Powered by Deep Web Technologies
Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Rapid deployment intrusion detection system  

SciTech Connect

A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs.

Graham, R.H.

1997-08-01T23:59:59.000Z

2

Information sharing for distributed intrusion detection systems  

Science Journals Connector (OSTI)

In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems ... Keywords: Anomaly detection, Denial of service attack, Distributed intrusion detection, Information sharing, Reflector attack

Tao Peng; Christopher Leckie; Kotagiri Ramamohanarao

2007-08-01T23:59:59.000Z

3

MIDAS, the Mobile Intrusion Detection and Assessment System  

SciTech Connect

MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

1990-01-01T23:59:59.000Z

4

A WS-based infrastructure for integrating intrusion detection systems in large-scale environments  

Science Journals Connector (OSTI)

The growing need for information sharing among partnering organizations or members of virtual organizations poses a great security challenge One of the key aspects of this challenge is deploying intrusion detection systems (IDS) that can operate in heterogeneous, ...

José Eduardo M S. Brandão; Joni da Silva Fraga; Paulo Manoel Mafra; Rafael R. Obelheiro

2006-10-01T23:59:59.000Z

5

Functional requirements with survey results for integrated intrusion detection and access control annunciator systems  

SciTech Connect

This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

Arakaki, L.H.; Monaco, F.M.

1995-09-01T23:59:59.000Z

6

c 2013 David Raymond Grochocki Jr DEPLOYMENT CONSIDERATIONS FOR INTRUSION DETECTION SYSTEMS IN  

E-Print Network (OSTI)

by a hybrid sensing infrastructure that uses both a centralized intrusion detection system and embedded meter by the Department of Energy under Award Number DE-OE0000097 as part of the Trustworthy Cyber Infrastructure IN ADVANCED METERING INFRASTRUCTURE BY DAVID RAYMOND GROCHOCKI JR THESIS Submitted in partial fulfillment

Sanders, William H.

7

Time-based intrusion detection in cyber-physical systems  

Science Journals Connector (OSTI)

Embedded systems, particularly real-time systems with temporal constraints, are increasingly deployed in every day life. Such systems that interact with the physical world are also referred to as cyber-physical systems (CPS). These systems commonly find ... Keywords: cyber-physical systems, real-time systems, security, timing analysis

Christopher Zimmer; Balasubramanya Bhat; Frank Mueller; Sibin Mohan

2010-04-01T23:59:59.000Z

8

Stateful Intrusion Detection System (SIDS) Senthilkumar Krishnamurthy and Arunabha Sen,  

E-Print Network (OSTI)

available on the Internet, intruders see the Internet as an easy opportunity for malicious abuse. The study ­ As more and more organizations rely on Internet for communication and e­commerce, the need to protect and experimental validation of the system has been presented. 1. Introduction In the past decade, the Internet has

Sen, Arunabha

9

Intrusion Detection in Realtime Database Systems Via Time Signatures*  

E-Print Network (OSTI)

as ``normal'' transactions, and compare the ability of different numerically quantifiable measures to capture. Introduction In a real­time database system, transactions often have timing constraints. Transactions must meet their timing constraints, often expressed as deadlines, in order to be correct and useful. In stock market

Son, Sang H.

10

Intrusion detection in mobile ad hoc networks  

E-Print Network (OSTI)

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

11

AIDE - Advanced Intrusion Detection Environment  

SciTech Connect

Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

Smith, Cathy L.

2013-04-28T23:59:59.000Z

12

Classification of intrusion detection alerts using abstaining classifiers  

Science Journals Connector (OSTI)

Intrusion Detection Systems have been observed to trigger an abundance of false positives, that is alerts not reporting security problems. Assuming that in real installations most of the alerts are reviewed by human security analysts in a timely manner, ... Keywords: Intrusion detection, abstaining classifiers, alert classification, false positives

Tadeusz Pietraszek

2007-08-01T23:59:59.000Z

13

Intrusion detection using secure signatures  

DOE Patents (OSTI)

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

14

Bloom Filter Based Intrusion Detection for Smart Grid  

E-Print Network (OSTI)

-gram analysis and Bloom Filter. The predictable and regular nature of the SCADA communication patterns is exploited to train the intrusion detection system. The protocol considered to test the proposed approach is MODBUS which is used for communication between a...

Parthasarathy, Saranya

2012-07-16T23:59:59.000Z

15

Toward Cost-Sensitive Modeling for Intrusion Detection Computer Science Department  

E-Print Network (OSTI)

Toward Cost-Sensitive Modeling for Intrusion Detection Wenke Lee Computer Science Department North,ezk,weaselg@cs.columbia.edu Abstract Intrusion detection systems need to maximize security while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion detection models. We examine the major cost

16

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network (OSTI)

and improve the reliability of the distribution system [3].distribution topology for protection and to improve reliability.

Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

2014-01-01T23:59:59.000Z

17

Review: A survey of intrusion detection in wireless network applications  

Science Journals Connector (OSTI)

Information systems are becoming more integrated into our lives. As this integration deepens, the importance of securing these systems increases. Because of lower installation and maintenance costs, many of these systems are largely networked by wireless ... Keywords: Classification, Intrusion detection, Security, Wireless networks

Robert Mitchell, Ing-Ray Chen

2014-04-01T23:59:59.000Z

18

E-Print Network 3.0 - anomaly-based intrusion detection Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

and future anomaly-based intrusion detection systems. 1... arsenal, and the focus of this work, is the ... Source: Maxion, Roy - School of Computer Science, Carnegie Mellon...

19

Cybersecurity testing and intrusion detection for cyber-physical power systems.  

E-Print Network (OSTI)

?? Power systems will increasingly rely on synchrophasor systems for reliable and high-performance wide area monitoring and control (WAMC). Synchrophasor systems greatly use information communication… (more)

Pan, Shengyi

2014-01-01T23:59:59.000Z

20

GrIDS A GRAPH BASED INTRUSION DETECTION SYSTEM FOR LARGE NETWORKS  

E-Print Network (OSTI)

or groups of hosts. By analyzing the characteristics of the activity graphs, GrIDS detects and reports under contract DOD DABT 63-93-C-0045. intra-networks intranets to share and disseminate internal

California at Davis, University of

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule  

E-Print Network (OSTI)

) for detecting malicious unmanned air vehicles (UAVs) in an airborne system in which continuity of operation called Behavior Rule-based Unmanned Air Vehicle (UAV) Intrusion Detection System (BRUIDS). It requires1 Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

Chen, Ing-Ray

22

Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller  

E-Print Network (OSTI)

determined prior to the schedulability analysis. We demonstrate how to provide micro-timings for multiple granularity levels of application code. Through bounds checking of these micro-timings, we develop techniques) to highly critical ones (anti-lock brakes, hydro-electric dam controls and flight control systems

Mueller, Frank

23

Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks  

E-Print Network (OSTI)

The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

Hassanzadeh, Amin

2014-05-03T23:59:59.000Z

24

Costbased Modeling for Fraud and Intrusion Detection: Results from the JAM Project  

E-Print Network (OSTI)

Cost­based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Salvatore J the results achieved using the JAM distributed data mining system for the real world prob­ lem of fraud­of­the­art commercial fraud detection systems can be substantially improved in stopping losses due to fraud by combining

Lee, Wenke

25

Lifetime-Aware Intrusion Detection under Safeguarding Constraints  

E-Print Network (OSTI)

Lifetime-Aware Intrusion Detection under Safeguarding Constraints Ali Iranli, Hanif Fatemi, Massoud in whereby first the safeguarding constraints are satisfied and then the scheduling problem is solved Detection under Safeguarding constraint (IDS) is the version of the problem that we are interested to extend

Pedram, Massoud

26

Developing Novel Approaches to Tamper & Intrusion Detection - Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Novel Approaches to Developing Novel Approaches to Tamper & Intrusion Detection VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Tamper & Intrusion Detection Rapid Sampling from Sealed Containers Demo video Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers

27

Energy Efficient Intrusion Detection in Camera Sensor Networks  

E-Print Network (OSTI)

Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 1 Department of Electrical Engineering Stanford University, Stanford, CA 94305 primoz@stanford.edu 2 such paths is intractable, since there is generally an infinite number of potential paths. Using a geometric

Guibas, Leonidas J.

28

Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis  

E-Print Network (OSTI)

Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

Luo, Dong, 1966-

2001-01-01T23:59:59.000Z

29

Intrusion Detecting Using Secure Signatures - Energy Innovation...  

NLE Websites -- All DOE Office Websites (Extended Search)

notice, patches, or a description of how to detect the security vulnerability, that may grant computer crackers information on the dangerous vulnerability. (DOE Case S-119,457)....

30

An ethernet/IP security review with intrusion detection applications  

SciTech Connect

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

31

Nuclear-power-plant perimeter-intrusion alarm systems  

SciTech Connect

Timely intercept of an intruder requires the examination of perimeter barriers and sensors in terms of reliable detection, immediate assessment and prompt response provisions. Perimeter security equipment and operations must at the same time meet the requirements of the Code of Federal Regulations, 10 CFR 73.55 with some attention to the performance and testing figures of Nuclear Regulatory Guide 5.44, Revision 2, May 1980. A baseline system is defined which recommends a general approach to implementing perimeter security elements: barriers, lighting, intrusion detection, alarm assessment. The baseline approach emphasizes cost/effectiveness achieved by detector layering and logic processing of alarm signals to produce reliable alarms and low nuisance alarm rates. A cost benefit of layering along with video assessment is reduction in operating expense. The concept of layering is also shown to minimize testing costs where detectability performance as suggested by Regulatory Guide 5.44 is to be performed. Synthesis of the perimeter intrusion alarm system and limited testing of CCTV and Video Motion Detectors (VMD), were performed at E-Systems, Greenville Division, Greenville, Texas during 1981.

Halsey, D.J.

1982-04-01T23:59:59.000Z

32

Performance of Neural Networks Methods In Intrusion Detection  

SciTech Connect

By accurately profiling the users via their unique attributes, it is possible to view the intrusion detection problem as a classification of authorized users and intruders. This paper demonstrates that artificial neural network (ANN) techniques can be used to solve this classification problem. Furthermore, the paper compares the performance of three neural networks methods in classifying authorized users and intruders using synthetically generated data. The three methods are the gradient descent back propagation (BP) with momentum, the conjugate gradient BP, and the quasi-Newton BP.

Dao, V N; Vemuri, R

2001-07-09T23:59:59.000Z

33

Real-time processing of a long perimeter fiber optic intrusion system  

E-Print Network (OSTI)

This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

Snider, William Timothy

2009-09-30T23:59:59.000Z

34

KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers  

E-Print Network (OSTI)

Abstract KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available. Numerous researchers employed the datasets in KDD 99 intrusion detection datasets

Zincir-Heywood, Nur

35

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers,...

36

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

37

Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring  

E-Print Network (OSTI)

This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

McKay, Thomas Duncan

2006-01-01T23:59:59.000Z

38

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

39

E-Print Network 3.0 - adaptive intrusion data systems Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

for: adaptive intrusion data systems Page: << < 1 2 3 4 5 > >> 1 Noname manuscript No. (will be inserted by the editor) Summary: to obtain audit data, correlate events, and...

40

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

42

Fuel washout detection system  

DOE Patents (OSTI)

A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

43

Automatic intrusion recovery with system-wide history  

E-Print Network (OSTI)

Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

44

Outline Introduction Types Examples Conclusion Intrusion Detection Systems  

E-Print Network (OSTI)

Engineering - 2008 2 / 15 #12;Outline Introduction Types Examples Conclusion Overview History Need Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 15 #12;Outline Introduction Types Examples Conclusion Outline 1 Introduction Overview History 2 Types

Almulhem, Ahmad

45

EnvironmentSensitive Intrusion Detection Jonathon T. Giffin 1 , David Dagon 2 , Somesh Jha 1 , Wenke Lee 2 , and Barton P. Miller 1  

E-Print Network (OSTI)

Environment­Sensitive Intrusion Detection Jonathon T. Giffin 1 , David Dagon 2 , Somesh Jha 1 of static data. The environment---configuration files, command­line parameters, and envi­ ronment variables behaviors possible in any execution en­ vironment. Processes often read the environment---configuration

Jha, Somesh

46

Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

Mosman, James P. (James Paul)

2006-01-01T23:59:59.000Z

47

E-Print Network 3.0 - anomaly-based network intrusion Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Technologies and Information Sciences 5 INTRUSION DETECTION IN MOBILE AD HOC NETWORKS Summary: is anomaly-based intrusion detection which profiles the symptoms...

48

The geochemical evolution of the Sonju Lake intrusion: assimilation and fractional crystallization in a layered mafic intrusion near Finland, Mn.  

E-Print Network (OSTI)

??The Sonju Lake Intrusion, located within the Beaver Bay Complex near Finland, MN, is the most completely differentiated intrusion related to the Midcontinent Rift System… (more)

Dayton, Ryan N.

2011-01-01T23:59:59.000Z

49

Idaho Explosive Detection System  

ScienceCinema (OSTI)

Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

Klinger, Jeff

2013-05-28T23:59:59.000Z

50

Idaho Explosive Detection System  

SciTech Connect

Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

Klinger, Jeff

2011-01-01T23:59:59.000Z

51

Solar system fault detection  

DOE Patents (OSTI)

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

1986-01-01T23:59:59.000Z

52

Solar system fault detection  

DOE Patents (OSTI)

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, R.B.; Pruett, J.C. Jr.

1984-05-14T23:59:59.000Z

53

Idaho Explosives Detection System  

SciTech Connect

The Idaho Explosives Detection System was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks potentially carrying explosives into military bases. A full-scale prototype system has been built and is currently undergoing testing. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of NaI detectors. The two neutron generators are pulsed and synchronized. A laptop computer controls the entire system. The control software is easily operable by minimally trained staff. The system was developed to detect explosives in a medium size truck within a 5-min measurement time. System performance was successfully demonstrated with explosives at the INL in June 2004 and at Andrews Air Force Base in July 2004.

Edward L. Reber; Larry G. Blackwood; Andrew J. Edwards; J. Keith Jewell; Kenneth W. Rohde; Edward H. Seabury; Jeffery B. Klinger

2005-12-01T23:59:59.000Z

54

Implementation of non-intrusive energy saving estimation for Volt/VAr control of smart distribution system  

Science Journals Connector (OSTI)

Abstract There has been a growing interest among power distribution utilities to explore smart grid technologies to improve the operational efficiency and reliability. As electricity distribution grid is evolving to become “smart”, energy demand reduction is one of the goals for the distribution utilities. In order to obtain this goal, utilities need to commit significant financial resources. Therefore, it became important to assess the benefit of new technologies such as Volt/VAr control (VVC). To compute the energy savings due to VVC implementation, existing algorithms are intrusive, and generally require altering the distribution system control settings and operating points, which is undesirable for system operator. On the other hand, these may require large amount of historical data. In this paper, implementation of a new non-intrusive energy saving estimation algorithm has been presented for integrated Volt/VAr control by Avista Utilities in Northwest USA. Developed algorithm utilizes measurements from smart distribution system. Develop algorithm allows studying the energy saving in long term as it requires no change in control settings of actual distribution system. Satisfactory results have been obtained and validated against field data from experiments on real feeders by Avista Utilities.

S. Chanda; F. Shariatzadeh; A. Srivastava; E. Lee; W. Stone; J. Ham

2014-01-01T23:59:59.000Z

55

Incipient Transient Detection in Reactor Systems: Experimental and Theoretical Investigation  

SciTech Connect

The main goal of this research was to develop a method for detecting reactor system transients at the earliest possible time through a comprehensive experimental, testing and benchmarking program. This approach holds strong promise for developing new diagnostic technologies that are non-intrusive, generic and highly portable across different systems. It will help in the design of new generation nuclear power reactors, which utilize passive safety systems with a reliable and non-intrusive multiphase flow diagnostic system to monitor the function of the passive safety systems. The main objective of this research was to develop an improved fuzzy logic based detection method based on a comprehensive experimental testing program to detect reactor transients at the earliest possible time, practically at their birth moment. A fuzzy logic and neural network based transient identification methodology and implemented in a computer code called PROTREN was considered in this research and was compared with SPRT (Sequentially Probability Ratio Testing) decision and Bayesian inference. The project involved experiment, theoretical modeling and a thermal-hydraulic code assessment. It involved graduate and undergraduate students participation providing them with exposure and training in advanced reactor concepts and safety systems. In this final report, main tasks performed during the project period are summarized and the selected results are presented. Detailed descriptions for the tasks and the results are presented in previous yearly reports (Revankar et al 2003 and Revankar et al 2004).

Lefteri H. Tsoukalas; S.T. Revankar; X Wang; R. Sattuluri

2005-09-27T23:59:59.000Z

56

Arc fault detection system  

DOE Patents (OSTI)

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

Jha, Kamal N. (Bethel Park, PA)

1999-01-01T23:59:59.000Z

57

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

58

A rough set-based effective rule generation method for classification with an application in intrusion detection  

Science Journals Connector (OSTI)

In this paper, we use Rough Set Theory (RST) to address the important problem of generating decision rules for data mining. In particular, we propose a rough set-based approach to mine rules from inconsistent data. It computes the lower and upper approximations for each concept, and then builds concise classification rules for each concept satisfying required classification accuracy. Estimating lower and upper approximations substantially reduces the computational complexity of the algorithm. We use UCI ML Repository data sets to test and validate the approach. We also use our approach on network intrusion data sets captured using our local network from network flows. The results show that our approach produces effective and minimal rules and provides satisfactory accuracy.

Prasanta Gogoi; Dhruba K. Bhattacharyya; Jugal K. Kalita

2013-01-01T23:59:59.000Z

59

Investigating Intrusiveness of Workload Adaptation  

Science Journals Connector (OSTI)

In this paper, we investigate how an automatic task assistant which can detect and react to a user's workload level is able to support the user in a complex, dynamic task. In a user study, we design a dispatcher scenario with low and high workload conditions ... Keywords: brain computer interface, intrusiveness, user study, workload adaptive assistance

Felix Putze, Tanja Schultz

2014-11-01T23:59:59.000Z

60

Incipient fire detection system  

DOE Patents (OSTI)

A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

Brooks, Jr., William K. (Newport News, VA)

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Passive Operating System Identification From TCP/IP Packet Headers* Richard Lippmann, David Fried, Keith Piwowarski, William Streilein  

E-Print Network (OSTI)

-based intrusion detection systems and maintaining a site security policy. Configuring network-based intrusion useful for maintaining a site security policy. A site policy may specify the types of hosts

62

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network (OSTI)

security for the electric power grid,” Proceedings of thecontrol commands in power grids,” in Proc. of the First ACMreveal the state of the power grid, as exemplified by State

Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

2014-01-01T23:59:59.000Z

63

Protein detection system  

DOE Patents (OSTI)

The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

2009-05-05T23:59:59.000Z

64

Thermal neutron detection system  

DOE Patents (OSTI)

According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

Peurrung, Anthony J. (Richland, WA); Stromswold, David C. (West Richland, WA)

2000-01-01T23:59:59.000Z

65

Petroleum systems including unconventional reservoirs in intrusive igneous rocks (sills and laccoliths)  

Science Journals Connector (OSTI)

...formation. Suggested reading Geothermic of petroleum systems: Implications...Economic geology, geology of energy sources Applied geophysics...Schuelke James prefacer Devon Energy United States Soldo Juan prefacer Petrobras Brazil Devon Energy United States Petrobras Brazil...

Daniel H. Delpino; Adriana M. Bermúdez

66

A Bayesian theory of confirmation for intrusion report fusion in process control networks  

Science Journals Connector (OSTI)

We attack the following problem: how to fuse intrusion reports generated individually by intrusion detection algorithms devised especially for process control networks, in such a way as to have them alleviate any possible shortcomings of each other ...

Julian L. Rrushi

2011-07-01T23:59:59.000Z

67

Semi autonomous mine detection system  

SciTech Connect

CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

Douglas Few; Roelof Versteeg; Herman Herman

2010-04-01T23:59:59.000Z

68

Detecting the thermal aureole of a magmatic intrusion in immature to mature sediments: a case study in the East Greenland Basin (73°N)  

Science Journals Connector (OSTI)

......fraction: after air-drying (AD), ethylene-glycol (EG) and hydrazine (Hy) treatment...39Ar dating basaltic intrusions in TGS (Price et-al. 1997). Based on this, it...Sci. Lett. (2002) 194:343-358. Price S.P. , Brodie J., Whitham A.G......

Charles Aubourg; Isabelle Techer; Laurent Geoffroy; Norbert Clauer; François Baudin

2014-01-01T23:59:59.000Z

69

Modeling and simulation of intrusion detection system in mobile ad-hoc networks.  

E-Print Network (OSTI)

??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together… (more)

Jarmal, Piotr

2008-01-01T23:59:59.000Z

70

(Intrusion Path Analysis)  

SciTech Connect

The design and implementation of an Intrusion Path Analysis (IPA) function came about as a result of the upgrades to the security systems at the Savannah River Site (SRS), near Aiken, South Carolina. The stated requirements for IPA were broad, leaving opportunity for creative freedom during design and development. The essential elements were that it: be based on alarm and sensor state data; consider insider as well as outsider threats; be flexible and easily enabled or disabled; not be processor intensive; and provide information to the operator in the event the analysis reveals possible path openings. The final design resulted from many and varied conceptual inputs, and will be implemented in selected test areas at SRS. It fulfils the requirements and: allows selective inclusion of sensors in the analysis; permits the formation of concentric rings of protection around assets; permits the defining of the number of rings which must be breached before issuing an alert; evaluates current sensor states as well as a recent, configurable history of sensor states; considers the sensors' physical location, with respect to the concentric rings; and enables changes for maintenance without software recompilation. 3 figs.

Hardwick, R D

1989-01-01T23:59:59.000Z

71

Explosives detection system and method  

DOE Patents (OSTI)

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2007-12-11T23:59:59.000Z

72

Intrusion Margins and Associated Fractures | Open Energy Information  

Open Energy Info (EERE)

Intrusion Margins and Associated Fractures Intrusion Margins and Associated Fractures Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Intrusion Margins and Associated Fractures Dictionary.png Intrusion Margins and Associated Fractures: No definition has been provided for this term. Add a Definition Controlling Structures List of controlling structures typically associated with geothermal systems: Major Normal Fault Termination of a Major Normal Fault Stepover or Relay Ramp in Normal Fault Zones Apex or Salient of Normal Fault Fault Intersection Accommodation Zone Displacement Transfer Zone Pull-Apart in Strike-Slip Fault Zone Intrusion Margins and Associated Fractures Stratigraphic Boundaries Fissure Swarms Caldera Rim Margins Lithologically Controlled Fractures caused by igneous activity creates permeability, allowing water

73

Intrusion recovery for database-backed web applications  

E-Print Network (OSTI)

Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

Chandra, Ramesh

74

Shipboard applications of non-intrusive load monitoring  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

Ramsey, Jack S

2004-01-01T23:59:59.000Z

75

Improving shipboard applications of non-intrusive load monitoring  

E-Print Network (OSTI)

The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

76

Detection of arcs in automotive electrical systems  

E-Print Network (OSTI)

At the present time, there is no established method for the detection of DC electric arcing. This is a concern for forthcoming advanced automotive electrical systems which consist of higher DC electric power bus voltages, ...

Mishrikey, Matthew David

2005-01-01T23:59:59.000Z

77

Time Domain Terahertz Non Destructive Evaluation of Water Intrusion in Composites and Corrosion under Insulation  

Science Journals Connector (OSTI)

Time domain terahertz (a.k.a. T-Ray or THz) imaging is used to detect water intrusion and delamination in composite structures used in radomes. Corrosion is detected on pipes beneath...

White, Jeffrey S; Zimdars, David A

78

Automated macromolecular crystal detection system and method  

DOE Patents (OSTI)

An automated macromolecular method and system for detecting crystals in two-dimensional images, such as light microscopy images obtained from an array of crystallization screens. Edges are detected from the images by identifying local maxima of a phase congruency-based function associated with each image. The detected edges are segmented into discrete line segments, which are subsequently geometrically evaluated with respect to each other to identify any crystal-like qualities such as, for example, parallel lines, facing each other, similarity in length, and relative proximity. And from the evaluation a determination is made as to whether crystals are present in each image.

Christian, Allen T. (Tracy, CA); Segelke, Brent (San Ramon, CA); Rupp, Bernard (Livermore, CA); Toppani, Dominique (Fontainebleau, FR)

2007-06-05T23:59:59.000Z

79

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

80

Damage detection in initially nonlinear systems  

SciTech Connect

The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

Bornn, Luke [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Idaho Explosives Detection System: Development and Enhancements  

SciTech Connect

The Idaho Explosives Detection System (IEDS) was developed at the Idaho National Laboratory (INL) to respond to threats imposed by delivery trucks carrying bulk explosives into military bases. The system consists of two racks, one on each side of a subject vehicle. Each rack includes a neutron generator and an array of sodium iodide (NaI) detectors. The two neutron generators are pulsed and synchronized. A computer connects to the system by Ethernet and is able to control the system remotely. The system was developed to detect bulk explosives in a medium size truck within a 5-minute measurement time. In 2004, a full-scale prototype IEDS system was built for testing and continued development. System performance was successfully tested using different types of real explosives with a variety of cargo at the INL from November 2005 through February 2006. Recently, the first deployable prototype system was constructed and shipped to Wright-Patterson Air Force Base in Ohio and will be in operation by March 2007. The capability of passively detecting radiological material within a delivery truck has also been added.

Edward L Reber; Larry G. Blackwood; Andrew J. Edwards; Ann E. Egger; Paul J. Petersen

2007-12-01T23:59:59.000Z

82

Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008  

Energy.gov (U.S. Department of Energy (DOE))

A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis.

83

Digital radiographic systems detect boiler tube cracks  

SciTech Connect

Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

Walker, S. [EPRI, Charlotte, NC (United States)

2008-06-15T23:59:59.000Z

84

Intrusive multi-probe system  

SciTech Connect

The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

Green, R.A.; Hester, L.R.; Bouchillon, C.W.

1995-02-01T23:59:59.000Z

85

Method and system for detecting an explosive  

DOE Patents (OSTI)

A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

Reber, Edward L. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Blackwood, Larry G. (Bozeman, MT)

2010-12-07T23:59:59.000Z

86

REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION AND QUANTIFICATION  

E-Print Network (OSTI)

REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION detection Acellent has developed a Real-time Active Pipeline Integrity Detection (RAPID) system. The RAPID system utilizes a sensor network permanently bonded to the pipeline structure along with in

Paris-Sud XI, Université de

87

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges  

NLE Websites -- All DOE Office Websites (Extended Search)

Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Non-Intrusive Load Monitoring - Recent Advances and Existing Challenges Speaker(s): Hampden Kuhns Date: May 10, 2010 - 12:00pm Location: 90-3122 Non-Intrusive Load Monitoring (NILM) describes the process of disaggregating multiple energy loads on a single circuit using signal processing techniques. The granular output of this analysis (much like an itemized phone bill) can help rate payers identify inefficiencies in their buildings and promote cost-effective energy efficiency actions. The concepts behind NIALM were originally developed in the late 1980s by George Hart of MIT and commercialized by Enetics Inc, but hardware expense, accuracy, and detection limit issues have hampered its large scale adoption. This presentation discusses the several steps of the original

88

AUTOMATIC VARIABLE VENTILATION CONTROL SYSTEMS BASED ON AIR QUALITY DETECTION  

E-Print Network (OSTI)

Control Systems Based on Air Quality Detection Isaac Turiel,HVAC CONTROL SYSTEM BASED ON AIR QUALITY SENSING To Zl)(lecontrol systems based on air quality detection Isaac Turiel,

Turiel, Isaac

2011-01-01T23:59:59.000Z

89

A Security-enabled Grid System for MINDS Distributed Data Mining  

Science Journals Connector (OSTI)

Interest has been increasing in mining information from a huge amount of data for various purposes such as business processes, scientific discoveries, and security. MINDS (Minnesota INtrusion Detection System) is...

Seonho Kim; Jinoh Kim; Jon B. Weissman

2014-09-01T23:59:59.000Z

90

Systems and methods for detecting and processing  

DOE Patents (OSTI)

Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

Johnson, Michael M. (Livermore, CA); Yoshimura, Ann S. (Tracy, CA)

2006-03-28T23:59:59.000Z

91

Detection & Diagnostic Systems - Nuclear Engineering Division (Argonne)  

NLE Websites -- All DOE Office Websites (Extended Search)

Departments > Detection & Diagnostic Departments > Detection & Diagnostic Systems DEPARTMENTS Engineering Analysis Nuclear Systems Analysis Research & Test Reactor Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Celebrating the 70th Anniversary of Chicago Pile 1 (CP-1) Argonne OutLoud on Nuclear Energy Argonne Energy Showcase 2012 Detection & Diagnostic Systems Bookmark and Share The Detection & Diagnostic Systems Department conducts research and development related to instruments and non-destructive evaluation (NDE) techniques for characterization of materials and determination of system parameters related to different energy systems (including fossil,

92

Failure Detection with Booting in Partially Synchronous Systems  

E-Print Network (OSTI)

Failure Detection with Booting in Partially Synchronous Systems Josef Widder1 , G´erard Le Lann2 implementation with respect to failure detection time, but also works during the system booting phase. 1

93

VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration  

SciTech Connect

It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

Pritchard, D.A.

1987-05-01T23:59:59.000Z

94

DOE Mobile Detection Assessment Response System (MDARS)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Helps Pioneer "Robot" Patrol Technology: Deployment of the Helps Pioneer "Robot" Patrol Technology: Deployment of the DOE Mobile Detection Assessment Response System (MDARS) The use of patrol robots to cost effectively improve security while reducing health and safety risks at DOE and NNSA nuclear facilities is an HSS advanced technology deployment "first". Over the past 2 years, the HSS Office of Technology has played a key role in working with the Army, the National Nuclear Security Administration (NNSA), the Nevada National Security Site (NNSS) and General Dynamics Robotics Systems to purchase, prototype, test and deploy the first of three MDARS patrol robots at NNSS. In addition to the initial purchase, HSS successfully negotiated a mutually acceptable

95

Method and system for detecting explosives  

DOE Patents (OSTI)

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2009-03-10T23:59:59.000Z

96

A Distributed Visual Surveillance System Xiaojing Yuan, Zehang Sun, Yaakov Varol, and George Bebis  

E-Print Network (OSTI)

. Currently, our system is trained to detect pedestrians and vehicles presented in the observa- tion scenes study, we aim to detect Pedestrian/Vehicle in an observation area. Our vision-based intrusion detection, however, not for real-time application. Haritaoglu et al. [4] developed a single camera system to detect

Bebis, George

97

Human Portable Radiation Detection System Communications Package Evaluation  

SciTech Connect

Testing and valuation of the Human Portable Radiation Detection System Communications Package for the US Coast Guard.

Morgen, Gerald P.; Peterson, William W.

2009-06-11T23:59:59.000Z

98

System for Detection of Small Inclusions in Large Optics  

SciTech Connect

The presence of defects in optical materials can lead to bulk damage or downstream modulation and subsequent surface damage in high fluence laser systems. An inclusion detection system has been developed by the National Ignition Facility Optics Metrology Group. The system detects small inclusions in optical materials with increased sensitivity and speed over previous methods. The system has detected all known inclusions and defects and has detected previously undetected defects smaller than 5 microns.

Wolfe, J E; Runkel, M J

2008-10-24T23:59:59.000Z

99

Resilient Intrusion Tolerance through Proactive and Reactive Recovery  

E-Print Network (OSTI)

system's correct operation. We design a proactive- reactive recovery service based on a hybrid the resilience of an intrusion-tolerant firewall adequate for the protection of critical infrastructures infras- tructures like the Power grid. One approach that promises to satisfy this requirement

Neves, Nuno

100

System and method for detecting cells or components thereof  

DOE Patents (OSTI)

A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

2009-01-06T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Best Management Practice: Distribution System Audits, Leak Detection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice: Distribution System Audits, Leak Best Management Practice: Distribution System Audits, Leak Detection, and Repair Best Management Practice: Distribution System Audits, Leak Detection, and Repair October 7, 2013 - 3:06pm Addthis A distribution system audit, leak detection, and repair programs help Federal facilities reduce water losses and make better use of limited water resources. Overview Federal facilities with large campus settings and expansive distribution systems can lose a significant amount of total water production and purchases to system leaks. Leaks in distribution systems are caused by a number of factors, including pipe corrosion, high system pressure, construction disturbances, frost damage, damaged joints, and ground shifting and settling. Regular distribution system leak detection surveys

102

All row, planar fault detection system  

DOE Patents (OSTI)

An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

2013-07-23T23:59:59.000Z

103

Availability Analysis of Repairable Computer Systems and Stationarity Detection  

E-Print Network (OSTI)

Availability Analysis of Repairable Computer Systems and Stationarity Detection Bruno Sericola computer system and we assume, as usual, that the system is modeled by a finite Markov process. We propose of performability measures. Index TermsÐRepairable computer systems, dependability, availability, performability

Sericola, Bruno

104

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network (OSTI)

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

105

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

106

Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability and Intrusion Detection Vulnerability and Intrusion Detection Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Vulnerability and Intrusion Detection National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy Sector Control Systems Working Group provided technical feedback and recommendations to each project to ensure DOE continues to support robust projects that meet industry needs. Presentations on Vulnerability and Instrusion Detection are below.

107

Explosive simulants for testing explosive detection systems  

DOE Patents (OSTI)

Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

Kury, John W. (Danville, CA); Anderson, Brian L. (Lodi, CA)

1999-09-28T23:59:59.000Z

108

Systems for detecting charged particles in object inspection  

DOE Patents (OSTI)

Techniques, apparatus and systems for detecting particles such as muons. In one implementation, a monitoring system has a cosmic ray-produced charged particle tracker with a plurality of drift cells. The drift cells, which can be for example aluminum drift tubes, can be arranged at least above and below a volume to be scanned to thereby track incoming and outgoing charged particles, such as cosmic ray-produced muons, while also detecting gamma rays. The system can selectively detect devices or materials, such as iron, lead, gold and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can also detect any radioactive sources occupying the volume from gamma rays emitted therefrom. If necessary, the drift tubes can be sealed to eliminate the need for a gas handling system. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

Morris, Christopher L.; Makela, Mark F.

2013-08-20T23:59:59.000Z

109

Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve  

E-Print Network (OSTI)

Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

Taylor, David Donald James

2014-01-01T23:59:59.000Z

110

Automated intrusion recovery for web applications  

E-Print Network (OSTI)

In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

111

Entanglement detection in hybrid optomechanical systems  

SciTech Connect

We study a device formed by a Bose-Einstein condensate (BEC) coupled to the field of a cavity with a moving end mirror and find a working point such that the mirror-light entanglement is reproduced by the BEC-light quantum correlations. This provides an experimentally viable tool for inferring mirror-light entanglement with only a limited set of assumptions. We prove the existence of tripartite entanglement in the hybrid device, persisting up to temperatures of a few milli-Kelvin, and discuss a scheme to detect it.

De Chiara, Gabriele [Fisica Teorica: Informacio i Fenomens Quantics, Universitat Autonoma de Barcelona, E-08193 Bellaterra (Spain); Paternostro, Mauro [Centre for Theoretical Atomic, Molecular and Optical Physics, School of Mathematics and Physics, Queen's University, Belfast BT7 1NN (United Kingdom); Palma, G. Massimo [NEST, Istituto Nanoscienze-CNR and Dipartimento di Fisica, Universita degli Studi di Palermo, Via Archirafi 36, I-90123 Palermo (Italy)

2011-05-15T23:59:59.000Z

112

REDUCED RANK DETECTION SCHEMES FOR DS-CDMA COMMUNICATION SYSTEMS  

E-Print Network (OSTI)

REDUCED RANK DETECTION SCHEMES FOR DS-CDMA COMMUNICATION SYSTEMS Wanshi Chen Ericsson Wireless 90089­2565 e-mail: ubli@usc.edu Abstract -- Several reduced-rank detection schemes for direct- sequence to the multistage linear receiver scheme based on the Cayley Hamilton theorem. The analysis of the reduced rank

Southern California, University of

113

Application of learning classifier systems to fraud detection problem.  

