Powered by Deep Web Technologies
Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Interior intrusion detection systems  

SciTech Connect (OSTI)

The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

1991-10-01T23:59:59.000Z

2

Rapid deployment intrusion detection system  

SciTech Connect (OSTI)

A rapidly deployable security system is one that provides intrusion detection, assessment, communications, and annunciation capabilities; is easy to install and configure; can be rapidly deployed, and is reusable. A rapidly deployable intrusion detection system (RADIDS) has many potential applications within the DOE Complex: back-up protection for failed zones in a perimeter intrusion detection and assessment system, intrusion detection and assessment capabilities in temporary locations, protection of assets during Complex reconfiguration, and protection in hazardous locations, protection of assets during Complex reconfiguration, and protection in hazardous locations. Many DOE user-need documents have indicated an interest in a rapidly deployable intrusion detection system. The purpose of the RADIDS project is to design, develop, and implement such a system. 2 figs.

Graham, R.H.

1997-08-01T23:59:59.000Z

3

A system for distributed intrusion detection  

SciTech Connect (OSTI)

The study of providing security in computer networks is a rapidly growing area of interest because the network is the medium over which most attacks or intrusions on computer systems are launched. One approach to solving this problem is the intrusion-detection concept, whose basic premise is that not only abandoning the existing and huge infrastructure of possibly-insecure computer and network systems is impossible, but also replacing them by totally-secure systems may not be feasible or cost effective. Previous work on intrusion-detection systems were performed on stand-alone hosts and on a broadcast local area network (LAN) environment. The focus of our present research is to extend our network intrusion-detection concept from the LAN environment to arbitarily wider areas with the network topology being arbitrary as well. The generalized distributed environment is heterogeneous, i.e., the network nodes can be hosts or servers from different vendors, or some of them could be LAN managers, like our previous work, a network security monitor (NSM), as well. The proposed architecture for this distributed intrusion-detection system consists of the following components: a host manager in each host; a LAN manager for monitoring each LAN in the system; and a central manager which is placed at a single secure location and which receives reports from various host and LAN managers to process these reports, correlate them, and detect intrusions. 11 refs., 2 figs.

Snapp, S.R.; Brentano, J.; Dias, G.V.; Goan, T.L.; Heberlein, L.T.; Ho, Che-Lin; Levitt, K.N.; Mukherjee, B. (California Univ., Davis, CA (USA). Div. of Computer Science); Grance, T. (Air Force Cryptologic Support Center, San Antonio, TX (USA)); Mansur, D.L.; Pon, K.L. (Lawrence Livermore National Lab., CA (USA)); Smaha, S.E. (Haystack Labs., Inc., Austin, TX (USA))

1991-01-01T23:59:59.000Z

4

Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System  

E-Print Network [OSTI]

1 Traffic Analysis: From Stateful Firewall to Network Intrusion Detection System Fanglu Guo Tzi normalization. Index Terms Packet (traffic) analysis, stateful firewall, network intrusion detection system intrusion detection system (NIDS). Stateful firewall analyzes packets up to their layer 4 headers while NIDS

Chiueh, Tzi-cker

5

The architecture of a network level intrusion detection system  

SciTech Connect (OSTI)

This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

1990-08-15T23:59:59.000Z

6

NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System  

E-Print Network [OSTI]

NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

Ezeife, Christie

7

Visual monitoring environments, such as intrusion detection systems, debugging  

E-Print Network [OSTI]

Abstract Visual monitoring environments, such as intrusion detection systems, debugging environments, and feature extraction systems, require that a user familiar with the target domain examine, most in an efficient form. How the users employ the environment and the type and quantity of data will also affect

Erbacher, Robert F.

8

Threshold Verification Technique for Network Intrusion Detection System  

E-Print Network [OSTI]

Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

2009-01-01T23:59:59.000Z

9

IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan  

E-Print Network [OSTI]

IDSaaS: Intrusion Detection System as a Service in Public Clouds Turki Alharkan School of Computing to monitor and protect their virtual existence by implementing their own intrusion detection capabilities along with other security technologies within the cloud fabric. Intrusion Detection as a Service (IDSaa

10

MIDAS, the Mobile Intrusion Detection and Assessment System  

SciTech Connect (OSTI)

MIDAS is a semiautomated passive detection and assessment security system that can be quickly deployed to provide wide-area coverage for a mobile military asset. Designed to be mounted on top of an unguyed telescoping mast, its specially packaged set of 32 infrared sensors spin 360 degrees every two seconds. The unit produces a low resolution infrared image by sampling each sensor more than 16,000 times in a single 360-degree rotation. Drawing from image processing techniques, MIDAS detects vehicular and pedestrian intruders and produces an alarm when an intrusion is detected. Multiple intruders are tracked. MIDAS automatically directs either an assessment camera or a FLIR to one of the tracks. The alerted operator assesses the intruder and initiates a response. Once the operator assesses an intruder, the system continues to track it without generating new alarms. Because the system will track multiple targets and because the assessment system is a separate pan and tilt unit, the detection and tracking system cannot be blind-sided while the operator is assessing a diversionary intrusion. 4 figs.

Arlowe, H.D.; Coleman, D.E.; Williams, J.D.

1990-01-01T23:59:59.000Z

11

Detecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson  

E-Print Network [OSTI]

the design process. With this in mind, researchers have begun to address security issues specific to controlDetecting Intrusion Faults in Remotely Controlled Systems Salvatore Candido and Seth Hutchinson to a remote-controlled system (deemed an "intrusion fault" or "intrusion") despite attempts to conceal

Hutchinson, Seth

12

An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig  

E-Print Network [OSTI]

mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection1 An Efficient Intrusion Detection System Design Thomas Holz, Michael Meier, Hartmut Koenig Mail:{thh,mm,koenig}@informatik.tu-cottbus.de Abstract: Intrusion detection systems have proved

Meier, Michael

13

A Game Theoretic Analysis of Intrusion Detection in Access Control Systems  

E-Print Network [OSTI]

. The security of an access control system is of prime importance and is crucial for a successful operation, decision, and control processes for information security and intrusion detection. Such a mathematicalA Game Theoretic Analysis of Intrusion Detection in Access Control Systems Tansu Alpcan and Tamer

Alpcan, Tansu

14

An evaluation of fiber optic intrusion detection systems in interior applications  

SciTech Connect (OSTI)

This report discusses the testing and evaluation of four commercially available fiber optic intrusion detection systems. The systems were tested under carpet-type matting and in a vaulted ceiling application. This report will focus on nuisance alarm data and intrusion detection results. Tests were conducted in a mobile office building and in a bunker.

Vigil, J.T.

1994-03-01T23:59:59.000Z

15

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network [OSTI]

) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

Peisert, Sean

16

A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11  

SciTech Connect (OSTI)

This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

1991-05-15T23:59:59.000Z

17

A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks  

E-Print Network [OSTI]

A Mobility and Energy-aware Hierarchical Intrusion Detection System for Mobile ad hoc Networks consumption. The proposed architecture adopts and enhances the Mobility and Energy Aware Clustering Algorithm and energy of nodes in the cluster formation in order to improve detection accuracy and re- duce energy

Stavrakakis, Ioannis

18

A Multi-Dimensional approach towards Intrusion Detection System  

E-Print Network [OSTI]

Sanyal School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India detection. Network and system usage parameters like source and destination IP addresses; source of abnormality in the system usage with respect to that dimension. This mature function is referred

Sanyal, Sugata

19

Functional requirements with survey results for integrated intrusion detection and access control annunciator systems  

SciTech Connect (OSTI)

This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

Arakaki, L.H.; Monaco, F.M.

1995-09-01T23:59:59.000Z

20

Intrusion Detection Techniques in Sensor Aikaterini Mitrokotsa  

E-Print Network [OSTI]

to the network administrator because communication between the access point and the clients is broadcastPDF PROOF Intrusion Detection Techniques in Sensor Networks Aikaterini Mitrokotsa Department Research has been conducted in wired network Intrusion Detection Systems (IDS) for over 25 years. Although

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)  

SciTech Connect (OSTI)

Current Intrusion Detection System (IDS) technology is not suited to be widely deployed inside a Supervisory, Control and Data Acquisition (SCADA) environment. Anomaly- and signature-based IDS technologies have developed methods to cover information technology-based networks activity and protocols effectively. However, these IDS technologies do not include the fine protocol granularity required to ensure network security inside an environment with weak protocols lacking authentication and encryption. By implementing a more specific and more intelligent packet inspection mechanism, tailored traffic flow analysis, and unique packet tampering detection, IDS technology developed specifically for SCADA environments can be deployed with confidence in detecting malicious activity.

Jared Verba; Michael Milvich

2008-05-01T23:59:59.000Z

22

Intrusion Detection in Realtime Database Systems Via Time Signatures*  

E-Print Network [OSTI]

as ``normal'' transactions, and compare the ability of different numerically quantifiable measures to capture. Introduction In a real­time database system, transactions often have timing constraints. Transactions must meet their timing constraints, often expressed as deadlines, in order to be correct and useful. In stock market

Son, Sang H.

23

Intrusion detection sensor testing tools  

SciTech Connect (OSTI)

Intrusion detection sensors must be frequently tested to verify that they are operational, and they must be periodically tested to verify that they are functioning at required performance levels. Concerns involving this testing can include: The significant amount of manpower required, inconsistent results due to variability in methods and personnel, exposure of personnel to hazardous environments, and difficulty in obtaining access to the areas containing some of the intrusion sensors. To address these concerns, the Department of Energy directed Sandia National Labs. to develop intrusion detection sensor testing tools. Over the past two years Sandia has developed several sensor testing tool prototypes. This paper describes the evolution of an exterior intrusion detection sensor tester and automatic data logger, and also describes various interior intrusion detection sensor test fixtures that can be remotely activated to simulate an intruder.

Hayward, D.R.

1994-08-01T23:59:59.000Z

24

Intrusion detection in mobile ad hoc networks  

E-Print Network [OSTI]

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

25

HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System  

SciTech Connect (OSTI)

Identifying traffic anomalies and attacks rapidly and accurately is critical for large network operators. With the rapid growth of network bandwidth, such as the next generation DOE UltraScience Network, and fast emergence of new attacks/virus/worms, existing network intrusion detection systems (IDS) are insufficient because they: • Are mostly host-based and not scalable to high-performance networks; • Are mostly signature-based and unable to adaptively recognize flow-level unknown attacks; • Cannot differentiate malicious events from the unintentional anomalies. To address these challenges, we proposed and developed a new paradigm called high-performance network anomaly/intrustion detection and mitigation (HPNAIDM) system. The new paradigm is significantly different from existing IDSes with the following features (research thrusts). • Online traffic recording and analysis on high-speed networks; • Online adaptive flow-level anomaly/intrusion detection and mitigation; • Integrated approach for false positive reduction. Our research prototype and evaluation demonstrate that the HPNAIDM system is highly effective and economically feasible. Beyond satisfying the pre-set goals, we even exceed that significantly (see more details in the next section). Overall, our project harvested 23 publications (2 book chapters, 6 journal papers and 15 peer-reviewed conference/workshop papers). Besides, we built a website for technique dissemination, which hosts two system prototype release to the research community. We also filed a patent application and developed strong international and domestic collaborations which span both academia and industry.

Chen, Yan [Northwesten University] [Northwesten University

2013-12-05T23:59:59.000Z

26

Advanced technologies for perimeter intrusion detection sensors  

SciTech Connect (OSTI)

The development of integrated circuit fabrication techniques and the resulting devices have contributed more to the advancement of exterior intrusion detectors and alarm assessment devices than any other technology. The availability of this technology has led to the improvements in and further development of smaller more powerful computers, microprocessors, solid state memories, solid state cameras, thermal imagers, low-power lasers, and shorter pulse width and higher frequency electronic circuitry. This paper presents information on planning a perimeter intrusion detection system, identifies the site characteristics that affect its performance, and describes improvements to perimeter intrusion detection sensors and assessment devices that have been achieved by using integrated circuit technology.

Williams, J.D.

1995-03-01T23:59:59.000Z

27

Autonomous Rule Creation for Intrusion Detection  

SciTech Connect (OSTI)

Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

Todd Vollmer; Jim Alves-Foss; Milos Manic

2011-04-01T23:59:59.000Z

28

AIDE - Advanced Intrusion Detection Environment  

SciTech Connect (OSTI)

Would you like to know when someone has dropped an undesirable executable binary on our system? What about something less malicious such as a software installation by a user? What about the user who decides to install a newer version of mod_perl or PHP on your web server without letting you know beforehand? Or even something as simple as when an undocumented config file change is made by another member of the admin group? Do you even want to know about all the changes that happen on a daily basis on your server? The purpose of an intrusion detection system (IDS) is to detect unauthorized, possibly malicious activity. The purpose of a host-based IDS, or file integrity checker, is check for unauthorized changes to key system files, binaries, libraries, and directories on the system. AIDE is an Open Source file and directory integrity checker. AIDE will let you know when a file or directory has been added, deleted, modified. It is included with the Red Hat Enterprise 6. It is available for other Linux distros. This is a case study describing the process of configuring AIDE on an out of the box RHEL6 installation. Its goal is to illustrate the thinking and the process by which a useful AIDE configuration is built.

Smith, Cathy L.

2013-04-28T23:59:59.000Z

29

adaptive intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

30

acquisition intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Next Page Last Page Topic Index 1 Security Intrusion & Detection Security Intrusion Computer Technologies and Information Sciences Websites Summary: intrusions, log suspicious...

31

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

32

A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1  

E-Print Network [OSTI]

A Hardware Platform for Network Intrusion Detection and Prevention Chris Clark1 , Wenke Lee2, athomas}@cc.gatech.edu Abstract The current generation of centralized network intrusion detection systems that intrusion detection analysis should be distributed to network node IDS (NNIDS) running in hardware

Lee, Wenke

33

Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems  

E-Print Network [OSTI]

Security protocols against cyber attacks in the distributioncyber security weak- ness and system fragility of power distribution

Parvania, Masood; Koutsandria, Georgia; Muthukumar, Vishak; Peisert, Sean; McParland, Chuck; Scaglione, Anna

2014-01-01T23:59:59.000Z

34

Intrusion Detection via Static Analysis David Wagner  

E-Print Network [OSTI]

Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

Wagner, David

35

E-Print Network 3.0 - anomaly-based intrusion detection Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and future anomaly-based intrusion detection systems. 1... arsenal, and the focus of this work, is the ... Source: Maxion, Roy - School of Computer Science, Carnegie Mellon...

36

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT  

E-Print Network [OSTI]

MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

Noel, Steven

37

Cybersecurity testing and intrusion detection for cyber-physical power systems.  

E-Print Network [OSTI]

?? Power systems will increasingly rely on synchrophasor systems for reliable and high-performance wide area monitoring and control (WAMC). Synchrophasor systems greatly use information communication… (more)

Pan, Shengyi

2014-01-01T23:59:59.000Z

38

Non-intrusive fault detection in reciprocating compressors  

E-Print Network [OSTI]

This thesis presents a set of techniques for non-intrusive sensing and fault detection in reciprocating compressors driven by induction motors. The procedures developed here are "non-intrusive" because they rely only on ...

Schantz, Christopher James

2011-01-01T23:59:59.000Z

39

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

40

Time-Based Intrusion Detection in Cyber-Physical Systems Christopher Zimmer, Balasubramany Bhat, Frank Mueller  

E-Print Network [OSTI]

determined prior to the schedulability analysis. We demonstrate how to provide micro-timings for multiple granularity levels of application code. Through bounds checking of these micro-timings, we develop techniques) to highly critical ones (anti-lock brakes, hydro-electric dam controls and flight control systems

Mueller, Frank

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Distributed fiber optic moisture intrusion sensing system  

DOE Patents [OSTI]

Method and system for monitoring and identifying moisture intrusion in soil such as is contained in landfills housing radioactive and/or hazardous waste. The invention utilizes the principle that moist or wet soil has a higher thermal conductance than dry soil. The invention employs optical time delay reflectometry in connection with a distributed temperature sensing system together with heating means in order to identify discrete areas within a volume of soil wherein temperature is lower. According to the invention an optical element and, optionally, a heating element may be included in a cable or other similar structure and arranged in a serpentine fashion within a volume of soil to achieve efficient temperature detection across a large area or three dimensional volume of soil. Remediation, moisture countermeasures, or other responsive action may then be coordinated based on the assumption that cooler regions within a soil volume may signal moisture intrusion where those regions are located.

Weiss, Jonathan D. (Albuquerque, NM)

2003-06-24T23:59:59.000Z

42

automated intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CLASS FILES, VOL. 1, NO. 11, NOVEMBER 2002 1 Hi-DRA: Intrusion Detection for Internet Security Computer Technologies and Information Sciences Websites Summary: for Internet...

43

Bloom Filter Based Intrusion Detection for Smart Grid  

E-Print Network [OSTI]

This thesis addresses the problem of local intrusion detection for SCADA (Supervisory Control and Data Acquisition) field devices in the smart grid. A methodology is proposed to detect anomalies in the communication patterns using a combination of n...

Parthasarathy, Saranya

2012-07-16T23:59:59.000Z

44

Challenges and Solutions for Intrusion Detection in Wireless Mesh Networks  

E-Print Network [OSTI]

The problem of intrusion detection in wireless mesh networks (WMN) is challenging, primarily because of lack of single vantage points where traffic can be analyzed and the limited resources available to participating nodes. Although the problem has...

Hassanzadeh, Amin

2014-05-03T23:59:59.000Z

45

29.01.03. M1.11 Information Resources Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

includes, but is not limited to, all information resources management personnel, owners, and system29.01.03. M1.11 Information Resources ­ Intrusion Detection Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.11 Information Resources ­ Intrusion Detection Approved July 18, 2005 Revised April 27

46

Minimally intrusive strategies for fault detection and energy monitoring  

E-Print Network [OSTI]

This thesis addresses the need for automated monitoring systems that rely on minimally intrusive sensor arrays. The monitoring techniques employed in this thesis require fewer sensors because they take a different approach ...

Cox, Robert Williams, 1979-

2006-01-01T23:59:59.000Z

47

HoBIDS: A Data Mining Approach to Host Based Intrusion Detection  

E-Print Network [OSTI]

HoBIDS: A Data Mining Approach to Host Based Intrusion Detection Department of Computer Science of a host based IDS built on a data mining framework. This framework allows the system to detect both known and lightweight sensor system with the capabilities of sophisticated data-mining techniques to build a powerful

Hershkop, Shlomo

48

Energy Efficient Intrusion Detection in Camera Sensor Networks  

E-Print Network [OSTI]

Energy Efficient Intrusion Detection in Camera Sensor Networks Primoz Skraba1 and Leonidas Guibas2 1 Department of Electrical Engineering Stanford University, Stanford, CA 94305 primoz@stanford.edu 2 such paths is intractable, since there is generally an infinite number of potential paths. Using a geometric

Guibas, Leonidas J.

49

Detection and diagnosis of faults and energy monitoring of HVAC systems with least-intrusive power analysis  

E-Print Network [OSTI]

Faults indicate degradation or sudden failure of equipment in a system. Widely existing in heating, ventilating, and air conditioning (HVAC) systems, faults always lead to inefficient energy consumption, undesirable indoor ...

Luo, Dong, 1966-

2001-01-01T23:59:59.000Z

50

Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule  

E-Print Network [OSTI]

. Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

Chen, Ing-Ray

51

Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo  

E-Print Network [OSTI]

Data Mining Approaches for Intrusion Detection Wenke Lee Salvatore J. Stolfo Computer Science. The key ideas are to use data mining techniques to discover consistent and useful patterns of system experiments on the sendmail system call data and the network tcpdump data, we demonstrate that we can

Somayaji, Anil

52

Non-intrusive cooling system  

DOE Patents [OSTI]

A readily replaceable heat exchange cooling jacket for applying fluid to a system conduit pipe. The cooling jacket comprises at least two members, separable into upper and lower portions. A chamber is formed between the conduit pipe and cooling jacket once the members are positioned about the pipe. The upper portion includes a fluid spray means positioned above the pipe and the bottom portion includes a fluid removal means. The heat exchange cooling jacket is adaptable with a drain tank, a heat exchanger, a pump and other standard equipment to provide a system for removing heat from a pipe. A method to remove heat from a pipe, includes the steps of enclosing a portion of the pipe with a jacket to form a chamber between an outside surface of the pipe and the cooling jacket; spraying cooling fluid at low pressure from an upper portion of the cooling jacket, allowing the fluid to flow downwardly by gravity along the surface of the pipe toward a bottom portion of the chamber; and removing the fluid at the bottom portion of the chamber.

Morrison, Edward F. (Burnt Hills, NY); Bergman, John W. (Barrington, NH)

2001-05-22T23:59:59.000Z

53

BLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur  

E-Print Network [OSTI]

Terms-- Bloom filter, intrusion detection, smart grid SCADA IDS. 1. INTRODUCTION Supervisory controlBLOOM FILTER BASED INTRUSION DETECTION FOR SMART GRID SCADA Saranya Parthasarathy and Deepa Kundur In this paper, we propose a distributed, light-weight and fast intrusion detection approach suitable

Kundur, Deepa

54

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

55

UCLog: A Unified, Correlated Logging Architecture for Intrusion Detection  

E-Print Network [OSTI]

targets for terrorists and criminals to break-in. Intrusions can compromise the integrity, confidentiality Slammer Worm in less than seven hours the Internet traffic was overloaded to the point that many private]. Similarly, the ReVirt system [16] can record all actions below the level of the virtual machine, allowing

Zhou, Yuanyuan

56

Smart container UWB sensor system for situational awareness of intrusion alarms  

DOE Patents [OSTI]

An in-container monitoring sensor system is based on an UWB radar intrusion detector positioned in a container and having a range gate set to the farthest wall of the container from the detector. Multipath reflections within the container make every point on or in the container appear to be at the range gate, allowing intrusion detection anywhere in the container. The system also includes other sensors to provide false alarm discrimination, and may include other sensors to monitor other parameters, e.g. radiation. The sensor system also includes a control subsystem for controlling system operation. Communications and information extraction capability may also be included. A method of detecting intrusion into a container uses UWB radar, and may also include false alarm discrimination. A secure container has an UWB based monitoring system

Romero, Carlos E.; Haugen, Peter C.; Zumstein, James M.; Leach, Jr., Richard R.; Vigars, Mark L.

2013-06-11T23:59:59.000Z

57

A Data Mining Framework for Building Intrusion Detection Models # Salvatore J. Stolfo  

E-Print Network [OSTI]

A Data Mining Framework for Building Intrusion Detection Models # Wenke Lee Salvatore J. Stolfo Kui. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models each network connection or host ses­ sion, and apply data mining programs to learn rules

Lee, Wenke

58

Real-time processing of a long perimeter fiber optic intrusion system  

E-Print Network [OSTI]

This thesis reports on recent advances made in real-time intruder detection for an intrusion system developed at Texas A&M University that utilizes a phase-sensitive optical time-domain reflectometer. The system uses light pulses from a highly...

Snider, William Timothy

2009-09-30T23:59:59.000Z

59

KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers  

E-Print Network [OSTI]

Abstract KDD 99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection and is the only labeled dataset publicly available. Numerous researchers employed the datasets in KDD 99 intrusion detection datasets

Zincir-Heywood, Nur

60

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han  

E-Print Network [OSTI]

A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J University Bethlehem, PA 18015 Abstract-- Several intrusion detection approaches have been proposed in sparse ad hoc networks. In this paper, we propose a ferry-based intrusion detection and mitigation (FBIDM

Chuah, Mooi-Choo "Mooi"

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A Data Mining Framework for Building Intrusion Detection Models Salvatore J. Stolfo  

E-Print Network [OSTI]

A Data Mining Framework for Building Intrusion Detection Models Wenke Lee Salvatore J. Stolfo Kui W of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal

Yang, Junfeng

62

Verifying the secure setup of Unix client/servers and detection of network intrusion  

SciTech Connect (OSTI)

This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

Feingold, R.; Bruestle, H.R.; Bartoletti, T.; Saroyan, A.; Fisher, J.

1995-07-01T23:59:59.000Z

63

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures  

E-Print Network [OSTI]

-security Risk Management Process (RMP) tailored to smart grids [2]. In this paper we leverage information from1 A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures] and apply them to the specific case of AMI networks in which asset owners are evaluating the use of an IDS

Sanders, William H.

64

SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA  

E-Print Network [OSTI]

with a real-world power plant simulator. The experiment results show that SRID can detect various false data, College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power. Advanced false data injection attack in targeted malware intrusion is becoming an emerging severe threat

Gu, Guofei

65

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection  

E-Print Network [OSTI]

of network packets in order to detect attacks and, more generally, violations of a site's security pol- icy

Sommer, Robin

66

Hierarchical Task Analysis of Intrusion Detection Systems  

E-Print Network [OSTI]

.......................... 4 3. Hierarchical Task Analysis ............................ 6 3.1 Network Security Administrator .................... 7 3.2 Functions of Network Security Administrator ....... 7 4. Diagrams on a single or group of persons called Network Security Administrators. They use a wide variety of tools

Blustein, J.

67

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network [OSTI]

also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

Xu, Jing

2010-01-01T23:59:59.000Z

68

Diagnostic indicators for shipboard mechanical systems using Non-Intrusive Load Monitoring  

E-Print Network [OSTI]

This thesis examines the use of Non-intrusive Load Monitoring (NILM) in auxiliary shipboard systems, such as a low pressure air system, to determine the state of equipment in larger connected systems, such as the main ...

McKay, Thomas Duncan

2006-01-01T23:59:59.000Z

69

Diagnostic indicators for shipboard systems using non-intrusive load monitoring  

E-Print Network [OSTI]

Field studies have demonstrated that the Non-Intrusive Load monitor (NILM) can provide real-time indication of the condition of electro-mechanical systems on board naval vessels. Results from data collected from engineering ...

DeNucci, Thomas W

2005-01-01T23:59:59.000Z

70

E-Print Network 3.0 - adaptive intrusion data systems Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: adaptive intrusion data systems Page: << < 1 2 3 4 5 > >> 1 Noname manuscript No. (will be inserted by the editor) Summary: to obtain audit data, correlate events, and...

71

Using the sequential regression (SER) algorithm for long-term signal processing. [Intrusion detection  

SciTech Connect (OSTI)

The use of the sequential regression (SER) algorithm (Electron. Lett., 14, 118(1978); 13, 446(1977)) for long-term processing applications is limited by two problems that can occur when an SER predictor has more weights than required to predict the input signal. First, computational difficulties related to updating the autocorrelation matrix inverse could arise, since no unique least-squares solution exists. Second, the predictor strives to remove very low-level components in the input, and hence could implement a gain function that is essentially zero over the entire passband. The predictor would then tend to become a no-pass filter which is undesirable in certain applications, e.g., intrusion detection (SAND--78-1032). Modifications to the SER algorithm that overcome the above problems are presented, which enable its use for long-term signal processing applications. 3 figures.

Soldan, D. L.; Ahmed, N.; Stearns, S. D.

1980-01-01T23:59:59.000Z

72

Enforcing positivity in intrusive PC-UQ methods for reactive ODE systems  

SciTech Connect (OSTI)

We explore the relation between the development of a non-negligible probability of negative states and the instability of numerical integration of the intrusive Galerkin ordinary differential equation system describing uncertain chemical ignition. To prevent this instability without resorting to either multi-element local polynomial chaos (PC) methods or increasing the order of the PC representation in time, we propose a procedure aimed at modifying the amplitude of the PC modes to bring the probability of negative state values below a user-defined threshold. This modification can be effectively described as a filtering procedure of the spectral PC coefficients, which is applied on-the-fly during the numerical integration when the current value of the probability of negative states exceeds the prescribed threshold. We demonstrate the filtering procedure using a simple model of an ignition process in a batch reactor. This is carried out by comparing different observables and error measures as obtained by non-intrusive Monte Carlo and Gauss-quadrature integration and the filtered intrusive procedure. The filtering procedure has been shown to effectively stabilize divergent intrusive solutions, and also to improve the accuracy of stable intrusive solutions which are close to the stability limits.

Najm, Habib N. [Sandia National Laboratories, Livermore, CA 94551 (United States); Valorani, Mauro [Mechanical and Aerospace Engineering Dept., Sapienza University of Rome, Rome (Italy)

2014-08-01T23:59:59.000Z

73

Distributed fiber optic intrusion sensor system for monitoring long perimeters  

E-Print Network [OSTI]

A distributed sensor using an optical fiber for detecting and locating intruders over long perimeters (>10 km) is described. Phase changes resulting from either the pressure of the intruder on the ground immediately above the buried fiber or from...

Juarez, Juan C.

2009-06-02T23:59:59.000Z

74

Fuel washout detection system  

DOE Patents [OSTI]

A system for detecting grossly failed reactor fuel by detection of particulate matter as accumulated on a filter.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

75

iSSH v. Auditd: Intrusion Detection in High Performance Computing  

SciTech Connect (OSTI)

The goal is to provide insight into intrusions in high performance computing, focusing on tracking intruders motions through the system. The current tools, such as pattern matching, do not provide sufficient tracking capabilities. We tested two tools: an instrumented version of SSH (iSSH) and Linux Auditing Framework (Auditd). First discussed is Instrumented Secure Shell (iSSH): a version of SSH developed at Lawrence Berkeley National Laboratory. The goal is to audit user activity within a computer system to increase security. Capabilities are: Keystroke logging, Records user names and authentication information, and Catching suspicious remote and local commands. Strengths for iSSH are: (1) Good for keystroke logging, making it easier to track malicious users by catching suspicious commands; (2) Works with Bro to send alerts; could be configured to send pages to systems administrators; and (3) Creates visibility into SSH sessions. Weaknesses are: (1) Relatively new, so not very well documented; and (2) No capabilities to see if files have been edited, moved, or copied within the system. Second we discuss Auditd, the user component of the Linux Auditing System. It creates logs of user behavior, and monitors systems calls and file accesses. Its goal is to improve system security by keeping track of users actions within the system. Strenghts of Auditd are: (1) Very thorough logs; (2) Wider variety of tracking abilities than iSSH; and (3) Older, so better documented. Weaknesses are: (1) Logs record everything, not just malicious behavior; (2) The size of the logs can lead to overflowing directories; and (3) This level of logging leads to a lot of false alarms. Auditd is better documented than iSSH, which would help administrators during set up and troubleshooting. iSSH has a cleaner notification system, but the logs are not as detailed as Auditd. From our performance testing: (1) File transfer speed using SCP is increased when using iSSH; and (2) Network benchmarks were roughly the same regardless of which tool was running.

Karns, David M. [Los Alamos National Laboratory; Protin, Kathryn S. [Los Alamos National Laboratory; Wolf, Justin G. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

76

Shipboard fluid system diagnostics using non-intrusive load monitoring  

E-Print Network [OSTI]

Systems on modem naval vessels are becoming exclusively dependent on electrical power. One example of this is the replacement of distilling and evaporator plants with reverse osmosis units. As the system is in continuous ...

Mitchell, Gregory R. (Gregory Reed)

2007-01-01T23:59:59.000Z

77

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...  

Energy Savers [EERE]

traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE...

78

Automatic intrusion recovery with system-wide history  

E-Print Network [OSTI]

Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

79

Intrusive Galerkin methods with upwinding for uncertain nonlinear hyperbolic systems  

SciTech Connect (OSTI)

This paper deals with stochastic spectral methods for uncertainty propagation and quantification in nonlinear hyperbolic systems of conservation laws. We consider problems with parametric uncertainty in initial conditions and model coefficients, whose solutions exhibit discontinuities in the spatial as well as in the stochastic variables. The stochastic spectral method relies on multi-resolution schemes where the stochastic domain is discretized using tensor-product stochastic elements supporting local polynomial bases. A Galerkin projection is used to derive a system of deterministic equations for the stochastic modes of the solution. Hyperbolicity of the resulting Galerkin system is analyzed. A finite volume scheme with a Roe-type solver is used for discretization of the spatial and time variables. An original technique is introduced for the fast evaluation of approximate upwind matrices, which is particularly well adapted to local polynomial bases. Efficiency and robustness of the overall method are assessed on the Burgers and Euler equations with shocks.

Tryoen, J., E-mail: tryoenj@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France); LIMSI-CNRS, 91403 Orsay cedex (France); Le Maitre, O., E-mail: olm@limsi.f [LIMSI-CNRS, 91403 Orsay cedex (France); CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ndjinga, M., E-mail: michael.ndjinga@cea.f [CEA-Saclay, DEN, DM2S, SFME, F-91191 Gif-sur-Yvette (France); Ern, A., E-mail: ern@cermics.enpc.f [Universite Paris Est, CERMICS, Ecole des Ponts, 77455 Marne la Vallee cedex 2 (France)

2010-09-01T23:59:59.000Z

80

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Computationally Efficient Neural Network Intrusion Security Awareness  

SciTech Connect (OSTI)

An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

Todd Vollmer; Milos Manic

2009-08-01T23:59:59.000Z

82

An Intelligent Tutor for Intrusion Detection on Computer Systems An Intelligent Tutor for Intrusion Detection on Computer Systems  

E-Print Network [OSTI]

and not especially common, practice with simulators is valuable. Simulators can efficiently drill students on rare-recognition rules to itself infer the problems, planning methods to figure how best to fix them, plan

83

Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu)  

E-Print Network [OSTI]

Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie on a network. It uses simple data mining techniques to process the network input data and help expose metrics administrator. This paper describes the components in the FIRE architecture and explains their roles. Particular

Dickerson, Julie A.

84

Idaho Explosive Detection System  

ScienceCinema (OSTI)

Learn how INL researchers are making the world safer by developing an explosives detection system that can inspect cargo. For more information about INL security research, visit http://www.facebook.com/idahonationallaboratory

Klinger, Jeff

2013-05-28T23:59:59.000Z

85

Evaluation of Non-Intrusive Load Monitoring for shipboard cycling system diagnostics  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) is a device that utilizes voltage and current measurements to determine the operating schedule of all of the major loads on an electrical service. Additionally, the NILM can use its ...

Mosman, James P. (James Paul)

2006-01-01T23:59:59.000Z

86

E-Print Network 3.0 - anomaly-based network intrusion Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Computer Technologies and Information Sciences 5 INTRUSION DETECTION IN MOBILE AD HOC NETWORKS Summary: is anomaly-based intrusion detection which profiles the symptoms...

87

Solar system fault detection  

DOE Patents [OSTI]

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, R.B.; Pruett, J.C. Jr.

1984-05-14T23:59:59.000Z

88

Solar system fault detection  

DOE Patents [OSTI]

A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

Farrington, Robert B. (Wheatridge, CO); Pruett, Jr., James C. (Lakewood, CO)

1986-01-01T23:59:59.000Z

89

The geochemical evolution of the Sonju Lake intrusion: assimilation and fractional crystallization in a layered mafic intrusion near Finland, Mn.  

E-Print Network [OSTI]

??The Sonju Lake Intrusion, located within the Beaver Bay Complex near Finland, MN, is the most completely differentiated intrusion related to the Midcontinent Rift System… (more)

Dayton, Ryan N.

2011-01-01T23:59:59.000Z

90

A survey of intrusion detection in wireless network applications Robert Mitchell, Ing-Ray Chen  

E-Print Network [OSTI]

tool that can defend against the real-world cyber attacks threatening critical systems. These attacks include the Stuxnet attack on Iranian engineering facilities [1,2], proof of concept attacks on insulin pumps [3] and cardiac devices [4], the DoS attack on a German power grid opera- tor [5

Chen, Ing-Ray

91

An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection  

E-Print Network [OSTI]

-- There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion-based security systems, like intrusion detection systems (IDS), have not kept pace with the increasing usage that can be attributed to the incapability of current solutions to detect intrusions in high- speed

92

Arc fault detection system  

DOE Patents [OSTI]

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

Jha, Kamal N. (Bethel Park, PA)

1999-01-01T23:59:59.000Z

93

Arc fault detection system  

DOE Patents [OSTI]

An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

Jha, K.N.

1999-05-18T23:59:59.000Z

94

automated border detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 63 Using Specification-Based Intrusion Detection for...

95

automated microarray detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 69 Using Specification-Based Intrusion Detection for...

96

automated fault detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 242 Using Specification-Based Intrusion Detection for...

97

automated snp detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

operating system. Our PC client software presently has 20 users. The combination of PIR and PC sensors Delbruck, Tobi 55 Using Specification-Based Intrusion Detection for...

98

On the Limits of Payload-Oblivious Network Attack Detection  

E-Print Network [OSTI]

alarms in order to detect them consistently. Keywords: network intrusion detection, ROC curve, evaluation. 1 Introduction We address the problem of evaluating network intrusion detection systems to the form of log data, encryption or simply a high connection failure rate--methods for detecting

Reiter, Michael

99

Incipient fire detection system  

DOE Patents [OSTI]

A method and apparatus for an incipient fire detection system that receives gaseous samples and measures the light absorption spectrum of the mixture of gases evolving from heated combustibles includes a detector for receiving gaseous samples and subjecting the samples to spectroscopy and determining wavelengths of absorption of the gaseous samples. The wavelengths of absorption of the gaseous samples are compared to predetermined absorption wavelengths. A warning signal is generated whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. The method includes receiving gaseous samples, subjecting the samples to light spectroscopy, determining wavelengths of absorption of the gaseous samples, comparing the wavelengths of absorption of the gaseous samples to predetermined absorption wavelengths and generating a warning signal whenever the wavelengths of absorption of the gaseous samples correspond to the predetermined absorption wavelengths. In an alternate embodiment, the apparatus includes a series of channels fluidically connected to a plurality of remote locations. A pump is connected to the channels for drawing gaseous samples into the channels. A detector is connected to the channels for receiving the drawn gaseous samples and subjecting the samples to spectroscopy. The wavelengths of absorption are determined and compared to predetermined absorption wavelengths is provided. A warning signal is generated whenever the wavelengths correspond.

