical analyses of data collected from both areas should be used to guide sampling strategy, discern spatial patterns that may be indicative of geothermal CO2 emissions, and assess the presence (or absence) of geothermal CO2 within the natural background variability with a desired confidence level. Once measured CO2 concentrations and fluxes have been determined to be of anomalous geothermal origin with high confidence, more expensive vertical subsurface gas sampling and chemical and isotopic analyses can be undertaken. Integrated analysis of all measurements will d

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2004-12-15T23:59:59.000Z

349

Integrated optical systems for excitation delivery and broadband detection in micro-fluidic electrochromatography  

SciTech Connect

The authors have designed and assembled two generations of integrated micro-optical systems that deliver pump light and detect broadband laser-induced fluorescence in micro-fluidic chemical separation systems employing electrochromatography. The goal is to maintain the sensitivity attainable with larger, tabletop machines while decreasing package size and increasing throughput (by decreasing the required chemical volume). One type of micro-optical system uses vertical-cavity surface-emitting lasers (VCSELs) as the excitation source. Light from the VCSELs is relayed with four-level surface relief diffractive optical elements (DOEs) and delivered to the chemical volume through substrate-mode propagation. Indirect fluorescence from dye-quenched chemical species is collected and collimated with a high numerical aperture DOE. A filter blocks the excitation wavelength, and the resulting signal is detected as the chemical separation proceeds. Variations of this original design include changing the combination of reflective and transmissive DOEs and optimizing the high numerical aperture DOE with a rotationally symmetric iterative discrete on-axis algorithm. The authors will discuss the results of these implemented optimizations.

KEMME,SHANALYN A.; WARREN,MIAL E.; SWEATT,WILLIAM C.; WENDT,JOEL R.; BAILEY,CHRISTOPHER G.; MATZKE,CAROLYN M.; ALLERMAN,ANDREW A.; ARNOLD,DON W.; CARTER,TONY RAY; ASBILL,RANDOLPH E.; SAMORA,SALLY

2000-03-15T23:59:59.000Z

350

A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers  

E-Print Network (OSTI)

The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around $10^{17}$ eV.

Kevin Green; Jonathan L. Rosner; Denis A. Suprun; J. F. Wilkerson

2002-05-03T23:59:59.000Z

351

Radioactive Flow Characterization for Real-Time Detection Systems in UREX+ Nuclear Fuel Reprocessing  

E-Print Network (OSTI)

The reprocessing of used nuclear fuel requires the dissolution and separation of numerous radioisotopes that are present as fission products in the fuel. The leading technology option in the U.S. for reprocessing is a sequence of processing methods known as UREX+ (Uranium Extraction ). However, an industrial scale facility implementing this separation procedure will require the establishment of safeguards and security systems to ensure the protection of the separated materials. A number of technologies have been developed for meeting the measurement demands for such a facility. This project focuses on the design of a gamma detection system for taking measurements of the flow streams of such a reprocessing facility. An experimental apparatus was constructed capable of pumping water spiked with soluble radioisotopes under various flow conditions through a stainless steel coil around a sodium iodide (NaI) detector system. Experiments were conducted to characterize the impact of flow rate, pipe air voids, geometry, and radioactivity dilution level on activity measurements and gamma energy spectra. Two coil geometries were used for these experiments, using 0.5 in stainless steel pipe wound into a coil with a 6 inch diameter; the first coil was 5.5 revolutions tall and the second coil was 9.5 revolutions tall. The isotopes dissolved in the flowing water were produced at the Texas A&M Nuclear Science Center via neutron activation of chromium, gold, cerium, and ytterbium nitrate salts. After activation, the salts were dissolved in distilled water and inserted into the radioactive flow assembly for quantitative measurements. Flow rate variations from 100 to 2000 ml/min were used and activity dilution levels for the experiments conducted were between 0.02 and 1.6 ?Ci/liter. Detection of system transients was observed to improve with decreasing flow rate. The detection limits observed for this system were 0.02 ?Ci/liter over background, 0.5% total activity change in a pre-spiked system, and a dilution change of 2% of the coil volume. MCNP (Monte Carlo N-Particle Transport) models were constructed to simulate the results and were used to extend the results to other geometries and piping materials as well as simulate actual UREX stream material in the system. The stainless steel piping for the flow around the detector was found to attenuate key identifying gamma peaks on the low end of the energy spectrum. For the proposed schedule 40 stainless steel pipe for an actual reprocessing facility, gamma rays below 100 keV in energy would be reduced to less than half their initial intensities. The exact ideal detection set up is largely activity and flow stream dependant. However, the characteristics best suited for flow stream detection are: 1) minimize volume around detector, 2) low flow rate for long count times, and 3) low attenuation piping material such as glass.

Hogelin, Thomas Russell

2010-12-01T23:59:59.000Z

352

System for detecting and limiting electrical ground faults within electrical devices  

DOE Patents (OSTI)

An electrical ground fault detection and limitation system for employment with a nuclear reactor utilizing a liquid metal coolant. Elongate electromagnetic pumps submerged within the liquid metal coolant and electrical support equipment experiencing an insulation breakdown occasion the development of electrical ground fault current. Without some form of detection and control, these currents may build to damaging power levels to expose the pump drive components to liquid metal coolant such as sodium with resultant undesirable secondary effects. Such electrical ground fault currents are detected and controlled through the employment of an isolated power input to the pumps and with the use of a ground fault control conductor providing a direct return path from the affected components to the power source. By incorporating a resistance arrangement with the ground fault control conductor, the amount of fault current permitted to flow may be regulated to the extent that the reactor may remain in operation until maintenance may be performed, notwithstanding the existence of the fault. Monitors such as synchronous demodulators may be employed to identify and evaluate fault currents for each phase of a polyphase power, and control input to the submerged pump and associated support equipment.

Gaubatz, Donald C. (Cupertino, CA)

1990-01-01T23:59:59.000Z

353

Resistively-Detected NMR Studies of Quantum Hall Systems Katsuyoshi Kodera, Hisashi Takado, Akira Endo, Yoshiaki Hashimoto, Shingo  

E-Print Network (OSTI)

Resistively-Detected NMR Studies of Quantum Hall Systems Katsuyoshi Kodera, Hisashi Takado, Akira, University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa, Chiba 277-8581 Abstract. The resistively-detected NMR. The NMR lineshape in this region exhibits a dip-peak structure (dispersive lineshape). The anomalous

Katsumoto, Shingo

354

Network anomaly detection with the restricted Boltzmann machine  

Science Conference Proceedings (OSTI)

With the rapid growth and the increasing complexity of network infrastructures and the evolution of attacks, identifying and preventing network abuses is getting more and more strategic to ensure an adequate degree of protection from both external and ... Keywords: Anomaly detection, Energy-based models, Intrusion detection, Restricted Boltzmann machine, Semi-supervised learning

Ugo Fiore, Francesco Palmieri, Aniello Castiglione, Alfredo De Santis

2013-12-01T23:59:59.000Z

355

Modular Anomaly Detection for Smartphone Ad hoc Communication  

E-Print Network (OSTI)

a mobile ad hoc network (MANET). While intrusion detection in MANETs is typically evaluated with network. The study shows the feasibility of the statistics-based anomaly detection regime, having low CPU usage, among others, has been focused on studies of energy and bandwidth constrained communication using

356

Towards automatic power line detection for a UAV surveillance system using pulse coupled neural filter and an improved Hough transform  

Science Conference Proceedings (OSTI)

Spatial information captured from optical remote sensors on board unmanned aerial vehicles (UAVs) has great potential in automatic surveillance of electrical infrastructure. For an automatic vision-based power line inspection system, detecting power ... Keywords: Hough transform, Knowledge-based system, Power line inspection system, Pulse coupled neural filter, Unmanned aerial vehicles (UAVs)

Zhengrong Li; Yuee Liu; Rodney Walker; Ross Hayward; Jinglan Zhang

2010-08-01T23:59:59.000Z

357

Detecting and Attributing External Influences on the Climate System: A Review of Recent Advances  

SciTech Connect

We review recent research that assesses evidence for the detection of anthropogenic and natural external influences on the climate. Externally driven climate change has been detected by a number of investigators in independent data covering many parts of the climate system, including surface temperature on global and large regional scales, ocean-heat content, atmospheric circulation, and variables of the free atmosphere, such as atmospheric temperature and tropopause height. The influence of external forcing is also clearly discernible in reconstructions of hemispheric scale temperature of the last millennium. These observed climate changes are very unlikely to be due only to natural internal climate variability, and they are consistent with the responses to anthropogenic and natural external forcing of the climate system that are simulated with climate models. The evidence indicates that natural drivers such as solar variability and volcanic activity are at most partially responsible for the large-scale temperature changes observed over the past century, and that a large fraction of the warming over the last 50 years can be attributed to greenhouse gas increases. Thus the recent research supports and strengthens the IPCC Third Assessment Report conclusion that ''most of the global warming over the past 50 years is likely due to the anthropogenic increase in greenhouse gases''.

Barnett, T; Zwiers, F; Hegerl, G; Allen, M; Crowley, T; Gillett, N; Hasselmann, K; Jones, P; Santer, B; Schnur, R; Stott, P; Taylor, K; Tett, S

2005-01-26T23:59:59.000Z

358

FERMI LAT PULSED DETECTION OF PSR J0737-3039A IN THE DOUBLE PULSAR SYSTEM  

SciTech Connect

We report the Fermi Large Area Telescope discovery of {gamma}-ray pulsations from the 22.7 ms pulsar A in the double pulsar system J0737-3039A/B. This is the first mildly recycled millisecond pulsar (MSP) detected in the GeV domain. The 2.7 s companion object PSR J0737-3039B is not detected in {gamma} rays. PSR J0737-3039A is a faint {gamma}-ray emitter, so that its spectral properties are only weakly constrained; however, its measured efficiency is typical of other MSPs. The two peaks of the {gamma}-ray light curve are separated by roughly half a rotation and are well offset from the radio and X-ray emission, suggesting that the GeV radiation originates in a distinct part of the magnetosphere from the other types of emission. From the modeling of the radio and the {gamma}-ray emission profiles and the analysis of radio polarization data, we constrain the magnetic inclination {alpha} and the viewing angle {zeta} to be close to 90 Degree-Sign , which is consistent with independent studies of the radio emission from PSR J0737-3039A. A small misalignment angle between the pulsar's spin axis and the system's orbital axis is therefore favored, supporting the hypothesis that pulsar B was formed in a nearly symmetric supernova explosion as has been discussed in the literature already.