E-Print Network (OSTI)

??This thesis examines the application of learning classi er systems to the problem of electronic fraud (e-fraud) detection. E-fraud is highly lucrative, with estimates suggesting… (more)

Behdad, Mohammad

2013-01-01T23:59:59.000Z

114

Bachelor Thesis Detection of Zeno Sets in Hybrid Systems  

E-Print Network (OSTI)

Bachelor Thesis Detection of Zeno Sets in Hybrid Systems to Validate Modelica Simulations Marcel . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Example: Water Tank . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Modelica 9 3.1 OpenModelica . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.1.1 Hybrid Automata

115

A distributed boundary detection algorithm for multi-robot systems  

E-Print Network (OSTI)

We describe a distributed boundary detection algorithm suitable for use on multi-robot systems with dynamic network topologies. We assume that each robot has access to its local network geometry, which is the combination ...

McLurkin, James

116

UPGRADE AND EVALUATION OF A LIGHTNING DETECTION SYSTEM  

E-Print Network (OSTI)

/11/2004 page 3 of 17 1 INTRODUCTION KNMI (Royal Netherlands Meteorological Institute) has upgraded itsUPGRADE AND EVALUATION OF A LIGHTNING DETECTION SYSTEM Hans Beekhuis Iwan Holleman the Netherlands

Stoffelen, Ad

117

Interactive modeling and analysis of intruder detection systems  

E-Print Network (OSTI)

INTERACTIVE MODELING AND ANALYSIS OF INTRUDER DETECTION SYSTEMS A Thesis by MICHAEL WILLIAM JONES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE December 1991 Major Subject: Industrial Engineering INTERACTIVE MODELING AND ANALYSIS OF INTRUDER DETECTION SYSTEMS A Thesis by MICHAEL WILLIAM JONES Approved as to style and content by: Robert E . Shannon (Co ? Chair of Committee) Kav...

Jones, Michael William

1991-01-01T23:59:59.000Z

118

An expert system for fault detection and diagnosis  

E-Print Network (OSTI)

Major Subject: Electrical Engineering AN EXPERT SYSTEM FOR I AIJLT DETECTION AND DIAGNOSIS A Thesis by PREDRAG SPASOJEVIC Approv d as to style and content by; (, . I Mladen Kezunovic (Chair of ommitt R. Don Russell Ali Abur (Member) / /$t...:l~. , ~ 1 /z Karan L. Watson (Member) Wil iam M. Li y (Member . W. Howze (Head of Department) August 1992 ABSTRACT An Expert System 1' or Fault Detection and Diagnosis. (August 1992) Preclrag Spasojevic, Dipl. Ing. , University of Sarajevo Chair...

Spasojevic, Predrag

1992-01-01T23:59:59.000Z

119

Digital filtering in a disease detection system  

SciTech Connect

A low-pass, nonrecursive digital filter has been designed to process data in an automated enzyme immunoassay system. The software implemented filter has been installed in the Intel 80/10 system controller. A low-speed sample rate of three samples per second allowed the filter algorithm to be programmed in the high-level FORTRAN language with a resultant execution speed of 0.6 seconds per day array. Fourier techniques are used to derive a zero phase shift filter algorithm from a frequency domain prototype. The resulting alogrithm is modified by a Hamming window to reduce transients and Gibbs phenomenon oscillations. Observations on the effectiveness of the filter under full system operation indicate a 90% data recovery rate.

Brown, R.R.

1983-01-01T23:59:59.000Z

120

Methods and systems for remote detection of gases  

DOE Patents (OSTI)

Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

Johnson, Timothy J. (Pasco, WA)

2007-11-27T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Methods and systems for remote detection of gases  

DOE Patents (OSTI)

Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

Johnson, Timothy J

2012-09-18T23:59:59.000Z

122

Strategies To Detect Hidden Geothermal Systems Based On Monitoring and  

Open Energy Info (EERE)

To Detect Hidden Geothermal Systems Based On Monitoring and To Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Strategies To Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Details Activities (5) Areas (1) Regions (0) Abstract: We investigate the potential for CO2 monitoring in thenear-surface environment as an approach to exploration for hiddengeothermal systems. Numerical simulations of CO2 migration from a modelhidden geothermal system show that CO2 concentrations can reach highlevels in the shallow subsurface even for relatively low CO2 fluxes.Therefore, subsurface measurements offer an advantage over above-groundmeasurements which are affected by winds that rapidly disperse

123

Angle Instability Detection in Power Systems with High Wind Penetration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Angle Instability Detection in Power Angle Instability Detection in Power Systems with High Wind Penetration Using PMUs YC Zhang National Renewable Energy Laboratory Yingchen.zhang@nrel.gov 27/28 June 2013 Washington, DC DOE/OE Transmission Reliability Program Angle Instability Detection in Power Systems with High Wind Penetration Using Synchrophasor Measurements  Project Objective * Utilize synchrophasor measurements to estimate the equivalent inertia of a power source such as synchronous generators or wind turbine generators * Develop angle instability detection method for a system with high wind penetration using the synchrophasor measurements 2 3 Background Submitted to IEEE Journal of Emerging and Selected Topics in Power Electronics * In case of angular instability, some machines will have

124

Advanced islanding detection utilized in distribution systems with DFIG  

Science Journals Connector (OSTI)

Abstract The penetration of distributed generation (DG) in electrical power systems is rapidly increasing these days and more attention is drawn to maintain a healthy distribution system. Islanding operation of \\{DGs\\} is one of the biggest challenges to the distribution system stability. Fast and accurate islanding detection can avoid the possibility of damages to the \\{DGs\\} when they are un-intentionally reconnected to the grid and also provide useful information to the protection and automation design of the stand alone operated system. Rate of change of frequency (ROCOF) method is one of the most commonly employed anti-islanding protection techniques, it offers fast detection and easy implementation. However, it is often easily affected by the system disturbance and might not able to detect the islanding situation if the power imbalance between the DG and the load is small. This paper investigates an inter-lock method which can improve the performance of rate of change of frequency (ROCOF) by applying system impedance estimation. It was found that this new method can help in verifying the ROCOF relay islanding detection and avoiding false operations of ROCOF in a grid connected distribution system which has large load variations. The proposed method was verified using the experimental testing results derived from both an experimental testing model which includes an 8 kW Double Feed Induction Generator (DFIG) and a 9 MW DFIG simulation system.

Ke Jia; Tianshu Bi; Bohan Liu; David Thomas; Andrew Goodman

2014-01-01T23:59:59.000Z

125

A Fault Detection and Diagnosis Method for HVAC Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

A Fault Detection and Diagnosis Method for HVAC Systems A Fault Detection and Diagnosis Method for HVAC Systems Speaker(s): Peng Xu Date: December 2, 2002 - 12:00pm Location: Bldg. 90 There is a growing consensus that most buildings do not perform as well as intended and that faults in HVAC systems are widespread in commercial buildings. An automated fault detection and diagnosis tool for HVAC systems is being developed, based on an integrated, life-cycle, approach to commissioning and performance monitoring. The tool uses component-level HVAC equipment models implemented in the SPARK equation-based simulation environment. The models are configured using design information and component manufacturers' data and then fine-tuned to match the actual performance of the equipment by using data measured during functional tests

126

Trial of a Bacterial Screening System for Rapid Detection of Mutagens and Carcinogens  

Science Journals Connector (OSTI)

...of a Bacterial Screening System for Rapid Detection of Mutagens and Carcinogens...Missouri 63103 A bacterial test system for detection of mutagens and carcinogens...SUMMARY A bacterial test system for detection of mutagens and carcinogens...

Daniel S. Longnecker; Thomas J. Curphey; Susan T. James; Douglas S. Daniel; and Nicholas J. Jacobs

1974-07-01T23:59:59.000Z

127

Detecting nonclassical system-environment correlations by local operations  

E-Print Network (OSTI)

We develop a general strategy for the detection of nonclassical system-environment correlations in the initial states of an open quantum system. The method employs a dephasing map which operates locally on the open system and leads to an experimentally accessible witness for genuine quantum correlations, measuring the Hilbert-Schmidt distance between pairs of open system states. We further derive the expectation value of the witness for various random matrix ensembles modeling generic features of complex quantum systems. This expectation value is shown to be proportional to a measure for the quantum discord which reduces to the concurrence for pure initial states.

Manuel Gessner; Heinz-Peter Breuer

2011-08-12T23:59:59.000Z

128

Numerical investigation of transient hydrothermal processes around intrusions: heat-transfer and fluid-  

E-Print Network (OSTI)

Numerical investigation of transient hydrothermal processes around intrusions: heat the intrusion. Keywords: Hydrothermal processes, numerical modelling, magmatic intrusion, permeability- depth around magmatic intrusions have been obtained through coupled hydrothermal numerical modelling that takes

Paris-Sud XI, Université de

129

Vapor intrusion modeling : limitations, improvements, and value of information analyses  

E-Print Network (OSTI)

Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

Friscia, Jessica M. (Jessica Marie)

2014-01-01T23:59:59.000Z

130

A Bayesian theory of confirmation for intrusion report fusion in process control networks  

Science Journals Connector (OSTI)

We attack the following problem: how to fuse intrusion reports generated individually by intrusion detection algorithms devised especially for process control networks, in such a way as to have them alleviate any possible shortcomings of each other while contributing to a joint intrusion detection intelligence. We propose a mathematical development of the Heuer's analysis of competing hypotheses methodology in the form of a Bayesian theory of confirmation. We organise in a matrix the intrusion hypotheses along with evidence, and thereafter use the expectation-maximisation algorithm to estimate probability density functions that indicate the likelihood of each piece of evidence, i.e., hypothesis-based probabilities of each piece of evidence. Relations between the said likelihoods and the degrees to which hypotheses are confirmed on evidence are modelled via the Bayes theorem, which is used in its ratio form to probabilistically compare competing hypotheses against each other. In this regard, we use the probability tree method to estimate prior probabilities of competing hypotheses that are used within the Bayes theorem. We also discuss an empirical testing of the effectiveness of the proposed theory of confirmation via a technique that we call detection failure injection.

Julian L. Rrushi

2011-01-01T23:59:59.000Z

131

Efficient Symbolic Detection of Global Properties in Distributed Systems  

E-Print Network (OSTI)

to total orders containing the happened­before relation. A consistent global state (CGS) of a computation cEfficient Symbolic Detection of Global Properties in Distributed Systems Scott D. Stoller a global state satisfying property \\Phi. Previous general­purpose algorithms for this problem explicitly

Stoller, Scott

132

A Multiple-Channel Sub-Band Transient Detection System  

SciTech Connect

We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of the pairs exhibit dispersion characteristic of skywave propagation via refraction from the ionosphere. The maximum line-of-sight observation range for radio propagation extends as far as 300 km for a source at an altitude of 5 km, and 520 km for a source at 15 km. Refraction from the ionosphere, however, may allow HF radiation to propagate around the globe. Information about the times and locations of sources, in conjunction with regional, weather maps and computer models of ionospheric propagation, suggest that some SIPP events originate in the vicinity of large-scale thunderstorm complexes.

David A. Smith

1998-11-01T23:59:59.000Z

133

Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery  

E-Print Network (OSTI)

on a hybrid distributed system model and show, as a case study, how this service can effectively be used infrastructures. Index Terms--Intrusion tolerance, proactive recovery, reactive recovery, firewall. Ã? 1 that are employed in mission-critical applications such as the SCADA systems used to manage critical infrastructures

Neves, Nuno

134

Distribution System Audits, Leak Detection, and Repair: Kirtland Air Force Base Leak Detection and Repair Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Management Practice Best Management Practice Case Study #3 Distribution System Audits, Leak Detection, and Repair Kirtland Air Force Base - Leak Detection and Repair Program Overview Kirtland Air Force Base (AFB) performed an award winning leak detection and repair program in 2006. The results of the project are saving Kirtland AFB 179 million gallons each year, which is over 16% of the total water use at the base. Kirtland AFB is located on 52,000 acres, southeast and adjacent to Albuquerque, New Mexico. The area is a high altitude desert, only receiving about 8 inches of rain each year. Kirtland AFB draws water from an under- ground aquifer via seven production wells through- out the base. The base also has access to water from the City of Albuquerque. The underground water

135

Distribution System Audits, Leak Detection, and Repair: Kirtland Air Force Base Leak Detection and Repair Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Best Management Practice Best Management Practice Case Study #3 Distribution System Audits, Leak Detection, and Repair Kirtland Air Force Base - Leak Detection and Repair Program Overview Kirtland Air Force Base (AFB) performed an award winning leak detection and repair program in 2006. The results of the project are saving Kirtland AFB 179 million gallons each year, which is over 16% of the total water use at the base. Kirtland AFB is located on 52,000 acres, southeast and adjacent to Albuquerque, New Mexico. The area is a high altitude desert, only receiving about 8 inches of rain each year. Kirtland AFB draws water from an under- ground aquifer via seven production wells through- out the base. The base also has access to water from the City of Albuquerque. The underground water

136

Automatic fault detection on BIPV systems without solar irradiation data  

E-Print Network (OSTI)

BIPV systems are small PV generation units spread out over the territory, and whose characteristics are very diverse. This makes difficult a cost-effective procedure for monitoring, fault detection, performance analyses, operation and maintenance. As a result, many problems affecting BIPV systems go undetected. In order to carry out effective automatic fault detection procedures, we need a performance indicator that is reliable and that can be applied on many PV systems at a very low cost. The existing approaches for analyzing the performance of PV systems are often based on the Performance Ratio (PR), whose accuracy depends on good solar irradiation data, which in turn can be very difficult to obtain or cost-prohibitive for the BIPV owner. We present an alternative fault detection procedure based on a performance indicator that can be constructed on the sole basis of the energy production data measured at the BIPV systems. This procedure does not require the input of operating conditions data, such as solar ...

Leloux, Jonathan; Luna, Alberto; Desportes, Adrien

2014-01-01T23:59:59.000Z

137

Miniature Integrated Nuclear Detection System (MINDS) | Princeton Plasma  

NLE Websites -- All DOE Office Websites (Extended Search)

News Room News Archive American Fusion News Press Releases Publications Weekly Highlights White Papers Fact Sheets Newsletters PPPL News Princeton Journal Watch Blog Events Research Education Organization Contact Us News Room News Archive American Fusion News Press Releases Publications Weekly Highlights White Papers Fact Sheets Newsletters PPPL News Princeton Journal Watch Blog Miniature Integrated Nuclear Detection System (MINDS) Anti-terrorism efforts are getting a boost from the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL). A team led by PPPL engineer Charles Gentile has developed a Miniature Integrated Nuclear Detection System, called MINDS, which can be used to scan moving vehicles, luggage, cargo vessels, and the like for specific nuclear signatures

138

A RECOGNITION SYSTEM THAT USES SACCADES TO DETECT CARS FROM REAL-TIME VIDEO STREAMS  

E-Print Network (OSTI)

for vehicle detection [3, 4], our approach does not rely on motion information, and the system can detect bothA RECOGNITION SYSTEM THAT USES SACCADES TO DETECT CARS FROM REAL-TIME VIDEO STREAMS Predrag ABSTRACT In this work we present a system for detection of ob- jects from video streams based on properties

139

Autonomous navigation system and method  

SciTech Connect

A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.

Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

2009-09-08T23:59:59.000Z

140

Resilient Intrusion Tolerance through Proactive and Reactive Recovery Paulo Sousa Alysson Neves Bessani Miguel Correia  

E-Print Network (OSTI)

critical infrastructures like the Power grid. One approach that promises to satisfy this re- quirement system's correct opera- tion. We design a proactive-reactive recovery service based on a hybrid- silience of an intrusion-tolerant firewall adequate for the pro- tection of critical infrastructures. 1

Neves, Nuno

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Robotic guarded motion system and method  

DOE Patents (OSTI)

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for repeating, on each iteration through an event timing loop, the acts of defining an event horizon, detecting a range to obstacles around the robot, and testing for an event horizon intrusion. Defining the event horizon includes determining a distance from the robot that is proportional to a current velocity of the robot and testing for the event horizon intrusion includes determining if any range to the obstacles is within the event horizon. Finally, on each iteration through the event timing loop, the method includes reducing the current velocity of the robot in proportion to a loop period of the event timing loop if the event horizon intrusion occurs.

Bruemmer, David J. (Idaho Falls, ID)

2010-02-23T23:59:59.000Z

142

Log Summarization and Anomaly Detection for TroubleshootingDistributed Systems  

SciTech Connect

Today's system monitoring tools are capable of detectingsystem failures such as host failures, OS errors, and network partitionsin near-real time. Unfortunately, the same cannot yet be said of theend-to-end distributed softwarestack. Any given action, for example,reliably transferring a directory of files, can involve a wide range ofcomplex and interrelated actions across multiple pieces of software:checking user certificates and permissions, getting details for allfiles, performing third-party transfers, understanding re-try policydecisions, etc. We present an infrastructure for troubleshooting complexmiddleware, a general purpose technique for configurable logsummarization, and an anomaly detection technique that works in near-realtime on running Grid middleware. We present results gathered using thisinfrastructure from instrumented Grid middleware and applications runningon the Emulab testbed. From these results, we analyze the effectivenessof several algorithms at accurately detecting a variety of performanceanomalies.

Gunter, Dan; Tierney, Brian L.; Brown, Aaron; Swany, Martin; Bresnahan, John; Schopf, Jennifer M.

2007-08-01T23:59:59.000Z

143

A Real-time Precrash Vehicle Detection System Zehang Sun1  

E-Print Network (OSTI)

A Real-time Precrash Vehicle Detection System Zehang Sun1 , Ronald Miller2 , George Bebis1-- This paper presents an in-vehicle real-time monocular precrash vehicle detection system. The system acquires have developed a real-time vehicle detection system using a Ford Motor Company proprietary low light

Bebis, George

144

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network (OSTI)

magmatic intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic muds

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

145

Spreader-Bar Radiation Detection System Enhancements: A Modeling and Simulation Study  

SciTech Connect

This report provides the modeling and simulation results of the investigation of enhanced spreader bar radiation detection systems.

Ely, James H.; Ashbaker, Eric D.; Batdorf, Michael T.; Baciak, James E.; Hensley, Walter K.; Jarman, Kenneth D.; Robinson, Sean M.; Sandness, Gerald A.; Schweppe, John E.

2012-11-13T23:59:59.000Z

146

A virtual prototype for an explosives detection system  

SciTech Connect

The development of the resonance-absorption based explosives detection system (EDS), as initially planned, involved the parallel development of a high-current proton accelerator (with a long development time) and the other detection subsystems. The design approach for the latter was to develop a capability for computer modeling the essential processes of each subsystem, benchmark these models by experiment, and link the models, i.e., creating a virtual prototype, to explore the effect of subsystem design changes on the EDS system performance. Additionally, when the EDS prototype system was completed, the linked models would be used to investigate further trade-offs in defining an airport system. Most of the necessary subsystem modeling was completed and used in subsystem design. Linking of all of the subsystems was accomplished to some degree or another. There are many physical and mathematical processes that take place between the acceleration of the proton beam and the final display of the reconstructed image. Figure 1 summarizes these processes and indicates which code was used to model each particular process. Section II reports on the modeling of the proton beam incident on a {sup 13}C target. The gamma-ray output is the desired output from this phase of modeling. Section III describes the tools used to investigate the transport of the gamma-rays through computer simulated phantoms (suitcases). Two different codes were used in this investigation: a Monte Carlo photon transport code and a ray tracing code. One benchmark between these codes was accomplished. Section IV is concerned with the model calculations performed on single detectors. The calculations again were performed with a Monte Carlo transport code. The reconstruction code, used throughout in the simulations and as the workhorse in the analysis of the real experiments. The authors conclude, in Section VII, with the assessment of the simulation/virtual prototyping of the real experiment.

Seed, T.; Berman, B.L.; Zahrt, J.D.

1993-10-01T23:59:59.000Z

147

System and method for detection of dispersed broadband signals  

DOE Patents (OSTI)

A system and method for detecting the presence of dispersed broadband signals in real time are disclosed. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos[l brace]2[phi](t)[r brace]. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase [phi](t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of [phi][prime](t). 10 figs.

Qian, S.; Dunham, M.E.

1999-06-08T23:59:59.000Z

148

System and method for detection of dispersed broadband signals  

DOE Patents (OSTI)

A system and method for detecting the presence of dispersed broadband signals in real time. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos{2.phi.(t)}. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase .phi.(t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of .phi.'(t).

Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

1999-06-08T23:59:59.000Z

149

Development of an Ultra-Wideband Radar System for Vehicle Detection at Railway Crossings  

E-Print Network (OSTI)

Development of an Ultra-Wideband Radar System for Vehicle Detection at Railway Crossings Stephen P-wideband (UWB) radar system designed to detect motor vehicles such as cars and trucks when they are present was supported in part by LaBarge, Inc. down. A sensing system that can detect the presence of a vehicle

Kansas, University of

150

Towards a secure and available smart grid using intrusion tolerance  

Science Journals Connector (OSTI)

In this paper, we propose an intrusion tolerant architecture to enhance the security of smart grid control centers. The proposed architecture is mainly composed of several modules, including replication and diversity, auditing, compromised/faulty replica ... Keywords: SCADA, availability, critical infrastructure, intrusion tolerance, smart grid security

Maryam Tanha; Fazirulhisyam Hashim

2012-11-01T23:59:59.000Z

151

ITB: intrusion-tolerant broadcast protocol in wireless sensor networks  

Science Journals Connector (OSTI)

A large-scale wireless sensor network relies on broadcast protocol for data communication. This paper presents an idea for a base station to reliably and securely broadcast announcing messages to the network in an intrusion-tolerant way. Our Intrusion-Tolerant ...

Jin Wook Lee; Yann-Hang Lee

2006-09-01T23:59:59.000Z

152

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network (OSTI)

3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

Xu, Jing

2010-01-01T23:59:59.000Z

153

A Digest and Pattern Matching-Based Intrusion Detection Engine  

Science Journals Connector (OSTI)

......revised 14 March 2009 Handling editor: Alison Bentley and Florence Leroy 1. INTRODUCTION...sought-for patterns but do suffer performance-wise when short telltales are the search targets...PME is the Lowmem method that is a set-wise multi-pattern Boyer Moore algorithm......

Zhongqiang Chen; Yuan Zhang; Zhongrong Chen; Alex Delis

2009-08-01T23:59:59.000Z

154

Policy-controlled Event Management for Distributed Intrusion Detection  

E-Print Network (OSTI)

building blocks for the formulation of a site's security policy since its conception. A recent addition

Sommer, Robin

155

A Digest and Pattern Matching-Based Intrusion Detection Engine  

Science Journals Connector (OSTI)

......Fingerprinter evaluation Characteristics of wide-area Internet...make-up and patterns of intranet streams have also been...focuses on specific characteristics such as services and...investigate Internet/Intranet traffic due to technical......

Zhongqiang Chen; Yuan Zhang; Zhongrong Chen; Alex Delis

2009-08-01T23:59:59.000Z

156

Cable Damage Detection System and Algorithms Using Time Domain Reflectometry  

SciTech Connect

This report describes the hardware system and the set of algorithms we have developed for detecting damage in cables for the Advanced Development and Process Technologies (ADAPT) Program. This program is part of the W80 Life Extension Program (LEP). The system could be generalized for application to other systems in the future. Critical cables can undergo various types of damage (e.g. short circuits, open circuits, punctures, compression) that manifest as changes in the dielectric/impedance properties of the cables. For our specific problem, only one end of the cable is accessible, and no exemplars of actual damage are available. This work addresses the detection of dielectric/impedance anomalies in transient time domain reflectometry (TDR) measurements on the cables. The approach is to interrogate the cable using time domain reflectometry (TDR) techniques, in which a known pulse is inserted into the cable, and reflections from the cable are measured. The key operating principle is that any important cable damage will manifest itself as an electrical impedance discontinuity that can be measured in the TDR response signal. Machine learning classification algorithms are effectively eliminated from consideration, because only a small number of cables is available for testing; so a sufficient sample size is not attainable. Nonetheless, a key requirement is to achieve very high probability of detection and very low probability of false alarm. The approach is to compare TDR signals from possibly damaged cables to signals or an empirical model derived from reference cables that are known to be undamaged. This requires that the TDR signals are reasonably repeatable from test to test on the same cable, and from cable to cable. Empirical studies show that the repeatability issue is the 'long pole in the tent' for damage detection, because it is has been difficult to achieve reasonable repeatability. This one factor dominated the project. The two-step model-based approach is summarized as follows: Step 1, Cable Modeling: Given input-output TDR signals s(n) and x{sub U}(n) for a cable known to be free of damage, system identification algorithms are used to compute a dynamic prediction-error cable model that has output {cflx x}{sub U}(n). The model is declared valid when the innovations e{sub U}(n) = x{sub U}(n) {cflx x}{sub U}(n) satisfy a statistical zero-mean whiteness test. This validated model output is then used as a known reference to which other cables can be compared. Step 2, Cable Testing: The TDR output signal x{sub D}(n) from a cable under test is compared with the model output {cflx x}{sub U}(n) by computing the innovations e{sub D}(n) = x{sub D}(n) {cflx x}{sub U}(n). The innovations are tested using a short-term whiteness test statistic, which employs a statistical confidence interval. If the cable passes the test, this implies that the model is valid and the cable is declared undamaged. If the cable fails the test, this indicates a model mismatch, which means that the cable's dielectric properties have changed; and this implies that the cable is damaged. The test threshold is adjusted to maximize probability of detection and minimize probability of false alarm according to an empirically determined receiver operating characteristic (ROC) curve. An associated confidence interval on the probability of correct classification is also provided. The effectiveness of the algorithm is demonstrated using measured TDR signals for undamaged and damaged cables. Experimental and algorithmic methods for coping with repeatability issues are presented. The model-based damage detection algorithms have been shown to perform well for some representative examples of real TDR signals acquired using the two-dimensional (2D) mockup fixture. If the damage causes a short circuit, then damage detection performance is generally good to excellent. Examples include the cases demonstrated in this report for cuts and pinholes. If the damage does not cause a short circuit, then damage detection performance is generally poor to fair. Examples include

Clark, G A; Robbins, C L; Wade, K A; Souza, P R

2009-03-24T23:59:59.000Z

157

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage  

Open Energy Info (EERE)

A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: A Conduit-Related Genesis Of The Lengshuiqing Intrusive Assemblage (Sichuan, Sw China) Details Activities (0) Areas (0) Regions (0) Abstract: Lengshuiqing is part of the late Proterozoic igneous province from the western margin of the Yangtze craton. The Lengshuiqing area comprises five ultramafic-mafic intrusions, emplaced in the late Proterozoic Yanbian Group. The intrusions from Lengshuiqing contain cumulate ultramafic zones (peridotite + olivine pyroxenite), with cumulus olivine and Cr-spinel, and intercumulus pyroxenes, hornblende, phlogopite and plagioclase. Ni-Cu ore (pyrrhotite + pentlandite + chalcopyrite) is

158

Profile-based adaptive anomaly detection for network security.  

SciTech Connect

As information systems become increasingly complex and pervasive, they become inextricably intertwined with the critical infrastructure of national, public, and private organizations. The problem of recognizing and evaluating threats against these complex, heterogeneous networks of cyber and physical components is a difficult one, yet a solution is vital to ensuring security. In this paper we investigate profile-based anomaly detection techniques that can be used to address this problem. We focus primarily on the area of network anomaly detection, but the approach could be extended to other problem domains. We investigate using several data analysis techniques to create profiles of network hosts and perform anomaly detection using those profiles. The ''profiles'' reduce multi-dimensional vectors representing ''normal behavior'' into fewer dimensions, thus allowing pattern and cluster discovery. New events are compared against the profiles, producing a quantitative measure of how ''anomalous'' the event is. Most network intrusion detection systems (IDSs) detect malicious behavior by searching for known patterns in the network traffic. This approach suffers from several weaknesses, including a lack of generalizability, an inability to detect stealthy or novel attacks, and lack of flexibility regarding alarm thresholds. Our research focuses on enhancing current IDS capabilities by addressing some of these shortcomings. We identify and evaluate promising techniques for data mining and machine-learning. The algorithms are ''trained'' by providing them with a series of data-points from ''normal'' network traffic. A successful algorithm can be trained automatically and efficiently, will have a low error rate (low false alarm and miss rates), and will be able to identify anomalies in ''pseudo real-time'' (i.e., while the intrusion is still in progress, rather than after the fact). We also build a prototype anomaly detection tool that demonstrates how the techniques might be integrated into an operational intrusion detection framework.

Zhang, Pengchu C. (Sandia National Laboratories, Albuquerque, NM); Durgin, Nancy Ann

2005-11-01T23:59:59.000Z

159

Comparison of enclosed space detection system with conventional methods  

SciTech Connect

Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.

Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

1997-09-01T23:59:59.000Z

160

Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant  

SciTech Connect

The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

1993-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Prototype explosives-detection system based on nuclear-resonance absorption in nitrogen  

SciTech Connect

A prototype explosives-detection system (EDS) that was developed for experimental evaluation of a nuclear-resonance absorption technique is described. The major subsystems are a proton accelerator and beam transport, high-temperature proton target, an airline-luggage tomographic inspection station, and an image-processing/detection-alarm subsystem. The detection system performance, based on a limited experimental test, is reported.

Morgado, R.E.; Arnone, G.; Cappiello, C.C.; Gardner, S.D.; Hollas, C.L.; Ussery, L.E.; White, J.M.; Zahrt, J.D. [Los Alamos National Lab., NM (United States); Krauss, R.A. [Federal Aviation Administration, Atlantic City International Airport, NJ (United States)

1994-06-01T23:59:59.000Z

162

Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System  

E-Print Network (OSTI)

Evaluation of Cost Effective Sensor Combinations for a Vehicle Precrash Detection System John of vehicle safety will benefit greatly from precrash detection ­ the ability of a motor vehicle to predict for ongoing research in developing an integrated object detection and avoidance precrash sensing system

Birdsong, Charles

163

Mobile Sensor Networks for Leak and Backflow Detection in Water Distribution Systems  

Science Journals Connector (OSTI)

Leak and backflow detection are essential aspects of Water Distribution System (WDS) monitoring. Most existing solutions for leak/backflow detection in WDSs focus on the placement of expensive static sensors located strategically. In contrast to these, ... Keywords: water distribution systems, mobile sensors, leak and backflow detection, optimization, algorithms, simulations

M. Agumbe Suresh, L. Smith, A. Rasekh, R. Stoleru, M. K. Banks, B. Shihada

2014-05-01T23:59:59.000Z

164

MACHINE LEARNING SYSTEMS FOR DETECTING DRIVER DROWSINESS Esra Vural, Mjdat etin, Aytl Eril  

E-Print Network (OSTI)

detection system is one of the potential applications of intelligent vehicle systems. Previous approachesMACHINE LEARNING SYSTEMS FOR DETECTING DRIVER DROWSINESS Esra Vural, Müjdat �etin, Aytül Erçil of computing technology has provided the means for building intelligent vehicle systems. Drowsy driver

Yanikoglu, Berrin

165

Collision Detection System Andrew Boissonnault, Akilesh Krishnamurthy Daiheng Ni, Russell Tessier  

E-Print Network (OSTI)

and of the Civil Engineering Department is working to develop a vehicle collision detection system. The systemCollision Detection System Andrew Boissonnault, Akilesh Krishnamurthy Daiheng Ni, Russell Tessier that would be mounted on the front of the vehicle. This system will gather information from all

Mountziaris, T. J.

166

Real-time system for imaging and object detection with a multistatic GPR array  

DOE Patents (OSTI)

A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

Paglieroni, David W; Beer, N Reginald; Bond, Steven W; Top, Philip L; Chambers, David H; Mast, Jeffrey E; Donetti, John G; Mason, Blake C; Jones, Steven M

2014-10-07T23:59:59.000Z

167

Improvements to a queue and delay estimation algorithm utilized in video imaging vehicle detection systems  

E-Print Network (OSTI)

Video Imaging Vehicle Detection Systems (VIVDS) are steadily becoming the dominant method for the detection of vehicles at a signalized traffic approach. This research is intended to investigate the improvement of a queue and delay estimation...

Cheek, Marshall Tyler

2007-09-17T23:59:59.000Z

168

Nuisance Source Population Modeling for Radiation Detection System Analysis  

SciTech Connect

A major challenge facing the prospective deployment of radiation detection systems for homeland security applications is the discrimination of radiological or nuclear 'threat sources' from radioactive, but benign, 'nuisance sources'. Common examples of such nuisance sources include naturally occurring radioactive material (NORM), medical patients who have received radioactive drugs for either diagnostics or treatment, and industrial sources. A sensitive detector that cannot distinguish between 'threat' and 'benign' classes will generate false positives which, if sufficiently frequent, will preclude it from being operationally deployed. In this report, we describe a first-principles physics-based modeling approach that is used to approximate the physical properties and corresponding gamma ray spectral signatures of real nuisance sources. Specific models are proposed for the three nuisance source classes - NORM, medical and industrial. The models can be validated against measured data - that is, energy spectra generated with the model can be compared to actual nuisance source data. We show by example how this is done for NORM and medical sources, using data sets obtained from spectroscopic detector deployments for cargo container screening and urban area traffic screening, respectively. In addition to capturing the range of radioactive signatures of individual nuisance sources, a nuisance source population model must generate sources with a frequency of occurrence consistent with that found in actual movement of goods and people. Measured radiation detection data can indicate these frequencies, but, at present, such data are available only for a very limited set of locations and time periods. In this report, we make more general estimates of frequencies for NORM and medical sources using a range of data sources such as shipping manifests and medical treatment statistics. We also identify potential data sources for industrial source frequencies, but leave the task of estimating these frequencies for future work. Modeling of nuisance source populations is only useful if it helps in understanding detector system performance in real operational environments. Examples of previous studies in which nuisance source models played a key role are briefly discussed. These include screening of in-bound urban traffic and monitoring of shipping containers in transit to U.S. ports.

Sokkappa, P; Lange, D; Nelson, K; Wheeler, R

2009-10-05T23:59:59.000Z

169

A Laser Based Rut Detection and Following System for Autonomous Ground Vehicles  

E-Print Network (OSTI)

A Laser Based Rut Detection and Following System for Autonomous Ground Vehicles Camilo Ordonez and following system is proposed so that autonomous ground vehicles can benefit from the application of this off road driving rule. The proposed system utilizes a path planning algorithm to aid in the rut detection

Collins, Emmanuel

170

A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS  

E-Print Network (OSTI)

1 A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS T. I describes a control scheme with fault detection capabilities suitable for application to HVAC systems as a reference of correct operation. Faults that occur in the HVAC system under control cause the PI

171

Best Management Practice #3: Distribution System Audits, Leak Detection, and Repair  

Energy.gov (U.S. Department of Energy (DOE))

A distribution system audit, leak detection, and repair programs help Federal facilities reduce water losses and make better use of limited water resources.

172

Fault Detection and Diagnosis for Brine to Water Heat Pump Systems.  