Brooks, Jr., William K. (Newport News, VA)

1999-01-01T23:59:59.000Z

100

Buried fiber optic intrusion sensor  

E-Print Network [OSTI]

to the buried sensor induces a phase shift in light propagating along the fiber which allows for the detection and localization of intrusions. Through the use of an ultra-stable erbium-doped fiber laser and phase sensitive optical time domain reflectometry...

Maier, Eric William

2004-09-30T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Particle detection systems and methods  

DOE Patents [OSTI]

Techniques, apparatus and systems for detecting particles such as muons and neutrons. In one implementation, a particle detection system employs a plurality of drift cells, which can be for example sealed gas-filled drift tubes, arranged on sides of a volume to be scanned to track incoming and outgoing charged particles, such as cosmic ray-produced muons. The drift cells can include a neutron sensitive medium to enable concurrent counting of neutrons. The system can selectively detect devices or materials, such as iron, lead, gold, uranium, plutonium, and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can concurrently detect any unshielded neutron sources occupying the volume from neutrons emitted therefrom. If necessary, the drift cells can be used to also detect gamma rays. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

Morris, Christopher L.; Makela, Mark F.

2010-05-11T23:59:59.000Z

102

Passive Operating System Identification From TCP/IP Packet Headers* Richard Lippmann, David Fried, Keith Piwowarski, William Streilein  

E-Print Network [OSTI]

-based intrusion detection systems and maintaining a site security policy. Configuring network-based intrusion useful for maintaining a site security policy. A site policy may specify the types of hosts

103

Protein detection system  

DOE Patents [OSTI]

The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

Fruetel, Julie A. (Livermore, CA); Fiechtner, Gregory J. (Bethesda, MD); Kliner, Dahv A. V. (San Ramon, CA); McIlroy, Andrew (Livermore, CA)

2009-05-05T23:59:59.000Z

104

Thermal neutron detection system  

DOE Patents [OSTI]

According to the present invention, a system for measuring a thermal neutron emission from a neutron source, has a reflector/moderator proximate the neutron source that reflects and moderates neutrons from the neutron source. The reflector/moderator further directs thermal neutrons toward an unmoderated thermal neutron detector.

Peurrung, Anthony J. (Richland, WA); Stromswold, David C. (West Richland, WA)

2000-01-01T23:59:59.000Z

105

Power line detection system  

DOE Patents [OSTI]

A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard.

Latorre, Victor R. (Tracy, CA); Watwood, Donald B. (Tracy, CA)

1994-01-01T23:59:59.000Z

106

Power line detection system  

DOE Patents [OSTI]

A short-range, radio frequency (RF) transmitting-receiving system that provides both visual and audio warnings to the pilot of a helicopter or light aircraft of an up-coming power transmission line complex. Small, milliwatt-level narrowband transmitters, powered by the transmission line itself, are installed on top of selected transmission line support towers or within existing warning balls, and provide a continuous RF signal to approaching aircraft. The on-board receiver can be either a separate unit or a portion of the existing avionics, and can also share an existing antenna with another airborne system. Upon receipt of a warning signal, the receiver will trigger a visual and an audio alarm to alert the pilot to the potential power line hazard. 4 figs.

Latorre, V.R.; Watwood, D.B.

1994-09-27T23:59:59.000Z

107

NADIR: A prototype system for detecting network and file system abuse  

SciTech Connect (OSTI)

This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory's Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

1992-01-01T23:59:59.000Z

108

NADIR: A prototype system for detecting network and file system abuse  

SciTech Connect (OSTI)

This paper describes the design of a prototype computer misuse detection system for the Los Alamos Notional Laboratory`s Integrated Computing Network (ICN). This automated expert system, the Network Anomaly Detection and Intrusion Reporter (NADIR), streamlines and supplements the manual audit record review traditionally performed by security auditors. NADIR compares network activity, as summarized in weekly profiles of individual users and the ICN as a whole, against expert rules that define security policy, improper or suspicious behavior, and normal user activity. NADIR reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. This paper describes analysis by NADIR of two types of ICN activity: user authentication and access control, and mass file storage. It highlights system design issues of data handling, exploiting existing auditing systems, and performing audit analysis at the network level.

Hochberg, J.G.; Jackson, K.A.; Stallings, C.A.; McClary, J.F.; DuBois, D.H.; Ford, J.R.

1992-10-01T23:59:59.000Z

109

NetGator: Malware Detection Using Program Interactive Challenges  

E-Print Network [OSTI]

to an external party over an encrypted or plain text connection before the intrusion is detected. In this paper used for targeted exfiltration of data. Current intrusion detection systems cannot always keep hole that malware will increasingly cap- italize on. The use of encrypted traffic has been growing

Stavrou, Angelos

110

Electric load information system based on non-intrusive power monitoring  

E-Print Network [OSTI]

Obtaining high quality information economically and reliably is always a difficult objective to achieve. The electric power industry and consumers recently face many challenges, such as deregulation, autonomous power systems ...

Lee, Kwangduk Douglas, 1970-

2003-01-01T23:59:59.000Z

111

Semi autonomous mine detection system  

SciTech Connect (OSTI)

CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

Douglas Few; Roelof Versteeg; Herman Herman

2010-04-01T23:59:59.000Z

112

c 2004 by Fabrice Stevens. All rights reserved. VALIDATION OF AN INTRUSION-TOLERANT INFORMATION SYSTEM USING  

E-Print Network [OSTI]

c 2004 by Fabrice Stevens. All rights reserved. #12;VALIDATION OF AN INTRUSION-TOLERANT INFORMATION of Illinois at Urbana-Champaign, 2004 Urbana, Illinois #12;To my parents iii #12;ACKNOWLEDGMENTS I would like to thank my advisor, Professor William H. Sanders, for giving me the op- portunity to work for him. His

Illinois at Urbana-Champaign, University of

113

The Autonomous Pathogen Detection System  

SciTech Connect (OSTI)

We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

Dzenitis, J M; Makarewicz, A J

2009-01-13T23:59:59.000Z

114

Compensated intruder-detection systems  

DOE Patents [OSTI]

Intruder-detection systems in which intruder-induced signals are transmitted through a medium also receive spurious signals induced by changes in a climatic condition affecting the medium. To combat this, signals received from the detection medium are converted to a first signal. The system also provides a reference signal proportional to climate-induced changes in the medium. The first signal and the reference signal are combined for generating therefrom an output signal which is insensitive to the climatic changes in the medium. An alarm is energized if the output signal exceeds a preselected value. In one embodiment, an acoustic cable is coupled to a fence to generate a first electrical signal proportional to movements thereof. False alarms resulting from wind-induced movements of the fence (detection medium) are eliminated by providing an anemometer-driven voltage generator to provide a reference voltage proportional to the velocity of wind incident on the fence. An analog divider receives the first electrical signal and the reference signal as its numerator and denominator inputs, respectively, and generates therefrom an output signal which is insensitive to the wind-induced movements in the fence.

McNeilly, David R. (Maryville, TN); Miller, William R. (Andersonville, TN)

1984-01-01T23:59:59.000Z

115

Modeling and simulation of intrusion detection system in mobile ad-hoc networks.  

E-Print Network [OSTI]

??The thesis investigates the process of modeling and simulation of the mobile ad-hoc networks. It provides a overview of the actual state of art together… (more)

Jarmal, Piotr

2008-01-01T23:59:59.000Z

116

Explosives detection system and method  

DOE Patents [OSTI]

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2007-12-11T23:59:59.000Z

117

(Intrusion Path Analysis)  

SciTech Connect (OSTI)

The design and implementation of an Intrusion Path Analysis (IPA) function came about as a result of the upgrades to the security systems at the Savannah River Site (SRS), near Aiken, South Carolina. The stated requirements for IPA were broad, leaving opportunity for creative freedom during design and development. The essential elements were that it: be based on alarm and sensor state data; consider insider as well as outsider threats; be flexible and easily enabled or disabled; not be processor intensive; and provide information to the operator in the event the analysis reveals possible path openings. The final design resulted from many and varied conceptual inputs, and will be implemented in selected test areas at SRS. It fulfils the requirements and: allows selective inclusion of sensors in the analysis; permits the formation of concentric rings of protection around assets; permits the defining of the number of rings which must be breached before issuing an alert; evaluates current sensor states as well as a recent, configurable history of sensor states; considers the sensors' physical location, with respect to the concentric rings; and enables changes for maintenance without software recompilation. 3 figs.

Hardwick, R D

1989-01-01T23:59:59.000Z

118

Non-intrusive appliance monitor apparatus  

DOE Patents [OSTI]

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

1989-08-15T23:59:59.000Z

119

Non-intrusive appliance monitor apparatus  

DOE Patents [OSTI]

A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

1989-08-15T23:59:59.000Z

120

Distributed Termination Detection for Dynamic Systems  

E-Print Network [OSTI]

Distributed Termination Detection for Dynamic Systems D. M. Dhamdhere \\Lambda Sridhar R. Iyer E for detecting the termination of a dis­ tributed computation is presented. The algorithm does not require global are provided. Keywords Distributed algorithms, Distributed computation, Distributed termination, Dynamic

Dhamdhere, Dhananjay Madhav

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Shipboard applications of non-intrusive load monitoring  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM ...

Ramsey, Jack S

2004-01-01T23:59:59.000Z

122

Harmonic approaches to non-intrusive load diagnostics  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) is a system that monitors, records and processes voltage and current measurements to establish the operating characteristics of individual loads on a load center from a single aggregate ...

Fuller, Ashley E. (Ashley Eliot)

2008-01-01T23:59:59.000Z

123

Intrusion recovery for database-backed web applications  

E-Print Network [OSTI]

Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes. Warp repairs ...

Chandra, Ramesh

124

A framework for non-intrusive load monitoring and diagnostics  

E-Print Network [OSTI]

The widespread use of electrical and electromechanical systems places increasing demands on monitoring and diagnostic techniques. The non-intrusive load monitor (NILM) provides a low-cost, low-maintenance way to perform ...

Paris, James, Ph. D. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

125

Improving shipboard applications of non-intrusive load monitoring  

E-Print Network [OSTI]

The Non-Intrusive Load Monitor (NILM) measures equipment performance by measuring and analyzing the source power to the equipment at a single point in the electrical system. Previous studies have proven the usefulness of ...

Jones, Richard A. (Richard Alan), Nav. E. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

126

Non-intrusive refrigerant charge indicator  

DOE Patents [OSTI]

A non-intrusive refrigerant charge level indicator includes a structure for measuring at least one temperature at an outside surface of a two-phase refrigerant line section. The measured temperature can be used to determine the refrigerant charge status of an HVAC system, and can be converted to a pressure of the refrigerant in the line section and compared to a recommended pressure range to determine whether the system is under-charged, properly charged or over-charged. A non-intrusive method for assessing the refrigerant charge level in a system containing a refrigerant fluid includes the step of measuring a temperature at least one outside surface of a two-phase region of a refrigerant containing refrigerant line, wherein the temperature measured can be converted to a refrigerant pressure within the line section.

Mei, Viung C.; Chen, Fang C.; Kweller, Esher

2005-03-22T23:59:59.000Z

127

Damage detection in initially nonlinear systems  

SciTech Connect (OSTI)

The primary goal of Structural Health Monitoring (SHM) is to detect structural anomalies before they reach a critical level. Because of the potential life-safety and economic benefits, SHM has been widely studied over the past decade. In recent years there has been an effort to provide solid mathematical and physical underpinnings for these methods; however, most focus on systems that behave linearly in their undamaged state - a condition that often does not hold in complex 'real world' systems and systems for which monitoring begins mid-lifecycle. In this work, we highlight the inadequacy of linear-based methodology in handling initially nonlinear systems. We then show how the recently developed autoregressive support vector machine (AR-SVM) approach to time series modeling can be used for detecting damage in a system that exhibits initially nonlinear response. This process is applied to data acquired from a structure with induced nonlinearity tested in a laboratory environment.

Bornn, Luke [Los Alamos National Laboratory; Farrar, Charles [Los Alamos National Laboratory; Park, Gyuhae [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

128

Network-Level Polymorphic Shellcode Detection Using Emulation  

E-Print Network [OSTI]

to the attack vector. We present a heuristic detection method that scans network traffic streams that makes it self-decrypting. Since the decryptor itself cannot be encrypted, some detection approaches rely such as self-modifying code. 2 Related Work Network intrusion detection systems (NIDS) like Snort [12] have

Markatos, Evangelos P.

129

System for particle concentration and detection  

DOE Patents [OSTI]

A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

2013-03-19T23:59:59.000Z

130

DETECTION OF HISTORICAL PIPELINE LEAK PLUMES USING NON-INTRUSIVE SURFACE-BASED GEOPHYSICAL TECHNIQUES AT THE HANFORD NUCLEAR SITE WASHINGTON USA  

SciTech Connect (OSTI)

Historical records from the Department of Energy Hanford Nuclear Reservation (in eastern WA) indicate that ruptures in buried waste transfer pipelines were common between the 1940s and 1980s, which resulted in unplanned releases (UPRs) of tank: waste at numerous locations. A number of methods are commercially available for the detection of active or recent leaks, however, there are no methods available for the detection of leaks that occurred many years ago. Over the decades, leaks from the Hanford pipelines were detected by visual observation of fluid on the surface, mass balance calculations (where flow volumes were monitored), and incidental encounters with waste during excavation or drilling. Since these detection methods for historic leaks are so limited in resolution and effectiveness, it is likely that a significant number of pipeline leaks have not been detected. Therefore, a technology was needed to detect the specific location of unknown pipeline leaks so that characterization technologies can be used to identify any risks to groundwater caused by waste released into the vadose zone. A proof-of-concept electromagnetic geophysical survey was conducted at an UPR in order to image a historical leak from a waste transfer pipeline. The survey was designed to test an innovative electromagnetic geophysical technique that could be used to rapidly map the extent of historical leaks from pipelines within the Hanford Site complex. This proof-of-concept test included comprehensive testing and analysis of the transient electromagnetic method (TEM) and made use of supporting and confirmatory geophysical methods including ground penetrating radar, magnetics, and electrical resistivity characterization (ERC). The results for this initial proof-of-concept test were successful and greatly exceeded the expectations of the project team by providing excellent discrimination of soils contaminated with leaked waste despite the interference from an electrically conductive pipe.

SKORSKA MB; FINK JB; RUCKER DF; LEVITT MT

2010-12-02T23:59:59.000Z

131

Network intrusion detector: NID user`s guide V 1.0  

SciTech Connect (OSTI)

The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

Palasek, R. [ed.

1994-04-01T23:59:59.000Z

132

Digital radiographic systems detect boiler tube cracks  

SciTech Connect (OSTI)

Boiler water wall leaks have been a major cause of steam plant forced outages. But conventional nondestructive evaluation techniques have a poor track record of detecting corrosion fatigue cracking on the inside surface of the cold side of waterwall tubing. EPRI is performing field trials of a prototype direct-digital radiographic system that promises to be a game changer. 8 figs.

Walker, S. [EPRI, Charlotte, NC (United States)

2008-06-15T23:59:59.000Z

133

Method and system for detecting an explosive  

DOE Patents [OSTI]

A method and system for detecting at least one explosive in a vehicle using a neutron generator and a plurality of NaI detectors. Spectra read from the detectors is calibrated by performing Gaussian peak fitting to define peak regions, locating a Na peak and an annihilation peak doublet, assigning a predetermined energy level to one peak in the doublet, and predicting a hydrogen peak location based on a location of at least one peak of the doublet. The spectra are gain shifted to a common calibration, summed for respective groups of NaI detectors, and nitrogen detection analysis performed on the summed spectra for each group.

Reber, Edward L. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Blackwood, Larry G. (Bozeman, MT)

2010-12-07T23:59:59.000Z

134

Gas intrusion into SPR caverns  

SciTech Connect (OSTI)

The conditions and occurrence of gas in crude oil stored in Strategic Petroleum Reserve, SPR, caverns is characterized in this report. Many caverns in the SPR show that gas has intruded into the oil from the surrounding salt dome. Historical evidence and the analyses presented here suggest that gas will continue to intrude into many SPR caverns in the future. In considering why only some caverns contain gas, it is concluded that the naturally occurring spatial variability in salt permeability can explain the range of gas content measured in SPR caverns. Further, it is not possible to make a one-to-one correlation between specific geologic phenomena and the occurrence of gas in salt caverns. However, gas is concluded to be petrogenic in origin. Consequently, attempts have been made to associate the occurrence of gas with salt inhomogeneities including anomalies and other structural features. Two scenarios for actual gas intrusion into caverns were investigated for consistency with existing information. These scenarios are gas release during leaching and gas permeation through salt. Of these mechanisms, the greater consistency comes from the belief that gas permeates to caverns through the salt. A review of historical operating data for five Bryan Mound caverns loosely supports the hypothesis that higher operating pressures reduce gas intrusion into caverns. This conclusion supports a permeability intrusion mechanism. Further, it provides justification for operating the caverns near maximum operating pressure to minimize gas intrusion. Historical gas intrusion rates and estimates of future gas intrusion are given for all caverns.

Hinkebein, T.E.; Bauer, S.J.; Ehgartner, B.L.; Linn, J.K.; Neal, J.T.; Todd, J.L.; Kuhlman, P.S.; Gniady, C.T. [Sandia National Labs., Albuquerque, NM (United States). Underground Storage Technology Dept.; Giles, H.N. [Dept. of Energy, Washington, DC (United States). Strategic Petroleum Reserve

1995-12-01T23:59:59.000Z

135

REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION AND QUANTIFICATION  

E-Print Network [OSTI]

REAL-TIME ACTIVE PIPELINE INTEGRITY DETECTION (RAPID) SYSTEM FOR CORROSION DETECTION detection Acellent has developed a Real-time Active Pipeline Integrity Detection (RAPID) system. The RAPID system utilizes a sensor network permanently bonded to the pipeline structure along with in

Paris-Sud XI, Université de

136

Detecting New Planets in Transiting Systems  

E-Print Network [OSTI]

I present an initial investigation into a new planet detection technique that uses the transit timing of a known, transiting planet. The transits of a solitary planet orbiting a star occur at equally spaced intervals in time. If a second planet is present, dynamical interactions within the system will cause the time interval between transits to vary. These transit time variations can be used to infer the orbital elements of the unseen, perturbing planet. I show analytic expressions for the amplitude of the transit time variations in several limiting cases. Under certain conditions the transit time variations can be comparable to the period of the transiting planet. I also present the application of this planet detection technique to existing transit observations of the TrES-1 and HD209458 systems. While no convincing evidence for a second planet in either system was found from those data, I constrain the mass that a perturbing planet could have as a function of the semi-major axis ratio of the two planets and the eccentricity of the perturbing planet. Near low-order, mean-motion resonances (within about 1% fractional deviation), I find that a secondary planet must generally have a mass comparable to or less than the mass of the Earth--showing that these data are the first to have sensitivity to sub Earth-mass planets orbiting main sequence stars. These results show that TTV will be an important tool in the detection and characterization of extrasolar planetary systems.

Jason H. Steffen

2006-09-18T23:59:59.000Z

137

Intrusive multi-probe system  

SciTech Connect (OSTI)

The Diagnostic Instrumentation and Analysis Laboratory (DIAL) in the College of Engineering at Mississippi State University is the result of the efforts of several faculty members in the Aerospace and Chemical Engineering Departments obtaining funding in 1976. At that time, an initial research project was begun which was funded by the US Department of Energy as part of the national magnetohydrodynamic (MHD) program. Initial research efforts concentrated in heat recovery and seed recovery (HRSR) from the MHD combustion process as well as some materials investigations. Over the years, efforts at DIAL were shifted from HRSR studies to the development of optical based, microprocessor controlled instrumentation for use in the harsh MHD environment.

Green, R.A.; Hester, L.R.; Bouchillon, C.W.

1995-02-01T23:59:59.000Z

138

System and method for detecting gas  

DOE Patents [OSTI]

A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

Chow, Oscar Ken (Simsbury, CT); Moulthrop, Lawrence Clinton (Windsor, CT); Dreier, Ken Wayne (Madison, CT); Miller, Jacob Andrew (Dexter, MI)

2010-03-16T23:59:59.000Z

139

Mining in a Dataflow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok  

E-Print Network [OSTI]

Mining in a Data­flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

Lee, Wenke

140

Mining in a Data-flow Environment: Experience in Network Intrusion Wenke Lee Salvatore J. Stolfo Kui W. Mok  

E-Print Network [OSTI]

Mining in a Data-flow Environment: Experience in Network Intrusion Detection Wenke Lee Salvatore J network intrusion detection models. We report our experiments using the network data provided as part not limited to) data cleaning and preprocessing, feature extraction and data mining, and consolidating

Yang, Junfeng

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Systems and methods for detecting and processing  

DOE Patents [OSTI]

Embodiments of the present invention provides systems and method for detecting. Sensing modules are provided in communication with one or more detectors. In some embodiments, detectors are provided that are sensitive to chemical, biological, or radiological agents. Embodiments of sensing modules include processing capabilities to analyze, perform computations on, and/or run models to predict or interpret data received from one or more detectors. Embodiments of sensing modules form various network configurations with one another and/or with one or more data aggregation devices. Some embodiments of sensing modules include power management functionalities.

Johnson, Michael M. (Livermore, CA); Yoshimura, Ann S. (Tracy, CA)

2006-03-28T23:59:59.000Z

142

Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines  

E-Print Network [OSTI]

concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

Shilton, Alistair

143

Failure Detection with Booting in Partially Synchronous Systems  

E-Print Network [OSTI]

Failure Detection with Booting in Partially Synchronous Systems Josef Widder1 , G´erard Le Lann2 implementation with respect to failure detection time, but also works during the system booting phase. 1

144

Human Portable Radiation Detection System Communications Package Evaluation  

SciTech Connect (OSTI)

Testing and valuation of the Human Portable Radiation Detection System Communications Package for the US Coast Guard.

Morgen, Gerald P.; Peterson, William W.

2009-06-11T23:59:59.000Z

145

System for Detection of Small Inclusions in Large Optics  

SciTech Connect (OSTI)

The presence of defects in optical materials can lead to bulk damage or downstream modulation and subsequent surface damage in high fluence laser systems. An inclusion detection system has been developed by the National Ignition Facility Optics Metrology Group. The system detects small inclusions in optical materials with increased sensitivity and speed over previous methods. The system has detected all known inclusions and defects and has detected previously undetected defects smaller than 5 microns.

Wolfe, J E; Runkel, M J

2008-10-24T23:59:59.000Z

146

Method and system for detecting explosives  

DOE Patents [OSTI]

A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

Reber, Edward L. (Idaho Falls, ID); Jewell, James K. (Idaho Falls, ID); Rohde, Kenneth W. (Idaho Falls, ID); Seabury, Edward H. (Idaho Falls, ID); Blackwood, Larry G. (Idaho Falls, ID); Edwards, Andrew J. (Idaho Falls, ID); Derr, Kurt W. (Idaho Falls, ID)

2009-03-10T23:59:59.000Z

147

VISDTA: A video imaging system for detection, tracking, and assessment: Prototype development and concept demonstration  

SciTech Connect (OSTI)

It has been demonstrated that thermal imagers are an effective surveillance and assessment tool for security applications because: (1) they work day or night due to their sensitivity to thermal signatures; (2) penetrability through fog, rain, dust, etc., is better than human eyes; (3) short or long range operation is possible with various optics; and (4) they are strictly passive devices providing visible imagery which is readily interpreted by the operator with little training. Unfortunately, most thermal imagers also require the setup of a tripod, connection of batteries, cables, display, etc. When this is accomplished, the operator must manually move the camera back and forth searching for signs of aggressor activity. VISDTA is designed to provide automatic panning, and in a sense, ''watch'' the imagery in place of the operator. The idea behind the development of VISDTA is to provide a small, portable, rugged system to automatically scan areas and detect targets by computer processing of images. It would use a thermal imager and possibly an intensified day/night TV camera, a pan/ tilt mount, and a computer for system control. If mounted on a dedicated vehicle or on a tower, VISDTA will perform video motion detection functions on incoming video imagery, and automatically scan predefined patterns in search of abnormal conditions which may indicate attempted intrusions into the field-of-regard. In that respect, VISDTA is capable of improving the ability of security forces to maintain security of a given area of interest by augmenting present techniques and reducing operator fatigue.

Pritchard, D.A.

1987-05-01T23:59:59.000Z

148

Evaluation of intrusion sensors and video assessment in areas of restricted passage  

SciTech Connect (OSTI)

This report discusses an evaluation of intrusion sensors and video assessment in areas of restricted passage. The discussion focuses on applications of sensors and video assessment in suspended ceilings and air ducts. It also includes current and proposed requirements for intrusion detection and assessment. Detection and nuisance alarm characteristics of selected sensors as well as assessment capabilities of low-cost board cameras were included in the evaluation.

Hoover, C.E.; Ringler, C.E.

1996-04-01T23:59:59.000Z

149

Intrusion detection and monitoring for wireless networks.  

SciTech Connect (OSTI)

Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

2005-11-01T23:59:59.000Z

150

Detection of contamination of municipal water distribution systems  

DOE Patents [OSTI]

A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

Cooper, John F. (Oakland, CA)

2012-01-17T23:59:59.000Z

151

Systems and methods for detecting neutrons  

DOE Patents [OSTI]

Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

2005-08-09T23:59:59.000Z

152

System and method for detecting cells or components thereof  

DOE Patents [OSTI]

A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

Porter, Marc D. (Ames, IA); Lipert, Robert J. (Ames, IA); Doyle, Robert T. (Ames, IA); Grubisha, Desiree S. (Corona, CA); Rahman, Salma (Ames, IA)

2009-01-06T23:59:59.000Z

153

Fault Detection and Diagnosis in Building HVAC Systems  

E-Print Network [OSTI]

Wright, “Condition monitoring in HVAC subsystems using firstmonitoring packaged HVAC equipment. ASHRAE Transactions”,Detection and Diagnosis of HVAC Systems Using Support Vector

Najafi, Massieh

2010-01-01T23:59:59.000Z

154

Upconverting nanoparticles for optimizing scintillator based detection systems  

DOE Patents [OSTI]

An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

2013-09-17T23:59:59.000Z

155

All row, planar fault detection system  

DOE Patents [OSTI]

An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

2013-07-23T23:59:59.000Z

156

Explosive simulants for testing explosive detection systems  

DOE Patents [OSTI]

Explosives simulants that include non-explosive components are disclosed that facilitate testing of equipment designed to remotely detect explosives. The simulants are non-explosive, non-hazardous materials that can be safely handled without any significant precautions. The simulants imitate real explosives in terms of mass density, effective atomic number, x-ray transmission properties, and physical form, including moldable plastics and emulsions/gels.

Kury, John W. (Danville, CA); Anderson, Brian L. (Lodi, CA)

1999-09-28T23:59:59.000Z

157

Systems for detecting charged particles in object inspection  

DOE Patents [OSTI]

Techniques, apparatus and systems for detecting particles such as muons. In one implementation, a monitoring system has a cosmic ray-produced charged particle tracker with a plurality of drift cells. The drift cells, which can be for example aluminum drift tubes, can be arranged at least above and below a volume to be scanned to thereby track incoming and outgoing charged particles, such as cosmic ray-produced muons, while also detecting gamma rays. The system can selectively detect devices or materials, such as iron, lead, gold and/or tungsten, occupying the volume from multiple scattering of the charged particles passing through the volume and can also detect any radioactive sources occupying the volume from gamma rays emitted therefrom. If necessary, the drift tubes can be sealed to eliminate the need for a gas handling system. The system can be employed to inspect occupied vehicles at border crossings for nuclear threat objects.

Morris, Christopher L.; Makela, Mark F.

2013-08-20T23:59:59.000Z

158

REDUCED RANK DETECTION SCHEMES FOR DS-CDMA COMMUNICATION SYSTEMS  

E-Print Network [OSTI]

REDUCED RANK DETECTION SCHEMES FOR DS-CDMA COMMUNICATION SYSTEMS Wanshi Chen Ericsson Wireless 90089­2565 e-mail: ubli@usc.edu Abstract -- Several reduced-rank detection schemes for direct- sequence to the multistage linear receiver scheme based on the Cayley Hamilton theorem. The analysis of the reduced rank

Southern California, University of

159

Electric Power System Anomaly Detection Using Neural Networks  

E-Print Network [OSTI]

normal system beha- viour at substations level, and raising an alarm signal when an abnormal status is detected; the problem is addressed by the use of autoassociat- ive neural networks, reading substation, and their increasing complexity make them vulnerable to failures or to deliberate attacks. Our goal is to detect

Tronci, Enrico

160

Online Fault Detection and Tolerance for Photovoltaic Energy Harvesting Systems  

E-Print Network [OSTI]

and weather conditions (e.g., clouds), and the output power of PV systems is directly dependent on solar and mitigate the output power shortage under low levels of solar irradiance. Moreover, PV panels exhibit highly fault detection and tolerance. Our fault detection and tolerance technique reduces output power

Pedram, Massoud

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Intrusion Detection in the Large: Distributed Detection of Distributed Attacks  

E-Print Network [OSTI]

Communicate CMAD IV (Monterey, 1996) Coniidentiality/Sanitize Security Feedback to cracker Under Phased Response - Are there dependable cues n Distributed Attack in small Cluster of Computers - Limit components CMAD IV (Monterey, 1996) Doug Moran, SRI International n Single Platform Type #12;Scaling-Up 4

California at Davis, University of

162

Strategies To Detect Hidden Geothermal Systems Based On Monitoring...  

Open Energy Info (EERE)

To Detect Hidden Geothermal Systems Based On Monitoring and Analysis Of CO2 In The Near-Surface Environment Jump to: navigation, search OpenEI Reference LibraryAdd to library...

163

Bachelor Thesis Detection of Zeno Sets in Hybrid Systems  

E-Print Network [OSTI]

Bachelor Thesis Detection of Zeno Sets in Hybrid Systems to Validate Modelica Simulations Marcel . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Example: Water Tank . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Modelica 9 3.1 OpenModelica . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.1.1 Hybrid Automata

164

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

165

UPGRADE AND EVALUATION OF A LIGHTNING DETECTION SYSTEM  

E-Print Network [OSTI]

/11/2004 page 3 of 17 1 INTRODUCTION KNMI (Royal Netherlands Meteorological Institute) has upgraded itsUPGRADE AND EVALUATION OF A LIGHTNING DETECTION SYSTEM Hans Beekhuis Iwan Holleman the Netherlands

Stoffelen, Ad

166

Interactive modeling and analysis of intruder detection systems  

E-Print Network [OSTI]

INTERACTIVE MODELING AND ANALYSIS OF INTRUDER DETECTION SYSTEMS A Thesis by MICHAEL WILLIAM JONES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE December 1991 Major Subject: Industrial Engineering INTERACTIVE MODELING AND ANALYSIS OF INTRUDER DETECTION SYSTEMS A Thesis by MICHAEL WILLIAM JONES Approved as to style and content by: Robert E . Shannon (Co ? Chair of Committee) Kav...

Jones, Michael William

1991-01-01T23:59:59.000Z

167

Animal intrusion status report for fiscal year 1989  

SciTech Connect (OSTI)

The Protective Barrier and Warning Marker System Development Plan identified tasks that need to be completed to design a final protective barrier to implement in-place disposal of radioactive waste. This report summarizes the animal intrusion tasks that were conducted by Westinghouse Hanford Company in fiscal years 1988 and 1989 with respect to small mammals and water infiltration. 2 refs., 8 figs., 6 tabs.

Landeen, D.S.

1990-08-01T23:59:59.000Z

168

Digital filtering in a disease detection system  

SciTech Connect (OSTI)

A low-pass, nonrecursive digital filter has been designed to process data in an automated enzyme immunoassay system. The software implemented filter has been installed in the Intel 80/10 system controller. A low-speed sample rate of three samples per second allowed the filter algorithm to be programmed in the high-level FORTRAN language with a resultant execution speed of 0.6 seconds per day array. Fourier techniques are used to derive a zero phase shift filter algorithm from a frequency domain prototype. The resulting alogrithm is modified by a Hamming window to reduce transients and Gibbs phenomenon oscillations. Observations on the effectiveness of the filter under full system operation indicate a 90% data recovery rate.

Brown, R.R.

1983-01-01T23:59:59.000Z

169

Methods and systems for remote detection of gases  

DOE Patents [OSTI]

Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

Johnson, Timothy J. (Pasco, WA)

2007-11-27T23:59:59.000Z

170

Methods and systems for remote detection of gases  

DOE Patents [OSTI]

Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

Johnson, Timothy J

2012-09-18T23:59:59.000Z

171

Systems and methods for detection of blowout precursors in combustors  

DOE Patents [OSTI]

The present invention comprises systems and methods for detecting flame blowout precursors in combustors. The blowout precursor detection system comprises a combustor, a pressure measuring device, and blowout precursor detection unit. A combustion controller may also be used to control combustor parameters. The methods of the present invention comprise receiving pressure data measured by an acoustic pressure measuring device, performing one or a combination of spectral analysis, statistical analysis, and wavelet analysis on received pressure data, and determining the existence of a blowout precursor based on such analyses. The spectral analysis, statistical analysis, and wavelet analysis further comprise their respective sub-methods to determine the existence of blowout precursors.

Lieuwen, Tim C.; Nair, Suraj

2006-08-15T23:59:59.000Z

172

Reducing booster-pump-induced contaminant intrusion in Indian water systems with a self-actuated, back-pressure regulating valve  

E-Print Network [OSTI]

Intermittently-operated water systems struggle to equitably and effectively distribute clean water to customers. One common customer response to intermittency is to supplement the water system's pressure by using a household, ...

Taylor, David Donald James

2014-01-01T23:59:59.000Z

173

Occupancy change detection system and method  

SciTech Connect (OSTI)

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

2009-09-01T23:59:59.000Z

174

Automated intrusion recovery for web applications  

E-Print Network [OSTI]

In this dissertation, we develop recovery techniques for web applications and demonstrate that automated recovery from intrusions and user mistakes is practical as well as effective. Web applications play a critical role ...

Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

175

Attack Detection and Identification in Cyber-Physical Systems  

E-Print Network [OSTI]

Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D¨orfler, Florian D¨orfler, and Francesco Bullo are with the Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, {fabiopas,dorfler,bullo}@engineering.ucsb.edu. #12;appropriate

Bullo, Francesco

176

Potential detection systems for monitoring UF{sub 6} releases  

SciTech Connect (OSTI)

In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF{sub 6}) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC`s position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF{sub 6} release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring).

Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

1994-09-01T23:59:59.000Z

177

Analytical foundations of physical security system assessment  

E-Print Network [OSTI]

- tion scenarios or systems. Peck [23] [24] and Peck and Lacombe [25] have explored unattended ground sensors with regard to their employment as part of an intrusion detection system in a force protection role for base camps. They examine environ- mental...

Graves, Gregory Howard

2006-10-30T23:59:59.000Z

178

Microlensing Detections of Planets in Binary Stellar Systems  

E-Print Network [OSTI]

We demonstrate that microlensing can be used for detecting planets in binary stellar systems. This is possible because in the geometry of planetary binary systems where the planet orbits one of the binary component and the other binary star is located at a large distance, both planet and secondary companion produce perturbations at a common region around the planet-hosting binary star and thus the signatures of both planet and binary companion can be detected in the light curves of high-magnification lensing events. We find that identifying planets in binary systems is optimized when the secondary is located in a certain range which depends on the type of the planet. The proposed method can detect planets with masses down to one tenth of the Jupiter mass in binaries with separations planet mass and binary separation are not covered by other methods and thus microlensing would be able to make the planetary binary sample richer.

Dong-Wook Lee; Chung-Uk Lee; Byeong-Gon Park; Sun-Ju Chung; Young-Soo Kim; Ho-Il Kim; Cheongho Han

2007-09-13T23:59:59.000Z

179

A Learning System for Discriminating Variants of Malicious Network Traffic  

SciTech Connect (OSTI)

Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacks and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.

Beaver, Justin M [ORNL; Symons, Christopher T [ORNL; Gillen, Rob [ORNL

2013-01-01T23:59:59.000Z

180

All-to-all sequenced fault detection system  

DOE Patents [OSTI]

An apparatus, program product and method enable nodal fault detection by sequencing communications between all system nodes. A master node may coordinate communications between two slave nodes before sequencing to and initiating communications between a new pair of slave nodes. The communications may be analyzed to determine the nodal fault.

Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

2010-11-02T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Efficient Symbolic Detection of Global Properties in Distributed Systems  

E-Print Network [OSTI]

to total orders containing the happened­before relation. A consistent global state (CGS) of a computation cEfficient Symbolic Detection of Global Properties in Distributed Systems Scott D. Stoller a global state satisfying property \\Phi. Previous general­purpose algorithms for this problem explicitly

Stoller, Scott

182

Numerical investigation of transient hydrothermal processes around intrusions: heat-transfer and fluid-  

E-Print Network [OSTI]

Numerical investigation of transient hydrothermal processes around intrusions: heat the intrusion. Keywords: Hydrothermal processes, numerical modelling, magmatic intrusion, permeability- depth around magmatic intrusions have been obtained through coupled hydrothermal numerical modelling that takes

Paris-Sud XI, Université de

183

Vapor intrusion modeling : limitations, improvements, and value of information analyses  

E-Print Network [OSTI]

Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

Friscia, Jessica M. (Jessica Marie)

2014-01-01T23:59:59.000Z

184

Real-world Polymorphic Attack Detection Michalis Polychronakis,1  

E-Print Network [OSTI]

proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

Markatos, Evangelos P.

185

Lateral position detection and control for friction stir systems  

DOE Patents [OSTI]

A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

Fleming, Paul (Boulder, CO); Lammlein, David (Houston, TX); Cook, George E. (Brentwood, TN); Wilkes, Don Mitchell (Nashville, TN); Strauss, Alvin M. (Nashville, TN); Delapp, David (Ashland City, TN); Hartman, Daniel A. (Santa Fe, NM)

2010-12-14T23:59:59.000Z

186

Intrusive gravity currents in two-layer  

E-Print Network [OSTI]

Intrusive gravity currents in two-layer stratified media Morris R. Flynn & Paul F. Linden Dept to as a gravity current · In contrast to waves, gravity currents transport significant mass (e.g. fluid parcels, sediment, insects, etc.) Introduction Gravity currents in the environment www

Flynn, Morris R.