Guillemot, L.; Kramer, M. [Max-Planck-Institut fuer Radioastronomie, Auf dem Huegel 69, D-53121 Bonn (Germany); Johnson, T. J. [National Research Council Research Associate, National Academy of Sciences, Washington, DC 20001 (United States); Craig, H. A.; Romani, R. W.; Kerr, M. [W. W. Hansen Experimental Physics Laboratory, Kavli Institute for Particle Astrophysics and Cosmology, Department of Physics and SLAC National Accelerator Laboratory, Stanford University, Stanford, CA 94305 (United States); Venter, C. [Centre for Space Research, North-West University, Potchefstroom Campus, Private Bag X6001, 2520 Potchefstroom (South Africa); Harding, A. K. [NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States); Ferdman, R. D. [Jodrell Bank Centre for Astrophysics, School of Physics and Astronomy, The University of Manchester, M13 9PL (United Kingdom); Stairs, I. H., E-mail: guillemo@mpifr-bonn.mpg.de [Department of Physics and Astronomy, University of British Columbia, Vancouver, BC V6T 1Z1 (Canada)

2013-05-10T23:59:59.000Z

359

Electrical signature analysis applications for non-intrusive automotive alternator diagnostics  

DOE Green Energy (OSTI)

Automotive alternators are designed to supply power for automobile engine ignition systems as well as charge the storage battery. This product is used in a large market where consumers are concerned with acoustic noise and vibration that comes from the unit. as well as overall quality and dependability. Alternators and generators in general are used in industries other than automotive, such as transportation and airline industries and in military applications. Their manufacturers are interested in pursuing state-of-the-art methods to achieve higher quality and reduced costs. Preliminary investigations of non-intrusive diagnostic techniques utilizing the inherent voltage signals of alternators have been performed with promising results. These techniques are based on time and frequency domain analyses of specially conditioned signals taken from several alternators under various test conditions. This paper discusses investigations that show correlations of the alternator output voltage to airborne noise production. In addition these signals provide insight into internal magnetic characteristics that relate to design and/or assembly problems.

Ayers, C.W.

1996-03-01T23:59:59.000Z

360

Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers  

DOE Patents (OSTI)

A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions of about 4 or 8.7 microns and directly producing images of the interior of the boiler, or producing feeding signals to a data processing system for information to enable a distributed control system by which the boilers are operated to operate said boilers more efficiently. The data processing system includes an image pre-processing circuit in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. It also includes an image compensation system for array compensation to correct for pixel variation and dead cells, etc., and for correcting geometric distortion. An image segmentation module receives a cleaned image from the image pre-processing circuit for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. It also accomplishes thresholding/clustering on gray scale/texture and makes morphological transforms to smooth regions, and identifies regions by connected components. An image-understanding unit receives a segmented image sent from the image segmentation module and matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system for more efficient operation of the plant pendant tube cleaning and operating systems.

Kychakoff, George (Maple Valley, WA); Afromowitz, Martin A. (Mercer Island, WA); Hogle, Richard E. (Olympia, WA)

2008-10-14T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

PHOTOMULTIPLIER CHARACTERISTICS CONSIDERATIONS FOR THE DEEP UNDERWATER MUON AND NEUTRINO DETECTION SYSTEM  

E-Print Network (OSTI)

Presented at the Deep Underwater Huon and Neutrino DetectionCONSIDERATIONS FOR THE DEEP UNDERWATER HUON AND NEUTRINOPresented at the Deep Underwater Huon and Neutrino Detection

Leskovar, B.

2010-01-01T23:59:59.000Z

362

NIST SP 800-94, Guide to Intrusion Detection and Prevention ...  

Science Conference Proceedings (OSTI)

... can be verified, such as comparing vendor-provided checksums to checksums computed for files on the media, or verifying digital signatures on the ...

2012-02-09T23:59:59.000Z

363

Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics  

E-Print Network (OSTI)

Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

Orji, Uzoma A.

364

Abstract--This paper presents an overview of power system islanding and islanding detection techniques. Islanding detection  

E-Print Network (OSTI)

central generating stations, that is placed close to load being served, usually at customer site profile of the system, etc [1]. In fact, many utilities around the world already have a significant

Mahat, Pukar

365

Igneous intrusions and thermal evolution in the Raton Basin, CO-NM: contact metamorphism and coal-bed methane generation .  

E-Print Network (OSTI)

??Tertiary mafic dikes and sills intrude coal-bearing formations of the Raton Basin. This study investigates the role of intrusions in generating methane from coal. Coal… (more)

Cooper, Jennifer Rebecca

2006-01-01T23:59:59.000Z

366

On adaptive transmission, signal detection and channel estimation for multiple antenna systems  

E-Print Network (OSTI)

This research concerns analysis of system capacity, development of adaptive transmission schemes with known channel state information at the transmitter (CSIT) and design of new signal detection and channel estimation schemes with low complexity in some multiple antenna systems. We first analyze the sum-rate capacity of the downlink of a cellular system with multiple transmit antennas and multiple receive antennas assuming perfect CSIT. We evaluate the ergodic sum-rate capacity and show how the sum-rate capacity increases as the number of users and the number of receive antennas increases. We develop upper and lower bounds on the sum-rate capacity and study various adaptive MIMO schemes to achieve, or approach, the sum-rate capacity. Next, we study the minimum outage probability transmission schemes in a multiple-input-single-output (MISO) flat fading channel assuming partial CSIT. Considering two special cases: the mean feedback and the covariance feedback, we derive the optimum spatial transmission directions and show that the associated optimum power allocation scheme, which minimizes the outage probability, is closely related to the target rate and the accuracy of the CSIT. Since CSIT is obtained at the cost of feedback bandwidth, we also consider optimal allocation of bandwidth between the data channel and the feedback channel in order to maximize the average throughput of the data channel in MISO, flat fading, frequency division duplex (FDD) systems. We show that beamforming based on feedback CSI can achieve an average rate larger than the capacity without CSIT under a wide range of mobility conditions. We next study a SAGE-aided List-BLAST detection scheme for MIMO systems which can achieve performance close to that of the maximum-likelihood detector with low complexity. Finally, we apply the EM and SAGE algorithms in channel estimation for OFDM systems with multiple transmit antennas and compare them with a recently proposed least-squares based estimation algorithm. The EM and SAGE algorithms partition the problem of estimating a multi-input channel into independent channel estimation for each transmit-receive antenna pair, therefore avoiding the matrix inversion encountered in the joint least-squares estimation.

Xie, Yongzhe

2004-08-01T23:59:59.000Z

367

Little Goose Dam Full Flow PIT-Tag Detection System Project Summary.  

DOE Green Energy (OSTI)

In 2006, the design phase of this project was kicked off and was for the most part modeled after the Full Flow PIT installation installed at Lower Monumental Dam during winter and spring of 2006 and 2007. As the Goose Full Flow design progressed and the project started to move towards construction, issues within contracting occurred and the project was put on delay for 1 year. Starting in mid December of 2008, Harcon Inc. was awarded the contract and construction of the new Goose Full Flow PIT-tag detection system began. The purpose of this document is to summarize the installation of the Little Goose Full Flow project from start to finish and to highlight the notable successes and challenges that the installation presented along with the final results and current status.

Warf, Don; Livingston, Scott [Pacific States Marine Fisheries Commission

2009-04-16T23:59:59.000Z

368

BASIC METHODS FOR AUTOMATED FAULT DETECTION AND ENERGY DATA VALIDATION IN EXISTING DISTRICT HEATING SYSTEMS  

E-Print Network (OSTI)

behaviour over time, as expected for any kind of instrumentation. For example, incorrect information can be generated if there is a bias change or high level of noise in the signal from a sensor, or if there is a malfunctioning flow meter or temperature sensor. Defect or incorrectly dimensioned valves can degrade the energy efficiency of the system and also need to be detected through the effects on the measurements. Fault detection and diagnostics (FDD) of district heating substations (DHS) are important activities because malfunctioning components can lead to incorrect billing and waste of energy. Although FDD has been an activate research area for nearly two decades, only a few simple tools are commonly deployed in the district energy industry. Some of the methods proposed in the literature are promising, but their complexity may prevent broader application. Other methods require sensor data that are not commonly available, or cannot be expected to function well in practice due to oversimplification. Here we present two basic methods for improved FDD and data validation that are compatible with the data acquisition systems that are commonly used today. We propose that correlation analysis can be used to identify substations with similar supply temperatures and that the corresponding temperature difference is a useful quantity for FDD. The second method is a limitchecking approach for the validation of thermal power usage, which is sensitive to faults affecting both the primary flow and temperature sensors in a DHS. These methods are suitable for automated FDD and are demonstrated with hourly data provided by a Swedish district energy company.

Fredrik S; Jonas Gustafsson; Robert Eklund; Jerker Delsing

2012-01-01T23:59:59.000Z

369

SYSTEM FOR DETECTION AND CONTROL OF DEPOSITION IN KRAFT CHEMICAL RECOVERY BOILERS AND MONITORING GLASS FURNACES  

SciTech Connect

Combustion Specialists, Inc. has just completed a project designed to develop the capability to monitor and control the formation of deposits on the outside of boiler tubes inside an operating kraft recovery furnace. This project, which was carried out in the period from April 1, 2001 to January 31, 2003, was funded by the Department of Energy's Inventions and Innovations program. The primary objectives of the project included the development and demonstration of the ability to produce clear images of deposits throughout the convective sections of operating recovery boilers using newly developed infrared imaging technology, to demonstrate the automated detection and quantification of these deposits using custom designed image processing software developed as part of the project, and to demonstrate the feasibility of all technical elements required for a commercial ''smart'' sootblowing control system based on direct feedback from automated imaging of deposits in real-time. All of the individual tasks have been completed and all objectives have been substantially achieved. Imaging of deposits throughout the convective sections of several recovery boilers has been demonstrated, a design for a combined sootblower/deposit inspection probe has been developed and a detailed heat transfer analysis carried out to demonstrate the feasibility of this design, an improved infrared imager which can be sufficiently miniaturized for this application has been identified, automated deposit detection software has been developed and demonstrated, a detailed design for all the necessary communications and control interfaces has been developed, and a test has been carried out in a glass furnace to demonstrate the applicability of the infrared imaging sensor in that environment. The project was completed on time and within the initial budget. A commercial partner has been identified and further federal funding will be sought to support a project to develop a commercial prototype sootblowing control system employing automated deposit imaging.

Dr. Peter Ariessohn

2003-04-15T23:59:59.000Z

370

Broken Bar Detection in Synchronous Machines Based Wind Energy Conversion System  

E-Print Network (OSTI)

Electrical machines are subject to different types of failures. Early detection of the incipient faults and fast maintenance may prevent costly consequences. Fault diagnosis of wind turbine is especially important because they are situated at extremely high towers and therefore inaccessible. For offshore plants, bad weather can prevent any repair actions for several weeks. In some of the new wind turbines synchronous generators are used and directly connected to the grid without the need of power converters. Despite intensive research efforts directed at rotor fault diagnosis in induction machines, the research work pertinent to damper winding failure of synchronous machines is very limited. This dissertation is concerned with the in-depth study of damper winding failure and its traceable symptoms in different machine signals and parameters. First, a model of a synchronous machine with damper winding based on the winding function approach is presented. Next, simulation and experimental results are presented and discussed. A specially designed inside-out synchronous machine with a damper winding is employed for the experimental setup. Finally, a novel analytical method is developed to predict the behavior of the left sideband amplitude for different numbers and locations of the broken bars. This analysis is based on the magnetic field theory and the unbalanced multiphase circuits. It is found that due to the asymmetrical structure of damper winding, the left sideband component in the stator current spectrum of the synchronous machine during steady state asynchronous operation is not similar to that of the induction machine with broken bars. As a result, the motor current signature analysis (MCSA) for detection rotor failures in the induction machine is usable to detect broken damper bars in synchronous machines. However, a novel intelligent-systems based approach is developed that can identify the severity of the damper winding failure. This approach potentially can be used in a non-invasive condition monitoring system to monitor the deterioration of a synchronous motor damper winding as the number of broken bars increase over time. Some other informative features such as speed spectrum, transient time, torque-speed curve and rotor slip are also found for damper winding diagnosis.