E-Print Network (OSTI)

?? This research project is part of a wider project called Smart Fault Detection and Diagnosis for HeatPump Systems currently under development by the Royal… (more)

Vecchio, Daniel

2014-01-01T23:59:59.000Z

173

Testing and Evaluation Protocol for Backpack-Based Radiation Detection Systems Used for Homeland  

E-Print Network (OSTI)

Testing and Evaluation Protocol for Backpack- Based Radiation Detection Systems Used for Homeland................................................................................1 4. Test and evaluation steps .........................................................................................1 5. Recording test results

174

Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas  

Open Energy Info (EERE)

Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Monitoring Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Report: Strategies For Detecting Hidden Geothermal Systems By Near-Surface Gas Monitoring Details Activities (6) Areas (1) Regions (0) Abstract: Hidden geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the

175

Fraud Detection in ERP Systems using Scenario Asadul K. Islam1  

E-Print Network (OSTI)

1 Fraud Detection in ERP Systems using Scenario Matching Asadul K. Islam1 , Malcom Corney1 , George of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraud. This paper describes the design and implementation of a framework for detecting patterns

Paris-Sud XI, Université de

176

Detecting Global Predicates in Distributed Systems with Clocks Scott D. Stoller  

E-Print Network (OSTI)

detection modalities, i.e., 3 meanings of \\predicate held during a computation", namely: PossdbDetecting Global Predicates in Distributed Systems with Clocks Scott D. Stoller Computer Science"). This paper de nes these modalities and gives e cient algorithms for detecting them. The algorithms are based

Stoller, Scott

177

Background-aware Pedestrian/Vehicle Detection System for Driving Environments  

E-Print Network (OSTI)

Background-aware Pedestrian/Vehicle Detection System for Driving Environments Ji Hoon Joung, M. S to enhance the reliability of detection of objects in a driving envi- ronment (e.g. pedestrian and vehicle detections. Our approach considers that if we remove a certain region from an image taken from a vehicle

Ryoo, Michael S.

178

Design of a decentralized detection filter for a class of interconnected LTI systems  

E-Print Network (OSTI)

In this thesis, we consider the problem of designing a decentralized detection filter for a class of homogeneous interconnected systems. In this class of systems, all subsystems have an identical structure. A fault in a subsystem propagates via...

Shankar, Shamanth

2001-01-01T23:59:59.000Z

179

A Qualitive Modeling Approach for Fault Detection and Diagnosis on HVAC Systems  

E-Print Network (OSTI)

This paper describes the basics and first test results of a model based approach using qualitative modeling to perform Fault Detection and Diagnostics (FDD) on HVAC and R systems. A quantized system describing the qualitative behavior of a...

Muller, T.; Rehault, N.; Rist, T.

2013-01-01T23:59:59.000Z

180

High-speed and high-fidelity system and method for collecting network traffic  

DOE Patents (OSTI)

A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

Weigle, Eric H. (Los Alamos, NM)

2010-08-24T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

POWER SYSTEM LINE OUTAGE DETECTION AND IDENTIFICATION --A QUICKEST CHANGE DETECTION APPROACH  

E-Print Network (OSTI)

on accurate records and telemetry data. Such de- ficiencies in situational awareness, including knowledge of the incre- mental change in voltage angle measurements. By processing this data sequentially, we employ detection and/or iden- tification consider the phase difference between two sets of PMU voltage measurements

Liberzon, Daniel

182

Element One Reduces Cost of Hydrogen Leak Detection Systems ...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Begins for "America's Next Top Energy Innovator" SiNode Systems - Advanced silicon graphene batteries. | Photo courtesy of Sinode Systems. Startup Success: Energy Department...

183

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) Sentries and Sleepers in Sensor Networks  

E-Print Network (OSTI)

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS for military, environmental or commercial applications such as intrusion detection [2], disaster monitor- ing sensors save their energy and lengthen the lifetime of their batteries, without significantly degrading

Arora, Anish

184

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) Sentries and Sleepers in Sensor Networks  

E-Print Network (OSTI)

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS can be used for military, environmental or commercial applications such as intrusion detection [2 degrading the performance of the applica­ tions running on the sensor network. Examples of this approach can

Gouda, Mohamed G.

185

Flight Testing of an Advanced Airborne Natural Gas Leak Detection System  

SciTech Connect

ITT Industries Space Systems Division (Space Systems) has developed an airborne natural gas leak detection system designed to detect, image, quantify, and precisely locate leaks from natural gas transmission pipelines. This system is called the Airborne Natural Gas Emission Lidar (ANGEL) system. The ANGEL system uses a highly sensitive differential absorption Lidar technology to remotely detect pipeline leaks. The ANGEL System is operated from a fixed wing aircraft and includes automatic scanning, pointing system, and pilot guidance systems. During a pipeline inspection, the ANGEL system aircraft flies at an elevation of 1000 feet above the ground at speeds of between 100 and 150 mph. Under this contract with DOE/NETL, Space Systems was funded to integrate the ANGEL sensor into a test aircraft and conduct a series of flight tests over a variety of test targets including simulated natural gas pipeline leaks. Following early tests in upstate New York in the summer of 2004, the ANGEL system was deployed to Casper, Wyoming to participate in a set of DOE-sponsored field tests at the Rocky Mountain Oilfield Testing Center (RMOTC). At RMOTC the Space Systems team completed integration of the system and flew an operational system for the first time. The ANGEL system flew 2 missions/day for the duration for the 5-day test. Over the course of the week the ANGEL System detected leaks ranging from 100 to 5,000 scfh.

Dawn Lenz; Raymond T. Lines; Darryl Murdock; Jeffrey Owen; Steven Stearns; Michael Stoogenke

2005-10-01T23:59:59.000Z

186

TWEET: an envelope detection based broadband ultrasonic ranging system  

Science Journals Connector (OSTI)

Fine-grained location information at long range can benefit many applications of embedded sensor networks and robotics. In this paper, we focus on range estimation - an important prerequisite for fine-grained localization - in the ultrasonic domain for ... Keywords: envelope detection, linear chirp, ultrasonic ranging

Prasant Kumar Misra; Diethelm Ostry; Navinda Kottege; Sanjay Jha

2011-10-01T23:59:59.000Z

187

Detection of skin cancer Section for Cognitive Systems  

E-Print Network (OSTI)

, Technical University of Denmark for EOD HCI systems extraction of meaningful and actionable information.imm.dtu.dk 06/11/20093 DTU Informatics, Technical University of Denmark for EOD HCI systems extraction

188

Project of the underwater system for chemical threat detection  

E-Print Network (OSTI)

In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

Silarski, M; Moskal, P; Smolis, M; Tadeja, S

2015-01-01T23:59:59.000Z

189

[1] C. Alcaraz and J. Lopez. WASAM: a dynamic wide-area situational awareness model for critical domains in smart grids. Future Generation Computer Systems, 30:146-154, Jan. 2014.  

E-Print Network (OSTI)

domains in smart grids. Future Generation Computer Systems, 30:146-154, Jan. 2014. [ bib | DOI ] Control. This is the case of the Smart Grid and its domains which should be monitored through intelligent and dynamic] B.-C. Bösch. Economical benefits of standardized intrusion detection parametrization. International

Briesemeister, Linda

190

Fault Detection and Diagnosis in Building HVAC Systems.  

E-Print Network (OSTI)

??Building HVAC systems account for more than 30% of annual energy consumption in United States. However, it has become apparent that only in a small… (more)

Najafi, Massieh

2010-01-01T23:59:59.000Z

191

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network (OSTI)

Contingencies in Electric Power Networks,” proceedings ofthe North American Power Symposium, Ames, IA, OctoberScreening in Electric Power Systems,” submitted to the IEEE

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

192

Systems and methods of detecting force and stress using tetrapod nanocrystal  

DOE Patents (OSTI)

Systems and methods of detecting force on the nanoscale including methods for detecting force using a tetrapod nanocrystal by exposing the tetrapod nanocrystal to light, which produces a luminescent response by the tetrapod nanocrystal. The method continues with detecting a difference in the luminescent response by the tetrapod nanocrystal relative to a base luminescent response that indicates a force between a first and second medium or stresses or strains experienced within a material. Such systems and methods find use with biological systems to measure forces in biological events or interactions.

Choi, Charina L.; Koski, Kristie J.; Sivasankar, Sanjeevi; Alivisatos, A. Paul

2013-08-20T23:59:59.000Z

193

Affordable System for Rapid Detection and Mitigation of Emerging Diseases  

Science Journals Connector (OSTI)

South and South-East Asian countries are currently in the midst of a new epidemic of Dengue Fever. This paper presents disease surveillance systems in Sri Lanka and India, monitoring a handful of communicable diseases termed as notifiable. These systems ... Keywords: Alerting, Biosurveillance, Data Mining, Epidemiology, Interoperability, Mhealth, Spatio-Temporal Analysis

Nuwan Waidyanatha, Artur Dubrawski, Ganesan M., Gordon Gow

2011-01-01T23:59:59.000Z

194

Optically Detected Magnetic Resonance Studies on ?-conjugated semiconductor systems  

SciTech Connect

Optically Detected Magnetic Resonance (ODMR) techniques were used to investigate the dynamics of excitons and charge carriers in ?-conjugated organic semiconductors. Degradation behavior of the negative spin-1/2 electroluminescence-detected magnetic resonance (ELDMR) was observed in Alq3 devices. The increase in the resonance amplitude implies an increasing bipolaron formation during degradation, which might be the result of growth of charge traps in the device. The same behavior of the negative spin-1/2 ELDMR was observed in 2wt% Rubrene doped Tris(8-hydroxyquinolinato)aluminium (Alq3) devices. However, with increasing injection current, a positive spin-1/2 ELDMR, together with positive spin 1 triplet powder patterns at {delta}m{sub S}={+-}1 and {delta}m{sub S}={+-}2, emerges. Due to the similarities in the frequency dependences of single and double modulated ELDMR and the photoluminescence-detected magnetic resonance (PLDMR) results in poly[2-methoxy-5-(2 -ethyl-hexyloxy)-1,4-phenyl ene vinylene] (MEH-PPV) films, the mechanism for this positive spin-1/2 ELDMR was assigned to enhanced triplet-polaron quenching under resonance conditions. The ELDMR in rubrene doped Alq3 devices provides a path to investigate charge distribution in the device under operational conditions. Combining the results of several devices with different carrier blocking properties and the results from transient EL, it was concluded trions not only exist near buffer layer but also exist in the electron transport layer. This TPQ model can also be used to explain the positive spin-1/2 PLDMR in poly(3-hexylthiophene) (P3HT) films at low temperature and in MEH-PPV films at various temperatures up to room temperature. Through quantitative analysis, TE-polaron quenching (TPQ) model is shown having the ability to explain most behaviors of the positive spin-1/2 resonance. Photocurrent detected magnetic resonance (PCDMR) studies on MEH-PPV devices revealed a novel transient resonance signal. The signal may originate from the higher concentration of deep traps near cathode. A quantitative analysis based on this assumption was carried out and found to be consistent with the experimental results.

Chen, Ying

2011-12-06T23:59:59.000Z

195

The implementation of an intelligent and video-based fall detection system using a neural network  

Science Journals Connector (OSTI)

This paper presents the development of a smart fall detector to minimise accidental falls which occur among elderly people, especially for indoor situations. A video-based detection system was utilised, as this can preserve privacy and monitor the physical ... Keywords: Elderly people, Fall detection, Neural network, Video-based camera

Laila Alhimale, Hussein Zedan, Ali Al-Bayatti

2014-05-01T23:59:59.000Z

196

System for detecting acoustic emissions in multianvil experiments: Application to deep seismicity in the Earth  

E-Print Network (OSTI)

System for detecting acoustic emissions in multianvil experiments: Application to deep seismicity be responsible for the occurrence of earthquakes. Detecting acoustic emissions from a specimen during faulting acoustic emissions under HPHT conditions, due to technical challenges. And those studies have used only one

Jung, Haemyeong

197

WWLL global lightning detection system: Regional validation study in Erin H. Lay,1,2  

E-Print Network (OSTI)

convective rainfall as well as to predict flash flooding [Tapia et al., 1998]. Global lightning data couldWWLL global lightning detection system: Regional validation study in Brazil Erin H. Lay,1,2 Robert] An experimental lightning detection network, the World Wide Lightning Location network (WWLL), is being developed

Thomas, Jeremy N.

198

Agent-based artificial immune system approach for adaptive damage detection in monitoring networks  

Science Journals Connector (OSTI)

This paper presents an agent-based artificial immune system approach for adaptive damage detection in distributed monitoring networks. The presented approach establishes a new monitoring paradigm by embodying desirable immune attributes, such as adaptation, ... Keywords: Artificial immune systems, Mobile agents, Multi-agent systems, Pattern recognition, Structural health monitoring

Bo Chen

2010-11-01T23:59:59.000Z

199

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems  

E-Print Network (OSTI)

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems Soon Tee Teoh T the complex behaviors of computer network systems. We describe three log-file analysis applications operation of a large computer network sys- tem, the common practice is to constantly collect system logs

Ma, Kwan-Liu

200

Robot design for leak detection in water-pipe systems  

E-Print Network (OSTI)

Leaks are major problem that occur in the water pipelines all around the world. Several reports indicate loss of around 20 to 30 percent of water in the distribution of water through water pipe systems. Such loss of water ...

Choi, Changrak

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Detecting and Tolerating Byzantine Faults in Database Systems  

E-Print Network (OSTI)

This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...

Vandiver, Benjamin Mead

2008-06-30T23:59:59.000Z

202

Detecting and tolerating Byzantine faults in database systems  

E-Print Network (OSTI)

This thesis describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares answers from queries and updates on multiple ...

Vandiver, Benjamin Mead, 1978-

2008-01-01T23:59:59.000Z

203

A Theoretical Structural Impairment Detection System for Timber Railway Bridges  

E-Print Network (OSTI)

to higher bridge deflections, higher stresses in the stringers and rail, and shorter fatigue life of the system. A SIDS is proposed which links wheel path accelerations obtained from traversing freight cars to the condition of the bridge. In order...

Orsak, John

2012-07-16T23:59:59.000Z

204

Integration and road tests of a self-sensing CNT concrete pavement system for traffic detection  

Science Journals Connector (OSTI)

In this paper, a self-sensing carbon nanotube (CNT) concrete pavement system for traffic detection is proposed and tested in a roadway. Pre-cast and cast-in-place self-sensing CNT concrete sensors were simultaneously integrated into a controlled pavement test section at the Minnesota Road Research Facility (MnROAD), USA. Road tests of the system were conducted by using an MnROAD five-axle semi-trailer tractor truck and a van, respectively, both in the winter and summer. Test results show that the proposed self-sensing pavement system can accurately detect the passing of different vehicles under different vehicular speeds and test environments. These findings indicate that the developed self-sensing CNT concrete pavement system can achieve real-time vehicle flow detection with a high detection rate and a low false-alarm rate.

Baoguo Han; Kun Zhang; Tom Burnham; Eil Kwon; Xun Yu

2013-01-01T23:59:59.000Z

205

On adaptive transmission, signal detection and channel estimation for multiple antenna systems  

E-Print Network (OSTI)

This research concerns analysis of system capacity, development of adaptive transmission schemes with known channel state information at the transmitter (CSIT) and design of new signal detection and channel estimation schemes with low complexity...

Xie, Yongzhe

2004-11-15T23:59:59.000Z

206

Towards a Learning Traffic Incident Detection System Tomas Singliar and Milos Hauskrecht  

E-Print Network (OSTI)

manual tuning. Our hypoth- esis is that these time-consuming solutions can be sucessfuly eliminated of sensor networks on US roadways. Incident detection systems (IDS) are complex arrange- ments

Hauskrecht, Milos

207

He–Ne and cw CO2 laser long-path systems for gas detection  

Science Journals Connector (OSTI)

This paper describes the design and testing of a laboratory prototype dual He–Ne laser system for the detection of methane leaks from underground pipelines and solid-waste landfill...

Grant, William B

1986-01-01T23:59:59.000Z

208

Image contrast range for detection of enamel defects using a digital dental imaging system  

Science Journals Connector (OSTI)

The purpose of this study was to quantitatively assess the acceptable range of image contrast for the detection of enamel defects by adjusting the contrast and brightness of a digital dental imaging system. Ex...

Hiromi Kitagawa D.D.S.; Ph.D.; Mamoru Wakoh D.D.S.; Ph.D.…

1999-12-01T23:59:59.000Z

209

Radiation detection system for portable gamma-ray spectroscopy  

DOE Patents (OSTI)

A portable gamma ray detection apparatus having a gamma ray detector encapsulated by a compact isolation structure having at least two volumetrically-nested enclosures where at least one is a thermal shield. The enclosures are suspension-mounted to each other to successively encapsulate the detector without structural penetrations through the thermal shields. A low power cooler is also provided capable of cooling the detector to cryogenic temperatures without consuming cryogens, due to the heat load reduction by the isolation structure and the reduction in the power requirements of the cooler. The apparatus also includes a lightweight portable power source for supplying power to the apparatus, including to the cooler and the processing means, and reducing the weight of the apparatus to enable handheld operation or toting on a user's person.

Rowland, Mark S. (Alamo, CA); Howard, Douglas E. (Livermore, CA); Wong, James L. (Dublin, CA); Jessup, James L. (Tracy, CA); Bianchini, Greg M. (Livermore, CA); Miller, Wayne O. (Livermore, CA)

2006-06-20T23:59:59.000Z

210

Evaluation of Hanford Single-Shell Waste Tanks Suspected of Water Intrusion  

SciTech Connect

Intrusions evaluations for twelve single-shell tanks were completed in 2013. The evaluations consisted of remote visual inspections, data analysis, and calculations of estimated intrusion rates. The observation of an intrusion or the preponderance of evidence confirmed that six of the twelve tanks evaluated had intrusions. These tanks were tanks 241-A-103, BX-101, BX-103, BX-110, BY-102, and SX-106.

Feero, Amie J. [Washington River Protection Systems, Richland, WA (United States); Washenfelder, Dennis J. [Washington River Protection Systems, Richland, WA (United States); Johnson, Jeremy M. [USDOE Office of River Protection, Richland, WA (United States); Schofield, John S. [Washington River Protection Systems, Richland, WA (United States)

2013-11-14T23:59:59.000Z

211

Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen  

E-Print Network (OSTI)

Seawater intrusion and aquifer freshening near reclaimed coastal area of Shenzhen K.P. Chen and J this period indicate that the aquifer experienced seawater intrusion in the 1980s but underwent gradual freshening in the 1990s. It is speculated that seawater intrusion was induced by excessive groundwater

Jiao, Jiu Jimmy

212

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a  

E-Print Network (OSTI)

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a 22 June 2011 Keywords: Saltwater intrusion Sea-level rise Coastal aquifer Climate change Confined, the adverse intrusion effects induced by sea-level rise. A detailed numerical study using the MODFLOW

Clement, Prabhakar

213

Simulation and modeling for the stand-off radiation detection system (SORDS) using GEANT4  

SciTech Connect

A Stand-Off Radiation Detection System (SORDS) is being developed through a joint effort by Raytheon, Los Alamos National Laboratory, Bubble Technology Industries, Radiation Monitoring Devices, and the Massachusetts Institute of Technology, for the Domestic Nuclear Detection Office (DNDO). The system is a mobile truck-based platform performing detection, imaging, and spectroscopic identification of gamma-ray sources. A Tri-Modal Imaging (TMI) approach combines active-mask coded aperture imaging, Compton imaging, and shadow imaging techniques. Monte Carlo simulation and modeling using the GEANT4 toolkit was used to generate realistic data for the development of imaging algorithms and associated software code.

Hoover, Andrew S [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Mocko, Michal [Los Alamos National Laboratory; Palmer, David [Los Alamos National Laboratory; Schultz, Larry [Los Alamos National Laboratory; Tornga, Shawn [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

214

Two years of detecting DM objects - the Solar system members  

E-Print Network (OSTI)

With a probability >99% there are grounds to believe that our works on detection of the Dark Electric Matter Objects (daemons), which were lauched in 1996, are crowned with success. The daemons are the relic elementary Planckian black holes(m~30 microgramme) carrying stable electric charge of Ze=10e. During the last two years, the detector made of two horizontal ZnS(Ag) screens of 1 m^2 area has been recording the correlated time-shifted scintillations corresponding to flux 10^-5 m^-2 s^-1 of extraordinary penetrating nuclear-active particles which moved both down and upward with velocity of only \\~5-30 km/s. The flux experiences seasonal variations with maxima supposedly corresponding to the Earth transition through shadow and anti-shadow created by the Sun in its motion relative the Galaxy disk daemon population. An accumulation of negative daemons, which stimulate the proton decay in ~1 microsec, inside the Earth and the Sun is explaining a lot of previusly non-understandable facts.

E. M. Drobyshevski; M. E. Drobyshevski; T. Yu. Izmodenova; D. S. Telnov

2003-05-30T23:59:59.000Z

215

Flammable Gas Detection for the D-Zero Gas System  

SciTech Connect

The use of flammable gas and high voltage in detector systems is common in many experiments at Fermilab. To mitigate the hazards associated with these systems, Fermilab Engineering Standard SD-45B (Ref. 1) was adopted. Since this note is meant to be a guide and not a mandatory standard, each experiment is reviewed for compliance with SD-45B by the flammable gas safety subcommittee. Currently, there are only two types of flammable gas in use, ethane (Appendix A) and methane (Appendix B). The worst flammable-gas case is C2H6 (ethane), which has an estimated flow rate that is 73% of the CH4 (methane) flow but a heat of combustion (in kcal/g-mole) that is 173% of that of methane. In the worst case, if ethane were to spew through its restricting orifice into its gas line at 0 psig and then through a catastrophic leak into Room 215 (TRD) or Room 511 (CDC/FDCNTX), the time that would be required to build up a greater than Class 1 inventory (0.4kg H2 equivalent) would be 5.2 hours (Ref. 2). Therefore a worst-case flammable gas leak would have to go undetected for over 5 hours in order to transform a either mixing room to an environment with a Risk Class greater than Class 1. The mixing systems, gas lines, and detectors themselves will be thoroughly leak checked prior to active service. All vessels that are part of the mixing systems will be protected from overpressure by safety valves vented outside the building. Both the input and output of all detector volumes are protected from overpressure in the same way. The volume immediately outside the central tracking detectors is continuously purged by nitrogen from boiloff from the main nitrogen dewar at the site. However, if flammable gas were to build up in the mixing rooms or particular detector areas, no matter how unlikely, flammable gas detectors that are part of the interlock chain of each gas mixing system will shut down the appropriate system. This includes shutting off the output of flammable gas manifolds within the gas shed. Similarly, if a fire were to break out anywhere in the D-ZERO Hall, fire sensors would stop the output of all flammable gas manifolds within the gas shed, by unpowering electrically controlled solenoid valves that are normally closed in the event of a power failure. Fire sensor contacts have not yet been installed.

Spires, L.D.; Foglesong, J.; /Fermilab

1991-02-11T23:59:59.000Z

216

Far-infrared contraband-detection-system development for personnel-search applications  

SciTech Connect

Experiments have been conducted toward the development of an active near-millimeter-wave, far infrared, personnel search system for the detection of contraband. These experiments employed a microwave hybrid tee interferometer/radiometer scanning system and quasi-optical techniques at 3.3-mm wavelength to illuminate and detect the reflection from target objects against a human body background. Clothing and other common concealing materials are transport at this wavelength. Retroreflector arrays, in conjunction with a Gunn diode radiation source, were investigated to provide all-angle illumination and detection of specular reflections from unaligned and irregular-shaped objects. Results indicate that, under highly controlled search conditions, metal objects greater than or equal to 25 cm/sup 2/ can be detected in an enclosure lined with retroreflectors. Further development is required to produce a practical personnel search system. The investigation and feasibility of alternate far infrared search techniques are presented. 23 figures, 2 tables.

Schellenbaum, R. L.

1982-09-01T23:59:59.000Z

217

Imaging System With Confocally Self-Detecting Laser.  

DOE Patents (OSTI)

The invention relates to a confocal laser imaging system and method. The system includes a laser source, a beam splitter, focusing elements, and a photosensitive detector. The laser source projects a laser beam along a first optical path at an object to be imaged, and modulates the intensity of the projected laser beam in response to light reflected from the object. A beam splitter directs a portion of the projected laser beam onto a photodetector. The photodetector monitors the intensity of laser output. The laser source can be an electrically scannable array, with a lens or objective assembly for focusing light generated by the array onto the object of interest. As the array is energized, its laser beams scan over the object, and light reflected at each point is returned by the lens to the element of the array from which it originated. A single photosensitive detector element can generate an intensity-representative signal for all lasers of the array. The intensity-representative signal from the photosensitive detector can be processed to provide an image of the object of interest.

Webb, Robert H. (Lincoln, MA); Rogomentich, Fran J. (Concord, MA)

1996-10-08T23:59:59.000Z

218

A Multi-Layer Phoswich Radioxenon Detection System  

SciTech Connect

Further work was performed in optical modeling of the modified (dual planar) XEPHWICH design. Modeling capabilities and understanding were expanded through the performance of three additional simulations. The efficiency of the entire optical modeling process was increased by developing custom software to interface with both the input and output of the simulation program. Work continues on the design and implementation of the analog portion of the read-out system. This component is being prototyped and is nearing completion. The PCB (printed circuit board) is in its design phase for the two-channel digital pulse processor, necessary for the dual planar XEPHWICH. System components are being selected for the signal processor based on a balance of cost and our expectations of quality. Outside the scope of the grant, but entirely related, we continue to work on developing a source of fission-product xenon gases that will be produced in the OSU TRIGA reactor. The amount of HEU necessary to provide the needed activities of xenon fission products, as well as build-in times for each isotope of importance following irradiation, have been calculated. Irradiation times in the TRIGA have been determined. We've finalized our design of the xenon-fission-product collection chamber and initiated in-house fabrication. PNNL will be supplying the thin foils of enriched uranium necessary for xenon production.

David M. Hamby

2007-07-01T23:59:59.000Z

219

E cient Detection of Global Properties in Distributed Systems Using Partial-Order Methods  

E-Print Network (OSTI)

in c that correspond to total orders containing the happened-before relation. A consistent global stateE cient Detection of Global Properties in Distributed Systems Using Partial-Order Methods Scott D "), meaning the system could have passed through a global state satisfying predicate , or Def (read \\de nitely

Stoller, Scott

220

Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas  

E-Print Network (OSTI)

Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas Justin A. Hogan,1 sequestration sites for possible leaks of the CO2 gas from underground reservoirs, a low-cost multispectral are then flagged for closer inspection with in-situ CO2 sensors. The system is entirely self

Shaw, Joseph A.

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

An expert system for detecting automobile insurance fraud using social network analysis  

E-Print Network (OSTI)

The article proposes an expert system for detection, and subsequent investigation, of groups of collaborating automobile insurance fraudsters. The system is described and examined in great detail, several technical difficulties in detecting fraud are also considered, for it to be applicable in practice. Opposed to many other approaches, the system uses networks for representation of data. Networks are the most natural representation of such a relational domain, allowing formulation and analysis of complex relations between entities. Fraudulent entities are found by employing a novel assessment algorithm, \\textit{Iterative Assessment Algorithm} (\\textit{IAA}), also presented in the article. Besides intrinsic attributes of entities, the algorithm explores also the relations between entities. The prototype was evaluated and rigorously analyzed on real world data. Results show that automobile insurance fraud can be efficiently detected with the proposed system and that appropriate data representation is vital.

Šubelj, Lovro; Bajec, Marko; 10.1016/j.eswa.2010.07.143

2011-01-01T23:59:59.000Z

222

Standoff concealed weapon detection using a 350 GHz radar imaging system  

SciTech Connect

The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

2010-04-01T23:59:59.000Z

223

An Automatic Impact-based Delamination Detection System for Concrete Bridge Decks  

SciTech Connect

Delamination of concrete bridge decks is a commonly observed distress in corrosive environments. In traditional acoustic inspection methods, delamination is assessed by the "hollowness" of the sound created by impacting the bridge deck with a hammer or bar or by dragging a chain where the signals are often contaminated by ambient traffic noise and the detection is highly subjective. In the proposed method, a modified version of independent component analysis (ICA) is used to filter the traffic noise. To eliminate subjectivity, Mel-frequency cepstral coefficients (MFCC) are used as features for detection and the delamination is detected by a radial basis function (RBF) neural network. Results from both experimental and field data suggest that the proposed methods id noise robust and has satisfactory performance. The methods can also detect the delamination of repair patches and concrete below the repair patches. The algorithms were incorporated into an automatic impact-bases delamination detection (AIDD) system for field application.

Zhang, Gang; Harichandran, Ronald S.; Ramuhalli, Pradeep

2012-01-02T23:59:59.000Z

224

Design study and comparative evaluation of JSFR failed fuel detection system  

SciTech Connect

A conceptual design study of an advanced sodium-cooled fast reactor JSFR has progressed in the 'Fast Reactor Cycle Technology Development (FaCT) 'project in Japan. JSFR has two failed fuel detection systems in the core. One is a failed fuel detection (FFD) system which continuously monitors a fission product from failed fuel subassembly. The other is a failed fuel detection and location (FFDL) system which locates when it receives signals from FFD. The FFD system consists of a FFD-DN which detects delayed neutron (DN) in sodium and a FFD-CG which detects fission products in the cover gas of the reactor vessel. In this study, requirements to the FFD-DN and the FFD-DN design to meet the requirements were investigated for the commercial and demonstration JSFR. In the commercial JSFR, a sampling type FFD which collects sodium from the reactor vessel by sampling lines for DN detectors was adopted. The performances have been investigated and confirmed by a fluid analysis in the reactor upper plenum. In the demonstration JSFR, the performance of DN detectors installed on the primary cold-leg piping has been confirmed. For the FFDL systems, experiences in the previous fast reactors and the R and D of FFDL system for JSFR were investigated. This study focuses on the Selector-Valve and the Tagging-Gas FFDL systems. Operation experiences of the Selector-valve FFDL system were accumulated in PFR and Phenix. Tagging-gas system experiences were accumulated in EBR-II and FFTF. The feasibility of both FFDL systems for JSFR was evaluated. (authors)

Aizawa, K.; Chikazawa, Y.; Ishikawa, N. [Japan Atomic Energy Agency JAEA, 4002 Narita, Oarai, Higashi-ibaraki-gun, Ibaraki 311-1393 (Japan); Kubo, S. [Japan Atomic Power Company JAPC (Japan); Okazaki, H.; Mito, M. [Mitsubishi FBR Systems, Inc. MFBR (Japan); Tozawa, K. [Fuji Electric Co., Ltd. (Japan); Hayashi, M. [MitsubishiElectric Corporation (Japan)

2012-07-01T23:59:59.000Z

225

Photostimulated phosphor based image plate detection system for HRVUV beamline at Indus-1 synchrotron radiation source  

E-Print Network (OSTI)

A high resolution vacuum ultraviolet (HRVUV) beamline based on a 6.65 meter off-plane Eagle spectrometer is in operation at the Indus-1 synchrotron radiation source, RRCAT, Indore, India. To facilitate position sensitive detection and fast spectral recording, a new BaFBr:Eu2+ phosphor based image plate (IP) detection system interchangeable with the existing photomultiplier (PMT) scanning system has been installed on this beamline. VUV photoabsorption studies on Xe, O2, N2O and SO2 are carried out to evaluate the performance of the IP detection system. An FWHM of ~ 0.5 {\\AA} is achieved for the Xe atomic line at 1469.6 {\\AA}. Reproducibility of spectra is found to be within the experimental resolution. Compared to the PMT scanning system, the IP shows several advantages in terms of sensitivity, recording time and S/N ratio, which are highlighted in the paper. This is the first report of incorporation of an IP detection system in a VUV beamline using synchrotron radiation. Commissioning of the new detection sys...

Haris, K; Shastri, Aparna; K., Sunanda; K., Babita; Rao, S V N Bhaskara; Ahmad, Shabbir; Tauheed, A

2014-01-01T23:59:59.000Z

226

Development of an Automated Microfluidic System for DNA Collection, Amplification, and Detection of Pathogens  

SciTech Connect

This project was focused on developing and testing automated routines for a microfluidic Pathogen Detection System. The basic pathogen detection routine has three primary components; cell concentration, DNA amplification, and detection. In cell concentration, magnetic beads are held in a flow cell by an electromagnet. Sample liquid is passed through the flow cell and bacterial cells attach to the beads. These beads are then released into a small volume of fluid and delivered to the peltier device for cell lysis and DNA amplification. The cells are lysed during initial heating in the peltier device, and the released DNA is amplified using polymerase chain reaction (PCR) or strand displacement amplification (SDA). Once amplified, the DNA is then delivered to a laser induced fluorescence detection unit in which the sample is detected. These three components create a flexible platform that can be used for pathogen detection in liquid and sediment samples. Future developments of the system will include on-line DNA detection during DNA amplification and improved capture and release methods for the magnetic beads during cell concentration.

Hagan, Bethany S.; Bruckner-Lea, Cynthia J.

2002-12-01T23:59:59.000Z

227

A new laser-based system for obstacle detection including step, hole and slope for Personal Mobility Vehicles  

E-Print Network (OSTI)

A new laser-based system for obstacle detection including step, hole and slope for Personal, and with standard chair wheels difficult. In this paper, we present a step and curb detection system based on laser sensors. This system is dedicated to vehicles able to cross over steps, for transportation systems

Paris-Sud XI, Université de

228

Method and apparatus for detecting timing errors in a system oscillator  

DOE Patents (OSTI)

A method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

Gliebe, Ronald J. (Library, PA); Kramer, William R. (Bethel Park, PA)

1993-01-01T23:59:59.000Z

229

Method and apparatus for operating a powertrain system upon detecting a stuck-closed clutch  

DOE Patents (OSTI)

A powertrain system includes a multi-mode transmission having a plurality of torque machines. A method for controlling the powertrain system includes identifying all presently applied clutches including commanded applied clutches and the stuck-closed clutch upon detecting one of the torque-transfer clutches is in a stuck-closed condition. A closed-loop control system is employed to control operation of the multi-mode transmission accounting for all the presently applied clutches.

Hansen, R. Anthony

2014-02-18T23:59:59.000Z

230

On-Line Mid-IR (Quantum Cascade Laser and FTIR Spectrometric) Detection in Capillary Based Separation Systems  

Science Journals Connector (OSTI)

We introduce infrared spectrometry as a novel online molecule specific detection technique in capillary based separation systems. We report on the use of broad band FTIR detection for full spectral information on...

B. Lendl; M. Kölhed; P. Hinsmann; M. Haberkorn…

2002-01-01T23:59:59.000Z

231

Non-intrusive, nuclear component discrimination with a micro-channel plate gamma-ray detector  

SciTech Connect

We describe the function of a micro-channel plate gamma-ray detector designed for non-intrusive detection of physically obscured special nuclear material (SNM), including nuclear weapons. An example application of such a detector is a cooperative inspection distinguishing between nuclear and non-nuclear weapons where legitimate numbers of each may be present. In this type of scenario, the information needed would be the number of each type of weapon. Another example scenario would be a weapon-type classification based on a benchmarked gamma-ray count rate from each package type (nuclear type A or nuclear type B). In both of these scenarios, we desire the location of nuclear weapons.

Rowland, M.