187

Asynchronous intrusion recovery for interconnected web services  

E-Print Network [OSTI]

Asynchronous intrusion recovery for interconnected web services Ramesh Chandra, Taesoo Kim, and tracking down and recovering from such an attack re- quires significant manual effort. Web services for such web services. Aire addresses several challenges, such as propagating repair across services when some

Sabatini, David M.

188

Detect  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear262AboutDesignerFile SystemDetect

189

Observational Techniques for Detecting Planets in Binary Systems  

E-Print Network [OSTI]

Searches for planets in close binary systems explore the degree to which stellar multiplicity inhibits or promotes planet formation. There is a degeneracy between planet formation models when only systems with single stars are studied--several mechanisms appear to be able to produce such a final result. This degeneracy is lifted by searching for planets in binary systems; the resulting detections (or evidence of non-existence) of planets in binaries isolates which models may contribute to how planets form in nature. In this chapter, we consider observational efforts to detect planetary companions to binary stars in two types of hierarchical planet-binary configurations: first ``S-type'' planets which orbit just one of the stars, with the binary period being much longer than the planet's; second, ``P-type'' or circumbinary planets, where the planet simultaneously orbits both stars, and the planetary orbital period is much longer than that of the binary. The S-type planet finding techniques are different for binaries that can or cannot be spatially resolved. For wider systems, techniques reviewed include dualstar interferometric differential astrometry and precision radial velocities. Alternatively, unresolved binaries can be studied using modified dualstar "PHASES-style" differential astrometry or a modification of the radial velocity technique for composite spectra. Should a fortunately aligned--but still long period--binary be found, eclipse timing can also reveal the presence of S-type planets. Methods for detecting P-type planets include the composite-spectra variant of the radial velocity technique and eclipse timing.

Matthew W. Muterspaugh; Maciej Konacki; Benjamin F. Lane; Eric Pfahl

2007-05-21T23:59:59.000Z

190

Autonomous navigation system and method  

DOE Patents [OSTI]

A robot platform includes perceptors, locomotors, and a system controller, which executes instructions for autonomously navigating a robot. The instructions repeat, on each iteration through an event timing loop, the acts of defining an event horizon based on the robot's current velocity, detecting a range to obstacles around the robot, testing for an event horizon intrusion by determining if any range to the obstacles is within the event horizon, and adjusting rotational and translational velocity of the robot accordingly. If the event horizon intrusion occurs, rotational velocity is modified by a proportion of the current rotational velocity reduced by a proportion of the range to the nearest obstacle and translational velocity is modified by a proportion of the range to the nearest obstacle. If no event horizon intrusion occurs, translational velocity is set as a ratio of a speed factor relative to a maximum speed.

Bruemmer, David J. (Idaho Falls, ID) [Idaho Falls, ID; Few, Douglas A. (Idaho Falls, ID) [Idaho Falls, ID

2009-09-08T23:59:59.000Z

191

Sulfur gas geochemical detection of hydrothermal systems. Final report  

SciTech Connect (OSTI)

The purpose of this investigation was to determine whether a system of exploration using sulfur gases was capable of detecting convecting hydrothermal systems. Three surveying techniques were used at the Roosevelt Hot Springs KGRA in Utah. These were (a) a sniffing technique, capable of instantaneous determinations of sulfur gas concentration, (b) an accumulator technique, capable of integrating the sulfur gas emanations over a 30 day interval, and (c) a method of analyzing the soils for vaporous sulfur compounds. Because of limitations in the sniffer technique, only a limited amount of surveying was done with this method. The accumulator and soil sampling techniques were conducted on a 1000 foot grid at Roosevelt Hot Springs, and each sample site was visited three times during the spring of 1980. Thus, three soil samples and two accumulator samples were collected at each site. The results are shown as averages of three soil and two accumulator determinations of sulfur gas concentrations at each site. Soil surveys and accumulator surveys were conducted at two additional KGRA's which were chosen based on the state of knowledge of these hydrothermal systems and upon their differences from Roosevelt Hot Springs in an effort to show that the exploration methods would be effective in detecting geothermal reservoirs in general. The results at Roosevelt Hot Springs, Utah show that each of the three surveying methods was capable of detecting sulfur gas anomalies which can be interpreted to be related to the source at depth, based on resistivity mapping of that source, and also correlatable with major structural features of the area which are thought to be controlling the geometry of the geothermal reservoir. The results of the surveys at Roosevelt did not indicate that either the soil sampling technique or the accumulator technique was superior to the other.

Rouse, G.E.

1984-01-01T23:59:59.000Z

192

c Copyright by James Patrick Lyons, 2003 A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT  

E-Print Network [OSTI]

c Copyright by James Patrick Lyons, 2003 #12;A REPLICATION PROTOCOL FOR AN INTRUSION-TOLERANT SYSTEM DESIGN BY JAMES PATRICK LYONS B.S., University of Pennsylvania, 2000 THESIS Submitted in partial and Family iii #12;Acknowledgments In writing this thesis many people have provided me with invaluable

Illinois at Urbana-Champaign, University of

193

Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project  

E-Print Network [OSTI]

Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project Salvatore J. Stolfo by sensing a misuse or a breach of a security policy and alerting operators to an ongoing (or, at least on a weekly basis reporting that malicious users still succeed in attacking systems with sometimes devastating

Yang, Junfeng

194

Robotic guarded motion system and method  

DOE Patents [OSTI]

A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for repeating, on each iteration through an event timing loop, the acts of defining an event horizon, detecting a range to obstacles around the robot, and testing for an event horizon intrusion. Defining the event horizon includes determining a distance from the robot that is proportional to a current velocity of the robot and testing for the event horizon intrusion includes determining if any range to the obstacles is within the event horizon. Finally, on each iteration through the event timing loop, the method includes reducing the current velocity of the robot in proportion to a loop period of the event timing loop if the event horizon intrusion occurs.

Bruemmer, David J. (Idaho Falls, ID)

2010-02-23T23:59:59.000Z

195

Spreader-Bar Radiation Detection System Enhancements: A Modeling and Simulation Study  

SciTech Connect (OSTI)

This report provides the modeling and simulation results of the investigation of enhanced spreader bar radiation detection systems.

Ely, James H.; Ashbaker, Eric D.; Batdorf, Michael T.; Baciak, James E.; Hensley, Walter K.; Jarman, Kenneth D.; Robinson, Sean M.; Sandness, Gerald A.; Schweppe, John E.

2012-11-13T23:59:59.000Z

196

Less harm, less worry or how to improve network security by bounding system offensiveness  

E-Print Network [OSTI]

been developed (i.e., firewalls, intrusion detection systems, anti- virus, access control systems, etc. Measurements of the implemented prototype show that controlling the outgoing traffic does not affect perfor- mance at the sender machine, when traffic is not hostile. If traffic is hostile, the limited slow down

Cavallaro, Lorenzo

197

System and method for detection of dispersed broadband signals  

DOE Patents [OSTI]

A system and method for detecting the presence of dispersed broadband signals in real time are disclosed. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos[l brace]2[phi](t)[r brace]. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase [phi](t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of [phi][prime](t). 10 figs.

Qian, S.; Dunham, M.E.

1999-06-08T23:59:59.000Z

198

System and method for detection of dispersed broadband signals  

DOE Patents [OSTI]

A system and method for detecting the presence of dispersed broadband signals in real time. The present invention utilizes a bank of matched filters for detecting the received dispersed broadband signals. Each matched filter uses a respective robust time template that has been designed to approximate the dispersed broadband signals of interest, and each time template varies across a spectrum of possible dispersed broadband signal time templates. The received dispersed broadband signal x(t) is received by each of the matched filters, and if one or more matches occurs, then the received data is determined to have signal data of interest. This signal data can then be analyzed and/or transmitted to Earth for analysis, as desired. The system and method of the present invention will prove extremely useful in many fields, including satellite communications, plasma physics, and interstellar research. The varying time templates used in the bank of matched filters are determined as follows. The robust time domain template is assumed to take the form w(t)=A(t)cos{2.phi.(t)}. Since the instantaneous frequency f(t) is known to be equal to the derivative of the phase .phi.(t), the trajectory of a joint time-frequency representation of x(t) is used as an approximation of .phi.'(t).

Qian, Shie (Austin, TX); Dunham, Mark E. (Los Alamos, NM)

1999-06-08T23:59:59.000Z

199

System and method for detecting a faulty object in a system  

DOE Patents [OSTI]

A method (and system) for detecting at least one faulty object in a system including a plurality of objects in communication with each other in an n-dimensional architecture, includes probing a first plane of objects in the n-dimensional architecture and probing at least one other plane of objects in the n-dimensional architecture which would result in identifying a faulty object in the system.

Gunnels, John A. (Brewster, NY); Gustavson, Fred Gehrung (Briarcliff Manor, NY); Engle, Robert Daniel (St. Louis, MO)

2010-12-14T23:59:59.000Z

200

'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State  

SciTech Connect (OSTI)

This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

Miles McQueen; Annarita Giani

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Non-intrusive ultrasonic liquid-in-line detector for small diameter tubes. [Patent application  

DOE Patents [OSTI]

An arrangement for detecting liquids in a line, using non-intrusive ultrasonic techniques is disclosed. In this arrangement, four piezoelectric crystals are arranged in pairs about a 0.078 inch o.d. pipe. An ultrasonic tone burst is transmitted along the pipe, between crystal pairs, and the amplitude of the received tone burst indicates the absence/presence of liquid in the pipe.

Piper, T.C.

1980-09-24T23:59:59.000Z

202

Marine geophysical study of cyclic sedimentation and shallow sill intrusion in the floor of the Central Gulf of California  

E-Print Network [OSTI]

magmatic intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic mudsas off-axis intrusions into unconsolidated hemipelagic muds

Kluesner, Jared W.

2011-01-01T23:59:59.000Z

203

Protein- protein interaction detection system using fluorescent protein microdomains  

DOE Patents [OSTI]

The invention provides a protein labeling and interaction detection system based on engineered fragments of fluorescent and chromophoric proteins that require fused interacting polypeptides to drive the association of the fragments, and further are soluble and stable, and do not change the solubility of polypeptides to which they are fused. In one embodiment, a test protein X is fused to a sixteen amino acid fragment of GFP (.beta.-strand 10, amino acids 198-214), engineered to not perturb fusion protein solubility. A second test protein Y is fused to a sixteen amino acid fragment of GFP (.beta.-strand 11, amino acids 215-230), engineered to not perturb fusion protein solubility. When X and Y interact, they bring the GFP strands into proximity, and are detected by complementation with a third GFP fragment consisting of GFP amino acids 1-198 (strands 1-9). When GFP strands 10 and 11 are held together by interaction of protein X and Y, they spontaneous association with GFP strands 1-9, resulting in structural complementation, folding, and concomitant GFP fluorescence.

Waldo, Geoffrey S. (Santa Fe, NM); Cabantous, Stephanie (Los Alamos, NM)

2010-02-23T23:59:59.000Z

204

A ring system detected around the Centaur (10199) Chariklo  

E-Print Network [OSTI]

Until now, rings have been detected in the Solar System exclusively around the four giant planets. Here we report the discovery of the first minor-body ring system around the Centaur object (10199) Chariklo, a body with equivalent radius 124$\\pm$9 km. A multi-chord stellar occultation revealed the presence of two dense rings around Chariklo, with widths of about 7 km and 3 km, optical depths 0.4 and 0.06, and orbital radii 391 and 405 km, respectively. The present orientation of the ring is consistent with an edge-on geometry in 2008, thus providing a simple explanation for the dimming of Chariklo's system between 1997 and 2008, and for the gradual disappearance of ice and other absorption features in its spectrum over the same period. This implies that the rings are partially composed of water ice. These rings may be the remnants of a debris disk, which were possibly confined by embedded kilometre-sized satellites.

Braga-Ribas, F; Ortiz, J L; Snodgrass, C; Roques, F; Vieira-Martins, R; Camargo, J I B; Assafin, M; Duffard, R; Jehin, E; Pollock, J; Leiva, R; Emilio, M; Machado, D I; Colazo, C; Lellouch, E; Skottfelt, J; Gillon, M; Ligier, N; Maquet, L; Benedetti-Rossi, G; Gomes, A Ramos; Kervella, P; Monteiro, H; Sfair, R; Moutamid, M El; Tancredi, G; Spagnotto, J; Maury, A; Morales, N; Gil-Hutton, R; Roland, S; Ceretta, A; Gu, S -h; Wang, X -b; Harpsře, K; Rabus, M; Manfroid, J; Opitom, C; Vanzi, L; Mehret, L; Lorenzini, L; Schneiter, E M; Melia, R; Lecacheux, J; Colas, F; Vachier, F; Widemann, T; Almenares, L; Sandness, R G; Char, F; Perez, V; Lemos, P; Martinez, N; Jřrgensen, U G; Dominik, M; Roig, F; Reichart, D E; LaCluyze, A P; Haislip, J B; Ivarsen, K M; Moore, J P; Frank, N R; Lambas, D G

2014-01-01T23:59:59.000Z

205

Detection of the Water Reservoir in a Forming Planetary System  

E-Print Network [OSTI]

Icy bodies may have delivered the oceans to the early Earth, yet little is known about water in the ice-dominated regions of extra-solar planet-forming disks. The Heterodyne Instrument for the Far-Infrared on-board the Herschel Space Observatory has detected emission from both spin isomers of cold water vapor from the disk around the young star TW Hydrae. This water vapor likely originates from ice-coated solids near the disk surface hinting at a water ice reservoir equivalent to several thousand Earth Oceans in mass. The water's ortho-to-para ratio falls well below that of Solar System comets, suggesting that comets contain heterogeneous ice mixtures collected across the entire solar nebula during the early stages of planetary birth.

Hogerheijde, Michiel R; Brinch, Christian; Cleeves, L Ilsedore; Fogel, Jeffrey K J; Blake, Geoffrey A; Dominik, Carsten; Lis, Dariusz C; Melnick, Gary; Neufeld, David; Panic, Olja; Pearson, John C; Kristensen, Lars; Yildiz, Umut A; van Dishoeck, Ewine F

2011-01-01T23:59:59.000Z

206

Systems and methods for detecting x-rays  

DOE Patents [OSTI]

Systems and methods for detecting x-rays are disclosed herein. One or more x-ray-sensitive scintillators can be configured from a plurality of heavy element nano-sized particles and a plastic material, such as polystyrene. As will be explained in greater detail herein, the heavy element nano-sized particles (e.g., PbWO4) can be compounded into the plastic material with at least one dopant that permits the plastic material to scintillate. X-rays interact with the heavy element nano-sized particles to produce electrons that can deposit energy in the x-ray sensitive scintillator, which in turn can produce light.

Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

2006-05-02T23:59:59.000Z

207

Comparison of enclosed space detection system with conventional methods  

SciTech Connect (OSTI)

Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as long as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.

Kercel, S.W.; Baylor, V.M.; Labaj, L.E.

1997-09-01T23:59:59.000Z

208

Technical specifications manual for the MARK-1 pulsed ionizing radiation detection system. Volume 1  

SciTech Connect (OSTI)

The MARK-1 detection system was developed by the Idaho National Engineering Laboratory for the US Department of Energy Office of Arms Control and Nonproliferation. The completely portable system was designed for the detection and analysis of intense photon emissions from pulsed ionizing radiation sources. This manual presents the technical design specifications for the MARK-1 detection system and was written primarily to assist the support or service technician in the service, calibration, and repair of the system. The manual presents the general detection system theory, the MARK-1 component design specifications, the acquisition and control software, the data processing sequence, and the system calibration procedure. A second manual entitled: Volume 2: Operations Manual for the MARK-1 Pulsed Ionizing Radiation Detection System (USDOE Report WINCO-1108, September 1992) provides a general operational description of the MARK-1 detection system. The Operations Manual was written primarily to assist the field operator in system operations and analysis of the data.

Lawrence, R.S.; Harker, Y.D.; Jones, J.L.; Hoggan, J.M.

1993-03-01T23:59:59.000Z

209

Profile-based adaptive anomaly detection for network security.  

SciTech Connect (OSTI)

As information systems become increasingly complex and pervasive, they become inextricably intertwined with the critical infrastructure of national, public, and private organizations. The problem of recognizing and evaluating threats against these complex, heterogeneous networks of cyber and physical components is a difficult one, yet a solution is vital to ensuring security. In this paper we investigate profile-based anomaly detection techniques that can be used to address this problem. We focus primarily on the area of network anomaly detection, but the approach could be extended to other problem domains. We investigate using several data analysis techniques to create profiles of network hosts and perform anomaly detection using those profiles. The ''profiles'' reduce multi-dimensional vectors representing ''normal behavior'' into fewer dimensions, thus allowing pattern and cluster discovery. New events are compared against the profiles, producing a quantitative measure of how ''anomalous'' the event is. Most network intrusion detection systems (IDSs) detect malicious behavior by searching for known patterns in the network traffic. This approach suffers from several weaknesses, including a lack of generalizability, an inability to detect stealthy or novel attacks, and lack of flexibility regarding alarm thresholds. Our research focuses on enhancing current IDS capabilities by addressing some of these shortcomings. We identify and evaluate promising techniques for data mining and machine-learning. The algorithms are ''trained'' by providing them with a series of data-points from ''normal'' network traffic. A successful algorithm can be trained automatically and efficiently, will have a low error rate (low false alarm and miss rates), and will be able to identify anomalies in ''pseudo real-time'' (i.e., while the intrusion is still in progress, rather than after the fact). We also build a prototype anomaly detection tool that demonstrates how the techniques might be integrated into an operational intrusion detection framework.

Zhang, Pengchu C. (Sandia National Laboratories, Albuquerque, NM); Durgin, Nancy Ann

2005-11-01T23:59:59.000Z

210

Termination Detection in an Asynchronous Distributed System with Crash-Recovery  

E-Print Network [OSTI]

Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures Felix C 75083, USA 1 Termination Detection In practice, it cannot easily be detected whether a computation running in a distributed system has terminated or not. Thus, suitable observing algorithms are required

Mittal, Neeraj

211

Real-time system for imaging and object detection with a multistatic GPR array  

DOE Patents [OSTI]

A method and system for detecting the presence of subsurface objects within a medium is provided. In some embodiments, the imaging and detection system operates in a multistatic mode to collect radar return signals generated by an array of transceiver antenna pairs that is positioned across the surface and that travels down the surface. The imaging and detection system pre-processes the return signal to suppress certain undesirable effects. The imaging and detection system then generates synthetic aperture radar images from real aperture radar images generated from the pre-processed return signal. The imaging and detection system then post-processes the synthetic aperture radar images to improve detection of subsurface objects. The imaging and detection system identifies peaks in the energy levels of the post-processed image frame, which indicates the presence of a subsurface object.

Paglieroni, David W; Beer, N Reginald; Bond, Steven W; Top, Philip L; Chambers, David H; Mast, Jeffrey E; Donetti, John G; Mason, Blake C; Jones, Steven M

2014-10-07T23:59:59.000Z

212

Policy-controlled Event Management for Distributed Intrusion Detection  

E-Print Network [OSTI]

building blocks for the formulation of a site's security policy since its conception. A recent addition

Sommer, Robin

213

A Continuous Time Bayesian Network Approach for Intrusion Detection  

E-Print Network [OSTI]

3 for more details). The ESS for any variable X in a CTBNwhen event P i can happen. The ESS we need are M P i |U Pi :occur when U = U p i , the ESS M P i |U Pi is just M P i ,

Xu, Jing

2010-01-01T23:59:59.000Z

214

anomaly intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Creation via Clustering Anomalies Gilbert R. Hendry and Shanchieh J. Yang apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work...

215

Automatic compilation framework for Bloom filter based intrusion detection  

E-Print Network [OSTI]

the FPGA fabric of a CSoC device. In the execution model underlying ROCCC, sequential computations are carried out on the microprocessor in the CSoC, while the compute intensive code segments are mapped onto

Najjar, Walid A.

216

Intrusion Detecting Using Secure Signatures - Energy Innovation Portal  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared LandResponses to EngineeredADepartment of1999Two SignElectricity

217

Improvements to a queue and delay estimation algorithm utilized in video imaging vehicle detection systems  

E-Print Network [OSTI]

Video Imaging Vehicle Detection Systems (VIVDS) are steadily becoming the dominant method for the detection of vehicles at a signalized traffic approach. This research is intended to investigate the improvement of a queue and delay estimation...

Cheek, Marshall Tyler

2007-09-17T23:59:59.000Z

218

Nuisance Source Population Modeling for Radiation Detection System Analysis  

SciTech Connect (OSTI)

A major challenge facing the prospective deployment of radiation detection systems for homeland security applications is the discrimination of radiological or nuclear 'threat sources' from radioactive, but benign, 'nuisance sources'. Common examples of such nuisance sources include naturally occurring radioactive material (NORM), medical patients who have received radioactive drugs for either diagnostics or treatment, and industrial sources. A sensitive detector that cannot distinguish between 'threat' and 'benign' classes will generate false positives which, if sufficiently frequent, will preclude it from being operationally deployed. In this report, we describe a first-principles physics-based modeling approach that is used to approximate the physical properties and corresponding gamma ray spectral signatures of real nuisance sources. Specific models are proposed for the three nuisance source classes - NORM, medical and industrial. The models can be validated against measured data - that is, energy spectra generated with the model can be compared to actual nuisance source data. We show by example how this is done for NORM and medical sources, using data sets obtained from spectroscopic detector deployments for cargo container screening and urban area traffic screening, respectively. In addition to capturing the range of radioactive signatures of individual nuisance sources, a nuisance source population model must generate sources with a frequency of occurrence consistent with that found in actual movement of goods and people. Measured radiation detection data can indicate these frequencies, but, at present, such data are available only for a very limited set of locations and time periods. In this report, we make more general estimates of frequencies for NORM and medical sources using a range of data sources such as shipping manifests and medical treatment statistics. We also identify potential data sources for industrial source frequencies, but leave the task of estimating these frequencies for future work. Modeling of nuisance source populations is only useful if it helps in understanding detector system performance in real operational environments. Examples of previous studies in which nuisance source models played a key role are briefly discussed. These include screening of in-bound urban traffic and monitoring of shipping containers in transit to U.S. ports.

Sokkappa, P; Lange, D; Nelson, K; Wheeler, R

2009-10-05T23:59:59.000Z

219

Extended Research on Detection of Deception Using Volatile Organic Compound (VOC) Emissions  

SciTech Connect (OSTI)

A system that captures and analyzes volatile organic compound (VOC) emissions from skin surfaces may offer a viable alternative method to the polygraph instrument currently in use for detecting deception in U.S. government settings. Like the involuntary autonomic central nervous system response data gathered during polygraph testing, VOC emissions from the skin may provide data that can be used to detect stress caused by deception. Detecting VOCs, then, may present a noninvasive, non-intrusive method for observing, recording, and quantifying evidence of stress or emotional change.

Center for Human Reliability Studies

2006-06-01T23:59:59.000Z

220

E-Print Network 3.0 - austurhorn intrusive complex Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Considering Attack Complexity: Layered Intrusion Tolerance C. Taylor, A.W. Krings, W.S. Harrison, N... , hierarchical approach to intrusion tolerance based on the complexity...

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Expert judgment on markers to deter inadvertent human intrusion into the Waste Isolation Pilot Plant  

SciTech Connect (OSTI)

The expert panel identified basic principles to guide current and future marker development efforts: (1) the site must be marked, (2) message(s) must be truthful and informative, (3) multiple components within a marker system, (4) multiple means of communication (e.g., language, pictographs, scientific diagrams), (5) multiple levels of complexity within individual messages on individual marker system elements, (6) use of materials with little recycle value, and (7) international effort to maintain knowledge of the locations and contents of nuclear waste repositories. The efficacy of the markers in deterring inadvertent human intrusion was estimated to decrease with time, with the probability function varying with the mode of intrusion (who is intruding and for what purpose) and the level of technological development of the society. The development of a permanent, passive marker system capable of surviving and remaining interpretable for 10,000 years will require further study prior to implementation.

Trauth, K.M. [Sandia National Labs., Albuquerque, NM (United States); Hora, S.C. [Hawaii Univ., Hilo, HI (United States); Guzowski, R.V. [Science Applications International Corp., San Diego, CA (United States)

1993-11-01T23:59:59.000Z

222

Unintended filtering in a typical photodiode detection system for optical tweezers  

E-Print Network [OSTI]

Unintended filtering in a typical photodiode detection system for optical tweezers Kirstine Berg-PIN photodiode and a laser with wavelength 1064 nm, a system commonly used with optical tweezers. We chopped Institute of Physics. DOI: 10.1063/1.1554755 I. INTRODUCTION Photodiode based detection systems are used

Texas at Austin. University of

223

A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS  

E-Print Network [OSTI]

1 A CONTROLLER FOR HVAC SYSTEMS WITH FAULT DETECTION CAPABILITIES BASED ON SIMULATION MODELS T. I describes a control scheme with fault detection capabilities suitable for application to HVAC systems as a reference of correct operation. Faults that occur in the HVAC system under control cause the PI

224

E-Print Network 3.0 - alpha detection system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Methods based on the fluctuations in the number of detected neutrons in a subcritical system... (Rossi-alpha) methods, are used to determine the subcritical reactivity...

225

Detecting Global Predicates in Distributed Systems with Clocks Scott D. Stoller  

E-Print Network [OSTI]

detection modalities, i.e., 3 meanings of \\predicate held during a computation", namely: PossdbDetecting Global Predicates in Distributed Systems with Clocks Scott D. Stoller Computer Science"). This paper de nes these modalities and gives e cient algorithms for detecting them. The algorithms are based

Stoller, Scott

226

BLIND MULTIUSER DETECTION AND INTERFERENCE CANCELLATION IN DSCDMA MOBILE RADIO SYSTEMS  

E-Print Network [OSTI]

BLIND MULTIUSER DETECTION AND INTERFERENCE CANCELLATION IN DS­CDMA MOBILE RADIO SYSTEMS Samir USA ABSTRACT This paper deals with blind adaptive multiuser detection and interference cancellation presents a two­stage blind adaptive receiver architecture which car­ ries out multiuser detection using

Huang, Yih-Fang

227

Design of a decentralized detection filter for a class of interconnected LTI systems  

E-Print Network [OSTI]

In this thesis, we consider the problem of designing a decentralized detection filter for a class of homogeneous interconnected systems. In this class of systems, all subsystems have an identical structure. A fault in a subsystem propagates via...

Shankar, Shamanth

2001-01-01T23:59:59.000Z

228

A Qualitive Modeling Approach for Fault Detection and Diagnosis on HVAC Systems  

E-Print Network [OSTI]

This paper describes the basics and first test results of a model based approach using qualitative modeling to perform Fault Detection and Diagnostics (FDD) on HVAC and R systems. A quantized system describing the qualitative behavior of a...

Muller, T.; Rehault, N.; Rist, T.

2013-01-01T23:59:59.000Z

229

POWER SYSTEM LINE OUTAGE DETECTION AND IDENTIFICATION --A QUICKEST CHANGE DETECTION APPROACH  

E-Print Network [OSTI]

on accurate records and telemetry data. Such de- ficiencies in situational awareness, including knowledge of the incre- mental change in voltage angle measurements. By processing this data sequentially, we employ detection and/or iden- tification consider the phase difference between two sets of PMU voltage measurements

Liberzon, Daniel

230

Element One Reduces Cost of Hydrogen Leak Detection Systems ...  

Energy Savers [EERE]

Begins for "America's Next Top Energy Innovator" SiNode Systems - Advanced silicon graphene batteries. | Photo courtesy of Sinode Systems. Startup Success: Energy Department...

231

Attacks Against Process Control Systems: Risk Assessment, Detection, and Response  

E-Print Network [OSTI]

research problems for securing control systems when compared to securing traditional information technology technology (IT) systems connected to the physical world. Depending on the application, these control systems (DCS) or Cyber-Physical Systems (CPS) (to refer to embedded sensor and actuator networks). Control

Hu, Fei

232

Flight Testing of an Advanced Airborne Natural Gas Leak Detection System  

SciTech Connect (OSTI)

ITT Industries Space Systems Division (Space Systems) has developed an airborne natural gas leak detection system designed to detect, image, quantify, and precisely locate leaks from natural gas transmission pipelines. This system is called the Airborne Natural Gas Emission Lidar (ANGEL) system. The ANGEL system uses a highly sensitive differential absorption Lidar technology to remotely detect pipeline leaks. The ANGEL System is operated from a fixed wing aircraft and includes automatic scanning, pointing system, and pilot guidance systems. During a pipeline inspection, the ANGEL system aircraft flies at an elevation of 1000 feet above the ground at speeds of between 100 and 150 mph. Under this contract with DOE/NETL, Space Systems was funded to integrate the ANGEL sensor into a test aircraft and conduct a series of flight tests over a variety of test targets including simulated natural gas pipeline leaks. Following early tests in upstate New York in the summer of 2004, the ANGEL system was deployed to Casper, Wyoming to participate in a set of DOE-sponsored field tests at the Rocky Mountain Oilfield Testing Center (RMOTC). At RMOTC the Space Systems team completed integration of the system and flew an operational system for the first time. The ANGEL system flew 2 missions/day for the duration for the 5-day test. Over the course of the week the ANGEL System detected leaks ranging from 100 to 5,000 scfh.

Dawn Lenz; Raymond T. Lines; Darryl Murdock; Jeffrey Owen; Steven Stearns; Michael Stoogenke

2005-10-01T23:59:59.000Z

233

High-speed and high-fidelity system and method for collecting network traffic  

DOE Patents [OSTI]

A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

Weigle, Eric H. (Los Alamos, NM)

2010-08-24T23:59:59.000Z

234

The Nuclear Detonation Detection System on the GPS satellites  

SciTech Connect (OSTI)

This article begins with a historical perspective of satellite usage in monitoring nuclear detonations. Current capabilities of the 24 GPS satellites in detecting the light, gamma rays, x-rays and neutrons from a nuclear explosion are described. In particular, an optical radiometer developed at Sandia National Laboratories is characterized. Operational information and calibration procedures are emphasized.

Higbie, P.R. [Los Alamos National Lab., NM (United States); Blocker, N.K. [Sandia National Labs., Albuquerque, NM (United States)

1993-07-27T23:59:59.000Z

235

Systems and methods for detecting a flame in a fuel nozzle of a gas turbine  

DOE Patents [OSTI]

A system may detect a flame about a fuel nozzle of a gas turbine. The gas turbine may have a compressor and a combustor. The system may include a first pressure sensor, a second pressure sensor, and a transducer. The first pressure sensor may detect a first pressure upstream of the fuel nozzle. The second pressure sensor may detect a second pressure downstream of the fuel nozzle. The transducer may be operable to detect a pressure difference between the first pressure sensor and the second pressure sensor.

Kraemer, Gilbert Otto; Storey, James Michael; Lipinski, John; Mestroni, Julio Enrique; Williamson, David Lee; Marshall, Jason Randolph; Krull, Anthony

2013-05-07T23:59:59.000Z

236

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) Sentries and Sleepers in Sensor Networks  

E-Print Network [OSTI]

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS for military, environmental or commercial applications such as intrusion detection [2], disaster monitor- ing sensors save their energy and lengthen the lifetime of their batteries, without significantly degrading

Arora, Anish

237

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS 2004) Sentries and Sleepers in Sensor Networks  

E-Print Network [OSTI]

Appears in Proceedings of 8th International Conference on Principles of Distributed Systems (OPODIS can be used for military, environmental or commercial applications such as intrusion detection [2 degrading the performance of the applica­ tions running on the sensor network. Examples of this approach can

Gouda, Mohamed G.

238

Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems  

E-Print Network [OSTI]

, which in the case of control systems may impact physical processes causing environmental harm or injury architectures typical of control system implementations. Index Terms--critical infrastructure security, control.lastname@sri.com Abstract--Digital control systems are essential to the safe and efficient operation of a variety

Briesemeister, Linda

239

Project of the underwater system for chemical threat detection  

E-Print Network [OSTI]

In this article we describe a novel method for the detection of explosives and other hazardous substances in the marine environment using neutron activation. Unlike the other considered methods based on this technique we propose to use guides forneutron and gamma quanta which speeds up and simplifies identification. Moreover, it may provide a determination of the density distribution of a dangerous substance. First preliminary results of Monte Carlo simulations dedicated for design of a device exploiting this method are also presented.

Silarski, M; Moskal, P; Smolis, M; Tadeja, S

2015-01-01T23:59:59.000Z

240

Circuitry, systems and methods for detecting magnetic fields  

DOE Patents [OSTI]

Circuitry for detecting magnetic fields includes a first magnetoresistive sensor and a second magnetoresistive sensor configured to form a gradiometer. The circuitry includes a digital signal processor and a first feedback loop coupled between the first magnetoresistive sensor and the digital signal processor. A second feedback loop which is discrete from the first feedback loop is coupled between the second magnetoresistive sensor and the digital signal processor.

Kotter, Dale K. (Shelley, ID) [Shelley, ID; Spencer, David F. (Idaho Falls, ID) [Idaho Falls, ID; Roybal, Lyle G. (Idaho Falls, ID) [Idaho Falls, ID; Rohrbaugh, David T. (Idaho Falls, ID) [Idaho Falls, ID

2010-09-14T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Systems and methods of detecting force and stress using tetrapod nanocrystal  

DOE Patents [OSTI]

Systems and methods of detecting force on the nanoscale including methods for detecting force using a tetrapod nanocrystal by exposing the tetrapod nanocrystal to light, which produces a luminescent response by the tetrapod nanocrystal. The method continues with detecting a difference in the luminescent response by the tetrapod nanocrystal relative to a base luminescent response that indicates a force between a first and second medium or stresses or strains experienced within a material. Such systems and methods find use with biological systems to measure forces in biological events or interactions.

Choi, Charina L.; Koski, Kristie J.; Sivasankar, Sanjeevi; Alivisatos, A. Paul

2013-08-20T23:59:59.000Z

242

attack detection system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

243

Fault Detection and Diagnosis in Building HVAC Systems.  

E-Print Network [OSTI]

??Building HVAC systems account for more than 30% of annual energy consumption in United States. However, it has become apparent that only in a small… (more)

Najafi, Massieh

2010-01-01T23:59:59.000Z

244

Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design  

E-Print Network [OSTI]

Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

Pasqualetti, Fabio; Bullo, Francesco

2012-01-01T23:59:59.000Z

245

Optically Detected Magnetic Resonance Studies on ?-conjugated semiconductor systems  

SciTech Connect (OSTI)

Optically Detected Magnetic Resonance (ODMR) techniques were used to investigate the dynamics of excitons and charge carriers in ?-conjugated organic semiconductors. Degradation behavior of the negative spin-1/2 electroluminescence-detected magnetic resonance (ELDMR) was observed in Alq3 devices. The increase in the resonance amplitude implies an increasing bipolaron formation during degradation, which might be the result of growth of charge traps in the device. The same behavior of the negative spin-1/2 ELDMR was observed in 2wt% Rubrene doped Tris(8-hydroxyquinolinato)aluminium (Alq3) devices. However, with increasing injection current, a positive spin-1/2 ELDMR, together with positive spin 1 triplet powder patterns at {delta}m{sub S}={+-}1 and {delta}m{sub S}={+-}2, emerges. Due to the similarities in the frequency dependences of single and double modulated ELDMR and the photoluminescence-detected magnetic resonance (PLDMR) results in poly[2-methoxy-5-(2 -ethyl-hexyloxy)-1,4-phenyl ene vinylene] (MEH-PPV) films, the mechanism for this positive spin-1/2 ELDMR was assigned to enhanced triplet-polaron quenching under resonance conditions. The ELDMR in rubrene doped Alq3 devices provides a path to investigate charge distribution in the device under operational conditions. Combining the results of several devices with different carrier blocking properties and the results from transient EL, it was concluded trions not only exist near buffer layer but also exist in the electron transport layer. This TPQ model can also be used to explain the positive spin-1/2 PLDMR in poly(3-hexylthiophene) (P3HT) films at low temperature and in MEH-PPV films at various temperatures up to room temperature. Through quantitative analysis, TE-polaron quenching (TPQ) model is shown having the ability to explain most behaviors of the positive spin-1/2 resonance. Photocurrent detected magnetic resonance (PCDMR) studies on MEH-PPV devices revealed a novel transient resonance signal. The signal may originate from the higher concentration of deep traps near cathode. A quantitative analysis based on this assumption was carried out and found to be consistent with the experimental results.

Chen, Ying

2011-12-06T23:59:59.000Z

246

System for detecting acoustic emissions in multianvil experiments: Application to deep seismicity in the Earth  

E-Print Network [OSTI]

System for detecting acoustic emissions in multianvil experiments: Application to deep seismicity be responsible for the occurrence of earthquakes. Detecting acoustic emissions from a specimen during faulting acoustic emissions under HPHT conditions, due to technical challenges. And those studies have used only one

Jung, Haemyeong

247

A Multimodal Fuzzy Inference System Using a Continuous Facial Expression Representation for Emotion Detection  

E-Print Network [OSTI]

Pro- cessing and Computer Vision]: Image Representation; I.5.1 [Pattern Recognition]: ModelsA Multimodal Fuzzy Inference System Using a Continuous Facial Expression Representation for Emotion a multimodal fuzzy inference system for emotion detection. The system extracts and merges visual, acoustic

Pelachaud, Catherine

248

Robot design for leak detection in water-pipe systems  

E-Print Network [OSTI]

Leaks are major problem that occur in the water pipelines all around the world. Several reports indicate loss of around 20 to 30 percent of water in the distribution of water through water pipe systems. Such loss of water ...