Rahimian, Mina Mashhadi

2011-08-01T23:59:59.000Z

371

Potential Igneous Processes Relevant to the Yucca Mountain Repository: Intrusive-Release Scenario  

Science Conference Proceedings (OSTI)

The Department of Energy (DOE) is moving to prepare and submit a license application to initiate construction of the geologic repository at Yucca Mountain. As part of the application, the DOE must provide estimates of the dose risk to a local population caused by low-probability intrusions of volcanic magma that may occur into the repository after closure. To date, published estimates of such dose risks have included a large number of conservative assumptions such that it appears as if the igneous intrus...

2005-08-31T23:59:59.000Z

372

Weighting versus pruning in rule validation for detecting network and host anomalies  

Science Conference Proceedings (OSTI)

For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause ... Keywords: anomaly detection, machine learning, rule pruning, rule weighting

Gaurav Tandon; Philip K. Chan

2007-08-01T23:59:59.000Z

373

Detecting and Attributing External Influences on the Climate System: A Review of Recent Advances  

Science Conference Proceedings (OSTI)

This paper reviews recent research that assesses evidence for the detection of anthropogenic and natural external influences on the climate. Externally driven climate change has been detected by a number of investigators in independent data ...

2005-05-01T23:59:59.000Z

374

The influence of igneous intrusions on the peak temperatures of host rocks: Finite-time emplacement, evaporation, dehydration, and decarbonation  

Science Conference Proceedings (OSTI)

Using a 13-m-thick basic sill and its limestone host rocks of the Permian Irati Formation from the Parana Basin, South America, as an example, this paper presents a numerical investigation based on heat conduction models on the effect of the emplacement ... Keywords: Dehydration and decarbonation, Evaporation, Igneous intrusions, Intrusion mechanism, Peak temperature

Dayong Wang; Yongchen Song; Yu Liu; Minglong Zhao; Tian Qi; Weiguo Liu

2012-01-01T23:59:59.000Z

375

SNARE: a link analytic system for graph labeling and risk detection  

Science Conference Proceedings (OSTI)

Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of fraud detection due to the high cost of fraud, and being able to automatically ... Keywords: anomaly detection, belief propagation, social networks

Mary McGlohon; Stephen Bay; Markus G. Anderle; David M. Steier; Christos Faloutsos

2009-06-01T23:59:59.000Z

376

EA-507; Environmental Assessment and FONSI For The FAA Explosive Detection System Independent Validation And Verification Program INEL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07; Environmental Assessment and FONSI For The FAA Explosive 07; Environmental Assessment and FONSI For The FAA Explosive Detection System Independent Validation And Verification Program INEL Table of Contents 1. NEED FOR PROPOSED ACTION 2. DESCRIPTION OF THE PROPOSED ACTION 3. ALTERNATIVES TO PROPOSED ACTION 4. ENVIRONMENTAL IMPACTS OF PROPOSED ACTION 5. CONCLUSIONS/SUMMARY 6. LIST OF PREPARERS 7. REFERENCES APPENDIX I Map of WRRTF APPENDIX II Accident Safety Analysis FINDING OF NO SIGNIFICANT IMPACT FEDERAL AVIATION ADMINISTRATION EXPLOSIVE DETECTION SYSTEM - INDEPENDENT VALIDATION AND VERIFICATION PROGRAM LIST OF FIGURES Page XXX WATER REACTOR RESEARCH TEST FACT 1. NEED FOR PROPOSED ACTION The urgent development, fabrication, and operation of advanced explosive detection systems are needed by the Federal Aviation Agency (FAA) to

377

A H-infinity Fault Detection and Diagnosis Scheme for Discrete Nonlinear System Using Output Probability Density Estimation  

Science Conference Proceedings (OSTI)

In this paper, a H-infinity fault detection and diagnosis (FDD) scheme for a class of discrete nonlinear system fault using output probability density estimation is presented. Unlike classical FDD problems, the measured output of the system is viewed as a stochastic process and its square root probability density function (PDF) is modeled with B-spline functions, which leads to a deterministic space-time dynamic model including nonlinearities, uncertainties. A weighting mean value is given as an integral function of the square root PDF along space direction, which leads a function only about time and can be used to construct residual signal. Thus, the classical nonlinear filter approach can be used to detect and diagnose the fault in system. A feasible detection criterion is obtained at first, and a new H-infinity adaptive fault diagnosis algorithm is further investigated to estimate the fault. Simulation example is given to demonstrate the effectiveness of the proposed approaches.

Zhang Yumin; Lum, Kai-Yew [Temasek Laboratories, National University of Singapore, Singapore 117508 (Singapore); Wang Qingguo [Depa. Electrical and Computer Engineering, National University of Singapore, Singapore 117576 (Singapore)

2009-03-05T23:59:59.000Z

378

High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device  

DOE Patents (OSTI)

An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD.

Atac, Muzaffer (Wheaton, IL); McKay, Timothy A. (Ann Arbor, MI)

1998-01-01T23:59:59.000Z

379

System and method for constructing filters for detecting signals whose frequency content varies with time  

DOE Patents (OSTI)

A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

Qian, S.; Dunham, M.E.

1996-11-12T23:59:59.000Z

380

System and method for constructing filters for detecting signals whose frequency content varies with time  

DOE Patents (OSTI)

A system and method for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos{2.pi..phi.(t)} and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {.phi.'(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series (also known as the Gabor spectrogram). The joint time-frequency transformation represents the analyzed signal energy at time t and frequency .function., P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function .phi.'(t) which best fits the multivalued function f(t), a trajectory of the joint time-frequency domain representation of x(t). Integrating .phi.'(t) along t yields .phi.(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template.

Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture  

E-Print Network (OSTI)

The last 20 years have led to unprecedented improvements in chipdensity and system performance fueled mainly by Moore's Law. Duringthe same time, system and application software have bloated, leadingto unmanageable ...

Shrobe, Howard

2007-05-30T23:59:59.000Z

382

Cumulative attestation kernels for embedded systems  

Science Conference Proceedings (OSTI)

There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable commonly-used embedded processors known as flash MCUs to provide remote attestation ...

Michael LeMay; Carl A. Gunter

2009-09-01T23:59:59.000Z

383

Mixing, 3D Mapping, and Lagrangian Evolution of a Thermohaline Intrusion  

Science Conference Proceedings (OSTI)

Observations of the three-dimensional structure and evolution of a thermohaline intrusion in a wide, deep fjord are presented. In an intensive two-ship study centered on an acoustically tracked neutrally buoyant float, a cold, fresh, low-oxygen ...

Matthew H. Alford; Michael C. Gregg; Eric A. D’Asaro

2005-09-01T23:59:59.000Z

384

Influence of the temperature dependence of thermal parameters of heat conduction models on the reconstruction of thermal history of igneous-intrusion-bearing basins  

Science Conference Proceedings (OSTI)

Heat conduction models are important tools for reconstructing the thermal history of sedimentary basins affected by magmatic intrusions. Accurate thermal properties of the intrusion and its wall rocks are crucial for accurate predictions of thermal history. ... Keywords: Igneous intrusion, Peak temperature, Specific heat, Thermal conductivity, Vitrinite reflectance

Dayong Wang; Xiancai Lu; Yongchen Song; Rong Shao; Tian Qi

2010-10-01T23:59:59.000Z

385

Apparatus for detecting a magnetic anomaly contiguous to remote location by squid gradiometer and magnetometer systems  

DOE Patents (OSTI)

A superconducting quantum interference device (SQUID) magnetic detection apparatus detects magnetic fields, signals, and anomalies at remote locations. Two remotely rotatable SQUID gradiometers may be housed in a cryogenic environment to search for and locate unambiguously magnetic anomalies. The SQUID magnetic detection apparatus can be used to determine the azimuth of a hydrofracture by first flooding the hydrofracture with a ferrofluid to create an artificial magnetic anomaly therein.

Overton, Jr., William C. (Los Alamos, NM); Steyert, Jr., William A. (Los Alamos, NM)

1984-01-01T23:59:59.000Z

386

Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.  

Science Conference Proceedings (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

Hinkebein, Thomas E.

2003-03-01T23:59:59.000Z

387

RELIABILITY CONSIDERATIONS OF ELECTRONICS COMPONENTS FOR THE DEEP UNDERWATER MUON AND NEUTRINO DETECTION SYSTEM  

E-Print Network (OSTI)

Considerations for the Dtep Underwater Muon and NeutrinoPresented at the Deep Underwater Huon and Neutrino DetectionCOMPONENTS FOR THE DEEP UNDERWATER MUON AND NEUTRINO

Leskovar, B.

2010-01-01T23:59:59.000Z

388

Oil and gas exploration system and method for detecting trace amounts of hydrocarbon gases in the atmosphere  

DOE Patents (OSTI)

An oil and gas exploration system and method for land and airborne operations, the system and method used for locating subsurface hydrocarbon deposits based upon a remote detection of trace amounts of gases in the atmosphere. The detection of one or more target gases in the atmosphere is used to indicate a possible subsurface oil and gas deposit. By mapping a plurality of gas targets over a selected survey area, the survey area can be analyzed for measurable concentration anomalies. The anomalies are interpreted along with other exploration data to evaluate the value of an underground deposit. The system includes a differential absorption lidar (DIAL) system with a spectroscopic grade laser light and a light detector. The laser light is continuously tunable in a mid-infrared range, 2 to 5 micrometers, for choosing appropriate wavelengths to measure different gases and avoid absorption bands of interference gases. The laser light has sufficient optical energy to measure atmospheric concentrations of a gas over a path as long as a mile and greater. The detection of the gas is based on optical absorption measurements at specific wavelengths in the open atmosphere. Light that is detected using the light detector contains an absorption signature acquired as the light travels through the atmosphere from the laser source and back to the light detector. The absorption signature of each gas is processed and then analyzed to determine if a potential anomaly exists.

Wamsley, Paula R. (Littleton, CO); Weimer, Carl S. (Littleton, CO); Nelson, Loren D. (Evergreen, CO); O' Brien, Martin J. (Pine, CO)

2003-01-01T23:59:59.000Z

389

Panorama: capturing system-wide information flow for malware detection and analysis  

Science Conference Proceedings (OSTI)

Malicious programs spy on users' behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undesirable actions. Unfortunately, existing techniques for detecting malware ... Keywords: dynamic taint analysis, malware analysis, malware detection, spyware

Heng Yin; Dawn Song; Manuel Egele; Christopher Kruegel; Engin Kirda

2007-10-01T23:59:59.000Z

390

Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology  

SciTech Connect

This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

FITZGERALD, ERIC; KOENIG, RICHARD

2005-06-27T23:59:59.000Z

391

Climate of West Antarctica and Influence of Marine Air Intrusions  

Science Conference Proceedings (OSTI)

High-resolution numerical weather forecasts from the Antarctic Mesoscale Prediction System (AMPS) archive are used to investigate the climate of West Antarctica (WA) during 2006–07. A comparison with observations from West Antarctic automatic ...