1993-11-01T23:59:59.000Z

232

PROJECT SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE GLIDER-BASED PASSIVE ACOUSTIC DETECTION SYSTEM,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE SPECIFIC CATEGORICAL EXCLUSION FOR A WAVE GLIDER-BASED PASSIVE ACOUSTIC DETECTION SYSTEM, Attachment PACIFIC NORTHWEST NATIONAL LABORATORY, RICHLAND, WASHINGTON Proposed Action Pacific Northwest National Laboratory (PNNL) proposes to conduct a proof-of-principle study to develop a wave glider-based passive acoustic detection system for monitoring whale populations (e.g., presence, distribution, relative abundance). Long-term goals of the project include better understanding whale populations to facilitate environmentally responsible development of offshore energy and improving the capability to monitor the world's oceans. Location of Action The proposed action would occur at PNNL facilities in Richland, Washington; at the Marine Science Laboratory

233

Proceedings, Digital Signal Processing for in-Vehicle and mobile systems, Istanbul, Turkey, June 2007. MACHINE LEARNING SYSTEMS FOR DETECTING DRIVER DROWSINESS  

E-Print Network (OSTI)

detection system is one of the potential applications of in- telligent vehicle systems. Previous approachesProceedings, Digital Signal Processing for in-Vehicle and mobile systems, Istanbul, Turkey, June 2007. MACHINE LEARNING SYSTEMS FOR DETECTING DRIVER DROWSINESS Esra Vural, Mujdat Cetin, Aytul Ercil

Bartlett, Marian Stewart

234

Non-Intrusive Appliance Load Monitoring: Promise and Practice  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Fraunhofer USA Fraunhofer USA Non-intrusive Appliance Load Monitoring (NIALM): Promise and Practice Michael Zeifman, Ph.D. and Kurt Roth, Ph.D. March 1 st , 2012 Building America Stakeholder Meeting © Fraunhofer USA What Is NIALM?  Non-Intrusive Appliance Load Monitoring  A.k.a. Non-Intrusive Load Monitoring  Main breaker/circuit level  Data acquisition (hardware) and disaggregation algorithms (software) 2 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 600 800 1000 1200 1400 Time Power, W 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Power, W Coffee Maker 07:00 07:30 08:00 08:30 09:00 09:30 0 500 1000 Power, W Refrigerator 07:00 07:30 08:00 08:30 09:00 09:30 0 200 400 Time Power, W TV © Fraunhofer USA NIALM: Interest  Significant growth in U.S. granted patents

235

An analysis of weep holes as a product detection device for underground compensated LPG storage systems  

SciTech Connect

Weep holes have been used widely to detect the presence of Liquefied Petroleum Gases (LPG) in brine for underground compensated storage systems. When the brine level drops below the weep hole, LPG product enters the brine production system causing an increase in both tubing head pressure and flow rate. To prevent cavern overfill, a cavern shutdown is initiated upon detection of LPG in the surface brine system by pressure or flow instruments at the tubing head. In this study, we have investigated the multiphase flow characteristics of weep hole LPG detection systems to correctly estimate the operating limits. A simple and easy to use model has been developed to predict the tubing head pressure and flow rate increases. The model can be used to implement safer and more efficient operation procedures for underground compensated LPG storage systems. The model predictions for a typical field case are presented. An analysis of weep holes as product detection devices for LPG storage reservoirs has been carried out. It was found that the increases in pressure and flow rates at the tubing head change as a function of injection flow rate of the product. Therefore, a thorough consideration of cavern operating parameters is necessary to evaluate the use constant pressure and flow rate values to initiate emergency shut down of the cavern.

Sarica, C.; Demir, H.M.; Brill, J.P.

1996-09-01T23:59:59.000Z

236

Methods to detect faulty splices in the superconducting magnet system of the LHC  

SciTech Connect

The incident of 19 September 2008 at the LHC was caused by a faulty inter-magnet splice of about 200 n{Omega} resistance. Cryogenic and electrical techniques have been developed to detect other abnormal splices, either between or inside the magnets. The existing quench protection system can be used to detect internal splices with R > 20 n{Omega}. Since this system does not cover the bus between magnets, the cryogenic system is used to measure the rate of temperature rise due to ohmic heating. Accuracy of a few mK/h, corresponding to a few Watts, has been achieved, allowing detection of excess resistance, if it is more than 40 n{Omega} in a cryogenic subsector (two optical cells). Follow-up electrical measurements are made in regions identified by the cryogenic system. These techniques have detected two abnormal internal magnet splices of 100 n{Omega} and 50 n{Omega} respectively. In 2009, this ad hoc system will be replaced with a permanent one to monitor all splices at the n{Omega} level.

Bailey, R.; Bellesia, B.; Lasheras, N.Catalan; Dahlerup-Petersen, K.; Denz, R.; Robles, C.; Koratzinos, M.; Pojer, M.; Ponce, L.; Saban, R.; Schmidt, R.; /CERN /Fermilab /Moscow, INR /Cracow, INP

2009-05-01T23:59:59.000Z

237

Radiation sensitive devices and systems for detection of radioactive materials and related methods  

DOE Patents (OSTI)

Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

Kotter, Dale K

2014-12-02T23:59:59.000Z

238

A Data Driven Framework for Real Time Power System Event Detection and Visualization  

E-Print Network (OSTI)

Increased adoption and deployment of phasor measurement units (PMU) has provided valuable fine-grained data over the grid. Analysis over these data can provide real-time insight into the health of the grid, thereby improving control over operations. Realizing this data-driven control, however, requires validating, processing and storing massive amounts of PMU data. This paper describes a PMU data management system that supports input from multiple PMU data streams, features an event-detection algorithm, and provides an efficient method for retrieving archival data. The event-detection algorithm rapidly correlates multiple PMU data streams, providing details on events occurring within the power system in real-time. The event-detection algorithm feeds into a visualization component, allowing operators to recognize events as they occur. The indexing and data retrieval mechanism facilitates fast access to archived PMU data. Using this method, we achieved over 30x speedup for queries with high selectivity. With th...

McCamish, Ben; Landford, Jordan; Bass, Robert; Cotilla-Sanchez, Eduardo; Chiu, David

2015-01-01T23:59:59.000Z

239

Arc Detection and Interlock Module for the PEP II Low Level RF System  

SciTech Connect

A new arc detection and interlock generating module for the SLAC PEP-II low-level RF VXI-based system has been developed. The system is required to turn off the RF drive and high voltage power supply in the event of arcing in the cavity windows, klystron window, or circulator. Infrared photodiodes receive arc signals through radiation resistant optical fibers. Gain and bandwidth are selectable for each channel to allow tailoring response. The module also responds to interlock requests from other modules in the VXI system and communicates with the programmable logic controller (PLC) responsible for much of the low-level RF system's interlock functionality.

Tighe, R.; /SLAC

2011-08-31T23:59:59.000Z

240

Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation for Application to Unmanned Ground  

E-Print Network (OSTI)

Development of an Integrated Sensor System for Obstacle Detection and Terrain Evaluation into a 2D space. The second obstacle detection sensor was a stereo vision system that was manufactured of the vehicle. Monocular cameras and vision processing algorithms were used as the second sensor system

Florida, University of

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network (OSTI)

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

242

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network (OSTI)

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

243

Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo  

DOE Patents (OSTI)

A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

Slaughter, Dennis R. (Oakland, CA); Pohl, Bertram A. (Berkeley, CA); Dougan, Arden D. (San Ramon, CA); Bernstein, Adam (Palo Alto, CA); Prussin, Stanley G. (Kensington, CA); Norman, Eric B. (Oakland, CA)

2008-04-15T23:59:59.000Z

244

Power System Extreme Event Detection: The Vulnerability Frontier Bernard C. Lesieutre Ali Pinar  

E-Print Network (OSTI)

Power System Extreme Event Detection: The Vulnerability Frontier Bernard C. Lesieutre Ali Pinar the number of line outages in a grid to the power disrupted by the outages. This frontier describes the boundary of a space relating the possible severity of a disturbance in terms of power disruption, from zero

Pinar, Ali

245

Methods, systems and devices for detecting threatening objects and for classifying magnetic data  

DOE Patents (OSTI)

A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.

Kotter, Dale K. (Shelley, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID); Spencer, David F. (Idaho Falls, ID)

2012-01-24T23:59:59.000Z

246

A Pragmatic Methodology for Testing Intrusion Prevention Systems  

Science Journals Connector (OSTI)

......Web-specific attacks against servers listening on TCP port 80 by default. However...different subsystems or even physical devices is often the source for out-of-synchronization...and FortiGate, an anti-virus/IPS device. Our testing demonstrated both strengths......

Zhongqiang Chen; Alex Delis; Peter Wei

2009-07-01T23:59:59.000Z

247

Methods for non-intrusive sensing and system monitoring  

E-Print Network (OSTI)

Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

Schantz, Christopher James

2014-01-01T23:59:59.000Z

248

A Pragmatic Methodology for Testing Intrusion Prevention Systems  

Science Journals Connector (OSTI)

......traffic initiated within intranets allowing compromised internal...ultimately change the traffic characteristics as additional packets such...operations help shape the characteristics of the replayed traffic...in common the following characteristics: (a) uni-directional-feeding......

Zhongqiang Chen; Alex Delis; Peter Wei

2009-07-01T23:59:59.000Z

249

Electrical power system failure detection, isolation and recovery on the International Space Station Alpha  

SciTech Connect

The problem of how to detect, isolate, and recover from failures on the International Space Station Alpha (ISSA) is currently under study and development by NASA and a number of contractors including Rocketdyne Division of Rockwell International. The effort is planned to provide an advanced real-time failure detection system for the station. The autonomous power system project is designed to demonstrate the abilities of integrated intelligent diagnosis, control and scheduling techniques to space power distribution hardware. In this paper the latest failure detection, isolation, and recovery (FDIR) design, which provides an autonomous FDIR for the Electric Power System (EPS), will be described. The ISSA Concept of Operations and Utilization (COU) defines the ability of the vehicle to ``survive 24 hours of operation without crew or ground intervention``. This results in a necessity to design and develop automatic failure detection techniques to accomplish such autonomous operation without routine commanding. This paper addresses the current EPS FDIR design concept and concentrates on how to resolve the FDIR issues and come up with a robust design to recover from abnormal behavior.

Aghabarari, E. [Rockwell International, Canoga Park, CA (United States). Rocketdyne Division; Varney, J. [McDonnell Douglas, Houston, TX (United States)

1995-12-31T23:59:59.000Z

250

A novel computer-aided lung nodule detection system for CT images  

SciTech Connect

Purpose: The paper presents a complete computer-aided detection (CAD) system for the detection of lung nodules in computed tomography images. A new mixed feature selection and classification methodology is applied for the first time on a difficult medical image analysis problem. Methods: The CAD system was trained and tested on images from the publicly available Lung Image Database Consortium (LIDC) on the National Cancer Institute website. The detection stage of the system consists of a nodule segmentation method based on nodule and vessel enhancement filters and a computed divergence feature to locate the centers of the nodule clusters. In the subsequent classification stage, invariant features, defined on a gauge coordinates system, are used to differentiate between real nodules and some forms of blood vessels that are easily generating false positive detections. The performance of the novel feature-selective classifier based on genetic algorithms and artificial neural networks (ANNs) is compared with that of two other established classifiers, namely, support vector machines (SVMs) and fixed-topology neural networks. A set of 235 randomly selected cases from the LIDC database was used to train the CAD system. The system has been tested on 125 independent cases from the LIDC database. Results: The overall performance of the fixed-topology ANN classifier slightly exceeds that of the other classifiers, provided the number of internal ANN nodes is chosen well. Making educated guesses about the number of internal ANN nodes is not needed in the new feature-selective classifier, and therefore this classifier remains interesting due to its flexibility and adaptability to the complexity of the classification problem to be solved. Our fixed-topology ANN classifier with 11 hidden nodes reaches a detection sensitivity of 87.5% with an average of four false positives per scan, for nodules with diameter greater than or equal to 3 mm. Analysis of the false positive items reveals that a considerable proportion (18%) of them are smaller nodules, less than 3 mm in diameter. Conclusions: A complete CAD system incorporating novel features is presented, and its performance with three separate classifiers is compared and analyzed. The overall performance of our CAD system equipped with any of the three classifiers is well with respect to other methods described in literature.

Tan, Maxine; Deklerck, Rudi; Jansen, Bart; Bister, Michel; Cornelis, Jan [Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel (Belgium); Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel, Belgium and Interdisciplinary Institute for Broadband Technology (IBBT), Gaston Crommenlaan 8, 9050 Gent (Belgium); Department of Electronics and Informatics (ETRO), Vrije Universiteit Brussel, Pleinlaan 2, B-1050 Brussel (Belgium)

2011-10-15T23:59:59.000Z

251

Low background high efficiency radiocesium detection system based on positron emission tomography technology  

Science Journals Connector (OSTI)

After the 2011 nuclear power plant accident at Fukushima radiocesium contamination in food became a serious concern in Japan. However low background and high efficiency radiocesium detectors are expensive and huge including semiconductor germanium detectors. To solve this problem we developed a radiocesium detector by employing positron emission tomography (PET) technology. Because 134Cs emits two gamma photons (795 and 605 keV) within 5 ps they can selectively be measured with coincidence. Such major environmental gamma photons as 40K (1.46 MeV) are single photon emitters and a coincidence measurement reduces the detection limit of radiocesium detectors. We arranged eight sets of Bi4 Ge 3O12 (BGO) scintillation detectors in double rings (four for each ring) and measured the coincidence between these detectors using PET data acquisition system. A 50 × 50 × 30 mm BGO was optically coupled to a 2 in. square photomultiplier tube (PMT). By measuring the coincidence we eliminated most single gamma photons from the energy distribution and only detected those from 134Cs at an average efficiency of 12%. The minimum detectable concentration of the system for the 100 s acquisition time is less than half of the food monitor requirements in Japan (25 Bq/kg). These results show that the developed radiocesium detector based on PET technology is promising to detect low level radiocesium.

Seiichi Yamamoto; Yoshimune Ogata

2013-01-01T23:59:59.000Z

252

Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles  

E-Print Network (OSTI)

Integrated Traffic Management Systems (ITMS) are now implemented in different cities in India to primarily address the concerns of road-safety and security. An automated Red Light Violation Detection System (RLVDS) is an integral part of the ITMS. In our present work we have designed and developed a complete system for generating the list of all stop-line violating vehicle images automatically from video snapshots of road-side surveillance cameras. The system first generates adaptive background images for each camera view, subtracts captured images from the corresponding background images and analyses potential occlusions over the stop-line in a traffic signal. Considering round-the-clock operations in a real-life test environment, the developed system could successfully track 92% images of vehicles with violations on the stop-line in a "Red" traffic signal.

Saha, Satadal; Nasipuri, Mita; Basu, Dipak Kumar

2010-01-01T23:59:59.000Z

253

A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems  

SciTech Connect

The objective of this document is to report results in the detection and characterization of special behavior in large electric power systems. Such behavior is usually dynamic in nature, but not always. This is also true for the underlying sources of special behavior. At the device level, a source of special behavior might be an automatic control system, a dynamic load, or even a manual control system that is operated according to some sharply defined policy. Other possible sources include passive system conditions, such as the state of a switched device or the amount of power carried on some critical line. Detection and characterization are based upon “signature information” that is extracted from the behavior observed. Characterization elements include the signature information itself, the nature of the behavior and its likely causes, and the associated implications for the system or for the public at large. With sufficient data and processing, this characterization may directly identify a particular condition or device at a specific location. Such conclusive results cannot always be done from just one observation, however. Information environments that are very sparse may require multiple observations, comparative model studies, and even direct testing of the system.

Hauer, John F.; DeSteese, John G.

2004-08-20T23:59:59.000Z

254

System and method for motor fault detection using stator current noise cancellation  

DOE Patents (OSTI)

A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to acquire at least on additional set of real-time operating current data from the motor during operation, redefine the noise component present in each additional set of real-time operating current data, and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Nowak, Michael P. (Menomonee Falls, WI); Dimino, Steven A. (Wauwatosa, WI)

2010-12-07T23:59:59.000Z

255

Active acoustic monitoring systems for detecting, localizing, tracking, and classifying marine mammals and fish.  

Science Journals Connector (OSTI)

Detection localization tracking and classification (DLTC) of marine mammals and fish is necessary for a wide range of bioacoustic studies. This includes those related to understanding anthropogenic effects and to the development of methods for mitigating harm. Active acoustic monitoring (AAM) is a robust method for monitoring marine life as it can detect and accurately localize a silent target enabling full DLTC. With the growth of the offshore renewable energy industry and the need to mitigate harm from pile driving seismic surveys and military sonar operations there is strong interest in developing AAM systems and integrating them with current mitigation techniques. There are a host of significant issues including the standard sonar problems of reverberation and propagation in high?clutter shallow water environments false alarms classification methods of deployment and cost. Furthermore AAM systems transmit acoustic energy that has the potential to disturb marine life. Much work lies ahead to develop systems that balance the risks benefits performance and costs. This paper will review the status and issues of AAM systems. This includes a discussion of implemented near?field (imaging) and far?field (tracking) systems experimental results and plans for further development testing integration and permitting.

Peter J. Stein

2011-01-01T23:59:59.000Z

256

Numerical and observational estimates of Indian Ocean Kelvin wave intrusion into Lombok Strait  

E-Print Network (OSTI)

Numerical and observational estimates of Indian Ocean Kelvin wave intrusion into Lombok Strait to investigate Indian Ocean Kelvin waves (IOKWs), specifically their propagation and energy intrusion into Lombok Lombok Strait. This suggests that Lombok Strait acts as a significant transition point for Kelvin wave

257

Current challenges using models to forecast seawater intrusion: lessons from the Eastern Shore of Virginia, USA  

E-Print Network (OSTI)

Current challenges using models to forecast seawater intrusion: lessons from the Eastern Shore of seawater intrusion from natural and anthropo- genic causes. The characteristics of transition zones between. Computer speed and storage capabilities have increased dramatically in the last few decades, to the point

258

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON  

E-Print Network (OSTI)

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON JOHN-MARK G Inc., Tucson, Arizona ABSTRACT Intrusion-related copper-bearing ore deposits in Mexico span a wide. These deposits include world-class copper porphyry and skarn deposits as well as a continuum of similar skarn

Barton, Mark D.

259

A bushfire monitoring and detection system for smart homes using ZigBee technology  

Science Journals Connector (OSTI)

This paper describes the part of a smart monitoring system that uses ZigBee modules to communicate sensory information in case of a fire or bushfire. The proposed system is composed of two parts: A number of remote boards that collect temperature and humidity; and a host board that contains the same type of sensors as the remote board, in addition to wind speed and wind directions sensors. The proposed system can be used for monitoring and detection of both bushfire and fire in and around a house. The host board position and sensory information collected from the remote boards are combined, stored and processed by a microcontroller. The host board performs further processing on the collected sensory information and communicates it to a control room wirelessly using a long range wireless communication such as wireless local area network (WLAN) or general packet radio service (GPRS). The system components and performance are also described.

Ying Sun; Quan Yuan; Said Al-Sarawi

2010-01-01T23:59:59.000Z

260

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents (OSTI)

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Detection system for high-resolution gamma radiation spectroscopy with neutron time-of-flight filtering  

DOE Patents (OSTI)

A .gamma.-radiation detection system that includes at least one semiconductor detector such as HPGe-Detector, a position-sensitive .alpha.-Detector, a TOF Controller, and a Digitizer/Integrator. The Digitizer/Integrator starts to process the energy signals of a .gamma.-radiation sent from the HPGe-Detector instantly when the HPGe-Detector detects the .gamma.-radiation. Subsequently, it is determined whether a coincidence exists between the .alpha.-particles and .gamma.-radiation signal, based on a determination of the time-of-flight of neutrons obtained from the .alpha.-Detector and the HPGe-Detector. If it is determined that the time-of-flight falls within a predetermined coincidence window, the Digitizer/Integrator is allowed to continue and complete the energy signal processing. If, however, there is no coincidence, the Digitizer/Integrator is instructed to be clear and reset its operation instantly.

Dioszegi, Istvan; Salwen, Cynthia; Vanier, Peter

2014-12-30T23:59:59.000Z

262

A detection system for very low-energy protons from {beta}-delayed proton decay  

SciTech Connect

We have recently developed a gas based detection system called AstroBox, motivated by nuclear astrophysics studies. The goal was to detect very low-energy protons from {beta}-delayed p-decay with reduced beta background and improved energy resolution. The detector was tested using the {beta}-delayed proton-emitter 23Al previously studied with a set-up based on thin double-sided Si strip detectors. The proton spectrum obtained with AstroBox showed no beta background down to {approx}80 keV. The low energy (206 keV, 267 keV) proton peaks were positively identified, well separated, and the resolution was improved.

Spiridon, A.; Pollacco, E.; Trache, L.; Simmons, E.; McCleskey, M.; Roeder, B. T.; Tribble, R. E.; Pascovici, G.; Riallot, M.; Mols, J. P.; Kebbiri, M. [Cyclotron Institute, Texas A and M University, College Station, TX 77843-3366 (United States); CEA/IRFU Saclay, Gif-sur-Yvette (France); Cyclotron Institute, Texas A and M University, College Station, TX 77843-3366 (United States); Institut fuer Kernphysik der Universitaet zu Koeln, D-50937 Koeln (Germany); CEA/IRFU Saclay, Gif-sur-Yvette (France)

2012-11-20T23:59:59.000Z

263

Environmental assessment of the thermal neutron activation explosive detection system for concourse use at US airports  

SciTech Connect

This document is an environmental assessment of a system designed to detect the presence of explosives in checked airline baggage or cargo. The system is meant to be installed at the concourse or lobby ticketing areas of US commercial airports and uses a sealed radioactive source of californium-252 to irradiate baggage items. The major impact of the use of this system arises from direct exposure of the public to scattered or leakage radiation from the source and to induced radioactivity in baggage items. Under normal operation and the most likely accident scenarios, the environmental impacts that would be created by the proposed licensing action would not be significant. 44 refs., 19 figs., 18 tabs.

Jones, C.G.

1990-08-01T23:59:59.000Z

264

Methods, microfluidic devices, and systems for detection of an active enzymatic agent  

DOE Patents (OSTI)

Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active target agent in a fluid sample. A substrate molecule is used that contains a sequence which may cleave in the presence of an active target agent. A SNAP25 sequence is described, for example, that may be cleaved in the presence of Botulinum Neurotoxin. The substrate molecule includes a reporter moiety. The substrate molecule is exposed to the sample, and resulting reaction products separated using electrophoretic separation. The elution time of the reporter moiety may be utilized to identify the presence or absence of the active target agent.

Sommer, Gregory J; Hatch, Anson V; Singh, Anup K; Wang, Ying-Chih

2014-10-28T23:59:59.000Z

265

A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers  

E-Print Network (OSTI)

The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around $10^{17}$ eV.

Green, K; Suprun, D A; Wilkerson, J F; Green, Kevin; Rosner, Jonathan L.; Suprun, Denis A.

2003-01-01T23:59:59.000Z

266

A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers  

E-Print Network (OSTI)

The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around $10^{17}$ eV.

Kevin Green; Jonathan L. Rosner; Denis A. Suprun; J. F. Wilkerson

2003-04-14T23:59:59.000Z

267

Applications of a transportable spent-fuel measurement system. [Ion-I/fork detection system  

SciTech Connect

A portable tool for making measurements on irradiated fuel has been developed to where in-plant installations having a 1 to 2% measurement uncertainty of relative exposure are feasible. The measurement uses a passive gross neutron signal and data from a gross gamma measurement as a consistency check of the neutron result and the operators declaration of cooling time. The uncertainties are about the same as those obtained using high-resolution gamma-ray techniques without the instrumentation being as obtrusive. The battery-operated microprocessor-based electronics package used with the irradiated fuel measurement system can also be used with single channel pulse counting detectors for other applications. This feature together with the large dynamic range of its current-mode ion chamber channel makes ION-I a good building block to be used in emergencies with an arsenal of detectors at a variety of nuclear plants. 8 figs., 3 tabs.

Halbig, J.K.; Bosler, G.E.; Klosterbuer, S.F.; Rinard, P.M.

1985-01-01T23:59:59.000Z

268

A comparison of digital radiography systems in terms of effective detective quantum efficiency  

SciTech Connect

Purpose: The purpose of this study is to compare digital radiography systems using the metric effective detective quantum efficiency (eDQE), which better reflects digital radiography imaging system performance under clinical operating conditions, in comparison with conventional metrics such as modulation transfer function (MTF), normalized noise power spectra (NNPS), and detective quantum efficiency (DQE). Methods: The eDQE was computed by the calculation of the MTF, the NNPS, the phantom attenuation and scatter, and estimation of x-ray flux. The physical characterization of the systems was obtained with the standard beam conditions RQA5 and RQA9, using the PA Chest phantom proposed by AAPM Report no. 31 simulating the attenuation and scatter characteristics of the adult human thorax. The MTF (eMTF) was measured by using an edge test placed at the frontal surface of the phantom, the NNPS (eNNPS) was calculated from images of the phantom acquired at three different exposure levels covering the operating range of the system (E{sub 0}, which is the exposure at which a system is normally operated, 1/3 E{sub 0}, and 3 E0), and scatter measurements were assessed by using a beam-stop technique. The integral of DQE (IDQE) and eDQE (IeDQE) was calculated over the whole spatial frequency range. Results: The eMTF results demonstrate degradation due to magnification and the presence of scattered radiation. The eNNPS was influenced by the grid presence, and in some systems, it contained structured noise. At typical clinical exposure levels, the magnitude of eDQE(0) with respect to DQE(0) at RQA9 beam conditions was 13%, 17%, 16%, 36%, and 24%, respectively, for Carestream DRX-1, Carestream DRX-1C, Carestream Direct View CR975, Philips Digital Diagnost VM, and GE Revolution XR/d. These results were confirmed by the ratio of IeDQE and IDQE in the same conditions. Conclusions: The authors confirm the robustness and reproducibility of the eDQE method. As expected, the DR systems performed better than the CR systems due to their superior signal-to-noise transfer characteristics. The results of this study suggest the eDQE method may provide an opportunity to more accurately assess the clinical performance of digital radiographic imaging systems by accounting for factors such as the presence of scatter, use of an antiscatter grid, and magnification and focal spot blurring effects, which are not reflected in conventional DQE measures.

Bertolini, Marco; Nitrosi, Andrea; Rivetti, Stefano; Lanconelli, Nico; Pattacini, Pierpaolo; Ginocchi, Vladimiro; Iori, Mauro [Department of Advanced Technology, Medical Physics Unit, Azienda Ospedaliera ASMN, Istituto di Ricovero e Cura a Carattere Scientifico, Reggio Emilia 42123 (Italy); Fisica Medica, Ospedale di Sassuolo S.p.A., Modena 41049 (Italy); Alma Mater Studiorum, Physics Department, University of Bologna, Bologna 40127 (Italy); Department of Diagnostic Imaging, Radiology Unit, Azienda Ospedaliera ASMN, Istituto di Ricovero e Cura a Carattere Scientifico, Reggio Emilia 42123 (Italy); Department of Diagnostic Imaging, Radiology Unit, Azienda USL, Reggio Emilia 42122 (Italy); Department of Advanced Technology, Medical Physics Unit, Azienda Ospedaliera ASMN, Istituto di Ricovero e Cura a Carattere Scientifico, Reggio Emilia 42123 (Italy)

2012-05-15T23:59:59.000Z

269

System for detecting and limiting electrical ground faults within electrical devices  

DOE Patents (OSTI)

An electrical ground fault detection and limitation system for employment with a nuclear reactor utilizing a liquid metal coolant. Elongate electromagnetic pumps submerged within the liquid metal coolant and electrical support equipment experiencing an insulation breakdown occasion the development of electrical ground fault current. Without some form of detection and control, these currents may build to damaging power levels to expose the pump drive components to liquid metal coolant such as sodium with resultant undesirable secondary effects. Such electrical ground fault currents are detected and controlled through the employment of an isolated power input to the pumps and with the use of a ground fault control conductor providing a direct return path from the affected components to the power source. By incorporating a resistance arrangement with the ground fault control conductor, the amount of fault current permitted to flow may be regulated to the extent that the reactor may remain in operation until maintenance may be performed, notwithstanding the existence of the fault. Monitors such as synchronous demodulators may be employed to identify and evaluate fault currents for each phase of a polyphase power, and control input to the submerged pump and associated support equipment.

Gaubatz, Donald C. (Cupertino, CA)

1990-01-01T23:59:59.000Z

270

Efficient Detection on Stochastic Faults in PLC Based Automated Assembly Systems With Novel Sensor Deployment and Diagnoser Design  

E-Print Network (OSTI)

In this dissertation, we proposed solutions on novel sensor deployment and diagnoser design to efficiently detect stochastic faults in PLC based automated systems First, a fuzzy quantitative graph based sensor deployment was called upon to model...

Wu, Zhenhua

2012-07-16T23:59:59.000Z

271

Uncertainty of Measurement and Lower Detection Limit of Track Etched Detector Systems: Experimental Verification and Consequences for Intercomparison Experiments  

Science Journals Connector (OSTI)

......Dosimetry Article Uncertainty of Measurement and Lower Detection Limit...Detector Systems: Experimental Verification and Consequences for Intercomparison...the random uncertainty of measurement relative to track density...detectors used for the actual measurement of the quantity of interest......

B. Burgkhardt; E. Piesch; M. Vilgis

1993-05-01T23:59:59.000Z

272

NA22 Model Cities Project - LL244T An Intelligent Transportation System-Based Radiation Alert and Detection System  

SciTech Connect

The purpose of this project was twofold: first, provide an understanding of the technical foundation and planning required for deployment of Intelligent Transportation System (ITS)-based system architectures for the protection of New York City from a terrorist attack using a vehicle-deployed nuclear device; second, work with stakeholders to develop mutual understanding of the technologies and tactics required for threat detection/identification and establish guidelines for designing operational systems and procedures. During the course of this project we interviewed and coordinated analysis with people from the New Jersey State Attorney General's office, the New Jersey State Police, the Port Authority of New York/New Jersey, the Counterterrorism Division of the New York City Police Department, the New Jersey Transit Authority, the State of New Jersey Department of Transportation, TRANSCOM and a number of contractors involved with state and federal intelligent transportation development and implementation. The basic system architecture is shown in the figure below. In an actual system deployment, radiation sensors would be co-located with existing ITS elements and the data will be sent to the Traffic Operations Center. A key element of successful system operation is the integration of vehicle data, such as license plate, EZ pass ID, vehicle type/color and radiation signature. A threat data base can also be implemented and utilized in cases where there is a suspect vehicle identified from other intelligence sources or a mobile detector system. Another key aspect of an operational architecture is the procedures used to verify the threat and plan interdiction. This was a major focus of our work and discussed later in detail. In support of the operational analysis, we developed a detailed traffic simulation model that is described extensively in the body of the report.

Peglow, S

2004-02-24T23:59:59.000Z

273

Parasitic signals in the receiving band of the Sub-Harmonic Arc Detection system on JET ICRF Antennas  

SciTech Connect

When testing the SHAD system on JET ICRF antennas, parasitic signals in the detection band (5-20MHz) were detected. We have identified emission from grid breakdown events in the Neutral Beam injectors, and Ion Cyclotron Emission from the plasma. Spurious signals in the band 4-10 MHz are also often observed at the onset of ELM events. Such parasitic signals could complicate the design and operation of SHAD in ICRF systems for fusion devices.

Jacquet, P.; Blackman, T.; Day, I. E.; Graham, M.; Mayoral, M.-L.; Monakhov, I.; Nightingale, M.; Sharapov, S. E. [EURATOM/CCFE Fusion Association, Culham Science Center, Abingdon, 0X14 3DB (United Kingdom); Berger-By, G. [CEA, IRFM, F-l3108 Saint-Paul-lez Durances (France); Bobkov, V. [Max Planck IPP/EURATOM Assoziation, D-85748 Garching (Germany); Durodie, F.; Vrancken, M. [Association EURATOM/Belgium State, LPP-ERM/KMS, B-1000 Brussels (Belgium); Hellsten, T. [Association EURATOM-VR, Fusion Plasma Physics, EES, KTH, Stockholm (Sweden); Laxaaback, M. [Association EURATOM-VR, Fusion Plasma Physics, EES, KTH, Stockholm (Sweden); EFDA-CSU, Culham Science Centre, Abingdon, 0X14 3DB (United Kingdom)

2011-12-23T23:59:59.000Z

274

Detection and control of combustion instability based on the concept of dynamical system theory  

Science Journals Connector (OSTI)

We propose an online method of detecting combustion instability based on the concept of dynamical system theory, including the characterization of the dynamic behavior of combustion instability. As an important case study relevant to combustion instability encountered in fundamental and practical combustion systems, we deal with the combustion dynamics close to lean blowout (LBO) in a premixed gas-turbine model combustor. The relatively regular pressure fluctuations generated by thermoacoustic oscillations transit to low-dimensional intermittent chaos owing to the intermittent appearance of burst with decreasing equivalence ratio. The translation error, which is characterized by quantifying the degree of parallelism of trajectories in the phase space, can be used as a control variable to prevent LBO.

Hiroshi Gotoda; Yuta Shinoda; Masaki Kobayashi; Yuta Okuno; Shigeru Tachibana

2014-02-11T23:59:59.000Z

275

Discrimination Report: A Multisensor system for detection andcharacterization of UXO, ESTCP Project MM-0437,  

SciTech Connect

The Berkeley UXO Discriminator (BUD) is an optimally designed active electromagnetic system that not only detects but also characterizes UXO. The performance of the system is governed by a target size-depth curve. BUD was designed to detect UXO in the 20 mm to 155 mm size range for depths between 0 and 1.5 m, and to characterize them in a depth range from 0 to 1.1 m. The system incorporates three orthogonal transmitters and eight pairs of differenced receivers. Eight receiver coils are placed horizontally along the two diagonals of the upper and lower planes of the two horizontal transmitter loops. These receiver coil pairs are located on symmetry lines through the center of the system and each pair sees identical fields during the on-time of the pulse in all of the transmitter coils. They are wired in opposition to produce zero output during the on-time of the pulses in three orthogonal transmitters. Moreover, this configuration dramatically reduces noise in the measurements by canceling the background electromagnetic fields (these fields are uniform over the scale of the receiver array and are consequently nulled by the differencing operation), and by canceling the noise contributed by the tilt motion of the receivers in the Earth's magnetic field, and greatly enhances receiver sensitivity to the gradients of the target response. BUD is mounted on a small cart to assure system mobility. System positioning is provided by a Real Time Kinematic (RTK) GPS receiver. The system has two modes of operation: (1) the search mode, in which BUD moves along a profile and exclusively detects targets in its vicinity providing target depth and horizontal location, and (2) the discrimination mode, in which BUD is stationary above a target, and determines three discriminating polarizability responses together with the object location and orientation from a single position of the system. The detection performance of the system is governed by a size-depth curve shown in Figure 2. This curve was calculated for BUD assuming that the receiver plane is 0.2 m above the ground. Figure 2 shows that, for example, BUD can detect an object with 0.1 m diameter down to the depth of 0.9 m with a depth uncertainty of 10%. Any objects buried at a depth of more than 1.3 m will have a low probability of detection. The discrimination performance of the system is governed by a size-depth curve shown in Figure 3. Again, this curve was calculated for BUD assuming that the receiver plane is 0.2 m above the ground. Figure 3 shows that, for example, BUD can determine the polarizability of an object with 0.1 m diameter down to the depth of 0.63 m with polarizability uncertainty of 10%. Any objects buried at the depth more than 0.9 m will have a low discrimination probability. Object orientation estimates and equivalent dipole polarizability estimates used for large and shallow UXO/scrap discrimination are more problematic as they are affected by higher order (non-dipole) terms induced in objects due to source field gradients along the length of the objects. For example, a vertical 0.4 m object directly below the system needs to be about 0.90 m deep for perturbations due to gradients along the length of the object to be of the order of 20% of the uniform field object response. Similarly, vertical objects 0.5 m, and 0.6 m long need to be 1.15 m, and 1.42 m, respectively, below the system. For horizontal objects the effect of gradients across the object diameter are much smaller. For example, 155 mm and 105 mm projectiles need to be only 0.30 m, and 0.19 m, respectively, below the system. A polarizability index (in cm{sup 3}), which is an average value of the product of time (in seconds) and polarizability rate (in m{sup 3}/s) over the 34 sample times logarithmically spaced from 143 to 1300 {micro}s, and three polarizabilities, can be calculated for any object. We used this polarizability index to decide when the object is in a uniform source field. Objects with the polarizability index smaller than 600 cm{sup 3} and deeper than 1.8 m below BUD, or smaller than 200

Gasperikova, Erika; Smith, J. Torquil; Morrison, H.Frank; Becker,Alex

2008-01-14T23:59:59.000Z

276

Performance characteristics of the annular core research reactor fuel motion detection system  

SciTech Connect

Recent proof tests have shown that the annular core research reactor (ACRR) fuel motion detection system has reached its design goals of providing high temporal and spatial resolution pictures of fuel distributions in the ACRR. The coded aperture imaging system (CAIS) images the fuel by monitoring the fission gamma rays from the fuel that pass through collimators in the reactor core. The gamma-ray beam is modulated by coded apertures before producing a visible light coded image in thin scintillators. Each coded image is then amplified and recorded by an opticalimage-intensifier/fast-framing-camera combination. The proximity to the core and the coded aperture technique provide a high data collection rate and high resolution. Experiments of CAIS at the ACRR conducted under steady-state operation have documented the beneficial effects of changes in the radiation shielding and imaging technique. The spatial resolutions are 1.7 mm perpendicular to the axis of a single liquid-metal fast breeder reactor fuel pin and 9 mm in the axial dimension. Changes in mass of 100 mg in each resolution element can be detected each frame period, which may be from 5 to 100 ms. This diagnostic instrument may help resolve important questions in fuel motion phenomenology.