Choi, Changrak

2012-01-01T23:59:59.000Z

249

Towards a Learning Traffic Incident Detection System Tomas Singliar and Milos Hauskrecht  

E-Print Network [OSTI]

manual tuning. Our hypoth- esis is that these time-consuming solutions can be sucessfuly eliminated of sensor networks on US roadways. Incident detection systems (IDS) are complex arrange- ments

Hauskrecht, Milos

250

Remote Fault Detection of Building HVAC System Using a Global Optimization Program  

E-Print Network [OSTI]

fault detection method using the global optimization program Solver® (Frontline Systems, 2000) coupled to a simplified simulation program, which is a coding of the ASHRAE 'Simplified Energy Analysis Procedure' (Knebel, 1983). This approach uses...

Lee, S. U.; Claridge, D. E.

2004-01-01T23:59:59.000Z

251

On adaptive transmission, signal detection and channel estimation for multiple antenna systems  

E-Print Network [OSTI]

This research concerns analysis of system capacity, development of adaptive transmission schemes with known channel state information at the transmitter (CSIT) and design of new signal detection and channel estimation schemes with low complexity...

Xie, Yongzhe

2004-11-15T23:59:59.000Z

252

Visual detectability analysis associate: a knowledge-based system  

E-Print Network [OSTI]

, Fischer (1982) points out, knowledge-based systems may be used as tools capable of expanding human potential, and Barr and Feigenbaum (1982, p. 81) go on to state that ". . . many systems can be viewed as consultants that formulate opinions and give.... ) describes AI as ". . . the science of making machines do things that would require intelligence if done by man. " Barr and Feigenbaum (1982) describe AI as a branch of computer science which involves the 20 study of the relationship between computation...

Haverda, Tony Houston

1989-01-01T23:59:59.000Z

253

Design and evaluation of the ReKon : an integrated detection and assessment perimeter system.  

SciTech Connect (OSTI)

Kontek Industries (Kannapolis, NC) and their subsidiary, Stonewater Control Systems (Kannapolis, NC), have entered into a cooperative research and development agreement with Sandia to jointly develop and evaluate an integrated perimeter security system solution, one that couples access delay with detection and assessment. This novel perimeter solution was designed to be configurable for use at facilities ranging from high-security military sites to commercial power plants, to petro/chemical facilities of various kinds. A prototype section of the perimeter has been produced and installed at the Sandia Test and Evaluation Center in Albuquerque, NM. This prototype system integrated fiber optic break sensors, active infrared sensors, fence disturbance sensors, video motion detection, and ground sensors. This report documents the design, testing, and performance evaluation of the developed ReKon system. The ability of the system to properly detect pedestrian or vehicle attempts to bypass, breach, or otherwise defeat the system is characterized, as well as the Nuisance Alarm Rate.

Dabling, Jeffrey Glenn; Andersen, Jason Jann; McLaughlin, James O. [Stonewater Control Systems, Inc., Kannapolis, NC

2013-02-01T23:59:59.000Z

254

Radiation detection system for portable gamma-ray spectroscopy  

DOE Patents [OSTI]

A portable gamma ray detection apparatus having a gamma ray detector encapsulated by a compact isolation structure having at least two volumetrically-nested enclosures where at least one is a thermal shield. The enclosures are suspension-mounted to each other to successively encapsulate the detector without structural penetrations through the thermal shields. A low power cooler is also provided capable of cooling the detector to cryogenic temperatures without consuming cryogens, due to the heat load reduction by the isolation structure and the reduction in the power requirements of the cooler. The apparatus also includes a lightweight portable power source for supplying power to the apparatus, including to the cooler and the processing means, and reducing the weight of the apparatus to enable handheld operation or toting on a user's person.

Rowland, Mark S. (Alamo, CA); Howard, Douglas E. (Livermore, CA); Wong, James L. (Dublin, CA); Jessup, James L. (Tracy, CA); Bianchini, Greg M. (Livermore, CA); Miller, Wayne O. (Livermore, CA)

2006-06-20T23:59:59.000Z

255

Leak detection systems for uranium mill tailings impoundments with synthetic liners  

SciTech Connect (OSTI)

This study evaluated the performance of existing and alternative leak detection systems for lined uranium mill tailings ponds. Existing systems for detecting leaks at uranium mill tailings ponds investigated in this study included groundwater monitoring wells, subliner drains, and lysimeters. Three alternative systems which demonstrated the ability to locate leaks in bench-scale tests included moisture blocks, soil moisture probes, and a soil resistivity system. Several other systems in a developmental stage are described. For proper performance of leak detection systems (other than groundwater wells and lysimeters), a subgrade is required which assures lateral dispersion of a leak. Methods to enhance dispersion are discussed. Cost estimates were prepared for groundwater monitoring wells, subliner drain systems, and the three experimental systems. Based on the results of this report, it is suggested that groundwater monitoring systems be used as the primary means of leak detection. However, if a more responsive system is required due to site characteristics and groundwater quality criteria, subliner drains are applicable for ponds with uncovered liners. Leak-locating systems for ponds with covered liners require further development. Other recommendations are discussed in the report.

Myers, D.A.; Tyler, S.W.; Gutknecht, P.J.; Mitchell, D.H.

1983-09-01T23:59:59.000Z

256

Power System Extreme Event Detection: The VulnerabilityFrontier  

SciTech Connect (OSTI)

In this work we apply graph theoretic tools to provide aclose bound on a frontier relating the number of line outages in a gridto the power disrupted by the outages. This frontier describes theboundary of a space relating the possible severity of a disturbance interms of power disruption, from zero to some maximum on the boundary, tothe number line outages involved in the event. We present the usefulnessof this analysis with a complete analysis of a 30 bus system, and presentresults for larger systems.

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-10-17T23:59:59.000Z

257

Simulation and modeling for the stand-off radiation detection system (SORDS) using GEANT4  

SciTech Connect (OSTI)

A Stand-Off Radiation Detection System (SORDS) is being developed through a joint effort by Raytheon, Los Alamos National Laboratory, Bubble Technology Industries, Radiation Monitoring Devices, and the Massachusetts Institute of Technology, for the Domestic Nuclear Detection Office (DNDO). The system is a mobile truck-based platform performing detection, imaging, and spectroscopic identification of gamma-ray sources. A Tri-Modal Imaging (TMI) approach combines active-mask coded aperture imaging, Compton imaging, and shadow imaging techniques. Monte Carlo simulation and modeling using the GEANT4 toolkit was used to generate realistic data for the development of imaging algorithms and associated software code.

Hoover, Andrew S [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Mocko, Michal [Los Alamos National Laboratory; Palmer, David [Los Alamos National Laboratory; Schultz, Larry [Los Alamos National Laboratory; Tornga, Shawn [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

258

PERFORMANCE OF A NOVEL FAST TRANSIENTS DETECTION SYSTEM  

SciTech Connect (OSTI)

We investigate the signal-to-noise ratio (S/N) of a new incoherent dedispersion algorithm optimized for FPGA-based architectures intended for deployment on the Australian SKA Pathfinder and other Square Kilometre Array precursors for fast transients surveys. Unlike conventional CPU- and GPU-optimized incoherent dedispersion algorithms, this algorithm has the freedom to maximize the S/N by way of programmable dispersion profiles that enable the inclusion of different numbers of time samples per spectral channel. This allows, for example, more samples to be summed at lower frequencies where intra-channel dispersion smearing is larger, or it could even be used to optimize the dedispersion sum for steep spectrum sources. Our analysis takes into account the intrinsic pulse width, scatter broadening, spectral index and dispersion measure of the signal, and the system's frequency range, spectral and temporal resolution, and number of trial dedispersions. We show that the system achieves better than 80% of the optimal S/N where the temporal resolution and the intra-channel smearing time are smaller than a quarter of the average width of the pulse across the system's frequency band (after including scatter smearing). Coarse temporal resolutions suffer a {Delta}t {sup -1/2} decay in S/N, and coarse spectral resolutions cause a {Delta}{nu}{sup -1/2} decay in S/N, where {Delta}t and {Delta}{nu} are the temporal and spectral resolutions of the system, respectively. We show how the system's S/N compares with that of matched filter and boxcar filter detectors. We further present a new algorithm for selecting trial dispersion measures for a survey that maintains a given minimum S/N performance across a range of dispersion measures.

Clarke, Nathan [ICRAR/Curtin University, Bentley, WA 6845 (Australia)] [ICRAR/Curtin University, Bentley, WA 6845 (Australia); Macquart, Jean-Pierre; Trott, Cathryn, E-mail: N.Clarke@curtin.edu.au [ARC Centre of Excellence for All-Sky Astrophysics (CAASTRO) (Australia)] [ARC Centre of Excellence for All-Sky Astrophysics (CAASTRO) (Australia)

2013-03-01T23:59:59.000Z

259

Two years of detecting DM objects - the Solar system members  

E-Print Network [OSTI]

With a probability >99% there are grounds to believe that our works on detection of the Dark Electric Matter Objects (daemons), which were lauched in 1996, are crowned with success. The daemons are the relic elementary Planckian black holes(m~30 microgramme) carrying stable electric charge of Ze=10e. During the last two years, the detector made of two horizontal ZnS(Ag) screens of 1 m^2 area has been recording the correlated time-shifted scintillations corresponding to flux 10^-5 m^-2 s^-1 of extraordinary penetrating nuclear-active particles which moved both down and upward with velocity of only \\~5-30 km/s. The flux experiences seasonal variations with maxima supposedly corresponding to the Earth transition through shadow and anti-shadow created by the Sun in its motion relative the Galaxy disk daemon population. An accumulation of negative daemons, which stimulate the proton decay in ~1 microsec, inside the Earth and the Sun is explaining a lot of previusly non-understandable facts.

E. M. Drobyshevski; M. E. Drobyshevski; T. Yu. Izmodenova; D. S. Telnov

2003-05-30T23:59:59.000Z

260

Flammable Gas Detection for the D-Zero Gas System  

SciTech Connect (OSTI)

The use of flammable gas and high voltage in detector systems is common in many experiments at Fermilab. To mitigate the hazards associated with these systems, Fermilab Engineering Standard SD-45B (Ref. 1) was adopted. Since this note is meant to be a guide and not a mandatory standard, each experiment is reviewed for compliance with SD-45B by the flammable gas safety subcommittee. Currently, there are only two types of flammable gas in use, ethane (Appendix A) and methane (Appendix B). The worst flammable-gas case is C2H6 (ethane), which has an estimated flow rate that is 73% of the CH4 (methane) flow but a heat of combustion (in kcal/g-mole) that is 173% of that of methane. In the worst case, if ethane were to spew through its restricting orifice into its gas line at 0 psig and then through a catastrophic leak into Room 215 (TRD) or Room 511 (CDC/FDCNTX), the time that would be required to build up a greater than Class 1 inventory (0.4kg H2 equivalent) would be 5.2 hours (Ref. 2). Therefore a worst-case flammable gas leak would have to go undetected for over 5 hours in order to transform a either mixing room to an environment with a Risk Class greater than Class 1. The mixing systems, gas lines, and detectors themselves will be thoroughly leak checked prior to active service. All vessels that are part of the mixing systems will be protected from overpressure by safety valves vented outside the building. Both the input and output of all detector volumes are protected from overpressure in the same way. The volume immediately outside the central tracking detectors is continuously purged by nitrogen from boiloff from the main nitrogen dewar at the site. However, if flammable gas were to build up in the mixing rooms or particular detector areas, no matter how unlikely, flammable gas detectors that are part of the interlock chain of each gas mixing system will shut down the appropriate system. This includes shutting off the output of flammable gas manifolds within the gas shed. Similarly, if a fire were to break out anywhere in the D-ZERO Hall, fire sensors would stop the output of all flammable gas manifolds within the gas shed, by unpowering electrically controlled solenoid valves that are normally closed in the event of a power failure. Fire sensor contacts have not yet been installed.

Spires, L.D.; Foglesong, J.; /Fermilab

1991-02-11T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements  

SciTech Connect (OSTI)

Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

Ondrej Linda; Milos Manic; Miles McQueen

2012-09-01T23:59:59.000Z

262

An expert system for fault detection and diagnosis  

E-Print Network [OSTI]

to thank Dr. Ali Abur for his help in setting Eb1TP simulations. I would also lilre to thank Charles Fromen and Don Sevcik both with HLtrP Houston for providing invaluable expertise used in this thesis. TABLE OF CONTENTS CHAPTER Page INTRODUCTION . A... IV EXPERT SYSTEM DESIGN . . A. Introduction B. Rochester DFR Conversion C. EMTP Output File Conversion 46 46 47 54 vn1 CHAPTER Page VI D. Signal Analysis: MATI, AB . E. Fault Diagnosis: CLIPS F. Waveform Presentation: MATLAB G...

Spasojevic, Predrag

1992-01-01T23:59:59.000Z

263

Imaging System With Confocally Self-Detecting Laser.  

DOE Patents [OSTI]

The invention relates to a confocal laser imaging system and method. The system includes a laser source, a beam splitter, focusing elements, and a photosensitive detector. The laser source projects a laser beam along a first optical path at an object to be imaged, and modulates the intensity of the projected laser beam in response to light reflected from the object. A beam splitter directs a portion of the projected laser beam onto a photodetector. The photodetector monitors the intensity of laser output. The laser source can be an electrically scannable array, with a lens or objective assembly for focusing light generated by the array onto the object of interest. As the array is energized, its laser beams scan over the object, and light reflected at each point is returned by the lens to the element of the array from which it originated. A single photosensitive detector element can generate an intensity-representative signal for all lasers of the array. The intensity-representative signal from the photosensitive detector can be processed to provide an image of the object of interest.

Webb, Robert H. (Lincoln, MA); Rogomentich, Fran J. (Concord, MA)

1996-10-08T23:59:59.000Z

264

Statistically qualified neuro-analytic failure detection method and system  

DOE Patents [OSTI]

An apparatus and method for monitoring a process involve development and application of a statistically qualified neuro-analytic (SQNA) model to accurately and reliably identify process change. The development of the SQNA model is accomplished in two stages: deterministic model adaption and stochastic model modification of the deterministic model adaptation. Deterministic model adaption involves formulating an analytic model of the process representing known process characteristics, augmenting the analytic model with a neural network that captures unknown process characteristics, and training the resulting neuro-analytic model by adjusting the neural network weights according to a unique scaled equation error minimization technique. Stochastic model modification involves qualifying any remaining uncertainty in the trained neuro-analytic model by formulating a likelihood function, given an error propagation equation, for computing the probability that the neuro-analytic model generates measured process output. Preferably, the developed SQNA model is validated using known sequential probability ratio tests and applied to the process as an on-line monitoring system. Illustrative of the method and apparatus, the method is applied to a peristaltic pump system.

Vilim, Richard B. (Aurora, IL); Garcia, Humberto E. (Idaho Falls, ID); Chen, Frederick W. (Naperville, IL)

2002-03-02T23:59:59.000Z

265

Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge  

SciTech Connect (OSTI)

The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

Ondrej Linda; Todd Vollmer; Milos Manic

2012-08-01T23:59:59.000Z

266

Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas  

E-Print Network [OSTI]

Low-cost multispectral vegetation imaging system for detecting leaking CO2 gas Justin A. Hogan,1 sequestration sites for possible leaks of the CO2 gas from underground reservoirs, a low-cost multispectral are then flagged for closer inspection with in-situ CO2 sensors. The system is entirely self

Shaw, Joseph A.

267

E cient Detection of Global Properties in Distributed Systems Using Partial-Order Methods  

E-Print Network [OSTI]

in c that correspond to total orders containing the happened-before relation. A consistent global stateE cient Detection of Global Properties in Distributed Systems Using Partial-Order Methods Scott D "), meaning the system could have passed through a global state satisfying predicate , or Def (read \\de nitely

Stoller, Scott

268

Ultrasonic imaging system for in-process fabric defect detection  

DOE Patents [OSTI]

An ultrasonic method and system are provided for monitoring a fabric to identify a defect. A plurality of ultrasonic transmitters generate ultrasonic waves relative to the fabric. An ultrasonic receiver means responsive to the generated ultrasonic waves from the transmitters receives ultrasonic waves coupled through the fabric and generates a signal. An integrated peak value of the generated signal is applied to a digital signal processor and is digitized. The digitized signal is processed to identify a defect in the fabric. The digitized signal processing includes a median value filtering step to filter out high frequency noise. Then a mean value and standard deviation of the median value filtered signal is calculated. The calculated mean value and standard deviation are compared with predetermined threshold values to identify a defect in the fabric.

Sheen, Shuh-Haw (Naperville, IL); Chien, Hual-Te (Naperville, IL); Lawrence, William P. (Downers Grove, IL); Raptis, Apostolos C. (Downers Grove, IL)

1997-01-01T23:59:59.000Z

269

An expert system for detecting automobile insurance fraud using social network analysis  

E-Print Network [OSTI]

The article proposes an expert system for detection, and subsequent investigation, of groups of collaborating automobile insurance fraudsters. The system is described and examined in great detail, several technical difficulties in detecting fraud are also considered, for it to be applicable in practice. Opposed to many other approaches, the system uses networks for representation of data. Networks are the most natural representation of such a relational domain, allowing formulation and analysis of complex relations between entities. Fraudulent entities are found by employing a novel assessment algorithm, \\textit{Iterative Assessment Algorithm} (\\textit{IAA}), also presented in the article. Besides intrinsic attributes of entities, the algorithm explores also the relations between entities. The prototype was evaluated and rigorously analyzed on real world data. Results show that automobile insurance fraud can be efficiently detected with the proposed system and that appropriate data representation is vital.

Šubelj, Lovro; Bajec, Marko; 10.1016/j.eswa.2010.07.143

2011-01-01T23:59:59.000Z

270

A hybrid system for fault detection and sensor fusion based on fuzzy clustering and artificial immune systems  

E-Print Network [OSTI]

A HYBRID SYSTEM FOR FAULT DETECTION AND SENSOR FUSION BASED ON FUZZY CLUSTERING AND ARTIFICIAL IMMUNE SYSTEMS A Dissertation by MOHAMMAD ABDEL KAREEM RASHEED JARADAT Submitted to the Office of Graduate Studies of Texas A... CLUSTERING AND ARTIFICIAL IMMUNE SYSTEMS A Dissertation by MOHAMMAD ABDEL KAREEM RASHEED JARADAT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR...

Jaradat, Mohammad Abdel Kareem Rasheed

2007-04-25T23:59:59.000Z

271

An Automatic Impact-based Delamination Detection System for Concrete Bridge Decks  

SciTech Connect (OSTI)

Delamination of concrete bridge decks is a commonly observed distress in corrosive environments. In traditional acoustic inspection methods, delamination is assessed by the "hollowness" of the sound created by impacting the bridge deck with a hammer or bar or by dragging a chain where the signals are often contaminated by ambient traffic noise and the detection is highly subjective. In the proposed method, a modified version of independent component analysis (ICA) is used to filter the traffic noise. To eliminate subjectivity, Mel-frequency cepstral coefficients (MFCC) are used as features for detection and the delamination is detected by a radial basis function (RBF) neural network. Results from both experimental and field data suggest that the proposed methods id noise robust and has satisfactory performance. The methods can also detect the delamination of repair patches and concrete below the repair patches. The algorithms were incorporated into an automatic impact-bases delamination detection (AIDD) system for field application.

Zhang, Gang; Harichandran, Ronald S.; Ramuhalli, Pradeep

2012-01-02T23:59:59.000Z

272

Design study and comparative evaluation of JSFR failed fuel detection system  

SciTech Connect (OSTI)

A conceptual design study of an advanced sodium-cooled fast reactor JSFR has progressed in the 'Fast Reactor Cycle Technology Development (FaCT) 'project in Japan. JSFR has two failed fuel detection systems in the core. One is a failed fuel detection (FFD) system which continuously monitors a fission product from failed fuel subassembly. The other is a failed fuel detection and location (FFDL) system which locates when it receives signals from FFD. The FFD system consists of a FFD-DN which detects delayed neutron (DN) in sodium and a FFD-CG which detects fission products in the cover gas of the reactor vessel. In this study, requirements to the FFD-DN and the FFD-DN design to meet the requirements were investigated for the commercial and demonstration JSFR. In the commercial JSFR, a sampling type FFD which collects sodium from the reactor vessel by sampling lines for DN detectors was adopted. The performances have been investigated and confirmed by a fluid analysis in the reactor upper plenum. In the demonstration JSFR, the performance of DN detectors installed on the primary cold-leg piping has been confirmed. For the FFDL systems, experiences in the previous fast reactors and the R and D of FFDL system for JSFR were investigated. This study focuses on the Selector-Valve and the Tagging-Gas FFDL systems. Operation experiences of the Selector-valve FFDL system were accumulated in PFR and Phenix. Tagging-gas system experiences were accumulated in EBR-II and FFTF. The feasibility of both FFDL systems for JSFR was evaluated. (authors)

Aizawa, K.; Chikazawa, Y.; Ishikawa, N. [Japan Atomic Energy Agency JAEA, 4002 Narita, Oarai, Higashi-ibaraki-gun, Ibaraki 311-1393 (Japan); Kubo, S. [Japan Atomic Power Company JAPC (Japan); Okazaki, H.; Mito, M. [Mitsubishi FBR Systems, Inc. MFBR (Japan); Tozawa, K. [Fuji Electric Co., Ltd. (Japan); Hayashi, M. [MitsubishiElectric Corporation (Japan)

2012-07-01T23:59:59.000Z

273

Photostimulated phosphor based image plate detection system for HRVUV beamline at Indus-1 synchrotron radiation source  

E-Print Network [OSTI]

A high resolution vacuum ultraviolet (HRVUV) beamline based on a 6.65 meter off-plane Eagle spectrometer is in operation at the Indus-1 synchrotron radiation source, RRCAT, Indore, India. To facilitate position sensitive detection and fast spectral recording, a new BaFBr:Eu2+ phosphor based image plate (IP) detection system interchangeable with the existing photomultiplier (PMT) scanning system has been installed on this beamline. VUV photoabsorption studies on Xe, O2, N2O and SO2 are carried out to evaluate the performance of the IP detection system. An FWHM of ~ 0.5 {\\AA} is achieved for the Xe atomic line at 1469.6 {\\AA}. Reproducibility of spectra is found to be within the experimental resolution. Compared to the PMT scanning system, the IP shows several advantages in terms of sensitivity, recording time and S/N ratio, which are highlighted in the paper. This is the first report of incorporation of an IP detection system in a VUV beamline using synchrotron radiation. Commissioning of the new detection sys...

Haris, K; Shastri, Aparna; K., Sunanda; K., Babita; Rao, S V N Bhaskara; Ahmad, Shabbir; Tauheed, A

2014-01-01T23:59:59.000Z

274

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a  

E-Print Network [OSTI]

Does sea-level rise have an impact on saltwater intrusion? Sun Woo Chang a , T. Prabhakar Clement a 22 June 2011 Keywords: Saltwater intrusion Sea-level rise Coastal aquifer Climate change Confined, the adverse intrusion effects induced by sea-level rise. A detailed numerical study using the MODFLOW

Clement, Prabhakar

275

Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio J. Marquez  

E-Print Network [OSTI]

Efficient model-based leak detection in boiler steam-water systems Xi Sun, Tongwen Chen *, Horacio detection in boiler steam-water systems. The algorithm has been tested using real industrial data from Syncrude Canada, and has proven to be effective in detection of boiler tube or steam leaks; proper

Marquez, Horacio J.

276

Method and apparatus for operating a powertrain system upon detecting a stuck-closed clutch  

DOE Patents [OSTI]

A powertrain system includes a multi-mode transmission having a plurality of torque machines. A method for controlling the powertrain system includes identifying all presently applied clutches including commanded applied clutches and the stuck-closed clutch upon detecting one of the torque-transfer clutches is in a stuck-closed condition. A closed-loop control system is employed to control operation of the multi-mode transmission accounting for all the presently applied clutches.

Hansen, R. Anthony

2014-02-18T23:59:59.000Z

277

Method and apparatus for detecting timing errors in a system oscillator  

DOE Patents [OSTI]

A method of detecting timing errors in a system oscillator for an electronic device, such as a power supply, includes the step of comparing a system oscillator signal with a delayed generated signal and generating a signal representative of the timing error when the system oscillator signal is not identical to the delayed signal. An LED indicates to an operator that a timing error has occurred. A hardware circuit implements the above-identified method.

Gliebe, Ronald J. (Library, PA); Kramer, William R. (Bethel Park, PA)

1993-01-01T23:59:59.000Z

278

An evaluation of various types of fire detection alarm systems to awaken the elderly  

E-Print Network [OSTI]

AN EVALUATION OF VARIOUS TYPES OF FIRE DETECTION ALARM SYSTEMS TO AWAKEN THE ELDERLY A Thesis by 1'IMOTHY EDWARD TOWNLEY Submitted to the Graduate Co11ege of Texas ASM University in partia1 fu1fi1 1ment of the requirements for the degree... of MASTER OF SCIENCE August 198S major Sub?'ect: Safety Engineering AN EVALUATION OF VARIOUS TYPES Of FIRE DETECTION ALARM SYSTEMS TO AWAKEN THE ELDERLY A Thesis by TIMOTHY EDWARD TOWNLEY Approved as to style and content by: (Chairm n of Committee...

Townley, Timothy Edward

1985-01-01T23:59:59.000Z

279

Methods to detect faulty splices in the superconducting magnet system of the LHC  

SciTech Connect (OSTI)

The incident of 19 September 2008 at the LHC was caused by a faulty inter-magnet splice of about 200 n{Omega} resistance. Cryogenic and electrical techniques have been developed to detect other abnormal splices, either between or inside the magnets. The existing quench protection system can be used to detect internal splices with R > 20 n{Omega}. Since this system does not cover the bus between magnets, the cryogenic system is used to measure the rate of temperature rise due to ohmic heating. Accuracy of a few mK/h, corresponding to a few Watts, has been achieved, allowing detection of excess resistance, if it is more than 40 n{Omega} in a cryogenic subsector (two optical cells). Follow-up electrical measurements are made in regions identified by the cryogenic system. These techniques have detected two abnormal internal magnet splices of 100 n{Omega} and 50 n{Omega} respectively. In 2009, this ad hoc system will be replaced with a permanent one to monitor all splices at the n{Omega} level.

Bailey, R.; Bellesia, B.; Lasheras, N.Catalan; Dahlerup-Petersen, K.; Denz, R.; Robles, C.; Koratzinos, M.; Pojer, M.; Ponce, L.; Saban, R.; Schmidt, R.; /CERN /Fermilab /Moscow, INR /Cracow, INP

2009-05-01T23:59:59.000Z

280

An analysis of weep holes as a product detection device for underground compensated LPG storage systems  

SciTech Connect (OSTI)

Weep holes have been used widely to detect the presence of Liquefied Petroleum Gases (LPG) in brine for underground compensated storage systems. When the brine level drops below the weep hole, LPG product enters the brine production system causing an increase in both tubing head pressure and flow rate. To prevent cavern overfill, a cavern shutdown is initiated upon detection of LPG in the surface brine system by pressure or flow instruments at the tubing head. In this study, we have investigated the multiphase flow characteristics of weep hole LPG detection systems to correctly estimate the operating limits. A simple and easy to use model has been developed to predict the tubing head pressure and flow rate increases. The model can be used to implement safer and more efficient operation procedures for underground compensated LPG storage systems. The model predictions for a typical field case are presented. An analysis of weep holes as product detection devices for LPG storage reservoirs has been carried out. It was found that the increases in pressure and flow rates at the tubing head change as a function of injection flow rate of the product. Therefore, a thorough consideration of cavern operating parameters is necessary to evaluate the use constant pressure and flow rate values to initiate emergency shut down of the cavern.

Sarica, C.; Demir, H.M.; Brill, J.P.

1996-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Network Anomaly Detection: Flow-based or Packet-based Approach?  

E-Print Network [OSTI]

One of the most critical tasks for network administrator is to ensure system uptime and availability. For the network security, anomaly detection systems, along with firewalls and intrusion prevention systems are the must-have tools. So far in the field of network anomaly detection, people are working on two different approaches. One is flow-based; usually rely on network elements to make so-called flow information available for analysis. The second approach is packet-based; which directly analyzes the data packet information for the detection of anomalies. This paper describes the main differences between the two approaches through an in-depth analysis. We try to answer the question of when and why an approach is better than the other. The answer is critical for network administrators to make their choices in deploying a defending system, securing the network and ensuring business continuity.

Nguyen, Huy

2010-01-01T23:59:59.000Z

282

Radiation sensitive devices and systems for detection of radioactive materials and related methods  

DOE Patents [OSTI]

Radiation sensitive devices include a substrate comprising a radiation sensitive material and a plurality of resonance elements coupled to the substrate. Each resonance element is configured to resonate responsive to non-ionizing incident radiation. Systems for detecting radiation from a special nuclear material include a radiation sensitive device and a sensor located remotely from the radiation sensitive device and configured to measure an output signal from the radiation sensitive device. In such systems, the radiation sensitive device includes a radiation sensitive material and a plurality of resonance elements positioned on the radiation sensitive material. Methods for detecting a presence of a special nuclear material include positioning a radiation sensitive device in a location where special nuclear materials are to be detected and remotely interrogating the radiation sensitive device with a sensor.

Kotter, Dale K

2014-12-02T23:59:59.000Z

283

A Data Driven Framework for Real Time Power System Event Detection and Visualization  

E-Print Network [OSTI]

Increased adoption and deployment of phasor measurement units (PMU) has provided valuable fine-grained data over the grid. Analysis over these data can provide real-time insight into the health of the grid, thereby improving control over operations. Realizing this data-driven control, however, requires validating, processing and storing massive amounts of PMU data. This paper describes a PMU data management system that supports input from multiple PMU data streams, features an event-detection algorithm, and provides an efficient method for retrieving archival data. The event-detection algorithm rapidly correlates multiple PMU data streams, providing details on events occurring within the power system in real-time. The event-detection algorithm feeds into a visualization component, allowing operators to recognize events as they occur. The indexing and data retrieval mechanism facilitates fast access to archived PMU data. Using this method, we achieved over 30x speedup for queries with high selectivity. With th...

McCamish, Ben; Landford, Jordan; Bass, Robert; Cotilla-Sanchez, Eduardo; Chiu, David

2015-01-01T23:59:59.000Z

284

Arc Detection and Interlock Module for the PEP II Low Level RF System  

SciTech Connect (OSTI)

A new arc detection and interlock generating module for the SLAC PEP-II low-level RF VXI-based system has been developed. The system is required to turn off the RF drive and high voltage power supply in the event of arcing in the cavity windows, klystron window, or circulator. Infrared photodiodes receive arc signals through radiation resistant optical fibers. Gain and bandwidth are selectable for each channel to allow tailoring response. The module also responds to interlock requests from other modules in the VXI system and communicates with the programmable logic controller (PLC) responsible for much of the low-level RF system's interlock functionality.

Tighe, R.; /SLAC

2011-08-31T23:59:59.000Z

285

AnKLe: Detecting Attacks in Large Scale Systems via Information Emmanuelle Anceaume  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback- Leibler divergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Paris-Sud XI, Université de

286

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence  

E-Print Network [OSTI]

AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence Emmanuelle Anceaume. To address this issue, we propose AnKLe (for Attack-tolerant eNhanced Kullback-Leibler di- vergence Estimator), a novel algorithm for estimating the KL divergence of an observed stream compared to the expected one. AnKLe

Boyer, Edmond

287

Methods, systems and devices for detecting threatening objects and for classifying magnetic data  

DOE Patents [OSTI]

A method for detecting threatening objects in a security screening system. The method includes a step of classifying unique features of magnetic data as representing a threatening object. Another step includes acquiring magnetic data. Another step includes determining if the acquired magnetic data comprises a unique feature.

Kotter, Dale K. (Shelley, ID); Roybal, Lyle G. (Idaho Falls, ID); Rohrbaugh, David T. (Idaho Falls, ID); Spencer, David F. (Idaho Falls, ID)

2012-01-24T23:59:59.000Z

288

Joint-Detection using Fast Fourier Transforms in TD-CDMA based Mobile Radio Systems  

E-Print Network [OSTI]

Joint-Detection using Fast Fourier Transforms in TD-CDMA based Mobile Radio Systems Marius Vollmer1,2 J¨urgen G¨otze2 Martin Haardt1 1. Siemens AG, ICN CA CTO 7 2. Information Processing Lab Dortmund, Germany Martin.Haardt@icn.siemens.de goetze@dt.e-technik.uni-dortmund.de Marius.Vollmer@icn.siemens

Götze, Jürgen

289

Neutron interrogation system using high gamma ray signature to detect contraband special nuclear materials in cargo  

DOE Patents [OSTI]

A system for inspecting cargo for the presence of special nuclear material. The cargo is irradiated with neutrons. The neutrons produce fission products in the special nuclear material which generate gamma rays. The gamma rays are detecting indicating the presence of the special nuclear material.

Slaughter, Dennis R. (Oakland, CA); Pohl, Bertram A. (Berkeley, CA); Dougan, Arden D. (San Ramon, CA); Bernstein, Adam (Palo Alto, CA); Prussin, Stanley G. (Kensington, CA); Norman, Eric B. (Oakland, CA)

2008-04-15T23:59:59.000Z

290

Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati  

E-Print Network [OSTI]

Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati 545 Technology Square MIT Artificial Intelligence Lab Cambridge, MA, 02139, USA scaz@ai.mit.edu Abstract Eye finding is the first step toward building a ma- chine that can recognize social cues, like eye contact

291

Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati  

E-Print Network [OSTI]

Eye Finding via Face Detection for a Foveated, Active Vision System Brian Scassellati 545 Technology Square MIT Artificial Intelligence Lab Cambridge, MA, 02139, USA scaz@ai.mit.edu Abstract Eye finding is the first step toward building a ma­ chine that can recognize social cues, like eye contact

292

System Problem Detection by Mining Console Logs Electrical Engineering and Computer Sciences  

E-Print Network [OSTI]

for mining console logs using a combination of program analysis, information retrieval, data mining logs. We then extract features, such as execution traces, from logs and use data mining and machineSystem Problem Detection by Mining Console Logs Wei Xu Electrical Engineering and Computer Sciences

Xu, Wei

293

Invited Applications Paper Detecting Large-Scale System Problems by Mining Console Logs  

E-Print Network [OSTI]

. Researchers and operators have been using all kinds of mon- itoring data, from the simplest numerical metrics Problems by Mining Console Logs part operator, and charged with fixing the problem-- are usuallyInvited Applications Paper Detecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw

Xu, Wei

294

REAL-TIME STRUCTURAL DAMAGE DETECTION USING WIRELESS SENSING AND MONITORING SYSTEM  

E-Print Network [OSTI]

REAL-TIME STRUCTURAL DAMAGE DETECTION USING WIRELESS SENSING AND MONITORING SYSTEM Kung-Chun Lu1 Professor, Department of Civil & Environmental Engineering, University of Michigan, Ann Arbor, MI 48109, USA, jerlynch@umich.edu 5 Professor, Department of Civil & Environmental Engineering, Stanford University

Stanford University

295

Intrusion-Tolerant Protection for Critical Infrastructures  

E-Print Network [OSTI]

of an organization in the face of accidents and attacks. How- ever, they are not simple firewalls but distributed]. In recent years these systems evolved in several aspects that greatly increased their exposure to cyber-attacks, a critical information infrastructure is formed by facilities, like power transformation substations or cor

Neves, Nuno

296

Addressing the Challenges of Anomaly Detection for Cyber Physical Energy Grid Systems  

SciTech Connect (OSTI)

The consolidation of cyber communications networks and physical control systems within the energy smart grid introduces a number of new risks. Unfortunately, these risks are largely unknown and poorly understood, yet include very high impact losses from attack and component failures. One important aspect of risk management is the detection of anomalies and changes. However, anomaly detection within cyber security remains a difficult, open problem, with special challenges in dealing with false alert rates and heterogeneous data. Furthermore, the integration of cyber and physical dynamics is often intractable. And, because of their broad scope, energy grid cyber-physical systems must be analyzed at multiple scales, from individual components, up to network level dynamics. We describe an improved approach to anomaly detection that combines three important aspects. First, system dynamics are modeled using a reduced order model for greater computational tractability. Second, a probabilistic and principled approach to anomaly detection is adopted that allows for regulation of false alerts and comparison of anomalies across heterogeneous data sources. Third, a hierarchy of aggregations are constructed to support interactive and automated analyses of anomalies at multiple scales.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Melin, Alexander M [ORNL; Czejdo, Bogdan [ORNL

2013-01-01T23:59:59.000Z

297

Electrical power system failure detection, isolation and recovery on the International Space Station Alpha  

SciTech Connect (OSTI)

The problem of how to detect, isolate, and recover from failures on the International Space Station Alpha (ISSA) is currently under study and development by NASA and a number of contractors including Rocketdyne Division of Rockwell International. The effort is planned to provide an advanced real-time failure detection system for the station. The autonomous power system project is designed to demonstrate the abilities of integrated intelligent diagnosis, control and scheduling techniques to space power distribution hardware. In this paper the latest failure detection, isolation, and recovery (FDIR) design, which provides an autonomous FDIR for the Electric Power System (EPS), will be described. The ISSA Concept of Operations and Utilization (COU) defines the ability of the vehicle to ``survive 24 hours of operation without crew or ground intervention``. This results in a necessity to design and develop automatic failure detection techniques to accomplish such autonomous operation without routine commanding. This paper addresses the current EPS FDIR design concept and concentrates on how to resolve the FDIR issues and come up with a robust design to recover from abnormal behavior.

Aghabarari, E. [Rockwell International, Canoga Park, CA (United States). Rocketdyne Division; Varney, J. [McDonnell Douglas, Houston, TX (United States)

1995-12-31T23:59:59.000Z

298

Radiation detection method and system using the sequential probability ratio test  

DOE Patents [OSTI]

A method and system using the Sequential Probability Ratio Test to enhance the detection of an elevated level of radiation, by determining whether a set of observations are consistent with a specified model within a given bounds of statistical significance. In particular, the SPRT is used in the present invention to maximize the range of detection, by providing processing mechanisms for estimating the dynamic background radiation, adjusting the models to reflect the amount of background knowledge at the current point in time, analyzing the current sample using the models to determine statistical significance, and determining when the sample has returned to the expected background conditions.