Julien P. Nicolas; David H. Bromwich

2011-01-01T23:59:59.000Z

392

Improving shipboard maintenance practices using non-intrusive load monitoring  

E-Print Network (OSTI)

(cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

Piber, Mark A. (Mark Augustin)

2007-01-01T23:59:59.000Z

393

Application of Precision Mechanical Engineering Techniques to the Design of a Moderate Energy Beam Transport for the FAA Explosive Detection System  

E-Print Network (OSTI)

Application of Precision Mechanical Engineering Techniques to the Design of a Moderate Energy Beam Transport for the FAA Explosive Detection System

Lujan, R

1993-01-01T23:59:59.000Z

394

Field testing of component-level model-based fault detection methods for mixing boxes and VAV fan systems  

SciTech Connect

An automated fault detection and diagnosis tool for HVAC systems is being developed, based on an integrated, life-cycle, approach to commissioning and performance monitoring. The tool uses component-level HVAC equipment models implemented in the SPARK equation-based simulation environment. The models are configured using design information and component manufacturers' data and then fine-tuned to match the actual performance of the equipment by using data measured during functional tests of the sort using in commissioning. This paper presents the results of field tests of mixing box and VAV fan system models in an experimental facility and a commercial office building. The models were found to be capable of representing the performance of correctly operating mixing box and VAV fan systems and detecting several types of incorrect operation.

Xu, Peng; Haves, Philip

2002-05-16T23:59:59.000Z

395

Instrumented SSH on NERSC Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Security » Instrumented SSH Security » Instrumented SSH Instrumented SSH on NERSC Systems NERSC uses a modified version of SSH on all of our systems that allows us to record and analyze the content of interactive SSH sessions. Why are We Doing This? Credential theft represents the single greatest threat to security here at NERSC. We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile. Until SSH came into widespread use, it was trivial to monitor login sessions and analyze them for mischievous activity. Furthermore, this kind of intrusion detection proved to be very effective with few "false positives". Using this version of SSH at NERSC, we are simply recovering that capability. However, we recognize the importance of being candid about

396

Piezoelectric-based in-situ damage detection of composite materials for structural health monitoring systems  

E-Print Network (OSTI)

Cost-effective and reliable damage detection is critical for the utilization of composite materials. This thesis presents the conclusions of an analytical and experimental survey of candidate methods for in-situ damage ...

Kessler, Seth Stovack, 1977-

2002-01-01T23:59:59.000Z

397

A system for the detection of concealed nuclear weapons and fissile material aboard cargo cotainerships  

E-Print Network (OSTI)

A new approach to the detection of concealed nuclear weapons and fissile material aboard cargo containerships is proposed. The ship-based approach removes the constraints of current thinking by addressing the threat of ...

Gallagher, Shawn P., S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

398

Tornado Detection Using a Neuro–Fuzzy System to Integrate Shear and Spectral Signatures  

Science Conference Proceedings (OSTI)

Tornado vortices observed from Doppler radars are often associated with strong azimuthal shear and Doppler spectra that are wide and flattened. The current operational tornado detection algorithm (TDA) primarily searches for shear signatures that ...

Yadong Wang; Tian-You Yu; Mark Yeary; Alan Shapiro; Shamim Nemati; Michael Foster; David L. Andra Jr.; Michael Jain

2008-07-01T23:59:59.000Z

399

An automated system to detect flash floods and alert at-risk communities  

E-Print Network (OSTI)

This thesis describes an automated monitoring station designed to detect flash floods occurring in the Rio Aguan river basin, Honduras. An Atmel microcontroller polls a series of sensors in the river, logging all data for ...

Weaver, Joshua A., 1978-

2005-01-01T23:59:59.000Z

400

Towards the development of an explosives detection system using Neutron Resonance Radiography  

E-Print Network (OSTI)

Detection of conventional explosives remains a challenge to air security, as indicated by recent reports detailing lapses in security screening and new requirements that mandate screening 100% of checked luggage. Neutron ...

Raas, Whitney

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

IMPLEMENTION AND TESTING OF A FAULT DETECTION SOFTWARE TOOL FOR IMPROVING CONTROL SYSTEM  

E-Print Network (OSTI)

affect the performance of the control scheme and its fault detection sensitivity. 5.2.3 Trend Logging. The process of selecting trend-logging procedures exposed several generic problems faced by building operators

Diamond, Richard

402

Decision support system for water distribution systems based on neural networks and graphs theory for leakage detection  

Science Conference Proceedings (OSTI)

This paper presents an efficient and effective decision support system (DSS) for operational monitoring and control of water distribution systems based on a three layer General Fuzzy Min-Max Neural Network (GFMMNN) and graph theory. The operational monitoring ... Keywords: Decision support system, Graph theory, Loop corrective flows equations, Modeling and simulation, Neural network, Operational control of water distribution systems

Corneliu T. C. Arsene; Bogdan Gabrys; David Al-Dabass

2012-12-01T23:59:59.000Z

403

Efficient multiple objects-oriented event detection over RFID data streams  

Science Conference Proceedings (OSTI)

Complex event processing has been extensively applied in areas such as RFID tracking for supply chain management, fluctuation detection in stock trading, real-time intrusion detection in network monitoring, etc. Most existing research works focus on ... Keywords: NFA, RFID, complex event processing, data stream

Shanglian Peng; Zhanhuai Li; Qiang Li; Qun Chen; Hailong Liu; Yanming Nie; Wei Pan

2010-07-01T23:59:59.000Z

404

DETERMINING THE UNCERTAINTY OF A GPS-BASED COLLISION VEHICLE DETECTION SYSTEM.  

E-Print Network (OSTI)

??Automotive manufacturers are researching forward collision warning systems (FCWS) to reduce the occurrence of rear-end collision accidents between vehicles. Traditionally these systems use forward scanning… (more)

Amin, Sanket

2011-01-01T23:59:59.000Z

405

Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems  

E-Print Network (OSTI)

dioxide flux at the Dixie Valley geothermal field, Nevada;volcanic system, USA Dixie Valley Geothermal Field, USAProvince system like the Dixie Valley (Nevada) geothermal

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2005-01-01T23:59:59.000Z

406

Three-Dimensional Structure and Temporal Evolution of Submesoscale Thermohaline Intrusions in the North Pacific Subtropical Frontal Zone  

Science Conference Proceedings (OSTI)

Four instances of persistent intrusive deformation of the North Pacific Subtropical Front were tagged individually by a Lagrangian float and tracked for several days. Each feature was mapped in three dimensions using repeat towed observations ...

A. Y. Shcherbina; M. C. Gregg; M. H. Alford; R. R. Harcourt

2010-08-01T23:59:59.000Z

407

Field Studies of Soil Vapor Intrusion at a Vacant Manufactured Gas Plant (MGP) Site in Wisconsin  

Science Conference Proceedings (OSTI)

A comprehensive two-phase field-based research program was completed at a former manufactured gas plant (MGP) site located in Wisconsin during the summer of 2008. The purpose of this ongoing research study is to develop improved approaches and methodologies for characterizing the potential for vapor intrusion (VI) at MGP sites. This report describes the methods, results, and limited data interpretation of Phase I (Passive Soil Gas Survey) and Phase II (Soil, Groundwater, and Soil Gas Sampling) at the vac...

2009-06-30T23:59:59.000Z

408

Methane release from igneous intrusion of coal during Late Permian extinction events  

SciTech Connect

Unusually large and locally variable carbon isotope excursions coincident with mass extinctions at the end of the Permian Period (253 Ma) and Guadalupian Epoch (260 Ma) can be attributed to methane outbursts to the atmosphere. Methane has isotopic values {delta}{sup 13}C low enough to reduce to feasible amounts the carbon required for isotopic mass balance. The duration of the carbon isotopic excursions and inferred methane releases are here constrained to < 10,000 yr by counting annual varves in lake deposits and by estimating peat accumulation rates. On paleogeographic maps, the most marked carbon isotope excursions form linear arrays back to plausible methane sources: end-Permian Siberian Traps and Longwood-Bluff intrusions of New Zealand and end-Guadalupian Emeishan Traps of China. Intrusion of coal seams by feeder dikes to flood basalts could create successive thermogenic methane outbursts of the observed timing and magnitude, but these are unreasonably short times for replenishment of marine or permafrost sources of methane. Methane released by fracturing and heating of coal during intrusion of large igneous provinces may have been a planetary hazard comparable with bolide impact.

Retallack, G.J.; Jahren, A.H. [University of Oregon, Eugene, OR (USA). Dept. of Geological Science

2008-01-15T23:59:59.000Z

409

Results of Field-Based Soil Vapor Intrusion (SVI) Research at Two MGP Sites and Implications for SVI Assessment  

Science Conference Proceedings (OSTI)

Soil vapor intrusion (SVI; also known simply as vapor intrusion, or VI) is the migration of volatile or semi-volatile chemicals from subsurface contaminated soil or groundwater to indoor air in an overlying building. In the past decade, SVI has emerged as a major environmental issue. This report presents previously unpublished results of a three-year study of two former manufactured gas plant (MGP) sites to determine the potential for subsurface chemicals to migrate into buildings.

2011-12-30T23:59:59.000Z

410

Program on Technology Innovation: Bat Detection and Shutdown System for Utility-Scale Wind Turbines  

Science Conference Proceedings (OSTI)

Although development of renewable energy sources is generally believed to be a sound environmental decision, wind power development has been criticized for posing potential threats to bats. The objective of this project is to develop and deploy an ultrasonic microphone array on a wind turbine. The array will detect bats near the turbine upon which it is deployed and automatically curtail operations when bats are detected in or near the rotor-swept area. The first two objectives of this project were to se...

2010-11-12T23:59:59.000Z

411

Opportunities for Decay Counting of Environmental Radioisotopes Using Ultra-low-background Detection Systems  

SciTech Connect

Executive Summary We present results from a scoping study whose intent was to define challenge measurements to be pursued on the Ultra-Sensitive Nuclear Measurements Initiative. Potential challenge measurements using new radiation detection technology in the shallow underground laboratory that would have substantial impact in environmental science were the focus of this study.

Runkle, Robert C.; Aalseth, Craig E.; Bailey, Vanessa L.; Bonicalzi, Ricco; Moran, James J.; Seifert, Allen; Warren, Glen A.

2012-08-01T23:59:59.000Z

412

System for detecting operating errors in a variable valve timing engine using pressure sensors  

SciTech Connect

A method and control module includes a pressure sensor data comparison module that compares measured pressure volume signal segments to ideal pressure volume segments. A valve actuation hardware remedy module performs a hardware remedy in response to comparing the measured pressure volume signal segments to the ideal pressure volume segments when a valve actuation hardware failure is detected.