Kelly, J.G.; Stalker, K.T.

1983-12-01T23:59:59.000Z

277

Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers  

DOE Patents (OSTI)

A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions of about 4 or 8.7 microns and directly producing images of the interior of the boiler, or producing feeding signals to a data processing system for information to enable a distributed control system by which the boilers are operated to operate said boilers more efficiently. The data processing system includes an image pre-processing circuit in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. It also includes an image compensation system for array compensation to correct for pixel variation and dead cells, etc., and for correcting geometric distortion. An image segmentation module receives a cleaned image from the image pre-processing circuit for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. It also accomplishes thresholding/clustering on gray scale/texture and makes morphological transforms to smooth regions, and identifies regions by connected components. An image-understanding unit receives a segmented image sent from the image segmentation module and matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system for more efficient operation of the plant pendant tube cleaning and operating systems.

Kychakoff, George (Maple Valley, WA); Afromowitz, Martin A. (Mercer Island, WA); Hogle, Richard E. (Olympia, WA)

2008-10-14T23:59:59.000Z

278

Double-Diffusive Intrusions in a Stable Salinity Gradient “Heated from Below”  

Science Journals Connector (OSTI)

Two-dimensional direct numerical simulations (DNS) are used to investigate the growth and nonlinear equilibration of spatially periodic double-diffusive intrusion for negative vertical temperature Tz salinity Sz gradients, which are ...

Julian Simeonov; Melvin E. Stern

2008-10-01T23:59:59.000Z

279

Interpreting human activity from electrical consumption data through non-intrusive load monitoring  

E-Print Network (OSTI)

Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

Gillman, Mark Daniel

2014-01-01T23:59:59.000Z

280

Image-based characterization of cement pore structure using Wood`s metal intrusion  

SciTech Connect

Mercury intrusion porosimetry is a widely used technique for characterization of the pore size distribution of cement-based materials. However, the technique has several limitations, among which are the ink bottle effect and a cylindrical pore geometry assumption that lead to inaccurate pore size distribution curves. By substituting Wood`s metal for mercury as the intruding liquid, scanning electron microscopy and imaging techniques can be applied to the sample after intrusion. The molten Wood`s metal solidifies within the pore structure of the sample, which allows it to be sectioned and observed in the scanning electron microscopy. From here, the sample can be analyzed both qualitatively, by observing the changes in the appearance of the sample as the intrusion process progresses, and quantitatively, by applying image analysis techniques. This study provides insight for better interpretation of mercury intrusion porosimetry results and the possibility for quantitative characterization of the spatial geometry of pores in cement-based materials.

Willis, K.L.; Abell, A.B.; Lange, D.A. [Univ. of Illinois, Urbana, IL (United States). Dept. of Civil Engineering] [Univ. of Illinois, Urbana, IL (United States). Dept. of Civil Engineering

1998-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California  

E-Print Network (OSTI)

2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

2009-01-01T23:59:59.000Z

282

Effects of droplet size on intrusion of sub-surface oil spills  

E-Print Network (OSTI)

This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

Chan, Godine Kok Yan

2013-01-01T23:59:59.000Z

283

Assessment of seawater intrusion into underground oil storage cavern and prediction of its sustainability  

Science Journals Connector (OSTI)

Operation of underground oil (gas) storage cavern in coastal area can induce seawater intrusion because excavation of underground storage cavern causes the groundwater level decrease of coastal aquifer. Seawater ...

Eunhee Lee; Jeong-Won Lim; Hee Sun Moon; Kang-Kun Lee

2014-07-01T23:59:59.000Z

284

FUEGO — Fire Urgency Estimator in Geosynchronous Orbit — A Proposed Early-Warning Fire Detection System  

E-Print Network (OSTI)

Remote Sens. 2013, 5 satellite with modern imaging detectors, software, and algorithms able to detect heat

Kelly, Maggi

2013-01-01T23:59:59.000Z

285

Chemical and petrological characteristics of the intrusive rocks of the Quitman Mountains, Texas  

E-Print Network (OSTI)

University Directed by: Dr. Thomas T. Tieh A petrological and geochemical study of a suite of differentiated intrusive rocks of the Northern Quitman Mountains, Hudspeth County, Texas, has been made. For the relatively small exposed area (approximately 1D...- face extent of the dense intrusive rocks is much greater than the outcrop. These data also suggest that the less dense central volcanic complex is probably a plug having deepseated roots. 1 wish to dedicate this thesis to my parents and wife, Becki...

Seay, Christopher Sidney

2012-06-07T23:59:59.000Z

286

Abstract --A wireless strain sensor system has been designed for human motion detection. The amorphous carbon strain  

E-Print Network (OSTI)

Abstract -- A wireless strain sensor system has been designed for human motion detection sensing technologies, with benefits of miniaturization and low power consumption, have gained dramatic-built sputter system at 150-W power for a period of 8 hours. The chamber pressure was maintained at 35 m

Chiao, Jung-Chih

287

Physics-based, Bayesian sequential detection method and system for radioactive contraband  

DOE Patents (OSTI)

A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

2014-03-18T23:59:59.000Z

288

Little Goose Dam Full Flow PIT-Tag Detection System Project Summary.  

SciTech Connect

In 2006, the design phase of this project was kicked off and was for the most part modeled after the Full Flow PIT installation installed at Lower Monumental Dam during winter and spring of 2006 and 2007. As the Goose Full Flow design progressed and the project started to move towards construction, issues within contracting occurred and the project was put on delay for 1 year. Starting in mid December of 2008, Harcon Inc. was awarded the contract and construction of the new Goose Full Flow PIT-tag detection system began. The purpose of this document is to summarize the installation of the Little Goose Full Flow project from start to finish and to highlight the notable successes and challenges that the installation presented along with the final results and current status.

Warf, Don; Livingston, Scott [Pacific States Marine Fisheries Commission

2009-04-16T23:59:59.000Z

289

Systems for low frequency seismic and infrasound detection of geo-pressure transition zones  

DOE Patents (OSTI)

Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

Shook, G. Michael (Idaho Falls, ID); LeRoy, Samuel D. (Houston, TX); Benzing, William M. (Tulsa, OK)

2007-10-16T23:59:59.000Z

290

IEEE Conference on E-Commerce Technology, July 6-9, 2004, San Diego, California, USA On Designing a Flexible E-Payment System with Fraud Detection Capability  

E-Print Network (OSTI)

a Flexible E-Payment System with Fraud Detection Capability Antoinette Leung Department of Electronic measures especially fraud detection has become an imperative issue in the design of online payment systems with internal logics that are capable of detecting fraud transaction, and even potential fraud transactions

Fong, Chi Chiu "Simon"

291

Monte Carlo simulation of explosive detection system based on a Deuterium–Deuterium (D–D) neutron generator  

Science Journals Connector (OSTI)

Abstract An explosive detection system based on a Deuterium–Deuterium (D–D) neutron generator has been simulated using the Monte Carlo N-Particle Transport Code (MCNP5). Nuclear-based explosive detection methods can detect explosives by identifying their elemental components, especially nitrogen. Thermal neutron capture reactions have been used for detecting prompt gamma emission (10.82 MeV) following radiative neutron capture by 14N nuclei. The explosive detection system was built based on a fully high-voltage-shielded, axial D–D neutron generator with a radio frequency (RF) driven ion source and nominal yield of about 1010 fast neutrons per second (E=2.5 MeV). Polyethylene and paraffin were used as moderators with borated polyethylene and lead as neutron and gamma ray shielding, respectively. The shape and the thickness of the moderators and shields are optimized to produce the highest thermal neutron flux at the position of the explosive and the minimum total dose at the outer surfaces of the explosive detection system walls. In addition, simulation of the response functions of NaI, BGO, and LaBr3-based ?-ray detectors to different explosives is described.

K. Bergaoui; N. Reguigui; C.K. Gary; C. Brown; J.T. Cremer; J.H. Vainionpaa; M.A. Piestrup

2014-01-01T23:59:59.000Z

292

Remote Fault Detection of Building HVAC System Using a Global Optimization Program  

E-Print Network (OSTI)

the simulation program in conjunction with synthetic measured data to identify faults in the building operation. This fault detection approach has successfully identified all of the faulty parameters with noise levels of 1%, 3% and 6%. It successfully detected...

Lee, S. U.; Claridge, D. E.

2004-01-01T23:59:59.000Z

293

Fault detection and diagnosis within a wind turbine mechanical braking system using condition monitoring  

Science Journals Connector (OSTI)

Renewable energy sources have a key role to play in the global energy mix as a means of reducing the impact of energy production on climate change. Wind energy is the most developed of all renewable energy technologies with more than 200 GW of globally installed capacity as of 2011. Analyses of wind farm maintenance costs show that up to 40% of the outlay is related to unexpected component failures that lead to costly unscheduled amendments. Wind farm operators are constantly looking for new technological developments in condition monitoring that can contribute to the minimisation of wind turbine maintenance expenditure. Early fault detection through condition monitoring can help prevent major breakdowns as well as significantly decrease associated costs. Moreover it enables the optimisation of maintenance schedules, reduces downtime, increases asset availability and enhances safety and operational reliability. Faults in the braking system are of particularly concern since they can result in catastrophic failure of the wind turbine. The present study investigates online condition monitoring based on voltages and currents for mechanical wind turbine brake system fault diagnosis.

M. Entezami; S. Hillmansen; P. Weston; M.Ph. Papaelias

2012-01-01T23:59:59.000Z

294

Detection of Volatile Organics Using a Surface Acoustic Wave Array System  

SciTech Connect

A chemical sensing system based on arrays of surface acoustic wave (SAW) delay lines has been developed for identification and quantification of volatile organic compounds (VOCs). The individual SAW chemical sensors consist of interdigital transducers patterned on the surface of an ST-cut quartz substrate to launch and detect the acoustic waves and a thin film coating in the SAW propagation path to perturb the acoustic wave velocity and attenuation during analyte sorption. A diverse set of material coatings gives the sensor arrays a degree of chemical sensitivity and selectivity. Materials examined for sensor application include the alkanethiol-based self-assembled monolayer, plasma-processed films, custom-synthesized conventional polymers, dendrimeric polymers, molecular recognition materials, electroplated metal thin films, and porous metal oxides. All of these materials target a specific chemical fi.mctionality and the enhancement of accessible film surface area. Since no one coating provides absolute analyte specificity, the array responses are further analyzed using a visual-empirical region-of-influence (VERI) pattern recognition algorithm. The chemical sensing system consists of a seven-element SAW array with accompanying drive and control electronics, sensor signal acquisition electronics, environmental vapor sampling hardware, and a notebook computer. Based on data gathered for individual sensor responses, greater than 93%-accurate identification can be achieved for any single analyte from a group of 17 VOCs and water.

ANDERSON, LAWRENCE F.; BARTHOLOMEW, JOHN W.; CERNOSEK, RICHARD W.; COLBURN, CHRISTOPHER W.; CROOKS, R.M.; MARTINEZ, R.F.; OSBOURN, GORDON C.; RICCO, A.J.; STATON, ALAN W.; YELTON, WILLIAM G.

1999-10-14T23:59:59.000Z

295

EA-507; Environmental Assessment and FONSI For The FAA Explosive Detection System Independent Validation And Verification Program INEL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07; Environmental Assessment and FONSI For The FAA Explosive 07; Environmental Assessment and FONSI For The FAA Explosive Detection System Independent Validation And Verification Program INEL Table of Contents 1. NEED FOR PROPOSED ACTION 2. DESCRIPTION OF THE PROPOSED ACTION 3. ALTERNATIVES TO PROPOSED ACTION 4. ENVIRONMENTAL IMPACTS OF PROPOSED ACTION 5. CONCLUSIONS/SUMMARY 6. LIST OF PREPARERS 7. REFERENCES APPENDIX I Map of WRRTF APPENDIX II Accident Safety Analysis FINDING OF NO SIGNIFICANT IMPACT FEDERAL AVIATION ADMINISTRATION EXPLOSIVE DETECTION SYSTEM - INDEPENDENT VALIDATION AND VERIFICATION PROGRAM LIST OF FIGURES Page XXX WATER REACTOR RESEARCH TEST FACT 1. NEED FOR PROPOSED ACTION The urgent development, fabrication, and operation of advanced explosive detection systems are needed by the Federal Aviation Agency (FAA) to

296

A H-infinity Fault Detection and Diagnosis Scheme for Discrete Nonlinear System Using Output Probability Density Estimation  

SciTech Connect

In this paper, a H-infinity fault detection and diagnosis (FDD) scheme for a class of discrete nonlinear system fault using output probability density estimation is presented. Unlike classical FDD problems, the measured output of the system is viewed as a stochastic process and its square root probability density function (PDF) is modeled with B-spline functions, which leads to a deterministic space-time dynamic model including nonlinearities, uncertainties. A weighting mean value is given as an integral function of the square root PDF along space direction, which leads a function only about time and can be used to construct residual signal. Thus, the classical nonlinear filter approach can be used to detect and diagnose the fault in system. A feasible detection criterion is obtained at first, and a new H-infinity adaptive fault diagnosis algorithm is further investigated to estimate the fault. Simulation example is given to demonstrate the effectiveness of the proposed approaches.

Zhang Yumin; Lum, Kai-Yew [Temasek Laboratories, National University of Singapore, Singapore 117508 (Singapore); Wang Qingguo [Depa. Electrical and Computer Engineering, National University of Singapore, Singapore 117576 (Singapore)

2009-03-05T23:59:59.000Z

297

High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device  

DOE Patents (OSTI)

An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD. 13 figs.

Atac, M.; McKay, T.A.

1998-04-21T23:59:59.000Z

298

High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device  

DOE Patents (OSTI)

An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD.

Atac, Muzaffer (Wheaton, IL); McKay, Timothy A. (Ann Arbor, MI)

1998-01-01T23:59:59.000Z

299

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

300

Comparison of measurement indices of noise intrusions in multi?family housing  

Science Journals Connector (OSTI)

Methods for measuring sound levels associated with transportation impact and airborne sound intrusions in multi?family housing are well established in the field. This paper compares field testing of assemblies where complaints and retrofits have been involved where traditional assessments of intruding noises showed compliance with design criteria but where residents and/or building owners perceived problems. Case study 1 involves noise from airplanes approaching a runway at a large international airport as heard in an all?glass high?rise condominium evaluated by LDNs and SELs of actual flyovers in computer models and in a full size mock?up of a typical unit built on site. Case study 2 involves noise from outdoor amplified entertainment propagating into neighborhoods as evaluated by various noise ordinance criteria. Case study 3 involves footstep noise through flooring systems comparing IIC ratings with actual sound pressure levels of people walking on floors above. Case study 4 compares noise and vibration levels for various pieces of mechanical equipment before and after retrofit with NC RC and other room criteria. Auralizations of the case studies will be shown along with measurement data to illustrate the diagnostics made in each case.

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

System and method for constructing filters for detecting signals whose frequency content varies with time  

DOE Patents (OSTI)

A system and method for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos{2.pi..phi.(t)} and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {.phi.'(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series (also known as the Gabor spectrogram). The joint time-frequency transformation represents the analyzed signal energy at time t and frequency .function., P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function .phi.'(t) which best fits the multivalued function f(t), a trajectory of the joint time-frequency domain representation of x(t). Integrating .phi.'(t) along t yields .phi.(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template.

Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

1996-01-01T23:59:59.000Z

302

System and method for constructing filters for detecting signals whose frequency content varies with time  

DOE Patents (OSTI)

A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

Qian, S.; Dunham, M.E.

1996-11-12T23:59:59.000Z

303

Policy-controlled Event Management for Distributed Intrusion Detection Christian Kreibich  

E-Print Network (OSTI)

- sic building blocks for the formulation of a site's security policy since its conception. A recent

Hand, Steven

304

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG  

E-Print Network (OSTI)

feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

California at Davis, University of

305

Intrusion Detection and QoS Security Architecture for Service Grid Computing Environment  

Science Journals Connector (OSTI)

Grid Computing is information technology which used to ... data, sensors and other resources across global. Grid Computing Environment provides the services like Job ... Environment and web services as well. So Grid

Raghavendra Prabhu; Basappa B. Kodada…

2012-01-01T23:59:59.000Z

306

Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks  

Science Journals Connector (OSTI)

......editor: Zhangbing Zhou Recently, wireless sensor networks (WSNs) have been widely used in many applications, such as Smart Grid. However, it is generally known that WSNs are energy limited, which makes WSNs vulnerable to malicious attacks. Among......

Guangjie Han; Xun Li; Jinfang Jiang; Lei Shu; Jaime Lloret

2014-05-01T23:59:59.000Z

307

MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method  

Science Journals Connector (OSTI)

......of Engineering and Applied Science, University of Colorado, Colorado Springs, USA Corresponding author: dkb@tezu.ernet...legitimate users from using a service, viz., SYN flood, neptune and teardrop DDoS In distributed DoS (DDoS......

Prasanta Gogoi; D.K. Bhattacharyya; B. Borah; Jugal K. Kalita

2014-04-01T23:59:59.000Z

308

LYNX: An unattended sensor system for detection of gamma-ray and neutron emissions from special nuclear materials  

SciTech Connect

This manuscript profiles an unattended and fully autonomous detection system sensitive to gamma-ray and neutron emissions from special nuclear material. The LYNX design specifically targets applications that require radiation detection capabilities but possess little or no infrastructure. In these settings, users need the capability to deploy sensors for extended periods of time that analyze whatever signal-starved data can be captured, since little or no control may be exerted over measurement conditions. The fundamental sensing elements of the LYNX system are traditional NaI(Tl) and 3He detectors. The new developments reported here center on two themes: low-power electronics and computationally simple analysis algorithms capable of discriminating gamma-ray signatures indicative of special nuclear materials from those of naturally occurring radioactive material. Incorporating tripwire-detection algorithms based on gamma-ray spectral signatures into a low-power electronics package significantly improves performance in environments where sensors encounter nuisance sources.

Runkle, Robert C.; Myjak, Mitchell J.; Kiff, Scott D.; Sidor, Daniel E.; Morris, Scott J.; Rohrer, John S.; Jarman, Kenneth D.; Pfund, David M.; Todd, Lindsay C.; Bowler, Ryan S.; Mullen, Crystal A.

2009-01-21T23:59:59.000Z

309

SMARTx: An Embedded Proximity Detection System for Reducing CS4000: Individual Studies in Computer Science -SMARTx: Software and  

E-Print Network (OSTI)

detection, we explored development with the use of Arduino boards and compatible sensors. We spend many hours learning how to set up and program our Arduino Uno boards and sensors. It was a great learning we had created a server/client Arduino based system that notified a user when each device was within

Zhuang, Yu

310

Obstacle detection and mapping in low-cost, low-power multi-robot systems using an Inverted  

E-Print Network (OSTI)

Obstacle detection and mapping in low-cost, low-power multi-robot systems using an Inverted with constrained memory capacity and processing power, and is called the Inverted Particle Filter. This method has circuits. An important benefit of this is reduced power consumption opening for new battery-powered

Paris-Sud XI, Université de

311

Oil and gas exploration system and method for detecting trace amounts of hydrocarbon gases in the atmosphere  

DOE Patents (OSTI)

An oil and gas exploration system and method for land and airborne operations, the system and method used for locating subsurface hydrocarbon deposits based upon a remote detection of trace amounts of gases in the atmosphere. The detection of one or more target gases in the atmosphere is used to indicate a possible subsurface oil and gas deposit. By mapping a plurality of gas targets over a selected survey area, the survey area can be analyzed for measurable concentration anomalies. The anomalies are interpreted along with other exploration data to evaluate the value of an underground deposit. The system includes a differential absorption lidar (DIAL) system with a spectroscopic grade laser light and a light detector. The laser light is continuously tunable in a mid-infrared range, 2 to 5 micrometers, for choosing appropriate wavelengths to measure different gases and avoid absorption bands of interference gases. The laser light has sufficient optical energy to measure atmospheric concentrations of a gas over a path as long as a mile and greater. The detection of the gas is based on optical absorption measurements at specific wavelengths in the open atmosphere. Light that is detected using the light detector contains an absorption signature acquired as the light travels through the atmosphere from the laser source and back to the light detector. The absorption signature of each gas is processed and then analyzed to determine if a potential anomaly exists.

Wamsley, Paula R. (Littleton, CO); Weimer, Carl S. (Littleton, CO); Nelson, Loren D. (Evergreen, CO); O'Brien, Martin J. (Pine, CO)

2003-01-01T23:59:59.000Z

312

Geophex Airborne Unmanned Survey System  

SciTech Connect

Ground-based surveys place personnel at risk due to the proximity of buried unexploded ordnance (UXO) items or by exposure to radioactive materials and hazardous chemicals. The purpose of this effort is to design, construct, and evaluate a portable, remotely-piloted, airborne, geophysical survey system. This non-intrusive system will provide stand-off capability to conduct surveys and detect buried objects, structures, and conditions of interest at hazardous locations. During a survey, the operators remain remote from, but within visual distance of, the site. The sensor system never contacts the Earth, but can be positioned near the ground so that weak geophysical anomalies can be detected. The Geophex Airborne Unmanned Survey System (GAUSS) is designed to detect and locate small-scale anomalies at hazardous sites using magnetic and electromagnetic survey techniques. The system consists of a remotely-piloted, radio-controlled, model helicopter (RCH) with flight computer, light-weight geophysical sensors, an electronic positioning system, a data telemetry system, and a computer base-station. The report describes GAUSS and its test results.

Won, I.L.; Keiswetter, D.

1995-12-31T23:59:59.000Z

313

Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology  

SciTech Connect

This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

FITZGERALD, ERIC; KOENIG, RICHARD

2005-06-27T23:59:59.000Z

314

Non-Intrusive Electric Load Monitoring in Commercial Buildings  

E-Print Network (OSTI)

for HVAC equipment in commercial buildings has focused allention on instrumentation required to obtain the desired data. In this paper we investigate what can be learned from measurements of electrical power at a single point, that of the elecl...; and detecting suboptimal staging of multiple chillers, Detection of equipment start and stop transitions was strengthened by application of a nonlinear filter that determines the point of median power from a fi Itering window of user selected width. A...

Norford, L. K.; Mabey, N.

315

A hybrid system for fault detection and sensor fusion based on fuzzy clustering and artificial immune systems  

E-Print Network (OSTI)

In this study, an efficient new hybrid approach for multiple sensors data fusion and fault detection is presented, addressing the problem with possible multiple faults, which is based on conventional fuzzy soft clustering and artificial immune...

Jaradat, Mohammad Abdel Kareem Rasheed

2007-04-25T23:59:59.000Z

316

Field testing of component-level model-based fault detection methods for mixing boxes and VAV fan systems  

SciTech Connect

An automated fault detection and diagnosis tool for HVAC systems is being developed, based on an integrated, life-cycle, approach to commissioning and performance monitoring. The tool uses component-level HVAC equipment models implemented in the SPARK equation-based simulation environment. The models are configured using design information and component manufacturers' data and then fine-tuned to match the actual performance of the equipment by using data measured during functional tests of the sort using in commissioning. This paper presents the results of field tests of mixing box and VAV fan system models in an experimental facility and a commercial office building. The models were found to be capable of representing the performance of correctly operating mixing box and VAV fan systems and detecting several types of incorrect operation.

Xu, Peng; Haves, Philip

2002-05-16T23:59:59.000Z

317

Instrumented SSH on NERSC Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Security » Instrumented SSH Security » Instrumented SSH Instrumented SSH on NERSC Systems NERSC uses a modified version of SSH on all of our systems that allows us to record and analyze the content of interactive SSH sessions. Why are We Doing This? Credential theft represents the single greatest threat to security here at NERSC. We are addressing this problem by analyzing user command activity and looking for behavior that is recognizably hostile. Until SSH came into widespread use, it was trivial to monitor login sessions and analyze them for mischievous activity. Furthermore, this kind of intrusion detection proved to be very effective with few "false positives". Using this version of SSH at NERSC, we are simply recovering that capability. However, we recognize the importance of being candid about

318

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich  

E-Print Network (OSTI)

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah and administrators of web appli- cations recover from intrusions such as SQL injection, cross-site scripting repair to proceed concurrently with normal operation of a web application. Finally, WARP captures

Sabatini, David M.

319

A system for the detection of concealed nuclear weapons and fissile material aboard cargo cotainerships  

E-Print Network (OSTI)

A new approach to the detection of concealed nuclear weapons and fissile material aboard cargo containerships is proposed. The ship-based approach removes the constraints of current thinking by addressing the threat of ...

Gallagher, Shawn P., S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

320

Nuclear Regulatory Authority low energy germanium detection system: performance for the uranium individual monitoring  

Science Journals Connector (OSTI)

......Regulatory Authority low energy germanium detection...Autonoma de Buenos Aires, Argentina 2 Sociedad Argentina de Radioproteccion...Autonoma de Buenos Aires, Argentina The lung counter facility...for 235U photopeaks energies and for each effective......

M. R. Spinella; M. Krimer; A. M. Rojo; I. Gomez Parada; B. N. Gregori

2007-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Effective Supervised Knowledge Extraction for an mHealth System for Fall Detection  

Science Journals Connector (OSTI)

Fall detection is an important task in telemedicine. In this paper an approach based on supervised knowledge extraction is presented. A fall recordings database is analyzed offline and a set of IF...THEN rules...

G. Sannino; I. De Falco; G. De Pietro

2014-01-01T23:59:59.000Z

322

Broken Bar Detection in Synchronous Machines Based Wind Energy Conversion System  

E-Print Network (OSTI)

Electrical machines are subject to different types of failures. Early detection of the incipient faults and fast maintenance may prevent costly consequences. Fault diagnosis of wind turbine is especially important because they are situated...

Rahimian, Mina Mashhadi

2012-10-19T23:59:59.000Z

323

Substorm triggering by new plasma intrusion: THEMIS allsky imager observations  

E-Print Network (OSTI)

magnetosphereionosphere system that release large amounts of solar wind energy accumulated in the magnetotail [e

California at Berkeley, University of

324

gfp-Based N-Acyl Homoserine-Lactone Sensor Systems for Detection of Bacterial Communication  

Science Journals Connector (OSTI)

...plasmids used in this study are listed in Table...Applied Biosystems, Foster City, Calif...20 image analysis system (Hamamatsu) was...vectors expanded the systems application capability...online and in vivo studies. The system was found to work...

Jens Bo Andersen; Arne Heydorn; Morten Hentzer; Leo Eberl; Otto Geisenberger; Bjarke Bak Christensen; So/ren Molin; Michael Givskov

2001-02-01T23:59:59.000Z

325

Detection of Missing Roundabouts in Maps for Driving Assistance Systems Clment Zinoune1,2, Philippe Bonnifait1, Javier Ibaez-Guzmn2  

E-Print Network (OSTI)

Detection of Missing Roundabouts in Maps for Driving Assistance Systems Cl�ment Zinoune1 to make the vehicle able to detect the presence of a roundabout while it is driven. It is then possible of environment the vehicle is evolving in (rural or urban) [4], or to turn off the cruise control system as soon

Boyer, Edmond

326

Wavelet technique based islanding detection and improved repetitive current control for reliable operation of grid-connected PV systems  

Science Journals Connector (OSTI)

Abstract Recent years have witnessed a thrust towards the use of solar energy as the major renewable energy source for distributed power generation. The proposed system requires reliable detection technique and suitable current control strategy for proper operation. This paper focuses on plug-in repetitive current (RC) control strategy for grid connected inverter system and wavelet technique for electrical grid status identification. The performance of proposed current control technique employed for grid connected inverter system under distorted and unbalanced grid voltage is compared with the existing conventional methods like PI and PR controller. This controller uses the feedback control system for attenuating periodic disturbances, improving high quality sinusoidal output current and high power factor. The proposed scheme employs fourth order infinite impulse response (IIR) filter for maintaining its resonance frequency, output frequency matching with grid fundamental frequency and reduction of harmonics. The DC-DC boost converter implements incremental conductance based (INC) maximum power point tracker (MPPT) algorithm. The effects of LCL filter for improving disturbance rejection capability and dynamic performance of the proposed system is also demonstrated. Grid connected PV inverter employs wavelet technique for an islanding detection functionality in order to determine the status of the electrical grid. In order to show the effectiveness of the proposed algorithm, modeling and simulation for grid connected PV system is performed using MATLAB/SIMULINK and its PowerSim toolbox.

Smitha Joyce Pinto; Gayadhar Panda

2015-01-01T23:59:59.000Z

327

Precambrian Research 123 (2003) 295319 Late-and post-orogenic Neoproterozoic intrusions of Jordan  

E-Print Network (OSTI)

Precambrian Research 123 (2003) 295­319 Late- and post-orogenic Neoproterozoic intrusions of Jordan, G. Saffarinia, H. Al-Zubic a Geology Department, University of Jordan, 11942 Amman, Jordan b-0688, USA c Natural Resources Authority, P.O. Box 7, 11118 Amman, Jordan Received 12 June 2001; received

Stern, Robert J.

328

ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores  

E-Print Network (OSTI)

isotherms and capillary conden- sation, usually described as a gas-liquid phase transition shiftedccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores B- extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical

Boyer, Edmond

329

Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network (OSTI)

, Blacksburg, VA 24061 Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods and ability to produce functional representations of stochastic variability. PCE estimates coefficients observed differences. In these computational experiments, performance of PCE and SC is shown to be very

330

Recent Advances in Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network (OSTI)

-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods are attractive techniques representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis using probabilistic methods is the polynomial chaos expansion (PCE) approach to UQ. In this work, we

331

Evaluation of Non-Intrusive Approaches for Wiener-Askey Generalized Polynomial Chaos  

E-Print Network (OSTI)

University, Stanford, CA 94305 Polynomial chaos expansions (PCE) are an attractive technique for uncertainty for general probabilistic analysis problems. Non-intrusive PCE methods allow the use of simulations as black the polynomial chaos expansion (PCE) approach to UQ. In particular, we focus on generalized polynomial chaos

332

Dynamical and chemical characteristics of tropospheric intrusions observed during START08  

E-Print Network (OSTI)

. Homeyer,1 Kenneth P. Bowman,1 Laura L. Pan,2 Elliot L. Atlas,3 RuShan Gao,4 and Teresa L. Campos2 Received that the intruding air masses can be traced back to the tropical upper troposphere and lower stratosphere. In situ of the observed intrusions through use of a simple box model and trace species with different photochemical

Pan, Laura

333

Design and Performance of a Sensor System for Detection of Multiple Chemicals Using an External Cavity Quantum Cascade Laser  

SciTech Connect

We describe the performance of a sensor system designed for simultaneous detection of multiple chemicals with both broad and narrow absorption features. The sensor system consists of a broadly tunable external cavity quantum cascade laser (ECQCL), multi-pass Herriott cell, and custom low-noise electronics. The ECQCL features a rapid wavelength tuning rate of 2265 cm 1/s (15660 nm/s) over its tuning range of 1150-1270 cm 1 (7.87-8.70 ?m), which permits detection of molecules with broad absorption features and dynamic concentrations, while the 0.2 cm-1 spectral resolution of the ECQCL system allows measurement of small molecules with atmospherically broadened absorption lines. High-speed amplitude modulation and low-noise electronics are used to improve the ECQCL performance for direct absorption measurements. We demonstrate simultaneous detection of Freon-134a (1,1,1,2-tetrafluoroethane), ammonia (NH3), and nitrous oxide (N2O) at low-ppb concentrations in field measurements of atmospheric chemical releases from a point source.

Phillips, Mark C.; Taubman, Matthew S.; Bernacki, Bruce E.; Cannon, Bret D.; Schiffern, John T.; Myers, Tanya L.

2010-01-23T23:59:59.000Z

334

Integrated Light Collimating System for Extended Optical-Path-Length Absorbance Detection in Microchip-Based Capillary Electrophoresis  

Science Journals Connector (OSTI)

In this microchip, the centers of an extended 500-?m detection cell and two optical fibers are self-aligned, and a planoconvex microlens (r = 50 ?m) for light collimation is placed in front of a light-delivering fiber. ... Figure 6 shows the separation results of fluorescein (10 ?M), orange II (120 ?M), and new coccine (60 ?M) in cell C and cell A. Cell C shows an ?10 times increase in sensitivity due to the 10 times longer optical path length than cell A. This result shows that the collimating system integrated in cell C certainly contributes to the increase in the effective path length of the flow cell, and the increase in detection sensitivity of the collimated detection cell can be accomplished in proportion to the optical path length of the flow cell. ... A method is described for fabricating three-dimensional (3D) microfluidic channel systems in poly(dimethylsiloxane) (PDMS) with complex topologies and geometries that include a knot, a spiral channel, a basketweave of channels, a chaotic advective mixer, a system with braided channels, and a 3D grid of channels. ...

Kyung Won Ro; Kwanseop Lim; Bong Chu Shim; Jong Hoon Hahn

2005-07-12T23:59:59.000Z

335

An Analysis of a Spreader Bar Crane Mounted Gamma-Ray Radiation Detection System  

E-Print Network (OSTI)

above background or on EW work well for radiopharmaceuticals, which produce low-energy signatures and have similar spectral shapes to those produced by SNM (Ely et al. 2006). Radiopharmaceuticals are administered to a large number of individuals..., 99mTc is used; it is one of the most likely radionuclides to be detected. Other commonly used radionuclides are 51Cr, 67Ga 123I, 131I, 111In, and 201Tl, and depending on half-life, 16 can be detected for up to 115 days after the medical...

Grypp, Matthew D

2013-04-08T23:59:59.000Z

336

Decision-feedback multiple differential detection for space-time coded OFDM systems  

E-Print Network (OSTI)

by an irreducible error floor if the fading bandwidth is larger than zero. Decision-feedback differential detection (DF-DD) is found to be a very effective method to reduce such an error floor with a very low computational complexity. In this thesis, we first apply...

Liu, Yan

2001-01-01T23:59:59.000Z

337

System for detecting operating errors in a variable valve timing engine using pressure sensors  

DOE Patents (OSTI)

A method and control module includes a pressure sensor data comparison module that compares measured pressure volume signal segments to ideal pressure volume segments. A valve actuation hardware remedy module performs a hardware remedy in response to comparing the measured pressure volume signal segments to the ideal pressure volume segments when a valve actuation hardware failure is detected.

Wiles, Matthew A.; Marriot, Craig D

2013-07-02T23:59:59.000Z

338

Distributed Model-Invariant Detection of Unknown Inputs in Networked Systems  

E-Print Network (OSTI)

, including dynam- ically networked ones such as the smart grid and building thermal dynamics, fault detection, as in environmental monitoring [1], building energy management [2, 3], wireless communica- tions [4] and power grids algorithms undoubtedly benefit from the knowledge of accurate models [6, 1, 3]. Howe

Johansson, Karl Henrik

339

Optimization of Fault Detection/Diagnosis Model for Thermal Storage System Using AIC  

E-Print Network (OSTI)

of the event. In addition, human learning, recognition, and optimal judgment process of any event can be simulated by optimizing the most effective pa-rameters and their numbers for detection and diagnosis by the use of variable selection method. In previous...

Pan, S.; Zheng, M.; Nakahara, N.