Nelson, Karl E. (Livermore, CA); Valentine, John D. (Redwood City, CA); Beauchamp, Brock R. (San Ramon, CA)

2007-07-17T23:59:59.000Z

299

Method Apparatus And System For Detecting Seismic Waves In A Borehole  

DOE Patents [OSTI]

A method, apparatus and system for detecting seismic waves. A sensing apparatus is deployed within a bore hole and may include a source magnet for inducing a magnetic field within a casing of the borehole. An electrical coil is disposed within the magnetic field to sense a change in the magnetic field due to a displacement of the casing. The electrical coil is configured to remain substantially stationary relative to the well bore and its casing along a specified axis such that displacement of the casing induces a change within the magnetic field which may then be sensed by the electrical coil. Additional electrical coils may be similarly utilized to detect changes in the same or other associated magnetic fields along other specified axes. The additional sensor coils may be oriented substantially orthogonally relative to one another so as to detect seismic waves along multiple orthogonal axes in three dimensional space.

West, Phillip B. (Idaho Falls, ID); Sumstine, Roger L. (St. George, UT)

2006-03-14T23:59:59.000Z

300

Methods for non-intrusive sensing and system monitoring  

E-Print Network [OSTI]

Improving the efficiency of collection, transmission, and consumption of resources is the focus of a wide swath of engineering research. Current technological solutions for capturing or mitigating energy and resource waste ...

Schantz, Christopher James

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Low background high efficiency radiocesium detection system based on positron emission tomography technology  

SciTech Connect (OSTI)

After the 2011 nuclear power plant accident at Fukushima, radiocesium contamination in food became a serious concern in Japan. However, low background and high efficiency radiocesium detectors are expensive and huge, including semiconductor germanium detectors. To solve this problem, we developed a radiocesium detector by employing positron emission tomography (PET) technology. Because {sup 134}Cs emits two gamma photons (795 and 605 keV) within 5 ps, they can selectively be measured with coincidence. Such major environmental gamma photons as {sup 40}K (1.46 MeV) are single photon emitters and a coincidence measurement reduces the detection limit of radiocesium detectors. We arranged eight sets of Bi{sub 4}Ge{sub 3}O{sub 12} (BGO) scintillation detectors in double rings (four for each ring) and measured the coincidence between these detectors using PET data acquisition system. A 50 × 50 × 30 mm BGO was optically coupled to a 2 in. square photomultiplier tube (PMT). By measuring the coincidence, we eliminated most single gamma photons from the energy distribution and only detected those from {sup 134}Cs at an average efficiency of 12%. The minimum detectable concentration of the system for the 100 s acquisition time is less than half of the food monitor requirements in Japan (25 Bq/kg). These results show that the developed radiocesium detector based on PET technology is promising to detect low level radiocesium.

Yamamoto, Seiichi; Ogata, Yoshimune [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)] [Department of Radiological and Medical Laboratory Sciences, Nagoya University Graduate School of Medicine, 1-1-20 Daiko-Minami, Higashi-ku, Nagoya 461-8673 (Japan)

2013-09-15T23:59:59.000Z

302

Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles  

E-Print Network [OSTI]

Integrated Traffic Management Systems (ITMS) are now implemented in different cities in India to primarily address the concerns of road-safety and security. An automated Red Light Violation Detection System (RLVDS) is an integral part of the ITMS. In our present work we have designed and developed a complete system for generating the list of all stop-line violating vehicle images automatically from video snapshots of road-side surveillance cameras. The system first generates adaptive background images for each camera view, subtracts captured images from the corresponding background images and analyses potential occlusions over the stop-line in a traffic signal. Considering round-the-clock operations in a real-life test environment, the developed system could successfully track 92% images of vehicles with violations on the stop-line in a "Red" traffic signal.

Saha, Satadal; Nasipuri, Mita; Basu, Dipak Kumar

2010-01-01T23:59:59.000Z

303

Application of black-box models to HVAC systems for fault detection  

SciTech Connect (OSTI)

This paper describes the application of black-box models for fault detection and diagnosis (FDD) in heating, ventilating, and air-conditioning (HVAC) systems. In this study, multiple-input/single-output (MISO) ARX models and artificial neural network (ANN) models are used. The ARX models are examined for different processes and subprocesses and compared with each other. Two types of models are established--system models and component models. In the case of system models, the HVAC system as a whole is regarded as a black box instead of as a collection of component models. With the component model type, the components of the HVAC system are regarded as separate black boxes.

Peitsman, H.C. [TNO Building and Construction Research, Delft (Netherlands). Dept. of Indoor Environment, Building Physics and Systems; Bakker, V.E. [Univ. of Twente, Enschede (Netherlands). Dept. of Computer Science

1996-11-01T23:59:59.000Z

304

Hot spot detection system for vanes or blades of a combustion turbine  

DOE Patents [OSTI]

This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature.

Twerdochlib, Michael (Oviedo, FL)

1999-01-01T23:59:59.000Z

305

A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems  

SciTech Connect (OSTI)

The objective of this document is to report results in the detection and characterization of special behavior in large electric power systems. Such behavior is usually dynamic in nature, but not always. This is also true for the underlying sources of special behavior. At the device level, a source of special behavior might be an automatic control system, a dynamic load, or even a manual control system that is operated according to some sharply defined policy. Other possible sources include passive system conditions, such as the state of a switched device or the amount of power carried on some critical line. Detection and characterization are based upon “signature information” that is extracted from the behavior observed. Characterization elements include the signature information itself, the nature of the behavior and its likely causes, and the associated implications for the system or for the public at large. With sufficient data and processing, this characterization may directly identify a particular condition or device at a specific location. Such conclusive results cannot always be done from just one observation, however. Information environments that are very sparse may require multiple observations, comparative model studies, and even direct testing of the system.

Hauer, John F.; DeSteese, John G.

2004-08-20T23:59:59.000Z

306

Hot spot detection system for vanes or blades of a combustion turbine  

DOE Patents [OSTI]

This invention includes a detection system that can determine if a turbine component, such as a turbine vane or blade, has exceeded a critical temperature, such as a melting point, along any point along the entire surface of the vane or blade. This system can be employed in a conventional combustion turbine having a compressor, a combustor and a turbine section. Included within this system is a chemical coating disposed along the entire interior surface of a vane or blade and a closed loop cooling system that circulates a coolant through the interior of the vane or blade. If the temperature of the vane or blade exceeds a critical temperature, the chemical coating will be expelled from the vane or blade into the coolant. Since while traversing the closed loop cooling system the coolant passes through a detector, the presence of the chemical coating in the coolant will be sensed by the system. If the chemical coating is detected, this indicates that the vane or blade has exceeded a critical temperature. 5 figs.

Twerdochlib, M.

1999-02-02T23:59:59.000Z

307

Systems and methods for detecting nuclear radiation in the presence of backgrounds  

DOE Patents [OSTI]

Systems and methods for the simultaneous detection and identification of radiation species, including neutrons, gammas/x-rays and minimum ionizing particles (MIPs). A plurality of rectangular and/or triangularly shaped radiation sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material. A wavelength-shifting fiber can then be located within a central hole of each extruded scintillator, wherein the wavelength-shifting fiber absorbs scintillation light and re-emits the light at a longer wavelength, thereby piping the light to a photodetector whose response to the light indicates the presence of radiation The resulting method and system can simultaneously detect neutrons, gamma rays, x-rays and cosmic rays (MIPs) and identify each.

Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

2005-06-21T23:59:59.000Z

308

System and method for motor fault detection using stator current noise cancellation  

DOE Patents [OSTI]

A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to acquire at least on additional set of real-time operating current data from the motor during operation, redefine the noise component present in each additional set of real-time operating current data, and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Nowak, Michael P. (Menomonee Falls, WI); Dimino, Steven A. (Wauwatosa, WI)

2010-12-07T23:59:59.000Z

309

System and method for bearing fault detection using stator current noise cancellation  

DOE Patents [OSTI]

A system and method for detecting incipient mechanical motor faults by way of current noise cancellation is disclosed. The system includes a controller configured to detect indicia of incipient mechanical motor faults. The controller further includes a processor programmed to receive a baseline set of current data from an operating motor and define a noise component in the baseline set of current data. The processor is also programmed to repeatedly receive real-time operating current data from the operating motor and remove the noise component from the operating current data in real-time to isolate any fault components present in the operating current data. The processor is then programmed to generate a fault index for the operating current data based on any isolated fault components.

Zhou, Wei (Los Angeles, CA); Lu, Bin (Kenosha, WI); Habetler, Thomas G. (Snellville, GA); Harley, Ronald G. (Lawrenceville, GA); Theisen, Peter J. (West Bend, WI)

2010-08-17T23:59:59.000Z

310

Method of remote powering and detecting multiple UWB passive tags in an RFID system  

DOE Patents [OSTI]

A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

2012-05-29T23:59:59.000Z

311

An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications  

SciTech Connect (OSTI)

Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

Beaver, Justin M [ORNL] [ORNL; Borges, Raymond Charles [ORNL] [ORNL; Buckner, Mark A [ORNL] [ORNL

2013-01-01T23:59:59.000Z

312

Methods, media, and systems for detecting attack on a digital processing device  

DOE Patents [OSTI]

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

2014-07-22T23:59:59.000Z

313

Medium-resolution Autonomous in situ Gamma Detection System for Marine and Coastal Waters  

SciTech Connect (OSTI)

We are developing a medium-resolution autonomous in situ gamma detection system for marine and coastal waters. The system is designed to extract and preconcentrate isotopes of interest from natural waters prior to detection in order to eliminate signal attenuation of the gamma rays traveling through water and lower the overall background due to the presence of naturally occurring radioactive isotopes (40K and U/Th series radionuclides). Filtration is used to preconcentrate target isotopes residing on suspended particles, while chemosorption is employed to preferentially extract truly dissolved components from the water column. A variety of commercial and in-house nano-porus chemosorbents have been selected, procured or produced, and tested. Used filter and chemosorbent media are counted autonomously using two LaBr3 detectors in a near 4-pi configuration around the samples. A compact digital pulse processing system developed in-house and capable of running in coincidence mode is used to process the signal from the detectors to a small on-board computer. The entire system is extremely compact (9” dia. x 30” len.) and platform independent, but designed for initial deployment on a research buoy.

Schwantes, Jon M.; Addleman, Raymond S.; Davidson, Joseph D.; Douglas, Matthew; Meier, David E.; Mullen, O Dennis; Myjak, Mitchell J.; Jones, Mark E.; Woodring, Mitchell L.; Johnson, Bryce; Santschi, Peter H.

2009-12-01T23:59:59.000Z

314

Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems  

SciTech Connect (OSTI)

''Hidden'' geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and has moderate solubility in water. We carried out numerical simulations of a CO2 migration scenario to calculate the magnitude of expected fluxes and concentrations. Our results show that CO2 concentrations can reach high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are predominantly controlled by CO2 uptake by photosynthesis, production by root respiration, microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include the infrared gas analyzer, the accumulation chamber method, the eddy covariance method, hyperspectral imaging, and light detection and ranging. To meet the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring techniques with statistical analysis and modeling strategies. The proposed monitoring plan initially focuses on rapid, economical, reliable measurements of CO2 subsurface concentrations and surface fluxes and statistical analysis of the collected data. Based on this analysis, are as with a high probability of containing geothermal CO2 anomalies can be further sampled and analyzed using more expensive chemical and isotopic methods. Integrated analysis of all measurements will determine definitively if CO2 derived from a deep geothermal source is present, and if so, the spatial extent of the anomaly. The suitability of further geophysical measurements, installation of deep wells, and geochemical analyses of deep fluids can then be determined based on the results of the near surface CO2 monitoring program.

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2005-01-19T23:59:59.000Z

315

Detection system for high-resolution gamma radiation spectroscopy with neutron time-of-flight filtering  

DOE Patents [OSTI]

A .gamma.-radiation detection system that includes at least one semiconductor detector such as HPGe-Detector, a position-sensitive .alpha.-Detector, a TOF Controller, and a Digitizer/Integrator. The Digitizer/Integrator starts to process the energy signals of a .gamma.-radiation sent from the HPGe-Detector instantly when the HPGe-Detector detects the .gamma.-radiation. Subsequently, it is determined whether a coincidence exists between the .alpha.-particles and .gamma.-radiation signal, based on a determination of the time-of-flight of neutrons obtained from the .alpha.-Detector and the HPGe-Detector. If it is determined that the time-of-flight falls within a predetermined coincidence window, the Digitizer/Integrator is allowed to continue and complete the energy signal processing. If, however, there is no coincidence, the Digitizer/Integrator is instructed to be clear and reset its operation instantly.

Dioszegi, Istvan; Salwen, Cynthia; Vanier, Peter

2014-12-30T23:59:59.000Z

316

Optical methods and systems for detecting a constituent in a gas containing oxygen in harsh environments  

DOE Patents [OSTI]

A method for detecting a gas phase constituent such as carbon monoxide, nitrogen dioxide, hydrogen, or hydrocarbons in a gas comprising oxygen such as air, includes providing a sensing material or film having a metal embedded in a catalytically active matrix such as gold embedded in a yttria stabilized zirconia (YSZ) matrix. The method may include annealing the sensing material at about 900.degree. C., exposing the sensing material and gas to a temperature above 400.degree. C., projecting light onto the sensing material, and detecting a change in the absorption spectrum of the sensing material due to the exposure of the sensing material to the gas in air at the temperature which causes a chemical reaction in the sensing material compared to the absorption spectrum of the sensing material in the absence of the gas. Systems employing such a method are also disclosed.

Carpenter, Michael A. (Scotia, NY); Sirinakis, George (Bronx, NY)

2011-01-04T23:59:59.000Z

317

Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring  

SciTech Connect (OSTI)

''Hidden'' geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the subsurface and above ground in the near-surface environment to serve as a tool to discover hidden geothermal systems. We focus the investigation on CO2 due to (1) its abundance in geothermal systems, (2) its moderate solubility in water, and (3) the wide range of technologies available to monitor CO2 in the near-surface environment. However, monitoring in the near-surface environment for CO2 derived from hidden geothermal reservoirs is complicated by the large variation in CO2 fluxes and concentrations arising from natural biological and hydrologic processes. In the near-surface environment, the flow and transport of CO2 at high concentrations will be controlled by its high density, low viscosity, and high solubility in water relative to air. Numerical simulations of CO2 migration show that CO2 concentrations can reach very high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, surface winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are primarily controlled by CO2 uptake by photosynthesis, production by root respiration, and microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include (1) the infrared gas analyzer (IRGA) for measurement of concentrations at point locations, (2) the accumulation chamber (AC) method for measuring soil CO2 fluxes at point locations, (3) the eddy covariance (EC) method for measuring net CO2 flux over a given area, (4) hyperspectral imaging of vegetative stress resulting from elevated CO2 concentrations, and (5) light detection and ranging (LIDAR) that can measure CO2 concentrations over an integrated path. Technologies currently in developmental stages that have the potential to be used for CO2 monitoring include tunable lasers for long distance integrated concentration measurements and micro-electronic mechanical systems (MEMS) that can make widespread point measurements. To address the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring methodologies with statistical analysis and modeling strategies. Within the area targeted for geothermal exploration, point measurements of soil CO2 fluxes and concentrations using the AC method and a portable IRGA, respectively, and measurements of net surface flux using EC should be made. Also, the natural spatial and temporal variability of surface CO2 fluxes and subsurface CO2 concentrations should be quantified within a background area with similar geologic, climatic, and ecosystem characteristics to the area targeted for geothermal exploration. Statistical analyses of data collected from both areas should be used to guide sampling strategy, discern spatial patterns that may be indicative of geothermal CO2 emissions, and assess the presence (or absence) of geothermal CO2 within the natural background variability with a desired confidence level. Once measured CO2 concentrations and fluxes have been determined to be of anomalous geothermal origin with high confidence, more expensive vertical subsurface gas sampling and chemical and isotopic analyses can be undertaken. Integrated analysis of all measurements will d

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2004-12-15T23:59:59.000Z

318

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu  

E-Print Network [OSTI]

Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

Ning, Peng

319

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON  

E-Print Network [OSTI]

Porphyry Copper and Other Intrusion-Related Mineralization in Mexico MARK D. BARTON JOHN-MARK G Inc., Tucson, Arizona ABSTRACT Intrusion-related copper-bearing ore deposits in Mexico span a wide. These deposits include world-class copper porphyry and skarn deposits as well as a continuum of similar skarn

Barton, Mark D.

320

AN INTELLIGENT SYSTEM FOR DETECTION OF NON-TECHNICAL LOSSES IN TENAGA NASIONAL BERHAD (TNB) MALAYSIA LOW VOLTAGE  

E-Print Network [OSTI]

Electricity consumer dishonesty is a problem faced by all power utilities worldwide. Finding efficient. This thesis presents a new approach towards Non-Technical Loss (NTL) detection in power utilities usingAN INTELLIGENT SYSTEM FOR DETECTION OF NON-TECHNICAL LOSSES IN TENAGA NASIONAL BERHAD (TNB

Ducatelle, Frederick

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Performance Evaluation of DCA and SRC on a Single Bot Detection  

E-Print Network [OSTI]

a better performance in detecting malicious activities. Keywords: Security, Intrusion Detection, Botnet/bot techniques use different types of signatures-based detection by analysing network traffic in order to detect or encrypting the bot's traffic when communicating with the attacker. In addition, a bot can connect to non

Aickelin, Uwe

322

Methods, microfluidic devices, and systems for detection of an active enzymatic agent  

DOE Patents [OSTI]

Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active target agent in a fluid sample. A substrate molecule is used that contains a sequence which may cleave in the presence of an active target agent. A SNAP25 sequence is described, for example, that may be cleaved in the presence of Botulinum Neurotoxin. The substrate molecule includes a reporter moiety. The substrate molecule is exposed to the sample, and resulting reaction products separated using electrophoretic separation. The elution time of the reporter moiety may be utilized to identify the presence or absence of the active target agent.

Sommer, Gregory J; Hatch, Anson V; Singh, Anup K; Wang, Ying-Chih

2014-10-28T23:59:59.000Z

323

A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers  

E-Print Network [OSTI]

The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around $10^{17}$ eV.

Green, K; Suprun, D A; Wilkerson, J F; Green, Kevin; Rosner, Jonathan L.; Suprun, Denis A.

2003-01-01T23:59:59.000Z

324

A prototype system for detecting the radio-frequency pulse associated with cosmic ray air showers  

E-Print Network [OSTI]

The development of a system to detect the radio-frequency (RF) pulse associated with extensive air showers of cosmic rays is described. This work was performed at the CASA/MIA array in Utah, with the intention of designing equipment that can be used in conjunction with the Auger Giant Array. A small subset of data (less than 40 out of a total of 600 hours of running time), taken under low-noise conditions, permitted upper limits to be placed on the rate for pulses accompanying showers of energies around $10^{17}$ eV.

Kevin Green; Jonathan L. Rosner; Denis A. Suprun; J. F. Wilkerson

2003-04-14T23:59:59.000Z

325

System for detecting and limiting electrical ground faults within electrical devices  

DOE Patents [OSTI]

An electrical ground fault detection and limitation system for employment with a nuclear reactor utilizing a liquid metal coolant. Elongate electromagnetic pumps submerged within the liquid metal coolant and electrical support equipment experiencing an insulation breakdown occasion the development of electrical ground fault current. Without some form of detection and control, these currents may build to damaging power levels to expose the pump drive components to liquid metal coolant such as sodium with resultant undesirable secondary effects. Such electrical ground fault currents are detected and controlled through the employment of an isolated power input to the pumps and with the use of a ground fault control conductor providing a direct return path from the affected components to the power source. By incorporating a resistance arrangement with the ground fault control conductor, the amount of fault current permitted to flow may be regulated to the extent that the reactor may remain in operation until maintenance may be performed, notwithstanding the existence of the fault. Monitors such as synchronous demodulators may be employed to identify and evaluate fault currents for each phase of a polyphase power, and control input to the submerged pump and associated support equipment.

Gaubatz, Donald C. (Cupertino, CA)

1990-01-01T23:59:59.000Z

326

LOW-COST BACTERIAL DETECTION SYSTEM FOR FOOD SAFETY BASED ON AUTOMATED DNA EXTRACTION, AMPLIFICATION AND READOUT  

E-Print Network [OSTI]

To ensure food, medical and environmental safety and quality, rapid, low-cost and easy-to-use detection methods are desirable. Here, the LabSystem is introduced for integrated, automated DNA purification and amplification. ...

Hoehl, Melanie Margarete

327

Efficient Detection on Stochastic Faults in PLC Based Automated Assembly Systems With Novel Sensor Deployment and Diagnoser Design  

E-Print Network [OSTI]

In this dissertation, we proposed solutions on novel sensor deployment and diagnoser design to efficiently detect stochastic faults in PLC based automated systems First, a fuzzy quantitative graph based sensor deployment was called upon to model...

Wu, Zhenhua

2012-07-16T23:59:59.000Z

328

Detection and location of leaks in district heating steam systems: Survey and review of current technology and practices  

SciTech Connect (OSTI)

This report presents the results of a survey undertaken to identify and characterize current practices for detecting and locating leaks in district heating systems, particular steam systems. Currently used technology and practices are reviewed. In addition, the survey was used to gather information that may be important for the application of acoustic leak detection. A few examples of attempts to locate leaks in steam and hot water pipes by correlation of acoustic signals generated by the leaks are also discussed.

Kupperman, D.S.; Raptis, A.C.; Lanham, R.N.

1992-03-01T23:59:59.000Z

329

NA22 Model Cities Project - LL244T An Intelligent Transportation System-Based Radiation Alert and Detection System  

SciTech Connect (OSTI)

The purpose of this project was twofold: first, provide an understanding of the technical foundation and planning required for deployment of Intelligent Transportation System (ITS)-based system architectures for the protection of New York City from a terrorist attack using a vehicle-deployed nuclear device; second, work with stakeholders to develop mutual understanding of the technologies and tactics required for threat detection/identification and establish guidelines for designing operational systems and procedures. During the course of this project we interviewed and coordinated analysis with people from the New Jersey State Attorney General's office, the New Jersey State Police, the Port Authority of New York/New Jersey, the Counterterrorism Division of the New York City Police Department, the New Jersey Transit Authority, the State of New Jersey Department of Transportation, TRANSCOM and a number of contractors involved with state and federal intelligent transportation development and implementation. The basic system architecture is shown in the figure below. In an actual system deployment, radiation sensors would be co-located with existing ITS elements and the data will be sent to the Traffic Operations Center. A key element of successful system operation is the integration of vehicle data, such as license plate, EZ pass ID, vehicle type/color and radiation signature. A threat data base can also be implemented and utilized in cases where there is a suspect vehicle identified from other intelligence sources or a mobile detector system. Another key aspect of an operational architecture is the procedures used to verify the threat and plan interdiction. This was a major focus of our work and discussed later in detail. In support of the operational analysis, we developed a detailed traffic simulation model that is described extensively in the body of the report.

Peglow, S

2004-02-24T23:59:59.000Z

330

Magnetophoretic bead trapping in a high-flowrate biological detection system.  

SciTech Connect (OSTI)

This report contains the summary of the 'Magnetophoretic Bead Trapping in a High-Flowrate Biological Detection System' LDRD project 74795. The objective of this project is to develop a novel biodetection system for high-throughput sample analysis. The chief application of this system is in detection of very low concentrations of target molecules from a complex liquid solution containing many different constituents--some of which may interfere with identification of the target molecule. The system is also designed to handle air sampling by using an aerosol system (for instance a WESP - Wet Electro-Static Precipitator, or an impact spray system) to get air sample constituents into the liquid volume. The system described herein automatically takes the raw liquid sample, whether air converted or initially liquid matrix, and mixes in magnetic detector beads that capture the targets of interest and then performs the sample cleanup function, allowing increased sensitivity and eliminating most false positives and false negatives at a downstream detector. The surfaces of the beads can be functionalized in a variety of ways in order to maximize the number of targets to be captured and concentrated. Bacteria and viruses are captured using antibodies to surface proteins on bacterial cell walls or viral particle coats. In combination with a cell lysis or PCR (Polymerase Chain Reaction), the beads can be used as a DNA or RNA probe to capture nucleic acid patterns of interest. The sample cleanup capability of this system would allow different raw biological samples, such as blood or saliva to be analyzed for the presence of different infectious agents (e.g. smallpox or SARS). For future studies, we envision functionalizing bead surfaces to bind to chemical weapons agents, radio-isotopes, and explosives. The two main objectives of this project were to explore methods for enhancing the mixing of the capture microspheres in the sample, and to develop a novel high-throughput magnetic microsphere trap. We have developed a novel technique using the magnetic capture microspheres as 'stirrer bars' in a fluid sample to enhance target binding to the microsphere surfaces. We have also made progress in developing a polymer-MEMS electromagnet for trapping magnetic spheres in a high-flowrate fluid format.

Galambos, Paul C.; Hopkins, Matthew Morgan; Rahimian, Kamayar; Martin, James Ellis; Anderson, G. Ronald; Clem, Paul Gilbert; Rohwer, Lauren Elizabeth Shea; Lemp, Thomas; Derzon, Mark Steven; James, Conrad D.

2005-03-01T23:59:59.000Z

331

Discrimination Report: A Multisensor system for detection andcharacterization of UXO, ESTCP Project MM-0437,  

SciTech Connect (OSTI)

The Berkeley UXO Discriminator (BUD) is an optimally designed active electromagnetic system that not only detects but also characterizes UXO. The performance of the system is governed by a target size-depth curve. BUD was designed to detect UXO in the 20 mm to 155 mm size range for depths between 0 and 1.5 m, and to characterize them in a depth range from 0 to 1.1 m. The system incorporates three orthogonal transmitters and eight pairs of differenced receivers. Eight receiver coils are placed horizontally along the two diagonals of the upper and lower planes of the two horizontal transmitter loops. These receiver coil pairs are located on symmetry lines through the center of the system and each pair sees identical fields during the on-time of the pulse in all of the transmitter coils. They are wired in opposition to produce zero output during the on-time of the pulses in three orthogonal transmitters. Moreover, this configuration dramatically reduces noise in the measurements by canceling the background electromagnetic fields (these fields are uniform over the scale of the receiver array and are consequently nulled by the differencing operation), and by canceling the noise contributed by the tilt motion of the receivers in the Earth's magnetic field, and greatly enhances receiver sensitivity to the gradients of the target response. BUD is mounted on a small cart to assure system mobility. System positioning is provided by a Real Time Kinematic (RTK) GPS receiver. The system has two modes of operation: (1) the search mode, in which BUD moves along a profile and exclusively detects targets in its vicinity providing target depth and horizontal location, and (2) the discrimination mode, in which BUD is stationary above a target, and determines three discriminating polarizability responses together with the object location and orientation from a single position of the system. The detection performance of the system is governed by a size-depth curve shown in Figure 2. This curve was calculated for BUD assuming that the receiver plane is 0.2 m above the ground. Figure 2 shows that, for example, BUD can detect an object with 0.1 m diameter down to the depth of 0.9 m with a depth uncertainty of 10%. Any objects buried at a depth of more than 1.3 m will have a low probability of detection. The discrimination performance of the system is governed by a size-depth curve shown in Figure 3. Again, this curve was calculated for BUD assuming that the receiver plane is 0.2 m above the ground. Figure 3 shows that, for example, BUD can determine the polarizability of an object with 0.1 m diameter down to the depth of 0.63 m with polarizability uncertainty of 10%. Any objects buried at the depth more than 0.9 m will have a low discrimination probability. Object orientation estimates and equivalent dipole polarizability estimates used for large and shallow UXO/scrap discrimination are more problematic as they are affected by higher order (non-dipole) terms induced in objects due to source field gradients along the length of the objects. For example, a vertical 0.4 m object directly below the system needs to be about 0.90 m deep for perturbations due to gradients along the length of the object to be of the order of 20% of the uniform field object response. Similarly, vertical objects 0.5 m, and 0.6 m long need to be 1.15 m, and 1.42 m, respectively, below the system. For horizontal objects the effect of gradients across the object diameter are much smaller. For example, 155 mm and 105 mm projectiles need to be only 0.30 m, and 0.19 m, respectively, below the system. A polarizability index (in cm{sup 3}), which is an average value of the product of time (in seconds) and polarizability rate (in m{sup 3}/s) over the 34 sample times logarithmically spaced from 143 to 1300 {micro}s, and three polarizabilities, can be calculated for any object. We used this polarizability index to decide when the object is in a uniform source field. Objects with the polarizability index smaller than 600 cm{sup 3} and deeper than 1.8 m below BUD, or smaller than 200

Gasperikova, Erika; Smith, J. Torquil; Morrison, H.Frank; Becker,Alex

2008-01-14T23:59:59.000Z

332

Ion mobility spectrometer, spectrometer analyte detection and identification verification system, and method  

DOE Patents [OSTI]

Methods and apparatus for ion mobility spectrometry and analyte detection and identification verification system are disclosed. The apparatus is configured to be used in an ion mobility spectrometer and includes a plurality of reactant reservoirs configured to contain a plurality of reactants which can be reacted with the sample to form adducts having varying ion mobilities. A carrier fluid, such as air or nitrogen, is used to carry the sample into the spectrometer. The plurality of reactants are configured to be selectively added to the carrier stream by use inlet and outlet manifolds in communication with the reagent reservoirs, the reservoirs being selectively isolatable by valves. The invention further includes a spectrometer having the reagent system described. In the method, a first reactant is used with the sample. Following a positive result, a second reactant is used to determine whether a predicted response occurs. The occurrence of the second predicted response tends to verify the existence of a component of interest within the sample. A third reactant can also be used to provide further verification of the existence of a component of interest. A library can be established of known responses of compounds of interest with various reactants and the results of a specific multi-reactant survey of a sample can be compared against the library to determine whether a component detected in the sample is likely to be a specific component of interest.

Atkinson, David A. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

333

Performance characteristics of the annular core research reactor fuel motion detection system  

SciTech Connect (OSTI)

Recent proof tests have shown that the annular core research reactor (ACRR) fuel motion detection system has reached its design goals of providing high temporal and spatial resolution pictures of fuel distributions in the ACRR. The coded aperture imaging system (CAIS) images the fuel by monitoring the fission gamma rays from the fuel that pass through collimators in the reactor core. The gamma-ray beam is modulated by coded apertures before producing a visible light coded image in thin scintillators. Each coded image is then amplified and recorded by an opticalimage-intensifier/fast-framing-camera combination. The proximity to the core and the coded aperture technique provide a high data collection rate and high resolution. Experiments of CAIS at the ACRR conducted under steady-state operation have documented the beneficial effects of changes in the radiation shielding and imaging technique. The spatial resolutions are 1.7 mm perpendicular to the axis of a single liquid-metal fast breeder reactor fuel pin and 9 mm in the axial dimension. Changes in mass of 100 mg in each resolution element can be detected each frame period, which may be from 5 to 100 ms. This diagnostic instrument may help resolve important questions in fuel motion phenomenology.

Kelly, J.G.; Stalker, K.T.

1983-12-01T23:59:59.000Z

334

Sequence Alignment for Masquerade Detection Scott E. Coull1  

E-Print Network [OSTI]

, however, these state-of-the-art security technologies are rendered useless. For instance, once a user has, administrators rely on security technologies such as firewalls, network and host-based intrusion detection technologies. Clearly, such attacks pose a serious threat, and their detection often occurs long after

Bystroff, Chris

335

Sensing system for detection and control of deposition on pendant tubes in recovery and power boilers  

DOE Patents [OSTI]

A system for detection and control of deposition on pendant tubes in recovery and power boilers includes one or more deposit monitoring sensors operating in infrared regions of about 4 or 8.7 microns and directly producing images of the interior of the boiler, or producing feeding signals to a data processing system for information to enable a distributed control system by which the boilers are operated to operate said boilers more efficiently. The data processing system includes an image pre-processing circuit in which a 2-D image formed by the video data input is captured, and includes a low pass filter for performing noise filtering of said video input. It also includes an image compensation system for array compensation to correct for pixel variation and dead cells, etc., and for correcting geometric distortion. An image segmentation module receives a cleaned image from the image pre-processing circuit for separating the image of the recovery boiler interior into background, pendant tubes, and deposition. It also accomplishes thresholding/clustering on gray scale/texture and makes morphological transforms to smooth regions, and identifies regions by connected components. An image-understanding unit receives a segmented image sent from the image segmentation module and matches derived regions to a 3-D model of said boiler. It derives a 3-D structure the deposition on pendant tubes in the boiler and provides the information about deposits to the plant distributed control system for more efficient operation of the plant pendant tube cleaning and operating systems.

Kychakoff, George (Maple Valley, WA); Afromowitz, Martin A. (Mercer Island, WA); Hogle, Richard E. (Olympia, WA)

2008-10-14T23:59:59.000Z

336

Effective detective quantum efficiency for two mammography systems: Measurement and comparison against established metrics  

SciTech Connect (OSTI)

Purpose: The aim of this paper was to illustrate the value of the new metric effective detective quantum efficiency (eDQE) in relation to more established measures in the optimization process of two digital mammography systems. The following metrics were included for comparison against eDQE: detective quantum efficiency (DQE) of the detector, signal difference to noise ratio (SdNR), and detectability index (d?) calculated using a standard nonprewhitened observer with eye filter.Methods: The two systems investigated were the Siemens MAMMOMAT Inspiration and the Hologic Selenia Dimensions. The presampling modulation transfer function (MTF) required for the eDQE was measured using two geometries: a geometry containing scattered radiation and a low scatter geometry. The eDQE, SdNR, and d? were measured for poly(methyl methacrylate) (PMMA) thicknesses of 20, 40, 60, and 70 mm, with and without the antiscatter grid and for a selection of clinically relevant target/filter (T/F) combinations. Figures of merit (FOMs) were then formed from SdNR and d? using the mean glandular dose as the factor to express detriment. Detector DQE was measured at energies covering the range of typical clinically used spectra.Results: The MTF measured in the presence of scattered radiation showed a large drop at low spatial frequency compared to the low scatter method and led to a corresponding reduction in eDQE. The eDQE for the Siemens system at 1 mm{sup ?1} ranged between 0.15 and 0.27, depending on T/F and grid setting. For the Hologic system, eDQE at 1 mm{sup ?1} varied from 0.15 to 0.32, again depending on T/F and grid setting. The eDQE results for both systems showed that the grid increased the system efficiency for PMMA thicknesses of 40 mm and above but showed only small sensitivity to T/F setting. While results of the SdNR and d? based FOMs confirmed the eDQE grid position results, they were also more specific in terms of T/F selection. For the Siemens system at 20 mm PMMA, the FOMs indicated Mo/Mo (grid out) as optimal while W/Rh (grid in) was the optimal configuration at 40, 60, and 70 mm PMMA. For the Hologic, the FOMs pointed to W/Rh (grid in) at 20 and 40 mm of PMMA while W/Ag (grid in) gave the highest FOM at 60 and 70 mm PMMA. Finally, DQE at 1 mm{sup ?1} averaged for the four beam qualities studied was 0.44 ± 0.02 and 0.55 ± 0.03 for the Siemens and Hologic detectors, respectively, indicating only a small influence of energy on detector DQE.Conclusions: Both the DQE and eDQE data showed only a small sensitivity to T/F setting for these two systems. The eDQE showed clear preferences in terms of scatter reduction, being highest for the grid-in geometry for PMMA thicknesses of 40 mm and above. The SdNR and d? based figures of merit, which contain additional weighting for contrast and dose, pointed to specific T/F settings for both systems.

Salvagnini, Elena [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven, Belgium and SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)] [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven, Belgium and SCK-CEN, Boeretang 200, B-2400 Mol (Belgium); Bosmans, Hilde; Marshall, Nicholas W. [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven (Belgium)] [UZ Gasthuisberg, Medical Imaging Research Center and Department of Radiology, Herestraat 49, B-3000 Leuven (Belgium); Struelens, Lara [SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)] [SCK-CEN, Boeretang 200, B-2400 Mol (Belgium)

2013-10-15T23:59:59.000Z

337

Mining Building Energy Management System Data Using Fuzzy Anomaly Detection and Linguistic Descriptions  

SciTech Connect (OSTI)

Building Energy Management Systems (BEMSs) are essential components of modern buildings that utilize digital control technologies to minimize energy consumption while maintaining high levels of occupant comfort. However, BEMSs can only achieve these energy savings when properly tuned and controlled. Since indoor environment is dependent on uncertain criteria such as weather, occupancy, and thermal state, performance of BEMS can be sub-optimal at times. Unfortunately, the complexity of BEMS control mechanism, the large amount of data available and inter-relations between the data can make identifying these sub-optimal behaviors difficult. This paper proposes a novel Fuzzy Anomaly Detection and Linguistic Description (Fuzzy-ADLD) based method for improving the understandability of BEMS behavior for improved state-awareness. The presented method is composed of two main parts: 1) detection of anomalous BEMS behavior and 2) linguistic representation of BEMS behavior. The first part utilizes modified nearest neighbor clustering algorithm and fuzzy logic rule extraction technique to build a model of normal BEMS behavior. The second part of the presented method computes the most relevant linguistic description of the identified anomalies. The presented Fuzzy-ADLD method was applied to real-world BEMS system and compared against a traditional alarm based BEMS. In six different scenarios, the Fuzzy-ADLD method identified anomalous behavior either as fast as or faster (an hour or more), that the alarm based BEMS. In addition, the Fuzzy-ADLD method identified cases that were missed by the alarm based system, demonstrating potential for increased state-awareness of abnormal building behavior.

Dumidu Wijayasekara; Ondrej Linda; Milos Manic; Craig Rieger

2014-08-01T23:59:59.000Z

338

FUEGO — Fire Urgency Estimator in Geosynchronous Orbit — A Proposed Early-Warning Fire Detection System  

E-Print Network [OSTI]

Remote Sens. 2013, 5 satellite with modern imaging detectors, software, and algorithms able to detect heat

Kelly, Maggi

2013-01-01T23:59:59.000Z

339

Physics-based, Bayesian sequential detection method and system for radioactive contraband  

DOE Patents [OSTI]

A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

2014-03-18T23:59:59.000Z

340

Methods and systems for low frequency seismic and infrasound detection of geo-pressure transition zones  

DOE Patents [OSTI]

Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

Shook, G. Michael; LeRoy, Samuel D.; Benzing, William M.