Wiles, Matthew A.; Marriot, Craig D

2013-07-02T23:59:59.000Z

413

Development of OLED panel defect detection system through improved otsu algorithm  

Science Conference Proceedings (OSTI)

OLED (Organic light-emitting) displays have been called the next generation of display devices for their unique properties: colorful images, large viewing angle, light weight and power efficiency. Complex manufacture processing makes the screen have ... Keywords: OLED panel, Otsu method, defect detection, image segmentation, subtraction operation

Jian Gao; Zhiliang Wang; Yanyun Liu; Chuanxia Jian; Xin Chen

2012-10-01T23:59:59.000Z

414

Oceanic Rainfall Detection and Classification in Tropical and Subtropical Mesoscale Convective Systems Using Underwater Acoustic Methods  

Science Conference Proceedings (OSTI)

Measurements of the underwater sound produced by rain were made at three U.S. coastal sites in a study to determine the feasibility and limitations of the acoustic detection and classification of rainfall over water. In the analysis of the rain ...

Peter G. Black; John R. Proni; John C. Wilkerson; Christopher E. Samsury

1997-09-01T23:59:59.000Z

415

DC Arc Fault Detection and Circuit Interruption Technologies for Photovoltaic Systems  

Science Conference Proceedings (OSTI)

In the United States, much like the rest of the world, rapid growth in photovoltaic (PV) systems is currently taking place. These systems are being installed in open fields, on parking structures, and on residential or commercial rooftops. Unfortunately, electrical arcing within a PV system’s DC circuits has caused some fires. DC-sourced electrical fires are difficult to extinguish if arcing originates from unprotected source circuits within a PV array. Several high-visibility structural fires ...

2013-12-20T23:59:59.000Z

416

Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering  

E-Print Network (OSTI)

-scale. At this rate, system failures can lead to considerable material losses and even to serious dangers design-time artifacts, e.g. electrical plans and P&ID (Piping and Instrumentation) models; as well available information, i.e. historical data about system parameters values, information from control system

417

Change-point detection in failure intensity: A case study with repairable artillery systems  

Science Conference Proceedings (OSTI)

Repairable systems can experience unexpected environmental changes over long operational periods. Such changes affect the incidence of failures, causing different system failure patterns before and after the changes. In this article, we propose an informational ... Keywords: Change-point, Homogeneous Poisson process, Modified information criterion, Repairable system, Schwarz information criterion, Statistical trend test

Suk Joo Bae; Byeong Min Mun; Kyung Yong Kim

2013-01-01T23:59:59.000Z

418

Detection and Analysis of Threats to the Energy Sector: DATES  

Science Conference Proceedings (OSTI)

This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

Alfonso Valdes

2010-03-31T23:59:59.000Z

419

A Cabled Acoustic Telemetry System for Detecting and Tracking Juvenile Salmon: Part 2. Three-Dimensional Tracking and Passage Outcomes  

SciTech Connect

In Part 1 of this paper [1], we presented the engineering design and instrumentation of the Juvenile Salmon Acoustic Telemetry System (JSATS) cabled system, a nonproprietary technology developed by the U.S. Army Corps of Engineers, Portland District, to meet the needs for monitoring the survival of juvenile salmonids through the 31 dams in the Federal Columbia River Power System. Here in Part 2, we describe how the JSATS cabled system was employed as a reference sensor network for detecting and tracking juvenile salmon. Time-of-arrival data for valid detections on four hydrophones were used to solve for the three-dimensional (3D) position of fish surgically implanted with JSATS acoustic transmitters. Validation tests demonstrated high accuracy of 3D tracking up to 100 m from the John Day Dam spillway. The along-dam component, used for assigning the route of fish passage, had the highest accuracy; the median errors ranged from 0.06 to 0.22 m, and root mean square errors ranged from 0.05 to 0.56 m at distances up to 100 m. For the case study at John Day Dam during 2008, the range for 3D tracking was more than 100 m upstream of the dam face where hydrophones were deployed, and detection and tracking probabilities of fish tagged with JSATS acoustic transmitters were higher than 98%. JSATS cabled systems have been successfully deployed on several major dams to acquire information for salmon protection and for development of more “fish-friendly” hydroelectric facilities.

Deng, Zhiqun; Weiland, Mark A.; Fu, Tao; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Carlson, Thomas J.; Eppard, Matthew B.

2011-05-26T23:59:59.000Z

420

Methods for Fault Detection, Diagnostics and Prognostics for Building Systems - A Review Part I  

Science Conference Proceedings (OSTI)

This paper provides an overview of fault detection, diagnostics, and prognostics (FDD&P) starting with descriptions of the fundamental processes and some important definitions. This is followed by a review of FDD&P research in the HVAC&R field, and the paper concludes with discussions of the current state of applications in buildings and likely contributions to operating and maintaining buildings in the future.

Katipamula, Srinivas; Brambley, Michael R.

2005-01-31T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Methods for Fault Detection, Diagnostics and Prognostics for Building Systems - A Review Part II  

Science Conference Proceedings (OSTI)

This paper provides the second part of an overview of fault detection, diagnostics, and prognostics (FDD&P) starting with descriptions of the fundamental processes and some important definitions. This is followed by a review of FDD&P research in the HVAC&R field, and the paper concludes with discussions of the current state of applications in buildings and likely contributions to operating and maintaining buildings in the future.

Katipamula, Srinivas; Brambley, Michael R.

2005-04-01T23:59:59.000Z

422

Evaluation of Islanding Detection Methods for Utility-Interactive Inverters in Photovoltaic Systems  

SciTech Connect

This report describes the various methods and circuits that have been developed to detect an islanding condition for photovoltaic applications and presents three methods that have been developed to test those methods and circuits. Passive methods for detecting an islanding condition basically monitor parameters such as voltage and frequency and/or their characteristics and cause the inverter to cease converting power when there is sufficient transition from normal specified conditions. Active methods for detecting the island introduce deliberate changes or disturbances to the connected circuit and then monitor the response to determine if the utility grid with its stable frequency, voltage and impedance is still connected. If the small perturbation is able to affect the parameters of the load connection within prescribed requirements, the active circuit causes the inverter to cease power conversion and delivery of power to the loads. The methods not resident in the inverter are generally controlled by the utility or have communications between the inverter and the utility to affect an inverter shut down when necessary. This report also describes several test methods that may be used for determining whether the anti-islanding method is effective. The test circuits and methodologies used in the U.S. have been chosen to limit the number of tests by measuring the reaction of a single or small number of inverters under a set of consensus-based worst-case conditions.

BOWER, WARD I.; ROPP, MICHAEL

2002-11-01T23:59:59.000Z

423

Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine  

SciTech Connect

Resilient control systems in critical infrastructures require increased cyber-security and state-awareness. One of the necessary conditions for achieving the desired high level of resiliency is timely reporting and understanding of the status and behavioral trends of the control system. This paper describes the design and development of a neural-network based data-fusion system for increased state-awareness of resilient control systems. The proposed system consists of a dedicated data-fusion engine for each component of the control system. Each data-fusion engine implements three-layered alarm system consisting of: (1) conventional threshold-based alarms, (2) anomalous behavior detector using self-organizing maps, and (3) prediction error based alarms using neural network based signal forecasting. The proposed system was integrated with a model of the Idaho National Laboratory Hytest facility, which is a testing facility for hybrid energy systems. Experimental results demonstrate that the implemented data fusion system provides timely plant performance monitoring and cyber-state reporting.

Ondrej Linda; Milos Manic; Timothy R. McJunkin

2011-08-01T23:59:59.000Z

424

Hand-held, Fast-cooling Germanium-based Radiation Detection System  

Livermore Lab Report. News ... The integrated GeMini system has undergone extensive field testing and is at a ... Hand-held radiation detectors are ...

425

Modeling And Fouling Detection Of The Aircraft Environmental Control System Heat Exchanger.  

E-Print Network (OSTI)

??A Diagnostics, Prognostics and Health Management (DPHM) solution is proposed for the operation of the aircraft environmental control system (ECS) cross flow heat exchanger. In… (more)

Shah, Shoaib A.

2009-01-01T23:59:59.000Z

426

Distributed model-invariant detection of unknown inputs in networked systems  

Science Conference Proceedings (OSTI)

This work considers hypothesis testing in networked systems under severe lack of prior knowledge. In previous work we derived a centralized Uniformly Most Powerful Invariant (UMPI) approach to testing unknown inputs in unknown Linear Time Invariant (LTI) ... Keywords: invariant testing, networked systems

James Weimer; Damiano Varagnolo; Karl Henrik Johansson

2013-04-01T23:59:59.000Z

427

Fuzzy expert system for the detection of episodes of poor water quality through continuous measurement  

Science Conference Proceedings (OSTI)

In order to prevent and reduce water pollution, promote a sustainable use, protect the environment and enhance the status of aquatic ecosystems, this article deals with the application of advanced mathematical techniques designed to aid in the management ... Keywords: Automated measurement networks, Fuzzy inference system, Fuzzy logic, Guadiana river, Water quality system

Cecilio Angulo; Joan Cabestany; Pablo Rodríguez; Montserrat Batlle; Antonio González; Sergio de Campos

2012-01-01T23:59:59.000Z

428

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report  

Science Conference Proceedings (OSTI)

Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

2011-09-01T23:59:59.000Z

429

Detection of Explosives Using a Micro-cantilever Array Nano-Calorimeter System  

E-Print Network (OSTI)

Over the past few decades, the likeliness of an attack from explosives has increased dramatically. Hence, the need to find a reliable device with the ability to detect explosives has increased even more. Sensing schemes based on micro-cantilever beams and their bending responses to specific explosives are considered to be an effective technique for explosives detection. In this study the bending responses of an array of micro-cantilever beams integrated with micro-heaters are recorded when they are exposed to various combustible materials. The results show that the micro-cantilever beams display a distinct response when exposed to different combustible materials. In the experiments it was observed that typically the deflection of the micro-cantilever beam in response to the thermal bi-metallic actuation was greater when exposed to acetone vapors than that for alcohol and air. Also, the deflection of the beam was greater for experiments using iso-propyl alcohol than that for air. These results are consistent with prior reports in the literature.

Lane, Matthew

2011-05-01T23:59:59.000Z

430

A dual neutron/gamma source for the Fissmat Inspection for Nuclear Detection (FIND) system.  

SciTech Connect

Shielded special nuclear material (SNM) is very difficult to detect and new technologies are needed to clear alarms and verify the presence of SNM. High-energy photons and neutrons can be used to actively interrogate for heavily shielded SNM, such as highly enriched uranium (HEU), since neutrons can penetrate gamma-ray shielding and gamma-rays can penetrate neutron shielding. Both source particles then induce unique detectable signals from fission. In this LDRD, we explored a new type of interrogation source that uses low-energy proton- or deuteron-induced nuclear reactions to generate high fluxes of mono-energetic gammas or neutrons. Accelerator-based experiments, computational studies, and prototype source tests were performed to obtain a better understanding of (1) the flux requirements, (2) fission-induced signals, background, and interferences, and (3) operational performance of the source. The results of this research led to the development and testing of an axial-type gamma tube source and the design/construction of a high power coaxial-type gamma generator based on the {sup 11}B(p,{gamma}){sup 12}C nuclear reaction.