2006-01-01T23:59:59.000Z

340

Security in Physical Environments: Algorithms and System for Automated Detection of  

E-Print Network (OSTI)

of that person within that environment are usually not further monitored other than detecting outright breaches is surreptitiously obtained (RFID sniffing) and used to create a clone of the RFID tag which can then be used in RFID, security personnel could be alerted to monitor the suspicious person closely to determine whether

Fong, Chi Chiu "Simon"

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Opportunities for Decay Counting of Environmental Radioisotopes Using Ultra-low-background Detection Systems  

SciTech Connect

Executive Summary We present results from a scoping study whose intent was to define challenge measurements to be pursued on the Ultra-Sensitive Nuclear Measurements Initiative. Potential challenge measurements using new radiation detection technology in the shallow underground laboratory that would have substantial impact in environmental science were the focus of this study.

Runkle, Robert C.; Aalseth, Craig E.; Bailey, Vanessa L.; Bonicalzi, Ricco; Moran, James J.; Seifert, Allen; Warren, Glen A.

2012-08-01T23:59:59.000Z

342

A Cabled Acoustic Telemetry System for Detecting and Tracking Juvenile Salmon: Part 2. Three-Dimensional Tracking and Passage Outcomes  

SciTech Connect

In Part 1 of this paper [1], we presented the engineering design and instrumentation of the Juvenile Salmon Acoustic Telemetry System (JSATS) cabled system, a nonproprietary technology developed by the U.S. Army Corps of Engineers, Portland District, to meet the needs for monitoring the survival of juvenile salmonids through the 31 dams in the Federal Columbia River Power System. Here in Part 2, we describe how the JSATS cabled system was employed as a reference sensor network for detecting and tracking juvenile salmon. Time-of-arrival data for valid detections on four hydrophones were used to solve for the three-dimensional (3D) position of fish surgically implanted with JSATS acoustic transmitters. Validation tests demonstrated high accuracy of 3D tracking up to 100 m from the John Day Dam spillway. The along-dam component, used for assigning the route of fish passage, had the highest accuracy; the median errors ranged from 0.06 to 0.22 m, and root mean square errors ranged from 0.05 to 0.56 m at distances up to 100 m. For the case study at John Day Dam during 2008, the range for 3D tracking was more than 100 m upstream of the dam face where hydrophones were deployed, and detection and tracking probabilities of fish tagged with JSATS acoustic transmitters were higher than 98%. JSATS cabled systems have been successfully deployed on several major dams to acquire information for salmon protection and for development of more “fish-friendly” hydroelectric facilities.

Deng, Zhiqun; Weiland, Mark A.; Fu, Tao; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Carlson, Thomas J.; Eppard, Matthew B.

2011-05-26T23:59:59.000Z

343

Modeling the effect of trend information on human failure detection and diagnosis in spacecraft systems  

E-Print Network (OSTI)

Systems are performing increasingly complicated tasks, made possible by significant advances in hardware and software technology. This task complexity is reflected in the system design, with a corresponding increased demand ...

Owen, Rachel L. (Rachel Lynn)

2010-01-01T23:59:59.000Z

344

A Case Study Correlating Innovative Gamma Ray Scanning Detection Systems Data to Surface Soil Gamma Spectrometry Results - 13580  

SciTech Connect

HydroGeoLogic (HGL), Inc. completed a United States Environmental Protection Agency (USEPA) study to characterize radiological contamination at a site near Canoga Park, California. The characterized area contained 470 acres including the site of a prototype commercial nuclear reactor and other nuclear design, testing, and support operations from the 1950's until 1988 [1]. The site history included radiological releases during operation followed by D and D activities. The characterization was conducted under an accelerated schedule and the results will support the project remediation. The project has a rigorous cleanup to background agenda and does not allow for comparison to risk-based guidelines. To target soil sample locations, multiple lines of evidence were evaluated including a gamma radiation survey, geophysical surveys, historical site assessment, aerial photographs, and former worker interviews. Due to the time since production and decay, the primary gamma emitting radionuclide remaining is cesium-137 (Cs-137). The gamma ray survey covered diverse, rugged terrain using custom designed sodium iodide thallium-activated (NaI(Tl)) scintillation detection systems. The survey goals included attaining 100% ground surface coverage and detecting gamma radiation as sensitively as possible. The effectiveness of innovative gamma ray detection systems was tested by correlating field Cs-137 static count ratios to Cs-137 laboratory gamma spectrometry results. As a case study, the area encompassing the former location of the first nuclear power station in the U. S. was scanned, and second by second global positioning system (GPS)-linked gamma spectral data were evaluated by examining total count rate and nuclide-specific regions of interest. To compensate for Compton scattering from higher energy naturally occurring radionuclides (U-238, Th-232 and their progeny, and K-40), count rate ratios of anthropogenic nuclide-specific regions of interest to the total count rate were calculated. From the scanning data, locations with observed Cs-137 ratios exceeding six standard deviations above the mean ratio were mapped in high resolution [2]. Field teams returned to those locations to collect static count measurements using the same detection systems. Soil surface samples were collected at 30 locations and analyzed for Cs-137. An exponential correlation was identified between Cs-137 concentrations in surface soil and field-scanned Cs-137 ratios. The data indicate field minimum detectable concentration (MDC) of Cs-137 at 0.02 Bq/g (0.5 pCi/g) or lower depending on contaminant distribution in soil. (authors)

Thompson, Shannon; Rodriguez, Rene; Billock, Paul [HydroGeoLogic, Inc., 11107 Sunset Hills Road, Suite 400, Reston, VA 20190 (United States)] [HydroGeoLogic, Inc., 11107 Sunset Hills Road, Suite 400, Reston, VA 20190 (United States); Lit, Peter [Nomad Science Group, 7738 Nautilus Shell Street, Las Vegas, NV 89139 (United States)] [Nomad Science Group, 7738 Nautilus Shell Street, Las Vegas, NV 89139 (United States)

2013-07-01T23:59:59.000Z

345

Improving shipboard maintenance practices using non-intrusive load monitoring  

E-Print Network (OSTI)

(cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

Piber, Mark A. (Mark Augustin)

2007-01-01T23:59:59.000Z

346

E-Print Network 3.0 - agent detection system Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

agent system stakeholder relationships, and the ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences Page: << < 1 2 3...

347

DAMAGE DETECTION STRATEGIES IN STRUCTURAL HEALTH MONITORING OF OVERHEAD POWER TRANSMISSION SYSTEM  

E-Print Network (OSTI)

part of T&D System that goes from the power plant to substations near demand points. "Distribution" refers to the low voltage part of T&D System that connects substations and consumers' switchgear boxes of 245 HV lines that gives a total of 13 053 km of HV lines distributed on the area of 312 679 km2

Boyer, Edmond

348

X-band Radar System for Detecting Heart and Respiration Rates  

E-Print Network (OSTI)

the sensing system is easy to handle, even ordinary person who is not instructed about usage sense. In a dielectric material, circularly polarized waves are reflected back, changing the axial ratio with the distance between antenna and target. Figure 1. The block diagram of CW Doppler radar system

Park, Seong-Ook

349

A dual neutron/gamma source for the Fissmat Inspection for Nuclear Detection (FIND) system.  

SciTech Connect

Shielded special nuclear material (SNM) is very difficult to detect and new technologies are needed to clear alarms and verify the presence of SNM. High-energy photons and neutrons can be used to actively interrogate for heavily shielded SNM, such as highly enriched uranium (HEU), since neutrons can penetrate gamma-ray shielding and gamma-rays can penetrate neutron shielding. Both source particles then induce unique detectable signals from fission. In this LDRD, we explored a new type of interrogation source that uses low-energy proton- or deuteron-induced nuclear reactions to generate high fluxes of mono-energetic gammas or neutrons. Accelerator-based experiments, computational studies, and prototype source tests were performed to obtain a better understanding of (1) the flux requirements, (2) fission-induced signals, background, and interferences, and (3) operational performance of the source. The results of this research led to the development and testing of an axial-type gamma tube source and the design/construction of a high power coaxial-type gamma generator based on the {sup 11}B(p,{gamma}){sup 12}C nuclear reaction.

Doyle, Barney Lee (Sandia National Laboratories, Albuquerque, NM); King, Michael; Rossi, Paolo (Sandia National Laboratories, Albuquerque, NM); McDaniel, Floyd Del (Sandia National Laboratories, Albuquerque, NM); Morse, Daniel Henry; Antolak, Arlyn J.; Provencio, Paula Polyak (Sandia National Laboratories, Albuquerque, NM); Raber, Thomas N.

2008-12-01T23:59:59.000Z

350

First steps in using machine learning on fMRI data to predict intrusive memories of traumatic film footage  

Science Journals Connector (OSTI)

Abstract After psychological trauma, why do some only some parts of the traumatic event return as intrusive memories while others do not? Intrusive memories are key to cognitive behavioural treatment for post-traumatic stress disorder, and an aetiological understanding is warranted. We present here analyses using multivariate pattern analysis (MVPA) and a machine learning classifier to investigate whether peri-traumatic brain activation was able to predict later intrusive memories (i.e. before they had happened). To provide a methodological basis for understanding the context of the current results, we first show how functional magnetic resonance imaging (fMRI) during an experimental analogue of trauma (a trauma film) via a prospective event-related design was able to capture an individual's later intrusive memories. Results showed widespread increases in brain activation at encoding when viewing a scene in the scanner that would later return as an intrusive memory in the real world. These fMRI results were replicated in a second study. While traditional mass univariate regression analysis highlighted an association between brain processing and symptomatology, this is not the same as prediction. Using MVPA and a machine learning classifier, it was possible to predict later intrusive memories across participants with 68% accuracy, and within a participant with 97% accuracy; i.e. the classifier could identify out of multiple scenes those that would later return as an intrusive memory. We also report here brain networks key in intrusive memory prediction. MVPA opens the possibility of decoding brain activity to reconstruct idiosyncratic cognitive events with relevance to understanding and predicting mental health symptoms.

Ian A. Clark; Katherine E. Niehaus; Eugene P. Duff; Martina C. Di Simplicio; Gari D. Clifford; Stephen M. Smith; Clare E. Mackay; Mark W. Woolrich; Emily A. Holmes

2014-01-01T23:59:59.000Z

351

Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites  

SciTech Connect

This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user.

Hakonson, T.E.

1986-02-01T23:59:59.000Z

352

Power Quality/Harmonic Detection: Harmonic Control in Electric Power Systems for the Telecommunications Industry  

E-Print Network (OSTI)

The control of harmonics in power systems continues to be a major concern in the telecommunications industry. AC/DC telecommunication conversion equipment has rarely been thought of as playing a major role in the harmonic interaction problem. Yet...

Felkner, L. J.; Waggoner, R. M.

353

A Comparison of Fault Detection Methods For a Transcritical Refrigeration System  

E-Print Network (OSTI)

Page 1 Subcritical and transcritical cycles ............................................................. 3 2 Example of the value of dynamic FDD ...................................................... 9 3 FCV model in Simulink... .............................................................................................. 27 15 Wincon and Simulink interface .................................................................. 28 16 The TRANE subcritical air conditioner ..................................................... 29 17 Schematic of the system...

Janecke, Alex Karl

2012-10-19T23:59:59.000Z

354

Detection and Characterization of Natural and Induced Fractures for the Development of Enhanced Geothermal Systems  

Energy.gov (U.S. Department of Energy (DOE))

Project objectives: Combine geophysical methods for reservoir and fracture characterization with rock physics measurements made under in-situ conditions (up to 350?C) for development of geothermal systems.

355

Symbol Synchronization in Coded UWB Systems using Adaptive Iterative Detection Durai Thirupathi and Keith M. Chugg  

E-Print Network (OSTI)

common UWB system found in the literature, the impulse radio, uses very narrow pulses as a way to expand significantly degrading the perfor- mance. I. INTRODUCTION After the discovery of turbo codes [1], iterative

Southern California, University of

356

Diagenetic effects of salt intrusions - an alternate model of caprock development  

SciTech Connect

Mineralogical, chemical, and isotopic changes were found as depth increased in texturally homogeneous sediment recovered from six 300-m (985-ft) boreholes on the outer shelf and slope of the northwestern Gulf of Mexico. In 2 of the 3 boreholes on the shelf and in all 3 boreholes on the slope, sediments of late Pleistocene age were found to be directly in contact with salt at the top of piercement structures. The other borehole was drilled on the flank of a salt intrusion also penetrating late Pleistocene sediment. In sediments over the top of the salt, the abundance of expandable clays (smectite) compared with nonexpandable clays (illite) decreases with depth. Within the carbonate fraction, delta/sup 13/C values range from -2% near the salt-sediment interface to 1% at the surface. This deviation is apparently a response to reprecipitation adjacent to the salt-sediment interface, with lighter isotopes derived from oxidation of the isotopically light organic matter. No mineralogical, chemical, or isotopic trends were found in sediments on the flank of the salt intrusion. The most commonly accepted model of cap rock formation requires the intrusion of a salt stock into a flowing aquifer, a unit which supplies water needed to dissolve salt concentrate, the anhydrite, and provide the subsequent chemical environment for gypsum and calcite formation. In the proposed model, water is the result of diagenesis caused by sediment-salt interaction. Cap rock formation then may occur well below base level and well out on the continental slope.

Holmes, C.W.

1984-04-01T23:59:59.000Z

357

Liquefied Noble Gas (LNG) detectors for detection of nuclear materials  

Science Journals Connector (OSTI)

Liquefied-noble-gas (LNG) detectors offer, in principle, very good energy resolution for both neutrons and gamma rays, fast response time (hence high-count-rate capabilities), excellent discrimination between neutrons and gamma rays, and scalability to large volumes. They do, however, need cryogenics. LNG detectors in sizes of interest for fissionable material detection in cargo are reaching a certain level of maturity because of the ongoing extensive R&}D effort in high-energy physics regarding their use in the search for dark matter and neutrinoless double beta decay. The unique properties of LNG detectors, especially those using Liquid Argon (LAr) and Liquid Xenon (LXe), call for a study to determine their suitability for Non-Intrusive Inspection (NII) for Special Nuclear Materials (SNM) and possibly for other threats in cargo. Rapiscan Systems Laboratory, Yale University Physics Department, and Adelphi Technology are collaborating in the investigation of the suitability of LAr as a scintillation material for large size inspection systems for air and maritime containers and trucks. This program studies their suitability for NII, determines their potential uses, determines what improvements in performance they offer and recommends changes to their design to further enhance their suitability. An existing 3.1 liter LAr detector (microCLEAN) at Yale University, developed for R&}D on the detection of weakly interacting massive particles (WIMPs) was employed for testing. A larger version of this detector (15 liters), more suitable for the detection of higher energy gamma rays and neutrons is being built for experimental evaluation. Results of measurements and simulations of gamma ray and neutron detection in microCLEAN and a larger detector (326 liter CL38) are presented.

J A Nikkel; T Gozani; C Brown; J Kwong; D N McKinsey; Y Shin; S Kane; C Gary; M Firestone

2012-01-01T23:59:59.000Z

358

Aptamer- and nucleic acid enzyme-based systems for simultaneous detection of multiple analytes  

DOE Patents (OSTI)

The present invention provides aptamer- and nucleic acid enzyme-based systems for simultaneously determining the presence and optionally the concentration of multiple analytes in a sample. Methods of utilizing the system and kits that include the sensor components are also provided. The system includes a first reactive polynucleotide that reacts to a first analyte; a second reactive polynucleotide that reacts to a second analyte; a third polynucleotide; a fourth polynucleotide; a first particle, coupled to the third polynucleotide; a second particle, coupled to the fourth polynucleotide; and at least one quencher, for quenching emissions of the first and second quantum dots, coupled to the first and second reactive polynucleotides. The first particle includes a quantum dot having a first emission wavelength. The second particle includes a second quantum dot having a second emission wavelength different from the first emission wavelength. The third polynucleotide and the fourth polynucleotide are different.

Lu, Yi (Champaign, IL); Liu, Juewen (Albuquerque, NM)

2011-11-15T23:59:59.000Z

359

Compilation of Gas Intrusion Measurements, Variations, and Consequence Modeling for SPR Caverns  

SciTech Connect

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H{sub 2}S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

HINKEBEIN, THOMAS E.

2003-03-01T23:59:59.000Z

360

Mechanisms of Peritoneal Metastasis after Operation for Non-Serosa-invasive Gastric Carcinoma: An Ultrarapid Detection System for Intraperitoneal Free Cancer Cells and a Prophylactic Strategy for Peritoneal Metastasis  

Science Journals Connector (OSTI)

...Metastasis after Operation for Non-Serosa-invasive...Ultrarapid Detection System for Intraperitoneal...quantitative diagnosis system to detect i.p...cancer cells during operation at molecular level...metastasis after operation for non-serosa-invasive...ultrarapid detection system for intraperitoneal...

Takashi Marutsuka; Shinya Shimada; Kenji Shiomori; Naoko Hayashi; Yasushi Yagi; Takaaki Yamane; and Michio Ogawa

2003-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

The SRI/OGI 2006 Spoken Term Detection System Dimitra Vergyri1  

E-Print Network (OSTI)

: Broadcast News (BN), Conversational Tele- phone Speech (CTS), and Conference Meetings (MTG). The system created and digitally stored daily. Since information processing has become a primary eco- nomic activity: indexing and searching. The au- dio data is processed once during the indexing phase, without knowledge

Shafran, Izhak

362

Nuclear reactor with internal thimble-type delayed neutron detection system  

DOE Patents (OSTI)

This invention teaches improved apparatus for the method of detecting a breach in cladded fuel used in a nuclear reactor. The detector apparatus is located in the primary heat exchanger which conveys part of the reactor coolant past at least three separate delayed-neutron detectors mounted in this heat exchanger. The detectors are spaced apart such that the coolant flow time from the core to each detector is different, and these differences are known. The delayed-neutron activity at the detectors is a function of the delay time after the reaction in the fuel until the coolant carrying the delayed-neutron emitter passes the respective detector. This time delay is broken down into separate components including an isotopic holdup time required for the emitter to move through the fuel from the reaction to the coolant at the breach, and two transit times required for the emitter now in the coolant to flow from the breach to the detector loop and then via the loop to the detector. At least two of these time components are determined during calibrated operation of the reactor. Thereafter during normal reactor operation, repeated comparisons are made by the method of regression approximation of the third time component for the best-fit line correlating measured delayed-neutron activity against activity that is approximated according to specific equations. The equations use these time-delay components and known parameter values of the fuel and of the part and emitting daughter isotopes.

Gross, Kenny C. (Lemont, IL); Poloncsik, John (Downers Grove, IL); Lambert, John D. B. (Wheaton, IL)

1990-01-01T23:59:59.000Z

363

Method to improve cancerous lesion detection sensitivity in a dedicated dual-head scintimammography system  

DOE Patents (OSTI)

An improved method for enhancing the contrast between background and lesion areas of a breast undergoing dual-head scintimammographic examination comprising: 1) acquiring a pair of digital images from a pair of small FOV or mini gamma cameras compressing the breast under examination from opposing sides; 2) inverting one of the pair of images to align or co-register with the other of the images to obtain co-registered pixel values; 3) normalizing the pair of images pixel-by-pixel by dividing pixel values from each of the two acquired images and the co-registered image by the average count per pixel in the entire breast area of the corresponding detector; and 4) multiplying the number of counts in each pixel by the value obtained in step 3 to produce a normalization enhanced two dimensional contrast map. This enhanced (increased contrast) contrast map enhances the visibility of minor local increases (uptakes) of activity over the background and therefore improves lesion detection sensitivity, especially of small lesions.

Kieper, Douglas Arthur (Newport News, VA); Majewski, Stanislaw (Yorktown, VA); Welch, Benjamin L. (Hampton, VA)

2008-10-28T23:59:59.000Z

364

The detection, prevention and mitigation of cascading outages in the power system  

E-Print Network (OSTI)

and their neighboring lines . . . . . . . . . . . . . . 96 IX Transmission lines and their thermal limits (in MVA value) . . . . . 104 X Top 6 line outages ranked by vulnerability index and margin index . 105 XI Top 6 line outages ranked by vulnerability index based...116 120 1 CHAPTER I INTRODUCTION A. Problem Statement Electric power system is one of the biggest and most complex man-made sys- tems. It is composed of thousands of generators, transformers, transmission lines, substations, loads and extensive...

Song, Hongbiao

2009-05-15T23:59:59.000Z

365

Development of Integrated Online Monitoring Systems for Detection of Diversion at Natural Uranium Conversion Facilities  

SciTech Connect

Recent work at Oak Ridge National Laboratory (ORNL) has focused on some source term modeling of uranyl nitrate (UN) as part of a comprehensive validation effort employing gamma-ray detector instrumentation for the detection of diversion from declared conversion activities. Conversion, the process by which natural uranium ore (yellowcake) is purified and converted through a series of chemical processes into uranium hexafluoride gas (UF6), has historically been excluded from the nuclear safeguards requirements of the 235U-based nuclear fuel cycle. The undeclared diversion of this product material could potentially provide feedstock for a clandestine weapons program for state or non-state entities. Given the changing global political environment and the increased availability of dual-use nuclear technology, the International Atomic Energy Agency has evolved its policies to emphasize safeguarding this potential feedstock material in response to dynamic and evolving potential diversion pathways. To meet the demand for instrumentation testing at conversion facilities, ORNL developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions of a purified uranium-bearing aqueous stream exiting the solvent extraction process in a natural uranium conversion plant. This work investigates gamma-ray signatures of UN circulating in the UNCLE facility and evaluates detector instrumentation sensitivity to UN for safeguards applications. These detector validation activities include assessing detector responses to the UN gamma-ray signatures for spectrometers based on sodium iodide, lanthanum bromide, and germanium detectors. The results of measurements under static and dynamic operating conditions at concentrations ranging from 10-90g U/L of naturally enriched UN will be presented. A range of gamma-ray lines was examined and self-attenuation factors were calculated, in addition to attenuation for transmission measurement of density, concentration and enrichment. A detailed uncertainty analysis will be presented providing insights into instrumentation limitations to spoofing.

Dewji, Shaheen A [ORNL] [ORNL; Lee, Denise L [ORNL] [ORNL; Croft, Stephen [ORNL] [ORNL; McElroy, Robert Dennis [ORNL] [ORNL; Hertel, Nolan [Georgia Institute of Technology] [Georgia Institute of Technology; Chapman, Jeffrey Allen [ORNL] [ORNL; Cleveland, Steven L [ORNL] [ORNL

2013-01-01T23:59:59.000Z

366

Statistical Methods for Automatic Crack Detection Based on Vibrothermography Sequence-of-Images Data  

E-Print Network (OSTI)

of detection, Signal-to-noise ratio. #12;1 INTRODUCTION 1.1 Background Nondestructive evaluation (NDE) methods in structures by non-intrusive physical measurements. There exists random measurement noise for most NDE applications and statistical methods are needed for NDE data analysis. MIL-HDBK-1823A [1] describes

367

An evaluation of various types of fire detection alarm systems to awaken the elderly  

E-Print Network (OSTI)

to represent the hearing perception of an ei ghty year old male, were presented to ten college student participarits. These three alarm systems represented a smoke detector located in the hallway; in the bedroom and the liallway; and in the bedroom...-Sand Frequency Analyses (SPL re . 0002 microPascal) Taken 10 Feet from Source in UNass Anechoic Chaarber 18 IV An Average Eighty Year Old Nale's Hearing Perception of the Average Smoke Def~ctor Alarm Signals Neasured by Nober, Peirce and Well, at a Distance...

Townley, Timothy Edward

2012-06-07T23:59:59.000Z

368

Drought detective: Texas A&M professor works to develop drought prediction system  

E-Print Network (OSTI)

drought the way meteorologists forecast the weather? If one Texas A&M University researcher has his way, the answer is yes. #30;rough a #29;ve-year, #17;#14;#16;#19;,#24;#24;#24; research grant from the National Science Foundation (NSF), Dr. Steven... to be con#29;dent in decisions that put their #29;nancial future on the line,? he said, adding that an accurate prediction system in#18;uences all natural resources sectors, from utility companies to farmers. Agricultural losses have made the #25...

Smith, Courtney

2011-01-01T23:59:59.000Z

369

System and method for ultrafast optical signal detecting via a synchronously coupled anamorphic light pulse encoded laterally  

DOE Patents (OSTI)

In one general embodiment, a method for ultrafast optical signal detecting is provided. In operation, a first optical input signal is propagated through a first wave guiding layer of a waveguide. Additionally, a second optical input signal is propagated through a second wave guiding layer of the waveguide. Furthermore, an optical control signal is applied to a top of the waveguide, the optical control signal being oriented diagonally relative to the top of the waveguide such that the application is used to influence at least a portion of the first optical input signal propagating through the first wave guiding layer of the waveguide. In addition, the first and the second optical input signals output from the waveguide are combined. Further, the combined optical signals output from the waveguide are detected. In another general embodiment, a system for ultrafast optical signal recording is provided comprising a waveguide including a plurality of wave guiding layers, an optical control source positioned to propagate an optical control signal towards the waveguide in a diagonal orientation relative to a top of the waveguide, at least one optical input source positioned to input an optical input signal into at least a first and a second wave guiding layer of the waveguide, and a detector for detecting at least one interference pattern output from the waveguide, where at least one of the interference patterns results from a combination of the optical input signals input into the first and the second wave guiding layer. Furthermore, propagation of the optical control signal is used to influence at least a portion of the optical input signal propagating through the first wave guiding layer of the waveguide.

Heebner, John E. (Livermore, CA)

2010-08-03T23:59:59.000Z

370

Systematic Fast Neutron Background Measurement Fluctuations in an Urban Area Using a Mobile Detection System  

SciTech Connect

Neutron background measurements using a mobile trailer-based system were conducted in Knoxville, Tennessee. The 0.5 m2 system consisting of 8 EJ-301 liquid scintillation detectors was used to collect neutron background measurements in order to better understand the systematic background variations that depend solely on the street-level measurement position in a local, downtown area. Data was collected along 5 different streets in the downtown Knoxville area, and the measurements were found to be repeatable. Using 10 min measurements, fractional uncertainty in each measured data point was <2%. Compared with fast neutron background count rates measured away from downtown Knoxville, a reduction in background count rates ranging from 10-50% was observed in the downtown area, sometimes varying substantially over distances of tens of meters. These reductions are attributed to the shielding of adjacent buildings, quantified in part here by the metric angle-of-open-sky. The adjacent buildings may serve to shield cosmic ray neutron flux.

Iyengar, Anagha S [ORNL; Beach, Matthew R [ORNL; Newby, Jason [ORNL; Fabris, Lorenzo [ORNL; Heilbronn, Lawrence [University of Tennessee, Knoxville (UTK); Hayward, J P [University of Tennessee, Knoxville (UTK)

2014-01-01T23:59:59.000Z

371

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report  

SciTech Connect

Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

2011-09-01T23:59:59.000Z

372

Development of a System for Rapid Detection of Contaminants in Water Supplies Using Magnetic Resonance and Nanoparticles  

SciTech Connect

To keep the water supply safe and to ensure a swift and accurate response to a water supply contamination event, rapid and robust methods for microbial testing are necessary. Current technologies are complex, lengthy and costly and there is a need for rapid, reliable, and precise approaches that can readily address this fundamental security and safety issue. T2 Biosystems is focused on providing solutions to this problem by making breakthroughs in nanotechnology and biosensor techniques that address the current technical restrictions facing rapid, molecular analysis in complex samples. In order to apply the T2 Biosystems nucleic acid detection procedure to the analysis of nucleic acid targets in unprocessed water samples, Bacillus thuringeinsis was selected as a model organism and local river water was selected as the sample matrix. The initial assay reagent formulation was conceived with a manual magnetic resonance reader, was optimized using a high throughput system, and transferred back to the MR reader for potential field use. The final assay employing the designed and manufactured instruments was capable of detecting 10 CFU/mL of B. thuringiensis directly within the environmental water sample within 90 minutes. Further, discrimination of two closely related species of Bacilli was accomplished using the methods of this project; greater than 3-fold discrimination between B. cereus and B. thuringiensis at a concentrations spanning 10 CFU/mL to 10{sup 5} CFU/mL was observed.

Lowery, Thomas J; Neely, Lori; Chepin, James; Wellman, Parris; Toso, Ken; Murray, Paul; Audeh, Mark; Demas, Vasiliki; Palazzolo, Robert; Min, Michael; Phung, Nu; Blanco, Matt; Raphel, Jordan; O'Neil, Troy

2010-09-14T23:59:59.000Z

373

Modification of ordinary-mode reflectometry system to detect lower-hybrid waves in Alcator C-Mod  

SciTech Connect

Backscattering experiments to detect lower-hybrid (LH) waves have been performed in Alcator C-Mod, using the two modified channels (60 GHz and 75 GHz) of an ordinary-mode reflectometry system with newly developed spectral recorders that can continuously monitor spectral power at a target frequency. The change in the baseline of the spectral recorder during the LH wave injection is highly correlated to the strength of the X-mode non-thermal electron cyclotron emission. In high density plasmas where an anomalous drop in the lower hybrid current drive efficiency is observed, the observed backscattered signals are expected to be generated near the last closed flux surface, demonstrating the presence of LH waves within the plasma. This experimental technique can be useful in identifying spatially localized LH electric fields in the periphery of high-density plasmas.

Baek, S. G.; Shiraiwa, S.; Parker, R. R.; Dominguez, A.; Marmar, E. S. [Plasma Science and Fusion Center, MIT, Cambridge, Massachusetts 02139 (United States); Kramer, G. J. [Princeton Plasma Physics Laboratory, Princeton, New Jersey 08543 (United States)

2012-10-15T23:59:59.000Z

374

A SHAPIRO DELAY DETECTION IN THE BINARY SYSTEM HOSTING THE MILLISECOND PULSAR PSR J1910-5959A  

SciTech Connect

PSR J1910-5959A is a binary pulsar with a helium white dwarf (HeWD) companion located about 6 arcmin from the center of the globular cluster NGC 6752. Based on 12 years of observations at the Parkes radio telescope, the relativistic Shapiro delay has been detected in this system. We obtain a companion mass M{sub C} = 0.180 {+-} 0.018 M {sub Sun} (1{sigma}) implying that the pulsar mass lies in the range 1.1 M {sub Sun} {<=} M{sub P} {<=} 1.5 M {sub Sun }. We compare our results with previous optical determinations of the companion mass and examine prospects for using this new measurement for calibrating the mass-radius relation for HeWDs and for investigating their evolution in a pulsar binary system. Finally, we examine the set of binary systems hosting a millisecond pulsar and a low-mass HeWD for which the mass of both stars has been measured. We confirm that the correlation between the companion mass and the orbital period predicted by Tauris and Savonije reproduces the observed values but find that the predicted M{sub P} -P{sub B} correlation overestimates the neutron star mass by about 0.5 M {sub Sun} in the orbital period range covered by the observations. Moreover, a few systems do not obey the observed M{sub P} -P{sub B} correlation. We discuss these results in the framework of the mechanisms that inhibit the accretion of matter by a neutron star during its evolution in a low-mass X-ray binary.

Corongiu, A.; Burgay, M.; Possenti, A.; D'Amico, N. [INAF-Osservatorio Astronomico di Cagliari, Loc. Poggio dei Pini, Strada 54, I-09012 Capoterra (Italy); Camilo, F. [Columbia Astrophysics Laboratory, Columbia University, 550 West, 120th Street, New York, NY 10027 (United States); Lyne, A. G.; Kramer, M. [Jodrell Bank Centre for Astrophysics, School of Physics and Astronomy, University of Manchester, Manchester M13 9PL (United Kingdom); Manchester, R. N.; Johnston, S. [CSIRO Astronomy and Space Science, Australia Telescope National Facility, P.O. Box 76, Epping, NSW 1710 (Australia); Sarkissian, J. M. [Australia Telescope National Facility, CSIRO, Parkes Observatory, P.O. Box 276, Parkes, NSW 2870 (Australia); Bailes, M.; Van Straten, W. [Centre for Astrophysics and Supercomputing, Swinburne University of Technology, P.O. Box 218 Hawthorn, VIC 3122 (Australia)

2012-12-01T23:59:59.000Z

375

Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West  

SciTech Connect

Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

1997-02-03T23:59:59.000Z

376

Bisectional fault detection system  

DOE Patents (OSTI)

An apparatus, program product and method logically divide a group of nodes and causes node pairs comprising a node from each section to communicate. Results from the communications may be analyzed to determine performance characteristics, such as bandwidth and proper connectivity.

Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

2012-02-14T23:59:59.000Z

377

Row fault detection system  

DOE Patents (OSTI)

An apparatus, program product and method check for nodal faults in a row of nodes by causing each node in the row to concurrently communicate with its adjacent neighbor nodes in the row. The communications are analyzed to determine a presence of a faulty node or connection.

Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

2012-02-07T23:59:59.000Z

378

Detection Science  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a...

379

A New, Principled Approach to Anomaly Detection  

SciTech Connect

Intrusion detection is often described as having two main approaches: signature-based and anomaly-based. We argue that only unsupervised methods are suitable for detecting anomalies. However, there has been a tendency in the literature to conflate the notion of an anomaly with the notion of a malicious event. As a result, the methods used to discover anomalies have typically been ad hoc, making it nearly impossible to systematically compare between models or regulate the number of alerts. We propose a new, principled approach to anomaly detection that addresses the main shortcomings of ad hoc approaches. We provide both theoretical and cyber-specific examples to demonstrate the benefits of our more principled approach.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Bridges, Robert A [ORNL

2012-01-01T23:59:59.000Z

380

Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems  

E-Print Network (OSTI)

evidence that cli- mate change could decrease the net freshwater input to groundwater resources [Feseker in Bangladesh, threatening to physically displ

Clement, Prabhakar

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Development of real time non-intrusive load monitor for shipboard fluid systems  

E-Print Network (OSTI)

Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

Branch, Perry L. (Perry Lamar)

2008-01-01T23:59:59.000Z

382

A comprehensive system for non-intrusive load monitoring and diagnostics  

E-Print Network (OSTI)

Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

Paris, James, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

383

The design of an intrusion security system using digital processing for alarm indication  

E-Print Network (OSTI)

has been noise spikes in the diode. These spikes can easily cause a false alarm which is difficult to trace since it results from a sporadic, elec- tronic malfunction. General Electric, Amperex, and other concerned companies have made a great... is the requirement of multiple triggering of this one threshold. AMF Inc. , Alexandria, Virginia, has recently introduced an intricate signal processor with diode transistor logic and transistor transistor logic integrated circuits to handle intru- sion signals...

Holyoak, Joel Nelson

2012-06-07T23:59:59.000Z

384

Time-and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems Xiulong Liu, Heng Qi, Keqiu Li  

E-Print Network (OSTI)

Time- and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems Xiulong Liu, Heng by reducing more than 90% of the required execution time and energy consumption. I. INTRODUCTION Radio, this is the first piece of work taking both time-efficiency and energy-efficiency into consideration, where

Liu, Alex X.

385

Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend  

E-Print Network (OSTI)

Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

Alvarez, Pedro J.

386

Surface deformation and stress interactions during the 2007–2010 sequence of earthquake, dyke intrusion and eruption in northern Tanzania  

Science Journals Connector (OSTI)

......dyke intrusion and eruption in northern Tanzania Juliet Biggs Michael Chivers Michael...the Lake Natron region of northern Tanzania experienced all of these events within...Nubian and Somalian plates. In northern Tanzania, the spreading rate is 3-4yr1 (Stamps......

Juliet Biggs; Michael Chivers; Michael C. Hutchinson

2013-01-01T23:59:59.000Z

387

9 - Climate Change and Sea Level Rise in the Mekong Delta: Flood, Tidal Inundation, Salinity Intrusion, and Irrigation Adaptation Methods  

Science Journals Connector (OSTI)

The Mekong Delta of Vietnam extends over an extensive, low-lying flat area, with an average elevation of only about 1 m above mean sea level. It is considered the country’s main rice bowl, as it contributes 48% of national food production and more than 85% of annual rice exports. However, the Mekong Delta currently faces a number of challenges, as it is affected by annual floods, drought, and salinity intrusion. In the context of climate change and sea water level rise, these natural problems may become more severe, with inundation and salinity intrusion eventually becoming the norm under severe scenarios of sea level rise. In the future, salinity intrusion is expected to gradually start earlier in the dry season, posing a threat to the sustainable agricultural development of the Mekong Delta and food security in Vietnam. Through an in-depth analysis of different scenarios of sea level rise, this chapter proposes several measures for flood, tidal inundation, and salinity intrusion protection, while considering the sustainable development of the Mekong Delta in the context of climate change.