2006-07-18T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Systems for low frequency seismic and infrasound detection of geo-pressure transition zones  

DOE Patents [OSTI]

Methods for determining the existence and characteristics of a gradational pressurized zone within a subterranean formation are disclosed. One embodiment involves employing an attenuation relationship between a seismic response signal and increasing wavelet wavelength, which relationship may be used to detect a gradational pressurized zone and/or determine characteristics thereof. In another embodiment, a method for analyzing data contained within a response signal for signal characteristics that may change in relation to the distance between an input signal source and the gradational pressurized zone is disclosed. In a further embodiment, the relationship between response signal wavelet frequency and comparative amplitude may be used to estimate an optimal wavelet wavelength or range of wavelengths used for data processing or input signal selection. Systems for seismic exploration and data analysis for practicing the above-mentioned method embodiments are also disclosed.

Shook, G. Michael (Idaho Falls, ID); LeRoy, Samuel D. (Houston, TX); Benzing, William M. (Tulsa, OK)

2007-10-16T23:59:59.000Z

342

Establishment of a facility for intrusive characterization of transuranic waste at the Nevada Test Site  

SciTech Connect (OSTI)

This paper describes design and construction, project management, and testing results associated with the Waste Examination Facility (WEF) recently constructed at the Nevada Test Site (NTS). The WEF and associated systems were designed, procured, and constructed on an extremely tight budget and within a fast track schedule. Part 1 of this paper focuses on design and construction activities, Part 2 discusses project management of WEF design and construction activities, and Part 3 describes the results of the transuranic (TRU) waste examination pilot project conducted at the WEF. In Part 1, the waste examination process is described within the context of Waste Isolation Pilot Plant (WIPP) characterization requirements. Design criteria are described from operational and radiological protection considerations. The WEF engineered systems are described. These systems include isolation barriers using a glove box and secondary containment structure, high efficiency particulate air (HEPA) filtration and ventilation systems, differential pressure monitoring systems, and fire protection systems. In Part 2, the project management techniques used for ensuring that stringent cost/schedule requirements were met are described. The critical attributes of these management systems are described with an emphasis on team work. In Part 3, the results of a pilot project directed at performing intrusive characterization (i.e., examination) of TRU waste at the WEF are described. Project activities included cold and hot operations. Cold operations included operator training, facility systems walk down, and operational procedures validation. Hot operations included working with plutonium contaminated TRU waste and consisted of waste container breaching, waste examination, waste segregation, data collection, and waste repackaging.

Foster, B.D.; Musick, R.G.; Pedalino, J.P.; Cowley, J.L. [Bechtel Nevada Corp., Las Vegas, NV (United States); Karney, C.C. [Dept. of Energy, Las Vegas, NV (United States); Kremer, J.L.

1998-01-01T23:59:59.000Z

343

Non-intrusive water utility monitoring and free-space load monitoring  

E-Print Network [OSTI]

This work presents a non-intrusive, single-point sensing scheme to monitor the water usage for various loads on a water utility pipe network through the vibration of a pipe near the water intake source. Experiments with ...

Neuman, Sabrina M

2011-01-01T23:59:59.000Z

344

Interpreting human activity from electrical consumption data through non-intrusive load monitoring  

E-Print Network [OSTI]

Non-intrusive load monitoring (NILM) has three distinct advantages over today's smart meters. First, it offers accountability. Few people know where their kWh's are going. Second, it is a maintenance tool. Signs of wear ...

Gillman, Mark Daniel

2014-01-01T23:59:59.000Z

345

Evaluation of non-intrusive monitoring for condition based maintenance applications on US Navy propulsion plants  

E-Print Network [OSTI]

The thesis explores the use of the Non-intrusive Load Monitor (NILM) in Condition Based Maintenance (CBM) applications on US Navy ships as part of the Office of Naval Research Electric Ship Integration (ESI) Initiative. ...

Greene, William C. (William Calvin)

2005-01-01T23:59:59.000Z

346

Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador  

E-Print Network [OSTI]

Stratovolcano growth by coeruptive intrusion: The 2008 eruption of Tungurahua Ecuador J. Biggs,1 of the edifice, or temporary, in which case the magma will be released in a future eruption. Citation: Biggs, J

Biggs, Juliet

347

Assessment of Seawater Intrusion Potential From Sea-level Rise in Coastal Aquifers of California  

E-Print Network [OSTI]

2009). Impact of Sea-Level Rise on Sea Water Intrusion inC. (1997). Global Sea Level Rise: A Redetermination. Surveys2007). Effects of sea-level rise on groundwater flow in a

Loáiciga, Hugo A; Pingel, Thomas J; Garcia, Elizabeth S

2009-01-01T23:59:59.000Z

348

Effects of droplet size on intrusion of sub-surface oil spills  

E-Print Network [OSTI]

This thesis explores the effects of droplet size on droplet intrusion in sub-surface oil spills. Laboratory experiments were performed where glass beads of various sizes, which serve to simulate oil droplets in deepsea oil ...

Chan, Godine Kok Yan

2013-01-01T23:59:59.000Z

349

A H-infinity Fault Detection and Diagnosis Scheme for Discrete Nonlinear System Using Output Probability Density Estimation  

SciTech Connect (OSTI)

In this paper, a H-infinity fault detection and diagnosis (FDD) scheme for a class of discrete nonlinear system fault using output probability density estimation is presented. Unlike classical FDD problems, the measured output of the system is viewed as a stochastic process and its square root probability density function (PDF) is modeled with B-spline functions, which leads to a deterministic space-time dynamic model including nonlinearities, uncertainties. A weighting mean value is given as an integral function of the square root PDF along space direction, which leads a function only about time and can be used to construct residual signal. Thus, the classical nonlinear filter approach can be used to detect and diagnose the fault in system. A feasible detection criterion is obtained at first, and a new H-infinity adaptive fault diagnosis algorithm is further investigated to estimate the fault. Simulation example is given to demonstrate the effectiveness of the proposed approaches.

Zhang Yumin; Lum, Kai-Yew [Temasek Laboratories, National University of Singapore, Singapore 117508 (Singapore); Wang Qingguo [Depa. Electrical and Computer Engineering, National University of Singapore, Singapore 117576 (Singapore)

2009-03-05T23:59:59.000Z

350

High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device  

DOE Patents [OSTI]

An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD. 13 figs.

Atac, M.; McKay, T.A.

1998-04-21T23:59:59.000Z

351

High resolution biomedical imaging system with direct detection of x-rays via a charge coupled device  

DOE Patents [OSTI]

An imaging system is provided for direct detection of x-rays from an irradiated biological tissue. The imaging system includes an energy source for emitting x-rays toward the biological tissue and a charge coupled device (CCD) located immediately adjacent the biological tissue and arranged transverse to the direction of irradiation along which the x-rays travel. The CCD directly receives and detects the x-rays after passing through the biological tissue. The CCD is divided into a matrix of cells, each of which individually stores a count of x-rays directly detected by the cell. The imaging system further includes a pattern generator electrically coupled to the CCD for reading a count from each cell. A display device is provided for displaying an image representative of the count read by the pattern generator from the cells of the CCD.

Atac, Muzaffer (Wheaton, IL); McKay, Timothy A. (Ann Arbor, MI)

1998-01-01T23:59:59.000Z

352

Stragegies to Detect Hidden Geothermal Systems Based on Monitoringand Analysis of CO2 in the Near-Surface Environment  

SciTech Connect (OSTI)

We investigate the potential for CO2 monitoring in thenear-surface environment as an approach to exploration for hiddengeothermal systems. Numerical simulations of CO2 migration from a modelhidden geothermal system show that CO2 concentrations can reach highlevels in the shallow subsurface even for relatively low CO2 fluxes.Therefore, subsurface measurements offer an advantage over above-groundmeasurements which are affected by winds that rapidly disperse CO2. Tomeet the challenge of detecting geothermal CO2 emissions within thenatural background variability of CO2, we propose an approach thatintegrates available detection and monitoring techniques with statisticalanalysis and modeling.

Lewicki, Jennifer L.; Oldenburg, Curtis M.

2005-03-29T23:59:59.000Z

353

Automated High-Pressure Titration System with In Situ Infrared Spectroscopic Detection  

SciTech Connect (OSTI)

A fully automated titration system with infrared detection was developed for investigating interfacial chemistry at high pressures. The apparatus consists of a high-pressure fluid generation and delivery system coupled to a high-pressure cell with infrared optics. A manifold of electronically actuated valves is used to direct pressurized fluids into the cell. Precise reagent additions to the pressurized cell are made with calibrated tubing loops that are filled with reagent and placed in-line with the cell and a syringe pump. The cell’s infrared optics facilitate both transmission and attenuated total reflection (ATR) measurements to monitor bulk-fluid composition and solid-surface phenomena such as adsorption, desorption, complexation, dissolution, and precipitation. Switching between the two measurement modes is accomplished with moveable mirrors that direct radiation from a Fourier transform infrared spectrometer into the cell along transmission or ATR light paths. The versatility of the high-pressure IR titration system is demonstrated with three case studies. First, we titrated water into supercritical CO2 (scCO2) to generate an infrared calibration curve and determine the solubility of water in CO2 at 50 °C and 90 bar. Next, we characterized the partitioning of water between a montmorillonite clay and scCO2 at 50 °C and 90 bar. Transmission-mode spectra were used to quantify changes in the clay’s sorbed water concentration as a function of scCO2 hydration, and ATR measurements provided insights into competitive residency of water and CO2 on the clay surface and in the interlayer. Finally, we demonstrated how time-dependent studies can be conducted with the system by monitoring the carbonation reaction of forsterite (Mg2SiO4) in water-bearing scCO2 at 50 °C and 90 bar. Immediately after water dissolved in the scCO2, a thin film of adsorbed water formed on the mineral surface, and the film thickness increased with time as the forsterite began to dissolve. However, after approximately 2.5 hours, the trend reversed, and a carbonate precipitate began to form on the forsterite surface, exposing dramatic chemical changes in the thin-water film. Collectively, these applications illustrate how the high-pressure IR titration system can provide molecular-level information about the interactions between variably wet scCO2 and minerals relevant to underground storage of CO2 (geologic carbon sequestration). The apparatus could also be utilized to study high-pressure interfacial chemistry in other areas such as catalysis, polymerization, food processing, and oil and gas recovery.

Thompson, Christopher J.; Martin, Paul F.; Chen, Jeffrey; Benezeth, Pascale; Schaef, Herbert T.; Rosso, Kevin M.; Felmy, Andrew R.; Loring, John S.

2014-04-17T23:59:59.000Z

354

Automated high-pressure titration system with in situ infrared spectroscopic detection  

SciTech Connect (OSTI)

A fully automated titration system with infrared detection was developed for investigating interfacial chemistry at high pressures. The apparatus consists of a high-pressure fluid generation and delivery system coupled to a high-pressure cell with infrared optics. A manifold of electronically actuated valves is used to direct pressurized fluids into the cell. Precise reagent additions to the pressurized cell are made with calibrated tubing loops that are filled with reagent and placed in-line with the cell and a syringe pump. The cell's infrared optics facilitate both transmission and attenuated total reflection (ATR) measurements to monitor bulk-fluid composition and solid-surface phenomena such as adsorption, desorption, complexation, dissolution, and precipitation. Switching between the two measurement modes is accomplished with moveable mirrors that direct the light path of a Fourier transform infrared spectrometer into the cell along transmission or ATR light paths. The versatility of the high-pressure IR titration system was demonstrated with three case studies. First, we titrated water into supercritical CO{sub 2} (scCO{sub 2}) to generate an infrared calibration curve and determine the solubility of water in CO{sub 2} at 50?°C and 90 bar. Next, we characterized the partitioning of water between a montmorillonite clay and scCO{sub 2} at 50?°C and 90 bar. Transmission-mode spectra were used to quantify changes in the clay's sorbed water concentration as a function of scCO{sub 2} hydration, and ATR measurements provided insights into competitive residency of water and CO{sub 2} on the clay surface and in the interlayer. Finally, we demonstrated how time-dependent studies can be conducted with the system by monitoring the carbonation reaction of forsterite (Mg{sub 2}SiO{sub 4}) in water-bearing scCO{sub 2} at 50?°C and 90 bar. Immediately after water dissolved in the scCO{sub 2}, a thin film of adsorbed water formed on the mineral surface, and the film thickness increased with time as the forsterite began to dissolve. However, after approximately 2.5 h, the trend reversed, and a carbonate precipitate began to form on the forsterite surface, exposing dramatic chemical changes in the thin-water film. Collectively, these applications illustrate how the high-pressure IR titration system can provide molecular-level information about the interactions between variably wet scCO{sub 2} and minerals relevant to underground storage of CO{sub 2} (geologic carbon sequestration). The apparatus could also be utilized to study high-pressure interfacial chemistry in other areas such as catalysis, polymerization, food processing, and oil and gas recovery.

Thompson, Christopher J., E-mail: chris.thompson@pnnl.gov; Martin, Paul F.; Chen, Jeffrey; Schaef, Herbert T.; Rosso, Kevin M.; Felmy, Andrew R.; Loring, John S. [Pacific Northwest National Laboratory, Richland, Washington 99352 (United States)] [Pacific Northwest National Laboratory, Richland, Washington 99352 (United States); Benezeth, Pascale [Géosciences Environnement Toulouse (GET), CNRS-Université de Toulouse, 31400 Toulouse (France)] [Géosciences Environnement Toulouse (GET), CNRS-Université de Toulouse, 31400 Toulouse (France)

2014-04-15T23:59:59.000Z

355

System and method for constructing filters for detecting signals whose frequency content varies with time  

DOE Patents [OSTI]

A system and method are disclosed for constructing a bank of filters which detect the presence of signals whose frequency content varies with time. The present invention includes a novel system and method for developing one or more time templates designed to match the received signals of interest and the bank of matched filters use the one or more time templates to detect the received signals. Each matched filter compares the received signal x(t) with a respective, unique time template that has been designed to approximate a form of the signals of interest. The robust time domain template is assumed to be of the order of w(t)=A(t)cos(2{pi}{phi}(t)) and the present invention uses the trajectory of a joint time-frequency representation of x(t) as an approximation of the instantaneous frequency function {phi}{prime}(t). First, numerous data samples of the received signal x(t) are collected. A joint time frequency representation is then applied to represent the signal, preferably using the time frequency distribution series. The joint time-frequency transformation represents the analyzed signal energy at time t and frequency f, P(t,f), which is a three-dimensional plot of time vs. frequency vs. signal energy. Then P(t,f) is reduced to a multivalued function f(t), a two dimensional plot of time vs. frequency, using a thresholding process. Curve fitting steps are then performed on the time/frequency plot, preferably using Levenberg-Marquardt curve fitting techniques, to derive a general instantaneous frequency function {phi}{prime}(t) which best fits the multivalued function f(t). Integrating {phi}{prime}(t) along t yields {phi}{prime}(t), which is then inserted into the form of the time template equation. A suitable amplitude A(t) is also preferably determined. Once the time template has been determined, one or more filters are developed which each use a version or form of the time template. 7 figs.

Qian, S.; Dunham, M.E.

1996-11-12T23:59:59.000Z

356

Detection technique and front-end RF tunable filter for cognitive radio systems  

E-Print Network [OSTI]

Introduction to Microelectromechanical Systems Engineer-high reliability. 2. Microelectromechanical system filters [73–80]: Microelectromechanical systems (MEMS) is the

Park, Sanghoon

2010-01-01T23:59:59.000Z

357

Fiber optic sensor system for detecting movement or position of a rotating wheel bearing  

DOE Patents [OSTI]

An improved fiber optic sensor system and integrated sensor bearing assembly for detecting movement or position of a rotating wheel bearing having a multi-pole tone ring which produces an alternating magnetic field indicative of movement and position of the rotating member. A magneto-optical material, such as a bismuth garnet iron (B.I.G.) crystal, having discrete magnetic domains is positioned in the vicinity of the tone ring so that the domains align themselves to the magnetic field generated by the tone ring. A single fiber optic cable, preferably single mode fiber, carries light generated by a source of light to the B.I.G. crystal. The light passes through the B.I.G. crystal and is refracted at domain boundaries in the crystal. The intensity of the refracted light is indicative of the amount of alignment of the domains and therefore the strength of the magnetic field. The refracted light is carried by the fiber optic cable to an optic receiver where the intensity is measured and an electrical signal is generated and sent to a controller indicating the frequency of the changes in light intensity and therefore the rotational speed of the rotating wheel bearing.

Veeser, Lynn R. (Los Alamos, NM); Rodriguez, Patrick J. (Santa Fe, NM); Forman, Peter R. (Los Alamos, NM); Monahan, Russell E. (Ann Arbor, MI); Adler, Jonathan M. (Ypsilanti, MI)

1997-01-01T23:59:59.000Z

358

LYNX: An unattended sensor system for detection of gamma-ray and neutron emissions from special nuclear materials  

SciTech Connect (OSTI)

This manuscript profiles an unattended and fully autonomous detection system sensitive to gamma-ray and neutron emissions from special nuclear material. The LYNX design specifically targets applications that require radiation detection capabilities but possess little or no infrastructure. In these settings, users need the capability to deploy sensors for extended periods of time that analyze whatever signal-starved data can be captured, since little or no control may be exerted over measurement conditions. The fundamental sensing elements of the LYNX system are traditional NaI(Tl) and 3He detectors. The new developments reported here center on two themes: low-power electronics and computationally simple analysis algorithms capable of discriminating gamma-ray signatures indicative of special nuclear materials from those of naturally occurring radioactive material. Incorporating tripwire-detection algorithms based on gamma-ray spectral signatures into a low-power electronics package significantly improves performance in environments where sensors encounter nuisance sources.

Runkle, Robert C.; Myjak, Mitchell J.; Kiff, Scott D.; Sidor, Daniel E.; Morris, Scott J.; Rohrer, John S.; Jarman, Kenneth D.; Pfund, David M.; Todd, Lindsay C.; Bowler, Ryan S.; Mullen, Crystal A.

2009-01-21T23:59:59.000Z

359

The role of the total entropy production in dynamics of open quantum systems in detection of non-Markovianity  

E-Print Network [OSTI]

In the theory of open quantum systems interaction is a fundamental concepts in the review of the dynamics of open quantum systems. Correlation, both classical and quantum one, is generated due to interaction between system and environment. Here, we recall the quantity which well known as total entropy production. Appearance of total entropy production is due to the entanglement production between system an environment. In this work, we discuss about the role of the total entropy production for detecting non-Markovianity. By utilizing the relation between total entropy production and total correlation between subsystems, one can see a temporary decrease of total entropy production is a signature of non-Markovianity.

S. Salimi; S. Haseli; A. S. Khorashad

2015-04-19T23:59:59.000Z

360

SMARTx: An Embedded Proximity Detection System for Reducing CS4000: Individual Studies in Computer Science -SMARTx: Software and  

E-Print Network [OSTI]

detection, we explored development with the use of Arduino boards and compatible sensors. We spend many hours learning how to set up and program our Arduino Uno boards and sensors. It was a great learning we had created a server/client Arduino based system that notified a user when each device was within

Zhuang, Yu

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Obstacle detection and mapping in low-cost, low-power multi-robot systems using an Inverted  

E-Print Network [OSTI]

Obstacle detection and mapping in low-cost, low-power multi-robot systems using an Inverted with constrained memory capacity and processing power, and is called the Inverted Particle Filter. This method has circuits. An important benefit of this is reduced power consumption opening for new battery-powered

Paris-Sud XI, Université de

362

Detecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw@cs.berkeley.edu  

E-Print Network [OSTI]

. Researchers and operators have been using all kinds of mon- itoring data, from the simplest numerical metrics Problems by Mining Console Logs part operator, and charged with fixing the problem-- are usuallyDetecting Large-Scale System Problems by Mining Console Logs Wei Xu xuw@cs.berkeley.edu EECS

Jordan, Michael I.

363

Oil and gas exploration system and method for detecting trace amounts of hydrocarbon gases in the atmosphere  

DOE Patents [OSTI]

An oil and gas exploration system and method for land and airborne operations, the system and method used for locating subsurface hydrocarbon deposits based upon a remote detection of trace amounts of gases in the atmosphere. The detection of one or more target gases in the atmosphere is used to indicate a possible subsurface oil and gas deposit. By mapping a plurality of gas targets over a selected survey area, the survey area can be analyzed for measurable concentration anomalies. The anomalies are interpreted along with other exploration data to evaluate the value of an underground deposit. The system includes a differential absorption lidar (DIAL) system with a spectroscopic grade laser light and a light detector. The laser light is continuously tunable in a mid-infrared range, 2 to 5 micrometers, for choosing appropriate wavelengths to measure different gases and avoid absorption bands of interference gases. The laser light has sufficient optical energy to measure atmospheric concentrations of a gas over a path as long as a mile and greater. The detection of the gas is based on optical absorption measurements at specific wavelengths in the open atmosphere. Light that is detected using the light detector contains an absorption signature acquired as the light travels through the atmosphere from the laser source and back to the light detector. The absorption signature of each gas is processed and then analyzed to determine if a potential anomaly exists.

Wamsley, Paula R. (Littleton, CO); Weimer, Carl S. (Littleton, CO); Nelson, Loren D. (Evergreen, CO); O'Brien, Martin J. (Pine, CO)

2003-01-01T23:59:59.000Z

364

Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform  

E-Print Network [OSTI]

Test-Bed of a Real Time Detection System for L/H & H/L Transitions Implemented with the ITMS Platform

365

Implementation of a Dual Containment/Surveillance System utilizing scene-change detection and radio frequency technology  

SciTech Connect (OSTI)

This paper will examine the implementation of scene-change detection and radio frequency technology within a Dual Containment/Surveillance (C/S) System. Additionally, this paper will examine the human performance factors in the operation of these systems. Currently, Westinghouse Savannah River Company utilizes the Continuous Item Monitoring and Surveillance System (CIMS) in the performance of Dual C/S to monitor special nuclear materials within International Atomic Energy Agency (IAEA) Safeguards and Domestic Safeguards. CIMS is comprised of the Material Monitoring System (MMS) (R), a multi-media electronic surveillance system developed by Sandia National Laboratory which incorporates the use of active seals commonly called Radio Frequency Tamper Indicating Devices (RFTIDs), NT Vision (R) as developed by Los Alamos National Laboratory, a Microsoft Windows NT (R) based operating system providing for domestic scene-change detection and the Digital Multi-Camera Optical Surveillance System (DMOS) (R) which provides scene-change detection for IAEA. Although this paper will focus on the implementation of Dual C/S utilizing the Continuous Item Monitoring and Surveillance System, the necessity for a thorough review of Safeguards and Security requirements with organizations and personnel having minimal to no prior MPC&A training will also be covered. Successful Dual C/S implementation plans must consider not only system design and failure modes, but must also be accompanied with the appropriate ''mind shift'' within operations and technical personnel. This is required to ensure completion of both physical and electronic activities, and system design changes are performed conscientiously and with full awareness of MPC&A requirements.

FITZGERALD, ERIC; KOENIG, RICHARD

2005-06-27T23:59:59.000Z

366

Distributed Intrusion Detection Models for Mobile Ad Hoc Networks CHIN-YANG HENRY TSENG  

E-Print Network [OSTI]

feel really lucky to be his student at UC Davis. I sincerely thank to Professor Matt Bishop in the OFFICE OF GRADUATE STUDIES of the UNIVERSITY OF CALIFORNIA DAVIS Approved By: Karl N. Levitt, Chair. I am very grateful that he spent his precious time and energy for advising my works

California at Davis, University of

367

Policy-controlled Event Management for Distributed Intrusion Detection Christian Kreibich  

E-Print Network [OSTI]

- sic building blocks for the formulation of a site's security policy since its conception. A recent

Hand, Steven

368

Intrusion Detection in SCADA Networks Rafael Ramos Regis Barbosa and Aiko Pras  

E-Print Network [OSTI]

facilities such as water distribution infrastructures, electricity generation plants and oil refineries need industrial facilities, such as water dis- tribution infrastructures. With the goal of reducing costs industry and government, leading to several efforts to increase secu- rity in these industrial networks

Paris-Sud XI, Université de

369

Fault Detection and Diagnostics for Non-Intrusive Monitoring Using Motor Harmonics  

E-Print Network [OSTI]

Harmonic analysis of motor current has been used to track the speed of motors for sensorless control. Algorithms exist that track the speed of a motor given a dedicated stator current measurement, for example. Harmonic ...

Orji, Uzoma A.

370

Learning Cost-Sensitve Classification Rules for Network Intrusion Detection using RIPPER  

E-Print Network [OSTI]

to the information gain function is as follows: (2^Gain - 1) / (Cost(A)) + 1)^w. Here, a cost-sensitivity constant (w

Yang, Junfeng

371

An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks  

E-Print Network [OSTI]

University of California, Santa Barbara {vigna,sumitg,kavitha,ebelding,kemm}@cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy the stream of audit data to identify evidence of the occurrence of the modeled attacks. Misuse and anomaly

California at Santa Barbara, University of

372

An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks  

E-Print Network [OSTI]

University of California, Santa Barbara vigna,sumitg,kavitha,ebelding,kemm¡ @cs.ucsb.edu Abstract Mobile ad. These techniques prevent a range of attacks against routing protocols but are expensive to de- ploy on energy "signatures") that are matched against the stream of audit data to identify evidence of the oc- currence

Belding-Royer, Elizabeth M.

373

Field testing of component-level model-based fault detection methods for mixing boxes and VAV fan systems  

SciTech Connect (OSTI)

An automated fault detection and diagnosis tool for HVAC systems is being developed, based on an integrated, life-cycle, approach to commissioning and performance monitoring. The tool uses component-level HVAC equipment models implemented in the SPARK equation-based simulation environment. The models are configured using design information and component manufacturers' data and then fine-tuned to match the actual performance of the equipment by using data measured during functional tests of the sort using in commissioning. This paper presents the results of field tests of mixing box and VAV fan system models in an experimental facility and a commercial office building. The models were found to be capable of representing the performance of correctly operating mixing box and VAV fan systems and detecting several types of incorrect operation.

Xu, Peng; Haves, Philip

2002-05-16T23:59:59.000Z

374

Geophex Airborne Unmanned Survey System  

SciTech Connect (OSTI)

Ground-based surveys place personnel at risk due to the proximity of buried unexploded ordnance (UXO) items or by exposure to radioactive materials and hazardous chemicals. The purpose of this effort is to design, construct, and evaluate a portable, remotely-piloted, airborne, geophysical survey system. This non-intrusive system will provide stand-off capability to conduct surveys and detect buried objects, structures, and conditions of interest at hazardous locations. During a survey, the operators remain remote from, but within visual distance of, the site. The sensor system never contacts the Earth, but can be positioned near the ground so that weak geophysical anomalies can be detected. The Geophex Airborne Unmanned Survey System (GAUSS) is designed to detect and locate small-scale anomalies at hazardous sites using magnetic and electromagnetic survey techniques. The system consists of a remotely-piloted, radio-controlled, model helicopter (RCH) with flight computer, light-weight geophysical sensors, an electronic positioning system, a data telemetry system, and a computer base-station. The report describes GAUSS and its test results.

Won, I.L.; Keiswetter, D.

1995-12-31T23:59:59.000Z

375

Insider Attacker Detection in Wireless Sensor Fang Liu & Xiuzhen Cheng  

E-Print Network [OSTI]

to be low-cost and lack of tamper resistance. The compromise or capture of a sensor releases all the intrusion detection techniques developed for a fixed wired network. A typical low-cost sensor has limited working towards securing sensor networks in the fields of pairwise key establishment [13

Cheng, Xiuzhen "Susan"

376

Piezoelectric-based in-situ damage detection of composite materials for structural health monitoring systems  

E-Print Network [OSTI]

Cost-effective and reliable damage detection is critical for the utilization of composite materials. This thesis presents the conclusions of an analytical and experimental survey of candidate methods for in-situ damage ...

Kessler, Seth Stovack, 1977-

2002-01-01T23:59:59.000Z

377

A system for the detection of concealed nuclear weapons and fissile material aboard cargo cotainerships  

E-Print Network [OSTI]

A new approach to the detection of concealed nuclear weapons and fissile material aboard cargo containerships is proposed. The ship-based approach removes the constraints of current thinking by addressing the threat of ...

Gallagher, Shawn P., S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

378

Broken Bar Detection in Synchronous Machines Based Wind Energy Conversion System  

E-Print Network [OSTI]

Electrical machines are subject to different types of failures. Early detection of the incipient faults and fast maintenance may prevent costly consequences. Fault diagnosis of wind turbine is especially important because they are situated...

Rahimian, Mina Mashhadi

2012-10-19T23:59:59.000Z

379

Towards the development of an explosives detection system using Neutron Resonance Radiography  

E-Print Network [OSTI]

Detection of conventional explosives remains a challenge to air security, as indicated by recent reports detailing lapses in security screening and new requirements that mandate screening 100% of checked luggage. Neutron ...

Raas, Whitney

2007-01-01T23:59:59.000Z

380

Nuclear reactor with internal thimble-type delayed neutron detection system  

SciTech Connect (OSTI)

This paper describes a liquid-metal cooled nuclear reactor. It comprises: a housing having a core containing nuclear material, a shell and tube heat exchanger positioned within the housing. The shell and tube heat exchanger have the tubes thereof arranged in parallel, a primary coolant within the shell and tube heat exchanger, means for detecting positioned within a tube in the shell and tube heat exchanger for generating a signal in response to a reaction detected by the means for detecting, the means for detecting including signal detectors D-1, D-2, and D-3 selectively spaced from one another along the coolant flow within the shell and tube heat exchanger so that the total time lapsed after the occurrence of the reaction and a delayed-neutron is detected is: TOTAL = T{sub h} + T{sub t} + T{sub d}. Where: T{sub h} = isotopic holdup time for the delayed-neutron traveling from the reaction spot to the coolant T{sub t} = transit time for the delayed-neutron traveling from the coolant to the heat exchanger inlet T{sub d} = constant transit time for the delayed-neutrons to reach each of the delayed-neutron detectors D-1, D-2, and D-3, which is dependent upon the position of the delayed-neutron detector; and a mechanism remotely connected to the signal detectors to record the reaction detected thereby.

Gross, K.C.; Poloncsik, J.; Lambert, J.D.B.

1990-07-03T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

E-Print Network 3.0 - angle-sensitive detection system Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Power System Simulation and Analysis Steve Schaffer, Kevin Wedeward... for electric power systems. The code was created for basic research and designed from a control Source:...

382

Effect of permeability on cooling of magmatic intrusion in a goethermal reservoir  

SciTech Connect (OSTI)

Transient cooling of magmatic intrusion in a geothermal reservoir due to conduction and convection is studied. The effects of overlying cap rock and different horizontal and vertical permeability of the reservoir are considered. Results are compared to the data from Salton Sea Geothermal Field. It is also observed that multiple layers of convection cells exist when horizontal permeability is much larger than the vertical permeability. The sharp dropoff of surface heat flow observed at Salton Sea Geothermal Field is confirmed by numerical results. Based on these numerical results, it is possible to speculate that the age of the intrusive body is about 8000 to 12,000 years.

Lau, K.H.

1980-09-01T23:59:59.000Z

383

An Analysis of a Spreader Bar Crane Mounted Gamma-Ray Radiation Detection System  

E-Print Network [OSTI]

above background or on EW work well for radiopharmaceuticals, which produce low-energy signatures and have similar spectral shapes to those produced by SNM (Ely et al. 2006). Radiopharmaceuticals are administered to a large number of individuals..., 99mTc is used; it is one of the most likely radionuclides to be detected. Other commonly used radionuclides are 51Cr, 67Ga 123I, 131I, 111In, and 201Tl, and depending on half-life, 16 can be detected for up to 115 days after the medical...

Grypp, Matthew D

2013-04-08T23:59:59.000Z

384

Detection and Analysis of Threats to the Energy Sector: DATES  

SciTech Connect (OSTI)

This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

Alfonso Valdes

2010-03-31T23:59:59.000Z

385

Opportunities for Decay Counting of Environmental Radioisotopes Using Ultra-low-background Detection Systems  

SciTech Connect (OSTI)

Executive Summary We present results from a scoping study whose intent was to define challenge measurements to be pursued on the Ultra-Sensitive Nuclear Measurements Initiative. Potential challenge measurements using new radiation detection technology in the shallow underground laboratory that would have substantial impact in environmental science were the focus of this study.

Runkle, Robert C.; Aalseth, Craig E.; Bailey, Vanessa L.; Bonicalzi, Ricco; Moran, James J.; Seifert, Allen; Warren, Glen A.

2012-08-01T23:59:59.000Z

386

System for detecting operating errors in a variable valve timing engine using pressure sensors  

DOE Patents [OSTI]

A method and control module includes a pressure sensor data comparison module that compares measured pressure volume signal segments to ideal pressure volume segments. A valve actuation hardware remedy module performs a hardware remedy in response to comparing the measured pressure volume signal segments to the ideal pressure volume segments when a valve actuation hardware failure is detected.

Wiles, Matthew A.; Marriot, Craig D

2013-07-02T23:59:59.000Z

387

A Survey of Systems for Detecting Serial Run-Time Errors  

E-Print Network [OSTI]

Performance Computing Group Glenn R. Luecke, James Coyle, Jim Hoekstra, Marina Kraeva, Ying Li, Olga Taborskaia, and Yanmei Wang {grl, jjc, hoekstra, kraeva, yingli, olga, yanmei}@iastate.edu Revised February-commercial software products to detect serial run-time errors in C and C++ programs, to issue meaningful messages

Luecke, Glenn R.

388

Efficient Missing Tag Detection in RFID Systems Wen Luo Shigang Chen Tao Li Shiping Chen  

E-Print Network [OSTI]

wirelessly over a distance. Today's passive RFID tags harvest energy from a reader's radio waves and use to a fraction of what is currently needed. Second, we study the missing-tag detection problem from a new energy flexibility for the practitioners to meet their energy and time requirements. I. INTRODUCTION RFID (radio

Chen, Shigang

389

Optimization of Fault Detection/Diagnosis Model for Thermal Storage System Using AIC  

E-Print Network [OSTI]

of the event. In addition, human learning, recognition, and optimal judgment process of any event can be simulated by optimizing the most effective pa-rameters and their numbers for detection and diagnosis by the use of variable selection method. In previous...

Pan, S.; Zheng, M.; Nakahara, N.

2006-01-01T23:59:59.000Z

390

Systems and methods of monitoring acoustic pressure to detect a flame condition in a gas turbine  

DOE Patents [OSTI]

A method may detect a flashback condition in a fuel nozzle of a combustor. The method may include obtaining a current acoustic pressure signal from the combustor, analyzing the current acoustic pressure signal to determine current operating frequency information for the combustor, and indicating that the flashback condition exists based at least in part on the current operating frequency information.

Ziminsky, Willy Steve (Simpsonville, SC); Krull, Anthony Wayne (Anderson, SC); Healy, Timothy Andrew (Simpsonville, SC), Yilmaz, Ertan (Glenville, NY)

2011-05-17T23:59:59.000Z

391

Decision-feedback multiple differential detection for space-time coded OFDM systems  

E-Print Network [OSTI]

by an irreducible error floor if the fading bandwidth is larger than zero. Decision-feedback differential detection (DF-DD) is found to be a very effective method to reduce such an error floor with a very low computational complexity. In this thesis, we first apply...

Liu, Yan

2001-01-01T23:59:59.000Z

392

A Cabled Acoustic Telemetry System for Detecting and Tracking Juvenile Salmon: Part 2. Three-Dimensional Tracking and Passage Outcomes  

SciTech Connect (OSTI)

In Part 1 of this paper [1], we presented the engineering design and instrumentation of the Juvenile Salmon Acoustic Telemetry System (JSATS) cabled system, a nonproprietary technology developed by the U.S. Army Corps of Engineers, Portland District, to meet the needs for monitoring the survival of juvenile salmonids through the 31 dams in the Federal Columbia River Power System. Here in Part 2, we describe how the JSATS cabled system was employed as a reference sensor network for detecting and tracking juvenile salmon. Time-of-arrival data for valid detections on four hydrophones were used to solve for the three-dimensional (3D) position of fish surgically implanted with JSATS acoustic transmitters. Validation tests demonstrated high accuracy of 3D tracking up to 100 m from the John Day Dam spillway. The along-dam component, used for assigning the route of fish passage, had the highest accuracy; the median errors ranged from 0.06 to 0.22 m, and root mean square errors ranged from 0.05 to 0.56 m at distances up to 100 m. For the case study at John Day Dam during 2008, the range for 3D tracking was more than 100 m upstream of the dam face where hydrophones were deployed, and detection and tracking probabilities of fish tagged with JSATS acoustic transmitters were higher than 98%. JSATS cabled systems have been successfully deployed on several major dams to acquire information for salmon protection and for development of more “fish-friendly” hydroelectric facilities.

Deng, Zhiqun; Weiland, Mark A.; Fu, Tao; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Carlson, Thomas J.; Eppard, Matthew B.

2011-05-26T23:59:59.000Z

393

Modeling the effect of trend information on human failure detection and diagnosis in spacecraft systems  

E-Print Network [OSTI]

Systems are performing increasingly complicated tasks, made possible by significant advances in hardware and software technology. This task complexity is reflected in the system design, with a corresponding increased demand ...