Doyle, Barney Lee (Sandia National Laboratories, Albuquerque, NM); King, Michael; Rossi, Paolo (Sandia National Laboratories, Albuquerque, NM); McDaniel, Floyd Del (Sandia National Laboratories, Albuquerque, NM); Morse, Daniel Henry; Antolak, Arlyn J.; Provencio, Paula Polyak (Sandia National Laboratories, Albuquerque, NM); Raber, Thomas N.

2008-12-01T23:59:59.000Z

431

Detection of Rooftop Cooling Unit Faults Based on Electrical Measurements  

Science Conference Proceedings (OSTI)

Non-intrusive load monitoring (NILM) is accomplished by sampling voltage and current at high rates and reducing the resulting start transients or harmonic contents to concise ''signatures''. Changes in these signatures can be used to detect, and in many cases directly diagnose, equipment and component faults associated with roof-top cooling units. Use of the NILM for fault detection and diagnosis (FDD) is important because (1) it complements other FDD schemes that are based on thermo-fluid sensors and analyses and (2) it is minimally intrusive (one measuring point in the relatively protected confines of the control panel) and therefore inherently reliable. This paper describes changes in the power signatures of fans and compressors that were found, experimentally and theoretically, to be useful for fault detection.

Armstrong, Peter R.; Laughman, C R.; Leeb, S B.; Norford, L K.

2006-01-31T23:59:59.000Z

432

A cabled acoustic telemetry system for detecting and tracking juvenile salmon: Part 1. Engineering design and instrumentation  

Science Conference Proceedings (OSTI)

The U.S. Army Corps of Engineers-Portland District started development of the Juvenile Salmon Acoustic Telemetry System (JSATS), a nonproprietary technology, in 2001 to meet the needs for monitoring the survival of juvenile salmonids through the 31 federal dams in the Federal Columbia River Power System (FCRPS). Initial development focused on coded acoustic microtransmitters, and autonomous receivers that could be deployed in open reaches of the river for detection of the juvenile salmonids implanted with microtransmitters as they passed the autonomous receiver arrays. In 2006 the Pacific Northwest National Laboratory (PNNL) was tasked with development of an acoustic receiver system for deployment at hydropower facilities (cabled receiver) for detecting fish tagged with microtransmitters as well as tracking them in 2 or 3-dimensions as the fish passed at the facility for determining route of passage. The additional route of passage information, combined with survival estimates, is used by the dam operators and managers to make structural and operational changes at the hydropower facilities to improve survival of fish as they pass the facilities and through the FCRPS.

Weiland, Mark A.; Deng, Zhiqun; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Fu, Tao; Carlson, Thomas J.; Thronas, Aaron I.; Eppard, Matthew B.

2011-05-26T23:59:59.000Z

433

A model-based fault detection and diagnostic methodology for secondary HVAC systems.  

E-Print Network (OSTI)

??In the U.S., buildings consume 39 % of primary energy, of which, 13.5% is attributed to HVAC systems. Faults, arising from sensors, equipment, and control… (more)

Li, Shun

2009-01-01T23:59:59.000Z

434

Fiber optic/cone penetrometer system for subsurface heavy metals detection  

Science Conference Proceedings (OSTI)

This document describes a project designed to develop an intergrated fiber optic sensor/cone penetrometer system to analyze the heavy metals content of the subsurface as a site characterization tool.

Saggese, S.; Greenwell, R.

1995-12-01T23:59:59.000Z

435

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

436

E-Smart System for In-Situ Detection of Environmental Contaminants  

SciTech Connect

A team of industrial, academic, and government organizations participated in the development of the Environmental Systems Management, Analysis and Reporting Network (E-SMART). E-SMART integrates diverse monitoring and control technologies by means of a modular, ''building block'' design approach to allow for flexible system configuration. The E-SMART network treats each smart device-whether a sensor, sampler, or actuator- as a black box that obeys the standard communication protocols and electrical interfaces for the network. This approach allows multiple vendors to produce different sensors which meet the same functional specification and which can be interchanged on the network without affecting operation. The project further developed and advanced the E-SMART standardized network protocol to include new sensors, sampling systems, and graphical user interfaces. Specifically, the E-SMART team developed the following three system elements: (1) Base technology for a new class of smart , highly sensitive, chemically-specific, in-situ, multichannel microsensors utilizing integrated optical interferometry technology, (2) A set of additional E-SMART-compatible sensors adapted from commercial off-the-shelf technologies, and (3) A Data Management and Analysis System (DMAS), including network management components and the user-friendly graphical user interface (GUI) for data evaluation and visualization.

S. Leffler

2000-03-01T23:59:59.000Z

437

Aptamer- and nucleic acid enzyme-based systems for simultaneous detection of multiple analytes  

DOE Patents (OSTI)

The present invention provides aptamer- and nucleic acid enzyme-based systems for simultaneously determining the presence and optionally the concentration of multiple analytes in a sample. Methods of utilizing the system and kits that include the sensor components are also provided. The system includes a first reactive polynucleotide that reacts to a first analyte; a second reactive polynucleotide that reacts to a second analyte; a third polynucleotide; a fourth polynucleotide; a first particle, coupled to the third polynucleotide; a second particle, coupled to the fourth polynucleotide; and at least one quencher, for quenching emissions of the first and second quantum dots, coupled to the first and second reactive polynucleotides. The first particle includes a quantum dot having a first emission wavelength. The second particle includes a second quantum dot having a second emission wavelength different from the first emission wavelength. The third polynucleotide and the fourth polynucleotide are different.

Lu, Yi (Champaign, IL); Liu, Juewen (Albuquerque, NM)

2011-11-15T23:59:59.000Z

438

Geometric detection of coupling directions by means of inter-system recurrence networks  

E-Print Network (OSTI)

We introduce a geometric method for identifying the coupling direction between two dynamical systems based on a bivariate extension of recurrence network analysis. Global characteristics of the resulting inter-system recurrence networks provide a correct discrimination for weakly coupled R\\"ossler oscillators not yet displaying generalised synchronisation. Investigating two real-world palaeoclimate time series representing the variability of the Asian monsoon over the last 10,000 years, we observe indications for a considerable influence of the Indian summer monsoon on climate in Eastern China rather than vice versa. The proposed approach can be directly extended to studying $K>2$ coupled subsystems.

Jan H. Feldhoff; Reik V. Donner; Jonathan F. Donges; N. Marwan; J. Kurths

2013-01-05T23:59:59.000Z

439

Low cost Image Transmission System  

SciTech Connect

Throughout the Department of Energy (DOE) complex, sites protect themselves with intrusion detection systems. Some of these systems have sensors in remote areas. These sensors frequently alarm -- not because they have detected a terrorist skulking around the area, but because they have detected a horse, or a dog, or a bush moving in the breeze. Even though the local security force is 99% sure there is no real threat, they must assess each of these nuisance or false alarms. Generally, the procedure consists of dispatching an inspector to drive to the area and make an assessment. This is expensive in terms of manpower and the assessment is not timely. Often, by the time the inspector arrives, the cause of the alarm has vanished. A television camera placed to view the area protected by the sensor could be used to help in this assessment, but this requires the installation of high-quality cable, optical fiber, or a microwave link. Further, to be of use at the present time, the site must have had the foresight to have installed these facilities in the past and have them ready for use now. What is needed is a device to place between the television camera and a modem connecting to a low-bandwidth channel such as radio or a telephone line. This paper discusses the development of such a device: an Image Transmission System, or ITS.

Skogmo, D.

1994-06-01T23:59:59.000Z

440

Nuclear Materials Identification System (NMIS) with Gamma Spectrometry for Attributes of Pu, HEU, and Detection of HE and Chemical Agents  

SciTech Connect

A combined Nuclear Materials Identification System (NMIS)-gamma ray spectrometry system can be used passively to obtain the following attributes of Pu: presence, fissile mass, 240/239 ratio, and metal vs. oxide. This system can also be used with a small, portable, DT neutron generator to measure the attributes of highly enriched uranium (HEU): presence, fissile mass, enrichment, metal vs. oxide; and detect the presence of high explosives (HE). For the passive system, time-dependent coincidence distributions can be used for the presence, fissile mass, metal vs. oxide for Pu, and gamma-ray spectrometry can be used for 239/240 ratio and presence. So presence can be confirmed by two methods. For the active system with a DT neutron generator, all four attributes for both Pu and HEU can be determined from various features of the time-dependent coincidence distribution measurements for both Pu and HEU. Active gamma ray spectrometry would also give presence and 240/239 ratio for Pu, enrichment for HEU, and metal vs. oxide for both. Active gamma ray spectrometry would determine the presence of HE. The various features of time-dependent coincidence distributions and gamma ray spectrometry that determine these attributes are discussed with some examples from previous determinations.

Mihalczo, J. T.; Mattingly, J. K.; Mullens, J. A.; Neal, J. S.

2002-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Tin oxide nanosensors for highly sensitive toxic gas detection and their 3D system integration  

Science Conference Proceedings (OSTI)

We present nanosensors based on ultrathin SnO"2 films, which are very sensitive to the highly toxic gases SO"2 and H"2S. The SnO"2-sensing films are fabricated by a spray pyrolysis process on Si substrates with a thickness of 50nm. The sensor resistance ... Keywords: 3D-system integration, Gas sensors, Nanosensors, Toxic gases

C. Griessler; E. Brunet; T. Maier; S. Steinhauer; A. Köck; T. Jordi; F. Schrank; M. Schrems

2011-08-01T23:59:59.000Z

442

Home-Explorer: Ontology-based physical artifact search and hidden object detection system  

Science Conference Proceedings (OSTI)

A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects) in the ... Keywords: Smart object, context aware, ontology, semantic web, ubiquitous computing

Bin Guo; Satoru Satake; Michita Imai

2008-04-01T23:59:59.000Z

443

Optimal (short-term) pump schedule detection for water distribution systems by neutral evolutionary search  

Science Conference Proceedings (OSTI)

The application of neutrality is a straightforward tool to preserve population diversity since it allows the genotype (on the represented search space) to be changed without affecting the corresponding fitness. To implement neutrality the literature ... Keywords: Evolutionary computing, Neutrality, Scheduling, Water distribution systems

IstváN Selek; JóZsef Gergely Bene; Csaba Hs

2012-08-01T23:59:59.000Z

444

Evaluation of the Transient Electromagnetic Probing (TEMP) System for Detection of Wall Thinning Through Insulation  

Science Conference Proceedings (OSTI)

Nondestructive techniques to more efficiently examine piping and components for wall thinning are being developed in response to the expressed desire of utilities to perform these examinations without removing insulation. EPRI has conducted a feasibility study to determine the utility application of one system used to examine storage tanks and large pipes in the petrochemical industry.