To Quang Toan

2014-01-01T23:59:59.000Z

388

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT-  

E-Print Network (OSTI)

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT- BEEMERVILLE, and monzonorite of the Cortlandt Complex 446±2Ma. Titanite from the Beemerville nepheline syenite has yielded.D., Aleinikoff, J.N., Amelin, Yuri; Merguerian, Charles; and Panish, P.T., 2012, U-Pb zircon and titanite ages

Merguerian, Charles

389

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 6, NO. 2, JUNE 2005 125 On-Road Vehicle Detection Using Evolutionary  

E-Print Network (OSTI)

speed, and high cost. Moreover, when there is a large number of vehicles moving simultaneously-Road Vehicle Detection Using Evolutionary Gabor Filter Optimization Zehang Sun, Member, IEEE, George Bebis, Member, IEEE, and Ronald Miller Abstract--Robust and reliable vehicle detection from images acquired

Bebis, George

390

Non-intrusive Low-Rank Separated Approximation of High-Dimensional Stochastic Models  

E-Print Network (OSTI)

This work proposes a sampling-based (non-intrusive) approach within the context of low-rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs.

Alireza Doostan; AbdoulAhad Validi; Gianluca Iaccarino

2012-10-04T23:59:59.000Z

391

Enterprise Information Security Management Framework [EISMF  

E-Print Network (OSTI)

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

392

Array for detecting microbes  

DOE Patents (OSTI)

The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

Andersen, Gary L.; DeSantis, Todd D.

2014-07-08T23:59:59.000Z

393

Integrated Assessment Systems for Chemical Warfare Material  

SciTech Connect

The US Army must respond to a variety of situations involving suspect discovered, recovered, stored, and buried chemical warfare materiel (CWM). In some cases, the identity of the fill materiel and the status of the fusing and firing train cannot be visually determined due to aging of the container, or because the item is contained in an over-pack. In these cases, non-intrusive assessments are required to provide information to allow safe handling, storage, and disposal of the materiel. This paper will provide an overview of the integrated mobile and facility-based CWM assessment system prototypes that have been, and are being developed, at the Idaho National Engineering and Environmental Laboratory (INEEL) for the US Army Non-Stockpile Chemical Materiel Project. In addition, this paper will discuss advanced sensors being developed to enhance the capability of the existing and future assessment systems. The Phase I Mobile Munitions Assessment System (MMAS) is currently being used by the Army's Technical Escort Unit (TEU) at Dugway Proving Ground, Utah. This system includes equipment for non-intrusively identifying the munitions fill materiel and for assessing the condition and stability of the fuzes, firing trains, and other potential safety hazards. The system provides a self-contained, integrated command post including an on-board computer system, communications equipment, video and photographic equipment, weather monitoring equipment, and miscellaneous safety-related equipment. The Phase II MMAS is currently being tested and qualified for use by the INEEL and the US Army. The Phase II system contains several new assessment systems that significantly enhance the ability to assess CWM. A facility-based munitions assessment system prototype is being developed for the assessment of CWM stored in igloos at Pine Bluff Arsenal, Arkansas. This system is currently in the design and fabrication stages. Numerous CWM advanced sensors are being developed and tested, and pending successful test results, may be incorporated in the various munitions assessment systems in the future. These systems are intended to enhance CWM fill materiel identification, agent air monitoring, agent or agent degradation product detection by surface analysis, and real-time x-ray capabilities.

A. M. Snyder; D. A. Verrill; G. L. Thinnes; K. D. Watts; R. J. McMorland

1999-05-27T23:59:59.000Z

394

Fault detection and diagnosis of a gearbox in marine propulsion systems using bispectrum analysis and artificial neural networks  

Science Journals Connector (OSTI)

A marine propulsion system is a very complicated system composed ... to the impact of the other components in marine propulsion systems. To monitor the gear conditions, ... fault features of the vibrant signal of...

Zhixiong Li; Xinping Yan; Chengqing Yuan…

2011-03-01T23:59:59.000Z

395

DEVELOPMENT OF AN EMAT IN-LINE INSPECTION SYSTEM FOR DETECTION, DISCRIMINATION, AND GRADING OF STRESS CORROSION CRACKING IN PIPELINES  

SciTech Connect

This report describes prototypes, measurements, and results for a project to develop a prototype pipeline in-line inspection (ILI) tool that uses electromagnetic acoustic transducers (EMATs) to detect and grade stress corrosion cracking (SCC). The introduction briefly provides motivation and describes SCC, gives some background on EMATs and guided ultrasonic waves, and reviews promising results of a previous project using EMATs for SCC. The experimental section then describes lab measurement techniques and equipment, the lab mouse and prototypes for a mule, and scan measurements made on SCC. The mouse was a moveable and compact EMAT setup. The prototypes were even more compact circuits intended to be pulled or used in an ILI tool. The purpose of the measurements was to determine the best modes, transduction, and processing to use, to characterize the transducers, and to prove EMATs and mule components could produce useful results. Next, the results section summarizes the measurements and describes the mouse scans, processing, prototype circuit operating parameters, and performance for SH0 scans. Results are given in terms of specifications--like SNR, power, insertion loss--and parametric curves--such as signal amplitude versus magnetic bias or standoff, reflection or transmission coefficients versus crack depth. Initially, lab results indicated magnetostrictive transducers using both SH0 and SV1 modes would be worthwhile to pursue in a practical ILI system. However, work with mule components showed that SV1 would be too dispersive, so SV1 was abandoned. The results showed that reflection measurements, when normalized by the direct arrival are sensitive to and correlated with SCC. This was not true for transmission measurements. Processing yields a high data reduction, almost 60 to 1, and permits A and C scan display techniques and software already in use for pipeline inspection. An analysis of actual SH0 scan results for SCC of known dimensions showed that length and depth could be determined for deep enough cracks. Defect shadow and short length effects were apparent but may be taken into account. The SH0 scan was done with the mule prototype circuits and permanent magnet EMATs. These gave good enough results that this hardware and the processing techniques are very encouraging for use in a practical ILI tool.

Jeff Aron; Jeff Jia; Bruce Vance; Wen Chang; Raymond Pohler; Jon Gore; Stuart Eaton; Adrian Bowles; Tim Jarman

2005-02-01T23:59:59.000Z

396

Evaluation of an advanced fault detection system using Koeberg nuclear power plant data / H.L. Pelo.  

E-Print Network (OSTI)

??The control and protection system of early nuclear power plants (Generation II) have been designed and built on the then reliable analog system. Technology has… (more)

Pelo, Herbert Leburu

2013-01-01T23:59:59.000Z

397

A Multi-Layer Phoswich Radioxenon Detection System, Reporting Period 07/01/07 - 09/30/07  

SciTech Connect

During this quarter, the detector manufacturer (Saint-Gobain) delivered one side of the prototype two-channel phoswich detector (XEPHWICH). Once received, our Digital Pulse Processor (DPP1, 12-bit/100 MHz) was employed to capture and digitally process phoswich pulses from laboratory radioactive sources. Our previous pulse shape discrimination algorithm was modified by utilizing three trapezoidal digital filters. This algorithm provides a two-dimensional plot in which the pulse shapes of interest are classified and then can be well identified. The preliminary experimental results will be presented at the 2007 Informal Xenon Monitoring Workshop. The DPP2 (two-channel, 12-bit/ 250 MHz Digital Pulse Processor) is at the prototyping stage. The analog sections have been designed, prototyped and tested. A 6-layer Printed Circuit Board (PCB) was designed, ordered and delivered. The board components were ordered and are now being assembled and examined for proper functionality. In addition, the related FPGA hardware description code (using VHDL) is under development and simulation. Additionally, our researchers have been studying materials regarding wavelet transforms for incorporation into the project. Wavelet transform is an interesting tool for signal processing; one use for our purpose would be to de-noise the detector signal and to express the signal in a few coefficients for signal compression and increased speed. Light capture efficiency modeling and analysis was performed on the XEPHWICH design. Increased understanding of the modeling software was obtained by the discovery of a bug and successful workaround techniques with the DETECT2000 software. Further modeling and plot generation experience was had by the continued use of CERN's ROOT and GEANT4 software packages. Simulations have been performed to compare the output of points versus planes in light capture efficiency. An additional simulation was made with a runtime that was an order-of-magnitude greater than previous simulations, to confirm convergence of the solutions provided by our software methods. We have initiated our investigation into the radon signature expected in our XEPHWICH system. We intend to utilize this signature to confirm earth movement, in the event of an underground nuclear explosion, by continuously monitoring radon levels and noting increases in radon concentration in conjunction with increased levels of radioxenons. The research group is also designing and constructing a fission chamber to be used for the collection of radioxenon gases following neutron bombardment of HEU in the Oregon State University TRIGA reactor. To this point, we have completed milling the aluminum housing and have modeled fission product nuclide production associated with the fissioning of HEU. Additionally, the students have been busy compiling the appropriate information in preparation for irradiation approvals. Using beta spectra of three initial nuclides collected on the prototype phoswich detector, spectral identification by a preliminary neural network was compared to that of solvers of a linear system of equations. Pre-processing in areas such as smoothing and endpoint identification is also being investigated as a means of improving spectral identification.

David M. Hamby

2007-10-25T23:59:59.000Z

398

DDS: A deadlock detection-based scheduling algorithm for workflow computations in HPC systems with storage constraints  

Science Journals Connector (OSTI)

Workflow-based workloads usually consist of multiple instances of the same workflow, which are jobs with control or data dependencies, to carry out a well-defined scientific computation task, with each instance acting on its own input data. To maximize ... Keywords: Computational workflow, Concurrency, Deadlock detection, Storage resource constraints, Workflow scheduling

Yang Wang; Paul Lu

2013-08-01T23:59:59.000Z

399

Use of the UNCLE Facility to Assess Integrated Online Monitoring Systems for Detection of Diversions at Uranium Conversion Facilities  

SciTech Connect

Historically, the approach to safeguarding nuclear material in the front end of the fuel cycle was implemented only at the stage when UF6 was declared as feedstock for enrichment plants. Recent International Atomic Energy Agency (IAEA) circulars and policy papers have sought to implement safeguards when any purified aqueous uranium solution or uranium oxides suitable for isotopic enrichment or fuel fabrication exist. Oak Ridge National Laboratory has developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions for a purified uranium-bearing aqueous stream exiting the solvent extraction process conducted in a natural uranium conversion plant (NUCP) operating at 6000 MTU/year. Monitoring instruments, including the 3He passive neutron detector developed at Los Alamos National Laboratory and the Endress+Hauser Promass 83F Coriolis meter, have been tested at UNCLE and field tested at Springfields. The field trials demonstrated the need to perform full-scale equipment testing under controlled conditions prior to field deployment of operations and safeguards monitoring at additional plants. Currently, UNCLE is testing neutron-based monitoring for detection of noncompliant activities; however, gamma-ray source term monitoring is currently being explored complementary to the neutron detector in order to detect undeclared activities in a more timely manner. The preliminary results of gamma-ray source term modeling and monitoring at UNCLE are being analyzed as part of a comprehensive source term and detector benchmarking effort. Based on neutron source term detection capabilities, alternative gamma-based detection and monitoring methods will be proposed to more effectively monitor NUCP operations in verifying or detecting deviations from declared conversion activities.

Dewji, Shaheen A [ORNL; Chapman, Jeffrey Allen [ORNL; Lee, Denise L [ORNL; Rauch, Eric [Los Alamos National Laboratory (LANL); Hertel, Nolan [Georgia Institute of Technology

2011-01-01T23:59:59.000Z

400

Integrated investigation of seawater intrusion around oil storage caverns in a coastal fractured aquifer using hydrogeochemical and isotopic data  

Science Journals Connector (OSTI)

Summary Seawater intrusion can be activated by the construction of underground caverns which act as groundwater sinks near a coastal area. In an environment complicated with such artificial structures, seawater intrusion is not simple and thus needs to be evaluated by means of multiple analytical approaches. This study uses geochemical and isotopic indicators to assess the characteristics of salinized seepage into an underground oil storage cavern in Yeosu, Korea. Cl?/Br? ratios, principal component analysis (PCA) of chemical data, and stable isotope data were used to determine the origin and the extent of salinization. Indications of seawater intrusion into the cavern through fractured bedrocks were observed; however, it was highly probable that another source may have contributed to the observed salinity. The PCA results revealed that the seepage water chemistry was predominantly affected both by seawater mixing and cement material dissolution. The maximum seawater mixing ratio in the seepage water was estimated on the basis of the Cl?–Br? mixing ratio and the Cl?–?18O relation, with the results showing considerable variation ranging from less than 1% to as high as 14%, depending on the cavern location. The spatial variations in the chemical characteristics and in mixing ratios are believed to have resulted from the hydrogeological heterogeneity of the study site, as caused by both fractured aquifer and the cavern facilities.

Jeong-Won Lim; Eunhee Lee; Hee Sun Moon; Kang-Kun Lee

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

402

Expected dose and associated uncertainty and sensitivity analysis results for the human intrusion scenario in the 2008 performance assessment for the proposed high-level radioactive waste repository at Yucca Mountain, Nevada  

Science Journals Connector (OSTI)

Abstract Extensive work has been carried out by the U.S. Department of Energy (DOE) in the development of a proposed geologic repository at Yucca Mountain (YM), Nevada, for the disposal of high-level radioactive waste. In support of this development and an associated license application to the U.S. Nuclear Regulatory Commission (NRC), the DOE completed an extensive performance assessment (PA) for the proposed YM repository in 2008. This presentation describes the determination of expected (mean) dose to the reasonably maximally exposed individual (RMEI) specified in the NRC regulations for the YM repository resulting from an inadvertent drilling intrusion into the repository. The following topics are addressed: (i) assumed properties of an inadvertent drilling intrusion and the determination of the associated dose and expected (mean) dose to the RMEI, (ii) uncertainty and sensitivity analysis results for expected dose to the RMEI, and (iii) the numerical stability of the sampling-based procedure used to estimate expected (mean) dose to the RMEI. The present article is part of a special issue of Reliability Engineering and System Safety devoted to the 2008 YM PA; additional articles in the issue describe other aspects of the 2008 YM PA.

C.W. Hansen; G.A. Behie; K.M. Brooks; Y. Chen; J.C. Helton; S.P. Hommel; K.P. Lee; B. Lester; P.D. Mattie; S. Mehta; S.P. Miller; C.J. Sallaberry; S.D. Sevougian

2014-01-01T23:59:59.000Z

403

FIRST DETECTION OF THE [O III] 88 {mu}m LINE AT HIGH REDSHIFTS: CHARACTERIZING THE STARBURST AND NARROW-LINE REGIONS IN EXTREME LUMINOSITY SYSTEMS  

SciTech Connect

We have made the first detections of the 88 {mu}m [O III] line from galaxies in the early universe, detecting the line from the lensed active galactic nucleus (AGN)/starburst composite systems APM 08279+5255 at z = 3.911 and SMM J02399-0136 at z = 2.8076. The line is exceptionally bright from both systems, with apparent (lensed) luminosities {approx}10{sup 11} L {sub sun}. For APM 08279, the [O III] line flux can be modeled in a star formation paradigm, with the stellar radiation field dominated by stars with effective temperatures, T {sub eff} > 36,000 K, similar to the starburst found in M82. The model implies {approx}35% of the total far-IR luminosity of the system is generated by the starburst, with the remainder arising from dust heated by the AGN. The 88 {mu}m line can also be generated in the narrow-line region of the AGN if gas densities are around a few 1000 cm{sup -3}. For SMM J02399, the [O III] line likely arises from H II regions formed by hot (T {sub eff} > 40,000 K) young stars in a massive starburst that dominates the far-IR luminosity of the system. The present work demonstrates the utility of the [O III] line for characterizing starbursts and AGN within galaxies in the early universe. These are the first detections of this astrophysically important line from galaxies beyond a redshift of 0.05.

Ferkinhoff, C.; Hailey-Dunsheath, S.; Nikola, T.; Parshley, S. C.; Stacey, G. J. [Department of Astronomy, Cornell University, Ithaca, NY 14853 (United States); Benford, D. J.; Staguhn, J. G., E-mail: cferkinh@astro.cornell.ed, E-mail: steve@mpe.mpg.d [Observational Cosmology Laboratory (Code 665), NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States)

2010-05-01T23:59:59.000Z

404

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

405

A New Method for Detecting the Time-Varying Nonlinear Damping in Nonlinear Oscillation Systems: Nonparametric Identification  

E-Print Network (OSTI)

This paper presents an original method that can be used for identifying time-varying nonlinear damping characteristics of a nonlinear oscillation system. The method developed involves the nonparametric identification, in ...

Jang, T. S.

406

Computed dental radiography system versus conventional dental X-ray films for detection of simulated proximal caries  

Science Journals Connector (OSTI)

The diagnostic accuracy of intraoral images obtained with a first generation Computed Dental Radiography (CDR) digital dental imaging system is compared with the diagnostic accuracy of conventional dental x-ra...

Mamoru Wakoh D.D.S.; Ph.D.; Hiromi Kitagawa D.D.S.; Ph.D.…

1997-12-01T23:59:59.000Z

407

Using Satellite Fire Detection to Calibrate Components of the Fire Weather Index System in Malaysia and Indonesia  

Science Journals Connector (OSTI)

Vegetation fires have become an increasing problem in tropical environments as a consequence of socioeconomic pressures and subsequent land-use change. In response, fire management systems are being developed. Th...

Caren C. Dymond; Robert D. Field; Orbita Roswintiarti; Guswanto

2005-04-01T23:59:59.000Z

408

450 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 2, FEBRUARY 2013 A Novel Noninvasive Failure-Detection System  

E-Print Network (OSTI)

industry, the reliability of the high-power drive is criti- cal. Having a noninvasive system capable and consequences of the failure in the cycloconverter. Index Terms--Diagnostics, drive, fault tolerance, industrial ap- plication, reliability. I. INTRODUCTION IN THE LAST few decades, the field of high-power drives

Catholic University of Chile (Universidad Católica de Chile)

409

Comparison of PCR- and Hybrid Capture-Based Human Papillomavirus Detection Systems Using Multiple Cervical Specimen Collection Strategies  

Science Journals Connector (OSTI)

...population-based natural history study of cervical neoplasia...abnormalities: a follow up study. . Hildesheim A. Schiffman...fluid-based, thin-layer system for cervical cancer screening...abnormalities. . Peyton C. L. Wheeler C. M. Identification...validity of cytologic study, cervicography, and...

C. L. Peyton; M. Schiffman; A. T. Lörincz; W. C. Hunt; I. Mielzynska; C. Bratti; S. Eaton; A. Hildesheim; L. A. Morera; A. C. Rodriguez; R. Herrero; M. E. Sherman; C. M. Wheeler

1998-11-01T23:59:59.000Z

410

SMARTx: An Embedded Proximity Detection System for Reducing Collisions CS400: Individual Studies in Computer Science -SMARTx: Software and  

E-Print Network (OSTI)

such as the Arduino. Along another student, we developed a working prototype system that can be used to alert drivers aware and avoid a collision. Our project utilizes Arduino microcontrollers, GPS modules, Bluetooth of an Arduino, a GPS module, and nR905 radio. The Arduino obtains location from the GPS module and broadcasts

Zhuang, Yu

411

A Model of the Lateral Geniculate Complex of the Turtle Visual System: Noise Suppression and Target Motion Detection  

E-Print Network (OSTI)

A Model of the Lateral Geniculate Complex of the Turtle Visual System: Noise Suppression and Target . . . . . . . . . . . . . . . 16 2.4.1 Modeling the Retina of Freshwater Turtles . . . . . . . . . 17 2.4.2 A Freshwater Turtle Visual Cortex Model . . . . . . . . . . 21 2.4.3 Investigating the Turtle Lateral Geniculate Complex

Ghosh, Bijoy K.

412

Vibration based damage detection of rotor blades in a gas turbine engine  

Science Journals Connector (OSTI)

Abstract This paper describes the problems concerning turbine rotor blade vibration that seriously impact the structural integrity of a developmental aero gas turbine. Experimental determination of vibration characteristics of rotor blades in an engine is very important from fatigue failure considerations. The blades under investigation are fabricated from nickel base super alloy through directionally solidified investment casting process. The blade surfaces are coated with platinum aluminide for oxidation protection. A three dimensional finite element modal analysis on a bladed disk was performed to know the likely blade resonances for a particular design in the speed range of operation. Experiments were conducted to assess vibration characteristics of bladed disk rotor during engine tests. Rotor blade vibrations were measured using non-intrusive stress measurement system, an indirect method of blade vibration measurement utilizing blade tip timing technique. Abnormalities observed in the vibration characteristics of the blade tip timing data measured during engine tests were used to detect the blade damage. Upon disassembly of the engine and subsequent fluorescent penetrant inspection, it was observed that three blades of the rotor assembly were identified to have damaged. These are the blades that exhibited vibration abnormalities as a result of large resonant vibration response while engine tests. Further, fractographic analysis performed on the blades revealed the mechanism of blade failures as fatigue related. The root cause of blade failure is established to be high cycle fatigue from the engine run data history although the blades were put into service for just 6 h of engine operation.

S. Madhavan; Rajeev Jain; C. Sujatha; A.S. Sekhar

2014-01-01T23:59:59.000Z

413

Trainable Pedestrian Detection Constantine Papageorgiou Tomaso Poggio  

E-Print Network (OSTI)

of the system that has been integrated into a DaimlerChrysler test vehicle. 1 Introduction The robust detection detection systems are critical to the success of next­generation automotive vision systems. An important criteria is that the detection system be easily con­ figurable to a new domain or environment

Poggio, Tomaso

414

An adaptive incremental approach to constructing ensemble classifiers: Application in an information-theoretic computer-aided decision system for detection of masses in mammograms  

SciTech Connect

Ensemble classifiers have been shown efficient in multiple applications. In this article, the authors explore the effectiveness of ensemble classifiers in a case-based computer-aided diagnosis system for detection of masses in mammograms. They evaluate two general ways of constructing subclassifiers by resampling of the available development dataset: Random division and random selection. Furthermore, they discuss the problem of selecting the ensemble size and propose two adaptive incremental techniques that automatically select the size for the problem at hand. All the techniques are evaluated with respect to a previously proposed information-theoretic CAD system (IT-CAD). The experimental results show that the examined ensemble techniques provide a statistically significant improvement (AUC=0.905{+-}0.024) in performance as compared to the original IT-CAD system (AUC=0.865{+-}0.029). Some of the techniques allow for a notable reduction in the total number of examples stored in the case base (to 1.3% of the original size), which, in turn, results in lower storage requirements and a shorter response time of the system. Among the methods examined in this article, the two proposed adaptive techniques are by far the most effective for this purpose. Furthermore, the authors provide some discussion and guidance for choosing the ensemble parameters.

Mazurowski, Maciej A.; Zurada, Jacek M.; Tourassi, Georgia D. [Department of Radiology, Carl E. Ravin Advanced Imaging Laboratories, Duke University Medical Center, Durham, North Carolina 27705 (United States); Department of Electrical and Computer Engineering, Computational Intelligence Laboratory, University of Louisville, Louisville, Kentucky 40292 (United States); Department of Radiology, Carl E. Ravin Advanced Imaging Laboratories, Duke University Medical Center, Durham, North Carolina 27705 (United States)

2009-07-15T23:59:59.000Z

415

E-SMART system for in-situ detection of environmental contaminants. Quarterly technical progress report, October--December 1996  

SciTech Connect

General Atomics (GA) leads a team of industrial, academic, and government organizations in the development of the Environmental Systems Management, Analysis and Reporting neTwork (E-SMART) for the Defense Advanced Research Project Agency (DARPA), by way of this Technology Reinvestment Project (TRP). E-SMART defines a standard by which networks of smart sensing, sampling, and control devices can interoperate. E-SMART is intended to be an open standard, available to any equipment manufacturer. The user will be provided a standard platform on which a site-specific monitoring plan can be implemented using sensors and actuators from various manufacturers and upgraded as new monitoring devices become commercially available. This project will further develop and advance the E-SMART standardized network protocol to include new sensors, sampling systems, and graphical user interfaces.

NONE

1997-01-01T23:59:59.000Z

416

1158 IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 14, NO. 6, NOVEMBER 2006 Nonlinear Fault Detection and Isolation in a Three-Tank Heating System  

E-Print Network (OSTI)

leakages in blast furnace processes [6], industrial gas turbines [7], and heat exchangers [8]. For systems in detail the modeling procedure, the synthesis of residual generators, and the design of a combinatorial in the generation of diagnostic signals (residuals) triggered by a devi- ation of the plant from the expected

De Luca, Alessandro

417

Spacial Distribution of Salinity and the Mechanism of Saltwater Intrusion in the Modaomen Water Channel of Pear River Estuary  

Science Journals Connector (OSTI)

Modaomen channel is an important fresh water resource in Pearl River Delta. It has been impacted by saltwater intrusion frequently in the last decade. This has drawn more and more attention from scientists and engineers. The hydrodynamic mechanism of saltwater intrusion is still impercipient. In the present paper hydrographs of velocity and salinity in the channel are analyzed based on field observations of velocity and salinity of upper middle and lower water layers at several stations along the Modaomen channel. It is found that the transport of salinity in Modaomen channel is obviously different from other estuaries. As the tidal range increases from neap to spring tide the salinity in each water layer decreases unexpectedly. This peculiar phenomenon is attributed to the extraordinary flow process in the channel. When salinity value in each layer and vertical salinity gradient are lower during spring tide no matter on rising or ebbing tide the flow velocity monotonously decreases from water surface to the bottom which is suggested by common sense. However when salinity values and vertical salinity gradient are higher during neap tide the flow velocity unexpectedly increases from water surface to the bottom during flood period and flood duration of the bottom current is surprisingly as long as 15?18 hours. In addition an inflexional velocity profile may remain amazingly for about 9 hours. This could be driven by the baroclinic pressure under the condition of tides topography and upstream runoff discharge of this channel.

J. B. Liu; Y. Bao

2011-01-01T23:59:59.000Z

418

E-Print Network 3.0 - automated cellular imaging Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Ko Summary: and appreciated the value of automated intrusion detection. The cellular fraud problem is well understood and put... Attacks on Cellular Systems Hai-Ping Ko GTE...

419

Cyber - Protection for utilities ... | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber - Protection for utilities ... Hackers hoping to disrupt the power grid, water or natural gas service may be foiled by an intrusion detection system developed by researchers...

420

Mobile Information Systems 6 (2010) 6583 65 DOI 10.3233/MIS-2010-0093  

E-Print Network (OSTI)

, The University of Aizu, Fukushima 965-8580, Japan cSchool of Information Science, Korean Bible University, 16-demand basic network services, e.g. packet classification and forwarding, as well as intrusion detection providing flexibility and programmability. It is a new breed of packet forwarding engine that is designed

Guo, Minyi

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Host-Based Anomaly Intrusion 13.1 Background Material . . . . . . . . . . . . . . . . . . . . . 236  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . . . . . 236 13.1.1 Basics of Computer Operating Systems 236 13.1.2 Basics of Networking) operating systems and networking systems, which are needed to understand computer and computer network will introduce the basics of computer operating systems, the basics of networking, and the basic concepts

Hu, Jiankun

422

Detection threshold  

Science Journals Connector (OSTI)

Detection threshold or recognition differential is defined as the signal?to?noise ratio at the beamformer output required for detection. An introduction to this topic is provided in Uricks’ Principles of Underwater Sound. The subject is frequently a source of confusion due to the multiple possible definitions of signal?to?noise ratio the effects of nonlinearities in the signal processing and the overall complexity of the sonar operators job of signal recognition in real?world clutter. In this paper a review of the basic theory of mathematical relationships are provided followed by a discussion of practical limitations in applying simple formulas to performance predictions. The relationships of detection threshold to the signal?processing approach and background?noise statistics are discussed. Active sonars in both noise and reverberation as well as passive sonars involving energy detection spectral analysis and cross correlators are discussed.

Henry Cox

1999-01-01T23:59:59.000Z

423

An algorithm for rule selection on fuzzy rule-based systems applied to the treatment of diabetics and detection of fraud in electronic  

E-Print Network (OSTI)

and detection of fraud in electronic payment F. Benmakrouha, C. Hespel, E. Monnier Abstract--Recently, many produced for every person, and an insulin file shared by several persons. · the problem of detecting fraud

Paris-Sud XI, Université de

424

An experimental investigation of the sensitivity of a buried fiber optic intrusion sensor  

E-Print Network (OSTI)

A distributed fiber optic sensor with the ability of detecting and locating intruders on foot and vehicles over long perimeters (>10 km) was studied. The response of the sensor to people walking over or near it and to vehicles driving nearby...

Kuppuswamy, Harini

2006-04-12T23:59:59.000Z

425

Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa, Alysson N. Bessani, Wagner S. Dantas, Fabio Souto, Miguel Correia, Nuno F. Neves  

E-Print Network (OSTI)

}@lasige.di.fc.ul.pt, {mpc, nuno}@di.fc.ul.pt Abstract Critical infrastructures like the power grid are essen- tially different resilience requirements. 1. Introduction Critical infrastructures (CI) like the power grid are esIntrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection Paulo Sousa

Correia, Miguel

426

Analysis of a Priority Retrial Queue with Dependent Vacation Scheme and Application to Power Saving in Wireless Communication Systems  

Science Journals Connector (OSTI)

......intrusion, and detection of fire, gas, movement, etc. Moreover...mode mechanism utilizes the natural idle periods of the traffic...mode mechanism utilizes the natural idle period of the traffic...ISCIS 2009), METU, North Cyprus Campus, September 1416, pp......

Ioannis Dimitriou

2013-11-01T23:59:59.000Z

427

A graph-based system for network-vulnerability analysis  

SciTech Connect

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

428

Concepts and applications of wireless security systems for tactical, portable, and fixed sites  

SciTech Connect

Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

Harrington, J.J.

1997-06-01T23:59:59.000Z

429

Fingerprint detection  

DOE Patents (OSTI)

A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

1992-01-01T23:59:59.000Z

430

Detection device  

DOE Patents (OSTI)

The present invention is directed to a detection device comprising: (1) an entrance chamber, (2) a central chamber, and (3) an exit chamber. The central chamber includes an ionizing gas, anode, and means for connecting the anode with an external power supply and pulse counter.

Smith, Jay E. (Pittsburgh, PA)

1984-01-01T23:59:59.000Z

431

Strongly Incremental Repair Detection Julian Hough  

E-Print Network (OSTI)

Strongly Incremental Repair Detection Julian Hough Dialogue Systems Group Faculty of Linguistics.purver@qmul.ac.uk Abstract We present STIR (STrongly Incremen- tal Repair detection), a system that de- tects speech repairs-theoretic measures from n-gram models as its principal decision features in a pipeline of classifiers detecting

Purver, Matthew

432

Relating to ion detection  

DOE Patents (OSTI)

The apparatus and method provide a technique for improving detection of alpha and/or beta emitting sources on items or in locations using indirect means. The emission forms generate ions in a medium surrounding the item or location and the medium is then moved to a detecting location where the ions are discharged to give a measure of the emission levels. To increase the level of ions generated and render the system particularly applicable for narrow pipes and other forms of conduits, the medium pressure is increased above atmospheric pressure. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Orr, Christopher Henry (Calderbridge, GB); Luff, Craig Janson (Calderbridge, GB); Dockray, Thomas (Calderbridge, GB); Macarthur, Duncan Whittemore (Los Alamos, NM)

2001-01-01T23:59:59.000Z

433

Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon  

E-Print Network (OSTI)

the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site­customizable threat analyzer that ranks vulnerabilities according to the site security pref

Vernon, Mary K.

434

Foundations for Intrusion Prevention Shai Rubin, Ian D. Alderman, David W. Parter, and Mary K. Vernon  

E-Print Network (OSTI)

the vulnerability on every system host, estimates the vulnerability threat with respect to the site security develop a site-customizable threat analyzer that ranks vulnerabilities according to the site security

Liblit, Ben

435

784 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART C: APPLICATIONS AND REVIEWS, VOL. 36, NO. 6, NOVEMBER 2006 Improving Weapon Detection in Single Energy  

E-Print Network (OSTI)

, NO. 6, NOVEMBER 2006 Improving Weapon Detection in Single Energy X-Ray Images Through Pseudocoloring, particularly hard to see low-density weapons in luggage. Considerations of the psychological and physiological performing color schemes. Rate improvements in weapon detection of up to 97% were achieved through the use

Abidi, Mongi A.

436

radiation detection  

National Nuclear Security Administration (NNSA)

for the system's sustainability through operations and maintenance training, and "train-the-trainer" activities.

NNSA's SLD program works to strengthen the capabilities...

437

Passive Neutron Detection at Borders  

SciTech Connect

Radiation portal monitor systems have been deployed to screen for illicit trafficking of radioactive materials at international border crossings. This report reviews some of the neutron detection requirements and capabilities of passive detection systems used for such applications. Simulations show the effects of cargo materials on neutron spectra, different detector geometries, using a large-array of neutron detectors, and the effects of backgrounds including “ship effect” neutrons.

Kouzes, Richard T.; Siciliano, Edward R.; Ely, James H.; Keller, Paul E.; McConn, Ronald J.

2008-03-01T23:59:59.000Z

438

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless  

E-Print Network (OSTI)

the tradeoff between energy consumption vs. the gain in reliability, timeliness, and security to maximize to prolong the system useful lifetime. The tradeoff between energy consumption vs. reliability gain-mail: {hhamadi, irchen}@vt.edu). (CHs) and sensor nodes (SNs) leveraging CH election protocols such as HEED [1

Chen, Ing-Ray

439

Capturing magma intrusion and faulting processes during continental rupture: Seismicity of the Dabbahu (Afar) rift  

Science Journals Connector (OSTI)

......SH-wave polarities using the grid search algorithm FOCMEC (Snoke...SH-waves were not tolerated in the grid search algorithm. We determined...Fig. 4). Impulsive and hybrid earthquakes cluster along the...Gundmundsson A. , 1995. Infrastructure and mechanics of volcanic systems......

C. J. Ebinger; D. Keir; A. Ayele; E. Calais; T. J. Wright; M. Belachew; J. O. S. Hammond; E. Campbell; W. R. Buck

2008-09-01T23:59:59.000Z

440

Predicting and Detecting Emerging Cyberattack Patterns Using StreamWorks  

SciTech Connect

The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network. Such cyberattack graphs could provide cybersecurity analysts with powerful conceptual representations that are natural to express and analyze. We have been researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection. The advanced dynamic graph algorithms we are developing will be packaged into a streaming network analysis framework known as StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns. The scalable emerging subgraph pattern algorithms will match on both structural and semantic network properties.

Chin, George; Choudhury, Sutanay; Feo, John T.; Holder, Larry

2014-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Considerations Related To Human Intrusion In The Context Of Disposal Of Radioactive Waste-The IAEA HIDRA Project  

SciTech Connect

The principal approaches for management of radioactive waste are commonly termed ‘delay and decay’, ‘concentrate and contain’ and ‘dilute and disperse’. Containing the waste and isolating it from the human environment, by burying it, is considered to increase safety and is generally accepted as the preferred approach for managing radioactive waste. However, this approach results in concentrated sources of radioactive waste contained in one location, which can pose hazards should the facility be disrupted by human action in the future. The International Commission on Radiological Protection (ICRP), International Atomic Energy Agency (IAEA), and Organization for Economic Cooperation and Development/Nuclear Energy Agency (OECD/NEA) agree that some form of inadvertent human intrusion (HI) needs to be considered to address the potential consequences in the case of loss of institutional control and loss of memory of the disposal facility. Requirements are reflected in national regulations governing radioactive waste disposal. However, in practice, these requirements are often different from country to country, which is then reflected in the actual implementation of HI as part of a safety case. The IAEA project on HI in the context of Disposal of RadioActive waste (HIDRA) has been started to identify potential areas for improved consistency in consideration of HI. The expected outcome is to provide recommendations on how to address human actions in the safety case in the future, and how the safety case may be used to demonstrate robustness and optimize siting, design and waste acceptance criteria within the context of a safety case.