Owen, Rachel L. (Rachel Lynn)

2010-01-01T23:59:59.000Z

394

Detecting Integrity Attacks on SCADA Systems Rohan Chabukswar, Yilin Mo, Bruno Sinopoli  

E-Print Network [OSTI]

susceptibilities in industrial control systems. In view of the present threat of global terrorism, a power grid. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system. Keywords: Cyber-Physical Systems, SCADA, Secure, Control 1. INTRODUCTION

Sinopoli, Bruno

395

A Case Study Correlating Innovative Gamma Ray Scanning Detection Systems Data to Surface Soil Gamma Spectrometry Results - 13580  

SciTech Connect (OSTI)

HydroGeoLogic (HGL), Inc. completed a United States Environmental Protection Agency (USEPA) study to characterize radiological contamination at a site near Canoga Park, California. The characterized area contained 470 acres including the site of a prototype commercial nuclear reactor and other nuclear design, testing, and support operations from the 1950's until 1988 [1]. The site history included radiological releases during operation followed by D and D activities. The characterization was conducted under an accelerated schedule and the results will support the project remediation. The project has a rigorous cleanup to background agenda and does not allow for comparison to risk-based guidelines. To target soil sample locations, multiple lines of evidence were evaluated including a gamma radiation survey, geophysical surveys, historical site assessment, aerial photographs, and former worker interviews. Due to the time since production and decay, the primary gamma emitting radionuclide remaining is cesium-137 (Cs-137). The gamma ray survey covered diverse, rugged terrain using custom designed sodium iodide thallium-activated (NaI(Tl)) scintillation detection systems. The survey goals included attaining 100% ground surface coverage and detecting gamma radiation as sensitively as possible. The effectiveness of innovative gamma ray detection systems was tested by correlating field Cs-137 static count ratios to Cs-137 laboratory gamma spectrometry results. As a case study, the area encompassing the former location of the first nuclear power station in the U. S. was scanned, and second by second global positioning system (GPS)-linked gamma spectral data were evaluated by examining total count rate and nuclide-specific regions of interest. To compensate for Compton scattering from higher energy naturally occurring radionuclides (U-238, Th-232 and their progeny, and K-40), count rate ratios of anthropogenic nuclide-specific regions of interest to the total count rate were calculated. From the scanning data, locations with observed Cs-137 ratios exceeding six standard deviations above the mean ratio were mapped in high resolution [2]. Field teams returned to those locations to collect static count measurements using the same detection systems. Soil surface samples were collected at 30 locations and analyzed for Cs-137. An exponential correlation was identified between Cs-137 concentrations in surface soil and field-scanned Cs-137 ratios. The data indicate field minimum detectable concentration (MDC) of Cs-137 at 0.02 Bq/g (0.5 pCi/g) or lower depending on contaminant distribution in soil. (authors)

Thompson, Shannon; Rodriguez, Rene; Billock, Paul [HydroGeoLogic, Inc., 11107 Sunset Hills Road, Suite 400, Reston, VA 20190 (United States)] [HydroGeoLogic, Inc., 11107 Sunset Hills Road, Suite 400, Reston, VA 20190 (United States); Lit, Peter [Nomad Science Group, 7738 Nautilus Shell Street, Las Vegas, NV 89139 (United States)] [Nomad Science Group, 7738 Nautilus Shell Street, Las Vegas, NV 89139 (United States)

2013-07-01T23:59:59.000Z

396

ccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores  

E-Print Network [OSTI]

isotherms and capillary conden- sation, usually described as a gas-liquid phase transition shiftedccsd-00000575(version1):3Sep2003 Intrusion and extrusion of water in hydrophobic mesopores B- extrusion cycles of water in hydrophobic mesoporous materials, characterized by independent cylindrical

Boyer, Edmond

397

Comparison of Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network [OSTI]

, Blacksburg, VA 24061 Non-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods and ability to produce functional representations of stochastic variability. PCE estimates coefficients observed differences. In these computational experiments, performance of PCE and SC is shown to be very

398

Recent Advances in Non-Intrusive Polynomial Chaos and Stochastic Collocation Methods for Uncertainty  

E-Print Network [OSTI]

-intrusive polynomial chaos expansion (PCE) and stochastic collocation (SC) meth- ods are attractive techniques representations of stochastic variability. PCE estimates coefficients for known orthogonal polynomial basis using probabilistic methods is the polynomial chaos expansion (PCE) approach to UQ. In this work, we

399

Evaluation of Non-Intrusive Approaches for Wiener-Askey Generalized Polynomial Chaos  

E-Print Network [OSTI]

University, Stanford, CA 94305 Polynomial chaos expansions (PCE) are an attractive technique for uncertainty for general probabilistic analysis problems. Non-intrusive PCE methods allow the use of simulations as black the polynomial chaos expansion (PCE) approach to UQ. In particular, we focus on generalized polynomial chaos

400

NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA  

E-Print Network [OSTI]

NON-INTRUSIVE TEMPERATURE DIAGNOSTIC FOR A NON-NEUTRAL PLASMA by Michael Takeshi Nakata A thesis DIAGNOSTIC FOR A NON-NEUTRAL PLASMA M. Takeshi Nakata Department of Physics and Astronomy Master of Science A simple, non-destructive diagnostic for the temperature of a non-neutral plasma is desirable as plasma

Hart, Gus

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Dynamical and chemical characteristics of tropospheric intrusions observed during START08  

E-Print Network [OSTI]

. Homeyer,1 Kenneth P. Bowman,1 Laura L. Pan,2 Elliot L. Atlas,3 RuShan Gao,4 and Teresa L. Campos2 Received that the intruding air masses can be traced back to the tropical upper troposphere and lower stratosphere. In situ of the observed intrusions through use of a simple box model and trace species with different photochemical

Pan, Laura

402

Supporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision History  

E-Print Network [OSTI]

-XXXXX-XX-X/XX/XX ...$5.00. Eclipse Platform Revision Collector History Exporter Graphical Visualizer Other ToolsSupporting Empirical Studies by Non-Intrusive Collection and Visualization of Fine-Grained Revision This paper presents a code-revision history collection and vi- sualization Eclipse plugin for use

Robillard, Martin

403

Anomaly Detection for Resilient Control Systems Using Fuzzy-Neural Data Fusion Engine  

SciTech Connect (OSTI)

Resilient control systems in critical infrastructures require increased cyber-security and state-awareness. One of the necessary conditions for achieving the desired high level of resiliency is timely reporting and understanding of the status and behavioral trends of the control system. This paper describes the design and development of a neural-network based data-fusion system for increased state-awareness of resilient control systems. The proposed system consists of a dedicated data-fusion engine for each component of the control system. Each data-fusion engine implements three-layered alarm system consisting of: (1) conventional threshold-based alarms, (2) anomalous behavior detector using self-organizing maps, and (3) prediction error based alarms using neural network based signal forecasting. The proposed system was integrated with a model of the Idaho National Laboratory Hytest facility, which is a testing facility for hybrid energy systems. Experimental results demonstrate that the implemented data fusion system provides timely plant performance monitoring and cyber-state reporting.

Ondrej Linda; Milos Manic; Timothy R. McJunkin

2011-08-01T23:59:59.000Z

404

E-Print Network 3.0 - agent detection system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent system stakeholder relationships, and the ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences Page: << < 1 2 3...

405

E-Print Network 3.0 - animal detection system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

res served. No par Summary: . Security System D. AnimalProcedure Room Locks VI. Animal Care Training Program Plan 16 A. Requirements... with animals, especially if the illness...

406

Overview of animal detection and animal warning systems in North America and Europe  

E-Print Network [OSTI]

power due to snow covered solar panels, and broken lamps inthe system in 2004. Solar panels were considered, butand equipment, and the solar panels in particular. The size

Huijser, Marcel P.; McGowen, Patrick T.

2003-01-01T23:59:59.000Z

407

Compilation of gas intrusion measurements, variations, and consequence modeling for SPR caverns.  

SciTech Connect (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H2S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

Hinkebein, Thomas E.

2003-03-01T23:59:59.000Z

408

Non-Intrusive Electric Load Monitoring in Commercial Buildings  

E-Print Network [OSTI]

, W.T.; Cameron, lR. and Dow, A.B. 1988. "On line diagnostics of large induction motors." Vibrations and Audible Noise in Alternating Current Machines, Belmans, R.; Binns, K.; Geysen, W.; and Vandenput, A., eds. Kluwer Academic Publishers. 140... review of elecnic motor literature indicated that samples of elecnical current taken at slightly faster than twice the 60 Hz fundamental can be used to detect several indicators of incipient motor failure. Tests were initiated to determine whether...

Norford, L. K.; Mabey, N.

409

Using Explicit and Machine-Understandable Engineering Knowledge for Defect Detection in Automation Systems Engineering  

E-Print Network [OSTI]

Systems Engineering Olga Kovalenko and Thomas Moser Christian Doppler Laboratory for Software Engineering automation systems, e.g. mechanical engineering, electrical engineering and software engineering. Experts of efforts from different types of experts, e.g. software engineers, technical engineers and domain experts

410

DAMAGE DETECTION STRATEGIES IN STRUCTURAL HEALTH MONITORING OF OVERHEAD POWER TRANSMISSION SYSTEM  

E-Print Network [OSTI]

regions, but huge blackouts are also possible. Every power outage causes a great financial loss, threats part of T&D System that goes from the power plant to substations near demand points. "Distribution/DC and DC/AC converters) is met. T&D System in Poland operates on 19 electric power plants and is made

Boyer, Edmond

411

A cabled acoustic telemetry system for detecting and tracking juvenile salmon: Part 1. Engineering design and instrumentation  

SciTech Connect (OSTI)

The U.S. Army Corps of Engineers-Portland District started development of the Juvenile Salmon Acoustic Telemetry System (JSATS), a nonproprietary technology, in 2001 to meet the needs for monitoring the survival of juvenile salmonids through the 31 federal dams in the Federal Columbia River Power System (FCRPS). Initial development focused on coded acoustic microtransmitters, and autonomous receivers that could be deployed in open reaches of the river for detection of the juvenile salmonids implanted with microtransmitters as they passed the autonomous receiver arrays. In 2006 the Pacific Northwest National Laboratory (PNNL) was tasked with development of an acoustic receiver system for deployment at hydropower facilities (cabled receiver) for detecting fish tagged with microtransmitters as well as tracking them in 2 or 3-dimensions as the fish passed at the facility for determining route of passage. The additional route of passage information, combined with survival estimates, is used by the dam operators and managers to make structural and operational changes at the hydropower facilities to improve survival of fish as they pass the facilities and through the FCRPS.

Weiland, Mark A.; Deng, Zhiqun; Seim, Thomas A.; Lamarche, Brian L.; Choi, Eric Y.; Fu, Tao; Carlson, Thomas J.; Thronas, Aaron I.; Eppard, Matthew B.

2011-05-26T23:59:59.000Z

412

Automatic Channel Fault Detection and Diagnosis System for a Small Animal APD-Based Digital PET Scanner  

E-Print Network [OSTI]

Fault detection and diagnosis is critical to many applications in order to ensure proper operation and performance over time. Positron emission tomography (PET) systems that require regular calibrations by qualified scanner operators are good candidates for such continuous improvements. Furthermore, for scanners employing one-to-one coupling of crystals to photodetectors to achieve enhanced spatial resolution and contrast, the calibration task is even more daunting because of the large number of independent channels involved. To cope with the additional complexity of the calibration and quality control procedures of these scanners, an intelligent system (IS) was designed to perform fault detection and diagnosis (FDD) of malfunctioning channels. The IS can be broken down into four hierarchical modules: parameter extraction, channel fault detection, fault prioritization and diagnosis. Of these modules, the first two have previously been reported and this paper focuses on fault prioritization and diagnosis. The purpose of the fault prioritization module is to help the operator to zero in on the faults that need immediate attention. The fault diagnosis module will then identify the causes of the malfunction and propose an explanation of the reasons that lead to the diagnosis. The FDD system was implemented on a LabPET avalanche photodiode (APD)-based digital PET scanner. Experiments demonstrated a FDD Sensitivity of 99.3 % (with a 95% confidence interval (CI) of: [98.7, 99.9]) for major faults. Globally, the Balanced Accuracy of the diagnosis for varying fault severities is 92 %. This suggests the IS can greatly benefit the operators in their maintenance task.

Jonathan Charest; Jean-François Beaudoin; Jules Cadorette; Roger Lecomte; Charles-Antoine Brunet; Réjean Fontaine

2014-06-16T23:59:59.000Z

413

High-speed atomic force microscope based on an astigmatic detection system  

SciTech Connect (OSTI)

High-speed atomic force microscopy (HS-AFM) enables visualizing dynamic behaviors of biological molecules under physiological conditions at a temporal resolution of 1s or shorter. A small cantilever with a high resonance frequency is crucial in increasing the scan speed. However, detecting mechanical resonances of small cantilevers is technically challenging. In this study, we constructed an atomic force microscope using a digital versatile disc (DVD) pickup head to detect cantilever deflections. In addition, a flexure-guided scanner and a sinusoidal scan method were implemented. In this work, we imaged a grating sample in air by using a regular cantilever and a small cantilever with a resonance frequency of 5.5 MHz. Poor tracking was seen at the scan rate of 50 line/s when a cantilever for regular AFM imaging was used. Using a small cantilever at the scan rate of 100 line/s revealed no significant degradation in the topographic images. The results indicate that a smaller cantilever can achieve a higher scan rate and superior force sensitivity. This work shows the potential for using a DVD pickup head in future HS-AFM technology.

Liao, H.-S.; Chen, Y.-H.; Hwu, E.-T.; Chang, C.-S.; Hwang, I.-S., E-mail: ishwang@phys.sinica.edu.tw [Institute of Physics, Academia Sinica, Nankang, Taipei 11529, Taiwan (China); Ding, R.-F.; Huang, H.-F.; Wang, W.-M. [Institute of Physics, Academia Sinica, Nankang, Taipei 11529, Taiwan (China); Department of Mechanical Engineering, National Taiwan University, Taipei 10617, Taiwan (China); Huang, K.-Y. [Department of Mechanical Engineering, National Taiwan University, Taipei 10617, Taiwan (China)

2014-10-15T23:59:59.000Z

414

A dual neutron/gamma source for the Fissmat Inspection for Nuclear Detection (FIND) system.  

SciTech Connect (OSTI)

Shielded special nuclear material (SNM) is very difficult to detect and new technologies are needed to clear alarms and verify the presence of SNM. High-energy photons and neutrons can be used to actively interrogate for heavily shielded SNM, such as highly enriched uranium (HEU), since neutrons can penetrate gamma-ray shielding and gamma-rays can penetrate neutron shielding. Both source particles then induce unique detectable signals from fission. In this LDRD, we explored a new type of interrogation source that uses low-energy proton- or deuteron-induced nuclear reactions to generate high fluxes of mono-energetic gammas or neutrons. Accelerator-based experiments, computational studies, and prototype source tests were performed to obtain a better understanding of (1) the flux requirements, (2) fission-induced signals, background, and interferences, and (3) operational performance of the source. The results of this research led to the development and testing of an axial-type gamma tube source and the design/construction of a high power coaxial-type gamma generator based on the {sup 11}B(p,{gamma}){sup 12}C nuclear reaction.

Doyle, Barney Lee (Sandia National Laboratories, Albuquerque, NM); King, Michael; Rossi, Paolo (Sandia National Laboratories, Albuquerque, NM); McDaniel, Floyd Del (Sandia National Laboratories, Albuquerque, NM); Morse, Daniel Henry; Antolak, Arlyn J.; Provencio, Paula Polyak (Sandia National Laboratories, Albuquerque, NM); Raber, Thomas N.

2008-12-01T23:59:59.000Z

415

A rule-based vision system for distress detection on concrete highway pavement  

E-Print Network [OSTI]

an Expert System B. Structure of an Expert System 1. Knowledge Acquisition 2. Knowledge Representation 3. Control Strategy . . 4. Explanation Facility 5. Expert System Shell 1 2 4 4 5 6 8 8 11 11 13 13 19 19 25 25 26 28 28 29 30...(5467) Image 4(5108) Image 5(6638) Image 6(5116) image 7(6572) Image 8(5148) Image 9(5512) Image 10(5739) 81 85 87 89 91 97 100 CHAPTER I INTRODUCTION Transportation infrastructures are vital to the well being of a modern society. A...

Tsao, Yuen Sang (Stephen)

1992-01-01T23:59:59.000Z

416

Secure Data Transfer Guidance for Industrial Control and SCADA Systems  

SciTech Connect (OSTI)

This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

2011-09-01T23:59:59.000Z

417

Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis  

E-Print Network [OSTI]

breaching users' privacy (including keyloggers, pass- word thieves, network sniffers, stealth backdoors to remote servers in certain settings. We believe that a system such This material is based upon work

Kruegel, Christopher

418

Fast Detection and Mitigation of Cascading Outages in the Power System  

E-Print Network [OSTI]

provide better system situational awareness and accurate information about the disturbance; The results form parallel corridor search method could identify the most vulnerable lines after power re-distribution, which will give operator time to take...

Pang, Chengzong

2012-02-14T23:59:59.000Z

419

Detection and Characterization of Natural and Induced Fractures for the Development of Enhanced Geothermal Systems  

Broader source: Energy.gov [DOE]

Project objectives: Combine geophysical methods for reservoir and fracture characterization with rock physics measurements made under in-situ conditions (up to 350?C) for development of geothermal systems.

420

Power Quality/Harmonic Detection: Harmonic Control in Electric Power Systems for the Telecommunications Industry  

E-Print Network [OSTI]

The control of harmonics in power systems continues to be a major concern in the telecommunications industry. AC/DC telecommunication conversion equipment has rarely been thought of as playing a major role in the harmonic interaction problem. Yet...

Felkner, L. J.; Waggoner, R. M.

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Method and apparatus for detecting combustion instability in continuous combustion systems  

DOE Patents [OSTI]

An apparatus and method to sense the onset of combustion stability is presented. An electrode is positioned in a turbine combustion chamber such that the electrode is exposed to gases in the combustion chamber. A control module applies a voltage potential to the electrode and detects a combustion ionization signal and determines if there is an oscillation in the combustion ionization signal indicative of the occurrence of combustion stability or the onset of combustion instability. A second electrode held in a coplanar but spaced apart manner by an insulating member from the electrode provides a combustion ionization signal to the control module when the first electrode fails. The control module broadcasts a notice if the parameters indicate the combustion process is at the onset of combustion instability or broadcasts an alarm signal if the parameters indicate the combustion process is unstable.

Benson, Kelly J.; Thornton, Jimmy D.; Richards, George A.; Straub, Douglas L.

2006-08-29T23:59:59.000Z

422

DEVELOPMENT OF A 4 K STIRLING-TYPE PULSE TUBE CRYOCOOLER FOR A MOBILE TERAHERTZ DETECTION SYSTEM  

SciTech Connect (OSTI)

We discuss in this paper the design and development of a 4 K Stirling-type pulse tube cryocooler for a mobile terahertz detection system. This system integrates new heterodyne detector technology at terahertz frequencies with advancements of Stirling-type pulse tube technology that brings the advent of cooled detector sensitivities in a mobile, compact, and long duration operation system without degradation of sensitivity. To achieve this goal we reduced overall system size, input power, and temperature fluctuations and mechanical vibrations in order to maintain the detector sensitivity. The Stirling-type pulse tube cryocooler developed for this system is a hybrid design employing a He-4 pulse-tube cryocooler operating at 60 Hz and 2.5 MPa average pressure that precools a He-3 pulse tube cryocooler operating at 30 Hz and 1.0 MPa average pressure to achieve 4 K cooling for the terahertz receiver. The He-4 cryocooler employs stainless steel mesh regenerators for the first stage and ErPr spheres for the second stage, while the He-3 cryocooler employs stainless mesh for the first stage and ErPr spheres for the second stage with a layered rare-earth third stage regenerator. Design details and cooler performance goals are discussed.

Bradley, P. E.; Gerecht, E.; Radebaugh, R. [National Institute of Standards and Technology, Boulder, Colorado, 80305 (United States); Garaway, I. [National Institute of Standards and Technology, Boulder, Colorado, 80305 (United States); Technion-Israel Institute of Technology, Haifa (Israel)

2010-04-09T23:59:59.000Z

423

Nuclear Materials Identification System (NMIS) with Gamma Spectrometry for Attributes of Pu, HEU, and Detection of HE and Chemical Agents  

SciTech Connect (OSTI)

A combined Nuclear Materials Identification System (NMIS)-gamma ray spectrometry system can be used passively to obtain the following attributes of Pu: presence, fissile mass, 240/239 ratio, and metal vs. oxide. This system can also be used with a small, portable, DT neutron generator to measure the attributes of highly enriched uranium (HEU): presence, fissile mass, enrichment, metal vs. oxide; and detect the presence of high explosives (HE). For the passive system, time-dependent coincidence distributions can be used for the presence, fissile mass, metal vs. oxide for Pu, and gamma-ray spectrometry can be used for 239/240 ratio and presence. So presence can be confirmed by two methods. For the active system with a DT neutron generator, all four attributes for both Pu and HEU can be determined from various features of the time-dependent coincidence distribution measurements for both Pu and HEU. Active gamma ray spectrometry would also give presence and 240/239 ratio for Pu, enrichment for HEU, and metal vs. oxide for both. Active gamma ray spectrometry would determine the presence of HE. The various features of time-dependent coincidence distributions and gamma ray spectrometry that determine these attributes are discussed with some examples from previous determinations.

Mihalczo, J. T.; Mattingly, J. K.; Mullens, J. A.; Neal, J. S.

2002-05-01T23:59:59.000Z

424

Method to improve reliability of a fuel cell system using low performance cell detection at low power operation  

DOE Patents [OSTI]

A system and method for detecting a low performing cell in a fuel cell stack using measured cell voltages. The method includes determining that the fuel cell stack is running, the stack coolant temperature is above a certain temperature and the stack current density is within a relatively low power range. The method further includes calculating the average cell voltage, and determining whether the difference between the average cell voltage and the minimum cell voltage is greater than a predetermined threshold. If the difference between the average cell voltage and the minimum cell voltage is greater than the predetermined threshold and the minimum cell voltage is less than another predetermined threshold, then the method increments a low performing cell timer. A ratio of the low performing cell timer and a system run timer is calculated to identify a low performing cell.

Choi, Tayoung; Ganapathy, Sriram; Jung, Jaehak; Savage, David R.; Lakshmanan, Balasubramanian; Vecasey, Pamela M.

2013-04-16T23:59:59.000Z

425

E-Smart System for In-Situ Detection of Environmental Contaminants  

SciTech Connect (OSTI)

A team of industrial, academic, and government organizations participated in the development of the Environmental Systems Management, Analysis and Reporting Network (E-SMART). E-SMART integrates diverse monitoring and control technologies by means of a modular, ''building block'' design approach to allow for flexible system configuration. The E-SMART network treats each smart device-whether a sensor, sampler, or actuator- as a black box that obeys the standard communication protocols and electrical interfaces for the network. This approach allows multiple vendors to produce different sensors which meet the same functional specification and which can be interchanged on the network without affecting operation. The project further developed and advanced the E-SMART standardized network protocol to include new sensors, sampling systems, and graphical user interfaces. Specifically, the E-SMART team developed the following three system elements: (1) Base technology for a new class of smart , highly sensitive, chemically-specific, in-situ, multichannel microsensors utilizing integrated optical interferometry technology, (2) A set of additional E-SMART-compatible sensors adapted from commercial off-the-shelf technologies, and (3) A Data Management and Analysis System (DMAS), including network management components and the user-friendly graphical user interface (GUI) for data evaluation and visualization.

S. Leffler

2000-03-01T23:59:59.000Z

426

Aptamer- and nucleic acid enzyme-based systems for simultaneous detection of multiple analytes  

DOE Patents [OSTI]

The present invention provides aptamer- and nucleic acid enzyme-based systems for simultaneously determining the presence and optionally the concentration of multiple analytes in a sample. Methods of utilizing the system and kits that include the sensor components are also provided. The system includes a first reactive polynucleotide that reacts to a first analyte; a second reactive polynucleotide that reacts to a second analyte; a third polynucleotide; a fourth polynucleotide; a first particle, coupled to the third polynucleotide; a second particle, coupled to the fourth polynucleotide; and at least one quencher, for quenching emissions of the first and second quantum dots, coupled to the first and second reactive polynucleotides. The first particle includes a quantum dot having a first emission wavelength. The second particle includes a second quantum dot having a second emission wavelength different from the first emission wavelength. The third polynucleotide and the fourth polynucleotide are different.

Lu, Yi (Champaign, IL); Liu, Juewen (Albuquerque, NM)

2011-11-15T23:59:59.000Z

427

A new dynamical indicator for chaos detection in galactic Hamiltonian systems  

E-Print Network [OSTI]

A new dynamical parameter, the f-indicator, is introduced and used in order to distinguish between regular and chaotic motion in galactic Hamiltonian systems. Two kinds of galactic potentials are used: (i) a global potential, which describes the whole galaxy and (ii) a local potential, which is made up of perturbed harmonic oscillators and describes motion near an equilibrium point. The new indicator is based on the energies of the separable system along the x, y and z axis. Comparison between the outcomes obtained using the new dynamical parameter and other methods, such as the maximum Lyapunov Characteristic Exponent (L.C.E), or the S(c) dynamical spectrum, shows that the new dynamical indicator gives fast and reliable results concerning the regular or chaotic character of the orbits. The new indicator was tested in several Hamiltonian systems of two (2D) degrees and three (3D) degrees of freedom.

Euaggelos E. Zotos

2012-09-08T23:59:59.000Z

428

Detecting invariant manifolds, attractors, and generalized KAM tori in aperiodically forced mechanical systems  

E-Print Network [OSTI]

We show how the recently developed theory of geodesic transport barriers for fluid flows can be used to uncover key invariant manifolds in externally forced, one-degree-of-freedom mechanical systems. Specifically, invariant sets in such systems turn out to be shadowed by least-stretching geodesics of the Cauchy-Green strain tensor computed from the flow map of the forced mechanical system. This approach enables the finite-time visualization of generalized stable and unstable manifolds, attractors and generalized KAM curves under arbitrary forcing, when Poincare maps are not available. We illustrate these results by detailed visualizations of the key finite-time invariant sets of conservatively and dissipatively forced Duffing oscillators.

Alireza Hadjighasem; Mohammad Farazmand; George Haller

2013-02-07T23:59:59.000Z

429

Improving shipboard maintenance practices using non-intrusive load monitoring  

E-Print Network [OSTI]

(cont.) New casualty parameters were recorded and analyzed in an attempt to verify and expand on diagnostic software currently being developed for the vacuum aided sewage collection system. The analysis of the ships service ...

Piber, Mark A. (Mark Augustin)

2007-01-01T23:59:59.000Z

430

ANALYTICAL REDUNDANCY FOR SYSTEMS WITH UNKNOWN INPUTS -APPLICATION TO FAULTS DETECTION  

E-Print Network [OSTI]

-00144067,version1-29Mar2014 Author manuscript, published in "Control Theory and Advanced Technology 9, 3 the inconsistency between the actual plant variables and the mathematical model. They are computed from the plant observations and with the model of this plant ; they are ideally zero but become non-zero if the actual system

Boyer, Edmond

431

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems  

E-Print Network [OSTI]

hardware and software components such as smart meters, Phasor Measurement Units (PMUs), intelligent Borhan dynamics have been traditionally considered as a result of meter aging and malfunctioning, electrical of a designated cyber data attack to the system. In particular, with the emergence of smart grids and its smart

Sanandaji, Borhan M.

432

Method to improve cancerous lesion detection sensitivity in a dedicated dual-head scintimammography system  

DOE Patents [OSTI]

An improved method for enhancing the contrast between background and lesion areas of a breast undergoing dual-head scintimammographic examination comprising: 1) acquiring a pair of digital images from a pair of small FOV or mini gamma cameras compressing the breast under examination from opposing sides; 2) inverting one of the pair of images to align or co-register with the other of the images to obtain co-registered pixel values; 3) normalizing the pair of images pixel-by-pixel by dividing pixel values from each of the two acquired images and the co-registered image by the average count per pixel in the entire breast area of the corresponding detector; and 4) multiplying the number of counts in each pixel by the value obtained in step 3 to produce a normalization enhanced two dimensional contrast map. This enhanced (increased contrast) contrast map enhances the visibility of minor local increases (uptakes) of activity over the background and therefore improves lesion detection sensitivity, especially of small lesions.

Kieper, Douglas Arthur (Seattle, WA); Majewski, Stanislaw (Morgantown, WV); Welch, Benjamin L. (Hampton, VA)

2012-07-03T23:59:59.000Z

433

Method to improve cancerous lesion detection sensitivity in a dedicated dual-head scintimammography system  

DOE Patents [OSTI]

An improved method for enhancing the contrast between background and lesion areas of a breast undergoing dual-head scintimammographic examination comprising: 1) acquiring a pair of digital images from a pair of small FOV or mini gamma cameras compressing the breast under examination from opposing sides; 2) inverting one of the pair of images to align or co-register with the other of the images to obtain co-registered pixel values; 3) normalizing the pair of images pixel-by-pixel by dividing pixel values from each of the two acquired images and the co-registered image by the average count per pixel in the entire breast area of the corresponding detector; and 4) multiplying the number of counts in each pixel by the value obtained in step 3 to produce a normalization enhanced two dimensional contrast map. This enhanced (increased contrast) contrast map enhances the visibility of minor local increases (uptakes) of activity over the background and therefore improves lesion detection sensitivity, especially of small lesions.

Kieper, Douglas Arthur (Newport News, VA); Majewski, Stanislaw (Yorktown, VA); Welch, Benjamin L. (Hampton, VA)

2008-10-28T23:59:59.000Z

434

Nuclear reactor with internal thimble-type delayed neutron detection system  

SciTech Connect (OSTI)

This invention teaches improved apparatus for the method of detecting a breach in cladded fuel used in a nuclear reactor. The detector apparatus is located in the primary heat exchanger which conveys part of the reactor coolant past at least three separate delayed-neutron detectors mounted in this heat exchanger. The detectors are spaced apart such that the coolant flow time from the core to each detector is different, and these differences are known. The delayed-neutron activity at the detectors is a function of the delay time after the reaction in the fuel until the coolant carrying the delayed-neutron emitter passes the respective detector. This time delay is broken down into separate components including an isotopic holdup time required for the emitter to move through the fuel from the reaction to the coolant at the breach, and two transit times required for the emitter now in the coolant to flow from the breach to the detector loop and then via the loop to the detector. At least two of these time components are determined during calibrated operation of the reactor. Thereafter during normal reactor operation, repeated comparisons are made by the method of regression approximation of the third time component for the best-fit line correlating measured delayed-neutron activity against activity that is approximated according to specific equations. The equations use these time-delay components and known parameter values of the fuel and of the part and emitting daughter isotopes.

Gross, Kenny C. (Lemont, IL); Poloncsik, John (Downers Grove, IL); Lambert, John D. B. (Wheaton, IL)

1990-01-01T23:59:59.000Z

435

Efficient Joint Detection Techniques in the Frequency Domain for Third Generation Mobile Radio Systems  

E-Print Network [OSTI]

Systems Marius Vollmer1,2 , J¨urgen G¨otze1 , Martin Haardt2 1. Dept. of Electrical Engineering 2. Siemens@dt.e-technik.uni-dortmund.de Martin.Haardt@icn.siemens.de mvo@dt.e-technik.uni-dortmund.de Marius.Vollmer@icn.siemens.de Abstract-circulant matrix. It is then possible to block- diagonalize the matrix by Fast Fourier Transforms. In addi- tion

Götze, Jürgen

436

The use of protective barriers to deter inadvertent human intrusion into a mined geologic facility for the disposal of radioactive waste: A review of previous investigations and potential concepts  

SciTech Connect (OSTI)

Sandia National Laboratories is evaluating the feasibility of developing protective barrier system for the Waste Isolation Pilot Plant (WIPP) to thwart inadvertent human intrusion into this radioactive-waste disposal system for a period of 9,900 years after assumed loss of active institutional controls. The protective barrier system would be part of a series of enduring passive institutional controls whose long-term function will be to reduce the likelihood of inadvertent human activities (e.g., exploratory drilling for resources) that could disrupt the WIPP disposal system.

Tolan, T.L. [Tolan, Beeson and Associates, Kennewick, WA (United States)

1993-06-01T23:59:59.000Z

437

Development of Integrated Online Monitoring Systems for Detection of Diversion at Natural Uranium Conversion Facilities  

SciTech Connect (OSTI)

Recent work at Oak Ridge National Laboratory (ORNL) has focused on some source term modeling of uranyl nitrate (UN) as part of a comprehensive validation effort employing gamma-ray detector instrumentation for the detection of diversion from declared conversion activities. Conversion, the process by which natural uranium ore (yellowcake) is purified and converted through a series of chemical processes into uranium hexafluoride gas (UF6), has historically been excluded from the nuclear safeguards requirements of the 235U-based nuclear fuel cycle. The undeclared diversion of this product material could potentially provide feedstock for a clandestine weapons program for state or non-state entities. Given the changing global political environment and the increased availability of dual-use nuclear technology, the International Atomic Energy Agency has evolved its policies to emphasize safeguarding this potential feedstock material in response to dynamic and evolving potential diversion pathways. To meet the demand for instrumentation testing at conversion facilities, ORNL developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions of a purified uranium-bearing aqueous stream exiting the solvent extraction process in a natural uranium conversion plant. This work investigates gamma-ray signatures of UN circulating in the UNCLE facility and evaluates detector instrumentation sensitivity to UN for safeguards applications. These detector validation activities include assessing detector responses to the UN gamma-ray signatures for spectrometers based on sodium iodide, lanthanum bromide, and germanium detectors. The results of measurements under static and dynamic operating conditions at concentrations ranging from 10-90g U/L of naturally enriched UN will be presented. A range of gamma-ray lines was examined and self-attenuation factors were calculated, in addition to attenuation for transmission measurement of density, concentration and enrichment. A detailed uncertainty analysis will be presented providing insights into instrumentation limitations to spoofing.

Dewji, Shaheen A [ORNL] [ORNL; Lee, Denise L [ORNL] [ORNL; Croft, Stephen [ORNL] [ORNL; McElroy, Robert Dennis [ORNL] [ORNL; Hertel, Nolan [Georgia Institute of Technology] [Georgia Institute of Technology; Chapman, Jeffrey Allen [ORNL] [ORNL; Cleveland, Steven L [ORNL] [ORNL

2013-01-01T23:59:59.000Z

438

Evaluation of geologic materials to limit biological intrusion into low-level radioactive waste disposal sites  

SciTech Connect (OSTI)

This report describes the results of a three-year research program to evaluate the performance of selected soil and rock trench cap designs in limiting biological intrusion into simulated waste. The report is divided into three sections including a discussion of background material on biological interactions with waste site trench caps, a presentation of experimental data from field studies conducted at several scales, and a final section on the interpretation and limitations of the data including implications for the user.

Hakonson, T.E.

1986-02-01T23:59:59.000Z

439

Enabling Trusted Software Integrity Darko Kirovski  

E-Print Network [OSTI]

this problem from two perspectives: · Intrusion detection ­ a set of mechanisms that aim at scanning system address this problem by trying to de- tect the intrusion at run-time or by formally verifying aim at intrusion prevention as the core technology for enabling secure computing systems. Intrusion

Potkonjak, Miodrag

440

Drought detective: Texas A&M professor works to develop drought prediction system  

E-Print Network [OSTI]

drought the way meteorologists forecast the weather? If one Texas A&M University researcher has his way, the answer is yes. #30;rough a #29;ve-year, #17;#14;#16;#19;,#24;#24;#24; research grant from the National Science Foundation (NSF), Dr. Steven... to be con#29;dent in decisions that put their #29;nancial future on the line,? he said, adding that an accurate prediction system in#18;uences all natural resources sectors, from utility companies to farmers. Agricultural losses have made the #25...

Smith, Courtney

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

SciTech Connect: State of the Art for Autonomous Detection Systems using  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) Sr (2) Cawith EXO-200 Search forSmart Grid ControlGenomic

442

System and method for ultrafast optical signal detecting via a synchronously coupled anamorphic light pulse encoded laterally  

DOE Patents [OSTI]

In one general embodiment, a method for ultrafast optical signal detecting is provided. In operation, a first optical input signal is propagated through a first wave guiding layer of a waveguide. Additionally, a second optical input signal is propagated through a second wave guiding layer of the waveguide. Furthermore, an optical control signal is applied to a top of the waveguide, the optical control signal being oriented diagonally relative to the top of the waveguide such that the application is used to influence at least a portion of the first optical input signal propagating through the first wave guiding layer of the waveguide. In addition, the first and the second optical input signals output from the waveguide are combined. Further, the combined optical signals output from the waveguide are detected. In another general embodiment, a system for ultrafast optical signal recording is provided comprising a waveguide including a plurality of wave guiding layers, an optical control source positioned to propagate an optical control signal towards the waveguide in a diagonal orientation relative to a top of the waveguide, at least one optical input source positioned to input an optical input signal into at least a first and a second wave guiding layer of the waveguide, and a detector for detecting at least one interference pattern output from the waveguide, where at least one of the interference patterns results from a combination of the optical input signals input into the first and the second wave guiding layer. Furthermore, propagation of the optical control signal is used to influence at least a portion of the optical input signal propagating through the first wave guiding layer of the waveguide.

Heebner, John E. (Livermore, CA)

2010-08-03T23:59:59.000Z

443

Detecting internal corrosion of natural gas transmission pipelines: field tests of probes and systems for real-time corrosion measurement  

SciTech Connect (OSTI)

A field study was conducted to evaluate the use of automated, multi-technique electrochemical corrosion-rate monitoring devices and probes for detecting corrosion in environments similar to those found in natural gas transmission pipelines. It involved measurement of real-time corrosion signals from operating pipelines. Results and interpretation were reported from four different field test locations. Standard flush-mount and custom flange probes were used in four different environments at a gas-gathering site and one environment but two different probe orientations at a natural gas site. These sites were selected to represent normal and upset conditions common in gas transmission pipelines. The environments consisted of two different levels of humidified natural gas, liquid hydrocarbon, and water from natural gas. Probe locations included the 6 and 12 o?clock positions of a natural gas pipeline carrying 2-phase gas/liquid flow. The probe data was monitored using completely remote solar powered systems that provided real-time data transmission via wireless back to a pipeline control station. Data are also presented comparing the ECR probe data to that for coupons used to determine corrosion rate and to detect the presence of microbiologically influenced corrosion (MIC).