1993-02-01T23:59:59.000Z

445

A laser gyroscope system to detect the Gravito-Magnetic effect on Earth  

E-Print Network (OSTI)

Large scale square ring laser gyros with a length of four meters on each side are approaching a sensitivity of 1x10^-11 rad/s/sqrt(Hz). This is about the regime required to measure the gravitomagnetic effect (Lense Thirring) of the Earth. For an ensemble of linearly independent gyros each measurement signal depends upon the orientation of each single axis gyro with respect to the rotational axis of the Earth. Therefore at least 3 gyros are necessary to reconstruct the complete angular orientation of the apparatus. In general, the setup consists of several laser gyroscopes (we would prefer more than 3 for sufficient redundancy), rigidly referenced to each other. Adding more gyros for one plane of observation provides a cross-check against intra-system biases and furthermore has the advantage of improving the signal to noise ratio by the square root of the number of gyros. In this paper we analyze a system of two pairs of identical gyros (twins) with a slightly different orientation with respect to the Earth axis. The twin gyro configuration has several interesting properties. The relative angle can be controlled and provides a useful null measurement. A quadruple twin system could reach a 1% sensitivity after 3:2 years of data, provided each square ring has 6 m length on a side, the system is shot noise limited and there is no source for 1/f- noise.

A. Di Virgilio; K. U. Schreiber; A. Gebauer; J-P. R. Wells; A. Tartaglia; J. Belfi; N. Beverini; A. Ortolan

2010-07-12T23:59:59.000Z

446

Joint VBLAST/STBC assisted MC DS/CDMA system with multiuser detection  

Science Conference Proceedings (OSTI)

In this paper a joint transmit scheme employing VBLAST and STBC MIMO profile is considered for a MC DS CDMA system. By combining both the MIMO profile spatial multiplexing and diversity gain can be achieved. At the receiver we employed the generalized ... Keywords: MC-DS/CDMA, MIMO, MMSE, STBC

Prabaagarane Nagaradjane; Arvind Sai Sarathi Vasan; Lakshmi Krishnan; Anand Venkataswamy

2009-09-01T23:59:59.000Z

447

Analysis of the leak-detection system for top welds of EBR-II fuel elements  

SciTech Connect

An analysis of the leak detector used to check the top welds on EBR-II fuel elements was performed. Data were obtained to allow calculation of volumes of the metering chamber and test chamber at each station of the leak detector. These volumes and a mathematical model were used to calculate decrease in pressure with time for each station. Values for calibrated leaks and unknown leak rates were compared with calculated ones. The calculated results for the two calibrated leaks agreed with the observed pressure-time results for the two leaks. Results show that determining the volumes of each leak-detector station allows the leakrate sensitivity to be readily calculated for each station. One leak-detector station could not detect a minimum leak rate of 2 x 10/sup -4/ std cm/sup 3/ sec at 40 atm, which is the current specification. The other four stations could meet the specification. Suggestions are given for periodic calibration of the leak detectors as well as precautions that must be observed to achieve optimum sensitivity when operating the leak detector. (auth)

Hudman, G.D.; Walters, L.C.

1973-05-01T23:59:59.000Z

448

Method to improve cancerous lesion detection sensitivity in a dedicated dual-head scintimammography system  

SciTech Connect

An improved method for enhancing the contrast between background and lesion areas of a breast undergoing dual-head scintimammographic examination comprising: 1) acquiring a pair of digital images from a pair of small FOV or mini gamma cameras compressing the breast under examination from opposing sides; 2) inverting one of the pair of images to align or co-register with the other of the images to obtain co-registered pixel values; 3) normalizing the pair of images pixel-by-pixel by dividing pixel values from each of the two acquired images and the co-registered image by the average count per pixel in the entire breast area of the corresponding detector; and 4) multiplying the number of counts in each pixel by the value obtained in step 3 to produce a normalization enhanced two dimensional contrast map. This enhanced (increased contrast) contrast map enhances the visibility of minor local increases (uptakes) of activity over the background and therefore improves lesion detection sensitivity, especially of small lesions.

Kieper, Douglas Arthur (Seattle, WA); Majewski, Stanislaw (Morgantown, WV); Welch, Benjamin L. (Hampton, VA)

2012-07-03T23:59:59.000Z

449

Method to improve cancerous lesion detection sensitivity in a dedicated dual-head scintimammography system  

DOE Patents (OSTI)

An improved method for enhancing the contrast between background and lesion areas of a breast undergoing dual-head scintimammographic examination comprising: 1) acquiring a pair of digital images from a pair of small FOV or mini gamma cameras compressing the breast under examination from opposing sides; 2) inverting one of the pair of images to align or co-register with the other of the images to obtain co-registered pixel values; 3) normalizing the pair of images pixel-by-pixel by dividing pixel values from each of the two acquired images and the co-registered image by the average count per pixel in the entire breast area of the corresponding detector; and 4) multiplying the number of counts in each pixel by the value obtained in step 3 to produce a normalization enhanced two dimensional contrast map. This enhanced (increased contrast) contrast map enhances the visibility of minor local increases (uptakes) of activity over the background and therefore improves lesion detection sensitivity, especially of small lesions.

Kieper, Douglas Arthur (Newport News, VA); Majewski, Stanislaw (Yorktown, VA); Welch, Benjamin L. (Hampton, VA)

2008-10-28T23:59:59.000Z

450

Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars  

Science Conference Proceedings (OSTI)

The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

2011-05-04T23:59:59.000Z

451

Radiation detection system using semiconductor detector with differential carrier trapping and mobility  

DOE Patents (OSTI)

A system for obtaining improved resolution in relatively thick semiconductor radiation detectors, such as HgI.sub.2, which exhibit significant hole trapping. Two amplifiers are used: the first measures the charge collected and the second the contribution of the electrons to the charge collected. The outputs of the two amplifiers are utilized to unfold the total charge generated within the detector in response to a radiation event.

Whited, Richard C. (Santa Barbara, CA)

1981-01-01T23:59:59.000Z

452

Design and operation specifications of an active monitoring system for detecting southern resident killer whales  

SciTech Connect

Before final approval is given to the Snohomish County Public Utility District No. 1 for deploying the first tidal power devices in the United States in an open water environment, a system to manage the potential risk of injury to killer whales due to collision with moving turbine blades must be demonstrated. The Pacific Northwest National Laboratory (PNNL) is tasked with establishing the performance requirements for, constructing, and testing a prototype marine animal alert system for triggering temporary turbine shutdown when there is risk of collision with a killer whale. To develop a system that relies on active sonar two critical areas must be investigated - the target strength of killer whales and the frequency content of commercially available active sonar units. PNNL studied three target strength models: a simple model, the Fourier matching model, and the Kirchoff-ray mode model. Using target strength measurements of bottlenose dolphins obtained by previous researchers and assuming killer whales share similar morphology and structure, PNNL extrapolated the target strength of an adult killer whale 7.5 m in length at a frequency of 67 kHz. To study the frequency content of a commercially available sonar unit, direct measurements of the signal transmitted by the sonar were obtained by using a hydrophone connected to a data acquisition system in both laboratory and field conditions. The measurements revealed that in addition to the primary frequency of 200 kHz, there is a secondary frequency component at 90 kHz, which is within the hearing range of killer whales. The amplitude of the 90-kHz frequency component is above the hearing threshold of killer whales but below the threshold for potential injuries.

Deng, Zhiqun; Carlson, Thomas J.; Xu, Jinshan; Martinez, Jayson J.; Weiland, Mark A.; Mueller, Robert P.; Myers, Joshua R.; Jones, Mark E.

2011-09-30T23:59:59.000Z

453

Development of Integrated Online Monitoring Systems for Detection of Diversion at Natural Uranium Conversion Facilities  

SciTech Connect

Recent work at Oak Ridge National Laboratory (ORNL) has focused on some source term modeling of uranyl nitrate (UN) as part of a comprehensive validation effort employing gamma-ray detector instrumentation for the detection of diversion from declared conversion activities. Conversion, the process by which natural uranium ore (yellowcake) is purified and converted through a series of chemical processes into uranium hexafluoride gas (UF6), has historically been excluded from the nuclear safeguards requirements of the 235U-based nuclear fuel cycle. The undeclared diversion of this product material could potentially provide feedstock for a clandestine weapons program for state or non-state entities. Given the changing global political environment and the increased availability of dual-use nuclear technology, the International Atomic Energy Agency has evolved its policies to emphasize safeguarding this potential feedstock material in response to dynamic and evolving potential diversion pathways. To meet the demand for instrumentation testing at conversion facilities, ORNL developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions of a purified uranium-bearing aqueous stream exiting the solvent extraction process in a natural uranium conversion plant. This work investigates gamma-ray signatures of UN circulating in the UNCLE facility and evaluates detector instrumentation sensitivity to UN for safeguards applications. These detector validation activities include assessing detector responses to the UN gamma-ray signatures for spectrometers based on sodium iodide, lanthanum bromide, and germanium detectors. The results of measurements under static and dynamic operating conditions at concentrations ranging from 10-90g U/L of naturally enriched UN will be presented. A range of gamma-ray lines was examined and self-attenuation factors were calculated, in addition to attenuation for transmission measurement of density, concentration and enrichment. A detailed uncertainty analysis will be presented providing insights into instrumentation limitations to spoofing.

Dewji, Shaheen A [ORNL; Lee, Denise L [ORNL; Croft, Stephen [ORNL; McElroy, Robert Dennis [ORNL; Hertel, Nolan [Georgia Institute of Technology; Chapman, Jeffrey Allen [ORNL; Cleveland, Steven L [ORNL

2013-01-01T23:59:59.000Z

454

Evaluation of a Fast-Running Urban Dispersion Modeling System Using Joint Urban 2003 Field Data  

Science Conference Proceedings (OSTI)

An urban dispersion modeling system was evaluated using the Joint Urban 2003 field data. The system consists of a fast-running urban airflow model (RUSTIC, for Realistic Urban Spread and Transport of Intrusive Contaminants) that is coupled with a ...

Eric A. Hendricks; Steve R. Diehl; Donald A. Burrows; Robert Keith

2007-12-01T23:59:59.000Z

455

Light stripe projection based parking space detection for intelligent parking assist system  

E-Print Network (OSTI)

Abstract — This paper proposes a novel light stripe projection based free parking space recognition method in order to overcome the common drawbacks of existing vision based target parking position designation methods in dark indoor parking site. 3D information of parking site is recognized by light stripe projection method. By analyzing the 3D information, system can recognize discontinuous points, pivot, and opposite-site reference point. Experiments show that the proposed method can successfully designate target position in spite of dark illumination condition and the black reflective surface of vehicle. Furthermore, because the proposed method can be implemented just by adding a low-cost light plane projector, it is economically practical solution. I I.