Seitz, Roger; Kumano, Yumiko; Bailey, Lucy; Markley, Chris; Andersson, Eva; Beuth, Thomas

2014-01-09T23:59:59.000Z

442

International Journal of Network Security, Vol.1, No.2, PP.84102, Sep. 2005 (http://isrc.nchu.edu.tw/ijns/) 84 Research on Intrusion Detection and Response  

E-Print Network (OSTI)

Introduction In the past two decades with the rapid progress in the Internet based technology, new application the network an attractive target for the abuse and a big vulnerability for the community. A fun to do job research areas, IDS is a young field of research. However, due to its mis- sion critical nature, it has

Ghorbani, Ali

443

Detection of structural degradation  

SciTech Connect

A time domain method developed for determining dynamic system characteristics is applied to structural monitoring and/or flaw detection. The potential usefulness for monitoring is evaluated based on several criteria, which include sensitivity to structural changes, location of flaws, and dependence upon excitation signals. The strengths and weaknesses of the methods are discussed. Also, structural monitoring using a signal's singular values is presented and evaluated. 2 refs., 4 figs., 2 tabs.

Endebrock, E.G.

1991-01-01T23:59:59.000Z

444

Evaluating impacts of CO2 gas intrusion into a confined sandstone aquifer: Experimental results  

SciTech Connect

Deep subsurface storage and sequestration of CO2 has been identified as a potential mitigation technique for rising atmospheric CO2 concentrations. Sequestered CO2 represents a potential risk to overlying aquifers if the CO2 leaks from the deep storage reservoir. Experimental and modeling work is required to evaluate potential risks to groundwater quality and develop a systematic understanding of how CO2 leakage may cause important changes in aquifer chemistry and mineralogy by promoting dissolution/precipitation, adsorption/desorption, and redox reactions. Sediments from the High Plains aquifer in Kansas, United States, were used in this investigation, which is part of the National Risk Assessment Partnership Program sponsored by the US Department of Energy. This aquifer was selected to be representative of consolidated sand and gravel/sandstone aquifers overlying potential CO2 sequestration repositories within the continental US. In this paper, we present results from batch experiments conducted at room temperature and atmospheric pressure with four High Plains aquifer sediments. Batch experiments simulate sudden, fast, and short-lived releases of the CO2 gas as would occur in the case of well failure during injection. Time-dependent release of major, minor, and trace elements were determined by analyzing the contacting solutions. Characterization studies demonstrated that the High Plains aquifer sediments were abundant in quartz and feldspars, and contained about 15 to 20 wt% montmorillonite and up to 5 wt% micas. Some of the High Plains aquifer sediments contained no calcite, while others had up to about 7 wt% calcite. The strong acid extraction tests confirmed that in addition to the usual elements present in most soils, rocks, and sediments, the High Plains aquifer sediments had appreciable amounts of As, Cd, Pb, Cu, and occasionally Zn, which potentially may be mobilized from the solid to the aqueous phase during or after exposure to CO2. However, the results from the batch experiments showed that the High Plains sediments mobilized only low concentrations of trace elements (potential contaminants), which were detected occasionally in the aqueous phase during these experiments. Importantly, these occurrences were more frequent in the calcite-free sediment. Results from these investigations provide useful information to support site selection, risk assessment, and public education efforts associated with geological CO2 storage and sequestration.

Qafoku, Nikolla; Lawter, Amanda R.; Shao, Hongbo; Wang, Guohui; Brown, Christopher F.

2014-12-31T23:59:59.000Z

445

Communication error detection using facial expressions  

E-Print Network (OSTI)

Automatic detection of communication errors in conversational systems typically rely only on acoustic cues. However, perceptual studies have indicated that speakers do exhibit visual communication error cues passively ...

Wang, Sy Bor, 1976-

2008-01-01T23:59:59.000Z

446

Traffic Light Mapping and Detection Nathaniel Fairfield Chris Urmson  

E-Print Network (OSTI)

-assistance and autonomous vehicle systems. While these systems can often employ active sensors such as sonar, radar of these augmented vehicles is the perception system, which allows the vehicle to perceive and interpret its that are detected by our system. way to detect the state of the light, which may include detecting which sub

Tomkins, Andrew

447

ISS Fact Sheet.cdr  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security System (ISS) Security System (ISS) Integrated Security System (ISS) A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Cyber Security for Energy Delivery Systems Electricity Delivery & Energy Reliability Project Lead: Siemens Corporate Research Partners: Rutgers University Idaho National Laboratory The Concept The Integrated Security System (ISS) is a security platform that provides multi- layered security features and intrusion detection at the field device, network, and control system levels. The ISS operates as part of the security layer that

448

Dike intrusions into bituminous coal, Illinois Basin: H, C, N, O isotopic responses to rapid and brief heating  

Science Journals Connector (OSTI)

Unlike long-term heating in subsiding sedimentary basins, the near-instantaneous thermal maturation of sedimentary organic matter near magmatic intrusions is comparable to artificial thermal maturation in the laboratory in terms of short duration and limited extent. This study investigates chemical and H, C, N, O isotopic changes in high volatile bituminous coal near two Illinois dike contacts and compares observed patterns and trends with data from other published studies and from artificial maturation experiments. Our study pioneers in quantifying isotopically exchangeable hydrogen and measuring the D/H (i.e., 2H/1H) ratio of isotopically non-exchangeable organic hydrogen in kerogen near magmatic contacts. Thermal stress in coal caused a reduction of isotopically exchangeable hydrogen in kerogen from 5% to 6% in unaltered coal to 2–3% at contacts, mostly due to elimination of functional groups (e.g., OH, COOH, NH2). In contrast to all previously published data on D/H in thermally matured organic matter, the more mature kerogen near the two dike contacts is D-depleted, which is attributed to (i) thermal elimination of D-enriched functional groups, and (ii) thermal drying of hydrologically isolated coal prior to the onset of cracking reactions, thereby precluding D-transfer from relatively D-enriched water into kerogen. Maxima in organic nitrogen concentration and in the atomic N/C ratio of kerogen at a distance of ?2.5 to ?3.5 m from the thicker dike indicate that reactive N-compounds had been pyrolytically liberated at high temperature closer to the contact, migrated through the coal seam, and recombined with coal kerogen in a zone of lower temperature. The same principle extends to organic carbon, because a strong ?13Ckerogen vs. ?15Nkerogen correlation across 5.5 m of coal adjacent to the thicker dike indicates that coal was functioning as a flow-through reactor along a dynamic thermal gradient facilitating back-reactions between mobile pyrolysis products from the hot zone as they encounter less hot kerogen. Vein and cell filling carbonate is most abundant in highest rank coals where carbonate ?13CVPDB and ?18OVSMOW values are consistent with thermal generation of 13C-depleted and 18O-enriched CO2 from decarboxylation and pyrolysis of organic matter. Lower background concentrations of 13C-enriched carbonate in thermally unaffected coal may be linked to 13C-enrichment in residual CO2 in the process of CO2 reduction via microbial methanogenesis. Our compilation and comparison of available organic H, C, N isotopic findings on magmatic intrusions result in re-assessments of majors factors influencing isotopic shifts in kerogen during magmatic heating. (i) Thermally induced shifts in organic ?D values of kerogen are primarily driven by the availability of water or steam. Hydrologic isolation (e.g., near Illinois dikes) results in organic D-depletion in kerogen, whereas more common hydrologic connectivity results in organic D-enrichment. (ii) Shifts in kerogen (or coal) ?13C and ?15N values are typically small and may follow sinusoidal patterns over short distances from magmatic contacts. Laterally limited sampling strategies may thus result in misleading and non-representative data. (iii) Fluid transport of chemically active, mobile carbon and nitrogen species and recombination reactions with kerogen result in isotopic changes in kerogen that are unrelated to the original, autochthonous part of kerogen.

Arndt Schimmelmann; Maria Mastalerz; Ling Gao; Peter E. Sauer; Katarina Topalov

2009-01-01T23:59:59.000Z

449

856 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART C: APPLICATIONS AND REVIEWS, VOL. 38, NO. 6, NOVEMBER 2008 Designing Effective Alarms for Radiation Detection  

E-Print Network (OSTI)

to the occurrence of nuisance alarms based on naturally occurring radioactive material and the low base rate of nu Naturally occurring radioactive material. p(false alarm) Probability of a false alarm. p(hit) Probability, NO. 6, NOVEMBER 2008 Designing Effective Alarms for Radiation Detection in Homeland Security

Parasuraman, Raja

450

Optimization of a Sampling System for Recovery and Detection of Airborne Porcine Reproductive and Respiratory Syndrome Virus and Swine Influenza Virus  

Science Journals Connector (OSTI)

...treatments on total viral recovery. Although this simple...the freezing point. A review of the literature found...standard methods for the recovery and detection of specific...Check-Off dollars through the National Pork Board. We are grateful to...

J. R. Hermann; S. J. Hoff; K. J. Yoon; A. C. Burkhardt; R. B. Evans; J. J. Zimmerman

2006-07-01T23:59:59.000Z

451

Obstacle Detection from IPM and Super-Homography Nicolas SIMOND  

E-Print Network (OSTI)

Detection, obstacle avoidance, etc. The obstacle detection systems can be divided into different groups according to the types of obstacle the system detects, the ranges, the refresh rate, the reliability or not of road markers. In [1], where an exhaustive recent review of the vehicle detection is presented, all

Paris-Sud XI, Université de

452

Radar Vehicle Detection Within Four Quadrant Gate Crossings  

E-Print Network (OSTI)

Vehicle Detection System for Four-Quadrant Gate Warning Systems and Blocked Crossing Detection. Washington. . . . . Radar Vehicle Detection Within Four Quadrant Gate Crossings Dylan Horne 2014 Global Level and delay but ultimately in loss of life. Radar Vehicle Detection Within Four Quadrant Gate Crossings #12

Illinois at Urbana-Champaign, University of

453

Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industry’s Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

2014-03-24T23:59:59.000Z

454

Dynamic detection of nuclear reactor core incident  

Science Journals Connector (OSTI)

Surveillance, safety and security of evolving systems are a challenge to prevent accident. The dynamic detection of a hypothetical and theoretical blockage incident in the Phenix nuclear reactor is investigated. Such an incident is characterized by abnormal ... Keywords: Contrast, Dynamic detection of perturbations, Evolving system, Fast-neutron reactor, Neighbourhood, Noise

Laurent Hartert; Danielle Nuzillard; Jean-Philippe Jeannot

2013-02-01T23:59:59.000Z

455

Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis  

Science Journals Connector (OSTI)

To solve the contradiction between the trend of more distributed network architecture and the demanding for more centralized correlated analysis to detect more complicated attacks from Intrusion Detection System ...

Jia Wang; Insup Lee

2001-01-01T23:59:59.000Z

456

Nucleic acid detection methods  

DOE Patents (OSTI)

The invention relates to methods for rapidly determining the sequence and/or length a target sequence. The target sequence may be a series of known or unknown repeat sequences which are hybridized to an array of probes. The hybridized array is digested with a single-strand nuclease and free 3{prime}-hydroxyl groups extended with a nucleic acid polymerase. Nuclease cleaved heteroduplexes can be easily distinguish from nuclease uncleaved heteroduplexes by differential labeling. Probes and target can be differentially labeled with detectable labels. Matched target can be detected by cleaving resulting loops from the hybridized target and creating free 3-hydroxyl groups. These groups are recognized and extended by polymerases added into the reaction system which also adds or releases one label into solution. Analysis of the resulting products using either solid phase or solution. These methods can be used to detect characteristic nucleic acid sequences, to determine target sequence and to screen for genetic defects and disorders. Assays can be conducted on solid surfaces allowing for multiple reactions to be conducted in parallel and, if desired, automated. 18 figs.

Smith, C.L.; Yaar, R.; Szafranski, P.; Cantor, C.R.

1998-05-19T23:59:59.000Z

457

On using Extreme Values to detect global stability thresholds in multi-stable systems: The case of transitional plane Couette flow  

E-Print Network (OSTI)

Extreme Value Theory (EVT) is exploited to determine the global stability threshold $R_g$ of plane Couette flow --the flow of a viscous fluid in the space between two parallel plates-- whose laminar or turbulent behavior depends on the Reynolds number R. Even if the existence of a global stability threshold has been detected in simulations and experiments, its numerical value has not been unequivocally defined. $R_g$ is the value such that for $R > R_g$ turbulence is sustained, whereas for $R energy fluctuations. When $R_g$, both the positive and negative extremes are bounded. As the critical Reynolds number is approached from above, the probability of observing a very low minimum increases causing asymmetries in the distributions of maxima and minima. On the other hand, the maxima distribution is unaffected as the fluctuations towards higher values of the perturbation energy remain bounded. This tipping point can be detected by fitting the data to the Generalized Extreme Value (GEV) distribution and by identifying $R_g$ as the value of $R$ such that the shape parameter of the GEV for the minima changes sign from negative to positive. The results are supported by the analysis of theoretical models which feature a bistable behavior.

Davide Faranda; Valerio Lucarini; Paul Manneville; Jeroen Wouters

2014-03-21T23:59:59.000Z

458

Online Vehicle Detection For Estimating Traffic Status  

E-Print Network (OSTI)

We propose a traffic congestion estimation system based on unsupervised on-line learning algorithm. The system does not rely on background extraction or motion detection. It extracts local features inside detection regions of variable size which are drawn on lanes in advance. The extracted features are then clustered into two classes using K-means and Gaussian Mixture Models(GMM). A Bayes classifier is used to detect vehicles according to the previous cluster information which keeps updated whenever system is running by on-line EM algorithm. Experimental result shows that our system can be adapted to various traffic scenes for estimating traffic status.

Lai, Ranch Y Q

2011-01-01T23:59:59.000Z

459

secondary ion detection | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

ion detection secondary ion detection Leads No leads are available at this time. Magnesium behavior and structural defects in Mg+ ion implanted silicon carbide. Abstract: As a...

460

Bad bag detection systems installed on the COHPAC (Compact Hybrid Particulate Collector) at Alabama Power, E.C. Gaston Unit No.3  

SciTech Connect

In December of 1996, Alabama Power Company, a subsidiary of the Southern Company, began operating a baghouse in conjunction with an existing hot-side precipitator on the cold side of the air heaters. The concept combining an electrostatic precipitator and a baghouse is termed a COHPAC (Compact Hybrid Particulate Collector), an EPRI technology. The baghouse is installed on Unit No.3 which is a 280 Mwe pulverized coal fired unit. Unit No.3 shares a common stack with Unit No.4, so the baghouse treats 50% of the total stack flow. The installation has resulted in the ability of both boilers to operate without costly boiler load reductions, which were quite common prior to the installation of the COHPAC system because of stack capacity. To date, after nearly three years of operation the COHPAC system has meet and exceeded all performance expectations. The installation has consistently provided low outlet emissions (<0.01 lb/Mbtu) and low opacity levels. To date, there have not been any known bag failures and maintenance has been minimal. Testing has shown bag life to be finite but no data has been compiled on this type system showing the operating window that would ensure optimal performance. Mullen Burst tests have shown degradation in bag strength, which indicates that this degradation at some point could result in premature failure of the bags. The COHPAC system installed at E.G., Gaston includes over 2,000 bags corresponding to roughly 57,500 ft{sup 2} of collecting surface area. Current methods of finding damaged bags are quite laborious and time intensive. A system to monitor performance and locating damaged bags will be presented. Associated performance and overall historical operating data on Unit No.3 will also be presented.

Berry, M.S.; Harrison, W.; Corina, B.; Wilson, R.; Harrington, J.

1999-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Leak detection on an ethylene pipeline  

SciTech Connect

A model-based leak detection system has been in operation on the Solvay et Cie ethylene pipeline from Antwerp to Jemeppe on Sambre since 1989. The leak detection system, which is the commercial product PLDS of Modisette Associations, Inc., was originally installed by the supplier. Since 1991, all system maintenance and configuration changes have been done by Solvay et Cie personnel. Many leak tests have been performed, and adjustments have been made in the configuration and the automatic tuning parameters. The leak detection system is currently able to detect leaks of 2 tonnes/hour in 11 minutes with accurate location. Larger leaks are detected in about 2 minutes. Leaks between 0.5 and 1 tonne per hour are detected after several hours. (The nominal mass flow in the pipeline is 15 tonnes/hour, with large fluctuations.) Leaks smaller than 0.5 tonnes per hour are not detected, with the alarm thresholds set at levels to avoid false alarms. The major inaccuracies of the leak detection system appear to be associated with the ethylene temperatures.

Hamande, A.; Condacse, V.; Modisette, J.

1995-12-31T23:59:59.000Z

462

Summary of Natural Resources that Potentially Influence Human Intrusion at the Area 5 Radioactive Waste Management Site, Nevada Test Site, Nye County, Nevada  

SciTech Connect

In 1993, Raytheon Services Nevada completed a review of natural resource literature and other sources to identify potentially exploitable resources and potential future land uses near the Area 5 Radioactive Waste Management Site (RWMS) of the Nevada Test Site (NTS), Nye County, Nevada, that could lead to future inadvertent human intrusion and subsequent release of radionuclides to the accessible environment. National Security Technologies, LLC, revised the original limited-distribution document to conform to current editorial standards and U.S. Department of Energy requirements for public release. The researchers examined the potential for future development of sand, gravel, mineral, petroleum, water resources, and rural land uses, such as agriculture, grazing, and hunting. The study was part of the performance assessment for Greater Confinement Disposal boreholes. Sand and gravel are not considered exploitable site resources because the materials are common throughout the area and the quality at the Area 5 RWMS is not ideal for typical commercial uses. Site information also indicates a very low mineral potential for the area. None of the 23 mining districts in southern Nye County report occurrences of economic mineral deposits in unconsolidated alluvium. The potential for oil and natural gas is low for southern Nye County. No occurrences of coal, tar sand, or oil shale on the NTS are reported in available literature. Several potential future uses of water were considered. Agricultural irrigation is impractical due to poor soils and existing water supply regulations. Use of water for geothermal energy development is unlikely because temperatures are too low for typical commercial applications using current technology. Human consumption of water has the most potential for cause of intrusion. The economics of future water needs may create a demand for the development of deep carbonate aquifers in the region. However, the Area 5 RWMS is not an optimal location for extraction of groundwater from the deep carbonate aquifer. Grazing and hunting are unlikely to be potential causes for inadvertent human intrusion into waste areas because of vegetation characteristics and lack of significant game animal populations.

NSTec Environmental Management

2007-06-01T23:59:59.000Z

463

Colorimetric detection of uranium in water  

DOE Patents (OSTI)

Disclosed are methods, materials and systems that can be used to determine qualitatively or quantitatively the level of uranium contamination in water samples. Beneficially, disclosed systems are relatively simple and cost-effective. For example, disclosed systems can be utilized by consumers having little or no training in chemical analysis techniques. Methods generally include a concentration step and a complexation step. Uranium concentration can be carried out according to an extraction chromatographic process and complexation can chemically bind uranium with a detectable substance such that the formed substance is visually detectable. Methods can detect uranium contamination down to levels even below the MCL as established by the EPA.

DeVol, Timothy A. (Clemson, SC); Hixon, Amy E. (Piedmont, SC); DiPrete, David P. (Evans, GA)

2012-03-13T23:59:59.000Z

464

Cellular telephone-based radiation detection instrument  

DOE Patents (OSTI)

A network of radiation detection instruments, each having a small solid state radiation sensor module integrated into a cellular phone for providing radiation detection data and analysis directly to a user. The sensor module includes a solid-state crystal bonded to an ASIC readout providing a low cost, low power, light weight compact instrument to detect and measure radiation energies in the local ambient radiation field. In particular, the photon energy, time of event, and location of the detection instrument at the time of detection is recorded for real time transmission to a central data collection/analysis system. The collected data from the entire network of radiation detection instruments are combined by intelligent correlation/analysis algorithms which map the background radiation and detect, identify and track radiation anomalies in the region.

Craig, William W. (Pittsburg, CA); Labov, Simon E. (Berkeley, CA)

2011-06-14T23:59:59.000Z

465

Strongly Incremental Repair Detection Julian Hough1,2  

E-Print Network (OSTI)

in a pipeline of classifiers detecting the the different stages of repairs. Results on the Switchboard disStrongly Incremental Repair Detection Julian Hough1,2 1 Dialogue Systems Group Faculty of London m.purver@qmul.ac.uk Abstract We present STIR (STrongly Incremen- tal Repair detection), a system

Purver, Matthew

466

DAVID B. KNOESTER Email: dave.knoester@gmail.com  

E-Print Network (OSTI)

hardware and software system components, in both vehicle and laboratory environments. Controller Developmental Learning for Network Intrusion Detection Michigan State University, East Lansing, Michigan · B Laboratory & Software Engineering and Network Systems Lab Michigan State University, East Lansing, Michigan

467

Advancing Explosives Detection Capabilities: Vapor Detection  

ScienceCinema (OSTI)

A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

Atkinson, David

2014-07-24T23:59:59.000Z

468

Detecting Fraud in Cellular Telephone Networks  

E-Print Network (OSTI)

Detecting Fraud in Cellular Telephone Networks Johan H van Heerden Thesis presented for the degree fraud. Hence it is of great importance that fraud management sys- tems are implemented to detect, alarm, and shut down fraud within minutes, minimising revenue loss. Modern proprietary fraud management systems

van Vuuren, Jan H.

469

DETECTING COLLUSIVE FRAUD IN ENTERPRISE RESOURCE  

E-Print Network (OSTI)

Chapter 6 DETECTING COLLUSIVE FRAUD IN ENTERPRISE RESOURCE PLANNING SYSTEMS Asadul Islam, Malcolm advances, fraud is becoming increasingly complicated and difficult to detect, especially when individuals collude. Surveys show that the median loss from collusive fraud is much greater than fraud perpetrated

Flegel, Ulrich

470

Reviewing P2P network community detection  

Science Journals Connector (OSTI)

In this paper we present a summary of the state of the art concerning community detection in distributed computer architectures, for instance so-called P2P systems. The main algorithms for the extraction of communities are reviewed. Each set of nodes ... Keywords: P2P, clustering, community detection algorithms, networks

Anna Puig-Centelles; Oscar Ripolles; Miguel Chover

2007-03-01T23:59:59.000Z

471

Data acquisition system  

DOE Patents (OSTI)

A data acquisition circuit for a particle detection system that allows for time tagging of particles detected by the system. The particle detection system screens out background noise and discriminate between hits from scattered and unscattered particles. The detection system can also be adapted to detect a wide variety of particle types. The detection system utilizes a particle detection pixel array, each pixel containing a back-biased PIN diode, and a data acquisition pixel array. Each pixel in the particle detection pixel array is in electrical contact with a pixel in the data acquisition pixel array. In response to a particle hit, the affected PIN diodes generate a current, which is detected by the corresponding data acquisition pixels. This current is integrated to produce a voltage across a capacitor, the voltage being related to the amount of energy deposited in the pixel by the particle. The current is also used to trigger a read of the pixel hit by the particle.

Shapiro, Stephen L. (14228 Amherst Ct., Los Altos Hills, CA 94022); Mani, Sudhindra (1618 17th St., Sacramento, CA 95814); Atlas, Eugene L. (440 De Anza Ct., Oceanside, CA 92057); Cords, Dieter H. W. (526 Cuesta Real, La Honda, CA 94020); Holbrook, Britt (4540 Varsity Ct., Sacramento, CA 95841)

1997-01-01T23:59:59.000Z

472

Evaluating an experimental setup for pipe leak detection  

E-Print Network (OSTI)

An experimental setup with 4 inch inner diameter PVC pipe modules is designed to mimic a real life piping system in which to test possible leak detection mechanisms. A model leak detection mechanism is developed which ...

Garay, Luis I. (Luis Ignacio)

2010-01-01T23:59:59.000Z

473

Revolution in Detection Affairs  

SciTech Connect

The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.

Stern W.

2013-11-02T23:59:59.000Z

474

ION GNSS 2004, Sept. 21-24, Long Beach, CA Automated Traffic Incident Detection with GPS  

E-Print Network (OSTI)

in Intelligent Transportation Systems (ITS) and in-vehicle telematics systems. ABSTRACT Traffic congestion can. Traffic Incident Detection Systems (IDS) use a variety of technologies to detect incidents so system for traffic incident detection. The system performance analysis was conducted using a combination

Calgary, University of

475

Synthetic, Cyclic Voltammetric, Structural, EPR, and UV?Vis Spectroscopic Studies of Thienyl-Containing meso-A2B-cor(CrV?O) Systems: Consideration of Three Interrelated Molecular Detection Modalities  

Science Journals Connector (OSTI)

Synthetic, Cyclic Voltammetric, Structural, EPR, and UV?Vis Spectroscopic Studies of Thienyl-Containing meso-A2B-cor(CrV?O) Systems: Consideration of Three Interrelated Molecular Detection Modalities ... In the case of metal complexes, there are two one-electron reversible redox processes: a ligand-based oxidation corresponding to the corrole/corrole ?-radical cation (ligand/ligand•+) couple and a metal-based reduction corresponding to the metaln/metaln?1 couple. ... The material properties are, in the case of corrole, confined to the single mol., while in the case of sapphyrin, a build-up process seems to take place, so that many monolayers are necessary to establish the bulk material properties. ...

Olga A. Egorova; Olga G. Tsay; Snehadrinarayan Khatua; Bhupal Meka; Nilkamal Maiti; Min-Kyu Kim; Seong Jung Kwon; Jung Oh Huh; Daniela Bucella; Sa-Ouk Kang; Juhyoun Kwak; David G. Churchill

2009-12-17T23:59:59.000Z

476

Computer Science Department Technical Report  

E-Print Network (OSTI)

existing distributed intrusion detection systems (DIDS) rely on centralized fusion, or distributed fusion symptoms) will be routed to the same sensor fusion center (SFC) while evenly distributing unrelated alarms characteristics of three common types of intrusions: DoS attacks, port scanning and virus/worm infection; and 2

Shahriar, Selim

477

Observer-based fault detection for nuclear reactors  

E-Print Network (OSTI)

This is a study of fault detection for nuclear reactor systems. Basic concepts are derived from fundamental theories on system observers. Different types of fault- actuator fault, sensor fault, and system dynamics fault ...

Li, Qing, 1972-

2001-01-01T23:59:59.000Z

478

Radionuclide detection devices and associated methods  

DOE Patents (OSTI)

Radionuclide detection devices comprise a fluid cell comprising a flow channel for a fluid stream. A radionuclide collector is positioned within the flow channel and configured to concentrate one or more radionuclides from the fluid stream onto at least a portion of the radionuclide collector. A scintillator for generating scintillation pulses responsive to an occurrence of a decay event is positioned proximate at least a portion of the radionuclide collector and adjacent to a detection system for detecting the scintillation pulses. Methods of selectively detecting a radionuclide are also provided.

Mann, Nicholas R. (Rigby, ID); Lister, Tedd E. (Idaho Falls, ID); Tranter, Troy J. (Idaho Falls, ID)

2011-03-08T23:59:59.000Z

479

A Multi-Layer Phoswich Radioxenon Detection System (7th Qtr Report), Reporting Period 10/01/07 - 12/31/07  

SciTech Connect

Description of activities conducted this report period: (1) Electronics Development--To improve the overall performance of the two-channel digital pulse processor (DPP2), the PCB has been redesigned and the new printed board is now under assembly. The system is enhanced with two new fast ADCs from Analog Devices (AD9230-250), each with a sampling rate of 250 MHz and a resolution of 12 bits. The data bus uses a high performance Low Voltage Differential Signaling (LVDS) standard. The offset and gain of each channel are separately controlled digitally by the GUI software. (2) GUI Software Development--A GUI is being developed using the Python programming language. All functions from the preceding MATLAB code have been re-implemented including basic waveform readout, pulse shape discrimination, and plotting of energy spectra. In addition, the GUI can be used to control sampling runs based on the number of pulses captured, either in real or live time. Calibration coefficients and pulse shape discrimination boundaries can be changed on the fly so that the detector may be characterized experimentally. Plots generated by the GUI can be exported as graphic data. At present, the software has only been tested using one channel, pending availability of the new DPP board (DPP2). However, the functions have been written to allow easy expansion to two channels. (3) Light Collection Modeling--The XEPHWICH design has been modeled to determine its light capture efficiency. Research in the 7th quarter includes additional simulations representing significant increase in data resolution, well over an order of magnitude greater than previous simulations. The final data set represents approximately 11 billion visible photons divided equally among 110 thousand data points. A laboratory experiment is being designed and executed to experimentally determine light capture efficiency as a function of position within the scintillators. (4) Radioxenon Fission Source--We have designed and constructed a fission chamber to be used for the collection of radioxenon gases following neutron bombardment of HEU in the Oregon State University TRIGA reactor. The aluminum housing and all vacuum fittings have been assembled, awaiting an HEU transfer from PNNL. Students have worked closely with PNNL and OSU Radiation Safety personnel to facilitate transfer of the HEU. The OSU TRIGA Reactor Operations Committee has approved the experiment. (5) Spectral (beta) Recognition--Spectral identification by a neural network developed in our laboratory was compared to that of solvers of a linear system of equations. Data indicate that our neural network is capable of identifying three beta emission sources ({sup 14}C, {sup 36}Cl, and {sup 99}Tc) simultaneously with reliability to within 3%.

David M. Hamby

2008-01-29T23:59:59.000Z

480

Single-Molecule Detection  

Science Journals Connector (OSTI)

Detection of single molecules represents the ultimate level of sensitivity and ... background, fluorescence is one obvious choice for single-molecule detection (SMD). However, SMD using ... first report on SMD us...

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Spot test kit for explosives detection  

DOE Patents (OSTI)

An explosion tester system comprising a body, a lateral flow membrane swab unit adapted to be removeably connected to the body, a first explosives detecting reagent, a first reagent holder and dispenser operatively connected to the body, the first reagent holder and dispenser containing the first explosives detecting reagent and positioned to deliver the first explosives detecting reagent to the lateral flow membrane swab unit when the lateral flow membrane swab unit is connected to the body, a second explosives detecting reagent, and a second reagent holder and dispenser operatively connected to the body, the second reagent holder and dispenser containing the second explosives detecting reagent and positioned to deliver the second explosives detecting reagent to the lateral flow membrane swab unit when the lateral flow membrane swab unit is connected to the body.

Pagoria, Philip F; Whipple, Richard E; Nunes, Peter J; Eckels, Joel Del; Reynolds, John G; Miles, Robin R; Chiarappa-Zucca, Marina L

2014-03-11T23:59:59.000Z

482

Detection of a concealed object  

DOE Patents (OSTI)

Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

Keller, Paul E. (Richland, WA); Hall, Thomas E. (Kennewick, WA); McMakin, Douglas L. (Richland, WA)

2008-04-29T23:59:59.000Z

483

A method of detecting contamination events using multiple conventional water quality sensors  

Science Journals Connector (OSTI)

Early warning systems are often used for detecting contamination accidents. Traditional event detection methods suffer from high false negative and false positive errors. This paper proposes a detection method...

Shuming Liu; Han Che; Kate Smith; Chao Chen

2014-12-01T23:59:59.000Z

484

Research Project on CO2 Geological Storage and Groundwater Resources: Water Quality Effects Caused by CO2 Intrusion into Shallow Groundwater  

SciTech Connect

One promising approach to reduce greenhouse gas emissions is injecting CO{sub 2} into suitable geologic formations, typically depleted oil/gas reservoirs or saline formations at depth larger than 800 m. Proper site selection and management of CO{sub 2} storage projects will ensure that the risks to human health and the environment are low. However, a risk remains that CO{sub 2} could migrate from a deep storage formation, e.g. via local high-permeability pathways such as permeable faults or degraded wells, and arrive in shallow groundwater resources. The ingress of CO{sub 2} is by itself not typically a concern to the water quality of an underground source of drinking water (USDW), but it will change the geochemical conditions in the aquifer and will cause secondary effects mainly induced by changes in pH, in particular the mobilization of hazardous inorganic constituents present in the aquifer minerals. Identification and assessment of these potential effects is necessary to analyze risks associated with geologic sequestration of CO{sub 2}. This report describes a systematic evaluation of the possible water quality changes in response to CO{sub 2} intrusion into aquifers currently used as sources of potable water in the United States. Our goal was to develop a general understanding of the potential vulnerability of United States potable groundwater resources in the event of CO{sub 2} leakage. This goal was achieved in two main tasks, the first to develop a comprehensive geochemical model representing typical conditions in many freshwater aquifers (Section 3), the second to conduct a systematic reactive-transport modeling study to quantify the effect of CO{sub 2} intrusion into shallow aquifers (Section 4). Via reactive-transport modeling, the amount of hazardous constituents potentially mobilized by the ingress of CO{sub 2} was determined, the fate and migration of these constituents in the groundwater was predicted, and the likelihood that drinking water standards might be exceeded was evaluated. A variety of scenarios and aquifer conditions was considered in a sensitivity evaluation. The scenarios and conditions simulated in Section 4, in particular those describing the geochemistry and mineralogy of potable aquifers, were selected based on the comprehensive geochemical model developed in Section 3.

Birkholzer, Jens; Apps, John; Zheng, Liange; Zhang, Yingqi; Xu, Tianfu; Tsang, Chin-Fu

2008-10-01T23:59:59.000Z

485

Object detection with a multistatic array using singular value decomposition  

DOE Patents (OSTI)

A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across a surface and that travels down the surface. The detection system converts the return signals from a time domain to a frequency domain, resulting in frequency return signals. The detection system then performs a singular value decomposition for each frequency to identify singular values for each frequency. The detection system then detects the presence of a subsurface object based on a comparison of the identified singular values to expected singular values when no subsurface object is present.

Hallquist, Aaron T.; Chambers, David H.

2014-07-01T23:59:59.000Z

486

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 7, JULY 2006 2019 Monocular Precrash Vehicle Detection  

E-Print Network (OSTI)

results, we have developed an on-board real-time monoc- ular vehicle detection system that is capable--Robust and reliable vehicle detection from images ac- quired by a moving vehicle (i.e., on-road vehicle detection-view vehicle detection. Specifically, by treating the problem of vehicle detection as a two

Bebis, George

487

Centre for Telematics and Information Technology CTIT PROGRESS REPORT 2008-2009  

E-Print Network (OSTI)

Recovery at runtime 26 n Intrusion detection systems at high speeds 28 n Saving energy using virtual power plants 30 n Ranking the pages better 32 n VIDI grants for Djoerd Hiemstra and Peter-Paul Verbeek 34

Al Hanbali, Ahmad

488

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

489

Think Detection. Think Prevention.  

E-Print Network (OSTI)

Think Detection. Think Prevention. Think Activity. Office Ergonomics: #12;The Case of Mr. Z Mr. Z..........................................................................................7 Think Prevention. Ergonomics .............................................................11 What is office ergonomics?................................................................11 Making Your

Calgary, University of

490

EMSL - secondary ion detection  

NLE Websites -- All DOE Office Websites (Extended Search)

secondary-ion-detection en Magnesium behavior and structural defects in Mg+ ion implanted silicon carbide. http:www.emsl.pnl.govemslwebpublicationsmagnesium-behavior-and-struc...

491

Non-Intrusive Load Identification for Smart Outlets Sean Barker, Mohamed Musthag, David Irwin, and Prashant Shenoy  

E-Print Network (OSTI)

recent advances in energy-efficiency, residential and commercial buildings continue to be responsible buildings," which dynamically regulate energy usage to optimize their energy-efficiency, e.g., by responding, including its energy usage and occupancy informa