Covino, Bernard S., Jr.; Bullard, Sophie J.; Cramer, Stephen D.; Holcomb, Gordon R.; Ziomek-Moroz, M.; Kane, R.D. (InterCorr International); Meidinger, B. (Rocky Mountain Oilfield Testing Center)

2005-01-01T23:59:59.000Z

444

Development of a System for Rapid Detection of Contaminants in Water Supplies Using Magnetic Resonance and Nanoparticles  

SciTech Connect (OSTI)

To keep the water supply safe and to ensure a swift and accurate response to a water supply contamination event, rapid and robust methods for microbial testing are necessary. Current technologies are complex, lengthy and costly and there is a need for rapid, reliable, and precise approaches that can readily address this fundamental security and safety issue. T2 Biosystems is focused on providing solutions to this problem by making breakthroughs in nanotechnology and biosensor techniques that address the current technical restrictions facing rapid, molecular analysis in complex samples. In order to apply the T2 Biosystems nucleic acid detection procedure to the analysis of nucleic acid targets in unprocessed water samples, Bacillus thuringeinsis was selected as a model organism and local river water was selected as the sample matrix. The initial assay reagent formulation was conceived with a manual magnetic resonance reader, was optimized using a high throughput system, and transferred back to the MR reader for potential field use. The final assay employing the designed and manufactured instruments was capable of detecting 10 CFU/mL of B. thuringiensis directly within the environmental water sample within 90 minutes. Further, discrimination of two closely related species of Bacilli was accomplished using the methods of this project; greater than 3-fold discrimination between B. cereus and B. thuringiensis at a concentrations spanning 10 CFU/mL to 10{sup 5} CFU/mL was observed.

Lowery, Thomas J; Neely, Lori; Chepin, James; Wellman, Parris; Toso, Ken; Murray, Paul; Audeh, Mark; Demas, Vasiliki; Palazzolo, Robert; Min, Michael; Phung, Nu; Blanco, Matt; Raphel, Jordan; O'Neil, Troy

2010-09-14T23:59:59.000Z

445

Real-time detection method and system for identifying individual aerosol particles  

DOE Patents [OSTI]

An improved method and system of identifying individual aerosol particles in real time. Sample aerosol particles are collimated, tracked, and screened to determine which ones qualify for mass spectrometric analysis based on predetermined qualification or selection criteria. Screening techniques include one or more of determining particle size, shape, symmetry, and fluorescence. Only qualifying particles passing all screening criteria are subject to desorption/ionization and single particle mass spectrometry to produce corresponding test spectra, which is used to determine the identities of each of the qualifying aerosol particles by comparing the test spectra against predetermined spectra for known particle types. In this manner, activation cycling of a particle ablation laser of a single particle mass spectrometer is reduced.

Gard, Eric E. (San Francisco, CA); Coffee, Keith R. (Patterson, CA); Frank, Matthias (Oakland, CA); Tobias, Herbert J. (Kensington, CA); Fergenson, David P. (Alamo, CA); Madden, Norm (Livermore, CA); Riot, Vincent J. (Berkeley, CA); Steele, Paul T. (Livermore, CA); Woods, Bruce W. (Livermore, CA)

2007-08-21T23:59:59.000Z

446

Real-Time Detection Method And System For Identifying Individual Aerosol Particles  

DOE Patents [OSTI]

A method and system of identifying individual aerosol particles in real time. Sample aerosol particles are compared against and identified with substantially matching known particle types by producing positive and negative test spectra of an individual aerosol particle using a bipolar single particle mass spectrometer. Each test spectrum is compared to spectra of the same respective polarity in a database of predetermined positive and negative spectra for known particle types and a set of substantially matching spectra is obtained. Finally the identity of the individual aerosol particle is determined from the set of substantially matching spectra by determining a best matching one of the known particle types having both a substantially matching positive spectrum and a substantially matching negative spectrum associated with the best matching known particle type.

Gard, Eric Evan (San Francisco, CA); Fergenson, David Philip (Livermore, CA)

2005-10-25T23:59:59.000Z

447

Statistical Methods for Automatic Crack Detection Based on Vibrothermography Sequence-of-Images Data  

E-Print Network [OSTI]

of detection, Signal-to-noise ratio. #12;1 INTRODUCTION 1.1 Background Nondestructive evaluation (NDE) methods in structures by non-intrusive physical measurements. There exists random measurement noise for most NDE applications and statistical methods are needed for NDE data analysis. MIL-HDBK-1823A [1] describes

448

Compilation of Gas Intrusion Measurements, Variations, and Consequence Modeling for SPR Caverns  

SciTech Connect (OSTI)

The intrusion of gas into oils stored within the SPR has been examined. When oil is stored in domal salts, gases intrude into the stored oil from the surrounding salt. Aspects of the mechanism of gas intrusion have been examined. In all cases, this gas intrusion results in increases in the oil vapor pressure. Data that have been gathered from 1993 to August 2002 are presented to show the resultant increases in bubble-point pressure on a cavern-by-cavern as well as on a stream basis. The measurement techniques are presented with particular emphasis on the TVP 95. Data analysis methods are presented to show the methods required to obtain recombined cavern oil compositions. Gas-oil ratios are also computed from the data and are presented on a cavern-by-cavern and stream basis. The observed increases in bubble-point pressure and gas-oil ratio are further statistically analyzed to allow data interpretation. Emissions plume modeling is used to determine adherence to state air regulations. Gas intrusion is observed to be variable among the sites and within each dome. Gas intrusions at Bryan Mound and Big Hill have resulted in the largest increases in bubble-point pressure for the Strategic Petroleum Reserve (SPR). The streams at Bayou Choctaw and West Hackberry show minimal bubble-point pressure increases. Emissions plume modeling, using the state mandated ISCST code, of oil storage tanks showed that virtually no gas may be released when H2S standards are considered. DOE plans to scavenge H{sub 2}S to comply with the very tight standards on this gas. With the assumption of scavenging, benzene releases become the next most controlling factor. Model results show that a GOR of 0.6 SCF/BBL may be emissions that are within standards. Employing the benzene gas release standard will significantly improve oil deliverability. New plume modeling using the computational fluid dynamics code, FLUENT, is addressing limitations of the state mandated ISCST model.

HINKEBEIN, THOMAS E.

2003-03-01T23:59:59.000Z

449

Low-Intrusion Techniques and Sensitive Information Management for Warhead Counting and Verification: FY2011 Annual Report  

SciTech Connect (OSTI)

Future arms control treaties may push nuclear weapons limits to unprecedented low levels and may entail precise counting of warheads as well as distinguishing between strategic and tactical nuclear weapons. Such advances will require assessment of form and function to confidently verify the presence or absence of nuclear warheads and/or their components. Imaging with penetrating radiation can provide such an assessment and could thus play a unique role in inspection scenarios. Yet many imaging capabilities have been viewed as too intrusive from the perspective of revealing weapon design details, and the potential for the release of sensitive information poses challenges in verification settings. A widely held perception is that verification through radiography requires images of sufficient quality that an expert (e.g., a trained inspector or an image-matching algorithm) can verify the presence or absence of components of a device. The concept of information barriers (IBs) has been established to prevent access to relevant weapon-design information by inspectors (or algorithms), and has, to date, limited the usefulness of radiographic inspection. The challenge of this project is to demonstrate that radiographic information can be used behind an IB to improve the capabilities of treaty-verification weapons-inspection systems.

Jarman, Kenneth D.; Robinson, Sean M.; McDonald, Benjamin S.; Gilbert, Andrew J.; Misner, Alex C.; Pitts, W. Karl; White, Timothy A.; Seifert, Allen; Miller, Erin A.

2011-09-01T23:59:59.000Z

450

XAX: a multi-ton, multi-target detection system for dark matter, double beta decay and pp solar neutrinos  

E-Print Network [OSTI]

A multi-target detection system XAX, comprising concentric 10 ton targets of 136Xe and 129/131Xe, together with a geometrically similar or larger target of liquid Ar, is described. Each is configured as a two-phase scintillation/ionization TPC detector, enhanced by a full 4pi array of ultra-low radioactivity Quartz Photon Intensifying Detectors (QUPIDs) replacing the conventional photomultipliers for detection of scintillation light. It is shown that background levels in XAX can be reduced to the level required for dark matter particle (WIMP) mass measurement at a 10^-10 pb WIMP-nucleon cross section, with single-event sensitivity below 10^-11 pb. The use of multiple target elements allows for confirmation of the A^2 dependence of a coherent cross section, and the different Xe isotopes provide information on the spin-dependence of the dark matter interaction. The event rates observed by Xe and Ar would modulate annually with opposite phases from each other for WIMP mass >~100 GeV/c^2. The large target mass of 136Xe and high degree of background reduction allow neutrinoless double beta decay to be observed with lifetimes of 10^27-10^28 years, corresponding to the Majorana neutrino mass range 0.01-0.1 eV, the most likely range from observed neutrino mass differences. The use of a 136Xe-depleted 129/131Xe target will also allow measurement of the pp solar neutrino spectrum to a precision of 1-2%.

K. Arisaka; H. Wang; P. F. Smith; D. Cline; A. Teymourian; E. Brown; W. Ooi; D. Aharoni; C. W. Lam; K. Lung; S. Davies; M. Price

2009-01-07T23:59:59.000Z

451

Monitoring CO 2 sequestration into deep saline aquifer and associated salt intrusion using coupled multiphase flow modeling and time lapse electrical resistivity tomography  

SciTech Connect (OSTI)

Successful geological storage and sequestration of carbon dioxide (CO2) require efficient monitoring of the migration of CO2 plume during and after large-scale injection in order to verify the containment of the injected CO2 within the target formation and to evaluate potential leakage risk. Field studies have shown that surface and cross-borehole electrical resistivity tomography (ERT) can be a useful tool in imaging and characterizing solute transport in heterogeneous subsurface. In this synthetic study, we have coupled a 3-D multiphase flow model with a parallel 3-D time-lapse ERT inversion code to explore the feasibility of using time-lapse ERT for simultaneously monitoring the migration of CO2 plume in deep saline formation and potential brine intrusion into shallow fresh water aquifer. Direct comparisons of the inverted CO2 plumes resulting from ERT with multiphase flow simulation results indicate the ERT could be used to delineate the migration of CO2 plume. Detailed comparisons on the locations, sizes and shapes of CO2 plume and intruded brine plumes suggest that ERT inversion tends to underestimate the area review of the CO2 plume, but overestimate the thickness and total volume of the CO2 plume. The total volume of intruded brine plumes is overestimated as well. However, all discrepancies remain within reasonable ranges. Our study suggests that time-lapse ERT is a useful monitoring tool in characterizing the movement of injected CO2 into deep saline aquifer and detecting potential brine intrusion under large-scale field injection conditions.

Chuan Lu; CHI Zhang; Hai Hanag; Timothy C. Johnson

2014-04-01T23:59:59.000Z

452

Fission gas detection system  

DOE Patents [OSTI]

A device for collecting fission gas released by a failed fuel rod which device uses a filter to pass coolant but which filter blocks fission gas bubbles which cannot pass through the filter due to the surface tension of the bubble.

Colburn, Richard P. (Pasco, WA)

1985-01-01T23:59:59.000Z

453

Bisectional fault detection system  

DOE Patents [OSTI]

An apparatus, program product and method logically divide a group of nodes and causes node pairs comprising a node from each section to communicate. Results from the communications may be analyzed to determine performance characteristics, such as bandwidth and proper connectivity.

Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

2012-02-14T23:59:59.000Z

454

Row fault detection system  

DOE Patents [OSTI]

An apparatus, program product and method check for nodal faults in a row of nodes by causing each node in the row to concurrently communicate with its adjacent neighbor nodes in the row. The communications are analyzed to determine a presence of a faulty node or connection.

Archer, Charles Jens (Rochester, MN); Pinnow, Kurt Walter (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian Edward (Rochester, MN)

2012-02-07T23:59:59.000Z

455

Radiation detection system  

DOE Patents [OSTI]

A preamplifier circuit for processing a signal provided by a radiation detector includes a transimpedance amplifier coupled to receive a current signal from a detector and generate a voltage signal at its output. A second amplification stage has an input coupled to an output of the transimpedance amplifier for providing an amplified voltage signal. Detector electronics include a preamplifier circuit having a first and second transimpedance amplifier coupled to receive a current signal from a first and second location on a detector, respectively, and generate a first and second voltage signal at respective outputs. A second amplification stage has an input coupled to an output of the transimpedance amplifiers for amplifying the first and said second voltage signals to provide first and second amplified voltage signals. A differential output stage is coupled to the second amplification stage for receiving the first and second amplified voltage signals and providing a pair of outputs from each of the first and second amplified voltage signals. Read out circuitry has an input coupled to receive both of the pair of outputs, the read out circuitry having structure for processing each of the pair of outputs, and providing a single digital output having a time-stamp therefrom.

Riedel, Richard A. (Knoxville, TN); Wintenberg, Alan L. (Knoxville, TN); Clonts, Lloyd G. (Knoxville, TN); Cooper, Ronald G. (Oak Ridge, TN)

2012-02-14T23:59:59.000Z

456

Detection Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Chemistry for Measurement and Detection Science Chemistry for Measurement and Detection Science Project Description Chemistry used in measurement and detection science plays a...

457

Time-and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems Xiulong Liu, Heng Qi, Keqiu Li  

E-Print Network [OSTI]

Time- and Energy-efficient Detection of Unknown Tags in Large-scale RFID Systems Xiulong Liu, Heng by reducing more than 90% of the required execution time and energy consumption. I. INTRODUCTION Radio, this is the first piece of work taking both time-efficiency and energy-efficiency into consideration, where

Liu, Alex X.

458

A New, Principled Approach to Anomaly Detection  

SciTech Connect (OSTI)

Intrusion detection is often described as having two main approaches: signature-based and anomaly-based. We argue that only unsupervised methods are suitable for detecting anomalies. However, there has been a tendency in the literature to conflate the notion of an anomaly with the notion of a malicious event. As a result, the methods used to discover anomalies have typically been ad hoc, making it nearly impossible to systematically compare between models or regulate the number of alerts. We propose a new, principled approach to anomaly detection that addresses the main shortcomings of ad hoc approaches. We provide both theoretical and cyber-specific examples to demonstrate the benefits of our more principled approach.

Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Bridges, Robert A [ORNL

2012-01-01T23:59:59.000Z

459

Update on intrusive characterization of mixed contact-handled transuranic waste at Argonne-West  

SciTech Connect (OSTI)

Argonne National Laboratory and Lockheed Martin Idaho Technologies Company have jointly participated in the Department of Energy`s (DOE) Waste Isolation Pilot Plant (WIPP) Transuranic Waste Characterization Program since 1990. Intrusive examinations have been conducted in the Waste Characterization Area, located at Argonne-West in Idaho Falls, Idaho, on over 200 drums of mixed contact-handled transuranic waste. This is double the number of drums characterized since the last update at the 1995 Waste Management Conference. These examinations have provided waste characterization information that supports performance assessment of WIPP and that supports Lockheed`s compliance with the Resource Conservation and Recovery Act. Operating philosophies and corresponding regulatory permits have been broadened to provide greater flexibility and capability for waste characterization, such as the provision for minor treatments like absorption, neutralization, stabilization, and amalgamation. This paper provides an update on Argonne`s intrusive characterization permits, procedures, results, and lessons learned. Other DOE sites that must deal with mixed contact-handled transuranic waste have initiated detailed planning for characterization of their own waste. The information presented herein could aid these other storage and generator sites in further development of their characterization efforts.

Dwight, C.C.; Jensen, B.A.; Bryngelson, C.D.; Duncan, D.S.

1997-02-03T23:59:59.000Z

460

Optimization of Design and Manufacturing Process of Metal Foam Filled Anti-Intrusion Bars  

SciTech Connect (OSTI)

The role of an anti-intrusion bar for automotive use is to absorb the kinetic energy of the colliding bodies that is partially converted into internal work of the bodies involved in the crash. The aim of this paper is to investigate the performances of a new kind of anti-intrusion bars for automotive use, filled with metallic foams. The reason for using a cellular material as a filler deals with its capacity to absorb energy during plastic deformation, while being lightweight. The study is the evolution of a previous paper presented by the authors at Esaform 2010 and will present new results and findings. It is conducted by evaluating some key technical issues of the manufacturing problem and by conducting experimental and numerical analyses. The evaluation of materials and shapes of the closed sections to be filled is made in the perspective of a car manufacturer (production costs, weight reduction, space availability in a car door, etc.). Experimentally, foams are produced starting from an industrial aluminium precursor with a TiH{sub 2} blowing agent. Bars are tested in three point bending, in order to evaluate their performances in terms of force-displacement response and other specific performance parameters. In order to understand the role of interface between the inner surface of the tube and the external surface of the foam, different kinds of interface are tested.

Villa, Andrea; Mussi, Valerio [Laboratorio MUSP-via Turotti 9, 29122 Piacenza (Italy); Strano, Matteo [Politecnico di Milano-Dipartimento di Meccanica, via La Masa 1, 20156, Milan (Italy)

2011-05-04T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 6, NO. 2, JUNE 2005 125 On-Road Vehicle Detection Using Evolutionary  

E-Print Network [OSTI]

speed, and high cost. Moreover, when there is a large number of vehicles moving simultaneously-Road Vehicle Detection Using Evolutionary Gabor Filter Optimization Zehang Sun, Member, IEEE, George Bebis, Member, IEEE, and Ronald Miller Abstract--Robust and reliable vehicle detection from images acquired

Bebis, George

462

System and method of reducing motion-induced noise in the optical detection of an ultrasound signal in a moving body of material  

DOE Patents [OSTI]

The present invention provides a system and method to reduce motion-induced noise in the detection of ultrasonic signals in a moving sheet or body of material. An ultrasonic signal is generated in a sheet of material and a detection laser beam is moved along the surface of the material. By moving the detection laser in the same direction as the direction of movement of the sheet of material the amount of noise induced in the detection of the ultrasonic signal is reduced. The scanner is moved at approximately the same speed as the moving material. The system and method may be used for many applications, such in a paper making process or steel making process. The detection laser may be directed by a scanner. The movement of the scanner is synchronized with the anticipated arrival of the ultrasonic signal under the scanner. A photodetector may be used to determine when a ultrasonic pulse has been directed to the moving sheet of material so that the scanner may be synchronized the anticipated arrival of the ultrasonic signal.

Habeger, Jr., Charles C. (Smyrna, GA); LaFond, Emmanuel F. (Atlanta, GA); Brodeur, Pierre (Smyrna, GA); Gerhardstein, Joseph P. (Decatur, GA)

2002-01-01T23:59:59.000Z

463

Array for detecting microbes  

DOE Patents [OSTI]

The present embodiments relate to an array system for detecting and identifying biomolecules and organisms. More specifically, the present embodiments relate to an array system comprising a microarray configured to simultaneously detect a plurality of organisms in a sample at a high confidence level.

Andersen, Gary L.; DeSantis, Todd D.

2014-07-08T23:59:59.000Z

464

Development of real time non-intrusive load monitor for shipboard fluid systems  

E-Print Network [OSTI]

Since the year 2000, the United States Navy has spent an average of half a billion dollars over the congressionally approved budget for shipbuilding. Additionally, most experts project that in order to meet the Chief of ...

Branch, Perry L. (Perry Lamar)

2008-01-01T23:59:59.000Z

465

A comprehensive system for non-intrusive load monitoring and diagnostics  

E-Print Network [OSTI]

Energy monitoring and smart grid applications have rapidly developed into a multi-billion dollar market. The continued growth and utility of monitoring technologies is predicated upon the ability to economically extract ...

Paris, James, Ph. D. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

466

Intrusive Projection Methods with Upwinding for Uncertain Nonlinear Hyperbolic Systems6  

E-Print Network [OSTI]

. Tryoen), olm@limsi.fr (O. Le Ma^itre), michael.ndjinga@cea.fr (M. Ndjinga), ern@cermics.enpc.fr (A. Ern

467

The design of an intrusion security system using digital processing for alarm indication  

E-Print Network [OSTI]

has been noise spikes in the diode. These spikes can easily cause a false alarm which is difficult to trace since it results from a sporadic, elec- tronic malfunction. General Electric, Amperex, and other concerned companies have made a great... is the requirement of multiple triggering of this one threshold. AMF Inc. , Alexandria, Virginia, has recently introduced an intricate signal processor with diode transistor logic and transistor transistor logic integrated circuits to handle intru- sion signals...

Holyoak, Joel Nelson

2012-06-07T23:59:59.000Z

468

Design and testing of a non-intrusive torque measurement system  

E-Print Network [OSTI]

rpm conditions. Two sensor types, phototransistor and photodiode, were tested. The photodiode sensor was tested with two emitter types: infrared LED and red laser. No significant difference in response was found using either the LED or red laser...

Wilson, Edwin Ernest

1998-01-01T23:59:59.000Z

469

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94:Service

470

Experimental and numerical investigation of saltwater intrusion dynamics in flux-controlled groundwater systems  

E-Print Network [OSTI]

evidence that cli- mate change could decrease the net freshwater input to groundwater resources [Feseker in Bangladesh, threatening to physically displ

Clement, Prabhakar

471

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th Keystroke Biometric Intrusion Detection  

E-Print Network [OSTI]

user has entered a specific set of data. Keylogging collects specific data about the input and method

Tappert, Charles

472

Numerical Model Investigation for Potential Methane Explosion and Benzene Vapor Intrusion Associated with High-Ethanol Blend  

E-Print Network [OSTI]

Associated with High-Ethanol Blend Releases Jie Ma, Hong Luo, George E. DeVaull,§ William G. Rixey, and Pedro ABSTRACT: Ethanol-blended fuel releases usually stimulate methanogenesis in the subsurface, which could conditions exist. Ethanol- derived methane may also increase the vapor intrusion potential of toxic fuel

Alvarez, Pedro J.

473

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT-  

E-Print Network [OSTI]

U-PB ZIRCON AND TITANITE AGES OF LATE-TO POST-TECTONIC INTRUSIONS OF THE CORTLANDT- BEEMERVILLE, and monzonorite of the Cortlandt Complex 446±2Ma. Titanite from the Beemerville nepheline syenite has yielded.D., Aleinikoff, J.N., Amelin, Yuri; Merguerian, Charles; and Panish, P.T., 2012, U-Pb zircon and titanite ages

Merguerian, Charles

474

DEVELOPMENT OF AN EMAT IN-LINE INSPECTION SYSTEM FOR DETECTION, DISCRIMINATION, AND GRADING OF STRESS CORROSION CRACKING IN PIPELINES  

SciTech Connect (OSTI)

This report describes prototypes, measurements, and results for a project to develop a prototype pipeline in-line inspection (ILI) tool that uses electromagnetic acoustic transducers (EMATs) to detect and grade stress corrosion cracking (SCC). The introduction briefly provides motivation and describes SCC, gives some background on EMATs and guided ultrasonic waves, and reviews promising results of a previous project using EMATs for SCC. The experimental section then describes lab measurement techniques and equipment, the lab mouse and prototypes for a mule, and scan measurements made on SCC. The mouse was a moveable and compact EMAT setup. The prototypes were even more compact circuits intended to be pulled or used in an ILI tool. The purpose of the measurements was to determine the best modes, transduction, and processing to use, to characterize the transducers, and to prove EMATs and mule components could produce useful results. Next, the results section summarizes the measurements and describes the mouse scans, processing, prototype circuit operating parameters, and performance for SH0 scans. Results are given in terms of specifications--like SNR, power, insertion loss--and parametric curves--such as signal amplitude versus magnetic bias or standoff, reflection or transmission coefficients versus crack depth. Initially, lab results indicated magnetostrictive transducers using both SH0 and SV1 modes would be worthwhile to pursue in a practical ILI system. However, work with mule components showed that SV1 would be too dispersive, so SV1 was abandoned. The results showed that reflection measurements, when normalized by the direct arrival are sensitive to and correlated with SCC. This was not true for transmission measurements. Processing yields a high data reduction, almost 60 to 1, and permits A and C scan display techniques and software already in use for pipeline inspection. An analysis of actual SH0 scan results for SCC of known dimensions showed that length and depth could be determined for deep enough cracks. Defect shadow and short length effects were apparent but may be taken into account. The SH0 scan was done with the mule prototype circuits and permanent magnet EMATs. These gave good enough results that this hardware and the processing techniques are very encouraging for use in a practical ILI tool.

Jeff Aron; Jeff Jia; Bruce Vance; Wen Chang; Raymond Pohler; Jon Gore; Stuart Eaton; Adrian Bowles; Tim Jarman

2005-02-01T23:59:59.000Z

475

Non-intrusive Low-Rank Separated Approximation of High-Dimensional Stochastic Models  

E-Print Network [OSTI]

This work proposes a sampling-based (non-intrusive) approach within the context of low-rank separated representations to tackle the issue of curse-of-dimensionality associated with the solution of models, e.g., PDEs/ODEs, with high-dimensional random inputs. Under some conditions discussed in details, the number of random realizations of the solution, required for a successful approximation, grows linearly with respect to the number of random inputs. The construction of the separated representation is achieved via a regularized alternating least-squares regression, together with an error indicator to estimate model parameters. The computational complexity of such a construction is quadratic in the number of random inputs. The performance of the method is investigated through its application to three numerical examples including two ODE problems with high-dimensional random inputs.

Alireza Doostan; AbdoulAhad Validi; Gianluca Iaccarino

2012-10-04T23:59:59.000Z

476

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

477

Fiber-Optic Defect and Damage Locator System for Wind Turbine Blades  

SciTech Connect (OSTI)

IFOS in collaboration with Auburn University demonstrated the feasibility of a Fiber Bragg Grating (FBG) integrated sensor system capable of providing real time in-situ defect detection, localization and quantification of damage. In addition, the system is capable of validating wind turbine blade structural models, using recent advances in non-contact, non-destructive dynamic testing of composite structures. This new generation method makes it possible to analyze wind turbine blades not only non-destructively, but also without physically contacting or implanting intrusive electrical elements and transducers into the structure. Phase I successfully demonstrated the feasibility of the technology with the construction of a 1.5 kHz sensor interrogator and preliminary instrumentation and testing of both composite material coupons and a wind turbine blade.

Dr. Vahid Sotoudeh; Dr. Richard J. Black; Dr. Behzad Moslehi; Mr. Aleks Plavsic

2010-10-30T23:59:59.000Z

478

Blind Joint Maximum Likelihood Channel Estimation and Data Detection for Single-Input Multiple-Output Systems  

E-Print Network [OSTI]

Blind Joint Maximum Likelihood Channel Estimation and Data Detection for Single-Input Multiple of Southampton, Southampton SO17 1BJ, U.K. Abstract--A blind adaptive scheme is proposed for joint maximum. A simulation example is used to demon- strate the effectiveness of this joint ML optimization scheme for blind

Chen, Sheng

479

Use of the UNCLE Facility to Assess Integrated Online Monitoring Systems for Detection of Diversions at Uranium Conversion Facilities  

SciTech Connect (OSTI)

Historically, the approach to safeguarding nuclear material in the front end of the fuel cycle was implemented only at the stage when UF6 was declared as feedstock for enrichment plants. Recent International Atomic Energy Agency (IAEA) circulars and policy papers have sought to implement safeguards when any purified aqueous uranium solution or uranium oxides suitable for isotopic enrichment or fuel fabrication exist. Oak Ridge National Laboratory has developed the Uranyl Nitrate Calibration Loop Equipment (UNCLE) facility to simulate the full-scale operating conditions for a purified uranium-bearing aqueous stream exiting the solvent extraction process conducted in a natural uranium conversion plant (NUCP) operating at 6000 MTU/year. Monitoring instruments, including the 3He passive neutron detector developed at Los Alamos National Laboratory and the Endress+Hauser Promass 83F Coriolis meter, have been tested at UNCLE and field tested at Springfields. The field trials demonstrated the need to perform full-scale equipment testing under controlled conditions prior to field deployment of operations and safeguards monitoring at additional plants. Currently, UNCLE is testing neutron-based monitoring for detection of noncompliant activities; however, gamma-ray source term monitoring is currently being explored complementary to the neutron detector in order to detect undeclared activities in a more timely manner. The preliminary results of gamma-ray source term modeling and monitoring at UNCLE are being analyzed as part of a comprehensive source term and detector benchmarking effort. Based on neutron source term detection capabilities, alternative gamma-based detection and monitoring methods will be proposed to more effectively monitor NUCP operations in verifying or detecting deviations from declared conversion activities.

Dewji, Shaheen A [ORNL; Chapman, Jeffrey Allen [ORNL; Lee, Denise L [ORNL; Rauch, Eric [Los Alamos National Laboratory (LANL); Hertel, Nolan [Georgia Institute of Technology

2011-01-01T23:59:59.000Z

480

Finite Energy and Bounded Attacks on Control System Sensor Signals  

SciTech Connect (OSTI)

Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "intrusion detection system" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A Sensor System Based on Semi-Conductor Metal Oxide Technology for In Situ Detection of Coal Fired Combustion Gases  

SciTech Connect (OSTI)

Sensor Research and Development Corporation (SRD) proposed a two-phase program to develop a robust, autonomous prototype analyzer for in situ, real-time detection, identification, and measurement of coal-fired combustion gases and perform field-testing at an approved power generation facility. SRD developed and selected sensor materials showing selective responses to carbon monoxide, carbon dioxide, nitric oxide, nitrogen dioxide, ammonia, sulfur dioxide and hydrogen chloride. Sensor support electronics were also developed to enable prototype to function in elevated temperatures without any issues. Field-testing at DOE approved facility showed the ability of the prototype to detect and estimate the concentration of combustion by-products accurately with relatively low false-alarm rates at very fast sampling intervals.

Brent Marquis

2007-05-31T23:59:59.000Z

482

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect (OSTI)

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

483

FIRST DETECTION OF THE [O III] 88 {mu}m LINE AT HIGH REDSHIFTS: CHARACTERIZING THE STARBURST AND NARROW-LINE REGIONS IN EXTREME LUMINOSITY SYSTEMS  

SciTech Connect (OSTI)

We have made the first detections of the 88 {mu}m [O III] line from galaxies in the early universe, detecting the line from the lensed active galactic nucleus (AGN)/starburst composite systems APM 08279+5255 at z = 3.911 and SMM J02399-0136 at z = 2.8076. The line is exceptionally bright from both systems, with apparent (lensed) luminosities {approx}10{sup 11} L {sub sun}. For APM 08279, the [O III] line flux can be modeled in a star formation paradigm, with the stellar radiation field dominated by stars with effective temperatures, T {sub eff} > 36,000 K, similar to the starburst found in M82. The model implies {approx}35% of the total far-IR luminosity of the system is generated by the starburst, with the remainder arising from dust heated by the AGN. The 88 {mu}m line can also be generated in the narrow-line region of the AGN if gas densities are around a few 1000 cm{sup -3}. For SMM J02399, the [O III] line likely arises from H II regions formed by hot (T {sub eff} > 40,000 K) young stars in a massive starburst that dominates the far-IR luminosity of the system. The present work demonstrates the utility of the [O III] line for characterizing starbursts and AGN within galaxies in the early universe. These are the first detections of this astrophysically important line from galaxies beyond a redshift of 0.05.

Ferkinhoff, C.; Hailey-Dunsheath, S.; Nikola, T.; Parshley, S. C.; Stacey, G. J. [Department of Astronomy, Cornell University, Ithaca, NY 14853 (United States); Benford, D. J.; Staguhn, J. G., E-mail: cferkinh@astro.cornell.ed, E-mail: steve@mpe.mpg.d [Observational Cosmology Laboratory (Code 665), NASA Goddard Space Flight Center, Greenbelt, MD 20771 (United States)

2010-05-01T23:59:59.000Z

484

A New Method for Detecting the Time-Varying Nonlinear Damping in Nonlinear Oscillation Systems: Nonparametric Identification  

E-Print Network [OSTI]

This paper presents an original method that can be used for identifying time-varying nonlinear damping characteristics of a nonlinear oscillation system. The method developed involves the nonparametric identification, in ...

Jang, T. S.

485

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

486

450 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 2, FEBRUARY 2013 A Novel Noninvasive Failure-Detection System  

E-Print Network [OSTI]

industry, the reliability of the high-power drive is criti- cal. Having a noninvasive system capable and consequences of the failure in the cycloconverter. Index Terms--Diagnostics, drive, fault tolerance, industrial ap- plication, reliability. I. INTRODUCTION IN THE LAST few decades, the field of high-power drives

Catholic University of Chile (Universidad CatĂłlica de Chile)

487

SMARTx: An Embedded Proximity Detection System for Reducing Collisions CS400: Individual Studies in Computer Science -SMARTx: Software and  

E-Print Network [OSTI]

such as the Arduino. Along another student, we developed a working prototype system that can be used to alert drivers aware and avoid a collision. Our project utilizes Arduino microcontrollers, GPS modules, Bluetooth of an Arduino, a GPS module, and nR905 radio. The Arduino obtains location from the GPS module and broadcasts

Zhuang, Yu

488

E-SMART system for in-situ detection of environmental contaminants. Quarterly technical progress report, April--June 1996  

SciTech Connect (OSTI)

General Atomics (GA) leads a team of industrial, academic, and government organizations to develop the Environmental Systems Management, Analysis and Reporting neTwork (E-SMART) for the Defense Advanced Research Project Agency (DARPA), by way of this Technology Reinvestment Project (TRP). E-SMART defines a standard by which networks of smart sensing, sampling, and control devices can interoperate. E-SMART is intended to be an open standard, available to any equipment manufacturer. The user will be provided a standard platform on which a site-specific monitoring plan can be implemented using sensors and actuators from various manufacturers and upgraded as new monitoring devices become commercially available. GA`s team members include Isco, Inc., Photonic Sensor Systems (PSS), Georgia Tech Research Institute (GTRI), Science & Engineering Analysis Corporation (SECOR), and the U.S. Air Force Armstrong Laboratory Environics Directorate at Tyndall AFB(AL). Specifically, the E-SMART team will develop the following three system elements: (1) A new class of smart, highly sensitive, chemically-specific, in-situ, multichannel microsensors utilizing integrated optical interferometry technology, (2) A set of additional E-SMART-compatible sensors and samplers adapted from commercial off-the-shelf technologies, and (3) A Data Management and Analysis System (DMAS), including network management components and a user-friendly graphical user interface (GUI) for data evaluation and visualization. In addition, the E-SMART TRP team has signed Articles of Collaboration with another DARPA TRP awardee, Sawtek, to develop an E-SMART-compatible Intelligent Modular Array System (DMAS) for monitoring volatile organic chemicals (VOC`s) in the environment. This collaboration will simplify the network development required to field the IMAS sensor, and will encourage the adoption of the E-SMART standard by increasing the number of commercially available E-SMART sensors.

NONE

1996-07-01T23:59:59.000Z

489

E-SMART system for in-situ detection of environmental contaminants. Quarterly technical progress report, October--December 1996  

SciTech Connect (OSTI)

General Atomics (GA) leads a team of industrial, academic, and government organizations in the development of the Environmental Systems Management, Analysis and Reporting neTwork (E-SMART) for the Defense Advanced Research Project Agency (DARPA), by way of this Technology Reinvestment Project (TRP). E-SMART defines a standard by which networks of smart sensing, sampling, and control devices can interoperate. E-SMART is intended to be an open standard, available to any equipment manufacturer. The user will be provided a standard platform on which a site-specific monitoring plan can be implemented using sensors and actuators from various manufacturers and upgraded as new monitoring devices become commercially available. This project will further develop and advance the E-SMART standardized network protocol to include new sensors, sampling systems, and graphical user interfaces.

NONE

1997-01-01T23:59:59.000Z

490

Technology Review of Nondestructive Methods for Examination of Water Intrusion Areas on Hanford’s Double-Shell Waste Tanks  

SciTech Connect (OSTI)

Under a contract with CH2M Hill Hanford Group, Inc., PNNL has performed a review of the NDE technology and methods for examination of the concrete dome structure of Hanford’s double-shell tanks. The objective was to provide a matrix of methodologies that could be evaluated based on applicability, ease of deployment, and results that could provide information that could be used in the ongoing structural analysis of the tank dome. PNNL performed a technology evaluation with the objective of providing a critical literature review for all applicable technologies based on constraints provided by CH2M HILL. These constraints were not mandatory, but were desired. These constraints included performing the evaluation without removing any soil from the top of the tank, or if necessary, requesting that the hole diameter needed to gain access to evaluate the top of the tank structure to be no greater than approximately 12-in. in diameter. PNNL did not address the details of statistical sampling requirements as they depend on an unspecified risk tolerance. PNNL considered these during the technology evaluation and have reported the results in the remainder of this document. Many of the basic approaches to concrete inspection that were reviewed in previous efforts are still in use. These include electromagnetic, acoustic, radiographic, etc. The primary improvements in these tools have focused on providing quantitative image reconstruction, thus providing inspectors and analysts with three-dimensional data sets that allow for operator visualization of relevant abnormalities and analytical integration into structural performance models. Available instruments, such as radar used for bridge deck inspections, rely on post-processing algorithms and do not provide real-time visualization. Commercially available equipment only provides qualitative indications of relative concrete damage. It cannot be used as direct input for structural analysis to assess fitness for use and if necessary to de-rate critical components. There are currently no tools that automatically convert the NDE data to formats compatible with structural analysis programs. While radiographic techniques still provide significant advantages in spatial resolution, non-ionizing techniques are still preferred. Radar imagining in the 1–5 GHz has become the most useful. Unfortunately the algorithms and underlying assumptions used in these reconstructions are proprietary, and it is not possible to assess the quality and limitations of the analytical methods used to generate the derived structural data. The hypothesis that water intrusion may contribute to potential rebar corrosion of the tank domes provided the primary guidance in reviewing and evaluating available NDE technologies. Of primary concern is the need to empl