Ho Gi Jung; Dong Suk Kim; Pal Joo Yoon; Jaihie Kim

2007-01-01T23:59:59.000Z

456

Distributed detection of mobile malicious node attacks in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to ... Keywords: Intrusion detection, Mobile malicious node, Sequential hypothesis testing

Jun-Won Ho; Matthew Wright; Sajal K. Das

2012-05-01T23:59:59.000Z

457

System and method for ultrafast optical signal detecting via a synchronously coupled anamorphic light pulse encoded laterally  

DOE Patents (OSTI)

In one general embodiment, a method for ultrafast optical signal detecting is provided. In operation, a first optical input signal is propagated through a first wave guiding layer of a waveguide. Additionally, a second optical input signal is propagated through a second wave guiding layer of the waveguide. Furthermore, an optical control signal is applied to a top of the waveguide, the optical control signal being oriented diagonally relative to the top of the waveguide such that the application is used to influence at least a portion of the first optical input signal propagating through the first wave guiding layer of the waveguide. In addition, the first and the second optical input signals output from the waveguide are combined. Further, the combined optical signals output from the waveguide are detected. In another general embodiment, a system for ultrafast optical signal recording is provided comprising a waveguide including a plurality of wave guiding layers, an optical control source positioned to propagate an optical control signal towards the waveguide in a diagonal orientation relative to a top of the waveguide, at least one optical input source positioned to input an optical input signal into at least a first and a second wave guiding layer of the waveguide, and a detector for detecting at least one interference pattern output from the waveguide, where at least one of the interference patterns results from a combination of the optical input signals input into the first and the second wave guiding layer. Furthermore, propagation of the optical control signal is used to influence at least a portion of the optical input signal propagating through the first wave guiding layer of the waveguide.

Heebner, John E. (Livermore, CA)

2010-08-03T23:59:59.000Z

458

Development of real time non-intrusive load monitor for shipboard fluid systems  

E-Print Network (OSTI)

Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

Branch, Perry L. (Perry Lamar)

2008-01-01T23:59:59.000Z

459

171Yb+ System Stability, 5D3/2 Hyperfine State Detection Efficiency and F=2 Lifetime  

E-Print Network (OSTI)

A data acquisition system is described that is designed to stabilize cooling and probe rates to maximize detection sensitivity and minimize possible systematic errors due to correlations between drifting experimental conditions and varying drive parameters. Experimental parameters that affect the Yb171 5D3/2 hyperfine state preparation and detection efficiency are characterized and optimized. A set of wait times for optimal sampling of the D3/2(F=2) lifetime is chosen and used to measure that lifetime with high statistical sensitivity. A systematic variation in this lifetime seems to be apparent. The source of the variation was not identified, but ion number and cooling rate appear to be ruled out. A net determination is made of tau=61.8ms+-(0.6)_stat+-(6.4)_sys which is significantly longer than other measurements of the same quantity. An alternate shelving scheme is proposed that would provide S-D state discrimination for Yb even isotopes as well as improved sensitivity for D state hyperfine discrimination ...

Schacht, M

2013-01-01T23:59:59.000Z

460

Detecting internal corrosion of natural gas transmission pipelines: field tests of probes and systems for real-time corrosion measurement  

Science Conference Proceedings (OSTI)

A field study was conducted to evaluate the use of automated, multi-technique electrochemical corrosion-rate monitoring devices and probes for detecting corrosion in environments similar to those found in natural gas transmission pipelines. It involved measurement of real-time corrosion signals from operating pipelines. Results and interpretation were reported from four different field test locations. Standard flush-mount and custom flange probes were used in four different environments at a gas-gathering site and one environment but two different probe orientations at a natural gas site. These sites were selected to represent normal and upset conditions common in gas transmission pipelines. The environments consisted of two different levels of humidified natural gas, liquid hydrocarbon, and water from natural gas. Probe locations included the 6 and 12 o?clock positions of a natural gas pipeline carrying 2-phase gas/liquid flow. The probe data was monitored using completely remote solar powered systems that provided real-time data transmission via wireless back to a pipeline control station. Data are also presented comparing the ECR probe data to that for coupons used to determine corrosion rate and to detect the presence of microbiologically influenced corrosion (MIC).

Covino, Bernard S., Jr.; Bullard, Sophie J.; Cramer, Stephen D.; Holcomb, Gordon R.; Ziomek-Moroz, M.; Kane, R.D. (InterCorr International); Meidinger, B. (Rocky Mountain Oilfield Testing Center)

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

X-ray detection system development for tandem mirror experiment upgrade (TMX-U): hardware and software  

SciTech Connect

This x-ray detection system measures the electron Bremsstrahlung spectrum from the Tandem Mirror Experiment-Upgrade (TMX-U). From this spectrum, we can calculate the electron temperature. The low energy portion of the spectrum (0.5 to 40 keV) is measured by a liquid-nitrogen-cooled, lithium-drifted silicon detector. The higher energy spectrometer uses an intrinsic germanium detector to accommodate the 100 to 200 keV spectra. The system proceeds as follows. The preamplified detector signals are digitized by a high-speed A-to-D converter located in a Computer Automated Measurement and Control (CAMAC) crate. The data is then stored in a histogramming memory via a data router. The CAMAC crate interfaces with a local desktop computer or the main data acquisition computer that stores the data. The software sets up the modules, acquires the energy spectra (with sample times as short as 2 ms) and plots it. Up to 40 time-resolved spectra are available during one plasma cycle. The actual module configuration, CAMAC interfacing and software that runs the system are the subjects of this paper.

Jones, R.M.; Failor, B.H.; Coutts, G.W.

1984-12-01T23:59:59.000Z

462

Field testing of component-level model-based fault detection methods for mixing boxes and VAV fan systems  

E-Print Network (OSTI)

based methods of fault detection and diagnosis (FDD).Component-level FDD, which is the subject of the work

Xu, Peng; Haves, Philip

2002-01-01T23:59:59.000Z

463

Fission gas detection system  

DOE Patents (OSTI)

A device for collecting fission gas released by a failed fuel rod which device uses a filter to pass coolant but which filter blocks fission gas bubbles which cannot pass through the filter due to the surface tension of the bubble.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

464

Idaho National Laboratory - Technology Transfer - Technologies ...  

... developed a portal-style concealed weapons detection system that uses passive magnetic sensors. The system provides a non-intrusive method for rapid detection, ...

465

Acoustics sound systems for baseball  

Science Conference Proceedings (OSTI)

Acoustic considerations impact the design of sound systems for baseball stadiums in several important ways. Intrusion by the sound system into adjacent residential communities must often be minimized. Excess attenuation greatly increases the required high frequency component of acoustic power for sound travelling long distances

2001-01-01T23:59:59.000Z

466

Noninstrusive Appliance Load Monitoring System (NIALMS): Beta-Test Results  

Science Conference Proceedings (OSTI)

Traditional methods for gathering appliance-specific load data require installation of individual recording meters on each appliance or multi-channel recording meters with remote sensors on individual appliances. This is a highly intrusive approach that is expensive and cumbersome in terms of capital, labor, and customer goodwill. A newly developed non-intrusive appliance load monitoring system (NIALMS) promises to minimize many of the costs of traditional end-use metering approaches.

1997-11-04T23:59:59.000Z

467

An image processing system for the monitoring of special nuclear material and personnel  

SciTech Connect

An important aspect of insider protection in production facilities is the monitoring of the movement of special nuclear material (SNM) and personnel. One system developed at Sandia National Labs for this purpose is the Personnel and Material Tracking System (PAMTRAK). PAMTRAK can intelligently integrate different sensor technologies and the security requirements of a facility to provide a unique capability in monitoring and tracking SNM and personnel. Currently many sensor technologies are used to track the location of personnel and SNM inside a production facility. These technologies are generally intrusive; they require special badges be worn by personnel, special tags be connected to material, and special detection devices be mounted in the area. Video technology, however, is non-intrusive because it does not require that personnel wear special badges or that special tags be attached to SNM. Sandia has developed a video-based image processing system consisting of three major components: the Material Monitoring-Subsystem (MMS), the Personnel Tracking Subsystem (PTS) and the Item Recognition Subsystem (IRS). The basic function of the MMS is to detect movements of SNM, that occur in user-defined regions of interest (ROI) from multiple cameras; these ROI can be of any shape and size. The purpose of the PTS is to track location of personnel in an area using multiple cameras. It can also be used to implement the two-person rule or to detect unauthorized personnel in a restricted area. Finally, the IRS can be used for the recognition and inventory of SNM in a working area. It can also generate a log record on the status of each SNM. Currently the MMS is integrated with PAMTRAK to complement other monitoring technologies in the system. The paper will discuss the system components and their implementations, and describe current enhancements as well as future work.

Thai, T.; Carlson, J.; Urenda, D.; Cooley, T.

1994-08-01T23:59:59.000Z

468

Detection of a thin sheet magnetic anomaly by squid-gradiometer systems: possibility of hydrofracture azimuth determination  

DOE Green Energy (OSTI)

A study of the signal physics of magnetic anomaly detection was carried out by superconducting gradiometer and magnetometer loop systems with SQUID sensors for possible application to the LASL geothermal energy program. In particular, the crack produced by hydrofracture of a deep HDR geothermal borehole would be filled with a magnetic material such as ferrofluid. When polarized by the earth's field, this material would produce a localized crack magnetic anomaly which is characteristic of the azimuth of the vertical crack with respect to magnetic north. Signatures of the anomaly would be determined by taking rotation data before and after filling the crack with magnetic material. A mathematical description was found for these signatures. To test the theory and the feasibility of the idea, the deep borehole vertical cracks were simulated by using panels to define sheets 1.5 mm thick, 1.2 m wide, and 2.5 m high. When filled with ferrofluid of suitable magnetic permeability, the local anomaly develops. Signatures were measured with a horizontal axial gradiometer rotated about a vertical axis. Good agreement was found between theory and experiment for aximuths in the east and west quadrants but only fair agreement in the north and south quadrants.

Overton, W.C. Jr.

1978-12-01T23:59:59.000Z

469

Integrated Technology for Distribution Systems Applications: Survey and Testing of Voltage Detecting/Indicating Devices for AC Power Lines  

Science Conference Proceedings (OSTI)

This report summarizes product reviews and testing commercially available voltage-sensing devices used to detect energized electric distribution lines, with particular focus on minimum detection and indication performance. To adequately detect line energization across the entire spectrum of possible voltage levels on a power line (from 40 Vac to full line voltage), multiple devices are currently necessary. The ideal improvement to address current gaps in voltage sensing would be the development of a ...

2013-12-17T23:59:59.000Z

470

Apparatus and method for detecting a magnetic anomaly contiguous to remote location by SQUID gradiometer and magnetometer systems  

DOE Patents (OSTI)

A superconducting quantum interference device (SQUID) magnetic detection apparatus detects magnetic fields, signals, and anomalies at remote locations. Two remotely rotatable SQUID gradiometers may be housed in a cryogenic environment to search for and locate unambiguously magnetic anomalies. The SQUID magnetic detection apparatus can be used to determine the azimuth of a hydrofracture by first flooding the hydrofracture with a ferrofluid to create an artificial magnetic anomaly therein.

Overton, W.C. Jr.; Steyert, W.A. Jr.

1981-05-22T23:59:59.000Z

471

Exploiting heterogeneous multicore-processor systems for high-performance network processing  

Science Conference Proceedings (OSTI)

In this paper, we examine two network-processing appliances, i.e., the IBM Proventia® Network Intrusion Prevention System and the IBM WebSphere® DataPower® service-oriented architecture appliance, and the ...

H. Franke; T. Nelms; H. Yu; H. D. Achilles; R. Salz

2010-01-01T23:59:59.000Z